Computer security system
First Claim
1. A security system for a computer, said security system operating independently of a host computer to disable access to an operating system of the host computer when security measures are activated, said security system comprising:
- at least one peripheral input device; and
a microprocessor based peripheral device controller in communication with said host computer and said at least one peripheral input device, said peripheral device controller providing an interface between said at least one peripheral input device and said host computer, said peripheral device controller, independent of said host computer, responsive to the elapsing of a predetermined period during which said at least one peripheral input device remains inactive to automatically inhibit access to said host computer after said predetermined period has elapsed, said peripheral device controller further responsive to entry of predesignated signals from said at least one peripheral input device to permit access to said host computer.
9 Assignments
0 Petitions
Accused Products
Abstract
A computer security device for preventing unauthorized access to a computer system automatically disables peripheral device access to the computer system after the peripheral input devices remain inactive for a predetermined period. The system comprises a host computer which is in communication with a keyboard controller and a display. The keyboard controller is in communication with one or more peripheral input devices such as a keyboard and a mouse. The computer security device operates in the keyboard controller, independent from the host. The keyboard controller activates security after a preset time period during which the mouse and keyboard remain inactive. When the security is active, the keyboard controller disables transfers to the host computer from the peripheral input devices. In order to re-enable peripheral device access to the host computer, a user enters a correct password on the keyboard. In a preferred embodiment, the display is also deactivated when security is active. Thus, if the user leaves a computer station, any information which was displayed on the screen is not viewable.
-
Citations
18 Claims
-
1. A security system for a computer, said security system operating independently of a host computer to disable access to an operating system of the host computer when security measures are activated, said security system comprising:
-
at least one peripheral input device; and a microprocessor based peripheral device controller in communication with said host computer and said at least one peripheral input device, said peripheral device controller providing an interface between said at least one peripheral input device and said host computer, said peripheral device controller, independent of said host computer, responsive to the elapsing of a predetermined period during which said at least one peripheral input device remains inactive to automatically inhibit access to said host computer after said predetermined period has elapsed, said peripheral device controller further responsive to entry of predesignated signals from said at least one peripheral input device to permit access to said host computer. - View Dependent Claims (2)
-
-
3. A computer security system for use with a host computer, the security system operating independently of said host computer to prevent access to an operating system of the host computer when security has been activated, said security system comprising:
-
at least one peripheral input device; and a peripheral controller in communication with said at least one peripheral input device and with said host computer, said peripheral controller providing an interface between said peripheral input device and the host computer, said peripheral controller, independent of said host computer, responsive to the elapsing of a predetermined period of inactivity during which said at least one peripheral input device remains inactive, and during which said host does not request data from said peripheral controller, to automatically disable access to said host computer through said peripheral controller after said predetermined period of inactivity has elapsed. - View Dependent Claims (4)
-
-
5. A computer security system for use with a host computer which utilizes a peripheral device controller as an interface between peripheral devices and the host computer, said host computer in communication with said peripheral device controller, the security system controlled by the peripheral device controller independent of the operation of the host computer, the security system preventing access to an operating system of the host computer when security measures have been activated, said security system comprising:
-
at least one peripheral input device in communication with said peripheral device controller; at least one polling block stored in a memory for said peripheral device controller and executable by said peripheral device controller, said polling block, during execution, monitoring a period of inactivity of said at least one peripheral input device and detecting when said period of inactivity is equal to or greater than a predetermined period of inactivity; and at least one security measures block stored in said memory for said peripheral device controller, said security measures block executable by said peripheral device controller, said security measures block, during execution, responsive to the detection by said polling block to automatically disable access to said host computer through said keyboard controller. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A method of preventing unauthorized access to a host computer, the host computer in communication with a keyboard controller, the keyboard controller further in communication with at least one peripheral input device, said method implemented in said keyboard controller independent of said host computer, said keyboard controller executing said method to monitor input to said host from said peripheral input device, said method comprising the steps of:
-
monitoring said peripheral input device with said keyboard controller for inactivity; detecting with said peripheral controller when said peripheral input device has remained inactive for a predetermined period of inactivity; and after detecting that said peripheral device has remained inactive for said predetermined period of inactivity, preventing data from said peripheral input device from passing to said host computer through the keyboard controller. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A security system for a computer comprising:
-
a host computer having a main central processing unit and associated circuitry; a peripheral device interface coupled to said main host computer and coupled to at least one peripheral device, said peripheral device interface providing an interface between said host and said at least one peripheral device; a memory coupled to said peripheral device interface and accessible by said peripheral device interface for execution of instructions stored in said memory, said memory generally inaccessible to said host computer; a period of inactivity detection module stored in said memory for execution by said peripheral device interface, said period of inactivity detection module configured to, during execution, monitor said at least one peripheral device for inactivity and monitor said host for lack of communication directed to said peripheral device interface; and a disable access module stored in said memory for execution by said peripheral device interface, said disable access module responsive to the detection of the predetermined period of time of inactivity of said peripheral device and to the detection of lack of communication directed from said host to said peripheral device interface to disable access to said host computer by said peripheral device. - View Dependent Claims (17, 18)
-
Specification