Security access and monitoring system for personal computer
First Claim
1. A method for controlling user access to a computer having a processor, a system timer, a system memory, and at least one input/output (I/O) device connected to said processor, said processor being directed by interrupts for execution of interrupt services and said computer further including a key device connectable to said processor for removably coupling data to said processor indicating a user identification, said method comprising the steps of:
- storing in said system memory a data file of at least one authorized user identification;
capturing a system timer interrupt;
connecting said key device to said processor;
responsive to said system timer interrupt, periodically reading said user identification from said key device and comparing said read user identification with said stored authorized user identification; and
disabling said at least one I/O device when said read user identification fails to match said stored authorized user identification.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for controlling access to a computer. Memory-resident software logic cooperates with a remote electronic key device coupled to the computer'"'"'s processor, through the printer port, to disable the computer unless an authorized key is inserted in the key device. The logic is executed in the processor responsive to the computer'"'"'s system timer interrupt for continuous monitoring capability. Until a user inserts an authorized key, or upon removal of the key, the logic suspends operation of any application programs, the monitor is blanked and the mouse, keyboard and floppy disk drive are disabled. A record is stored in memory of authorized users and user audit information. Utility menu options are used to add or delete user keys, display access and usage records and to customize the number and selection of I/O devices to be disabled by the system.
-
Citations
40 Claims
-
1. A method for controlling user access to a computer having a processor, a system timer, a system memory, and at least one input/output (I/O) device connected to said processor, said processor being directed by interrupts for execution of interrupt services and said computer further including a key device connectable to said processor for removably coupling data to said processor indicating a user identification, said method comprising the steps of:
-
storing in said system memory a data file of at least one authorized user identification; capturing a system timer interrupt; connecting said key device to said processor; responsive to said system timer interrupt, periodically reading said user identification from said key device and comparing said read user identification with said stored authorized user identification; and disabling said at least one I/O device when said read user identification fails to match said stored authorized user identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for controlling user access to a computer having a processor, a system memory, a mass storage device and a disk operating system for controlling execution of said processor, said disk operating system being loaded from said mass storage device to said system memory in an initialization procedure executed in said processor that includes execution of a system start-up batch file for loading terminate and stay resident utilities into said system memory, said computer further including a key device connectable to said processor for removably coupling data to said processor indicating a user identification, said method comprising the steps of:
-
storing in said system memory a data file of at least one authorized user identification; connecting said key device to said processor; reading said user identification data from said key device and comparing said read user identification data with said stored authorized user identification data during execution of said batch file loading procedure; suspending said execution of said batch file loading procedure when said read user identification data fails to match said stored user identification data, thereby preventing loading of said terminate and stay resident utilities into said system memory; and continuing said execution of said batch file loading procedure when said read user identification data matches said stored authorized user identification data, thereby permitting loading of said terminate and stay resident utilities and completion of said initialization procedure. - View Dependent Claims (16, 17)
-
-
18. A method for controlling user access to a computer having a processor, a system timer, a system memory, and at least one input/output (I/O) device connected to said processor, said computer further including a key device connected to said processor for removably coupling data to said processor indicating a user identification, said method comprising the steps of:
-
storing in said system memory a data file of at least one authorized user identification, said at least one authorized user identification including at least one administrator identification; a user connecting said key device to said processor; periodically reading said user identification from said key device and comparing said read user identification with said stored,authorized user identification; disabling said at least one device when said read user identification fails to match one of said at least one stored authorized user identification; and selectively entering at least one utility menu option when said read user identification matches said at least one administrator identification. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. Apparatus for controlling user access to a computer, said computer having a processor, a system timer, a system memory and at least one input/output device connected to said processor, said processor being directed by interrupts for execution of interrupt services, said apparatus comprising:
-
an input/output port coupled to said processor; key means including data terminals for connection to said input/output port for removably coupling data to said processor indicating a user identification; a data file stored in said system memory indicating at least one authorized user identification; logic stored in said system memory and executed in said processor for capturing a system timer interrupt; security logic stored in said system memory and executed in said processor responsive to said system timer interrupt for periodically reading said user identification from said key means and comparing said read user identification with said stored authorized user identification; and said security logic for disabling said at least one I/O device when said read user identification fails to match said stored authorized user identification. - View Dependent Claims (27, 28, 29, 30, 32, 33, 34, 35)
-
-
31. The apparatus of claimed 29 wherein said input/output port comprises a parallel printer port.
-
36. Apparatus for controlling user access to said computer having a processor, at least one input/output (I/O) port connected to said processor, a system timer, a system memory, a mass storage device coupled by a device controller to said processor for transferring data to said system memory and at least one I/O device connected to said processor, said processor being directed by interrupts for execution of interrupt services, said apparatus comprising:
-
A key device for removably coupling data to said processor indicating a user identification, said key device including at least one electronic key having means for providing said user identification data and a connector coupled to said data means, a jack for removably receiving said connector, and a cable connecting said jack to said processor through said I/O port; a data file stored in said system memory indicating at least one authorized user identification; logic stored in said system memory and executed in said processor for capturing a system timer interrupt; security logic stored in said system memory and executed in said processor responsive to said system timer interrupt for periodically reading said user identification from said key means and comparing said read user identification with Said. stored authorized user identification; said security logic for disabling said at least one I/O device when said read user identification fails to match said stored authorized user identification; and access circuitry connected between said mass data storage device and said controller for selectively disabling said transfer of data from said mass data storage device to said system memory responsive to said security logic. - View Dependent Claims (37, 38, 39, 40)
-
Specification