Security system for a stand-alone computer
First Claim
1. A security system for a host computer, said security system being activated during the system boot operations and controlling access to the host computer, said security system comprising;
- at least one communications port;
a key which is connectable to said at least one communications port, said key having an associated key ID value;
a keyboard;
a first non-volatile memory having defined therein a stored key ID value and a first password value, said stored key ID value corresponding to said key ID value, said password value corresponding to a selected first access password; and
a microprocessor based peripheral controller in communication with said at least one communications port, said keyboard, said non-volatile memory and said host computer, wherein said peripheral controller is responsive to either said key being connected to said communications port or entry of said access password on said keyboard to permit access to said host computer.
7 Assignments
0 Petitions
Accused Products
Abstract
A security system for stand alone and portable computer hosts which utilizes both a hardware key and a password key to enable-access to the computer host. The entry of the password key and the hardware key is monitored by the keyboard controller. The keyboard controller alters a status bit during the POST portion of the host code if access is granted. The host security is divided into two levels of security, a first administrative level and a second user level. The administrative level is accessible by the entry of a first password or by the hardware key and enables access to all levels of the host SET-UP configuration. The user level is accessible by the entry of a second password and only enables access to a limited portion of the setup configuration.
135 Citations
17 Claims
-
1. A security system for a host computer, said security system being activated during the system boot operations and controlling access to the host computer, said security system comprising;
-
at least one communications port; a key which is connectable to said at least one communications port, said key having an associated key ID value; a keyboard; a first non-volatile memory having defined therein a stored key ID value and a first password value, said stored key ID value corresponding to said key ID value, said password value corresponding to a selected first access password; and a microprocessor based peripheral controller in communication with said at least one communications port, said keyboard, said non-volatile memory and said host computer, wherein said peripheral controller is responsive to either said key being connected to said communications port or entry of said access password on said keyboard to permit access to said host computer. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A security system for a host computer, wherein said security system monitors a set of security settings during system boot operations, and wherein the security system controls access to the host computer based upon said security settings, said security system comprising
at least one peripheral device communications port; -
a key which is adapted for connection to said at least one peripheral device communications port, said key having an associated key ID value; a keyboard; a non-volatile memory having defined therein a stored key ID value, a first password value, and a second password value, said stored key ID value corresponding to said key ID value, said first password corresponding to a first selected access password, and said second password value corresponding to a second selected access password; and a microprocessor based peripheral controller in communication with said at least one peripheral device communications port, said keyboard, said non-volatile memory and said host computer, wherein said peripheral controller is responsive to entry of said first password on said keyboard or said key being connected to said communications port to permit access to a first set of setup parameters for said computer, and wherein said peripheral controller is responsive to entry of said second password on said keyboard to permit access to a subset of said set of setup parameters. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method of controlling access to a host computer, wherein the host computer is in communication with a peripheral device controller which is in communication with at least one communications port, and wherein said peripheral device controller is further in communication with a non-volatile memory having defined therein a stored key ID value, said method comprising the steps of:
-
coupling a key having a key ID value corresponding to said stored key ID value to said at least one communications port; reading, with said peripheral controller, said key ID value from said key; comparing, with said peripheral controller, said key ID value to said stored key ID value from said non-volatile memory; and permitting access to said host computer if said peripheral controller determines that said stored key ID value and said key ID value correspond. - View Dependent Claims (13, 14)
-
-
15. A method of controlling access to a host computer, the host computer in communication with a peripheral controller which is in communication with at least one communications port and with a non-volatile memory, said method comprising the steps of:
-
initializing a first mode of authorized access, comprising the steps of; to said host computer by coupling a key having a corresponding key ID value stored therein to said communications port; with said peripheral controller, reading the key ID value from said key; and with said peripheral controller, storing a value corresponding to said key ID value in said non-volatile memory as a valid stored key ID, said non-volatile memory inaccessible by said host; after said initialization, permitting access to said host computer whenever, upon system startup, a key having said key ID value is coupled to said communications port. - View Dependent Claims (16, 17)
-
Specification