Personal computer using chip-in card to prevent unauthorized use
First Claim
1. An apparatus for preventing unauthorized use of a computer system by locking a keyboard in the computer system, said apparatus comprising:
- a card read and write unit having a card reception slot, for determining whether a chip-in card is inserted into said reception slot and for determining whether the inserted card is authorized for enabling an operator to access the computer system;
a card read and write controller connected to said card read and write unit, for generating an interrupt signal in response to insertion of said chip-in card, and for controlling the reading and writing of information on said chip-in card through said card read and write unit;
a keyboard for allowing the operator to input commands and/or information to the computer system; and
a host controller connected to said card read and write controller, for locking the keyboard from inputting commands and information to the computer system and for unlocking the keyboard to allow the input of commands and information from said keyboard to gain access to the computer system in dependence upon said interrupt signal.
1 Assignment
0 Petitions
Accused Products
Abstract
A personal computer system capable of preventing unauthorized user'"'"'s access by way of a chip-in card including a card read and write unit for detecting the insertion or ejection of the chip-in card; a card read and write controller for generating an interrupt in response to the insertion or ejection of the chip-in card; at least one input means for allowing the user to input commands and information to gain access to the computer; and a host controller responsive to the interrupt from the card read and write controller, for preventing the input of commands and/or information from the input means, when the chip-in card is ejected, but allowing input of commands and information from the input means, when the chip-in card is inserted in position of the card read and write unit. Accordingly, the personal computer system can be controlled so that access to the computer or designated program cannot be realized without a personal identification card, while other unrestricted programs can be executed during the control of the computer system in order to increase its operation efficiency.
-
Citations
15 Claims
-
1. An apparatus for preventing unauthorized use of a computer system by locking a keyboard in the computer system, said apparatus comprising:
-
a card read and write unit having a card reception slot, for determining whether a chip-in card is inserted into said reception slot and for determining whether the inserted card is authorized for enabling an operator to access the computer system; a card read and write controller connected to said card read and write unit, for generating an interrupt signal in response to insertion of said chip-in card, and for controlling the reading and writing of information on said chip-in card through said card read and write unit; a keyboard for allowing the operator to input commands and/or information to the computer system; and a host controller connected to said card read and write controller, for locking the keyboard from inputting commands and information to the computer system and for unlocking the keyboard to allow the input of commands and information from said keyboard to gain access to the computer system in dependence upon said interrupt signal. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system, comprising:
-
an operator input device; a card reader having a reception slot; a controller responsive to an unauthorized use program to perform the authorization steps of; controlling said card reader to determine whether a chip-in card is inserted into said reception slot; when said chip-in card is inserted into said reception slot, generating an interrupt signal; allowing an operator to input commands and information through said operator input device to gain access to the computer systems when said interrupt signal indicates that the inserted card is maintained in position in the reception slot after a predetermined period; and locking said operator input device from inputting commands and information to the computer system thereby preventing unauthorized access to the computer system, when said interrupt signal indicates that the inserted card is rejected from the reception slot after said predetermined period. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method for preventing unauthorized use of a personal computer system having an operator input device, a card reader having a reception slot for receiving an IC card, and a central processor for storing a main program and an unauthorized use interrupt routine, said method comprising the steps of:
-
executing said main program after the computer system is booted; controlling said card reader to determine whether an IC card is inserted into the reception slot of said card reader; when said IC card is inserted into or ejected from said reception slot, executing said unauthorized use interrupt routine to determine whether the inserted IC card is authorized for enabling an operator to access to the computer system; generating an interrupt signal in dependence upon whether the inserted IC card is maintained in position of the reception slot or ejected from the reception slot of said card reader; temporarily disabling operation of said main program; allowing the operator to input commands and information through said operator input device to access to the computer system in response to said interrupt signal when said interrupt signal indicates that the inserted IC card is maintained in position of the reception slot of said card reader; alternatively, locking said operator input device from allowing the operator to input commands and information through said operator input device to access to the computer system thereby preventing unauthorized access to the computer system in response to said interrupt signal when said interrupt signal indicates that the inserted IC card is ejected from the reception slot of said card reader; and resuming to execute operation of said main program. - View Dependent Claims (13)
-
-
14. A computer system, comprising:
-
a card unit having a reception slot, for determining whether a chip-in card is inserted into said reception slot; a card controller connected to said card reader, for generating an interrupt signal when said chip-in card is inserted in said reception slot, and for controlling reading and writing of information on said chip-in card through said card unit; a keyboard for allowing an operator to input commands and/or information to the computer system; and a central processor connected to said card controller and having a memory storing a main program and an unauthorized use interrupt routine for preventing unauthorized use of the computer system, said central processor preventing unauthorized use of the computer system by; executing said main program after the computer system is booted; controlling said card unit to determine whether said chip-in card is inserted into the reception slot of said card unit; when said chip-in card is inserted into or ejected from said reception slot, executing said unauthorized use interrupt routine to determine whether the inserted card is authorized for enabling the operator to access the computer system; controlling said card controller to generate the interrupt signal in response to whether the inserted card is maintained in position of the reception slot or ejected from the reception slot of said card unit; temporarily disabling operation of said main program; allowing the operator to input commands and information through said keyboard to access the computer system, when said interrupt signal indicates that the inserted card is maintained in position of the reception slot of said card unit; alternatively, locking said keyboard from allowing the operator to input commands and information through said keyboard to access the computer system, when said interrupt signal indicates that the inserted card is ejected from the reception slot of said card unit; and resuming to execute operation of said main program. - View Dependent Claims (15)
-
Specification