Networked computer security system
First Claim
Patent Images
1. A computer network, comprising:
- a plurality of computer systems, each havinga memory,a microprocessor operatively connected to read and write said memory,a graphics controller operatively connected to said microprocessor,a video display connected to said graphics controller;
a local storage device storing applications to be executed;
an authorization server, having a unique server identifier and operable to verify user logon information;
wherein when one of said systems is powered on, said system checks said unique server identifier and selectively disables said system if said identifier does not match a predetermined set of acceptable identifiers.
3 Assignments
0 Petitions
Accused Products
Abstract
A hardware security password mechanism that allows administrators to manage the passwords more easily by managing them centrally on a network rather than on an individual system. Further, each individual machine interacts with the network to allow the system administrator to lock down the hardware features without having any local, hardware-based password mechanisms.
-
Citations
24 Claims
-
1. A computer network, comprising:
-
a plurality of computer systems, each having a memory, a microprocessor operatively connected to read and write said memory, a graphics controller operatively connected to said microprocessor, a video display connected to said graphics controller; a local storage device storing applications to be executed; an authorization server, having a unique server identifier and operable to verify user logon information; wherein when one of said systems is powered on, said system checks said unique server identifier and selectively disables said system if said identifier does not match a predetermined set of acceptable identifiers. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer network, comprising:
-
a plurality of computer systems, each having a memory, a microprocessor operatively connected to read and write said memory, a graphics controller connected to said microprocessor, a local storage device storing applications to be executed; a video display connected to said graphics controller; an authentication circuit operatively connected to disable said computer system; an authorization server, having a unique server identifier and operable to verify user logon information; wherein when one of said computer systems is powered on, both of the following occur; said one of said computer systems requests said security identifier from said authorization server and selectively disables said system according to the results of said request; and said one of said computer systems verifies said logon information with said authorization server, and said authentication circuit selectively disables said system according to said verification. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer system, comprising:
-
a memory, a microprocessor operatively connected to read and write said memory, a graphics controller operatively connected to said microprocessor, a video display connected to said graphics controller; a local storage device storing applications to be executed; wherein said system is powered on, said system checks a server identifier of a computer network and selectively disables said system if said identifier does not match a predetermined set of acceptable identifiers. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A method, comprising the steps of:
-
(a.) starting a computer system and executing a power-on-self-test; (b.) determining if said computer system is connected to a computer network, and disabling said computer system is it is not; (c.) transmitting to an authorization server, by said computer system, a request for a network identifier; (d.) receiving said network identifier from said authorization server; (e.) verifying said network identifier and disabling said computer system if said verification fails; (f.) transmitting user logon information by said computer system to said authorization server; (g.) receiving user authorization from said authorization server and selectively disabling said computer system according to said authorization; and (h.) executing an application program on said computer system. - View Dependent Claims (22, 23, 24)
-
Specification