Apparatus and method for providing and authentication system
First Claim
1. A security verification apparatus for controlling access to at least one program on a processing system by verifying data entered through a keyboard with data stored on a card, comprising:
- a memory;
a processor coupled to said memory;
a first data path between the keyboard and the processing system;
a second data path between the keyboard and the processor; and
a third data path between the processing system and the processor;
said processor being operable in a first mode wherein access to the processing system via the first data path is inhibited when data entered via the keyboard does not match data stored on the card, said processor being operable in a second mode, wherein the keyboard is coupled to the processing system so that the at least one program on the processing system is accessible via the second and third data paths when the entered data matches the data stored on the card.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a method and apparatus for controlling access to at least one program on a processing system by verifying data entered through a keyboard, while isolating the entered data from the processing system. The apparatus comprises a memory and a processor coupled to the memory. A first data path is provided between the keyboard and the processing system; a second data path is provided between the keyboard and the processor; and a third data path is provided between the processing system and the processor. When activated, the processor is operable in a first mode wherein access to the processing system via the keyboard is inhibited when data entered via the keyboard does not match data stored on the card. The processor is operable in a second mode, wherein the keyboard is coupled to the processing system so that the at least one program on the processing system is accessible via the keyboard when the entered matches the data stored on the card. Various embodiments are disclosed.
156 Citations
25 Claims
-
1. A security verification apparatus for controlling access to at least one program on a processing system by verifying data entered through a keyboard with data stored on a card, comprising:
-
a memory;
a processor coupled to said memory;
a first data path between the keyboard and the processing system;
a second data path between the keyboard and the processor; and
a third data path between the processing system and the processor;
said processor being operable in a first mode wherein access to the processing system via the first data path is inhibited when data entered via the keyboard does not match data stored on the card, said processor being operable in a second mode, wherein the keyboard is coupled to the processing system so that the at least one program on the processing system is accessible via the second and third data paths when the entered data matches the data stored on the card. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 14, 15, 17)
-
-
11. A security verification system for controlling access to at least one program on a processing system by verifying data entered through a keyboard with data stored on a card, comprising:
-
a processing system having a first memory and a first processor;
a second processor coupled to said processing system;
a first data path between the keyboard and the first processor;
a second data path between the keyboard and the second processor; and
a third data path between the first processor and the second processor;
said second processor being operable in a first mode wherein access to the processing system via the first data path is inhibited when data entered via the keyboard does not match data stored on the card, said second processor being operable in a second mode, wherein the keyboard is coupled to the processing system so that at least one program on the processing system is accessible via the second and third data paths when the entered matches the data stored on the card. - View Dependent Claims (12, 13, 16, 18, 19, 20)
-
-
21. A method for controlling access to at least one program running on a processing system via a keyboard, comprising:
-
(a) providing a verification unit having a processor;
(b) providing a first data path between the keyboard and the processing system;
(c) providing a second data path between the keyboard and the processor;
(d) providing a third data path between the processing system and the processor;
(e) comparing data entered via the keyboard with data stored in the card;
(f) denying access to the processing system via the keyboard if data entered via the keyboard does not match data stored on the card; and
(g) granting access to at least one program on the processing system if data entered via said keyboard matches the data stored on the card. - View Dependent Claims (22, 23, 24, 25)
(f.1) denying access to the at least one program on the processing system if the data from the keyboard does not match the data from the card;
(f.2) recording the number of invalid attempts at obtaining access to the program on the computer; and
(f.3) disabling the card after the invalid attempts exceed a predetermine number.
-
-
23. The method of claim 21, wherein (e) comprises:
-
(e.1) receiving data from the keyboard;
(e.2) reading data from the card;
(e.3) comparing the data from the keyboard to the data from the card.
-
-
24. The method of claim 23, wherein in (e.1), the processing system is decoupled from the keyboard.
-
25. The method of claim 23, further comprising, prior to (e.1):
providing a signal by the processor to indicate that the processing system is decoupled from the keyboard and that the processor is ready to receive data from the keyboard.
Specification