Data security method and device for computer modules
First Claim
Patent Images
1. A security protection method for a computer module, said method comprising:
- inserting the computer module into a console;
initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module;
determining of a predetermined security status based upon a relationship of said console identification and said computer module identification;
selecting said predetermined security status; and
operating said computer module based upon said security status.
2 Assignments
0 Petitions
Accused Products
Abstract
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer module and compares it to a security identification number in a console, which houses the attached computer module. Based upon a relationship between these numbers, a security status is selected. The security status determines the security level of operating the computer system.
127 Citations
13 Claims
-
1. A security protection method for a computer module, said method comprising:
-
inserting the computer module into a console;
initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module;
determining of a predetermined security status based upon a relationship of said console identification and said computer module identification;
selecting said predetermined security status; and
operating said computer module based upon said security status. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for secured information transactions, the system comprising:
-
a console comprising a peripheral controller housed in the console;
a user identification input device coupled to the peripheral controller, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a security memory device stored with the user identification data. - View Dependent Claims (9, 10)
-
-
11. A method for operating a module computer into one of a plurality of network systems, the method comprising:
-
providing a computer module, the module comprising a connection program;
inserting the computer module into a computer console, the computer console having access to a network;
receiving connection information from the computer console;
configuring the connection program to adapt to the connection information; and
establish a connection between the computer module and a server coupled to the network. - View Dependent Claims (12, 13)
-
Specification