Computer with security function and method therefor
First Claim
1. A method for prohibiting access to a computer, having a radio frequency identification (RFID) chip and capable of having a removable radio frequency (RF) antenna security device installed therein, after a radio frequency antenna security device has been removed from said computer, comprising the steps of:
- (a) storing data comprising at least an antenna history, antenna error, detect coil, detect enable, tamper and access protection bit regions indicating that said security device was originally attached to said computer in a first region of first storage means at said RF chip in said computer, wherein said first storage means is capable of storing data received from said RF antenna while a main power source of said computer is turned off;
(b) starting a procedure for prohibiting the access to change said stored data at said computer following the completion of said step (a);
(c) using said data stored in said first region to verify that said security device was once attached to said computer by accessing at least said antenna history bit;
(d) dynamically determining that said security device is no longer attached to said computer; and
(e) prohibiting the access to said computer in response to said steps (c) and (d).
1 Assignment
0 Petitions
Accused Products
Abstract
A technique for prohibiting access to a computer having a security function when a security device is illegally removed from the computer. The security device is a hardware component that constitutes a part of a security function for a computer. When the security device is illegally removed from the computer, access to the computer is prohibited. Data indicating that the security device is attached to the computer are stored in a nonvolatile memory. Then, when a specific event, such as a power-ON event, is used as a trigger, the procedure for prohibiting the access to the computer is initiated. Following this, based on the data stored in the memory, it is detected that the security device was once attached to the computer and that it has now been removed. If currently the security device is not attached to the computer, although it was attached before, the access to the computer is prohibited.
-
Citations
8 Claims
-
1. A method for prohibiting access to a computer, having a radio frequency identification (RFID) chip and capable of having a removable radio frequency (RF) antenna security device installed therein, after a radio frequency antenna security device has been removed from said computer, comprising the steps of:
-
(a) storing data comprising at least an antenna history, antenna error, detect coil, detect enable, tamper and access protection bit regions indicating that said security device was originally attached to said computer in a first region of first storage means at said RF chip in said computer, wherein said first storage means is capable of storing data received from said RF antenna while a main power source of said computer is turned off; (b) starting a procedure for prohibiting the access to change said stored data at said computer following the completion of said step (a); (c) using said data stored in said first region to verify that said security device was once attached to said computer by accessing at least said antenna history bit; (d) dynamically determining that said security device is no longer attached to said computer; and (e) prohibiting the access to said computer in response to said steps (c) and (d). - View Dependent Claims (2, 3, 4, 8)
-
-
5. A computer, having a radio frequency identification (RFID) chip, capable of having a removable radio frequency (RF) antenna security device installed therein, comprising:
-
first storage means at said RFID chip capable of storing data received from said RF antenna while a main power source of said computer is turned off; a central processing unit; means for storing data comprising at least antenna history, antenna error, detect coil, detect enable, tamper and access protection bit regions indicating that said security device that was once attached to said computer has been removed therefrom in a region of the first storage means; detection means for using data stored in said region to detect that said security device attached to said computer has been removed therefrom; and means for prohibiting, in response to said detection mean, access to said computer. - View Dependent Claims (6, 7)
-
Specification