Computer with security function and method therefor
First Claim
1. A method for prohibiting access to a computer after a security device attached to said computer is removed, comprising the steps of:
- (a) storing setting data comprising a detect enable bit for establishing the computer settings of how to proceed with processing relative to the attachment of a security device to said computer in a first storage unit of said computer;
(b) detecting the attachment of the said security device to said computer after said step (a) and during one of the power-on and the energy-saving mode of said computer;
(c) storing the attachment data comprising a security device history bit indicating the detection in step (b) in a second storage unit equipped in said computer;
(d) detecting a removal of said security device from said computer based on said previously-stored setting data and attachment data; and
(e) prohibiting access to said computer in response to the detection in said step (d).
5 Assignments
0 Petitions
Accused Products
Abstract
When the computer is powered on, a POST program is executed, and in the setting for enabling a security function, an RFID chip 33 makes Removal Detect Enable a high level and outputs it to the control side of an analog switch 67 and one input of a NAND element 63. The removal of an RF antenna 37 causes a first short-circuit element 36 to be disconnected for shutting off a terminal 71 and a terminal 73, and an INTR signal for prohibiting the keyboard input is outputted by the high-level signal of the element 63 to prohibit access to the computer. If the RF antenna is removed while the power is off, the analog switch 67 is disconnected and the power supplied from a lithium battery to a CMOS memory 50 is shut off, whereby access to the computer can be prohibited.
-
Citations
22 Claims
-
1. A method for prohibiting access to a computer after a security device attached to said computer is removed, comprising the steps of:
-
(a) storing setting data comprising a detect enable bit for establishing the computer settings of how to proceed with processing relative to the attachment of a security device to said computer in a first storage unit of said computer; (b) detecting the attachment of the said security device to said computer after said step (a) and during one of the power-on and the energy-saving mode of said computer; (c) storing the attachment data comprising a security device history bit indicating the detection in step (b) in a second storage unit equipped in said computer; (d) detecting a removal of said security device from said computer based on said previously-stored setting data and attachment data; and (e) prohibiting access to said computer in response to the detection in said step (d). - View Dependent Claims (2)
-
-
3. A method for prohibiting access to a computer after a security device attached to said computer is removed, comprising the steps of:
-
(a) storing setting data comprising a detect enable bit for establishing the computer settings with respect to the attachment of said security device to said computer in a first storage unit equipped in said computer; (b) connecting the connection device of an internal basic power wiring equipped in said computer after said step (a) based on said setting data, thereby to secure a power line; (c) when said security device is attached to said computer, disconnecting said connection device while whereby the security device comprises the power line of said internal basic power supply; (d) allowing access to said computer when said security device comprises the power line of said internal basic power supply and maintaining said disconnection of said connection device in said step (c); and (e) if the security device is removed, prohibiting access to said computer by said disconnection. - View Dependent Claims (4)
-
-
5. A computer to which a security device can be attached, comprising:
-
a first storage unit which can maintain storage while the main power supply of said computer is at a halt; a second storage unit which can maintain storage while the main power supply of said computer is at a halt and a backup power supply is operating; a processing unit; and a third storage unit having stored therein a program which makes said computer execute the steps of;
(a) storing and maintaining setting data comprising a detect enable bit for establishing the computer setting of how to proceed with processing relative to the attachment of a security device to said computer in the first storage unit equipped in said computer;
(b) detecting the attachment of the said security device to said computer after said step (a) and during one of the power-on or the energy-saving mode of said computer;
(c) storing and maintaining the attachment data comprising a security device history bit indicating the detection in said step (b) in the second storage equipped in said computer;
(d) detecting a removal of said security device from said computer based on said previously-stored setting data and attachment data; and
(e) prohibiting access to said computer in response to the detection in said step (d), said third storage unit being readable by a computer. - View Dependent Claims (7, 9, 11, 14, 16, 18, 20)
-
-
6. A computer to which a security device can be attached, comprising:
-
a first storage unit which can maintain storage while the main power supply of said computer is at a halt; a connection device operated by an internal basic power supply for connecting an internal basic power wiring; a processing unit; and a second storage unit having stored therein a program which makes said computer execute the steps of;
(a) storing and maintaining setting data comprising a detect enable bit for establishing the computer settings with respect to the attachment of said security device to said computer in the first storage equipped in said computer;
(b) connecting the connection device of an internal basic power wiring equipped in said computer after said step (a) based on said setting data, thereby to secure a power supply line;
(c) disconnecting said connection device while said security device is attached to said computer to form the power line of said internal basic power supply;
(d) maintaining said disconnection in said step (c); and
(e) prohibiting access to said computer by said disconnection. - View Dependent Claims (8, 10, 12, 13, 15, 17, 19)
-
-
21. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for prohibiting access to a computer after a security device attached to said computer is removed, said method steps comprising:
(a) storing and maintaining setting data comprising a detect enable bit for establishing the computer settings with respect to the attachment of said security device to said computer in the first storage equipped in said computer;
(b) connecting the connection device of an internal basic power wiring equipped in said computer after said step (a) based on said setting data, thereby to secure a power supply line;
(c) while said security device is attached to said computer, disconnecting said connection device whereby the security device comprises the power line of said internal basic power supply;
(d) allowing access to said computer when said security device comprises the power line of said internal basic power supply and maintaining said disconnection in said step (c); and
(e) if said security device is removed, prohibiting access to said computer by said disconnection.
-
22. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for prohibiting access to a computer after a security device attached to said computer is removed, said method steps comprising:
(a) storing and maintaining setting data comprising a detect enable bit for establishing the computer settings of how to proceed with processing relative to the attachment of a security device to said computer in a first storage unit equipped in said computer;
(b) detecting the attachment of the said security device to said computer after said step (a) and during one of the power-on and the energy-saving mode of said computer;
(c) storing and maintaining the attachment data comprising a security device detect bit indicating the detection in said step (b) in a second storage equipped in said computer;
(d) detecting a removal of said security device from said computer based on said previously-stored setting data and attachment data; and
(e) prohibiting access to said computer in response to the detection in said step (d), a third storage unit being readable by a computer.
Specification