Data security method and device for computer modules
First Claim
Patent Images
1. A security protection method for a computer module, said method comprising:
- inserting the computer module into a console;
initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module, wherein said step of initiating reads said security identification of said computer module from a flash memory device;
determining of a predetermined security status based upon a relationship of said console identification and said computer module identification;
selecting said predetermined security status; and
operating said computer module based upon said security status.
2 Assignments
0 Petitions
Accused Products
Abstract
A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer module and compares it to a security identification number in a console, which houses the attached computer module. Based upon a relationship between these numbers, a security status is selected. The security status determines the security level of operating the computer system.
117 Citations
62 Claims
-
1. A security protection method for a computer module, said method comprising:
-
inserting the computer module into a console;
initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module, wherein said step of initiating reads said security identification of said computer module from a flash memory device;
determining of a predetermined security status based upon a relationship of said console identification and said computer module identification;
selecting said predetermined security status; and
operating said computer module based upon said security status. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for secured information transactions, the system comprising:
-
a console comprising a peripheral controller housed in the console;
a user identification input device coupled to the peripheral controller, the user identification input device being provided for user identification data, wherein the user identification input device is a finger print reader; and
an attached computer module coupled to the console, the attached computer module comprising a security memory device stored with the user identification data. - View Dependent Claims (9, 10)
-
-
11. A method for operating a module computer into one of a plurality of network systems, the method comprising:
-
providing a computer module, the module comprising a connection program;
inserting the computer module into a computer console, the computer console having access to a network;
receiving connection information from the computer console;
configuring the connection program to adapt to the connection information; and
establish a connection between the computer module and a server coupled to the network. - View Dependent Claims (12, 13)
-
-
14. A security protection method for a computer module, said method comprising:
-
inserting the computer module into a console;
initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module, wherein initiating reads said security identification from a flash memory device;
determining of a security status based upon a relationship of said console identification and said computer module identification;
selecting said security status; and
operating said computer module based upon said security status.
-
-
15. A system for secured information transactions, the system comprising:
-
a console comprising a network communication controller housed in the console;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a mass storage unit, a graphics subsystem, an interface controller coupled to the console, and a security memory device stored with the user identification data, wherein the security memory device comprises a flash memory, and wherein all data from the computer module passes through the interface controller to reach any device in the console. - View Dependent Claims (16, 17)
-
-
18. A system for secured information transactions, the system comprising:
-
a console comprising a network communication controller housed in the console;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a mass storage unit comprising a hard disk drive including a computer code for implementing a security program, a graphics subsystem, and a security memory device stored with the user identification data. - View Dependent Claims (19, 20)
-
-
21. A modular system for information transactions, the system comprising:
-
a console comprising a first interface controller housed in the console and coupled with an interface connector; and
an attached computer module coupled to the console through the interface connector and comprising a mass storage unit, a graphics subsystem, a security program, and a second interface controller coupled to the first interface controller, wherein the computer module further comprises a security memory device stored with security identification data, wherein the security memory device comprises a flash memory including a code to provide password protection, and wherein all data transferred from the mass storage unit to the console passes through the first and second interface controllers. - View Dependent Claims (22, 23, 24)
-
-
25. A modular system for secured information transactions, the system comprising:
-
a computer console comprising a first interface controller housed in the console and coupled to an interface connector;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a security program providing password protection, a mass storage unit comprising a flash memory device, a graphics subsystem, and a second interface controller coupled to the first interface controller, wherein the user identification data passes to the computer module through first and second interface controllers. - View Dependent Claims (26)
-
-
27. A system for secured information transactions, the system comprising:
-
a computer console comprising a network communication controller housed in the console;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a central processing unit, a graphics subsystem, an interface controller coupled to the console, and a security memory device stored with the user identification data, wherein the security memory device comprises a flash memory including codes to provide password protection. - View Dependent Claims (28, 29)
-
-
30. A system for information transactions, the system comprising:
-
a computer console comprising a network communication controller housed in the console; and
an attached computer module coupled to the console, the attached computer module comprising a central processing unit, a graphics subsystem, a security program configured to at least one of activate different levels of password protection and control different levels of access privilege, and an interface controller coupled to the console, wherein all computer module network data passes through the console. - View Dependent Claims (31)
-
-
32. A security protection method for a computer module comprising a mass storage unit and a graphics subsystem, said method comprising:
-
inserting the computer module into a console comprising a network communication controller;
storing security information data with a security memory device of the computer module, by storing codes in a flash memory to provide password protection for said attached computer module;
initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module;
determining of a predetermined security status based upon a relationship of said console identification and said computer module identification;
selecting said predetermined security status; and
operating said computer module based upon said security status. - View Dependent Claims (33)
-
-
34. A method for operating a module computer into one of a plurality of network systems, the method comprising:
-
providing an attached computer module, the module comprising a connection program, an interface controller and a security identification;
storing security identification data in a security memory device of the computer module;
coupling the computer module to a computer console through the interface controller, the computer console comprising a network communication device having access to a network;
receiving connection information from the console through the interface controller;
receiving the security identification through the interface controller;
transmitting video information to the console from a graphics subsystem of the attached computer module;
configuring the connection program to adapt to the connection information. - View Dependent Claims (35, 36)
-
-
37. A method for operating a module computer into one of a plurality of network systems, the method comprising:
-
providing an attached computer module, the module comprising a connection program, a graphics subsystem, an interface controller and a security memory device stored with the user identification data;
coupling the computer module to a computer console through the interface controller, the computer console comprising a network communication device having access to a network;
receiving connection information from the console through the interface controller;
receiving the user identification data through the interface controller;
configuring the connection program to adapt to the connection information, and establishing console access to the computer module, wherein all network data transaction of the attached computer module passes through the console. - View Dependent Claims (38, 39, 40)
-
-
41. A method for operating a module computer into one of a plurality of network systems, the method comprising:
-
providing an attached computer module, the module comprising a connection program and an interface controller;
storing security information in a flash memory device of the computer module;
inserting the computer module into a computer console to form a functional computer to create a “
plug and play”
operation, the computer console comprising a second interface controller coupled to the first interface controller upon insertion, and the console having access to an external network;
receiving connection information from the console through the interface controller;
configuring the connection program to adapt to the connection information, and establishing the computer module connection to the external network through said interface controllers. - View Dependent Claims (42, 43)
-
-
44. A method for operating a module computer into one of a plurality of network systems, the method comprising:
-
providing an attached computer module, the module comprising a connection program and an interface controller;
inserting the computer module into a computer console to form a functional computer to create a “
plug and play”
operation, the computer console comprising a second interface controller coupled to the first interface controller upon insertion, and the console having access to an external network;
receiving connection information from the console through the interface controller;
configuring the connection program to adapt to the connection information, and establishing the computer module connection to the external network through said interface controllers, the method further comprising providing password protection for said computer module from a security program on a hard disk drive of the computer module.
-
-
45. A method for operating a module computer into one of a plurality of network systems, the method comprising:
-
providing an attached computer module, the module comprising an enclosure, a graphics subsystem, a connection program and a first interface controller;
coupling the computer module to a computer console, the computer console comprising a second interface controller coupled to the first interface controller upon insertion, and the console having access to an external network;
receiving connection information from the console through the interface controllers;
configuring the connection program to adapt to the connection information, and establishing the computer module access to the external network, the method further comprising providing password protection for said computer module from codes stored in a flash memory device of the computer module. - View Dependent Claims (46, 48)
-
-
47. A method for operating a module computer into one of a plurality of network systems, the method comprising:
-
providing an attached computer module, the module comprising an enclosure, a graphics subsystem, a connection program and a first interface controller;
coupling the computer module to a computer console, the computer console comprising a second interface controller coupled to the first interface controller upon insertion, and the console having access to an external network;
providing password protection for said computer module from codes stored in a flash memory device of the computer module;
receiving connection information from the console through the interface controllers;
configuring the connection program to adapt to the connection information, and establishing the computer module access to the external network, the method further comprising providing password protection for said computer module from a security program of a hard disk drive of said computer module.
-
-
49. A method for operating a modular computer into a network, the method comprising:
-
providing a computer module, the module comprising a central processing unit, a graphics subsystem and a connection program;
inserting the computer module into a computer console to create a “
plug and play”
operation, the computer console comprising a network communication controller having access to an external network;
receiving connection information from the computer console;
configuring the connection program to adapt to the connection information; and
establishing a connection between the computer module and a server coupled to the network in the plug and play operation, the method further comprising providing password protection for said computer module from codes stored in a flash memory device of the computer module. - View Dependent Claims (50, 51)
-
-
52. A system for secured information transactions, the system comprising:
-
a console comprising a network communication controller housed in the console and coupled to an external network;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a central processing unit, a graphics subsystem, and a mass storage unit storing a security program and a user identification datum, wherein the security program is configured to receive the user identification datum from the input device, match the stored user identification data, and permit external access to the computer module, and wherein the security program is further configured to at least one of activate different levels of password protection, and control different levels of access privilege. - View Dependent Claims (53)
-
-
54. A system for secured information transactions, the system comprising:
-
a console comprising a network communication controller housed in the console and coupled to an external network;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a central processing unit, a graphics subsystem, an interface controller coupled to the console, and a mass storage unit storing a security program and a user identification data, wherein the attached computer module further comprises a flash memory device including codes for password protection, wherein the security program receives the user identification data from the input device, matches the stored user identification data and permits external data transfer to the computer module through the interface controller. - View Dependent Claims (55)
-
-
56. A system for secured information transactions, the system comprising:
-
a computer console comprising a first interface controller housed in the console, and a LAN communication controller;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console through the interface controller, the attached computer module comprising a second interface controller couples to the first interface controller, a CPU, a graphics subsystem, and a mass storage unit stored with the user identification data, the mass storage unit comprising a flash memory device including codes to provide password protection, wherein all LAN communication of the computer module passes through the console. - View Dependent Claims (57, 58)
-
-
59. A system for secured information transactions, the system comprising:
-
a computer console comprising an interface controller housed in the console, and a LAN communication controller;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console through the interface controller, the attached computer module comprising a graphics subsystem, a CPU module and a mass storage unit, wherein all network data transaction of the computer module passes through the console, and wherein the mass storage unit comprises a hard disk drive containing a security program to provide password protection of said computer module.
-
-
60. A method for operating an attached computer module, the method comprising:
-
providing an attached computer module, the module comprising a security program, a user password, a first interface controller coupled to an interface connector;
coupling the computer module to a computer console, the computer console comprising a second interface controller compatible to the first interface controller, and a LAN communication controller coupled to an external network;
establishing communication between the two interface controllers;
receiving the user password from the console;
activating the security program to match the user password; and
establishing the console access to the computer module, the method further comprising providing password protection for said computer module from codes contained in a flash memory device of the computer module. - View Dependent Claims (61, 62)
-
Specification