Security arrangement for and method of rendering microprocessor-controlled electronic equipment inoperative after occurrence of disabling event
First Claim
1. A lock-out security arrangment for rendering electronic equipment having a normal operation inoperative after a disabling event has occurred, and for maintaining the equipment inoperative after the disabling event has terminated, comprising:
- (a) a microprocessor having an internal, non-volatile, protected memory accessed solely by the microprocessor and protected from interrogation external to the microprocessor, said microprocessor being operative for executing a program stored in the internal memory, said program having an operational routine for controlling the normal operation of the equipment, and a security routine for controlling the security of the equipment;
(b) said security routine having means for distinguishing between an initial execution of the security routine and a subsequent execution of the security routine;
(c) means responsive to the initial execution of the security routine, for storing a first code in a secured manner in the internal memory of the microprocessor such that the stored first code is protected from interrogation external to the microprocessor;
(d) code entry means operatively connected to the microprocessor, for entering a second code to the microprocessor;
(e) said security routine having code validity means for comparing the second code entered using the code entry means to the stored first code whose identity is protected from external interrogation;
(f) enabling means responsive to a completed initial execution, or to the subsequent execution, of the security routine, for enabling the microprocessor to execute the operational routine after the first code has been stored in the internal memory of the microprocessor, and for maintaining the equipment normally operational until the disabling event has occurred;
(g) detector means operatively connected to the microprocessor, for detecting when the disabling event has occurred; and
(h) disabling means responsive to the detector means and operatively connected to the microprocessor, for disabling the equipment from normal operation after the disabling event has occurred, said disabling means being further operative for maintaining the equipment disabled, even after the disabling even has terminated, until the second code matches the stored first code.
7 Assignments
0 Petitions
Reexamination
Accused Products
Abstract
A lock-out security arrangement for and method of maintaining microprocessor-controlled electronic equipment normally operational until the occurrence of a disabling event, such as physical removal of the equipment from its normal installation, and/or electrical removal of the equipment from a source of electrical power, and thereupon for disabling the equipment after detecting the disabling event and for maintaining the equipment disabled, even after the disabling event has been discontinued, until a code manually entered via a keyboard associated with a microprocessor for controlling the normal operation of the equipment matches a private access code whose identity is protected from external interrogation by reason of being stored in an internal non-volatile memory of the microprocessor. The private access code is preferably selected by and known only to the user, and may be changed to a different private access code at the user'"'"'s option.
198 Citations
31 Claims
-
1. A lock-out security arrangment for rendering electronic equipment having a normal operation inoperative after a disabling event has occurred, and for maintaining the equipment inoperative after the disabling event has terminated, comprising:
-
(a) a microprocessor having an internal, non-volatile, protected memory accessed solely by the microprocessor and protected from interrogation external to the microprocessor, said microprocessor being operative for executing a program stored in the internal memory, said program having an operational routine for controlling the normal operation of the equipment, and a security routine for controlling the security of the equipment; (b) said security routine having means for distinguishing between an initial execution of the security routine and a subsequent execution of the security routine; (c) means responsive to the initial execution of the security routine, for storing a first code in a secured manner in the internal memory of the microprocessor such that the stored first code is protected from interrogation external to the microprocessor; (d) code entry means operatively connected to the microprocessor, for entering a second code to the microprocessor; (e) said security routine having code validity means for comparing the second code entered using the code entry means to the stored first code whose identity is protected from external interrogation; (f) enabling means responsive to a completed initial execution, or to the subsequent execution, of the security routine, for enabling the microprocessor to execute the operational routine after the first code has been stored in the internal memory of the microprocessor, and for maintaining the equipment normally operational until the disabling event has occurred; (g) detector means operatively connected to the microprocessor, for detecting when the disabling event has occurred; and (h) disabling means responsive to the detector means and operatively connected to the microprocessor, for disabling the equipment from normal operation after the disabling event has occurred, said disabling means being further operative for maintaining the equipment disabled, even after the disabling even has terminated, until the second code matches the stored first code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A lock-out security arrangement for rendering electronic equipment having a normal operation inoperative after a disabling event has occurred, and for maintaining the equipment inoperative after the disabling event has terminated, comprising:
-
(a) a microprocessor having an internal, non-volatile, protected memory accessed solely by the microprocessor and protected from interrogation external to the microprocessor, said microprocessor being operative for executing a program stored in the internal memory, said program having an operational routine for controlling the normal operation of the equipment, and a security routine for controlling the security of the equipment; (b) said security routine having means for distinguishing between an initial execution of the security routine and a subsequent execution of the security routine; (c) means responsive to the initial execution of the security routine, for storing a public code in the internal memory of the microprocessor; (d) means for substituting a private code for the public code in a secured manner in the internal memory of the microprocessor such that the stored private code is protected from interrogation external to the microprocessor; (e) code entry means operatively connected to the microprocessor, for entering a trial code to the microprocessor; (f) said security routine having code validity means for comparing the trial code entered using the code entry means to the stored private code whose identity is protected from external interrogation; (g) enabling means responsive to a completed initial execution, or to the subsequent execution, of the security routine, for enabling the microprocessor to execute the operational routine after the private code has been stored in the internal memory of the microprocessor, and for maintaining the equipment normally operational until the disabling event has occurred; (h) detector means operatively connected to the microprocessor, for detecting when the disabling event has occurred; and (i) disabling means responsive to the detector means and operatively connected to the microprocessor, for disabling the equipment from normal operation after the disabling event has occurred, said disabling means being further operative for maintaining the equipment disabled, even after the disabling event has terminated, until the trial code matches the stored private code. - View Dependent Claims (24)
-
-
18. A lock-out security arrangement for rendering electronic equipment having a normal operation inoperative after a disabling event has occurred, and for maintaining the equipment inoperative after the disabling event has terminated, comprising:
-
(a) a microprocessor having an internal, non-volatile, protected memory accessed solely by the microprocessor and protected from interrogation external to the microprocessor, said microprocessor being operative for executing a program stored in the internal memory, said program having an operational routine for controlling the normal operation of the equipment, and a security routine for controlling the security of the equipment; (b) said security routine having means for distinguishing between an initial execution of the security routine and a subsequent execution of the security routine; (c) means responsive to the initial execution of the security routine, for storing a public code in the internal memory of the microprocessor; (d) means for substituting a first private code for the public code in a secured manner in the internal memory of the microprocessor such that the stored first private code is protected from interrogation external to the microprocessor; (e) code entry means operatively connected to the microprocessor, for entering a trial code to the microprocessor; (f) said security routine having code validity means for comparing the trial code entered using the code entry means to the stored first private code whose identity is protected from external interrogation; (g) enabling means responsive to a completed initial execution, or to the subsequent execution, of the security routine, for enabling the microprocessor to execute the operational routine after the first private code has been stored in the internal memory of the microprocessor, and for maintaining the equipment normally operational until the disabling event has occurred; (h) detector means operatively connected to the microprocessor, for detecting when the disabling event has occurred; (i) disabling means responsive to the detector means and operatively connected to the microprocessor, for disabling the equipment from normal operation after the disabling event has occurred, said disabling means being further operative for maintaining the equipment disabled, even after the disabling event has terminated, until the trial code matches the stored first private code; (j) means for changing the first private code to a second private code known only to an authorized user having knowledge of the first private code, and for storing the second private code in a secured manner in the internal memory of the microprocessor such that the stored second private code is protected from interrogation external to the microprocessor; (k) said code validity means being further operative, after the second private code has been stored, for comparing the trial code entered using the code entry means to the stored second private code whose identity is protected from external interrogation; and (l) said disabling means being still further operative for maintaining the equipment disabled, even after the disabling event has terminated, until the trial code matches the stored second private code.
-
-
19. A method of rendering electronic equipment having a normal operation inoperative after a disabling event has occurred, and for maintaining the equipment inoperative after the disabling event has occurred, comprising the steps of:
-
(a) programming a microprocessor having an internal, non-volatile, protected memory for executing a program stored in the internal memory, said program having an operational routine for controlling the normal operation of the equipment, and a security routine for controlling the security of the equipment; (b) accessing the internal memory of the microprocessor solely by the microprocessor, and protecting the internal memory from interrogation external to the microprocessor; (c) distinguishing between an initial execution of the security routine and a subsequent execution of the security routine; (d) storing in response to the initial execution of the security routine a first code in a secured manner in the internal memory of the microprocessor such that the stored first code is protected from interrogation external to the microprocessor; (e) entering a second code to the microprocessor; (f) comparing the entered second code to the stored first code whose identity is protected from external interrogation; (g) enabling the microprocessor in response to a completed initial execution, or to the subsequent execution, of the security routine, to execute the operational routine after the first code has been stored in the internal memory of the microprocessor, and maintaining the equipment normally operational until the disabling event has occurred; (h) detecting when the disabling event has occurred; (i) disabling the equipment from normal operation after the disabling event has occurred; and (j) maintaining the equipment disabled, even after the disabling event has terminated, until the entered second code matches the stored first code. - View Dependent Claims (20, 21, 22, 23, 25, 26, 27, 28, 29, 30, 31)
-
Specification