Methods and arrangements for limiting access to computer controlled functions and devices
First Claim
1. A method comprising:
- verifying that a first application is authorized to set an initial range for a controlled parameter setting;
if authorized, allowing the first application to set an initial range for the controlled parameter setting;
subsequently, allowing at least a second application to modify the controlled parameter setting within the initial range set by the first application;
verifying that the second application is authorized to modify a current range for the controlled parameter setting;
if authorized allowing the second application to modify the current range for the controlled parameter setting; and
subsequently, allowing at least a third application to modify the controlled parameter setting within the current range as modified by the second application,whereinverifying that the first application is authorized to set the initial range for the controlled parameter setting further includes using a first verifier; and
verifying that the second application is authorized to modify the current range for the controlled parameter setting further includes using a second verifier,wherein the first verifier and the second verifier are operatively configured in a serial arrangement, and the first verifier is independently responsive to a first security code and the second verifier is independently responsive to a second security code.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and arrangements are provided verify if a requesting computer application is authorized to change a controlled parameter associated with a computer controlled device and/or function. To accomplish this, one or verification functions are employed to analyze a security code or absence thereof, as identified by a requesting application. If the security code, which may be encrypted, matches a known or calculated valid security code, then the requesting application is deemed to be authorized to change the controlled parameter and/or modify certain limitations associated with an acceptable range for the controlled parameter. If the security code does not match a known or calculated valid security code, then the requesting application is deemed to be unauthorized to change the controlled parameter outside of a previously established acceptable range for the controlled parameter. The verification function can be implemented in a ROM to increase the security and to thwart attempts to circumvent the authorization scheme. Several independent verification functions can be arranged to support the verification of a plurality of authorized applications.
28 Citations
20 Claims
-
1. A method comprising:
-
verifying that a first application is authorized to set an initial range for a controlled parameter setting; if authorized, allowing the first application to set an initial range for the controlled parameter setting; subsequently, allowing at least a second application to modify the controlled parameter setting within the initial range set by the first application; verifying that the second application is authorized to modify a current range for the controlled parameter setting; if authorized allowing the second application to modify the current range for the controlled parameter setting; and subsequently, allowing at least a third application to modify the controlled parameter setting within the current range as modified by the second application, wherein verifying that the first application is authorized to set the initial range for the controlled parameter setting further includes using a first verifier; and verifying that the second application is authorized to modify the current range for the controlled parameter setting further includes using a second verifier, wherein the first verifier and the second verifier are operatively configured in a serial arrangement, and the first verifier is independently responsive to a first security code and the second verifier is independently responsive to a second security code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable medium having computer-executable instructions for performing steps comprising:
-
verifying that a first application is authorized to set an initial range for a controlled parameter setting; if authorized, allowing the first application to set an initial range for the controlled parameter setting; subsequently, allowing at least a second application to modify the controlled parameter setting within the initial range set by the first application; verifying that the second application is authorized to modify a current range for the con trolled parameter setting; if authorized, allowing the second application to modify the current range for the controlled parameter setting; and subsequently, allowing at least a third application to modify the controlled parameter setting within the current range as modified by the second application; wherein verifying that the first application is authorized to set the initial range for the controlled parameter setting further includes using a first verifier; and verifying that the second application is authorized to modify the current range for the controlled parameter setting further includes using a second verifier, wherein the first verifier and the second verifier are operatively configured in a serial arrangement, and the first verifier is independently responsive to a first security code and the second verifier is independently responsive to a second security code. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification