throbber

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Intel Corporation v. ACQIS LLC
`Intel Corp.'s Exhibit 1025
`Ex. 1025, Page 1
`
`

`

`
`US. Patent
`
`
`
`
`
`NOV. 20, 2001
`
`
`
`
`
`Sheet 1 Of 7
`
`
`
`US 6,321,335 B1
`
`
`
`
`
`COMPUTER
`
`
`MODULEBAY
`MONWOR
`
`
`
`
`
`
`
`
`
`
`
`
`13
`
`15
`
`11
`
`
`49]
`
`1o
`
`
`ATTACHED
`
`COMPUTER
`
`MODULE
`
`20
`
`DESKTOP
`
`
`
`
`
`
`PERPHERAL
`CONSOLE
`20
`
`F:|C3.1
`
`
`
`Ex. 1025, Page 2
`
`Ex. 1025, Page 2
`
`

`

`
`US. Patent
`
`
`
`
`
`Nov. 20, 2001
`
`
`
`
`Sheet 2 0f 7
`
`
`
`US 6,321,335 B1
`
`
`
` OPENING FOR
`
`
`
`ENGAGING LOCK
`
`
`
`Ex. 1025, Page 3
`
`Ex. 1025, Page 3
`
`

`

`
`US. Patent
`
`
`
`
`
`NOV. 20, 2001
`
`
`
`
`Sheet 3 0f 7
`
`
`
`US 6,321,335 B1
`
`10
`
`
`
`FRONT
`
`
`
`W
`
`26
`
`17
`
`
`
`CONNECTOR
`
`
`
`28
`
`
`
`21
`
`
`
`
`
`23
`
`
`
`
`
`
`
`
`MANUAL KEY
`
`RELEASE
`
`P
`
`,
`11 :>
`
`
`
`
`ACM ’
`COMPUTER
`x
`19
`
`
`
`
`INSERTION
`MODULE BAY
`PERIPHERAL
`
`
`
`BLOCKED
`FRAME
`CONSOLE
`
`ENCLOSURE
`
`FIG .3
`
`
`
`Ex. 1025, Page 4
`
`Ex. 1025, Page 4
`
`

`

`
`US. Patent
`
`
`
`
`
`NOV. 20, 2001
`
`
`
`
`Sheet 4 0f 7
`
`
`
`US 6,321,335 B1
`
`400
`
`17
`
`17
`
`10
`
`_ CMI CONNECTOR
`
`
`'- _ fio‘sf _ _ 1 l—FL—A§H_MTENT :
`
`
`INCL. SYS
`'
`INTERFACE
`,
`I
`
`
`
`I BIOS AND '
`‘ CONTROLLER
`'LPAESLVQRPL
`'
`“““““
`t‘
`
`
`LOCK
`CONTROL
`
`403
`
`
`
`(5.748”)
`
`_
`
`_
`
`
`
`-
`.
`
`'
`
`f/
`
`
`“Em“
`
`
`(1.723”)
`
`
`“'6qu
`
`
`
`435
`
`
`DEPTH-
`
`234mm
`
`(9.213”)
`
`CPU MODULE
`
`(16.4mm)
`
`
`
`3 1/2" HARD
`
`
`
`
`DRIVE (25.4mm)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`POWER
`
`
`QINEEE
`' REGULATOR
`
`' MAINCIRCUIT
`L
`
`
`
`BOARD
`L
`
`
`
`. 1” 437
`GRAPHICS
`' L42
`-
`’
`I
`
`
`I“ _____ ‘
`IGRAPHICSMEM:
`
`
`
`L —————— 1
`
`r“‘I
`|—.___l
`
`
`.
`COMPONENT
`. UNDERNEATH
`
`
`
`
`
`
`
`I PWR CON.
`
`
`420
`
`
`
`427
`
`
`
`IDE CON.
`
`
`
`-------
`
`
`CONNECTION TO
`
`
`LOCK CONTROL
`SECURHY
`LOCK
`1
`
`
`
`
`
`5
`
`13
`
`
`
`FIG .4
`
`
`
`Ex. 1025, Page 5
`
`Ex. 1025, Page 5
`
`

`

`
`US. Patent
`
`
`
`
`
`NOV. 20, 2001
`
`
`
`
`Sheet 5 0f 7
`
`
`
`US 6,321,335 B1
`
`
`
`ATTACHED COMPUTER MODULE
`
`
`
`500
`
`
`
`501
`
`
`
`
`MAIN
`
`MEMOR
`
`
`
`PRIMARY HARD DISK
`
`W/ SECURITY
`
`PROGRAM
`
`
`
`
`HDD CONTROLLER
`
`
`
`531
`
`HOST PC'
`
`
`
`FLASH MEM
`
`
`WITH BIOS &
`
`USER
`PASSWORD
`
`
`SUBSYSTEM
`
`
`INTERFACE
`CONTROLLER
`
`
`
`GRAPHICS
`
`
`
`
`
`
`SEEOJCRIITY
`
`
`
`519
`
`
`
`517
`
`
`
`
`INTERFACE
`CONNECTORS
`
`
`
`Ex. 1025, Page 6
`
`Ex. 1025, Page 6
`
`

`

`
`US. Patent
`
`
`
`
`
`Nov. 20, 2001
`
`
`
`
`Sheet 6 0f 7
`
`
`
`US 6,321,335 B1
`
`
`
`ATTACHED COMPUTER MODULE
`
`
`
`
`
`500
`
`
`
`
`
`PRIMARY HARD DISK
`
`W/ SECURITY
`
`PROGRAM
`
`
`
`
`HDD CONTROLLER
`
`
`
`533
`
`
`I
`T
`
`OBSUSPC
`
`H
`
`
`
`FLASH MEM
`WITH BIOS &
`
`
`
`USER
`
`PASSWORD
`
`SOLENOID
`
`DRIVER
`
`
`
`SECURITY
`
`
`
`
`54g
`
`
`
`FIG.5A
`
`
`
`Ex. 1025, Page 7
`
`LOCK
`
`
`
`HOST INTERFACE CONTROLLER
`
`LOCK ON/OFF LOCK STATUS
`
`
`CONTROL BIT
`BIT
`
`
`
`
`Ex. 1025, Page 7
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` 605
`
`607
`
`
`
`703
`
`
`
`705
`
`
`
`707
`
`
`
`
`
`
`
`USE KEY
`
`
`TO TURN
`
`
`
`LOCK OFF
`
`
`
`OS TURNS
`
`
`
`
`POWER
`ACM CAN
`
`POWER
`
`
`
`
`FAILURE
`INSERT
`DOWN
`
`
`CMB
` 709
`
` FIG.7
`
`
`
`USE KEY TO
`
`RELEASE
`
`
`LOCK
`
`
`US. Patent
`
`
`
`
`
`NOV. 20, 2001
`
`
`
`
`Sheet 7 0f 7
`
`
`
`US 6,321,335 B1
`
`
`
`
`ACM INSERTED
`
`
`INTO CMB
`
`POWER UP
`
`601
`
`
`
`
`600x“
`
`
`
`
`
`
`ACM OUTSIDE 0?
`
`CMB
`
`
`TO PREVENT
`ILLEGAL USE
`
`
`
`
`
`700
`
`
`
`
`
`701
`
`
`
`
`
`USE KEY
`
`
`TO TURN
`
`
`
`LOCK ON
`
`
`
`
`
`
`SECURITY
`PROGRAM
`
`
`
`
`603
`
`
`
`
`
`LOCK
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` ACM
`
`
`CANNOT
`
`
`
`INSERT
`STAYS OFF
`
`
`
`
`INTO CMB
`
`
`
`
`
`611
`
`
`
`
`
`
`
`
`
`
`
`615
`
`
`
`
`
`
`
`
`
` SOFTWARE
`
`
`RELEASES
`
`
`LOCK
`
`
`
` ACM CAN
`
`
`
`
`BE
`
`REMOVED
`
`
`
`
`Ex. 1025, Page 8
`
`Ex. 1025, Page 8
`
`

`

`
`
`US 6,321,335 B1
`
`
`1
`PASSWORD PROTECTED MODULAR
`
`
`COMPUTER METHOD AND DEVICE
`
`
`
`CROSS REFERENCE TO RELATED
`
`
`APPLICATIONS
`
`
`
`
`
`
`
`
`
`
`
`
`
`The following two commonly-owned copending
`
`
`
`
`
`
`
`applications, including this one, are being filed concurrently
`
`
`
`
`
`
`and the other one is hereby incorporated by reference in their
`
`
`
`
`entirety for all purposes:
`
`
`
`
`
`
`
`1. US. patent application Ser. No. 09/183,816, William
`
`
`
`
`
`
`W. Y. Chu, entitled, “Modular Computer Security Method
`and Device”. and
`
`
`
`
`
`
`
`
`
`
`2. US. patent application Ser. No. 09/183,493, William
`
`
`
`
`
`
`W. Y. Chu, entitled, “Password Protected Modular Computer
`Method and Device”.
`
`
`
`BACKGROUND OF THE INVENTION
`
`
`
`
`
`
`
`
`
`The present invention relates to computing devices. More
`
`
`
`
`
`
`
`particularly, the present invention provides a method and
`
`
`
`
`
`
`
`
`device for securing a personal computer or set-top box using
`
`
`
`
`
`
`password protection techniques. Merely by way of example,
`
`
`
`
`
`
`the present invention is applied to a modular computing
`
`
`
`
`
`
`
`environment for desk top computers, but it will be recog-
`
`
`
`
`
`
`
`
`
`nized that the invention has a much wider range of appli-
`
`
`
`
`
`
`
`cability. It can be applied to a server as well as other portable
`
`
`
`
`or modular computing applications.
`
`
`
`
`
`
`
`Many desktop or personal computers, which are com-
`30
`
`
`
`
`
`
`
`
`
`
`
`monly termed PCs, have been around and used for over ten
`
`
`
`
`
`
`
`
`years. The PCs often come with state-of-art microprocessors
`
`
`
`
`
`
`
`
`such as the Intel PentiumTM microprocessor chips. They also
`
`
`
`
`
`
`
`
`include a hard or fixed disk drive such as memory in the
`
`
`
`
`
`
`
`
`giga-bit range. Additionally, the PCs often include a random
`
`
`
`
`
`
`
`access memory integrated circuit device such as a dynamic
`
`
`
`
`
`
`
`random access memory device, which is commonly termed
`DRAM. The DRAM devices now provide up to millions of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`memory cells (i.e., mega-bit) on a single slice of silicon. PCs
`
`
`
`
`
`
`
`
`also include a high resolution display such as cathode ray
`tubes or CRTs. In most cases, the CRTs are at least 15 inches
`
`
`
`
`
`
`
`
`or 17 inches or 20 inches in diameter. High resolution flat
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`panel displays are also used with PCs.
`
`
`
`
`
`
`
`
`Many external or peripheral devices can be used with the
`
`
`
`
`
`
`
`
`PCs. Among others, these peripheral devices include mass
`
`
`
`
`
`
`
`
`storage devices such as a ZipTM Drive product sold by
`
`
`
`
`
`
`
`Iomega Corporation of Utah. Other storage devices include
`external hard drives,
`tape drives, and others. Additional
`
`
`
`
`
`
`
`
`devices include communication devices such as a modem,
`
`
`
`
`
`
`which can be used to link the PC to a wide area network of
`
`
`
`
`
`
`
`
`computers such as the Internet. Furthermore, the PC can
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`include output devices such as a printer and other output
`
`
`
`
`
`
`
`
`means. Moreover, the PC can include special audio output
`
`
`
`
`
`devices such as speakers the like.
`
`
`
`
`
`
`
`
`
`PCs also have easy to use keyboards, mouse input
`
`
`
`
`
`
`
`
`devices, and the like. The keyboard is generally configured
`
`
`
`
`
`
`
`
`similar to a typewriter format. The keyboard also has the
`
`
`
`
`
`
`
`
`length and width for easily inputting information by way of
`
`
`
`
`
`
`
`
`
`keys to the computer. The mouse also has a sufficient size
`
`
`
`
`
`
`
`
`
`and shape to easily move a curser on the display from one
`60
`location to another location.
`
`
`
`
`
`
`
`
`
`
`Other types of computing devices include portable com-
`
`
`
`
`
`
`
`
`
`puting devices such as “laptop” computers and the like.
`
`
`
`
`
`
`Although somewhat successful,
`laptop computers have
`
`
`
`
`
`
`
`
`many limitations. These computing devices have poor dis-
`
`
`
`
`
`
`
`
`play technology. In fact, these devices often have a smaller
`
`
`
`
`
`
`
`
`flat panel display that has poor viewing characteristics.
`
`
`
`
`
`
`
`
`Additionally, these devices also have poor input devices
`
`
`
`
`
`
`
`
`
`
`
`10
`
`15
`
`20
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`65
`
`
`2
`
`
`
`
`
`
`
`
`such as smaller keyboards and the like. Furthermore, these
`
`
`
`
`
`
`
`devices have limited common platforms to transfer infor-
`mation to and from these devices and other devices such as
`
`
`
`
`
`
`
`
`
`PCs.
`
`
`
`
`
`
`
`
`
`
`
`Up to now, there has been little common ground between
`
`
`
`
`
`
`
`
`these platforms including the PCs and laptops in terms of
`
`
`
`
`
`
`
`upgrading, ease-of-use, cost, performance, and the like.
`
`
`
`
`
`
`
`Many differences between these platforms, probably some-
`
`
`
`
`
`
`what intentional, has benefited computer manufacturers at
`
`
`
`
`
`
`
`the cost of consumers. A drawback to having two separate
`
`
`
`
`
`
`
`
`
`computers is that the user must often purchase both the
`
`
`
`
`
`
`
`
`desktop and laptop to have “total” computing power, where
`
`
`
`
`
`
`
`
`the desktop serves as a “regular” computer and the laptop
`
`
`
`
`
`
`serves as a “portable” computer. Purchasing both computers
`is often costly and runs “thousands” of dollars. The user also
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`wastes a significant amount of time transferring software
`
`
`
`
`
`
`
`
`
`and data between the two types of computers. For example,
`
`
`
`
`
`
`
`
`
`the user must often couple the portable computer to a local
`
`
`
`
`
`
`
`
`
`area network (i.e., LAN), to a serial port with a modem and
`
`
`
`
`
`
`
`
`
`then manually transfer over files and data between the
`
`
`
`
`
`
`
`
`desktop and the portable computer. Alternatively, the user
`
`
`
`
`
`
`
`
`
`
`often must use floppy disks to “zip” up files and programs
`
`
`
`
`
`
`
`
`that exceed the storage capacity of conventional floppy
`
`
`
`
`
`
`
`
`disks, and transfer the floppy disk data manually.
`
`
`
`
`
`
`
`Another drawback with the current model of separate
`
`
`
`
`
`
`
`
`
`portable and desktop computer is that the user has to spend
`
`
`
`
`
`
`
`
`money to buy components and peripherals the are duplicated
`
`
`
`
`
`
`
`
`
`
`in at least one of these computers. For example, both the
`
`
`
`
`
`
`
`
`desktop and portable computers typically include hard disk
`
`
`
`
`
`
`
`drives, floppy drives, CD-ROMs, computer memory, host
`
`
`
`
`
`
`
`processors, graphics accelerators, and the like. Because
`
`
`
`
`
`
`
`program software and supporting programs generally must
`be installed upon both hard drives in order for the user to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`operate programs on the road and in the office, hard disk
`
`
`
`space is often wasted.
`One approach to reduce some of these drawbacks has
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`been the use of a docking station with a portable computer.
`
`
`
`
`
`
`
`
`
`
`
`Here, the user has the portable computer for “on the road”
`
`
`
`
`
`
`
`
`
`use and a docking station that houses the portable computer
`
`
`
`
`
`
`
`
`for office use. The docking station typically includes a
`
`
`
`
`
`
`
`
`separate monitor, keyboard, mouse, and the like and is
`
`
`
`
`
`
`
`
`generally incompatible with other desktop PCs. The docking
`
`
`
`
`
`
`
`
`station is also generally not compatible with portable com-
`
`
`
`
`
`
`
`puters of other vendors. Another drawback to this approach
`
`
`
`
`
`
`
`
`
`is that the portable computer typically has lower perfor-
`
`
`
`
`
`
`
`mance and functionality than a conventional desktop PC.
`
`
`
`
`
`
`
`For example, the processor of the portable is typically much
`
`
`
`
`
`
`
`slower than processors in dedicated desktop computers,
`
`
`
`
`
`
`
`
`because of power consumption and heat dissipation con-
`
`
`
`
`
`
`
`
`cerns. As an example, it is noted that at the time of drafting
`
`
`
`
`
`
`
`of the present application, some top-of-the-line desktops
`
`
`
`
`
`
`
`include 400 MHZ processors, whereas top-of-the-line note-
`
`
`
`
`
`
`book computers include 266 MHZ processors.
`
`
`
`
`
`
`Another drawback to the docking station approach is that
`
`
`
`
`
`
`
`the typical cost of portable computers with docking stations
`
`
`
`
`
`
`
`can approach the cost of having a separate portable com-
`
`
`
`
`
`
`
`puter and a separate desktop computer. Further, as noted
`
`
`
`
`
`
`above, because different vendors of portable computers have
`
`
`
`
`
`
`
`proprietary docking stations, computer users are held cap-
`
`
`
`
`
`
`
`
`tive by their investments and must rely upon the particular
`
`
`
`
`
`
`
`
`computer vendor for future upgrades, support, and the like.
`
`
`
`
`
`
`
`Thus what is needed are computer systems that provide
`
`
`
`
`
`reduced user investment in redundant computer components
`
`
`
`
`
`
`
`and provide a variable level of performance based upon
`
`
`computer configuration.
`SUMMARY OF THE INVENTION
`
`
`
`
`
`
`
`
`According to the present invention, a technique including
`
`
`
`
`
`
`
`
`a method and device for securing a computer module using
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Ex. 1025, Page 9
`
`Ex. 1025, Page 9
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`US 6,321,335 B1
`
`
`3
`
`
`
`
`
`
`a password in a computer system is provided. In an exem-
`
`
`
`
`
`
`
`plary embodiment, the present invention provides a security
`
`
`
`
`
`
`system for an attached computer module (“ACM”). In an
`
`
`
`
`
`
`
`embodiment, the ACM inserts into a Computer Module Bay
`
`
`
`
`
`
`(CMB) within a peripheral console to form a functional
`computer.
`
`
`
`
`
`
`
`
`In a specific embodiment, the present invention provides
`
`
`
`
`
`
`
`
`a computer module. The computer module has an enclosure
`that is insertable into a console. The module also has a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`central processing unit (i.e., integrated circuit chip) in the
`enclosure. The module has a hard disk drive in the enclosure,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`where the hard disk drive is coupled to the central processing
`
`
`
`
`
`
`
`unit. The module further has a programmable memory
`
`
`
`
`
`
`
`device in the enclosure, where the programmable memory
`
`
`
`
`
`
`
`device can be configurable to store a password for prevent-
`
`
`
`
`
`
`
`
`ing a possibility of unauthorized use of the hard disk drive
`
`
`
`
`
`
`
`
`and/or other module elements. The stored password can be
`
`
`
`
`
`
`
`
`
`
`any suitable key strokes that a user can change from time to
`
`
`
`
`
`
`
`
`time. In a further embodiment, the present invention pro-
`
`
`
`
`
`
`vides a permanent password or user identification code
`
`
`
`
`
`
`
`
`stored in flash memory, which also can be in the processing
`
`
`
`
`
`
`
`
`unit, or other integrated circuit element. The permanent
`
`
`
`
`
`
`password or user identification code is designed to provide
`
`
`
`
`
`
`
`
`
`a permanent “finger print” on the attached computer module.
`
`
`
`
`
`
`
`In a specific embodiment, the present invention provides
`
`
`
`
`
`
`
`
`
`a variety of methods.
`In one embodiment,
`the present
`
`
`
`
`
`
`invention provides a method for operating a computer
`
`
`
`
`
`
`
`
`system such as a modular computer system and others. The
`
`
`
`
`
`
`
`method includes inserting an attached computer module
`
`
`
`
`
`
`
`(“ACM”) into a bay of a modular computer system. The
`
`
`
`
`
`ACM has a microprocessor unit (e.g., microcontroller,
`
`
`
`
`
`
`microprocessor) coupled to a mass memory storage device
`
`
`
`
`
`
`
`
`
`(e.g., hard disk). The method also includes applying power
`
`
`
`
`
`
`
`
`
`to the computer system and the ACM to execute a security
`
`
`
`
`
`
`
`
`program, which is stored in the mass memory storage
`device. The method also includes prompting for a user
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`password from a user on a display (e.g., flat panel, CRT). In
`a further embodiment, the present method includes a step of
`
`
`
`
`
`
`
`
`
`
`
`
`
`reading a permanent password or user identification code
`
`
`
`
`
`
`
`stored in flash memory, or other integrated circuit element.
`
`
`
`
`
`
`
`The permanent password or user identification code pro-
`
`
`
`
`
`
`
`
`vides a permanent finger print on the attached computer
`
`
`
`
`
`
`
`
`module. The present invention includes a variety of these
`
`
`
`
`
`
`
`methods that can be implemented in computer codes, for
`
`
`
`example, as well as hardware.
`Numerous benefits are achieved using the present inven-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tion over previously existing techniques. The present inven-
`
`
`
`
`
`
`
`tion provides mechanical and electrical security systems to
`
`
`
`
`
`
`prevent theft or unauthorized use of the computer system in
`
`
`
`
`
`
`
`a specific embodiment. Additionally, the present invention
`
`
`
`
`
`
`
`substantially prevents accidental removal of the ACM from
`the console. In some embodiments, the present invention
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`prevents illegal or unauthorized use during transit. The
`
`
`
`
`
`
`present invention is also implemented using conventional
`
`
`
`
`
`
`
`technologies that can be provided in the present computer
`
`
`
`
`
`
`
`
`system in an easy and efficient manner. Depending upon the
`embodiment, one or more of these benefits can be available.
`
`
`
`
`
`
`
`These and other advantages or benefits are described
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`throughout the present specification and are described more
`
`
`particularly below.
`These and other embodiments of the present invention, as
`
`
`
`
`
`
`well as its advantages and features, are described in more
`
`
`
`
`
`
`
`
`detail in conjunction with the text below and attached FIGS.
`
`
`
`
`
`
`
`
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`
`
`
`
`
`
`
`
`FIG. 1 is a simplified diagram of a computer system
`
`
`
`
`
`according to an embodiment of the present invention;
`
`
`
`10
`
`
`
`15
`
`
`
`20
`
`25
`
`
`
`30
`
`35
`
`
`
`40
`
`
`
`45
`
`
`
`50
`
`
`
`55
`
`
`
`60
`
`
`
`65
`
`
`
`
`4
`
`
`
`
`
`FIG. 2 is a simplified diagram of a computer module
`
`
`
`
`
`according to an embodiment of the present invention;
`
`
`
`
`FIG. 3 is a simplified side-view diagram of a computer
`
`
`
`
`
`
`module according to an embodiment of the present inven-
`tion;
`
`
`
`
`
`
`FIG. 4 is a simplified layout diagram of a security system
`
`
`
`
`
`
`for a computer system according to an embodiment of the
`
`
`present invention;
`
`
`
`
`
`FIG. 5 is a simplified block diagram of a security system
`
`
`
`
`
`for a computer module according to an embodiment of the
`
`
`
`present invention; and
`
`
`
`
`
`
`FIGS. 6 and 7 show simplified flow diagrams of security
`
`
`
`
`methods according to embodiments of the present invention.
`DESCRIPTION OF SPECIFIC EMBODIMENTS
`
`
`
`
`
`I. System Hardware
`
`
`
`
`
`
`FIG. 1 is a simplified diagram of a computer system 1
`
`
`
`
`
`
`according to an embodiment of the present invention. This
`
`
`
`
`
`
`
`
`diagram is merely an illustration and should not limit the
`
`
`
`
`
`
`
`
`
`
`scope of the claims herein. One of ordinary skill in the art
`
`
`
`
`
`
`
`would recognize other variations, modifications, and alter-
`
`
`
`
`
`
`
`natives. The computer system 1 includes an attached com-
`
`
`
`
`
`
`
`
`puter module (i.e., ACM) 10, a desktop console 20, among
`
`
`
`
`
`
`
`
`other elements. The computer system is modular and has a
`
`
`
`
`
`
`
`
`variety of components that are removable. Some of these
`
`
`
`
`
`
`
`
`components (or modules) can be used in different
`
`
`
`
`
`
`computers, workstations, computerized television sets, and
`
`
`
`portable or laptop units.
`
`
`
`
`
`
`
`In the present embodiment, ACM 10 includes computer
`
`
`
`
`
`
`components, as will be described below, including a central
`
`
`
`
`
`
`
`
`processing unit (“CPU”), IDE controller, hard disk drive,
`
`
`
`
`
`
`
`
`
`computer memory, and the like. The computer module bay
`
`
`
`
`
`
`
`(i.e., CMB) 40 is an opening or slot in the desktop console.
`The CMB houses the ACM and provides communication to
`
`
`
`
`
`
`
`and from the ACM. The CMB also provides mechanical
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`protection and support to ACM 10. The CMB has a mechani-
`
`
`
`
`
`
`
`
`cal alignment mechanism for mating a portion of the ACM
`to the console. The CMB further has thermal heat dissipation
`
`
`
`
`
`
`
`
`
`
`sinks, electrical connection mechanisms, and the like. Some
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`details of the ACM can be found in co-pending patent
`
`
`
`
`
`
`
`application Nos. 09/149,882 and 09/149,548 filed Sep. 8,
`
`
`
`
`
`
`
`1998, commonly assigned, and hereby incorporated by
`
`
`
`
`reference for all purposes.
`
`
`
`
`
`
`
`the present system has a
`In a preferred embodiment,
`
`
`
`
`
`
`security system, which includes a mechanical
`locking
`
`
`
`
`
`
`
`
`system, an electrical
`locking system, and others. The
`
`
`
`
`
`
`
`
`mechanical locking system includes at least a key 11. The
`
`
`
`
`
`
`
`
`
`key 11 mates with key hole 13 in a lock, which provides a
`mechanical latch 15 in a closed position. The mechanical
`
`
`
`
`
`
`
`latch, in the closed position, mates and interlocks the ACM
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to the computer module bay. The mechanical latch, which
`
`
`
`
`
`
`
`
`also has an open position, allows the ACM to be removed
`
`
`
`
`
`
`
`
`
`from the computer module bay. Further details of the
`
`
`
`
`
`
`
`
`mechanical locking system are shown in the Fig. below.
`
`
`
`
`
`FIG. 2 is a simplified diagram of a computer module 10
`
`
`
`
`
`
`according to an embodiment of the present invention. This
`
`
`
`
`
`
`
`
`diagram is merely an illustration and should not limit the
`
`
`
`
`
`
`
`
`
`
`scope of the claims herein. One of ordinary skill in the art
`would recognize other variations, modifications, and alter-
`
`
`
`
`
`
`
`natives. Some of the reference numerals are similar to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`previous Fig. for easy reading. The computer module 10
`includes key 11, which is insertable into keyhole 13 of the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`lock. The lock has at least two position, including a latched
`
`
`
`
`
`
`
`
`or closed position and an unlatched or open position. The
`
`
`
`
`
`
`
`
`latched position secures the ACM to the computer module
`
`
`
`
`
`
`
`
`bay. The unlatched or open position allows the ACM to be
`inserted into or removed from the computer bay module. As
`
`
`
`
`
`
`
`
`
`Ex. 1025, Page 10
`
`Ex. 1025, Page 10
`
`

`

`5
`
`
`
`
`
`
`
`
`
`shown, the ACM also has a slot or opening 14, which allows
`the latch to move into and out of the ACM. The ACM also
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`has openings 17 in the backside for an electrical and/or
`
`
`
`
`
`
`
`mechanical connection to the computer module bay, which
`is connected to the console.
`
`
`
`
`
`
`
`
`
`FIG. 3 is a simplified side-view diagram of a computer
`
`
`
`
`
`
`
`module according to an embodiment of the present inven-
`
`
`
`
`
`
`
`
`tion. This diagram is merely an illustration and should not
`
`
`
`
`
`
`
`
`
`limit the scope of the claims herein. One of ordinary skill in
`
`
`
`
`
`
`
`
`the art would recognize other variations, modifications, and
`alternatives. Some of the reference numerals are similar to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the previous FIG. for easy reading. As shown, the ACM
`
`
`
`
`
`
`
`
`
`module inserts into the computer module bay frame 19,
`which is in the console. A side 27 and a bottom 19 of ACM
`
`
`
`
`
`
`15
`
`
`
`
`
`
`
`
`
`slide and fit firmly into the computer module bay frame,
`
`
`
`
`
`
`
`
`
`which has at least a bottom portion 19 and back portion 26.
`A backside 23 of the ACM faces backside 26 of the frame.
`
`
`
`
`
`
`
`
`ACM also has a front-side or face 25 that houses the lock
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`and exposes the keyhole 13 to a user. The key 11 is insertable
`
`
`
`
`
`
`from the face into the keyhole.
`
`
`
`
`
`
`
`
`As the ACM inserts into the frame, connector 17 couples
`
`
`
`
`
`
`
`
`and inserts into connector 21. Connector 17 electrically and
`
`
`
`
`
`
`
`mechanically interface elements of the ACM to the console
`
`
`
`
`
`
`
`
`through connector 21. Latch 14 should be moved away from
`
`
`
`
`
`
`
`
`
`the bottom side 19 of the module bay frame before inserting
`the ACM into the frame. Once the ACM is inserted fully into
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the frame, latch 15 is placed in a closed or lock position,
`
`
`
`
`
`
`
`
`
`where it keeps the ACM firmly in place. That is, latch 15
`
`
`
`
`
`
`
`biases against a backside portion 29 of the ACM enclosure
`
`
`
`
`
`
`
`
`
`to hold the ACM in place, where the connector 17 firmly
`
`
`
`
`
`
`
`engages, electrically and mechanically, with connector 21.
`
`
`
`
`
`
`
`
`
`To remove the ACM, latch 15 is moved away or opened
`
`
`
`
`
`
`
`
`
`from the back side portion of the ACM enclosure. ACM is
`
`
`
`
`
`
`
`
`
`manually pulled out of the computer module bay frame,
`where connector 17 disengages with connector 21. As
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`shown, the key 11 is used to selectively move the latch in the
`
`
`
`
`
`
`
`
`open or locked position to secure the ACM into the frame
`module.
`
`In most embodiments, the ACM includes an enclosure
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such as the one described with the following components,
`
`
`
`
`which should not be limiting:
`
`
`
`1) A CPU with cache memory;
`
`
`
`
`2) Core logic device or means;
`
`
`
`3) Main memory;
`
`
`
`
`
`
`
`
`
`4) A single primary Hard Disk Drive (“HDD”) that has a
`
`
`security program;
`
`
`
`
`
`
`
`
`5) Flash memory with system BIOS and programmable
`
`
`user password;
`
`
`
`
`
`
`
`6) Operating System, application software, data files on
`
`
`primary HDD;
`
`
`
`
`
`
`7) An interface device and connectors to peripheral con-
`sole;
`
`
`
`
`
`
`
`
`8) A software controllable mechanical lock, lock control
`means, and other accessories.
`
`
`
`
`
`
`
`
`
`
`
`The ACM connects to a peripheral console with power
`
`
`
`
`
`
`
`
`supply, a display device, an input device, and other elements.
`
`
`
`
`
`
`
`
`
`Some details of these elements with the present security
`system are described in more detail below.
`
`
`
`
`
`
`
`
`
`
`
`
`FIG. 4 is a simplified layout diagram of a security system
`
`
`
`
`
`
`
`for a computer system according to an embodiment of the
`
`
`
`
`
`
`
`present invention. This diagram is merely an illustration and
`should not limit the scope of the claims herein. One of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ordinary skill in the art would recognize other variations,
`
`
`
`
`
`
`
`modifications, and alternatives. The layout diagram illus-
`trates the top-view of the module 10, where the backside
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`components (e.g., Host Interface Controller) are depicted in
`
`10
`
`20
`
`25
`
`30
`
`35
`
`40
`
`
`
`
`45
`
`50
`
`
`
`
`
`55
`
`60
`
`65
`
`
`
`
`
`
`US 6,321,335 B1
`
`
`6
`
`
`
`
`
`
`
`
`
`dashed lines. The layout diagram has a first portion, which
`
`
`
`
`
`
`
`
`includes a central processing unit (“CPU”) module 400, and
`
`
`
`
`
`
`
`
`
`a second portion, which includes a hard drive module 420.
`
`
`
`
`
`
`
`
`
`A common printed circuit board 437 houses these modules
`
`
`
`
`
`
`
`
`
`
`and the like. Among other features, the ACM includes the
`
`
`
`
`
`
`
`
`central processing unit module 400 with a cache memory
`
`
`
`
`
`
`
`
`
`405, which is coupled to a north bridge unit 421, and a host
`interface controller 401. The host
`interface controller
`
`
`
`
`
`
`
`includes a lock control 403. As shown, the CPU module is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`disposed on a first portion of the attached computer module,
`
`
`
`
`
`
`
`
`and couples to connectors 17. Here, the CPU module is
`
`
`
`
`
`spatially located near connector 17.
`
`
`
`
`
`
`
`
`The CPU module can use a suitable microprocessing unit,
`
`
`
`
`
`
`
`
`microcontroller, digital signal processor, and the like. In a
`
`
`
`
`
`
`
`
`specific embodiment, the CPU module uses, for example, a
`
`
`
`
`
`
`
`400 MHZ Pentium II microprocessor module from Intel
`
`
`
`
`
`
`Corporation and like microprocessors from AMD
`
`
`
`
`
`
`Corporation, Cyrix Corporation (now National Semiconduc-
`
`
`
`
`
`
`
`
`tor Corporation), and others. In other aspects, the micropro-
`
`
`
`
`
`
`
`
`cessor can be one such as the Compaq Computer Corpora-
`
`
`
`
`
`
`
`tion Alpha Chip, Apple Computer Corporation PowerPC G3
`
`
`
`
`
`
`
`
`
`processor, and the like. Further, higher speed processors are
`
`
`
`
`
`contemplated in other embodiments as technology increases
`in the future.
`
`
`
`interface controller 401 is
`In the CPU module, host
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`coupled to BIOS/flash memory 405. Additionally, the host
`
`
`
`
`
`
`interface controller is coupled to a clock control logic, a
`
`
`
`
`
`
`
`configuration signal, and a peripheral bus. The present
`invention has a host interface controller that has lock control
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`403 to provide security features to the present ACM.
`
`
`
`
`
`
`
`
`Furthermore, the present invention uses a flash memory that
`
`
`
`
`
`
`
`includes codes to provide password protection or other
`
`
`
`electronic security methods.
`
`
`
`
`
`
`
`
`The second portion of the attached computer module has
`the hard drive module 420. Among other elements, the hard
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`drive module includes north bridge 421, graphics accelerator
`
`
`
`
`
`
`
`
`423, graphics memory 425, a power controller 427, an IDE
`
`
`
`
`
`
`
`controller 429, and other components. Adjacent to and in
`
`
`
`
`
`
`
`
`parallel alignment with the hard drive module is a personal
`
`
`
`
`
`
`
`computer interface (“PCI”) bus 431, 432. Apower regulator
`
`
`
`
`
`
`435 is disposed near the PCI bus.
`
`
`
`
`
`
`
`
`In a specific embodiment, north bridge unit 421 often
`
`
`
`
`
`
`couples to a computer memory, to the graphics accelerator
`423, to the IDE controller, and to the host interface controller
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`via the PCI bus. Graphics accelerator 423 typically couples
`
`
`
`
`
`
`
`
`
`to a graphics memory 423, and other elements. IDE con-
`
`
`
`
`
`
`
`
`troller 429 generally supports and provides timing signals
`
`
`
`
`
`
`
`
`
`necessary for the IDE bus. In the present embodiment, the
`IDE controller is embodied as a 643U2 PCI-to IDE chip
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`from CMD Technology, for example. Other types of buses
`
`
`
`
`
`
`
`
`than IDE are contemplated, for example EIDE, SCSI, 1394,
`and the like in alternative embodiments of the present
`
`
`
`
`
`
`
`
`invention.
`
`
`
`
`
`
`
`
`
`
`The hard drive module or mass storage unit 420 typically
`
`
`
`
`
`
`includes a computer operating system, application software
`
`
`
`
`
`
`
`
`
`program files, data files, and the like.
`In a specific
`
`
`
`
`
`
`
`embodiment,
`the computer operating system may be the
`
`
`
`
`
`
`Windows98 operating system from Microsoft Corporation
`
`
`
`
`
`
`
`
`of Redmond Wash. Other operating systems, such as
`WindowsNT, MacOSS, Unix, and the like are also contem-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`plated in alternative embodiments of the present invention.
`
`
`
`
`
`
`
`Further, some typical application software programs can
`
`
`
`
`
`
`
`include Office98 by Microsoft Corporation, Corel Perfect
`Suite by Corel, and others. Hard disk module 420 includes
`
`
`
`
`
`
`
`
`
`a hard disk drive. The hard disk drive, however, can also be
`
`
`
`
`
`
`
`
`
`
`
`replaced by removable hard disk drives, read/write CD
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ROMs, flash memory, floppy disk drives, and the like. A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Ex. 1025, Page 11
`
`Ex. 1025, Page 11
`
`

`

`
`7
`
`
`
`
`
`
`
`small
`is currently
`for example 2.5",
`form factor,
`
`
`
`
`
`
`contemplated, however, other form factors, such as PC card,
`
`
`
`
`
`
`
`
`
`and the like are also contemplated. Mass storage unit 240
`
`
`
`
`
`
`
`
`may also support other interfaces than IDE. Among other
`
`
`
`
`
`
`features, the computer system includes an ACM with secu-
`
`
`
`
`
`
`
`
`rity protection. The ACM connects to the console, which has
`
`
`
`
`
`
`
`
`at least the following elements, which should not be limit-
`mg.
`
`
`
`
`
`
`
`1) Connection to input devices, e.g. keyboard or mouse;
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket