`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 1 of 39
`
`
`
`
`(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)(cid:24)(cid:3)
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 2 of 39
`
`(19) United States
`(12) Reissued Patent
`Chu
`
`USOORE44739E
`
`US RE44,739 E
`(10) Patent Number:
`*Jan. 28, 2014
`(45) Date of Reissued Patent:
`
`(54) DATA SECURITY METHOD AND DEVICE
`FOR COMPUTER MODULES
`
`(71) Applicant: Acqis LLC. McKinney, TX (US)
`
`(72) Inventor: William W.Y. Chu, Los Altos, CA (US)
`(73) Assignee: Acqis LLC. McKinney, TX (US)
`
`(*) Notice:
`
`This patent is subject to a terminal dis
`claimer.
`
`(21) Appl. No.: 13/899,484
`
`(22) Filed:
`
`May 21, 2013
`Related U.S. Patent Documents
`
`6,643,777
`Nov. 4, 2003
`09/312,199
`May 14, 1999
`
`Reissue of:
`(64) Patent No.:
`Issued:
`Appl. No.:
`Filed:
`U.S. Applications:
`(63) Continuation of application No. 13/562.210, filed on
`Jul. 30, 2012, now Pat. No. Re. 44,468, which is a
`continuation of application No. 13/294.108, filed on
`Nov. 10, 2011, now Pat. No. Re. 43,602, which is a
`continuation of application No. 12/561,138, filed on
`Sep. 16, 2009, now Pat. No. Re. 42.984, which is a
`continuation of application No. 1 1/545,056, filed on
`Oct. 6, 2006, now Pat. No. Re. 43,171, which is a
`continuation of application No. 11/056,604, filed on
`Feb. 10, 2005, now Pat. No. Re. 41,092.
`(51) Int. Cl.
`G06F 12/00
`(52) U.S. Cl.
`USPC ............................................... 726/16; 726/20
`
`(2006.01)
`
`(58) Field of Classification Search
`USPC .......... 726/2-9, 16–21, 34, 36; 713/182-183,
`713/192-194; 710/1, 7, 8, 15, 20, 22, 100
`See application file for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`4,623,964 A * 1 1/1986 Getz et al. ......................... 705/1
`4,769,764 A
`9, 1988 Levanon
`4,799,258 A
`1/1989 Davies
`5,056,141 A * 10/1991 Dyke ........................... 340,527
`5,086,499 A
`2f1992 Mutone
`5,103,446 A
`4, 1992 Fischer
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`JP
`
`T 1996
`O722138 A1
`10, 1994
`6-289953
`(Continued)
`OTHER PUBLICATIONS
`
`Boosten, “Transmission Overhead and Optimal Packet Size', Mar.
`11, 1998, printed on Jan. 28, 2011, 2 pgs.
`Primary Examiner — Hosuk Song
`(74) Attorney, Agent, or Firm — Cooley LLP
`
`ABSTRACT
`(57)
`A security method for an attached computer module in a
`computer system. The security method reads a security iden
`tification number in an attached computer module and com
`pares it to a security identification number in a console, which
`houses the attached computer module. Based upon a relation
`ship between these numbers, a security status is selected. The
`security status determines the security level of operating the
`computer system.
`
`23 Claims, 24 Drawing Sheets
`
`-
`
`4O
`
`Computer
`Module Boy
`
`
`
`
`
`S S S
`S
`
`onitor
`
`20
`515 inser --O 2
`Desktop
`- Peripheral
`Console
`
`fe
`
`252
`
`
`
`Attached
`Computer
`Module
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 3 of 39
`
`US RE44,739 E
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3/1993 Woodbury et al.
`5, 191581 A
`3, 1993 Lord
`5,198.806 A
`6, 1994 Takeda
`5,319,771 A
`5,463,742 A 10/1995 Kobayashi
`5,519,843. A
`5, 1996 Moran et al.
`5,539,616 A
`7, 1996 Kikinis
`5,546.463. A
`8/1996 Caputo et al.
`5,550,861 A
`8, 1996 Chan et al.
`5,572,441. A 1 1/1996 Boie
`5,590,377 A 12/1996 Smith
`5,608,608 A
`3, 1997 Flint et al.
`5,623,637 A
`4/1997 Jones et al.
`5,638,521 A
`6, 1997 Buchala et al.
`5,640,302 A
`6, 1997 Kikinis
`5,648,762 A
`7, 1997 Ichimura et al.
`5,689,654 A 11/1997 Kikinis et al.
`5,721,842 A
`2/1998 Beasley et al.
`5,751,711 A
`5, 1998 Sakaue
`5,751,950 A
`5, 1998 Crisan
`5,764,924 A
`6/1998 Hong
`5,774,704 A
`6, 1998 Williams
`5,815,681 A
`9, 1998 Kikinis
`5,819,053 A * 10/1998 Goodrum et al. ............. T10/100
`5,838,932 A 1 1/1998 Alzien
`5,857,085 A
`1/1999 Zhang et al.
`5,862,381 A
`1/1999 Advani et al.
`5,878,211 A
`3/1999 Delagrange et al.
`5,884,049 A
`3, 1999 Atkinson
`5,907,566 A
`5, 1999 Benson et al.
`5,909,559 A
`6, 1999 SO
`5,933,609 A
`8, 1999 Walker et al.
`5,935,226 A
`8, 1999 Klein
`5,941,965 A
`8, 1999 Moroz et al.
`5.974.486 A 10/1999 Siddappa
`5,978,919 A 1 1/1999 Doi et al.
`5.991,833. A 1 1/1999 Wandler et al.
`5.999,476 A 12/1999 Dutton et al.
`5.999,952 A 12/1999 Jenkins et al.
`6,006,243 A 12/1999 Karidis
`6,012,145 A
`1/2000 Mathers et al.
`6,025,989 A
`2/2000 Ayd et al.
`6,029, 183 A
`2, 2000 Jenkins et al.
`6,038,621 A
`3, 2000 Gale et al.
`6,046,571 A
`4/2000 Bovio et al.
`6,069,615 A
`5, 2000 Abraham et al.
`6,070,214 A
`5, 2000 Ahern
`6,104,921 A
`8/2000 Cosley et al.
`6,157.534. A 12/2000 Gallagher et al.
`6,161,157 A 12/2000 Tripathi et al.
`6,161,524. A 12/2000 Akbarian et al.
`6,199,134 B1
`3/2001 Deschepper et al.
`6,202,115 B1
`3/2001 Khosrowpour
`6,202,169 B1
`3/2001 Razzaghe-Ashrafi et al.
`6,216,185 B1
`4/2001 Chu
`6,226,700 B1
`5, 2001 Wandler et al.
`6.256,689 B1
`7/2001 Khosrowpour
`6,266,539 B1
`7/2001 Pardo
`6,301,637 B1
`10/2001 Krull et al.
`
`10/2001 Schneider et al.
`6,304,895 B1
`6,311,268 B1 10/2001 Chu
`6,314,522 B1
`1 1/2001 Chu
`6,321,277 B1 * 1 1/2001 Andresen et al. ................. T10/8
`6,321,335 B1 1 1/2001 Chu
`6,324,605 B1
`1 1/2001 Rafferty et al.
`6,332,180 B1
`12/2001 Kauffman et al.
`6,345.330 B2
`2/2002 Chu
`6,366,951 B1
`4/2002 Schmidt
`6,378,009 B1
`4/2002 Pinkston, II et al.
`6,381,602 B1 * 4/2002 Shoroffet al. .................... 707/9
`6,393,561 B1* 5/2002 Hagiwara et al. ............. T13/100
`6,401,124 B1
`6/2002 Yang et al.
`6,452,790 B1
`9/2002 Chu
`6,453,344 B1
`9, 2002 Ellsworth et al.
`6,460,106 B1
`10/2002 Stufflebeam
`6,477.593 B1 * 1 1/2002 Khosrowpour et al. ...... T10/100
`6,487.614 B2 11/2002 Nobutani et al.
`6,496,361 B2 * 12/2002 Kim et al. ..................... 361 (683
`6,549,966 B1
`4/2003 Dickens et al.
`6,643,777 B1
`1 1/2003 Chu
`6,718,415 B1
`4/2004 Chu
`7,099,981 B2
`8/2006 Chu
`7,146,446 B2 12/2006 Chu
`7,328.297 B2
`2/2008 Chu
`7,363,415 B2
`4/2008 Chu
`7,363.416 B2
`4/2008 Chu
`7,376,779 B2
`5/2008 Chu
`RE41,076 E
`1, 2010 Chu
`RE41,092 E
`1, 2010 Chu
`7,676,624 B2
`3/2010 Chu
`RE41,294 E
`4/2010 Chu
`7,818,487 B2 10/2010 Chu
`RE41,961 E
`11/2010 Chu
`RE42,814 E
`10/2011 Chu
`8,041,873 B2 10/2011 Chu
`RE42.984 E
`11/2011 Chu
`RE43,119 E
`1/2012 Chu
`RE43,171 E
`2, 2012 Chu
`8,234,436 B2
`7/2012 Chu
`RE44,468 E * 8/2013 Chu ................................ T26, 16
`2001 0011312 A1
`8, 2001 Chu
`2004/0177200 A1
`9, 2004 Chu
`2005/0174729 A1
`8, 2005 Chu
`2005, 0182882 A1
`8, 2005 Chu
`2005/O1955.75 A1
`9, 2005 Chu
`2005/0204083 A1
`9, 2005 Chu
`2005.0246469 A1 11/2005 Chu
`2006/0265361 A1 11, 2006 Chu
`2008/0244149 A1 10, 2008 Chu
`2009. O157939 A1
`6, 2009 Chu
`2010/0174844 A1
`7, 2010 Chu
`2011/0208893 A1
`8, 2011 Chu
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`WO
`
`WO92, 18924
`WO94/OO970
`WO95/13640
`
`10, 1992
`1, 1994
`5, 1995
`
`* cited by examiner
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 4 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 1 of 24
`
`US RE44,739 E.
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 5 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 2 of 24
`
`US RE44,739 E
`
`
`
`a?Lock
`
`5
`
`Opening for
`Engoging Lock
`
`A/6 2
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 6 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 3 of 24
`
`US RE44,739 E
`
`was v- as
`
`Interface
`Contrilleri
`
`in
`as
`Sys BIOS and
`Password
`lock
`4O1 4O3 Control
`
`is
`
`a 4.
`
`Y-405
`
`CPU Module
`(6.4mm)
`
`3/2" lord
`Drive (254mm)
`
`------------
`Y42
`
`- 425
`
`Crophics men
`
`is as
`
`a
`
`as as eas a mes
`
`
`
`
`
`
`
`
`
`
`
`4OO1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`i
`
`1 O
`
`ei
`eight:
`44 ran
`(1723")
`
`E.
`(5.748)
`
`i-435
`Depth:
`234 mm
`(92.3")
`Power
`Regulator
`H-437
`koin circuit
`boord
`
`sea-r
`- - - -
`
`Component
`underneath
`
`Connection to
`lock control
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 7 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 4 of 24
`
`US RE44,739 E
`
`-313
`Security ID
`
`-300
`-301
`Access Privilege
`Granted
`315
`
`w
`
`Owner:
`Owner Password;
`Business:
`BusineSS PaSSWOrd:
`Console Type:
`t rivilege:
`Owner:
`OWner PaSSWOrd:
`Business,
`Business PaSSWOrd:
`Console Type:
`Location:
`Access privilege.
`OWner:
`Owner Password:
`BusineSS:
`Business PassWOrd:
`Access privilege:
`Owner:
`Owner PaSSWOrd:
`Business:
`Business Password:
`Console Type:
`Location:
`Owner Access privilege:
`Others Access privil
`OWner:
`Owner PaSSWOrd:
`Business:
`Business Password:
`ConsoleType:
`Location:
`Owner Access privilege:
`Others Access privile
`
`
`
`None
`JST
`Ether
`Portable
`
`303
`Ger?,rail
`Company
`
`None
`None
`None
`Desktop
`None
`None
`
`Sunshine
`JST
`Ether
`Private
`John Doe
`Sunshine
`JST
`Ether
`Desktop
`
`
`
`Mary
`Vacation
`JS
`Ether
`Desktop
`
`317
`
`-305
`Restricted
`
`319
`Attached Computer
`Module
`
`321
`
`3O7
`
`309
`Pryfe
`
`323
`
`-31 1
`General
`Company
`
`F.G. 4
`
`
`
`Company's shared
`
`Console
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`329
`
`
`
`
`
`S3s2
`coworkers Office
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 8 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 5 of 24
`
`US RE44,739 E
`
`609
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 9 of 39
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 9 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 6 of 24
`
`US RE44,739 E
`
`w5
`
`05:528%
`
`com«\
`
`
`
`
`
` $25059053..—\ma\mace393,4vmmo:aE22ED
`
`283x
`
`o\_
`
`$8.02\\Q.aso:25x\mum\xx30so23xx\\macs\
`\\\\\mace
`
`mmw“No\
`
`\
`
`$8520:a522\mum
`
`30
`
`ask
`
`2:82.2:.200
`
`inBaxbasin.
`
`o:g5%
`
`
`
`09.9322%
`
`n5Szgmg
`
`SoEma
`
`Ems.a20850:“.
`aoEws.
`
`.5256:30a5628Sam
`
`
`
`5?29:22fig“.
`
`958$
`
`0.GE
`
`to
`
`Sangag
`
`msmaoi
`
`cozmufiasaat§w£3
`
`Semen.
`
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 10 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 7 of 24
`
`US RE44,739 E
`
`-700
`
`Power
`up
`
`Security
`Code
`
`701
`
`703
`
`705
`
`ACCeSS
`
`707 YES
`
`709
`
`Block a
`data Out
`716-NNO
`710
`ACCeSS
`Privilege
`
`Full
`access
`
`Peripheral
`storage
`Access
`Privilege Read-on
`
`708
`
`YES
`
`714
`
`711
`
`Access Peripheral
`Privilege Read-only
`
`712
`
`713
`
`719
`
`721
`
`Program
`data Control
`
`Hardware
`takes over
`
`717
`
`723
`
`Block all
`data Out
`
`Program
`
`Hardware
`takes Over
`
`
`
`Data
`Out to Storage
`device
`
`731
`
`729
`
`et Data
`Out
`
`727
`
`FIG. 7
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 11 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 8 of 24
`
`US RE44,739 E
`
`
`
`908
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 12 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 9 of 24
`
`US RE44,739 E
`
`NEW SHEET
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 13 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 10 of 24
`
`US RE44,739 E
`
`NEW SHEET
`
`ACM
`fiO
`
`CPU ter-
`
`
`
`OO
`
`tool
`
`Peripheral Console
`/aff
`
`Al2
`Syster
`Memory
`
`interface
`
`lds
`
`
`
`High
`Performance
`Devices
`foLO
`Primary
`Mass E
`Storage
`
`Secondary Power Supply
`
`interface
`and
`Support
`
`
`
`Expansion
`- Slots
`Primary Power Supply
`
`(d
`
`t
`
`FIG. /O
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 14 of 39
`
`U.S. Patent
`
`US RE44,739 E
`
`s
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 15 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 12 of 24
`
`US RE44,739 E
`
`NEW SHEET
`
`*** * * * * * ******* * * * * * • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • ~ ~- - - - - - - - - - - - - - - - - ..…..…€
`
`x
`
`Ara was was vow him
`war
`due who ma and ahia rhah dif with will
`v
`w w w w w w w to w w w w w w w d ar as P w kw
`w w w is so has
`w w
`- we m as w a ma mur w w w me was re was on me was an wr
`
`has XA
`
`wax
`
`
`
`
`
`A
`
`a Kavate A
`
`a w w
`
`y w x - p r n w w w w is
`k
`
`a a
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 16 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 13 of 24
`
`US RE44,739 E
`
`NEW SHEET
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 17 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 14 of 24
`
`US RE44,739 E
`
`NEW SHEET
`
`
`
`Flash Memory
`stos
`Configuration
`
`is
`
`2610 A620
`
`EE int
`613 FFO tics
`L Alstr Data Path:626
`Eri
`2
`al ...--
`to H
`Siswa t
`
`616
`
`Carr
`becode a
`
`dus Psih
`
`Coff
`Epitou &
`Morge
`sta Peth
`
`RWR
`Con?o
`
`C s
`
`CPU CNT
`GPO
`atchfier
`
`690 wgic Port sets Dict 5
`
`Vid
`
`Par contra
`
`FIG. It
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 18 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 15 of 24
`
`US RE44,739 E
`
`
`
`
`
`
`
`
`
`
`
`RESE
`
`Wides
`Capture
`Circuit
`
`Wiki
`Cock
`
`NEW SHEET
`
`Flash Memory
`Oslona)
`
`XP8s
`
`Rita
`
`Coral
`Occur
`
`Separate
`
`Data Path
`
`
`
`AN
`
`.
`
`
`
`CPU CNT
`
`GPO T initive
`
`video Port tata::15
`
`Wido Port Contro
`
`to Serial
`Covere
`
`
`
`1182
`h183M
`
`Cock
`doubiof
`
`2xWided Clock
`
`
`
`DS WCK
`
`F.G. 5
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 19 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 16 of 24
`
`US RE44,739 E
`
`NEW SHEET
`
`PCK
`
`PCK
`
`PDO S)-( : Receiver
`
`PDO
`
`PO1 >>={ Recalvar
`
`PO1
`
`PO2 S)—( : Receiver
`
`
`
`PO3
`
`PD2
`
`PO3
`
`PCN - S)-( : Receiver
`
`PCN
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 20 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 17 of 24
`
`US RE44,739 E
`
`Computing System
`
`
`
`NEW SHEET
`
`f705
`
`CPU/NB
`signals
`
`OSt
`
`PC Bus Bridge
`ince 1: interface Dev,
`Controller
`Pair And PBus
`
`Peripheral System
`
`r
`
`Bridge CPUNB Controller
`signals
`Secondary PC Bus
`
`eaCe
`
`PC Add
`on Board 2
`
`FIGURE If
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 21 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 18 of 24
`
`US RE44,739 E
`
`NEW SHEET
`
`Computing System
`
`
`
`Graphics
`
`Peripheral System
`
`Other Bus
`
`integrated
`Host
`interface
`Cnti &
`
`integrated
`Peripheral
`Interface
`Cntir, &
`S. Bridge
`
`FIGURE 3
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 22 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 19 of 24
`
`US RE44,739 E
`
`
`
`(5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`NEW SHEET
`
`Attached Computer Module
`
`(ACM)
`
`Power
`
`Exchange interface
`System Bus (XIS Bus)
`---
`Power Bus
`
`integrated CPU
`(or CPU Module)
`with North Bridge &
`Graphics Accelerator
`
`wide fort
`
`Wideo Cutput
`
`Video Bis
`
`integrated
`South
`Bridge &
`host
`interface
`Controller
`
`
`
`Peripheral aus
`
`29
`Attached Computer Modale with integrated CPC/NB/Graphics and
`integrated HICFSB
`
`FIG. It
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 23 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 20 of 24
`
`US RE44,739 E
`
`NEW SHEET
`
`Attached Computer Module" (ACM)
`
`Power
`
`Exchange interface
`1 System Bus (XS Bus)
`-aaaaa
`r" Power Bs
`
`
`
`
`
`integrated CPU
`with core iogic,
`Graphics Accelerator,
`Stefface Controller
`
`Cace
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Wide Output
`
`-- Wided Bes
`
`Xss
`
`Peripheral Bus
`
`
`
`Attached Computer Module with Single Chip fully integrated: CP1, Cache,
`Core logic, Graphics controller and Interface controller
`
`F G. 2 O
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 24 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 21 of 24
`
`US RE44,739 E
`
`NEW SHEE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`COCOOOOOOC?)
`99.9999
`>>>>>>
`
`COM)
`O)
`>>>
`
`O
`N
`()
`
`O
`Z
`()
`
`OC)
`
`co o
`
`CN)
`Ollol
`
`o
`al
`
`r
`n
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 25 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 22 of 24
`
`US RE44,739 E
`
`NEW SHEE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 26 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 23 of 24
`
`US RE44,739 E
`
`NEW SHEE
`
`Synch. To PCK
`T
`
`Synch. To PCK
`
`Symbol
`PORTN
`1T
`PDO +
`2
`PDO .
`3
`PD1 RTN
`4
`PD1 -
`6
`PD2 RTN
`7
`PD2+
`8
`PD2 -
`9
`PDRTN
`10
`P3.
`12
`PCKRTN T
`13
`PCK.
`15
`PCN RTN
`16
`PCN -
`18
`PDRORTN
`19
`PDR0 -
`21
`PDR1 RTN
`22
`PDR1 -
`24
`PDR2 RTN
`25
`PDR2 -
`27
`PDR3 RTN
`28
`PDR3 -
`30
`31 PCKRRTNT
`33
`PCKR -
`84 PCNRRTNL
`35
`PCNR -
`Synch, o PCKR
`
`
`
`10x clock rate
`
`10x clock rate
`
`GN
`oter to PerioheaW
`Computer to Peripheral VDS Data O -
`GND
`Computer to Peripheral LVDS Data 1
`GND
`Computer to Peripheral LVDS Data2+
`Computer to Peripheral LVDS Data2
`GND
`Computer to Peripheral LVDS Data 3 -
`GND
`Computer to Peripheral LVDS Clock -
`GND
`Computer to Peripheral VDS Control -
`GND
`Peripheral to Computer LVDS Data O -
`GND
`Peripheral to Computer LVDS Data 1 -
`GND
`Peripheral to Computer LVDS Data2
`GND
`Peripheral to Computer LVDS Data 3
`GND
`Peripheral to Computer LVDS Clock -
`HGND
`Peripheral to Computer LVDS Control
`10x Clock rate
`Peripheral to Computer LVDS Control.
`Asynchronous
`Reset
`
`FG. 23
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 27 of 39
`
`U.S. Patent
`
`Jan. 28, 2014
`
`Sheet 24 of 24
`
`US RE44,739 E
`
`NEW SHEE
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 28 of 39
`
`1.
`DATA SECURITY METHOD AND DEVICE
`FOR COMPUTER MODULES
`
`US RE44,739 E
`
`appears in the
`Matter enclosed in heavy brackets
`original patent but forms no part of this reissue specifica
`tion; matter printed in italics indicates the additions
`made by reissue.
`
`10
`
`15
`
`Notice. More than one reissue application has been filed
`for the reissue of U.S. Pat. No. 6,643,777. The reissue appli
`cations are U.S. application Ser: No. 1 1/056,604 (a parent
`reissue application), Ser: No. 1 1/545,056 (which is a reissue
`continuation of the parent reissue application), Ser: No.
`1 2/561, 138 (which is a reissue continuation of the parent
`reissue application), Ser: No. 13/294, 108 (which is a reissue
`continuation of U.S. application Ser: No. 1 2/561, 138), Ser:
`No. 1 3/562,210 (which is a reissue continuation of U.S.
`application Ser: No. 13/294, 108); Ser: No. 13/649,078 (which
`is a reissue continuation of U.S. application Ser: Nos. 1 3/562,
`210 and 13/899,484 (the present application, which is a reis
`sue continuation of U.S. application Ser: No. 1 3/562,210).
`This application is a reissue continuation of U.S. applica
`25
`tion Ser: No. 1 3/562,210, which is a reissue continuation of
`U.S. application Ser: No. 13/294, 108, which is a reissue con
`tinuation of U.S. application Ser: No. 1 2/561, 138, which is a
`reissue continuation of U.S. application Ser: No. 1 1/056,604,
`which is a reissue of U.S. Pat. No. 6,643,777, which are
`incorporated herein by reference.
`
`30
`
`BACKGROUND OF THE INVENTION
`
`The present invention relates to computing devices. More
`particularly, the present invention provides a method and
`device for securing a personal computer or set-top box.
`Merely by way of example, the present invention is applied to
`a modular computing environment for desktop computers,
`but it will be recognized that the invention has a much wider
`range of applicability. It can be applied to other portable or
`modular computing applications.
`Many desktop or personal computers, which are com
`monly termed PCs, have been around and used for over ten
`years. The PCs often come with state-of-art microprocessors
`such as the Intel PentiumTM microprocessor chips. They also
`include a hard or fixed disk drive including memory in the
`giga-byterange. Additionally, the PCs often include a random
`access memory integrated circuit device Such as a dynamic
`random access memory device, which is commonly termed
`DRAM. The DRAM devices now provide up to millions of
`memory cells (i.e., mega-bit) on a single slice of silicon. PCs
`also include a high resolution display Such as cathode ray
`tubes or CRTs. In most cases, the CRTs are at least 15 inches
`or 17 inches or 19 inches in diameter. High resolution flat
`panel displays are also used with PCs.
`Many external or peripheral devices can be used with the
`PCs. Among others, these peripheral devices include mass
`storage devices such as a ZipTM Drive product sold by Iomega
`Corporation of Utah. Other storage devices include external
`hard drives, tape drives, and others. Additional devices
`include communication devices Such as a modem, which can
`be used to link the PC to a wide area network of computers
`such as the Internet. Furthermore, the PC can include output
`devices such as a printer and other output means. Moreover,
`the PC can include special audio output devices such as
`speakers the like.
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`PCs also have easy to use keyboards, mouse input devices,
`and the like. The keyboard is generally configured similar to
`a typewriter format. The keyboard also has the length and
`width for easily inputting information by way of keys to the
`computer. The mouse also has a Sufficient size and shape to
`easily move a cursor on the display from one location to
`another location.
`Other types of computing devices include portable com
`puting devices such as "laptop' computers and the like.
`Although somewhat Successful, laptop computers have many
`limitations. These computing devices have expensive display
`technology. In fact, these devices often have a smaller flat
`panel display that has poor viewing characteristics. Addition
`ally, these devices also have poor input devices such as
`smaller keyboards and the like. Furthermore, these devices
`have limited commonplatforms to transfer information to and
`from these devices and other devices such as PCs.
`Up to now, there has been little common ground between
`these platforms including the PCs and laptops in terms of
`upgrading, ease-of-use, cost, performance, and the like.
`Many differences between these platforms, probably some
`what intentional, has benefited computer manufacturers at the
`cost of consumers. A drawback to having two separate com
`puters is that the user must often purchase both the desktop
`and laptop to have “total computing power, where the desk
`top serves as a “regular computer and the laptop serves as a
`"portable' computer. Purchasing both computers is often
`costly and runs “thousands of dollars. The user also wastes a
`significant amount of time transferring software and data
`between the two types of computers. For example, the user
`must often couple the portable computer to a local area net
`work (i.e., LAN), to a serial port with a modem and then
`manually transfer over files and data between the desktop and
`the portable computer. Alternatively, the user often must use
`floppy disks to "Zip' up files and programs that exceed the
`storage capacity of conventional floppy disks, and transfer the
`floppy disk data manually.
`Another drawback with the current model of separate por
`table and desktop computer is that the user has to spend
`money to buy components and peripherals the are duplicated
`in at least one of these computers. For example, both the
`desktop and portable computers typically include hard disk
`drives, floppy drives, CD-ROMs, computer memory, host
`processors, graphics accelerators, and the like. Because pro
`gram Software and Supporting programs generally must be
`installed upon both hard drives in order for the user to operate
`programs on the road and in the office, hard disk space is often
`wasted.
`One approach to reduce some of these drawbacks has been
`the use of a docking station with a portable computer. Here,
`the user has the portable computer for “on the road use and
`a docking station that houses the portable computer for office
`use. The docking station typically includes a separate moni
`tor, keyboard, mouse, and the like and is generally incompat
`ible with other desktop PCs. The docking station is also
`generally not compatible with portable computers of other
`Vendors. Another drawback to this approach is that the por
`table computer typically has lower performance and func
`tionality than a conventional desktop PC. For example, the
`processor of the portable is typically much slower than pro
`cessors in dedicated desktop computers, because of power
`consumption and heat dissipation concerns. As an example, it
`is noted that at the time of drafting of the present application,
`some top-of-the-line desktops include 400 MHZ processors,
`whereas top-of-the-line notebook computers include 266
`MHz processors.
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 29 of 39
`
`US RE44,739 E
`
`10
`
`3
`Another drawback to the docking station approach is that
`the typical cost of portable computers with docking stations
`can approach the cost of having a separate portable computer
`and a separate desktop computer. Further, as noted above,
`because different vendors of portable computers have propri
`etary docking stations, computer users are held captive by
`their investments and must rely upon the particular computer
`Vendor for future upgrades, support, and the like.
`To date, most personal computers provide data file security
`through software only. A wide variety of removable storage
`media are available for a personal computer. These removable
`media do not provide any access security protection in hard
`ware. Data encryption program often must be used for pro
`tection. Such program is cumbersome to handle for the user
`15
`requiring extra cost and time. Data encryption is more com
`monly used for communication over an unprotected network
`or the Internet. Having a large number offrequently used files
`managed by encryption software is not practical. Without
`Software security program, any file can be read and copied
`illegally from a hard disk drive on a PC or any removable
`media.
`PC architecture generally allows freedom of data flow
`between memory and peripheral devices within the allowed
`memory and I/O address spaces. In conventional PC archi
`tecture, a peripheral bus, i.e. PCI bus, is used to control all
`data transactions among peripheral devices. PCI bus allows
`any device to be a bus master and perform data transaction
`with another device. Also when a software program is in
`control, it can move data between any two devices. There is no
`hardware or protocol security mechanism on a standard
`peripheral bus such as PCI Bus to detect or block data trans
`actions. Operating system may have individual files read or
`write protected. These types of special security feature
`require significant additional user interaction to control. This
`is too cumbersome for a typical user to manage. There is no
`mechanism in current PCs to allow access to the primary hard
`disk drive and yet prevent copying of its content. The con
`ventional PC is a single machine that does not have a mecha
`nism to perform security ID matching in hardware.
`40
`Thus, what is needed are computer systems that provide
`improved security features to prevent illegal or unauthorized
`access to information.
`
`4
`In an alternative embodiment, the present invention pro
`vides a security protection method for a computer module.
`The method includes steps or acts of inserting the computer
`module into a console. Once the module has been inserted, the
`method initiates a security program in the module to read a
`security identification of the console and to read a security
`identification of the computer module. Based upon a relation
`ship of the console identification and the computer module
`identification, a predetermined security status is determined
`from, for example, a lookup table or the like. The method then
`selects the predetermined security status, which can be one of
`many. The method then operates the computer module based
`upon the security status.
`In a further alternative embodiment, the present invention
`provides a method for identifying a user for a computer mod
`ule. The method includes inserting a computer module into a
`console; and initiating a security program in memory of the
`computer module. The method prompts a plurality of input
`fields corresponding to respective input information on a user
`interface to be provided by a user of the computer module.
`Next, the method inputs the input information into the user
`interface of the computer module. The input information
`includes a user (e.g., owner) name, a user (e.g., owner) pass
`word, a business name, a business password, and a location.
`Still further, the present invention provides a system for
`secured information transactions, e.g., data security, elec
`tronic commerce, private communications. The system
`includes a console comprising a peripheral controller housed
`in the console. A user identification input device (e.g., key
`board, retinal reader, finger print reader, Voice recognition
`unit) is coupled to the peripheral controller. The user identi
`fication input device is provided for user identification data of
`the user. The system has an attached computer module
`coupled to the console. The attached computer module has a
`security memory device (e.g., flash memory device) stored
`with the user identification data.
`Numerous benefits are achieved using the present inven
`tion over previously existing techniques. The present inven
`tion provides mechanical and electrical security systems to
`prevent theft or unauthorized use of the computer system in a
`specific embodiment. Additionally, the present invention Sub
`stantially prevents accidental removal of the ACM from the
`console. In some embodiments, the present invention pre
`vents illegal or unauthorized use during transit. The present
`invention is also implemented using conventional technolo
`gies that can be provided in the present computer system in an
`easy and efficient manner. Depending upon the embodiment,
`one or more of these benefits can be available. These and other
`advantages or benefits are described throughout the present
`specification and are described more particularly below.
`These and other embodiments of the present invention, as
`well as its advantages and features, are described in more
`detail in conjunction with the text below and attached FIGS.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a simplified diagram of a computer system
`according to an embodiment of the present invention;
`FIG. 2 is a simplified diagram of a computer module
`according to an embodiment of the present invention;
`FIG. 3 is a simplified top-view diagram of a computer
`module according to an embodiment of the present invention;
`FIG. 4 is a simplified illustration of security systems
`according to embodiments of the present invention;
`FIG. 5 is a simplified diagram of a computer module in a
`console according to an embodiment of the present invention;
`
`25
`
`30
`
`35
`
`SUMMARY OF THE INVENTION
`
`45
`
`According to the present invention, a technique including a
`method and device for securing a computer module in a
`computer system is provided. In an exemplary embodiment,
`the present invention provides a security system for an
`attached computer module (ACM). In an embodiment, the
`ACM inserts into a computer module bay (CMB) within a
`peripheral console to form a functional computer. A security
`program reads an identification number in a security memory
`device to determine a security level of the ACM according to
`one embodiment.
`In a specific embodiment, the present invention provides a
`system for secured information transactions. The system has
`a console (e.g., computer housing) comprising a peripheral
`controller housed in the console; and a security memory
`device (e.g., flash memory device) coupled to the peripheral
`controller. The system also has an attached computer module
`(i.e., a removable module with memory and microprocessor)
`coupled to the console. The attached computer module has a
`host interface controller housed within the attached computer
`module to interface to the security memory device through
`the peripheral controller.
`
`50
`
`55
`
`60
`
`65
`
`
`
`Case 6:20-cv-00967 Document 1-5 Filed 10/15/20 Page 30 of 39
`
`US RE44,739 E
`
`10
`
`15
`
`5
`FIG. 6 is a simplified diagram of a security method for a
`module according to an embodiment of the present invention;
`and
`FIG. 7 is a simplified diagram of a method according to an
`embodiment of the present invention.
`FIG. 8 is a simplified diagram of a system 800 according to
`an alternative embodiment of the present application.
`FIG. 9 depicts a peripheral console configuration.
`FIG. I0 is a block diagram of one embodiment of a com
`puter system employing the present invention.
`FIG. I. 1 is a block diagram of an attached computing
`module (ACM).
`FIG. I2 is a block diagram of a peripheral console
`(PCON).
`FIG. 13 is a block diagram of one embodiment of a com
`puter system using the interface of the present invention.
`FIG. 14 i