`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 1 of 40
`
`(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)8(cid:3)
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 2 of 40
`
`(19) United States
`(12) Reissued Patent
`Chu
`
`USOORE45140E
`
`US RE45,140 E
`(10) Patent Number:
`(45) Date of Reissued Patent:
`*Sep. 16, 2014
`
`(54) DATA SECURITY METHOD AND DEVICE
`FOR COMPUTER MODULES
`
`(71) Applicant: Acqis LLC. McKinney, TX (US)
`
`(72) Inventor: William W.Y. Chu, Los Altos, CA (US)
`(73) Assignee: Acqis LLC. McKinney, TX (US)
`
`(*) Notice:
`
`This patent is Subject to a terminal dis
`claimer.
`
`(21) Appl. No.: 14/109,749
`(22) Filed:
`Dec. 17, 2013
`Related U.S. Patent Documents
`
`(58) Field of Classification Search
`USPC .......... 726/2-9, 16–21, 34, 36; 713/182-183,
`713/192-194; 710/1, 7, 8, 15, 20, 22, 100;
`712/1, 220
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`4,623,964 A * 1 1/1986 Getz et al. ......................... 705/1
`4,769,764 A
`9, 1988 Levanon
`4,799,258 A
`1/1989 Davies
`5,056,141 A * 10/1991 Dyke ........................... 340,527
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`6,643,777
`Nov. 4, 2003
`09/312,199
`May 14, 1999
`
`Reissue of:
`(64) Patent No.:
`Issued:
`Appl. No.:
`Filed:
`U.S. Applications:
`(63) Continuation of application No. 13/649,078, filed on
`Oct. 10, 2012, now Pat. No. Re. 44,654, which is a
`continuation of application No. 13/562.210, filed on
`Jul. 30, 2012, now Pat. No. Re. 44,468, which is a
`continuation of application No. 13/294.108, filed on
`Nov. 10, 2011, now Pat. No. Re. 43,602, which is a
`continuation of application No. 12/561,138, filed on
`Sep. 16, 2009, now Pat. No. Re. 42.984, which is a
`continuation of application No. 11/056,604, filed on
`Feb. 10, 2005, now Pat. No. Re. 41,092, which is an
`application for the reissue of Pat. No. 6,643,777.
`(51) Int. Cl.
`G06F 12/00
`(52) U.S. Cl.
`USPC ............................................... 726/16; 726/20
`
`(2006.01)
`
`EP
`JP
`
`T 1996
`O722138 A1
`10, 1994
`6-289953
`(Continued)
`OTHER PUBLICATIONS
`
`Boosten, “Transmission Overhead and Optimal Packet Size', Mar.
`11, 1998, printed on: Jan. 28, 2011, 2 pgs.
`Primary Examiner — Hosuk Song
`(74) Attorney, Agent, or Firm — Cooley LLP
`(57)
`ABSTRACT
`A security method for an attached computer module in a
`computer system. The security method reads a security iden
`tification number in an attached computer module and com
`pares it to a security identification number in a console, which
`houses the attached computer module. Based upon a relation
`ship between these numbers, a security status is selected. The
`security status determines the security level of operating the
`computer system.
`
`25 Claims, 24 Drawing Sheets
`
`4O
`
`Computer
`Module Boy
`
`
`
`
`
`Monitor
`
`-
`
`S S
`S
`S
`2
`l2 2O
`Desktop
`Peripheral
`Console
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 3 of 40
`
`US RE45,140 E
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2f1992 Mutone
`5,086,499 A
`4, 1992 Fischer
`5,103,446 A
`3/1993 Woodbury et al.
`5, 191581 A
`3, 1993 Lord
`5,198.806 A
`6, 1994 Takeda
`5,319,771 A
`5,463,742 A 10/1995 Kobayashi
`5,519,843. A
`5, 1996 Moran et al.
`5,539,616 A
`7, 1996 Kikinis
`5,546.463. A
`8/1996 Caputo et al.
`5,550,861 A
`8, 1996 Chan et al.
`5,572,441 A 11/1996 Boie
`5,590,377 A 12, 1996 Smith
`5,608,608 A
`3, 1997 Flint et al.
`5,623,637 A
`4/1997 Jones et al.
`5,638,521 A
`6, 1997 Buchala et al.
`5,640,302 A
`6, 1997 Kikinis
`5,648,762 A
`7, 1997 Ichimura et al.
`5,689,654. A 1 1/1997 Kikinis et al.
`5,721,842 A
`2/1998 Beasley et al.
`5,751,711 A
`5, 1998 Sakaue
`5,751,950 A
`5, 1998 Crisan
`5,764,924 A
`6/1998 Hong
`5,774,704 A
`6, 1998 Williams
`5,815,681 A
`9, 1998 Kikinis
`5,819,053 A 10/1998 Goodrum et al.
`5,822,571 A * 10/1998 Goodrum et al. ............. T13/400
`5,838,932 A 1 1/1998 Alzien
`5,857,085 A
`1/1999 Zhang et al.
`5,862,381 A
`1/1999 Advani et al.
`5,878,211 A
`3/1999 Delagrange et al.
`5,884,049 A
`3, 1999 Atkinson
`5,907,566 A
`5, 1999 Benson et al.
`5,909,559 A
`6, 1999 So
`5,933,609 A
`8, 1999 Walker et al.
`5,935,226 A
`8, 1999 Klein
`5,941,965 A
`8, 1999 Moroz et al.
`5,941,968 A
`8/1999 Mergard et al.
`5.974.486 A 10/1999 Siddappa
`5,978,919 A 1 1/1999 Doi et al.
`5.991,833. A 1 1/1999 Wandler et al.
`5.999,476 A 12/1999 Dutton et al.
`5.999,952 A 12/1999 Jenkins et al.
`6,006,243 A 12/1999 Karidis
`6,012,145 A
`1/2000 Mathers et al.
`6,025,989 A
`2/2000 Ayd et al.
`6,029, 183 A
`2, 2000 Jenkins et al.
`6,038,621 A
`3, 2000 Gale et al.
`6,046,571 A
`4/2000 Bovio et al.
`6,069,615 A
`5, 2000 Abraham et al.
`6,070,214 A
`5, 2000 Ahern
`6,104,921 A
`8/2000 Cosley et al.
`6,157.534. A 12/2000 Gallagher et al.
`6,161,157 A 12/2000 Tripathi
`6,161,524. A 12/2000 Akbarian et al.
`6,199,134 B1
`3/2001 Deschepper et al.
`6,202,115 B1
`3/2001 Khosrowpour
`6,202,169 B1
`3/2001 Razzaghe-Ashrafi et al.
`6,216,185 B1
`4/2001 Chu
`6,226,700 B1
`5, 2001 Wandler et al.
`6.256,689 B1
`7/2001 Khosrowpour
`6,266,539 B1
`7, 2001 Pardo
`6,301,637 B1
`10/2001 Krull et al.
`
`10/2001 Schneider et al.
`6,304,895 B1
`6,311,268 B1 10/2001 Chu
`6,314,522 B1
`1 1/2001 Chu
`6,321,277 B1
`1 1/2001 Andresen et al.
`6,321,335 B1
`1 1/2001 Chu
`6,324,605 B1
`1 1/2001 Rafferty et al.
`6,332,180 B1
`12/2001 Kauffman et al.
`6,345.330 B2
`2, 2002 Chu
`6,366,951 B1
`4/2002 Schmidt
`6,378,009 B1
`4/2002 Pinkston, II et al.
`6,381,602 B1 * 4/2002 Shoroffet al. .................... 707/9
`6,393,561 B1* 5/2002 Hagiwara et al. ............. T13/100
`6,401,124 B1
`6/2002 Yang et al.
`6,452,790 B1
`9/2002 Chu
`6,453,344 B1
`9, 2002 Ellsworth et al.
`6,460,106 B1
`10/2002 Stufflebeam
`6,477.593 B1
`1 1/2002 Khosrowpour et al.
`6,487.614 B2 11/2002 Nobutani et al.
`6,496,361 B2 * 12/2002 Kim et al. ..................... 361 (683
`6,549,966 B1
`4/2003 Dickens et al.
`6,643,777 B1 1 1/2003 Chu
`6,718,415 B1
`4/2004 Chu
`7,099,981 B2
`8/2006 Chu
`7,123,660 B2 * 10/2006 Haq et al. ...................... 375/257
`7,146,446 B2 12/2006 Chu
`7.243,173 B2 *
`7/2007 Campbell ....................... 710/71
`7,266,661 B2 * 9/2007 Walmsley ..................... 711 (164
`7,328.297 B2
`2/2008 Chu
`7,363,415 B2
`4/2008 Chu
`7,363.416 B2
`4/2008 Chu
`7,376,779 B2
`5/2008 Chu
`RE41,076 E
`1, 2010 Chu
`RE41,092 E
`1, 2010 Chu
`7,676,624 B2
`3/2010 Chu
`RE41,294 E
`4/2010 Chu
`7,818,487 B2 10/2010 Chu
`RE41,961 E
`11/2010 Chu
`RE42,814 E
`10/2011 Chu
`8,041,873 B2 10/2011 Chu
`RE42.984 E
`11/2011 Chu
`RE43,119 E
`1/2012 Chu
`RE43,171 E
`2, 2012 Chu
`8,234,436 B2
`7/2012 Chu
`RE43,602 E
`8, 2012 Chu
`RE44,468 E
`8, 2013 Chu
`2001 0011312 A1
`8, 2001 Chu
`2004/0177200 A1
`9, 2004 Chu
`2005/0174729 A1
`8, 2005 Chu
`2005, 0182882 A1
`8, 2005 Chu
`2005/O1955.75 A1
`9, 2005 Chu
`2005/0204083 A1
`9, 2005 Chu
`2005.0246469 A1 11/2005 Chu
`2006/0265361 A1 11, 2006 Chu
`2008/0244149 A1 10, 2008 Chu
`2009. O157939 A1
`6, 2009 Chu
`2010/0174844 A1
`7, 2010 Chu
`2011/0208893 A1
`8, 2011 Chu
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`WO
`
`WO92, 18924
`WO94/OO970
`WO95/13640
`
`10, 1992
`1, 1994
`5, 1995
`
`* cited by examiner
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 4 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 1 of 24
`
`US RE45,140E
`
`
`
`as a
`
`AYAZaraaaaaaay
`acaravasaaaaaaad ar
`
`vaara at a
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 5 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 2 of 24
`
`US RE45,140 E
`
`
`
`a?Lock
`
`5
`
`Opening for
`Engoging Lock
`
`A/6 2
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 6 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 3 of 24
`
`US RE45,140 E
`
`
`
`
`
`
`
`
`
`
`
`4OO
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`42O
`
`in
`as
`st
`Sys BIOS and
`interface
`Password
`Controller i
`y- lock
`4O3 Control
`
`N4O5
`
`-IO
`Height:
`44 ran
`(72.3")
`
`;
`
`:
`(5
`
`")
`
`i-435
`Depth:
`234 in
`(92.3")
`Power
`Regulator
`--437
`Mein circuit
`boord
`
`sers
`- - - -
`
`Component
`underneath
`
`4.O.
`CPU Module
`(6.4 mm)
`
`3/2"hard
`Drive (254mm)
`
`is a was estaur was was war as
`
`a 4
`
`x
`
`Crophies men
`
`sia amass essa as a same
`
`------------
`
`- 425
`
`Connection to
`lock control
`
`427
`
`3.
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 7 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 4 of 24
`
`US RE45,140 E
`
`-300
`-301
`Access Privilege
`Granted
`315
`
`r 313
`Security ID
`
`
`
`
`
`
`
`
`
`
`
`
`
`Owner:
`owner Password:
`Business:
`BusineSS PaSSWOrd;
`Console Type:
`Location:
`Access privilege:
`
`OWner:
`OWner PaSSWOrd:
`Business:
`Business Password:
`Console Type:
`Location:
`Access privilege:
`OWner:
`Owner Password:
`Business:
`Business Password
`
`OWner PaSSWOrd:
`Business:
`Business Password:
`Console Type:
`Location:
`Owner Access privilege;
`Others Access privilege:
`OWner:
`Owner PassWOrd:
`Business:
`Business Password:
`Console Type:
`Location:
`Owner Access privilege:
`Others Access privilege:
`
`None
`JS
`Ether
`Portable
`
`-303
`General
`Company
`
`317
`
`7-305
`Restricted
`
`319
`Attached Computer
`Module
`
`3O7
`
`321
`
`Y 309
`Private
`
`323
`
`Company
`
`F.G. 4
`
`None
`None
`None
`Desktop
`None
`None
`
`Sunshine
`JS
`Ether
`Private
`John Doe
`Sunshine
`JST
`Ether
`Desktop
`SFB3
`Private
`Compan
`Mary Li
`Vacation
`JS
`Ether
`Desktop
`AB1
`Private
`Compan
`
`
`
`
`
`Company's shared
`console
`
`s2a-N:
`John Does Hone
`
`
`
`329
`
`
`
`
`
`
`
`. .
`. . R
`coworkers office
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 8 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 5 of 24
`
`US RE45,140 E
`
`3 D
`A
`
`609
`
`?09
`
`?, ?9999
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 9 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 6 of 24
`
`US RE45,140 E
`
`
`
`?ôue] ssayppy
`
`suuelfiold
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`8ImpoW 18?nduJOO
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 10 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 7 of 24
`
`US RE45,140 E
`
`-700
`
`701
`
`703
`
`Power
`up
`
`Security
`Code
`
`706-N NO <Ds 705
`707 YES
`
`ACCeSS
`
`709
`
`Block a
`data Out
`716-NNO
`710
`Access
`Privilege
`
`Full
`access
`
`Peripheral
`storage
`Access
`Privilege Read-On
`
`708
`
`YES
`
`714
`
`711
`
`Access Peripheral
`Privilege Read-only
`
`712
`
`713
`
`Program
`
`data control
`
`takes Over
`
`Block at
`
`717
`
`Hardware
`
`
`
`Data
`Out to Storage
`device?
`
`723
`
`727
`
`731
`
`
`
`729
`
`Let Data
`Out
`
`FIG. 7
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 11 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 8 of 24
`
`US RE45,140 E
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 12 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 9 of 24
`
`US RE45,140 E
`
`NEW
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 13 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 10 of 24
`
`US RE45,140 E
`
`NEW
`
`ACM
`
`foto
`
`l4
`
`
`
`
`
`O
`
`Peripheral Console
`/aff
`
`
`
`
`
`A 20
`Systern
`Memory
`
`High
`Performance to
`Devices
`ISO
`Play
`Storage
`
`interface
`
`fgs
`
`enterconnection
`
`interface
`Support
`
`f02
`
`Storage
`He, 61
`Expansion - i.
`Slots
`
`Secondary Power Supply
`
`Primary Power Supply
`
`tol
`
`FIG. /O
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 14 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 11 of 24
`
`US RE45,140 E
`
`NEW
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`• • • • • • • • • • • • • •
`
`ONGESõE}}
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 15 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 12 of 24
`
`US RE45,140 E
`
`NEW
`
`
`
`- - - • • • • - - - -
`
`
`
`
`
`
`
`
`
`
`- ? ? ? ? ? -+ - - - - -
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 16 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 13 of 24
`
`US RE45,140 E
`
`W NE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`| 221
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 17 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 14 of 24
`
`US RE45,140 E
`
`NEW
`
`
`
`flash Menary
`sos
`Configuratory
`
`erot sts 632
`
`Meu Data Pash 627.62
`
`-2Es
`
`Ao(31:C out
`
`CUCN
`GP
`atchyar
`
`Wric Port Dists sists
`
`With For care
`
`FIG. It
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 18 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 15 of 24
`
`US RE45,140 E
`
`NEW
`
`
`
`160
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Secondary
`PC But
`
`
`
`South
`Brk
`
`RESET
`
`Widso
`Capture
`Circuit
`
`Wido
`Cock
`
`Pick C
`
`'-ty 120
`stars
`1122
`
`
`
`s
`Being All
`AD(31:0 out g Bratko to
`
`
`
`
`
`Conyer
`
`
`
`al
`codri
`Separate
`Data Path
`
`m
`
`s
`
`MASTER
`Rowr
`Conso
`
`Control
`Erief
`Merge
`a Path
`
`1142
`
`Seri
`
`Px3
`to
`
`cut CNT
`GPO
`II arriver
`-
`
`4v. is
`
`video Port Data fo:5
`
`Wides Port Contro
`
`to Serial
`Converte
`
`
`
`1182
`h183-M
`2. Widao Clock CS
`
`Cock
`doubkof
`
`
`
`WPCK
`
`F.G. 5
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 19 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 16 of 24
`
`US RE45,140 E
`
`NEW
`
`PCK
`
`
`
`PO1
`
`PD2 >>—( : Receiver
`
`
`
`PCK
`
`PD1
`
`PD2
`
`PO3
`
`PCN
`
`FIG. C.
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 20 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 17 of 24
`
`US RE45,140 E
`
`
`
`Computing System
`
`NEW
`
`f? OS
`
`CPUINB
`signals
`
`North Bridges Primary PCI Bus
`t
`PC Bus Bridge
`Interface
`with
`interface Dev,
`Controller
`Pai And PBS
`
`OS
`
`1
`
`s
`
`Peripheral System
`
`r
`
`Bridge signals:
`
`CPU/NB
`
`eaCe
`
`Controller
`
`s
`m Secondary PC Bus
`
`sple way a gas e
`
`PC Add
`on Board 2
`
`FIGURE If
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 21 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 18 of 24
`
`US RE45,140 E
`
`NEW
`
`Computing System
`
`
`
`integrated
`Host
`interface
`
`integrated
`Peripheral
`Interface
`Cnt, &
`S. Bridge
`
`Peripheral System
`
`Other Bus
`
`Device
`
`FIGURE 3
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 22 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 19 of 24
`
`US RE45,140 E
`
`NEW
`
`Attached Computer Module (ACM)
`
`Power
`
`Exchange interface
`System. Bus (XS Bus)
`-------
`Power Bus
`
`5 integrated CPU
`(or CPU Module)
`with North Bridge &
`Graphics Accelerator
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Wide Port
`
`Video Cutput
`
`Video Bis
`
`
`
`XPBus
`
`Peripheral Bus
`
`integrated
`South
`Bridge &
`Host
`interface
`Controller
`
`29
`Attached Computer Modale with integrated CPU?nB/Graphics and
`integrated HICSB
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 23 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 20 of 24
`
`US RE45,140 E
`
`NEW
`
`Attached Computer Module" (ACM)
`Power
`Regulator
`
`
`
`
`
`Exchange interface
`1. System Bus (XIS Bus)
`T Power BS
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`integrated CPU
`with core iogic,
`Graphics Accelerator,
`& frterface Controller
`
`Video Output
`
`Cache " |
`
`
`
`HDD
`
`-
`
`Video Bis
`Peripherat Bus
`
`Attached Computer Module with Single Chip fully integrated: CP1, Cache,
`Core logic, Graphics controller and Interface contrner
`
`F G. 2 O
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 24 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 21 of 24
`
`US RE45,140 E
`
`NEW
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`O)(f)(COCOOD off)
`Of
`O g
`O
`g
`Oldha
`CCCCC
`
`> >>
`-
`
`-
`
`SOJAT
`
`SOJA
`
`SOJA
`
`SOJAT
`
`s
`
`is
`
`co I I
`
`w
`y | || d
`
`l
`w
`
`co
`vs we
`Lll
`
`C
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 25 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 22 of 24
`
`US RE45,140 E
`
`NEW
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 26 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 23 of 24
`
`US RE45,140 E
`
`NEW
`
`Synch. To PCK
`
`10x clock rate
`
`Synch. To PCK
`
`10x clock rate
`
`Symbol
`GN
`I
`PORTN
`terto Periohea V
`PDO
`Computer to Peripheral LVDS Data O -
`PDO .
`GND
`PD1 RTN
`Computer to Peripheral LVDS Data 1
`PD1 - I
`GND
`PD2 RTN
`Computer to Peripheral LVDS Data2+
`PD2 +
`Computer to Peripheral LVDS Data2
`PD2 -
`GND
`PD3 RTN
`Computer to Peripheral LVDS Data 3 -
`PD3 -
`GND
`PCK RTN
`Computer to Peripheral LVDS Clock +
`PCK +
`Computer to Peripheral LVDS Clock -
`PCK -
`Fl
`GND
`PCN RTN
`Computer to Peripheral LVDS Control +
`PCN -
`Computer to Peripheral LVDS Control -
`PCN -
`PDRO RTN H GNO
`PDRO +
`Synch. TOPCKR
`Peripheral to Computer LVDS DataO +
`PORO -
`Peripheral to Computer LVDS Data O -
`PDR1 RTN
`GNO
`PDR1 +
`Peripheral to Computer LVDS Data 1 +
`PDR1 -
`Peripheral to Computer LVDS Data 1 -
`PDR2 RN
`GND
`PDR2 +
`Peripheral to Computer LVDS Data2+
`POR2 -
`Peripheral to Computer LVDS Data 2 -
`PDR3 RTN
`GND
`POR
`Peripheral to Computer LVDS Data 3 +
`POR3 -
`Peripheral to Computer LVDS Data 3 -
`PCKR RN H
`PCKR -
`Reverse Dir. Cock
`Clock rate
`Peripheral to Computer LVDS Clock +
`PCKR -
`Peripheral to Computer LVDS Clock -
`N s
`Peripheral to Computer LVDS Control -
`PCNR -
`Peripheral to Computer LVDS Control -
`RESETH
`
`1.
`2 T
`3
`4
`6
`7
`8
`9
`10
`12
`13
`
`
`
`34
`35
`
`C Ock
`
`Svrch. To PCK
`
`Synch. TOPCKR
`
`Synch. TOPCKR
`
`10 X clock rate
`
`Synch. To PCKR
`
`10 X clock rate
`
`Synch. To PCKR
`
`10 x Clock rate
`Asynchronous
`
`FG. 23
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 27 of 40
`
`U.S. Patent
`
`Sep. 16, 2014
`
`Sheet 24 of 24
`
`US RE45,140 E
`
`NEW
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 28 of 40
`
`1.
`DATA SECURITY METHOD AND DEVICE
`FOR COMPUTER MODULES
`
`US RE45,140 E
`
`appears in the
`Matter enclosed in heavy brackets
`original patent but forms no part of this reissue specifica
`tion; matter printed in italics indicates the additions
`made by reissue.
`
`10
`
`15
`
`Notice. More than one reissue application has been filed
`for the reissue of U.S. Pat. No. 6,643,777. The reissue appli
`cations are U.S. application Ser: Nos. 1 1/056,604 (a parent
`reissue application), 1 1/545,056 (which is a reissue continu
`ation of the parent reissue application), 1 2/561, 138 (which is
`a reissue continuation of the parent reissue application),
`13/294, 108 (which is a reissue continuation of U.S. applica
`tion Ser: No. 1 2/561, 138), 13/562,210 (which is a reissue
`continuation of U.S. application Ser: No. 1 3/294, 108);
`13/649,078 (which is a reissue continuation of U.S. applica
`tion Ser: 13/562,210) and 14/109,749 (the present applica
`tion, which is a reissue continuation of U.S. application Ser:
`No. 13/649,078).
`This application is a reissue continuation of U.S. applica
`tion Ser: No. 13/649,078, which is a reissue continuation of
`25
`U.S. application Ser: No. 1 3/562,210, which is a reissue con
`tinuation of U.S. application Ser: No. 13/294, 108, which is a
`reissue continuation of U.S. application Ser: No. 1 2/561, 138,
`which is a reissue continuation of U.S. application Ser: No.
`II/056,604, which is a reissue of U.S. Pat. No. 6,643,777,
`which are incorporated herein by reference.
`
`30
`
`BACKGROUND OF THE INVENTION
`
`The present invention relates to computing devices. More
`particularly, the present invention provides a method and
`device for securing a personal computer or set-top box.
`Merely by way of example, the present invention is applied to
`a modular computing environment for desktop computers,
`but it will be recognized that the invention has a much wider
`range of applicability. It can be applied to other portable or
`modular computing applications.
`Many desktop or personal computers, which are com
`monly termed PCs, have been around and used for over ten
`years. The PCs often come with state-of-art microprocessors
`such as the Intel PentiumTM microprocessor chips. They also
`include a hard or fixed disk drive including memory in the
`giga-byterange. Additionally, the PCs often include a random
`access memory integrated circuit device Such as a dynamic
`random access memory device, which is commonly termed
`DRAM. The DRAM devices now provide up to millions of
`memory cells (i.e., mega-bit) on a single slice of silicon. PCs
`also include a high resolution display Such as cathode ray
`tubes or CRTs. In most cases, the CRTs are at least 15 inches
`or 17 inches or 19 inches in diameter. High resolution flat
`panel displays are also used with PCs.
`Many external or peripheral devices can be used with the
`PCs. Among others, these peripheral devices include mass
`storage devices such as a ZipTM Drive product sold by Iomega
`Corporation of Utah. Other storage devices include external
`hard drives, tape drives, and others. Additional devices
`include communication devices Such as a modem, which can
`be used to link the PC to a wide area network of computers
`such as the Internet. Furthermore, the PC can include output
`devices such as a printer and other output means. Moreover,
`the PC can include special audio output devices such as
`speakers the like.
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`PCs also have easy to use keyboards, mouse input devices,
`and the like. The keyboard is generally configured similar to
`a typewriter format. The keyboard also has the length and
`width for easily inputting information by way of keys to the
`computer. The mouse also has a Sufficient size and shape to
`easily move a cursor on the display from one location to
`another location.
`Other types of computing devices include portable com
`puting devices such as "laptop' computers and the like.
`Although somewhat Successful, laptop computers have many
`limitations. These computing devices have expensive display
`technology. In fact, these devices often have a smaller flat
`panel display that has poor viewing characteristics. Addition
`ally, these devices also have poor input devices such as
`smaller keyboards and the like. Furthermore, these devices
`have limited commonplatforms to transfer information to and
`from these devices and other devices such as PCs.
`Up to now, there has been little common ground between
`these platforms including the PCs and laptops in terms of
`upgrading, ease-of-use, cost, performance, and the like.
`Many differences between these platforms, probably some
`what intentional, has benefited computer manufacturers at the
`cost of consumers. A drawback to having two separate com
`puters is that the user must often purchase both the desktop
`and laptop to have “total computing power, where the desk
`top serves as a “regular computer and the laptop serves as a
`"portable' computer. Purchasing both computers is often
`costly and runs “thousands of dollars. The user also wastes a
`significant amount of time transferring software and data
`between the two types of computers. For example, the user
`must often couple the portable computer to a local area net
`work (i.e., LAN), to a serial port with a modem and then
`manually transfer over files and data between the desktop and
`the portable computer. Alternatively, the user often must use
`floppy disks to "Zip' up files and programs that exceed the
`storage capacity of conventional floppy disks, and transfer the
`floppy disk data manually.
`Another drawback with the current model of separate por
`table and desktop computer is that the user has to spend
`money to buy components and peripherals the are duplicated
`in at least one of these computers. For example, both the
`desktop and portable computers typically include hard disk
`drives, floppy drives, CD-ROMs, computer memory, host
`processors, graphics accelerators, and the like. Because pro
`gram Software and Supporting programs generally must be
`installed upon both hard drives in order for the user to operate
`programs on the road and in the office, hard disk space is often
`wasted.
`One approach to reduce some of these drawbacks has been
`the use of a docking station with a portable computer. Here,
`the user has the portable computer for “on the road use and
`a docking station that houses the portable computer for office
`use. The docking station typically includes a separate moni
`tor, keyboard, mouse, and the like and is generally incompat
`ible with other desktop PCs. The docking station is also
`generally not compatible with portable computers of other
`Vendors. Another drawback to this approach is that the por
`table computer typically has lower performance and func
`tionality than a conventional desktop PC. For example, the
`processor of the portable is typically much slower than pro
`cessors in dedicated desktop computers, because of power
`consumption and heat dissipation concerns. As an example, it
`is noted that at the time of drafting of the present application,
`some top-of-the-line desktops include 400 MHZ processors,
`whereas top-of-the-line notebook computers include 266
`MHz processors.
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 29 of 40
`
`US RE45,140 E
`
`10
`
`3
`Another drawback to the docking station approach is that
`the typical cost of portable computers with docking stations
`can approach the cost of having a separate portable computer
`and a separate desktop computer. Further, as noted above,
`because different vendors of portable computers have propri
`etary docking stations, computer users are held captive by
`their investments and must rely upon the particular computer
`Vendor for future upgrades, support, and the like.
`To date, most personal computers provide data file security
`through software only. A wide variety of removable storage
`media are available for a personal computer. These removable
`media do not provide any access security protection in hard
`ware. Data encryption program often must be used for pro
`tection. Such program is cumbersome to handle for the user
`15
`requiring extra cost and time. Data encryption is more com
`monly used for communication over an unprotected network
`or the Internet. Having a large number offrequently used files
`managed by encryption software is not practical. Without
`Software security program, any file can be read and copied
`illegally from a hard disk drive on a PC or any removable
`media.
`PC architecture generally allows freedom of data flow
`between memory and peripheral devices within the allowed
`memory and I/O address spaces. In conventional PC archi
`tecture, a peripheral bus, i.e. PCI bus, is used to control all
`data transactions among peripheral devices. PCI bus allows
`any device to be a bus master and perform data transaction
`with another device. Also when a software program is in
`control, it can move data between any two devices. There is no
`hardware or protocol security mechanism on a standard
`peripheral bus such as PCI Bus to detect or block data trans
`actions. Operating system may have individual files read or
`write protected. These types of special security feature
`require significant additional user interaction to control. This
`is too cumbersome for a typical user to manage. There is no
`mechanism in current PCs to allow access to the primary hard
`disk drive and yet prevent copying of its content. The con
`ventional PC is a single machine that does not have a mecha
`nism to perform security ID matching in hardware.
`40
`Thus, what is needed are computer systems that provide
`improved security features to prevent illegal or unauthorized
`access to information.
`
`4
`In an alternative embodiment, the present invention pro
`vides a security protection method for a computer module.
`The method includes steps or acts of inserting the computer
`module into a console. Once the module has been inserted, the
`method initiates a security program in the module to read a
`security identification of the console and to read a security
`identification of the computer module. Based upon a relation
`ship of the console identification and the computer module
`identification, a predetermined security status is determined
`from, for example, a lookup table or the like. The method then
`selects the predetermined security status, which can be one of
`many. The method then operates the computer module based
`upon the security status.
`In a further alternative embodiment, the present invention
`provides a method for identifying a user for a computer mod
`ule. The method includes inserting a computer module into a
`console; and initiating a security program in memory of the
`computer module. The method prompts a plurality of input
`fields corresponding to respective input information on a user
`interface to be provided by a user of the computer module.
`Next, the method inputs the input information into the user
`interface of the computer module. The input information
`includes a user (e.g., owner) name, a user (e.g., owner) pass
`word, a business name, a business password, and a location.
`Still further, the present invention provides a system for
`secured information transactions, e.g., data security, elec
`tronic commerce, private communications. The system
`includes a console comprising a peripheral controller housed
`in the console. A user identification input device (e.g., key
`board, retinal reader, finger print reader, Voice recognition
`unit) is coupled to the peripheral controller. The user identi
`fication input device is provided for user identification data of
`the user. The system has an attached computer module
`coupled to the console. The attached computer module has a
`security memory device (e.g., flash memory device) stored
`with the user identification data.
`Numerous benefits are achieved using the present inven
`tion over previously existing techniques. The present inven
`tion provides mechanical and electrical security systems to
`prevent theft or unauthorized use of the computer system in a
`specific embodiment. Additionally, the present invention Sub
`stantially prevents accidental removal of the ACM from the
`console. In some embodiments, the present invention pre
`vents illegal or unauthorized use during transit. The present
`invention is also implemented using conventional technolo
`gies that can be provided in the present computer system in an
`easy and efficient manner. Depending upon the embodiment,
`one or more of these benefits can be available. These and other
`advantages or benefits are described throughout the present
`specification and are described more particularly below.
`These and other embodiments of the present invention, as
`well as its advantages and features, are described in more
`detail in conjunction with the text below and attached FIGS.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a simplified diagram of a computer system
`according to an embodiment of the present invention;
`FIG. 2 is a simplified diagram of a computer module
`according to an embodiment of the present invention;
`FIG. 3 is a simplified top-view diagram of a computer
`module according to an embodiment of the present invention;
`FIG. 4 is a simplified illustration of security systems
`according to embodiments of the present invention;
`FIG. 5 is a simplified diagram of a computer module in a
`console according to an embodiment of the present invention;
`
`25
`
`30
`
`35
`
`SUMMARY OF THE INVENTION
`
`45
`
`According to the present invention, a technique including a
`method and device for securing a computer module in a
`computer system is provided. In an exemplary embodiment,
`the present invention provides a security system for an
`attached computer module (ACM). In an embodiment, the
`ACM inserts into a computer module bay (CMB) within a
`peripheral console to form a functional computer. A security
`program reads an identification number in a security memory
`device to determine a security level of the ACM according to
`one embodiment.
`In a specific embodiment, the present invention provides a
`system for secured information transactions. The system has
`a console (e.g., computer housing) comprising a peripheral
`controller housed in the console; and a security memory
`device (e.g., flash memory device) coupled to the peripheral
`controller. The system also has an attached computer module
`(i.e., a removable module with memory and microprocessor)
`coupled to the console. The attached computer module has a
`host interface controller housed within the attached computer
`module to interface to the security memory device through
`the peripheral controller.
`
`50
`
`55
`
`60
`
`65
`
`
`
`Case 6:20-cv-00967 Document 1-8 Filed 10/15/20 Page 30 of 40
`
`US RE45,140 E
`
`10
`
`15
`
`5
`FIG. 6 is a simplified diagram of a security method for a
`module according to an embodiment of the present invention;
`and
`FIG. 7 is a simplified diagram of a method according to an
`embodiment of the present invention.
`FIG. 8 is a simplified diagram of a system 800 according to
`an alternative embodiment of the present application.
`FIG. 9 depicts a peripheral console configuration.
`FIG. I0 is a block diagram of one embodiment of a com
`p