`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 1 of 40
`
`(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)9(cid:3)
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 2 of 40
`
`(19) United States
`(12) Reissued Patent
`Chu
`
`USOORE44654E
`
`US RE44,654 E
`(10) Patent Number:
`*Dec. 17, 2013
`(45) Date of Reissued Patent:
`
`(54) DATA SECURITY METHOD AND DEVICE
`FOR COMPUTER MODULES
`
`(71) Applicant: ACQIS LLC, McKinney, TX (US)
`
`(72) Inventor: William W.Y. Chu, Los Altos, CA (US)
`(73) Assignee: ACQIS LLC, McKinney, TX (US)
`
`(*) Notice:
`
`This patent is subject to a terminal dis
`claimer.
`
`(21) Appl. No.: 13/649,078
`
`(22) Filed:
`
`Oct. 10, 2012
`Related U.S. Patent Documents
`
`6,634,777
`Nov. 4, 2003
`09/312,199
`May 14, 1999
`
`Reissue of:
`(64) Patent No.:
`Issued:
`Appl. No.:
`Filed:
`U.S. Applications:
`(63) Continuation of application No. 13/562.210, filed on
`Jul. 30, 2012, which is a continuation of application
`No. 13/294,108, filed on Nov. 10, 2011, now Pat. No.
`Re. 43,602, which is a continuation of application No.
`12/561,138, filed on Sep. 16, 2009, now Pat. No. Re.
`42.984, which is a continuation of application No.
`1 1/545,056, filed on Oct. 6, 2006, now Pat. No. Re.
`43,171, which is a continuation of application No.
`11/056,604, filed on Feb. 10, 2005, now Pat. No. Re.
`41,092.
`(51) Int. Cl.
`G06F 12/00
`(52) U.S. Cl
`USPC ............................................... 726/16; 726/20
`
`(2006.01)
`
`(58) Field of Classification Search
`USPC .......... 726/2-9, 16–21, 34, 36; 713/182-183,
`713/192-194; 710/1, 7, 8, 15, 20, 22, 100;
`712/1, 220
`See application file for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`4,623,964 A * 1 1/1986 Getz et al. ......................... 705/1
`4,769,764 A
`9, 1988 Levanon
`4,799,258 A
`1/1989 Davies
`5,056,141 A * 10/1991 Dyke ........................... 340,527
`5,086,499 A
`2f1992 Mutone
`5,103,446 A
`4, 1992 Fischer
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`JP
`
`T 1996
`O722138 A1
`10, 1994
`6-289953
`(Continued)
`OTHER PUBLICATIONS
`
`Boosten, “Transmission Overhead and Optimal Packet Size', Mar.
`11, 1998, printed on: Jan. 28, 2011, 2 pgs.
`Primary Examiner — Hosuk Song
`(74) Attorney, Agent, or Firm — Cooley LLP
`(57)
`ABSTRACT
`A security method for an attached computer module in a
`computer system. The security method reads a security iden
`tification number in an attached computer module and com
`pares it to a security identification number in a console, which
`houses the attached computer module. Based upon a relation
`ship between these numbers, a security status is selected. The
`security status determines the security level of operating the
`computer system.
`23 Claims, 24 Drawing Sheets
`
`-
`
`4O
`Computer
`Module Boy
`
`
`
`
`
`S
`S
`S
`2
`-2O
`a
`5 insert C2. Desktop
`3.
`t = Sas Peripheral
`e
`Console
`of \ Attached
`
`
`
`Computer
`Module
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 3 of 40
`
`US RE44,654 E
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3/1993 Woodbury et al.
`5, 191581 A
`3, 1993 Lord
`5,198.806 A
`6, 1994 Takeda
`5,319,771 A
`5,463,742 A 10/1995 Kobayashi
`5,519,843. A
`5, 1996 Moran et al.
`5,539,616 A
`7, 1996 Kikinis
`5,546.463. A
`8/1996 Caputo et al.
`5,550,861 A
`8, 1996 Chan et al.
`5,572,441. A 1 1/1996 Boie
`5,590,377 A 12/1996 Smith
`5,608,608 A
`3, 1997 Flint et al.
`5,623,637 A
`4/1997 Jones et al.
`5,638,521 A
`6, 1997 Buchala et al.
`5,640,302 A
`6, 1997 Kikinis
`5,648,762 A
`7, 1997 Ichimura et al.
`5,689,654. A 1 1/1997 Kikinis et al.
`5,721,842 A
`2/1998 Beasley et al.
`5,742,840 A
`4, 1998 Hansen et al. ................ T12/210
`5,751,711 A
`5, 1998 Sakaue
`5,751,950 A
`5, 1998 Crisan
`5,764,924 A
`6/1998 Hong
`5,774,704 A
`6, 1998 Williams
`5,815,681 A
`9, 1998 Kikinis
`5,838,932 A 1 1/1998 Alzien
`5,857,085 A
`1/1999 Zhang et al.
`5,862,381 A
`1/1999 Advani et al.
`5,878,211 A
`3/1999 Delagrange et al.
`5,884,049 A
`3, 1999 Atkinson
`5,907,566 A
`5, 1999 Benson et al.
`5,909,559 A
`6, 1999 SO
`5,933,609 A
`8, 1999 Walker et al.
`5,935,226 A
`8, 1999 Klein
`5,941,965 A
`8, 1999 Moroz et al.
`5.974.486 A 10/1999 Siddappa
`5,978,919 A 1 1/1999 Doi et al.
`5.991,833. A 1 1/1999 Wandler et al.
`5.999,476 A 12/1999 Dutton et al.
`5.999,952 A 12/1999 Jenkins et al.
`6,006,243 A 12/1999 Karidis
`6,012,145 A
`1/2000 Mathers et al.
`6,025,989 A
`2/2000 Ayd et al.
`6,029, 183 A
`2, 2000 Jenkins et al.
`6,038,621 A
`3, 2000 Gale et al.
`6,046,571 A
`4/2000 Bovio et al.
`6,069,615 A
`5, 2000 Abraham et al.
`6,070,214 A
`5, 2000 Ahern
`6,104,921 A
`8/2000 Cosley et al.
`6,157.534. A 12/2000 Gallagher et al.
`6,161,157 A 12/2000 Tripathi
`6,161,524. A 12/2000 Akbarian et al.
`6,199,134 B1
`3/2001 Deschepper et al.
`6,202,115 B1
`3/2001 Khosrowpour
`6,202,169 B1
`3/2001 Razzaghe-Ashrafi et al.
`6,216,185 B1
`4/2001 Chu
`6,226,700 B1
`5/2001 Wandler et al.
`6.256,689 B1
`7/2001 Khosrowpour
`6,266,539 B1
`7, 2001 Pardo
`
`10/2001 Krull et al.
`6,301,637 B1
`10/2001 Schneider et al.
`6,304,895 B1
`6,311,268 B1 10/2001 Chu
`6,314,522 B1 1 1/2001 Chu
`6,321,335 B1 1 1/2001 Chu
`6,324,605 B1
`1 1/2001 Rafferty et al.
`6,332,180 B1
`12/2001 Kauffman et al.
`6,345.330 B2
`2/2002 Chu
`6,366,951 B1
`4/2002 Schmidt
`6,378,009 B1
`4/2002 Pinkston, II et al.
`6,381,602 B1 * 4/2002 Shoroffet al. .................... 707/9
`6,393,561 B1* 5/2002 Hagiwara et al. ............. T13/100
`6,401,124 B1
`6/2002 Yang et al.
`6,452,790 B1
`9/2002 Chu
`6,453,344 B1
`9, 2002 Ellsworth et al.
`6,460,106 B1
`10/2002 Stufflebeam
`6,487.614 B2 * 1 1/2002 Nobutani et al. ............... T10/20
`6,496,361 B2 * 12/2002 Kim et al. ..................... 361 (683
`6,549,966 B1
`4/2003 Dickens et al.
`6,643,777 B1 1 1/2003 Chu
`6,718,415 B1
`4/2004 Chu
`6,900,847 B1 *
`5/2005 Agneta et al. ................. 348,552
`7,099,981 B2
`8/2006 Chu
`7,146,446 B2 12/2006 Chu
`7,328,297 B2
`2, 2008 Chu
`7,363,415 B2
`4/2008 Chu
`7,363.416 B2
`4/2008 Chu
`7,376,779 B2
`5/2008 Chu
`RE41,076 E
`1, 2010 Chu
`RE41,092 E
`1, 2010 Chu
`7,676,624 B2
`3/2010 Chu
`RE41,294 E
`4/2010 Chu
`7,818,487 B2 10/2010 Chu
`RE41,961 E
`11/2010 Chu
`RE42,814 E
`10/2011 Chu
`8,041,873 B2 10/2011 Chu
`RE42.984 E
`11/2011 Chu
`RE43,119 E
`1/2012 Chu
`RE43,171 E
`2, 2012 Chu
`8,234,436 B2
`7/2012 Chu
`2001 0011312 A1
`8, 2001 Chu
`2004/0177200 A1
`9, 2004 Chu
`2005/0174729 A1
`8, 2005 Chu
`2005, 0182882 A1
`8, 2005 Chu
`2005/O1955.75 A1
`9, 2005 Chu
`2005/0204083 A1
`9, 2005 Chu
`2005.0246469 A1 11/2005 Chu
`2006/0265361 A1 11, 2006 Chu
`2008/0244149 A1 10, 2008 Chu
`2009. O157939 A1
`6, 2009 Chu
`2010/0174844 A1
`7, 2010 Chu
`2011/0208893 A1
`8, 2011 Chu
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`WO
`
`WO92, 18924
`WO94/OO970
`WO95/13640
`
`10, 1992
`1, 1994
`5, 1995
`
`* cited by examiner
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 4 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 1 of 24
`
`US RE44,654 E
`
`
`
`
`
`Attached
`Computer
`Module
`
`AIG /
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 5 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 2 of 24
`
`US RE44,654 E
`
`
`
`a?Lock
`
`5
`
`Opening for
`Engoging Lock
`
`A/6 2
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 6 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 3 of 24
`
`US RE44,654 E
`
`7
`
`7
`
`Yaxy tax
`
`O
`
`1.
`
`i
`
`(1723")
`
`Width:
`46 in
`(5,748")
`
`i-435
`Depth:
`25mm
`(92.3")
`Power
`Regulator
`--437
`Mein circuit
`boord
`
`a ra
`- - - -
`
`Component
`underneath
`
`Connection to
`lock control
`
`s
`
`Flash legin
`Host ---
`SysOSond
`interface
`Password
`Controlleri
`ty.--
`lock
`1.
`4O3 Control
`4O
`
`N4O5
`
`CPU Module
`(6.4mm)
`
`3/2" hard
`Drive 254mm)
`
`4OO
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`-------------
`
`-------------
`
`Y42
`
`- 425
`
`A76, 3
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 7 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 4 of 24
`
`US RE44,654 E
`
`
`
`
`
`
`
`-300
`-301
`Access Privilege
`
`r 313
`
`Owner:
`Owner Password:
`Business:
`Business PaSSWOrd;
`Console Type:
`Location:
`Access privile
`
`Owner PaSSWOrd:
`Business.
`Business Password:
`Console Type:
`Location:
`ACCeSS privilege:
`OWner
`Owner PaSSWOrd:
`Business:
`Business Password:
`Access privilege:
`OWiner:
`Owner PaSSWOrd:
`Business:
`Business Password:
`Console Type:
`Ocation:
`Owner Access privilege;
`
`
`
`OWner:
`Owner Password:
`Business:
`Business Password:
`Console Type:
`Location:
`Owner Access privilege:
`Others Access privilege:
`
`None
`JST
`Ether
`Portable
`None
`
`None
`None
`Desktop
`None
`None
`
`Sunshine
`JS
`Ether
`Private
`John Doe
`Sunshine
`JST
`Eher
`Desktop
`SFB3
`Private
`
`Vacation
`S
`Ether
`Desktop
`
`-303
`General
`Company
`
`317
`
`-305
`Restricted
`
`319
`Attached Computer
`Module
`
`321
`
`3O7
`
`309
`Priyfe
`
`323
`
`-31
`General
`Company
`
`F.G. 4
`
`
`
`Company's shared
`console
`
`329
`
`
`
`
`
`
`
`Coworkers Office
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 8 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 5 of 24
`
`US RE44,654 E
`
`
`
`999
`
`919
`
`
`
`9091 EGIT?S?TST?l
`
`
`
`Sng/žg Z09
`
`Sng
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 9 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 6 of 24
`
`US RE44,654 E
`
`
`
`?ôue] sselppy
`
`619/
`
`96ue)
`
`
`
`?ôue] sseyppy
`
`Sulejfiold
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 10 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 7 of 24
`
`US RE44,654 E
`
`-700
`
`Power
`up
`
`Security
`Code
`
`1
`70
`
`
`
`3 70
`
`705
`
`ACCeSS
`
`707 YES
`
`709
`
`Block at
`data Out
`716-NNO
`710
`Access
`Privilege
`
`Full
`access
`
`Peripheral
`Access
`storage
`Privilege R.
`
`708
`
`YES
`
`714
`
`711
`
`Access Peripheral
`Privilege Read-only
`
`719
`
`Program
`data Controt
`
`712
`
`713
`
`715
`
`takes over
`
`Block all
`data out
`
`Program
`data Control
`
`Hardware
`
`731-N NO
`729
`
`
`
`Data
`Out to Storage
`device
`
`723
`
`Let Data
`Out
`
`727
`
`F.G. 7
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 11 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 8 of 24
`
`US RE44,654 E
`
`
`
`908
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 12 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 9 of 24
`
`US RE44,654 E
`
`NEW
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 13 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 10 of 24
`
`US RE44,654 E
`
`NEW
`
`
`
`>
`Peripheral Console
`taff
`
`interface
`ad
`Support
`
`list
`
`Expansion - it'll
`Slots
`
`Secondary Power Supply
`
`Primary Power Supply
`
`tol
`
`FIG. /O
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 14 of 40
`
`U.S. Patent
`
`US RE44,654 E
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 15 of 40
`
`U.S. Patent
`
`US RE44,654 E
`
`
`
`Š
`
`S. N
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 16 of 40
`
`U.S. Patent
`
`US RE44,654 E
`
`one’
`
`
`
`
`
`N
`CD
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 17 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 14 of 24
`
`US RE44,654 E
`
`NEW
`
`
`
`Flash Memory
`SOs
`Configuratory
`
`r
`Estad
`Merge
`
`CPCN
`GP
`athrya
`
`690 Writo Port Dists 3: 5
`
`Wido For control
`
`FIG. It
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 18 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 15 of 24
`
`US RE44,654 E
`
`
`
`NEW
`
`Parseilo Seria 33
`Cowart
`f
`
`PCNR
`
`R
`
`ep
`
`RESE
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 19 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 16 of 24
`
`US RE44,654 E
`
`NEW
`
`PCK
`
`
`
`
`
`PO1
`
`PD2
`
`PO3
`
`PCN -o-
`
`PCK
`
`PO1
`
`PD2
`
`PO3
`
`PCN
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 20 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 17 of 24
`
`US RE44,654 E
`
`Computing System
`
`
`
`NEW
`
`f
`
`CPUINB
`signals
`
`OS
`
`s
`
`t
`PCI Bus Bridge
`ine 1 '' interface Dev
`
`Controller
`
`Pair And PBLS
`
`Peripheral System
`
`Peripheral
`interface
`Controller
`
`FIGURE If
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 21 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 18 of 24
`
`US RE44,654 E
`
`NEW
`
`
`
`Computing System
`
`Graphics
`Subsystem
`
`Peripheral System
`
`Other Bus
`
`integrated
`Host
`interface
`Cntir. &
`North Bridge
`
`integrated
`Peripheral
`Interface
`Cntir, 8.
`S. Bridge
`
`FIGURE 3
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 22 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 19 of 24
`
`US RE44,654 E
`
`
`
`5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`NEW
`
`Attached Computer Module
`
`(ACM)
`
`Power
`
`W
`
`Exchangs interface
`System. Bus (XS Bus)
`
`aaaaaaaaaaaaa-raruare
`Power Bus
`
`integrated CPU
`(or CPU Module
`with North Bridge &
`Graphics Accelerator
`
`Video Cutput
`
`Video Bis
`
`
`
`Peripheral Bus
`
`integrated
`South
`Bridge &
`Host
`interface
`Controller
`
`29
`Attached Computer Modale with integrated CPU?nB/Graphics and
`integrated HICISB
`
`FIG. It
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 23 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 20 of 24
`
`US RE44,654 E
`
`NEW
`
`Attached Computer Module" (ACM)
`POWer
`Regulator
`
`
`
`
`
`Exchange interface
`1. System. Bus (XIS Bus)
`" Power Bus
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`integrated CPU
`with core iogic,
`Graphics Accelerator,
`& frterface Controller
`
`Video Outp:
`
`Cache
`
`Memory
`
`HHDD
`
`
`
`-
`
`Video Bis
`Periphera Bus
`
`Attached Computer Module with Single Chip fully integrated: CPU, Cathe,
`Core logic, Graphics controller and Interface controller
`
`F. G. 2 O
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 24 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 21 of 24
`
`US RE44,654 E
`
`NE
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 25 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 22 of 24
`
`US RE44,654 E
`
`NEAf
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 26 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 23 of 24
`
`US RE44,654 E
`
`NEAf
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5
`
`Sir PCKERN
`KR-.
`33
`
`
`
`
`
`... :QRite.ia. Eecipietally QS Rasat
`ionisterfeitheast. SRaisi.
`
`Cock '8te.
`
`Over
`
`3 WS 8ta 3
`CN
`Scotingsteric Perihetail VES Ciecki
`Scottiglie.g. seigerally Sciack.
`N
`aily S.C.R.Q.
`
`Feriphera to sinute
`Feripteratics: Ruter WS Rats i.
`
`Asynchronous
`
`FG 23
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 27 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 24 of 24
`
`US RE44,654 E
`
`NF
`
`
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 28 of 40
`
`1.
`DATA SECURITY METHOD AND DEVICE
`FOR COMPUTER MODULES
`
`US RE44,654 E
`
`appears in the
`Matter enclosed in heavy brackets
`original patent but forms no part of this reissue specifica
`tion; matter printed in italics indicates the additions
`made by reissue.
`
`10
`
`15
`
`Notice. More than one reissue application has been filed
`for the reissue of U.S. Pat. No. 6,643,777. The reissue appli
`cations are U.S. application Ser: No. 1 1/056,604 (a parent
`reissue application), Ser: No. 1 1/545,056 (which is a reissue
`continuation of the parent reissue application), Ser: No.
`1 2/561, 138 (which is a reissue continuation of the parent
`reissue application), Ser: No. 13/294, 108 (which is a reissue
`continuation of U.S. application Ser: No. 1 2/561, 138), Ser:
`No. 1 3/562,210 (which is a reissue continuation of U.S.
`application Ser: No. 13/294, 108); and Ser: No. 13/649,078
`(the present application, which is a reissue continuation of
`U.S. application Ser: No. 1 3/562,210).
`This application is a reissue continuation of U.S. applica
`tion Ser: No. 1 3/562,210, which is a reissue continuation of
`U.S. application Ser: No. 13/294, 108, which is a reissue con
`25
`tinuation of U.S. application Ser: No. 1 2/561, 138, which is a
`reissue continuation of U.S. application Ser: No. 1 1/056,604,
`which is a reissue of U.S. Pat. No. 6,643,777, which are
`incorporated herein by reference.
`
`30
`
`BACKGROUND OF THE INVENTION
`
`35
`
`45
`
`The present invention relates to computing devices. More
`particularly, the present invention provides a method and
`device for securing a personal computer or set-top box.
`Merely by way of example, the present invention is applied to
`a modular computing environment for desktop computers,
`but it will be recognized that the invention has a much wider
`range of applicability. It can be applied to other portable or
`modular computing applications.
`40
`Many desktop or personal computers, which are com
`monly termed PCs, have been around and used for over ten
`years. The PCs often come with state-of-art microprocessors
`such as the Intel PentiumTM microprocessor chips. They also
`include a hard or fixed disk drive including memory in the
`giga-byterange. Additionally, the PCs often include a random
`access memory integrated circuit device Such as a dynamic
`random access memory device, which is commonly termed
`DRAM. The DRAM devices now provide up to millions of
`memory cells (i.e., mega-bit) on a single slice of silicon. PCs
`also include a high resolution display Such as cathode ray
`tubes or CRTs. In most cases, the CRTs are at least 15 inches
`or 17 inches or 19 inches in diameter. High resolution flat
`panel displays are also used with PCs.
`Many external or peripheral devices can be used with the
`PCs. Among others, these peripheral devices include mass
`storage devices such as a ZipTM Drive product sold by Iomega
`Corporation of Utah. Other storage devices include external
`hard drives, tape drives, and others. Additional devices
`include communication devices Such as a modem, which can
`be used to link the PC to a wide area network of computers
`such as the Internet. Furthermore, the PC can include output
`devices such as a printer and other output means. Moreover,
`the PC can include special audio output devices such as
`speakers the like.
`PCs also have easy to use keyboards, mouse input devices,
`and the like. The keyboard is generally configured similar to
`
`50
`
`55
`
`60
`
`65
`
`2
`a typewriter format. The keyboard also has the length and
`width for easily inputting information by way of keys to the
`computer. The mouse also has a Sufficient size and shape to
`easily move a cursor on the display from one location to
`another location.
`Other types of computing devices include portable com
`puting devices such as "laptop' computers and the like.
`Although somewhat Successful, laptop computers have many
`limitations. These computing devices have expensive display
`technology. In fact, these devices often have a smaller flat
`panel display that has poor viewing characteristics. Addition
`ally, these devices also have poor input devices such as
`smaller keyboards and the like. Furthermore, these devices
`have limited commonplatforms to transfer information to and
`from these devices and other devices such as PCs.
`Up to now, there has been little common ground between
`these platforms including the PCs and laptops in terms of
`upgrading, ease-of-use, cost, performance, and the like.
`Many differences between these platforms, probably some
`what intentional, has benefited computer manufacturers at the
`cost of consumers. A drawback to having two separate com
`puters is that the user must often purchase both the desktop
`and laptop to have “total computing power, where the desk
`top serves as a “regular computer and the laptop serves as a
`"portable' computer. Purchasing both computers is often
`costly and runs “thousands of dollars. The user also wastes a
`significant amount of time transferring software and data
`between the two types of computers. For example, the user
`must often couple the portable computer to a local area net
`work (i.e., LAN), to a serial port with a modem and then
`manually transfer over files and data between the desktop and
`the portable computer. Alternatively, the user often must use
`floppy disks to "Zip' up files and programs that exceed the
`storage capacity of conventional floppy disks, and transfer the
`floppy disk data manually.
`Another drawback with the current model of separate por
`table and desktop computer is that the user has to spend
`money to buy components and peripherals the are duplicated
`in at least one of these computers. For example, both the
`desktop and portable computers typically include hard disk
`drives, floppy drives, CD-ROMs, computer memory, host
`processors, graphics accelerators, and the like. Because pro
`gram Software and Supporting programs generally must be
`installed upon both hard drives in order for the user to operate
`programs on the road and in the office, hard disk space is often
`wasted.
`One approach to reduce some of these drawbacks has been
`the use of a docking station with a portable computer. Here,
`the user has the portable computer for “on the road use and
`a docking station that houses the portable computer for office
`use. The docking station typically includes a separate moni
`tor, keyboard, mouse, and the like and is generally incompat
`ible with other desktop PCs. The docking station is also
`generally not compatible with portable computers of other
`Vendors. Another drawback to this approach is that the por
`table computer typically has lower performance and func
`tionality than a conventional desktop PC. For example, the
`processor of the portable is typically much slower than pro
`cessors in dedicated desktop computers, because of power
`consumption and heat dissipation concerns. As an example, it
`is noted that at the time of drafting of the present application,
`some top-of-the-line desktops include 400 MHZ processors,
`whereas top-of-the-line notebook computers include 266
`MHz processors.
`Another drawback to the docking station approach is that
`the typical cost of portable computers with docking stations
`can approach the cost of having a separate portable computer
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 29 of 40
`
`US RE44,654 E
`
`10
`
`15
`
`3
`and a separate desktop computer. Further, as noted above,
`because different vendors of portable computers have propri
`etary docking stations, computer users are held captive by
`their investments and must rely upon the particular computer
`Vendor for future upgrades, support, and the like.
`To date, most personal computers provide data file security
`through software only. A wide variety of removable storage
`media are available for a personal computer. These removable
`media do not provide any access security protection in hard
`ware. Data encryption program often must be used for pro
`tection. Such program is cumbersome to handle for the user
`requiring extra cost and time. Data encryption is more com
`monly used for communication over an unprotected network
`or the Internet. Having a large number offrequently used files
`managed by encryption software is not practical. Without
`Software security program, any file can be read and copied
`illegally from a hard disk drive on a PC or any removable
`media.
`PC architecture generally allows freedom of data flow
`between memory and peripheral devices within the allowed
`memory and I/O address spaces. In conventional PC archi
`tecture, a peripheral bus, i.e. PCI bus, is used to control all
`data transactions among peripheral devices. PCI bus allows
`any device to be a bus master and perform data transaction
`with another device. Also when a software program is in
`control, it can move data between any two devices. There is no
`hardware or protocol security mechanism on a standard
`peripheral bus such as PCI Bus to detect or block data trans
`actions. Operating system may have individual files read or
`write protected. These types of special security feature
`require significant additional user interaction to control. This
`is too cumbersome for a typical user to manage. There is no
`mechanism in current PCs to allow access to the primary hard
`disk drive and yet prevent copying of its content. The con
`ventional PC is a single machine that does not have a mecha
`nism to perform security ID matching in hardware.
`Thus, what is needed are computer systems that provide
`improved security features to prevent illegal or unauthorized
`access to information.
`
`4
`method initiates a security program in the module to read a
`security identification of the console and to read a security
`identification of the computer module. Based upon a relation
`ship of the console identification and the computer module
`identification, a predetermined security status is determined
`from, for example, a lookup table or the like. The method then
`selects the predetermined security status, which can be one of
`many. The method then operates the computer module based
`upon the security status.
`In a further alternative embodiment, the present invention
`provides a method for identifying a user for a computer mod
`ule. The method includes inserting a computer module into a
`console; and initiating a security program in memory of the
`computer module. The method prompts a plurality of input
`fields corresponding to respective input information on a user
`interface to be provided by a user of the computer module.
`Next, the method inputs the input information into the user
`interface of the computer module. The input information
`includes a user (e.g., owner) name, a user (e.g., owner) pass
`word, a business name, a business password, and a location.
`Still further, the present invention provides a system for
`secured information transactions, e.g., data security, elec
`tronic commerce, private communications. The system
`includes a console comprising a peripheral controller housed
`in the console. A user identification input device (e.g., key
`board, retinal reader, finger print reader, Voice recognition
`unit) is coupled to the peripheral controller. The user identi
`fication input device is provided for user identification data of
`the user. The system has an attached computer module
`coupled to the console. The attached computer module has a
`security memory device (e.g., flash memory device) stored
`with the user identification data.
`Numerous benefits are achieved using the present inven
`tion over previously existing techniques. The present inven
`tion provides mechanical and electrical security systems to
`prevent theft or unauthorized use of the computer system in a
`specific embodiment. Additionally, the present invention Sub
`stantially prevents accidental removal of the ACM from the
`console. In some embodiments, the present invention pre
`vents illegal or unauthorized use during transit. The present
`invention is also implemented using conventional technolo
`gies that can be provided in the present computer system in an
`easy and efficient manner. Depending upon the embodiment,
`one or more of these benefits can be available. These and other
`advantages or benefits are described throughout the present
`specification and are described more particularly below.
`These and other embodiments of the present invention, as
`well as its advantages and features, are described in more
`detail in conjunction with the text below and attached FIGS.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a simplified diagram of a computer system
`according to an embodiment of the present invention;
`FIG. 2 is a simplified diagram of a computer module
`according to an embodiment of the present invention;
`FIG. 3 is a simplified top-view diagram of a computer
`module according to an embodiment of the present invention;
`FIG. 4 is a simplified illustration of security systems
`according to embodiments of the present invention;
`FIG. 5 is a simplified diagram of a computer module in a
`console according to an embodiment of the present invention;
`FIG. 6 is a simplified diagram of a security method for a
`module according to an embodiment of the present invention;
`and
`FIG. 7 is a simplified diagram of a method according to an
`embodiment of the present invention.
`
`25
`
`30
`
`35
`
`SUMMARY OF THE INVENTION
`
`According to the present invention, a technique including a
`method and device for securing a computer module in a
`computer system is provided. In an exemplary embodiment,
`the present invention provides a security system for an
`attached computer module (ACM). In an embodiment, the
`ACM inserts into a computer module bay (CMB) within a
`peripheral console to form a functional computer. A security
`program reads an identification number in a security memory
`device to determine a security level of the ACM according to
`one embodiment.
`In a specific embodiment, the present invention provides a
`system for secured information transactions. The system has
`a console (e.g., computer housing) comprising a peripheral
`controller housed in the console; and a security memory
`device (e.g., flash memory device) coupled to the peripheral
`controller. The system also has an attached computer module
`(i.e., a removable module with memory and microprocessor)
`coupled to the console. The attached computer module has a
`host interface controller housed within the attached computer
`module to interface to the security memory device through
`the peripheral controller.
`In an alternative embodiment, the present invention pro
`vides a security protection method for a computer module.
`The method includes steps or acts of inserting the computer
`module into a console. Once the module has been inserted, the
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`
`
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 30 of 40
`
`US RE44,654 E
`
`6
`In a preferred embodiment, the present system has a secu
`rity system, which includes a mechanical locking system, an
`electrical locking system, and others. The mechanical locking
`system includes at least a key 11. The key 11 mates with key
`hole 13 in a lock, which provides a mechanical latch 15 in a
`closed position. The mechanical latch, in the closed position,
`mates and interlocks the ACM to the computer module bay.
`The mechanical latch, which also has an open position, allows
`the ACM to be removed from the computer module bay.
`Further details of the mechanical locking system are shown in
`the FIG. below.
`FIG. 2 is a simplified diagram of a computer module 10
`according to an embodiment of the present invention. This
`diagram is merely an illustration and should not limit the
`scope of the claims herein. One of ordinary skill in the art
`would recognize other variations, modifications, and alterna
`tives. Some of the reference numerals are similar to the pre
`vious FIG. for easy reading. The computer module 10
`includes key 11, which is insertable into keyhole 13 of the
`lock. The lock has at least two position, including a latched or
`closed position and an unlatched or open position. The
`latched position secures the ACM to the computer module
`bay. The unlatched or open position allows the ACM to be
`inserted into or removed from the computer bay module. As
`shown, the ACM also has a slot or opening 14, which allows
`the latch to move into and out of the ACM. The ACM also has
`openings 17 in the backside for an electrical and/or mechani
`cal connection to the computer module bay, which is con
`nected to the console.
`FIG. 3 is a simplified top-view diagram 10 of a computer
`module for computer system according to an embodiment of
`the present invention. This diagram is merely an illustration
`and should not limit the scope of the claims herein. One of
`ordinary skill in the art would recognize other variations,
`modifications, and alternatives. The layout diagram illus
`trates the top-view of the module 10, where the backside
`components (e.g., Host Interface Controller) are depicted in
`dashed lines. The layout diagram has a first portion, which
`includes a central processing unit (“CPU) module 400, and
`a second portion, which includes a hard drive module 420. A
`common printed circuit board 437 houses these modules and
`the like. Among other features, the ACM includes the central
`processing unit module 400 with a cache memory 405, which
`is coupled to a north bridge unit 421, and a host interface
`controller 401. The host interface controller includes a lock
`control 403. As shown, the CPU module is disposed on a first
`portion of the attached computer module, and couples to
`connectors 17. Here, the CPU module is spatially located near
`connector 17.
`The CPU module can use a Suitable microprocessing unit,
`microcontroller, digital signal processor, and the like. In a
`specific embodiment, the CPU module uses, for example, a
`400 MHZ Pentium II microprocessor module from Intel Cor
`poration and like microprocessors from AMD Corporation,
`Cyrix Corporation (now National Semiconductor Corpora
`tion), and others. In other