throbber
Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 1 of 40
`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 1 of 40
`
`(cid:40)(cid:91)(cid:75)(cid:76)(cid:69)(cid:76)(cid:87)(cid:3)9(cid:3)
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 2 of 40
`
`(19) United States
`(12) Reissued Patent
`Chu
`
`USOORE44654E
`
`US RE44,654 E
`(10) Patent Number:
`*Dec. 17, 2013
`(45) Date of Reissued Patent:
`
`(54) DATA SECURITY METHOD AND DEVICE
`FOR COMPUTER MODULES
`
`(71) Applicant: ACQIS LLC, McKinney, TX (US)
`
`(72) Inventor: William W.Y. Chu, Los Altos, CA (US)
`(73) Assignee: ACQIS LLC, McKinney, TX (US)
`
`(*) Notice:
`
`This patent is subject to a terminal dis
`claimer.
`
`(21) Appl. No.: 13/649,078
`
`(22) Filed:
`
`Oct. 10, 2012
`Related U.S. Patent Documents
`
`6,634,777
`Nov. 4, 2003
`09/312,199
`May 14, 1999
`
`Reissue of:
`(64) Patent No.:
`Issued:
`Appl. No.:
`Filed:
`U.S. Applications:
`(63) Continuation of application No. 13/562.210, filed on
`Jul. 30, 2012, which is a continuation of application
`No. 13/294,108, filed on Nov. 10, 2011, now Pat. No.
`Re. 43,602, which is a continuation of application No.
`12/561,138, filed on Sep. 16, 2009, now Pat. No. Re.
`42.984, which is a continuation of application No.
`1 1/545,056, filed on Oct. 6, 2006, now Pat. No. Re.
`43,171, which is a continuation of application No.
`11/056,604, filed on Feb. 10, 2005, now Pat. No. Re.
`41,092.
`(51) Int. Cl.
`G06F 12/00
`(52) U.S. Cl
`USPC ............................................... 726/16; 726/20
`
`(2006.01)
`
`(58) Field of Classification Search
`USPC .......... 726/2-9, 16–21, 34, 36; 713/182-183,
`713/192-194; 710/1, 7, 8, 15, 20, 22, 100;
`712/1, 220
`See application file for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`4,623,964 A * 1 1/1986 Getz et al. ......................... 705/1
`4,769,764 A
`9, 1988 Levanon
`4,799,258 A
`1/1989 Davies
`5,056,141 A * 10/1991 Dyke ........................... 340,527
`5,086,499 A
`2f1992 Mutone
`5,103,446 A
`4, 1992 Fischer
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`JP
`
`T 1996
`O722138 A1
`10, 1994
`6-289953
`(Continued)
`OTHER PUBLICATIONS
`
`Boosten, “Transmission Overhead and Optimal Packet Size', Mar.
`11, 1998, printed on: Jan. 28, 2011, 2 pgs.
`Primary Examiner — Hosuk Song
`(74) Attorney, Agent, or Firm — Cooley LLP
`(57)
`ABSTRACT
`A security method for an attached computer module in a
`computer system. The security method reads a security iden
`tification number in an attached computer module and com
`pares it to a security identification number in a console, which
`houses the attached computer module. Based upon a relation
`ship between these numbers, a security status is selected. The
`security status determines the security level of operating the
`computer system.
`23 Claims, 24 Drawing Sheets
`
`-
`
`4O
`Computer
`Module Boy
`
`
`
`
`
`S
`S
`S
`2
`-2O
`a
`5 insert C2. Desktop
`3.
`t = Sas Peripheral
`e
`Console
`of \ Attached
`
`
`
`Computer
`Module
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 3 of 40
`
`US RE44,654 E
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3/1993 Woodbury et al.
`5, 191581 A
`3, 1993 Lord
`5,198.806 A
`6, 1994 Takeda
`5,319,771 A
`5,463,742 A 10/1995 Kobayashi
`5,519,843. A
`5, 1996 Moran et al.
`5,539,616 A
`7, 1996 Kikinis
`5,546.463. A
`8/1996 Caputo et al.
`5,550,861 A
`8, 1996 Chan et al.
`5,572,441. A 1 1/1996 Boie
`5,590,377 A 12/1996 Smith
`5,608,608 A
`3, 1997 Flint et al.
`5,623,637 A
`4/1997 Jones et al.
`5,638,521 A
`6, 1997 Buchala et al.
`5,640,302 A
`6, 1997 Kikinis
`5,648,762 A
`7, 1997 Ichimura et al.
`5,689,654. A 1 1/1997 Kikinis et al.
`5,721,842 A
`2/1998 Beasley et al.
`5,742,840 A
`4, 1998 Hansen et al. ................ T12/210
`5,751,711 A
`5, 1998 Sakaue
`5,751,950 A
`5, 1998 Crisan
`5,764,924 A
`6/1998 Hong
`5,774,704 A
`6, 1998 Williams
`5,815,681 A
`9, 1998 Kikinis
`5,838,932 A 1 1/1998 Alzien
`5,857,085 A
`1/1999 Zhang et al.
`5,862,381 A
`1/1999 Advani et al.
`5,878,211 A
`3/1999 Delagrange et al.
`5,884,049 A
`3, 1999 Atkinson
`5,907,566 A
`5, 1999 Benson et al.
`5,909,559 A
`6, 1999 SO
`5,933,609 A
`8, 1999 Walker et al.
`5,935,226 A
`8, 1999 Klein
`5,941,965 A
`8, 1999 Moroz et al.
`5.974.486 A 10/1999 Siddappa
`5,978,919 A 1 1/1999 Doi et al.
`5.991,833. A 1 1/1999 Wandler et al.
`5.999,476 A 12/1999 Dutton et al.
`5.999,952 A 12/1999 Jenkins et al.
`6,006,243 A 12/1999 Karidis
`6,012,145 A
`1/2000 Mathers et al.
`6,025,989 A
`2/2000 Ayd et al.
`6,029, 183 A
`2, 2000 Jenkins et al.
`6,038,621 A
`3, 2000 Gale et al.
`6,046,571 A
`4/2000 Bovio et al.
`6,069,615 A
`5, 2000 Abraham et al.
`6,070,214 A
`5, 2000 Ahern
`6,104,921 A
`8/2000 Cosley et al.
`6,157.534. A 12/2000 Gallagher et al.
`6,161,157 A 12/2000 Tripathi
`6,161,524. A 12/2000 Akbarian et al.
`6,199,134 B1
`3/2001 Deschepper et al.
`6,202,115 B1
`3/2001 Khosrowpour
`6,202,169 B1
`3/2001 Razzaghe-Ashrafi et al.
`6,216,185 B1
`4/2001 Chu
`6,226,700 B1
`5/2001 Wandler et al.
`6.256,689 B1
`7/2001 Khosrowpour
`6,266,539 B1
`7, 2001 Pardo
`
`10/2001 Krull et al.
`6,301,637 B1
`10/2001 Schneider et al.
`6,304,895 B1
`6,311,268 B1 10/2001 Chu
`6,314,522 B1 1 1/2001 Chu
`6,321,335 B1 1 1/2001 Chu
`6,324,605 B1
`1 1/2001 Rafferty et al.
`6,332,180 B1
`12/2001 Kauffman et al.
`6,345.330 B2
`2/2002 Chu
`6,366,951 B1
`4/2002 Schmidt
`6,378,009 B1
`4/2002 Pinkston, II et al.
`6,381,602 B1 * 4/2002 Shoroffet al. .................... 707/9
`6,393,561 B1* 5/2002 Hagiwara et al. ............. T13/100
`6,401,124 B1
`6/2002 Yang et al.
`6,452,790 B1
`9/2002 Chu
`6,453,344 B1
`9, 2002 Ellsworth et al.
`6,460,106 B1
`10/2002 Stufflebeam
`6,487.614 B2 * 1 1/2002 Nobutani et al. ............... T10/20
`6,496,361 B2 * 12/2002 Kim et al. ..................... 361 (683
`6,549,966 B1
`4/2003 Dickens et al.
`6,643,777 B1 1 1/2003 Chu
`6,718,415 B1
`4/2004 Chu
`6,900,847 B1 *
`5/2005 Agneta et al. ................. 348,552
`7,099,981 B2
`8/2006 Chu
`7,146,446 B2 12/2006 Chu
`7,328,297 B2
`2, 2008 Chu
`7,363,415 B2
`4/2008 Chu
`7,363.416 B2
`4/2008 Chu
`7,376,779 B2
`5/2008 Chu
`RE41,076 E
`1, 2010 Chu
`RE41,092 E
`1, 2010 Chu
`7,676,624 B2
`3/2010 Chu
`RE41,294 E
`4/2010 Chu
`7,818,487 B2 10/2010 Chu
`RE41,961 E
`11/2010 Chu
`RE42,814 E
`10/2011 Chu
`8,041,873 B2 10/2011 Chu
`RE42.984 E
`11/2011 Chu
`RE43,119 E
`1/2012 Chu
`RE43,171 E
`2, 2012 Chu
`8,234,436 B2
`7/2012 Chu
`2001 0011312 A1
`8, 2001 Chu
`2004/0177200 A1
`9, 2004 Chu
`2005/0174729 A1
`8, 2005 Chu
`2005, 0182882 A1
`8, 2005 Chu
`2005/O1955.75 A1
`9, 2005 Chu
`2005/0204083 A1
`9, 2005 Chu
`2005.0246469 A1 11/2005 Chu
`2006/0265361 A1 11, 2006 Chu
`2008/0244149 A1 10, 2008 Chu
`2009. O157939 A1
`6, 2009 Chu
`2010/0174844 A1
`7, 2010 Chu
`2011/0208893 A1
`8, 2011 Chu
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`WO
`
`WO92, 18924
`WO94/OO970
`WO95/13640
`
`10, 1992
`1, 1994
`5, 1995
`
`* cited by examiner
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 4 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 1 of 24
`
`US RE44,654 E
`
`
`
`
`
`Attached
`Computer
`Module
`
`AIG /
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 5 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 2 of 24
`
`US RE44,654 E
`
`
`
`a?Lock
`
`5
`
`Opening for
`Engoging Lock
`
`A/6 2
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 6 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 3 of 24
`
`US RE44,654 E
`
`7
`
`7
`
`Yaxy tax
`
`O
`
`1.
`
`i
`
`(1723")
`
`Width:
`46 in
`(5,748")
`
`i-435
`Depth:
`25mm
`(92.3")
`Power
`Regulator
`--437
`Mein circuit
`boord
`
`a ra
`- - - -
`
`Component
`underneath
`
`Connection to
`lock control
`
`s
`
`Flash legin
`Host ---
`SysOSond
`interface
`Password
`Controlleri
`ty.--
`lock
`1.
`4O3 Control
`4O
`
`N4O5
`
`CPU Module
`(6.4mm)
`
`3/2" hard
`Drive 254mm)
`
`4OO
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`-------------
`
`-------------
`
`Y42
`
`- 425
`
`A76, 3
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 7 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 4 of 24
`
`US RE44,654 E
`
`
`
`
`
`
`
`-300
`-301
`Access Privilege
`
`r 313
`
`Owner:
`Owner Password:
`Business:
`Business PaSSWOrd;
`Console Type:
`Location:
`Access privile
`
`Owner PaSSWOrd:
`Business.
`Business Password:
`Console Type:
`Location:
`ACCeSS privilege:
`OWner
`Owner PaSSWOrd:
`Business:
`Business Password:
`Access privilege:
`OWiner:
`Owner PaSSWOrd:
`Business:
`Business Password:
`Console Type:
`Ocation:
`Owner Access privilege;
`
`
`
`OWner:
`Owner Password:
`Business:
`Business Password:
`Console Type:
`Location:
`Owner Access privilege:
`Others Access privilege:
`
`None
`JST
`Ether
`Portable
`None
`
`None
`None
`Desktop
`None
`None
`
`Sunshine
`JS
`Ether
`Private
`John Doe
`Sunshine
`JST
`Eher
`Desktop
`SFB3
`Private
`
`Vacation
`S
`Ether
`Desktop
`
`-303
`General
`Company
`
`317
`
`-305
`Restricted
`
`319
`Attached Computer
`Module
`
`321
`
`3O7
`
`309
`Priyfe
`
`323
`
`-31
`General
`Company
`
`F.G. 4
`
`
`
`Company's shared
`console
`
`329
`
`
`
`
`
`
`
`Coworkers Office
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 8 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 5 of 24
`
`US RE44,654 E
`
`
`
`999
`
`919
`
`
`
`9091 EGIT?S?TST?l
`
`
`
`Sng/žg Z09
`
`Sng
`
`
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 9 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 6 of 24
`
`US RE44,654 E
`
`
`
`?ôue] sselppy
`
`619/
`
`96ue)
`
`
`
`?ôue] sseyppy
`
`Sulejfiold
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 10 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 7 of 24
`
`US RE44,654 E
`
`-700
`
`Power
`up
`
`Security
`Code
`
`1
`70
`
`
`
`3 70
`
`705
`
`ACCeSS
`
`707 YES
`
`709
`
`Block at
`data Out
`716-NNO
`710
`Access
`Privilege
`
`Full
`access
`
`Peripheral
`Access
`storage
`Privilege R.
`
`708
`
`YES
`
`714
`
`711
`
`Access Peripheral
`Privilege Read-only
`
`719
`
`Program
`data Controt
`
`712
`
`713
`
`715
`
`takes over
`
`Block all
`data out
`
`Program
`data Control
`
`Hardware
`
`731-N NO
`729
`
`
`
`Data
`Out to Storage
`device
`
`723
`
`Let Data
`Out
`
`727
`
`F.G. 7
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 11 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 8 of 24
`
`US RE44,654 E
`
`
`
`908
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 12 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 9 of 24
`
`US RE44,654 E
`
`NEW
`
`
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 13 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 10 of 24
`
`US RE44,654 E
`
`NEW
`
`
`
`>
`Peripheral Console
`taff
`
`interface
`ad
`Support
`
`list
`
`Expansion - it'll
`Slots
`
`Secondary Power Supply
`
`Primary Power Supply
`
`tol
`
`FIG. /O
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 14 of 40
`
`U.S. Patent
`
`US RE44,654 E
`
`
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 15 of 40
`
`U.S. Patent
`
`US RE44,654 E
`
`
`

`
`S. N
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 16 of 40
`
`U.S. Patent
`
`US RE44,654 E
`
`one’
`
`
`
`
`
`N
`CD
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 17 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 14 of 24
`
`US RE44,654 E
`
`NEW
`
`
`
`Flash Memory
`SOs
`Configuratory
`
`r
`Estad
`Merge
`
`CPCN
`GP
`athrya
`
`690 Writo Port Dists 3: 5
`
`Wido For control
`
`FIG. It
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 18 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 15 of 24
`
`US RE44,654 E
`
`
`
`NEW
`
`Parseilo Seria 33
`Cowart
`f
`
`PCNR
`
`R
`
`ep
`
`RESE
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 19 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 16 of 24
`
`US RE44,654 E
`
`NEW
`
`PCK
`
`
`
`
`
`PO1
`
`PD2
`
`PO3
`
`PCN -o-
`
`PCK
`
`PO1
`
`PD2
`
`PO3
`
`PCN
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 20 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 17 of 24
`
`US RE44,654 E
`
`Computing System
`
`
`
`NEW
`
`f
`
`CPUINB
`signals
`
`OS
`
`s
`
`t
`PCI Bus Bridge
`ine 1 '' interface Dev
`
`Controller
`
`Pair And PBLS
`
`Peripheral System
`
`Peripheral
`interface
`Controller
`
`FIGURE If
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 21 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 18 of 24
`
`US RE44,654 E
`
`NEW
`
`
`
`Computing System
`
`Graphics
`Subsystem
`
`Peripheral System
`
`Other Bus
`
`integrated
`Host
`interface
`Cntir. &
`North Bridge
`
`integrated
`Peripheral
`Interface
`Cntir, 8.
`S. Bridge
`
`FIGURE 3
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 22 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 19 of 24
`
`US RE44,654 E
`
`
`
`5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`NEW
`
`Attached Computer Module
`
`(ACM)
`
`Power
`
`W
`
`Exchangs interface
`System. Bus (XS Bus)
`
`aaaaaaaaaaaaa-raruare
`Power Bus
`
`integrated CPU
`(or CPU Module
`with North Bridge &
`Graphics Accelerator
`
`Video Cutput
`
`Video Bis
`
`
`
`Peripheral Bus
`
`integrated
`South
`Bridge &
`Host
`interface
`Controller
`
`29
`Attached Computer Modale with integrated CPU?nB/Graphics and
`integrated HICISB
`
`FIG. It
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 23 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 20 of 24
`
`US RE44,654 E
`
`NEW
`
`Attached Computer Module" (ACM)
`POWer
`Regulator
`
`
`
`
`
`Exchange interface
`1. System. Bus (XIS Bus)
`" Power Bus
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`integrated CPU
`with core iogic,
`Graphics Accelerator,
`& frterface Controller
`
`Video Outp:
`
`Cache
`
`Memory
`
`HHDD
`
`
`
`-
`
`Video Bis
`Periphera Bus
`
`Attached Computer Module with Single Chip fully integrated: CPU, Cathe,
`Core logic, Graphics controller and Interface controller
`
`F. G. 2 O
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 24 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 21 of 24
`
`US RE44,654 E
`
`NE
`
`
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 25 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 22 of 24
`
`US RE44,654 E
`
`NEAf
`
`
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 26 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 23 of 24
`
`US RE44,654 E
`
`NEAf
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5
`
`Sir PCKERN
`KR-.
`33
`
`
`
`
`
`... :QRite.ia. Eecipietally QS Rasat
`ionisterfeitheast. SRaisi.
`
`Cock '8te.
`
`Over
`
`3 WS 8ta 3
`CN
`Scotingsteric Perihetail VES Ciecki
`Scottiglie.g. seigerally Sciack.
`N
`aily S.C.R.Q.
`
`Feriphera to sinute
`Feripteratics: Ruter WS Rats i.
`
`Asynchronous
`
`FG 23
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 27 of 40
`
`U.S. Patent
`
`Dec. 17, 2013
`
`Sheet 24 of 24
`
`US RE44,654 E
`
`NF
`
`
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 28 of 40
`
`1.
`DATA SECURITY METHOD AND DEVICE
`FOR COMPUTER MODULES
`
`US RE44,654 E
`
`appears in the
`Matter enclosed in heavy brackets
`original patent but forms no part of this reissue specifica
`tion; matter printed in italics indicates the additions
`made by reissue.
`
`10
`
`15
`
`Notice. More than one reissue application has been filed
`for the reissue of U.S. Pat. No. 6,643,777. The reissue appli
`cations are U.S. application Ser: No. 1 1/056,604 (a parent
`reissue application), Ser: No. 1 1/545,056 (which is a reissue
`continuation of the parent reissue application), Ser: No.
`1 2/561, 138 (which is a reissue continuation of the parent
`reissue application), Ser: No. 13/294, 108 (which is a reissue
`continuation of U.S. application Ser: No. 1 2/561, 138), Ser:
`No. 1 3/562,210 (which is a reissue continuation of U.S.
`application Ser: No. 13/294, 108); and Ser: No. 13/649,078
`(the present application, which is a reissue continuation of
`U.S. application Ser: No. 1 3/562,210).
`This application is a reissue continuation of U.S. applica
`tion Ser: No. 1 3/562,210, which is a reissue continuation of
`U.S. application Ser: No. 13/294, 108, which is a reissue con
`25
`tinuation of U.S. application Ser: No. 1 2/561, 138, which is a
`reissue continuation of U.S. application Ser: No. 1 1/056,604,
`which is a reissue of U.S. Pat. No. 6,643,777, which are
`incorporated herein by reference.
`
`30
`
`BACKGROUND OF THE INVENTION
`
`35
`
`45
`
`The present invention relates to computing devices. More
`particularly, the present invention provides a method and
`device for securing a personal computer or set-top box.
`Merely by way of example, the present invention is applied to
`a modular computing environment for desktop computers,
`but it will be recognized that the invention has a much wider
`range of applicability. It can be applied to other portable or
`modular computing applications.
`40
`Many desktop or personal computers, which are com
`monly termed PCs, have been around and used for over ten
`years. The PCs often come with state-of-art microprocessors
`such as the Intel PentiumTM microprocessor chips. They also
`include a hard or fixed disk drive including memory in the
`giga-byterange. Additionally, the PCs often include a random
`access memory integrated circuit device Such as a dynamic
`random access memory device, which is commonly termed
`DRAM. The DRAM devices now provide up to millions of
`memory cells (i.e., mega-bit) on a single slice of silicon. PCs
`also include a high resolution display Such as cathode ray
`tubes or CRTs. In most cases, the CRTs are at least 15 inches
`or 17 inches or 19 inches in diameter. High resolution flat
`panel displays are also used with PCs.
`Many external or peripheral devices can be used with the
`PCs. Among others, these peripheral devices include mass
`storage devices such as a ZipTM Drive product sold by Iomega
`Corporation of Utah. Other storage devices include external
`hard drives, tape drives, and others. Additional devices
`include communication devices Such as a modem, which can
`be used to link the PC to a wide area network of computers
`such as the Internet. Furthermore, the PC can include output
`devices such as a printer and other output means. Moreover,
`the PC can include special audio output devices such as
`speakers the like.
`PCs also have easy to use keyboards, mouse input devices,
`and the like. The keyboard is generally configured similar to
`
`50
`
`55
`
`60
`
`65
`
`2
`a typewriter format. The keyboard also has the length and
`width for easily inputting information by way of keys to the
`computer. The mouse also has a Sufficient size and shape to
`easily move a cursor on the display from one location to
`another location.
`Other types of computing devices include portable com
`puting devices such as "laptop' computers and the like.
`Although somewhat Successful, laptop computers have many
`limitations. These computing devices have expensive display
`technology. In fact, these devices often have a smaller flat
`panel display that has poor viewing characteristics. Addition
`ally, these devices also have poor input devices such as
`smaller keyboards and the like. Furthermore, these devices
`have limited commonplatforms to transfer information to and
`from these devices and other devices such as PCs.
`Up to now, there has been little common ground between
`these platforms including the PCs and laptops in terms of
`upgrading, ease-of-use, cost, performance, and the like.
`Many differences between these platforms, probably some
`what intentional, has benefited computer manufacturers at the
`cost of consumers. A drawback to having two separate com
`puters is that the user must often purchase both the desktop
`and laptop to have “total computing power, where the desk
`top serves as a “regular computer and the laptop serves as a
`"portable' computer. Purchasing both computers is often
`costly and runs “thousands of dollars. The user also wastes a
`significant amount of time transferring software and data
`between the two types of computers. For example, the user
`must often couple the portable computer to a local area net
`work (i.e., LAN), to a serial port with a modem and then
`manually transfer over files and data between the desktop and
`the portable computer. Alternatively, the user often must use
`floppy disks to "Zip' up files and programs that exceed the
`storage capacity of conventional floppy disks, and transfer the
`floppy disk data manually.
`Another drawback with the current model of separate por
`table and desktop computer is that the user has to spend
`money to buy components and peripherals the are duplicated
`in at least one of these computers. For example, both the
`desktop and portable computers typically include hard disk
`drives, floppy drives, CD-ROMs, computer memory, host
`processors, graphics accelerators, and the like. Because pro
`gram Software and Supporting programs generally must be
`installed upon both hard drives in order for the user to operate
`programs on the road and in the office, hard disk space is often
`wasted.
`One approach to reduce some of these drawbacks has been
`the use of a docking station with a portable computer. Here,
`the user has the portable computer for “on the road use and
`a docking station that houses the portable computer for office
`use. The docking station typically includes a separate moni
`tor, keyboard, mouse, and the like and is generally incompat
`ible with other desktop PCs. The docking station is also
`generally not compatible with portable computers of other
`Vendors. Another drawback to this approach is that the por
`table computer typically has lower performance and func
`tionality than a conventional desktop PC. For example, the
`processor of the portable is typically much slower than pro
`cessors in dedicated desktop computers, because of power
`consumption and heat dissipation concerns. As an example, it
`is noted that at the time of drafting of the present application,
`some top-of-the-line desktops include 400 MHZ processors,
`whereas top-of-the-line notebook computers include 266
`MHz processors.
`Another drawback to the docking station approach is that
`the typical cost of portable computers with docking stations
`can approach the cost of having a separate portable computer
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 29 of 40
`
`US RE44,654 E
`
`10
`
`15
`
`3
`and a separate desktop computer. Further, as noted above,
`because different vendors of portable computers have propri
`etary docking stations, computer users are held captive by
`their investments and must rely upon the particular computer
`Vendor for future upgrades, support, and the like.
`To date, most personal computers provide data file security
`through software only. A wide variety of removable storage
`media are available for a personal computer. These removable
`media do not provide any access security protection in hard
`ware. Data encryption program often must be used for pro
`tection. Such program is cumbersome to handle for the user
`requiring extra cost and time. Data encryption is more com
`monly used for communication over an unprotected network
`or the Internet. Having a large number offrequently used files
`managed by encryption software is not practical. Without
`Software security program, any file can be read and copied
`illegally from a hard disk drive on a PC or any removable
`media.
`PC architecture generally allows freedom of data flow
`between memory and peripheral devices within the allowed
`memory and I/O address spaces. In conventional PC archi
`tecture, a peripheral bus, i.e. PCI bus, is used to control all
`data transactions among peripheral devices. PCI bus allows
`any device to be a bus master and perform data transaction
`with another device. Also when a software program is in
`control, it can move data between any two devices. There is no
`hardware or protocol security mechanism on a standard
`peripheral bus such as PCI Bus to detect or block data trans
`actions. Operating system may have individual files read or
`write protected. These types of special security feature
`require significant additional user interaction to control. This
`is too cumbersome for a typical user to manage. There is no
`mechanism in current PCs to allow access to the primary hard
`disk drive and yet prevent copying of its content. The con
`ventional PC is a single machine that does not have a mecha
`nism to perform security ID matching in hardware.
`Thus, what is needed are computer systems that provide
`improved security features to prevent illegal or unauthorized
`access to information.
`
`4
`method initiates a security program in the module to read a
`security identification of the console and to read a security
`identification of the computer module. Based upon a relation
`ship of the console identification and the computer module
`identification, a predetermined security status is determined
`from, for example, a lookup table or the like. The method then
`selects the predetermined security status, which can be one of
`many. The method then operates the computer module based
`upon the security status.
`In a further alternative embodiment, the present invention
`provides a method for identifying a user for a computer mod
`ule. The method includes inserting a computer module into a
`console; and initiating a security program in memory of the
`computer module. The method prompts a plurality of input
`fields corresponding to respective input information on a user
`interface to be provided by a user of the computer module.
`Next, the method inputs the input information into the user
`interface of the computer module. The input information
`includes a user (e.g., owner) name, a user (e.g., owner) pass
`word, a business name, a business password, and a location.
`Still further, the present invention provides a system for
`secured information transactions, e.g., data security, elec
`tronic commerce, private communications. The system
`includes a console comprising a peripheral controller housed
`in the console. A user identification input device (e.g., key
`board, retinal reader, finger print reader, Voice recognition
`unit) is coupled to the peripheral controller. The user identi
`fication input device is provided for user identification data of
`the user. The system has an attached computer module
`coupled to the console. The attached computer module has a
`security memory device (e.g., flash memory device) stored
`with the user identification data.
`Numerous benefits are achieved using the present inven
`tion over previously existing techniques. The present inven
`tion provides mechanical and electrical security systems to
`prevent theft or unauthorized use of the computer system in a
`specific embodiment. Additionally, the present invention Sub
`stantially prevents accidental removal of the ACM from the
`console. In some embodiments, the present invention pre
`vents illegal or unauthorized use during transit. The present
`invention is also implemented using conventional technolo
`gies that can be provided in the present computer system in an
`easy and efficient manner. Depending upon the embodiment,
`one or more of these benefits can be available. These and other
`advantages or benefits are described throughout the present
`specification and are described more particularly below.
`These and other embodiments of the present invention, as
`well as its advantages and features, are described in more
`detail in conjunction with the text below and attached FIGS.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a simplified diagram of a computer system
`according to an embodiment of the present invention;
`FIG. 2 is a simplified diagram of a computer module
`according to an embodiment of the present invention;
`FIG. 3 is a simplified top-view diagram of a computer
`module according to an embodiment of the present invention;
`FIG. 4 is a simplified illustration of security systems
`according to embodiments of the present invention;
`FIG. 5 is a simplified diagram of a computer module in a
`console according to an embodiment of the present invention;
`FIG. 6 is a simplified diagram of a security method for a
`module according to an embodiment of the present invention;
`and
`FIG. 7 is a simplified diagram of a method according to an
`embodiment of the present invention.
`
`25
`
`30
`
`35
`
`SUMMARY OF THE INVENTION
`
`According to the present invention, a technique including a
`method and device for securing a computer module in a
`computer system is provided. In an exemplary embodiment,
`the present invention provides a security system for an
`attached computer module (ACM). In an embodiment, the
`ACM inserts into a computer module bay (CMB) within a
`peripheral console to form a functional computer. A security
`program reads an identification number in a security memory
`device to determine a security level of the ACM according to
`one embodiment.
`In a specific embodiment, the present invention provides a
`system for secured information transactions. The system has
`a console (e.g., computer housing) comprising a peripheral
`controller housed in the console; and a security memory
`device (e.g., flash memory device) coupled to the peripheral
`controller. The system also has an attached computer module
`(i.e., a removable module with memory and microprocessor)
`coupled to the console. The attached computer module has a
`host interface controller housed within the attached computer
`module to interface to the security memory device through
`the peripheral controller.
`In an alternative embodiment, the present invention pro
`vides a security protection method for a computer module.
`The method includes steps or acts of inserting the computer
`module into a console. Once the module has been inserted, the
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`

`

`Case 6:20-cv-00967 Document 1-9 Filed 10/15/20 Page 30 of 40
`
`US RE44,654 E
`
`6
`In a preferred embodiment, the present system has a secu
`rity system, which includes a mechanical locking system, an
`electrical locking system, and others. The mechanical locking
`system includes at least a key 11. The key 11 mates with key
`hole 13 in a lock, which provides a mechanical latch 15 in a
`closed position. The mechanical latch, in the closed position,
`mates and interlocks the ACM to the computer module bay.
`The mechanical latch, which also has an open position, allows
`the ACM to be removed from the computer module bay.
`Further details of the mechanical locking system are shown in
`the FIG. below.
`FIG. 2 is a simplified diagram of a computer module 10
`according to an embodiment of the present invention. This
`diagram is merely an illustration and should not limit the
`scope of the claims herein. One of ordinary skill in the art
`would recognize other variations, modifications, and alterna
`tives. Some of the reference numerals are similar to the pre
`vious FIG. for easy reading. The computer module 10
`includes key 11, which is insertable into keyhole 13 of the
`lock. The lock has at least two position, including a latched or
`closed position and an unlatched or open position. The
`latched position secures the ACM to the computer module
`bay. The unlatched or open position allows the ACM to be
`inserted into or removed from the computer bay module. As
`shown, the ACM also has a slot or opening 14, which allows
`the latch to move into and out of the ACM. The ACM also has
`openings 17 in the backside for an electrical and/or mechani
`cal connection to the computer module bay, which is con
`nected to the console.
`FIG. 3 is a simplified top-view diagram 10 of a computer
`module for computer system according to an embodiment of
`the present invention. This diagram is merely an illustration
`and should not limit the scope of the claims herein. One of
`ordinary skill in the art would recognize other variations,
`modifications, and alternatives. The layout diagram illus
`trates the top-view of the module 10, where the backside
`components (e.g., Host Interface Controller) are depicted in
`dashed lines. The layout diagram has a first portion, which
`includes a central processing unit (“CPU) module 400, and
`a second portion, which includes a hard drive module 420. A
`common printed circuit board 437 houses these modules and
`the like. Among other features, the ACM includes the central
`processing unit module 400 with a cache memory 405, which
`is coupled to a north bridge unit 421, and a host interface
`controller 401. The host interface controller includes a lock
`control 403. As shown, the CPU module is disposed on a first
`portion of the attached computer module, and couples to
`connectors 17. Here, the CPU module is spatially located near
`connector 17.
`The CPU module can use a Suitable microprocessing unit,
`microcontroller, digital signal processor, and the like. In a
`specific embodiment, the CPU module uses, for example, a
`400 MHZ Pentium II microprocessor module from Intel Cor
`poration and like microprocessors from AMD Corporation,
`Cyrix Corporation (now National Semiconductor Corpora
`tion), and others. In other

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket