throbber
United States Patent [19J
`Hwang
`
`[54] DIGITAL COMPUTER SYSTEM SECURITY
`DEVICE
`
`[75]
`
`Inventor: Seung-Hwe Hwang, Kyungki-do, Rep.
`of Korea
`
`[73] Assignee: Samsung Electronics Co., Ltd.,
`Suwon, Rep. of Korea
`
`[21] Appl. No.: 08/777,067
`
`[22] Filed:
`
`Dec. 30, 1996
`
`[30]
`
`Foreign Application Priority Data
`
`Dec. 30, 1995
`
`[KR]
`
`Rep. of Korea ...................... 95-68217
`
`Int. Cl.6
`........................................................ H04F 1/00
`[51]
`[52] U.S. Cl. ............................................... 395/186; 380/25
`[58] Field of Search ............................... 395/186, 187.01,
`395/188.01; 380/3, 4, 23, 25
`
`[56]
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,103,221
`5,202,997
`5,261,070
`5,311,591
`5,355,414
`5,369,394
`5,388,211
`
`4/1992
`4/1993
`11/1993
`5/1994
`10/1994
`11/1994
`2/1995
`
`Memmola.
`Arato.
`Ohta.
`Fischer.
`Hale et al.
`Quirk et al..
`Hornbuckle .
`
`380/25
`
`20
`
`.-30
`,-- -~~ -- - -
`: User
`: output unit
`
`,..._ ____ ~
`
`I
`'---~-~
`: User
`:
`:
`inputuml
`L ____________ _J
`
`40
`Security system
`control/er
`
`28
`Serial port
`control/er
`
`I lllll llllllll Ill lllll lllll lllll lllll lllll 111111111111111111111111111111111
`US005960172A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,960,172
`Sep.28,1999
`
`7/1995 Reardon.
`5,434,562
`9/1995 Pinard et al. ........................... 379/167
`5,454,032
`5,465,341 11/1995 Doi et al..
`5,481,253
`1/1996 Phelan et al. .
`5,542,045
`7/1996 Levine.
`5,548,721
`8/1996 Denslow.
`5,610,981
`3/1997 Mooney et al.
`
`.......................... 380/25
`
`Primary Examiner-Albert DeCady
`Attorney, Agent, or Firm-Robert E. Bushnell, Esq.
`
`[57]
`
`ABSTRACT
`
`A security device for a digital computer system having a
`peripheral device and peripheral device controller, includes
`a security user input/output unit which displays the contents
`stored in the peripheral device and receives the information
`for the protection of the peripheral device, a security system
`controller which is connected to the security user input/
`output unit, and protects and controls the peripheral device,
`and a security controller which is connected to the security
`system controller, the peripheral device controller and the
`peripheral device, and protects the peripheral device from
`being controlled by the peripheral device controller to
`provide a security device operated under another operating
`system by using hardware, thereby allowing a computer
`system to interface with an input/output device or a file in a
`normal state while the security device protects the computer
`system.
`
`20 Claims, 3 Drawing Sheets
`
`10
`
`r - - - - - - - - - ,
`: ,-12
`e'
`I
`I
`I
`I
`I
`I
`I
`I
`I
`L _________ _J
`
`14
`
`LAN
`
`54
`
`,
`
`Network
`1 security
`controller
`
`56
`
`L----------------~
`
`IPR2017-00430
`UNIFIED EX1009
`
`

`
`:-----
`I
`I
`I
`I
`I
`
`,- 20
`-.___.(_
`
`22
`
`/ I SCSI
`controller
`
`1
`I
`L
`
`/
`
`r,
`5
`/
`'
`/" 0
`//
`'
`' ,
`<:
`/
`/~/ 152
`',,
`SCSI security
`controller
`
`/
`
`\
`
`r---
`r-----
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`
`-------------~
`----,
`I
`I -12 I 10
`I/
`I
`,
`I/
`f'
`r
`I
`I
`I
`I
`I
`:
`I
`I
`I
`
`~'-----r--,-.
`
`\
`
`\
`
`\
`
`\
`
`I
`I I
`I I
`I I
`I I
`I I
`I I
`I I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`1
`
`I
`I
`I
`______ .J
`
`L - - -
`
`14
`
`\
`LAN
`
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I I
`I I
`I I
`I I
`I I
`
`17
`
`I
`L_
`
`'-d
`-------- ____ J :
`
`I I
`I I
`
`I
`I
`I
`I
`I
`I
`I
`
`18
`
`I
`L
`
`I
`I
`____ .J
`I
`
`- - - -
`
`\
`\
`\
`I
`I
`\
`.--~~~-'--~~~---.,
`\
`\
`
`-
`
`32
`- I
`I
`
`1
`
`,-30
`1- - - ~C.. - -
`- -
`I
`1 User
`:
`output unit
`:
`34
`I ,------.....__--,
`: User
`input unit
`1
`1
`I
`I
`L ____________ _J
`
`40
`Security system
`controller
`
`I
`I
`I
`I
`I
`
`I
`26
`I
`I
`I /Keyboard/mouse Ii
`controller
`
`(
`
`54
`
`Network
`security
`controller
`
`56
`I
`Keyboard mouse /
`Security
`/
`controller
`58
`
`/
`
`_,,,..-/
`
`/
`
`I
`I
`
`,-
`
`28
`i
`I
`1 Serial port
`I
`controller
`1
`I
`I
`I
`I
`I
`L----
`
`/
`
`/
`
`1 Serial port
`security
`controller
`
`\
`
`\
`
`\
`
`\
`
`\
`
`/
`/ /
`V ' /
`
`/
`/ /
`
`/
`
`/
`
`Fig.1
`
`d •
`\JJ.
`•
`~
`~ ......
`~ = ......
`
`'Jl
`~ '?
`N
`~CIO
`'"""'
`\C
`\C
`\C
`
`'Jl =-~
`~ .....
`'"""' 0 .....,
`
`~
`
`Ul
`....
`\C
`
`0--, =
`
`....
`~
`.....::.
`N
`
`

`
`U.S. Patent
`
`Sep.28,1999
`
`Sheet 2 of 3
`
`5,960,172
`
`12 ,
`' '
`
`- _J_ -
`
`-
`
`-
`
`-
`
`-
`
`--,
`
`r
`I
`I
`I
`I
`I
`
`66
`
`L ________ .....J
`
`22
`
`60
`
`62 64
`
`52
`
`SCSI
`controller
`
`SCSI security
`controller
`
`68
`
`40 Security system
`controller
`
`Fig.2
`
`14
`
`LAN port
`
`LAN
`
`24
`
`Network
`controller
`
`54 BO
`
`MUX
`
`D
`
`B
`
`A
`
`72
`
`70
`
`74
`
`40
`
`Security system
`controller
`
`Fig.3
`
`

`
`U.S. Patent
`
`Sep.28,1999
`
`Sheet 3 of 3
`
`5,960,172
`
`26
`
`56
`
`15
`,____~82--+------< >-8_8-+----+t=+:=: ~ rn::::::::::•::::::;:m ~ m :
`o=====
`
`-16
`
`I
`I
`.-------~-------,
`I
`,-
`I
`I
`, , -
`I
`
`I
`
`I
`
`I
`I
`I
`I
`I
`:
`I
`I
`I
`I
`L---------------~
`
`17
`
`Keyboard/mouse
`controller
`
`84
`
`90
`
`86
`
`40
`Security system
`controller
`
`Fig.4
`
`28
`
`92
`
`Serial port
`controller
`
`18
`
`96
`
`100
`
`58
`
`10
`
`94
`
`Security system
`controller .
`
`40
`
`Fig.5
`
`

`
`5,960,172
`
`1
`DIGITAL COMPUTER SYSTEM SECURITY
`DEVICE
`
`CLAIM OF PRIORITY
`
`This application make reference to, incorporates the same
`herein, and claims all benefits accuring under 35 U.S.C.
`§119 from an application Entitled Digital Computer System
`Security Device earlier filed in the Korean Industrial Prop(cid:173)
`erty Office on Dec. 30, 1995 and assigned Ser. No.
`95-68217.
`
`FIELD OF THE INVENTION
`
`BACKGROUND OF THE INVENTION
`
`The present invention relates to a security device for a
`computer system, more particularly, to the security device 15
`which can be operated under a different operating system.
`The present invention allows a computer system to interface
`with an input/output device or a file in a normal state while
`the security device protects the computer system.
`
`5
`
`2
`These and other objects may be achieved by having a
`security device for a digital computer system having a
`peripheral device and peripheral device control means that
`includes a security user input/output means which displays
`the contents stored to the peripheral device and receives
`information for the protection of the peripheral device, a
`security system control means which is connected to the
`security user input( output means, and protects and controls
`the peripheral device, a security control means which is
`10 connected to the security system control means, the periph(cid:173)
`eral device control means and the peripheral device, and
`protects the peripheral device from being controlled by the
`peripheral device control means.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`A more complete appreciation of the invention, and many
`of the attendant advantages thereof, will be readily apparent
`as the same becomes better understood by reference to the
`following detailed description when considered in conjunc-
`20 tion with the accompanying drawings in which like refer(cid:173)
`ence symbols indicate the same or similar components,
`wherein:
`FIG. 1 is a schematic diagram of a digital computer
`system security device in accordance with the preferred
`25 embodiment of the present invention;
`FIG. 2 is a security schematic diagram of a hard disk drive
`of the digital computer system security device in accordance
`with the preferred embodiment of the present invention;
`FIG. 3 is a security schematic diagram of a LAN port of
`the digital computer system security device in accordance
`with the preferred embodiment of the present invention;
`FIG. 4 is a security schematic diagram of a keyboard/
`mouse of the digital computer system security device in
`accordance with the preferred embodiment of the present
`invention; and
`FIG. 5 is a security schematic diagram of a serial port of
`the digital computer system security device in accordance
`with the preferred embodiment of the present invention.
`
`40
`
`The notion of controlling access to computer peripherals
`via a separate operating system is not new. For example,
`U.S. Pat. No. 5,434,562 for a Method For Limiting Com(cid:173)
`puter Access to Peripheral Devices to Reardon discloses the
`use of user operated hardware switches to deny access to
`peripheral devices. Access to the switches can not be over(cid:173)
`ridden by the computer. The purpose of this arrangement is
`to prevent unauthorized users or computer viruses from
`gaining an access to peripheral devices. Reardon '562, 30
`however, appears to contain solely mechanical switches
`without any software to operate them.
`Another example is found in U.S. Pat. No. 5,202,997 for
`a Device For Controlling Access to Computer Peripherals to
`Arato. A microprocessor requests the user enter a valid 35
`identification code in order to gain access to a peripheral.
`When the user inputs an unauthorized code, the micropro(cid:173)
`cessor will deny access to the peripheral. Arato is an
`example of software being used to provide security access to
`computer peripherals.
`Asimilar example is found in U.S. Pat. No. 5,481,253 for
`an Automotive Security System to Phelan et al. discloses an
`anti-theft system includes a microprocessor based control
`module that enables operation of solenoids of the power
`circuits of the car only if a proper identification code is
`entered.
`Finally, U.S. Pat. No. 5,311,591 for a Computer System
`Security Method And Apparatus For Creating And Using
`Program Authorization Information Data Structures to Fis- 50
`cher discloses a program authorization information required
`to gain access to various terminals. This is to prevent viruses
`from potentially destroying devices by moving from termi(cid:173)
`nal to terminal. The co-signatory authority may be required
`in one embodiment as a security measure to prevent unau- 55
`thorized access to devices.
`What is needed is a hardware switching security device
`that is controlled by software operated under a different
`operating system so that access to and from peripheral
`devices may be controlled.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`45
`
`In order to protect computer system from an unauthorized
`access, a screen locking system which interrupts the input of
`a keyboard and a mouse and a key locking system which
`restricts the operation of the computer system if the user
`does not press a set key when booting is used.
`Many operating systems are used in one computer system
`because of the increase of the uses and applications for the
`computer. Under these systems, the above protecting meth(cid:173)
`ods are generally used.
`In the above prior art, if the protector is not removed, the
`user can not use the entire computer system. Also, the above
`method which is used under one operating system can not be
`used in another operating system.
`A preferred embodiment of the present invention will
`become apparent from a study of the following detailed
`description with reference to the accompanying drawings.
`As shown in FIG. 1, the security device for a digital
`computer system having peripheral devices 10 and periph(cid:173)
`eral device controller 20 which controls the peripheral
`devices 10, includes a security user input/output unit 30
`which displays the contents of peripheral devices 10 and
`65 receives information for the protection of the peripheral
`devices 10, a security system controller 40 which is con(cid:173)
`nected to the security user input/output unit 30, and protects
`
`60
`
`SUMMARY OF THE INVENTION
`It is an object of the present invention to provide a
`security device for a digital computer system, operated
`under a different operating system by using hardware, that
`protects a computer system while allowing it to interface in
`a normal state with an input/output device or a file.
`
`

`
`5,960,172
`
`10
`
`35
`
`3
`and controls the peripheral devices 10, and security control-
`ler 50 which is connected to the security system controller
`40, the peripheral device controller 20 and the peripheral
`devices 10, and protects the peripheral device from being
`controlled by the peripheral device controller 20.
`The peripheral devices 10 include a hard disk drive 12, a
`Local Area Network (LAN), a LAN port 14 connected to the
`LAN, a keyboard 15 and mouse 17 (16), and a serial port 18
`for serial communication. The peripheral device controller
`20 includes a Small Computer System Interface (SCSI)
`controller 22 for controlling the hard disk drive 12, network
`controller 24 for controlling the LAN port 14, a keyboard 15
`and mouse controller 26 for controlling the keyboard and
`mouse 17 (16), and serial port controller 28 for controlling
`the serial port 18. The security controller 50 includes a SCSI
`security controller 52 which connected to the security sys(cid:173)
`tem controller 40 and SCSI controller 22, and controls and
`protects the hard disk drive 12, network security controller
`54 which is connected to the security system controller 40
`and the network controller 24, and controls and protects the
`network port 14, keyboard/mouse security controller 56
`which is connected to the security system controller 40 and
`the keyboard/mouse controller 26, and controls the
`keyboard/mouse 16, and serial port security controller 58
`which is connected to the security system controller 40 and
`the serial port controller 28, and controls and protects the
`serial port 18.
`The security user input/output unit 30 includes a user
`output unit 32 which receives the contents of the peripheral
`devices 10 from the security system controller 40 and
`displays the contents and user input unit 34 which receives
`information for the protection of the peripheral devices 10
`from the user and transmits the information to the security
`system controller 40.
`As shown in FIG. 2, the SCSI security controller 52
`transmits and receives data along data busses 66 and 60
`when protection enable signal 68 is not activated.
`As shown in FIG. 3, the network security controller 54
`further includes a multiplexer 80. The multiplexer 80
`receives a receive signal 70 among the output of the LAN
`port 14 and a protection-enable signal 72 among the output
`of the security system controller 40. Then, the multiplexer
`80 outputs the receive signal 70 to the security system
`controller 40 if the protection-enable signal 72 is activated,
`and outputs the receive signal 70 to the network controller
`24 if the protection-enable signal 72 is not activated.
`As shown in FIG. 4, the keyboard/mouse security con(cid:173)
`troller 56 includes a first buffer 88 and a second buffer 90.
`The first buffer 88 receives a keyboard-clock signal 82 from 50
`the keyboard/mouse controller 26, and outputs the
`keyboard-clock signal 82 if a protection-enable signal 86
`from the security system controller 40 is not activated. The
`second buffer 90 receives a mouse-clock signal 84 from the
`keyboard/mouse controller 26, and outputs the mouse-clock
`signal 84 if the protection-enable signal 86 from the security
`system controller 40 is not activated.
`As shown in FIG. 5, the serial port security controller 58
`includes a third buffer 98 and a fourth buffer 102. The third
`buffer 98 receives an output signal 92 from the serial port
`controller 28, and output the output signal 92 as an output
`transmit signal 96 if a protection-enable signal 94 from the
`security system controller 40 is not activated. The fourth
`buffer 102 receives a receive signal 100 from the serial port
`18, and outputs the receive signal 100 to a serial port
`controller 28 if the protection-enable signal 94 from the
`security system controller 40 is not activated.
`
`4
`The operation of the security device for a digital computer
`system in accordance with the preferred embodiment of the
`present invention is as follows. The user selects the device
`that has to be protected through the security user input/
`5 output unit 30 among the hard disk drive 12, the LAN port
`14, the keyboard/mouse 16 and the serial port 18. When the
`hard disk drive 12 is selected in the above selecting process
`and a SCSI ID (identification) of the hard disk drive 12 is
`inputted, the security system controller 40 outputs the
`Protection-Enable signal 68 and the information of the SCSI
`ID to the SCSI security controller 52. The SCSI security
`controller 52 monitors the access of the SCSI controller 22
`to the hard disk drive 12. The access of the SCSI controller
`22 to the hard disk drive 12 is shown in FIG. 2. The SCSI
`controller 22 outputs the value of the SCSI ID to a SCSI-
`15 Data-Bus 60 and makes the SCSI-SEL signal 62 activated.
`If the SCSI-SEL signal 62 is activated and the contents of the
`SCSI-Data-Bus 60 coincides with the value of the SCSI ID,
`the hard disk drive 12 is connected to the SCSI controller 22
`by activating the SCSI-BUSY signal 64. The SCSI security
`20 controller 52 monitoring the access of the hard disk drive 12
`compares the contents of the SCSI-Data-Bus 60 with the
`SCSI ID value of the hard disk drive 12 when the SCSI-SEL
`signal 62 is activated. If the contents of the SCSI-Data-Bus
`60 coincides with the SCSI ID value of the hard disk drive
`25 12, the SCSI security controller 52 prevents the SCSI-BUSY
`64 signal from being input to the SCSI controller 22. Then,
`the SCSI security controller 52 resets the SCSI bus 66 and
`initializes each SCSI signals, so the hard disk drive 12 is
`protected. If the access to the hard disk drive 12 is sensed,
`30 the user is informed of the access to the hard disk drive 12
`by an alarm. The result of the above operation is transmitted
`to the security user input/output unit 30 through the security
`system controller 40 and is then displayed.
`If a network port 14 is selected and inputted among
`lOBase-T, Thick Network and Thin Network of the network
`port 14 selected in the above selecting process, the security
`system controller 40 activates and outputs the protection(cid:173)
`enable signal 72. The, the multiplexer 80 of the network
`security controller 54 receives the activated signal 72 and
`40 outputs the receive signal 70 through an output line 74 to the
`security system controller 40 without connecting with the
`network controller 24. Therefore, the access to the LAN port
`14 is protected. If the access to the LAN port 14 is sensed,
`the user is informed of the access to the LAN port 14 by an
`45 alarm. The user stores the signal 72 from the multiplexer 80
`and uses the signal for tracing up the access. The result of the
`above operation is transmitted to the security user input/
`output unit 30 through the system controller 40 and is
`displayed.
`If the keyboard/mouse 16 is selected in the above select-
`ing process, the security system controller 40 activates and
`outputs the protection-enable signal 86. The first buffer 88
`provides a clock capable of operating the keyboard 15 by
`outputting the keyboard-clock signal 82 inputted from the
`55 keyboard mouse controller 26. The keyboard-clock signal
`82 receives and outputs the activated protection-enable
`signal 86. However, the first buffer 88 makes the keyboard
`not operable by interrupting the keyboard-clock signal 82.
`The second buffer 90 provides a clock capable of operating
`60 the mouse 17 by outputting the mouse-clock signal 84
`inputted from the keyboard/mouse controller 26. The
`mouse-clock signal 84 receives and outputs the activated
`protection-enable signal 86. However, the second buffer 90
`makes the mouse not be operated by interrupting the mouse-
`65 clock signal 84. The result of the above operation is trans(cid:173)
`mitted to the user input/output unit 30 through the system
`controller 40 and is then displayed.
`
`

`
`5,960,172
`
`10
`
`30
`
`25
`
`5
`If the serial port 18 is selected in the above selecting
`process, the security system controller 40 activates and
`outputs the protection-enable signal 94. The output signal 92
`inputted from the serial port controller 28 is outputted as the
`transmit signal 96 through the third buffer 98. The output 5
`signal 92 receives and outputs the activated protection(cid:173)
`enable signal 94. The third buffer 98 prevents data from
`being outputted to the serial port 18 by interrupting the
`output signal 92. The fourth buffer 102 outputs the receive
`signal 100 inputted from the serial port 18 to the serial port
`controller 28. The receive signal 100 receives and outputs
`the activated protection-enable signal 94. The fourth buffer
`102 prevents data from being inputted to the serial port
`controller 28 by interrupting the receive signal 100. The
`result of the above operation is transmitted to the user
`input/output unit 30 through the system controller 40 and is 15
`then displayed.
`As mentioned above, the present invention provides a
`security device for a digital computer system, orated under
`another operating system by using hardware, that protects a
`computer system while allowing it to interface in a normal 20
`state with an input/output device or a file.
`What is claimed is:
`1. A security device for a digital computer system having
`at least one peripheral device and a peripheral device
`controller, comprising:
`at least one peripheral device;
`a peripheral device controller for said at least one periph(cid:173)
`eral device;
`a security system controller, said security system control(cid:173)
`ler for protecting and controlling said at least one
`peripheral device from being controlled by said periph(cid:173)
`eral device controller;
`a security user input/output unit that is connected to said
`security system controller, said security user input/ 35
`output unit for controlling activation of security for said
`at least one peripheral device, for transmitting infor(cid:173)
`mation to and receiving information from said security
`system controller for protection of said at least one
`peripheral device, for providing an alarm for alerting of 40
`access to said at least one peripheral device, and for
`displaying contents stored in a peripheral device; and
`a security controller that is connected to said security
`system controller, said peripheral device controller and
`said at least one peripheral device, said security con- 45
`troller and said security system controller for providing
`a different operating system from said digital computer
`system for security for said at least one peripheral
`device.
`2. The security device as claimed in claim 1, wherein said 50
`security user input/output unit comprises:
`a user output unit for receiving the contents stored in said
`at least one peripheral device from said security system
`controller and for displaying the contents; and
`a user input unit for receiving the information for the 55
`protection of said at least one peripheral device from a
`user and for transmitting the information received from
`said user to said security system controller.
`3. The security device as claimed in claim 2, wherein said
`user input unit is attached to a front side of the digital 60
`computer system and comprises one of a push button and a
`key pad.
`4. The security device as claimed in claim 2, wherein said
`user output unit is attached to a front side of the digital
`computer system so that the user can see outputted data, 65
`wherein said user output unit produces said alarm when
`access to said at least one peripheral device has occurred.
`
`6
`5. The security device as claimed in claim 1, wherein the
`digital computer system includes a plurality of peripheral
`devices comprising a hard disk drive, a LAN port, a
`keyboard/mouse and a serial port, said peripheral device
`controller comprises a SCSI controller, a network controller,
`a keyboard/mouse controller and a serial port controller, and
`said security controller comprises:
`a SCSI security controller that is connected to said
`security system controller and to said SCSI controller,
`said SCSI security controller for controlling and pro(cid:173)
`tecting said hard disk drive;
`a network security controller that is connected to said
`security system controller and to said network
`controller, said network security controller for control(cid:173)
`ling and protecting said LAN port;
`a keyboard/mouse security controller that is connected to
`said security system controller and to said keyboard/
`mouse controller, said keyboard/mouse security con(cid:173)
`troller for controlling and protecting said keyboard/
`mouse; and
`a serial port security controller that is connected to said
`security system controller and to said serial port
`controller, said serial port security controller for con(cid:173)
`trolling and protecting said serial port.
`6. The security device as claimed in claim 5, wherein said
`SCSI security controller is for receiving a protection-enable
`signal from said security system controller, said SCSI con(cid:173)
`troller for allowing input and output of information along a
`SCSI bus and a SCSI-Data-Bus if the protection-enable
`signal from said security system controller is not activated.
`7. The security device as claimed in claim 5, wherein said
`network security controller comprises:
`a multiplexer, said multiplexer for receiving a receive
`signal among the output of said LAN port and a
`protection-enable signal among the output of said secu(cid:173)
`rity system controller, said multiplexer for outputting
`the receive signal to said security system controller if
`the protection-enable signal is activated and for out(cid:173)
`putting the receive signal to said network controller if
`the protection-enable signal is not activated.
`8. The security device as claimed in claim 5, wherein said
`keyboard/mouse security controller comprises:
`a first buffer for receiving a keyboard-clock signal from
`said keyboard/mouse controller, said first buffer for
`outputting the keyboard-clock signal if a protection(cid:173)
`enable signal from said security system controller is not
`activated; and
`a second buffer for receiving a mouse-clock signal from
`said keyboard/mouse controller, said second buffer for
`outputting the mouse-clock signal if said protection(cid:173)
`enable signal from said security system controller is not
`activated.
`9. The security device as claimed in claim 5, wherein said
`serial port security controller comprises:
`a first buffer for receiving an output signal from said serial
`port controller, said first buffer for outputting the output
`signal as an output transmit signal if a protection(cid:173)
`enable signal from said security system controller is not
`activated; and
`a second buffer for receiving a receive signal from said
`serial port, said second buffer for outputting the receive
`signal to said serial port controller if said protection(cid:173)
`enable signal from said security system controller is not
`activated.
`10. A method of protecting a peripheral device in a
`computer system from unwanted access, comprising the
`steps of:
`
`

`
`5,960,172
`
`30
`
`40
`
`7
`providing a different operating system from said computer
`system for security for said at least one peripheral
`device,
`inputting into said operating system an identification code
`for each peripheral device to be protected;
`outputting a protection enable signal by said operating
`system for each said peripheral device to be protected
`for preventing access to each protected peripheral
`device;
`attempting to send and receive data from at least one said
`protected peripheral device; pl denying transmittal and
`receipt of data to and from said at least one protected
`peripheral device;
`sensing access has been attempted to said at least one 15
`protected peripheral device; and
`informing a user that access to said at least one protected
`peripheral device has been attempted and prevented.
`11. The method of claim 10, further comprising the steps
`of:
`attempting to send and receive data from an unprotected
`peripheral device;
`sending and receiving data from said unprotected periph(cid:173)
`eral device; and
`displaying data received from said unprotected peripheral
`device to said user.
`12. A security protection system for a computer peripheral
`of a computer system, comprising:
`at least one computer peripheral;
`a peripheral controller for controlling said at least one
`computer peripheral;
`a security controller for controlling access to said at least
`one computer peripheral;
`a security system controller for controlling said security 35
`controller, said security system controller and said
`security controller for providing a different operating
`system from said computer system for security for at
`least one computer peripheral;
`a user input and output unit that is connected to said
`security system controller, said user input and output
`unit for controlling activation of security for at least
`one selected computer peripheral by allowing a user to
`activate security for said at least one selected computer 45
`peripheral, for transferring information to and receiving
`information from said security system controller for
`protection of said at least one selected computer
`peripheral, for alerting said user of access to said at
`least one selected computer peripheral, and for display- 50
`ing data from a computer peripheral.
`13. The security protection system of claim 12, wherein
`said user input and output unit alerts the user when access
`has been attempted to said at least one selected computer
`peripheral for which security has been activated and access 55
`to said at least one selected computer peripheral has been
`denied.
`14. The security protection system of claim 12, wherein
`said user input and output unit is for displaying data
`retrieved from a computer peripheral where security has not
`been activated.
`15. The security protection system of claim 12, wherein
`said security system controller is for protecting said at least
`one selected computer peripheral from being controlled by
`said peripheral controller.
`16. The security protection system of claim 12, wherein
`said user input and output unit alerts the user when access
`
`8
`has been attempted to said at least one selected computer
`peripheral for which security has been activated and access
`to said at least one selected computer peripheral has been
`denied, and wherein said user input and output unit is for
`5 displaying data retrieved from a computer peripheral where
`security has not been activated.
`17. The security protection system of claim 12, wherein
`said user input and output unit alerts the user when access
`has been attempted to said at least one selected computer
`10 peripheral for which security has been activated and access
`to said at least one selected computer peripheral has been
`denied, and wherein said security system controller is for
`protecting said at least one selected computer peripheral
`from being controlled by said peripheral controller.
`18. The security protection system of claim 12, wherein
`said user input and output unit is for displaying data
`retrieved from a computer peripheral where security has not
`been activated, and wherein said security system controller
`20 is for protecting said at least one selected computer periph(cid:173)
`eral from being controlled by said peripheral controller.
`19. The security protection system of claim 18, wherein
`said user input and output unit alerts the user when access
`has been attempted to said at least one selected computer
`25 peripheral for which security has been activated and access
`to said at least one selected computer peripheral has been
`denied.
`20. The security device as claimed in claim 5, wherein:
`said SCSI security controller is for receiving a first
`protection-enable signal from said security system
`controller, said SCSI controller for allowing input and
`output of information along a SCSI bus and a SCSI(cid:173)
`Data-Bus if the first protection-enable signal from said
`security system controller is not activated;
`said network security controller comprises a multiplexer,
`said multiplexer for receiving a receive signal among
`the output of said LAN port and a second protection(cid:173)
`enable signal among the output of said security system
`controller, said multiplexer for outputting the receive
`signal to said security system controller if the second
`protection-enable signal is activated and for outputting
`the receive signal to said network controller if the
`second protection-enable signal is not activated;
`said keyboard/mouse security controller comprises a first
`buffer for receiving a keyboard-clock signal from said
`keyboard/mouse controller, said first buffer for output(cid:173)
`ting the keyboard-clock signal if a third protection(cid:173)
`enable signal from said security system controller is not
`activated, and a second buffer for receiving a mouse-
`clock signal

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket