Unlock instant, AI-driven research and patent intelligence for your innovation.

Access protection system and method for computer systems

一种计算机系统、计算机程序的技术,应用在内部/外围计算机组件保护、计算机安全装置、计算等方向,能够解决阻碍、认证过程不实用等问题

Active Publication Date: 2005-09-28
GOOGLE LLC
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Here, an authentication process for each user would be impractical
Executing the authentication process every time the user changes is just a hindrance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access protection system and method for computer systems
  • Access protection system and method for computer systems
  • Access protection system and method for computer systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] figure 1 A flowchart illustrating a computer system operating in an unlocked mode. After the computer system has been turned on, a BIOS boot is performed to check whether the system is running in a locked or unlocked mode. If the computer system is operating in unlocked mode, then in a first step 100 the operating system of the computer system is started, which means that a boot of the operating system is performed. A number of different device drivers are then started at step 102, and then at a subsequent step 104 a particular software application is started.

[0029]This software application controls the time interval, which is fundamental to the access protection mechanism of the computer system of the present invention. After the software application has been started at step 104, it enters its usual mode of operation at step 106, ie the application is running. While the application is running, the time counter is read at step 108 to determine the time interval. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to access protection and theft protection of a computer system. The inventive access protection mechanism makes explicit use of a specific time interval for which the computer system operates in an ordinary mode. After this time interval has elapsed the computer system switches into a locked mode preventing the computer system from booting. In locked mode the functionality of the system is limited to a password dialogue and a corresponding password can only be obtained from a central database system after the user's identity has been checked. By regularly installing subsequent software application updates of a specific software application the computer system is prevented from switching into locked mode. By installing the software application update, the time interval is always manipulated in such a way, that is only elapses after a point of time where a subsequent software update becomes available.

Description

technical field [0001] The invention relates to the field of access protection and anti-theft protection of computer systems. Background technique [0002] When a computer system environment is shared by a plurality of different users, access to the computer system environment or portions of the computer system environment must be controlled. By means of access control mechanisms, only authorized users can use the computer system environment and its associated software applications. The purpose of the access control mechanism is therefore to prevent unauthorized persons from using the computer system. In this way, it represents an effective means of preventing misuse of a computer system or parts of a computer system. [0003] The most common access control mechanisms are based on password-driven access to computer systems. There are different levels of password access or password protection for computer systems. Typically, password access is user-specific or device-orie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F1/00G06F12/14G06F21/12G06F21/31H04L9/00
CPCG06F2221/2151G06F21/88G06F21/31G06F21/74
Inventor 康拉德·吉伦斯埃里克·欣德迈耶托马斯·G·莫格尔托马斯·斯派德尔
Owner GOOGLE LLC