Unlock instant, AI-driven research and patent intelligence for your innovation.

Combined RSM State-Change Initiation Sequence

a technology of initiation sequence and rsm state change, which is applied in the direction of unauthorized memory use protection, television system, instruments, etc., can solve the problems of unprotected operation from accidental performance, user's intention to perform an operation cannot be confirmed, and user's intention to perform an operation also cannot be confirmed

Inactive Publication Date: 2004-06-17
COLUMBIA DATA PRODUCTS
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The present invention relates to a system and method for confirming a user's intention to perform a computer operation only after they have confirmed their intention through a user-input device. This prevents accidental computer operations from being performed. The invention involves replacing a first removable storage medium with a second removable storage medium after a program on the first medium has been read, and initiating the operation only after the second removable storage medium is confirmed to be present. This method can be performed using computer-readable media and hardware. The technical effect of the invention is to ensure that computer operations are performed only after the user's intention to do so is confirmed."

Problems solved by technology

Unfortunately, there are circumstances in which a user's intention to perform an operation cannot be confirmed beforehand and, thus, the operation is unprotected from accidental performance.
For example, a user's intention to perform an operation cannot be confirmed when there are no traditional user-input and / or user-output devices.
A user's intention to perform an operation also cannot be confirmed when user-input and / or user-output devices associated with a computer malfunction or otherwise are disabled.
A user's intention to perform an operation also cannot be confirmed when the operation itself must be successfully performed on the computer before the associated user-input and / or user-output devices may even be initialized.
Under these circumstances, allowing an operation to be performed on the computer without user confirmation is undesirable but, nevertheless, necessary.
The disadvantages of not being able to confirm a user's intentions to perform an operation are particularly apparent when an operation is to be performed on a "headless server" using a "bootstrap program."
The headless server then might run unattended for months or years.
Unfortunately, if the bootstrap media is inadvertently left in the drive of the headless server (which frequently happens), then, upon reboot months or years later, the operation performed by the auto-running bootstrap program on the headless server automatically restarts contrary to the actual intention of the user.
Such an accidental restarting of the bootstrap program (which does not seek to confirm a user's intention to perform again the operation) often indicates deletion of or damage to data and security information on the headless server.
While certainly not as costly as destroying months or years of data, the requirement of a reboot nonetheless proves wasteful and frustrating when the bootstrap media is inadvertently left in the drive.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combined RSM State-Change Initiation Sequence
  • Combined RSM State-Change Initiation Sequence
  • Combined RSM State-Change Initiation Sequence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0145] In certain circumstances, it is desirable to emulate keystrokes, especially when a keyboard or keypad is absent, malfunctioning, or otherwise unavailable. For instance, one may desire to create a backup of one's hard drive on a laptop computer using a backup program on the hard drive. This may be impossible, or at least very difficult, without the use of a keyboard.

[0146] Utilizing the first preferred method of the present invention, a first RSM comprising a bootstrap disk is inserted into a drive of the laptop and the laptop is then started. During booting of the laptop, the laptop boots from the bootstrap disk. In accordance with the first preferred method, the bootstrap disk includes a program that is executed by the laptop that causes the computer to run from the drive a particular program that is stored on another, second disk. The laptop runs this particular program after a period of cessation of drive activity during booting of the laptop.

[0147] Upon this cessation of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A user's intention to perform a computer operation is confirmed in order to safeguard against accidental performance of the operation. The operation is initiated only after a user's intention to perform the operation is confirmed. The user's intention is confirmed by changing, within the computer configuration, the state of the combined presence of a first removable storage medium and a second removable storage medium. The user's intention is confirmed without requiring the use of a user-input device of a computer.

Description

[0001] This patent application is a continuation application claiming priority in the United States under 35 U.S.C. .sctn. 120 to the benefit of the filing date of international patent application serial No. PCT / US02 / 40106, filed designating the United States on Dec. 16, 2002, and titled "Initiation Sequences For Performing Protected Computer Operations" (and to be published in English), which international patent application is incorporated herein by reference. This application also relates to the same field of invention as the current assignee's U.S. patent application Ser. No. 10 / 248,424, filed Jan. 18, 2003, which is the nonprovisional of provisional U.S. patent application serial No. 60 / 350,434, filed Jan. 22, 2002, both of which are incorporated herein by reference.BACKGROUND OF INVENTION[0002] It is desirable when a certain operation is to be performed on a computer to require user confirmation for such operation before initiation thereof. By way of example and not limitation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F1/24G06F9/00G06F9/445G06F13/00G06F13/10G06F13/28G06F15/177G06F21/34G06F21/50G06F21/57G07F19/00H04L9/32
CPCG06F11/1417G06F11/1458G06F13/102G06F21/34G06F21/50G06F11/1469G06F21/575G06F2221/2153G07F19/20G07F19/207G06F21/57
Inventor WITT, LOUIS PERRY JR.
Owner COLUMBIA DATA PRODUCTS