Password protected modular computer method and device

a modular computer and password protection technology, applied in the field of password protection modular computer methods and devices, can solve the problems of poor display technology of computing devices, many limitations of laptop computers, and small flat panel display with poor viewing characteristics, so as to prevent accidental removal of acm, prevent illegal or unauthorized use, and facilitate and efficient

Inactive Publication Date: 2010-01-12
ACQIS LLC
View PDF132 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0015]In a specific embodiment, the present invention provides a computer module. The computer module has an enclosure that is insertable into a console. The module also has a central processing unit (i.e., integrated circuit chip) in the enclosure. The module has a hard disk drive in the enclosure, where the hard disk drive is coupled to the central processing unit. The module further has a programmable memory device in the enclosure, where the programmable memory device can be configurable to store a password for preventing a possibility of unauthorized use of the hard disk drive and / or other module elements. The stored password can be any suitable key strokes that a user can change from time to time. In a further embodiment, the present invention provides a permanent password or user identification code stored in flash memory, which also can be in the processing unit, or other integrated circuit element. The permanent password or user identification code is designed to provide a permanent “finger print” on the attached computer module.
[0017]Numerous benefits are achieved using the present invention over previously existing techniques. The present invention provides mechanical and electrical security systems to prevent theft or unauthorized use of the computer system in a specific embodiment. Additionally, the present invention substantially prevents accidental removal of the ACM from the console. In some embodiments, the present invention prevents illegal or unauthorized use during transmit. The present invention is also implemented using conventional technologies that can be provided in the present computer system in an easy and efficient manner. Depending upon the embodiment, one or more of these benefits can be available. These and other advantages or benefits are described throughout the present specification and are described more particularly below.

Problems solved by technology

Although somewhat successful, laptop computers have many limitations.
These computing devices have poor display technology.
In fact, these devices often have a smaller flat panel display that has poor viewing characteristics.
Additionally, these devices also have poor input devices such as smaller keyboards and the like.
Furthermore, these devices have limited common platforms to transfer information to and from these devices and other devices such as PCs.
Up to now, there has been little common ground between these platforms including the PCs and laptops in terms of upgrading, ease-of-use, cost, performance, and the like.
A drawback to having two separate computers is that the user must often purchase both the desktop and laptop to have “total” computing power, where the desktop serves as a “regular” computer and the laptop serves as a “portable” computer.
Purchasing both computers is often costly and runs “thousands” of dollars.
The user also wastes a significant amount of time transferring software and data between the two types of computers.
Another drawback with the current model of separate portable and desktop computer is that the user has to spend money to buy components and peripherals the are duplicated in at least one of these computers.
Because program software and supporting programs generally must be installed upon both hard drives in order for the user to operate programs on the road and in the office, hard disk space is often wasted.
The docking station typically includes a separate monitor, keyboard, mouse, and the like and is generally incompatible with other desktop PCs.
The docking station is also generally not compatible with portable computers of other vendors.
Another drawback to this approach is that the portable computer typically has lower performance and functionality than a conventional desktop PC.
For example, the processor of the portable is typically much slower than processors in dedicated desktop computers, because of power consumption and heat dissipation concerns.
Another drawback to the docking station approach is that the typical cost of portable computers with docking stations can approach the cost of having a separate portable computer and a separate desktop computer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password protected modular computer method and device
  • Password protected modular computer method and device
  • Password protected modular computer method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

I. System Hardware

[0035]FIG. 1 is a simplified diagram of a computer system 1 according to an embodiment of the present invention. This diagram is merely an illustration and should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The computer system 1 includes an attached computer module (i.e., ACM) 10, a desktop console 20, among other elements. The computer system is modular and has a variety of components that are removable. Some of these components (or modules) can be used in different computers, workstations, computerized television sets, and portable or laptop units.

[0036]In the present embodiment, ACM 10 includes computer components, as will be described below, including a central processing unit (“CPU”), IDE controller, hard disk drive, computer memory, and the like. The computer module bay (i.e., CMB) 40 is an opening or slot in the desktop console. The CMB houses the ACM and provid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and device for securing a removable Attached Computer Module (“ACM”) 10. ACM 10 inserts into a Computer Module Bay (“CMB”) 40 within a peripheral console to form a functional computer such as a desktop computer or portable computer. The present ACM 10 includes a locking system, which includes hardware and software 600, 700, to prevent accidental removal or theft of the ACM from the peripheral console. While ACM is in transit, further security is necessary against illegal or unauthorized use. If ACM contains confidential data, a high security method is needed to safeguard against theft.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]The following two commonly-owned copending applications, including this one, are being filed concurrently and the other one is hereby incorporated by reference in their entirety for all purposes:Notice: More than one reissue application has been filed for the reissue of U.S. Pat. No. 6,321,335. The reissue applications are application Ser. No. 10 / 963,825 filed Oct. 12, 2004, application Ser. No. 11 / 474,256 filed Jun. 23, 2006, and application Ser. No. 11 / 517,601, filed Sep. 6, 2006 (the present application), which is a continuation reissue of U.S. Pat. No. 6,321,335.[0002]1. U.S. patent application Ser. No. 09 / 183,816, William W. Y. Chu, entitled “Modular Computer Security Method and Device”, and[0003]2. U.S. patent application Ser. No. 09 / 183,493, William W. Y. Chu, entitled “Password Protected Modular Computer Method and Device”.BACKGROUND OF THE INVENTION[0004]The present invention relates to computing devices. More particularly, the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F13/14G06F1/16
CPCG06F1/16G06F1/1613G06F21/88G06F1/181G06F21/34G06F1/18
Inventor CHU, WILLIAM W. Y.
Owner ACQIS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products