Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Password protected modular computer method and device

a modular computer and password protection technology, applied in the field of password protection modular computer methods and devices, can solve the problems of poor display technology of computing devices, poor viewing characteristics of smaller flat panel displays, and many limitations of laptop computers, so as to prevent accidental removal of acm, prevent illegal or unauthorized use, and facilitate and efficient

Inactive Publication Date: 2010-04-27
ACQIS LLC
View PDF132 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The present invention provides a technique for securing a computer module in a computer system using a password. The module is designed to be easily inserted into a console and has a central processing unit and hard disk drive. The module also has a programmable memory device that can store a password for preventing unauthorized use of the hard disk drive and other module elements. The permanent password or user identification code is designed to provide a permanent \"finger print\" on the attached computer module. The invention provides mechanical and electrical security systems to prevent theft or unauthorized use of the computer system and substantially prevents accidental removal of the module from the console. The invention also prevents illegal or unauthorized use during transit. The invention is implemented using conventional technologies that can be provided in the computer system in an easy and efficient manner."

Problems solved by technology

Although somewhat successful, laptop computers have many limitations.
These computing devices have poor display technology.
In fact, these devices often have a smaller flat panel display that has poor viewing characteristics.
Additionally, these devices also have poor input devices such as smaller keyboards and the like.
Furthermore, these devices have limited common platforms to transfer information to and from these devices and other devices such as PCs.
Up to now, there has been little common ground between these platforms including the PCs and laptops in terms of upgrading, ease-of-use, cost, performance, and the like.
A drawback to having two separate computers is that the user must often purchase both the desktop and laptop to have “total” computing power, where the desktop serves as a “regular” computer and the laptop serves as a “portable” computer.
Purchasing both computers is often costly and runs “thousands” of dollars.
The user also wastes a significant amount of time transferring software and data between the two types of computers.
Another drawback with the current model of separate portable and desktop computer is that the user has to spend money to buy components and peripherals the are duplicated in at least one of these computers.
Because program software and supporting programs generally must be installed upon both hard drives in order for the user to operate programs on the road and in the office, hard disk space is often wasted.
The docking station typically includes a separate monitor, keyboard, mouse, and the like and is generally incompatible with other desktop PCs.
The docking station is also generally not compatible with portable computers of other vendors.
Another drawback to this approach is that the portable computer typically has lower performance and functionality than a conventional desktop PC.
For example, the processor of the portable is typically much slower than processors in dedicated desktop computers, because of power consumption and heat dissipation concerns.
Another drawback to the docking station approach is that the typical cost of portable computers with docking stations can approach the cost of having a separate portable computer and a separate desktop computer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password protected modular computer method and device
  • Password protected modular computer method and device
  • Password protected modular computer method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

I. System Hardware

[0035]FIG. 1 is a simplified diagram of a computer system 1 according to an embodiment of the present invention. This diagram is merely an illustration and should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The computer system 1 includes an attached computer module (i.e., ACM) 10, a desktop console 20, among other elements. The computer system is modular and has a variety of components that are removable. Some of these components (or modules) can be used in different computers, workstations, computerized television sets, and portable or laptop units.

[0036]In the present embodiment, ACM 10 includes computer components, as will be described below, including a central processing unit (“CPU”), IDE controller, hard disk drive, computer memory, and the like. The computer module bay (i.e., CMB) 40 is an opening or slot in the desktop console. The CMB houses the ACM and provid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and device for securing a removable Attached Computer Module (“ACM”) 10. ACM 10 inserts into a Computer Module Bay (“CMB”) 40 within a peripheral console to form a functional computer such as a desktop computer or portable computer. The present ACM 10 includes a locking system, which includes hardware and software 600, 700, to prevent accidental removal or theft of the ACM from the peripheral console. While ACM is in transit, further security is necessary against illegal or unauthorized use. If ACM contains confidential data, a high security method is needed to safeguard against theft.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]The following two commonly-owned copending applications, including this one, are being filed concurrently and the other one is hereby incorporated by reference in their entirety for all purposes:[0002]1. U.S. patent application Ser. No. 09 / 183,816, William W. Y. Chu, entitled, “Modular Computer Security Method and Device”. and[0003]2. U.S. patent application Ser. No. 09 / 183,493, William W. Y. Chu, entitled, “Password Protected Modular Computer Method and Device”.[0004]Notice: More than one reissue application has been filed for the reissue of U.S. Pat. No. 6,321,335. The reissue applications are application Ser. No. 10 / 963,825 filed Oct. 12, 2004, application Ser. No. 11 / 474,256 filed Jun. 23, 2006 (the present application), application Ser. No. 11 / 517,601 filed Sep. 6, 2006, and application Ser. No. 12 / 322,858 filed Feb. 5, 2009, the present application being a continuation reissue of U.S. Pat. No. 6,321,335.CROSS REFERENCE TO RELATED AP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/32G06F1/16
CPCG06F1/16G06F1/1613G06F21/88G06F1/181G06F21/34G06F1/18
Inventor CHU, WILLIAM W. Y.
Owner ACQIS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products