$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Preboot protection for a data security system with anti-intrusion capability 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
  • H04L-009/00
출원번호 US-0395627 (1995-02-28)
발명자 / 주소
  • Mooney David M. (Eden Prairie MN) Kimlinger Joseph A. (Willernie MN) Wood David E. (Minnetonka MN)
출원인 / 주소
  • Integrated Technologies Of America, Inc. (Hopkins MN 02)
인용정보 피인용 횟수 : 53  인용 특허 : 14

초록

A secure computer controlling access to data storage devices via a card reader. A microprocessor-controlled card reader interface logically connected to the card reader and the central processing unit (CPU) of the computer reads and writes information from and to a card placed in the card reader and

대표청구항

A method of operating a computer having a central processing unit, the central processing unit executing a boot program to initialize the computer, the method comprising the steps of: a) prior to completion of the boot program, acquiring control of the central processing unit; b) loading a verificat

이 특허에 인용된 특허 (14)

  1. Schafer Randy J. (22 Colonial Irvine CA 92720), Computer data security device and method.
  2. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor that executes enciphered programs.
  3. Double Glen P. (Concord NC) Weingart Steve H. (Peekskill NY), Data protection by detection of intrusion into electronic assemblies.
  4. Dykes John (West Valley UT), Encryption printed circuit board.
  5. Daughters Turpen A. (Pinole CA) McGinnis Patricia A. (San Anselmo CA), IC card system.
  6. Cole James F. (Palo Alto CA) Keeran Jerald J. (San Jose CA), Method and apparatus for password protection of a computer.
  7. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media.
  8. Mooney David M. (Eden Prairie MN) GLazier James B. (Hopkins MN) Wood David E. (Shorewood MN) Kimlinger Joseph A. (Willernie MN) Goshgarian Paul (Mound MN), Preboot protection of unauthorized use of programs and data with a card reader interface.
  9. Gilberg Robert C. (San Diego CA) Knowles Richard M. (San Diego CA) Moroney Paul (Cardiff-by-the-Sea CA) Shumate William A. (San Diego CA), Secure integrated circuit chip with conductive shield.
  10. Lipner Steven B. (Wellesley MA) Gasser Morrie (Saugus MA) Lampson Butler W. (Cambridge MA), Secure user authentication from personal computer.
  11. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  12. Curran Kevin G. (Sudbury MA) Golson Steven E. (Wayland MA) Rode Christian S. (Cambridge MA), Software protection methods and apparatus.
  13. Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
  14. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.

이 특허를 인용한 특허 (53)

  1. Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
  2. Sutherland Mark J., Active erasure of electronically stored data upon tamper detection.
  3. Koestler, Luke, Authenticating resource requests in a computer system.
  4. O'Connell Ellen R., Automated password reset.
  5. Wegener, Mario, Computer system and method of securely booting a computer system.
  6. Kim,Sung Hyun, Computer systems such as smart cards having memory architectures that can protect security information, and methods of using same.
  7. Goren Ofer A. ; Ruival Juan C., Data and access protection system for computers.
  8. Kikuchi Yoshihide,JPX ; Akagi Masanobu,JPX, Data storage apparatus with improved security process and partition allocation functions.
  9. Kikuchi, Yoshihide; Akagi, Masanobu, Data storage apparatus with improved security process and partition allocation funds.
  10. Merzlikine, Alexei; Hsia, Yiao-Tee, Data storage device with built-in data protection for ultra sensitive applications.
  11. Hwang Seung-Hwe,KRX, Digital computer system security device.
  12. William N. Rallis ; Yaacov Behar, Infrared type security system for a computer.
  13. Gregory C. Stratton ; Charles Cameron Brackett ; Chandler A. Johnson, Method and apparatus for feature configuration in remotely located ultrasound imaging system.
  14. Stratton Gregory C. ; Brackett Charles Cameron ; Johnson Chandler A., Method and apparatus for feature configuration in remotely located ultrasound imaging system.
  15. Chun, Dexter Tamio; Patil, Ajit B.; Fitoz, Cuneyt; Gordon, Dwight; Huang, Yu-Hsiang; Michaelis, Oliver, Method and apparatus for securely booting from an external storage device.
  16. Lee, Larry A.; Kilmer, Jr., Robert L.; Menigoz, David R., Method and apparatus for selectively denying access to encoded data.
  17. Maier,Hans Ulrich; Rohde,Joachim, Method and device for non-destructively recovering data in a data processing system.
  18. Kotler, Hilik; Suchowski, Ron Shay, Method and device for questioning a plurality of computerized devices.
  19. Suchowski, Ron Shay; Kotler, Hilik, Method and device for questioning a plurality of computerized devices.
  20. Suchowski, Ron Shay; Kotler, Hilik, Method and device for scanning a plurality of computerized devices connected to a network.
  21. Huffman James R. ; Jambhekar Shrirang Nikanth, Method and system for encoding a book for reading using an electronic book.
  22. Gilek, Carlos Henrique Arglebe; Schmidt, Gerd, Method for accessing a data processing system.
  23. Hauck,Leon E.; Burval,Brent J., Method for restricting access to a web site by remote users.
  24. Chou Wayne W. ; Kulinets Joseph M. ; Elteto Laszlo, Method of metering and protecting computer software.
  25. Chu, Simon; Piazza, William J., Methods and apparatuses for protecting data on mass storage devices.
  26. Bialick William P. ; Sutherland Mark J. ; Dolphin-Peterson Janet L. ; Rowland Thomas K. ; Skeba Kirk W. ; Housley Russell D., Modular security device.
  27. Rallis William N. ; Behar Yaacov, Notebook security system (NBS).
  28. Rallis William N. ; Behar Yaacov, Notebook security system (NBS).
  29. William N. Rallis ; Yaacov Behar, Notebook security system using infrared key.
  30. Bialick William P. ; Sutherland Mark J. ; Dolphin-Peterson Janet L. ; Rowland Thomas K. ; Skeba Kirk W. ; Housley Russell D., Peripheral device with integrated security functionality.
  31. Cronce, Paul Allen; Fontana, Joseph M., Portable authorization device for authorizing use of protected information and associated method.
  32. Cronce,Paul Allen; Fontana,Joseph M., Portable authorization device for authorizing use of protected information and associated method.
  33. Prabhakaran, Rajeev; Bebal, Arshad; Patil, Ajit B; Yuan, Laura; Karra, Tarun; Kuo, Tom, Progressive boot for a wireless device.
  34. Kwong, Wah Yiu; Proefrock, Wayne L., Providing a user input interface prior to initiation of an operating system.
  35. Smith Perry,CAX ITX X1A 2N8, Restricted access computer system.
  36. Laczko, Sr., Frank L.; Ferguson, Edward, Secure computing device having boot read only memory verification of program code.
  37. Wood, David L.; Pratt, Thomas; Dilger, Michael B.; Norton, Derk; Nadiadi, Yunas, Security architecture with environment sensitive credential sufficiency evaluation.
  38. Li, Hong; Ross, Alan D.; Wouhaybi, Rita H.; Kohlenberg, Tobias M., Security data aggregation and business intelligence for web applications.
  39. Benoit Daigneault CA; Pierre Lemieux CA, Shared intelligence automated access control system.
  40. Wood, David L.; Norton, Derk; Weschler, Paul; Ferris, Chris; Wilson, Yvonne, Single sign-on framework with trust-level mapping to authentication requirements.
  41. Smith Robert Neal, Smart card authentication system comprising means for converting user identification and digital signature to pointing device position data and vice versa using lut.
  42. Postlewaite William M. ; Vogel Kim J. ; Maynard Jason ; Poole Vincent, Smart card reader having multiple data enabling storage compartments.
  43. Weideman William Edward, Speech recognition and verification system enabling authorized data transmission over networked computer systems.
  44. Holloway Malcolm H. ; Prorock Thomas Joseph, System and method for detecting and preventing security.
  45. Levenson, Jay; Adler, Sherri, System and method for the payment and accounting of petty disbursements.
  46. Danilak, Radoslav, System and method for transparent disk encryption.
  47. Danilak, Radoslav, System and method for transparent disk encryption.
  48. Danilak, Radoslav, System and method for transparent disk encryption.
  49. Danilak, Radoslav, System and method for transparent disk encryption.
  50. Hironaka Masashi,JPX, System for preventing a CPU from an input of a power source until the completion of transferring BIOS data from a hard disk to a main memory.
  51. Hiroshi Isomura JP, System for protecting information stored in a storage apparatus assembled into an equipment when the storage apparatus is removed from the equipment unauthorized.
  52. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.
  53. Little, Herbert Anthony; Rose, Scott Douglas; Totzke, Scott William; Lazaridis, Mihal, Wireless personal area network having authentication and associated methods.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로