A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer module and compares it to a security identification number in a console, which houses the attached computer module. Based upon a relationship between these numbers, a security status is selected. The security status determines the security level of operating the computer system.

Patent
   RE41092
Priority
May 14 1999
Filed
Feb 10 2005
Issued
Jan 26 2010
Expiry
May 14 2019
Assg.orig
Entity
Large
29
97
EXPIRED
8. A system for secured information transactions, the system comprising:
a console comprising a peripheral controller housed in the console;
a user identification input device coupled to the peripheral controller, the user identification input device being provided for user identification data, wherein the user identification input device is a finger print reader; and
an attached computer module coupled to the console, the attached computer module comprising a security memory device stored with the user identification data.
0. 30. A system for information transactions, the system comprising:
a computer console comprising a network communication controller housed in the console; and
an attached computer module coupled to the console, the attached computer module comprising a central processing unit, a graphics subsystem, a security program configured to at least one of activate different levels of password protection and control different levels of access privilege, and an interface controller coupled to the console, wherein all computer module network data passes through the console.
0. 18. A system for secured information transactions, the system comprising:
a console comprising a network communication controller housed in the console;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a mass storage unit comprising a hard disk drive including a computer code for implementing a security program, a graphics subsystem, and a security memory device stored with the user identification data.
0. 14. A security protection method for a computer module, said method comprising:
inserting the computer module into a console;
initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module, wherein initiating reads said security identification from a flash memory device;
determining of a security status based upon a relationship of said console identification and said computer module identification;
selecting said security status; and
operating said computer module based upon said security status.
1. A security protection method for a computer module, said method comprising:
inserting the computer module into a console;
initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module, wherein said step of initiating reads said security identification of said computer module from a flash memory device;
determining of a predetermined security status based upon a relationship of said console identification and said computer module identification;
selecting said predetermined security status; and
operating said computer module based upon said security status.
0. 27. A system for secured information transactions, the system comprising:
a computer console comprising a network communication controller housed in the console;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a central processing unit, a graphics subsystem, an interface controller coupled to the console, and a security memory device stored with the user identification data, wherein the security memory device comprises a flash memory including codes to provide password protection.
0. 15. A system for secured information transactions, the system comprising:
a console comprising a network communication controller housed in the console;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a mass storage unit, a graphics subsystem, an interface controller coupled to the console, and a security memory device stored with the user identification data, wherein the security memory device comprises a flash memory, and wherein all data from the computer module passes through the interface controller to reach any device in the console.
0. 59. A system for secured information transactions, the system comprising:
a computer console comprising an interface controller housed in the console, and a lan communication controller;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console through the interface controller, the attached computer module comprising a graphics subsystem, a CPU module and a mass storage unit, wherein all network data transaction of the computer module passes through the console, and wherein the mass storage unit comprises a hard disk drive containing a security program to provide password protection of said computer module.
0. 25. A modular system for secured information transactions, the system comprising:
a computer console comprising a first interface controller housed in the console and coupled to an interface connector;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a security program providing password protection, a mass storage unit comprising a flash memory device, a graphics subsystem, and a second interface controller coupled to the first interface controller, wherein the user identification data passes to the computer module through first and second interface controllers.
0. 21. A modular system for information transactions, the system comprising:
a console comprising a first interface controller housed in the console and coupled with an interface connector; and
an attached computer module coupled to the console through the interface connector and comprising a mass storage unit, a graphics subsystem, a security program, and a second interface controller coupled to the first interface controller, wherein the computer module further comprises a security memory device stored with security identification data, wherein the security memory device comprises a flash memory including a code to provide password protection, and wherein all data transferred from the mass storage unit to the console passes through the first and second interface controllers.
0. 56. A system for secured information transactions, the system comprising:
a computer console comprising a first interface controller housed in the console, and a lan communication controller;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console through the interface controller, the attached computer module comprising a second interface controller couples to the first interface controller, a CPU, a graphics subsystem, and a mass storage unit stored with the user identification data, the mass storage unit comprising a flash memory device including codes to provide password protection, wherein all lan communication of the computer module passes through the console.
0. 49. A method for operating a modular computer into a network, the method comprising:
providing a computer module, the module comprising a central processing unit, a graphics subsystem and a connection program;
inserting the computer module into a computer console to create a “plug and play” operation, the computer console comprising a network communication controller having access to an external network;
receiving connection information from the computer console;
configuring the connection program to adapt to the connection information; and establishing a connection between the computer module and a server coupled to the network in the plug and play operation, the method further comprising providing password protection for said computer module from codes stored in a flash memory device of the computer module.
0. 32. A security protection method for a computer module comprising a mass storage unit and a graphics subsystem, said method comprising:
inserting the computer module into a console comprising a network communication controller;
storing security information data with a security memory device of the computer module, by storing codes in a flash memory to provide password protection for said attached computer module;
initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module;
determining of a predetermined security status based upon a relationship of said console identification and said computer module identification;
selecting said predetermined security status; and
operating said computer module based upon said security status.
0. 60. A method for operating an attached computer module, the method comprising:
providing an attached computer module, the module comprising a security program, a user password, a first interface controller coupled to an interface connector;
coupling the computer module to a computer console, the computer console comprising a second interface controller compatible to the first interface controller, and a lan communication controller coupled to an external network;
establishing communication between the two interface controllers;
receiving the user password from the console;
activating the security program to match the user password; and establishing the console access to the computer module, the method further comprising providing password protection for said computer module from codes contained in a flash memory device of the computer module.
0. 34. A method for operating a module computer into one of a plurality of network systems, the method comprising:
providing an attached computer module, the module comprising a connection program, an interface controller and a security identification;
storing security identification data in a security memory device of the computer module;
coupling the computer module to a computer console through the interface controller, the computer console comprising a network communication device having access to a network;
receiving connection information from the console through the interface controller;
receiving the security identification through the interface controller;
transmitting video information to the console from a graphics subsystem of the attached computer module;
configuring the connection program to adapt to the connection information.
0. 41. A method for operating a module computer into one of a plurality of network systems, the method comprising:
providing an attached computer module, the module comprising a connection program and an interface controller;
storing security information in a flash memory device of the computer module;
inserting the computer module into a computer console to form a functional computer to create a “plug and play” operation, the computer console comprising a second interface controller coupled to the first interface controller upon insertion, and the console having access to an external network;
receiving connection information from the console through the interface controller;
configuring the connection program to adapt to the connection information, and establishing the computer module connection to the external network through said interface controllers.
0. 45. A method for operating a module computer into one of a plurality of network systems, the method comprising:
providing an attached computer module, the module comprising an enclosure, a graphics subsystem, a connection program and a first interface controller;
coupling the computer module to a computer console, the computer console comprising a second interface controller coupled to the first interface controller upon insertion, and the console having access to an external network;
receiving connection information from the console through the interface controllers;
configuring the connection program to adapt to the connection information, and establishing the computer module access to the external network, the method further comprising providing password protection for said computer module from codes stored in a flash memory device of the computer module.
0. 37. A method for operating a module computer into one of a plurality of network systems, the method comprising:
providing an attached computer module, the module comprising a connection program, a graphics subsystem, an interface controller and a security memory device stored with the user identification data;
coupling the computer module to a computer console through the interface controller, the computer console comprising a network communication device having access to a network;
receiving connection information from the console through the interface controller;
receiving the user identification data through the interface controller;
configuring the connection program to adapt to the connection information, and establishing console access to the computer module, wherein all network data transaction of the attached computer module passes through the console.
0. 52. A system for secured information transactions, the system comprising:
a console comprising a network communication controller housed in the console and coupled to an external network;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a central processing unit, a graphics subsystem, and a mass storage unit storing a security program and a user identification datum,
wherein the security program is configured to receive the user identification datum from the input device, match the stored user identification data, and permit external access to the computer module, and
wherein the security program is further configured to at least one of activate different levels of password protection, and control different levels of access privilege.
0. 44. A method for operating a module computer into one of a plurality of network systems, the method comprising:
providing an attached computer module, the module comprising a connection program and an interface controller;
inserting the computer module into a computer console to form a functional computer to create a “plug and play” operation, the computer console comprising a second interface controller coupled to the first interface controller upon insertion, and the console having access to an external network;
receiving connection information from the console through the interface controller;
configuring the connection program to adapt to the connection information, and establishing the computer module connection to the external network through said interface controllers, the method further comprising providing password protection for said computer module from a security program on a hard disk drive of the computer module.
0. 54. A system for secured information transactions, the system comprising:
a console comprising a network communication controller housed in the console and coupled to an external network;
a user identification input device coupled to the console, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a central processing unit, a graphics subsystem, an interface controller coupled to the console, and a mass storage unit storing a security program and a user identification data, wherein the attached computer module further comprises a flash memory device including codes for password protection,
wherein the security program receives the user identification data from the input device, matches the stored user identification data and permits external data transfer to the computer module through the interface controller.
0. 47. A method for operating a module computer into one of a plurality of network systems, the method comprising:
providing an attached computer module, the module comprising an enclosure, a graphics subsystem, a connection program and a first interface controller;
coupling the computer module to a computer console, the computer console comprising a second interface controller coupled to the first interface controller upon insertion, and the console having access to an external network;
providing password protection for said computer module from codes stored in a flash memory device of the computer module;
receiving connection information from the console through the interface controllers;
configuring the connection program to adapt to the connection information, and establishing the computer module access to the external network, the method further comprising providing password protection for said computer module from a security program of a hard disk drive of said computer module.
2. The method of claim 1 wherein said predetermined security status disables a network access to the computer module.
3. The method of claim 1 wherein said predetermined security status disables a secondary storage of information from said computer module to substantially prevent information to be transferred from a memory of the computer module to said secondary storage.
4. The method of claim 1 wherein said security program is provided in a system BIOS.
0. 5. The method of claim 1 wherein said step of initiating reads said security identification of said computer module from a flash memory device.
6. The method of claim 1 wherein said step of initiating reads said security identification of said console from a flash memory device.
7. The method of claim 1 wherein said console is selected from a desktop home computing device, an office desktop computing device, a mobile computing device, a television sot-top computing device, and a co-worker's computing device.
0. 9. The system of claim 8 wherein the user identification input device is a finger print reader.
10. The system of claim 8 A system for secured information transactions, the system comprising:
a console comprising a peripheral controller housed in the console;
a user identification input device coupled to the peripheral controller, the user identification input device being provided for user identification data, wherein the user identification input device is a voice processing device; and
an attached computer module coupled to the console, the attached computer module comprising a security memory device stored with the user identification data.
0. 11. A method for operating a module computer into one of a plurality of network systems, the method comprising:
providing a computer module, the module comprising a connection program;
inserting the computer module into a computer console, the computer console having access to a network;
receiving connection information from the computer console;
configuring the connection program to adapt to the connection information; and
establish a connection between the computer module and a server coupled to the network.
0. 12. The method of claim 11 wherein the connection information comprises a connection protocol for providing the connection.
0. 13. The method of claim 12 wherein the connection protocol is selected from TCP/IP, or mobile IP.
0. 16. The system of claim 15 wherein said security memory device is further stored with a security program, wherein said security program can at least one of activate different levels of password protection, and control different levels of access privilege.
0. 17. The system of claim 15 wherein the flash memory device includes codes to provide password protection.
0. 19. The system of claim 18 wherein the security memory device comprises flash memory includes a code to provide password protection.
0. 20. The system of claim 18 wherein said security program can at least one of activate different levels of password protection, and control different levels of access privilege.
0. 22. The system of claim 21 wherein the attached computer module further comprises a tamper resistant enclosure.
0. 23. The system of claim 21 wherein the attached computer module can be inserted into the console to create a “plug and play” operation.
0. 24. The system of claim 21 wherein the attached computer module further comprises a microcontroller.
0. 26. The system of claim 25 wherein the attached computer module further comprises a central processing unit and a graphics subsystem.
0. 28. The system of claim 27 wherein said attached computer module inserts into a bay of the console to form a functional computer.
0. 29. The system of claim 27 wherein the attached computer module can be inserted into the console to create a “plug and play” operation.
0. 31. The system of claim 30 wherein the console further comprises a user identification input device coupled to the console, the user identification input device being provided for user identification data, wherein the user identification data passes from the console through said interface controller to the attached computer module.
0. 33. The method of claim 32 wherein a user identification input device coupled to the console provides user security identification information to the console.
0. 35. The method of claim 34 wherein the attached computer module further comprises of a micro-controller coupled to the interface controller.
0. 36. The method of claim 34 wherein the attached computer module further comprises a hard disk drive containing a security program.
0. 38. The method of claim 37 further comprising providing password protection for said computer module from a security program stored on a hard disk drive of the computer module.
0. 39. The method of claim 37 further comprising providing password protection for said computer module from codes stored in a flash memory of the computer module.
0. 40. The method of claim 37 further comprising providing to the network with security, credit card information stored in the attached computer module.
0. 42. The method of claim 41 further comprising providing password protection to the computer module from codes stored in a flash memory device of the computer module.
0. 43. The method of claim 41 further comprising providing to the network with security, credit card information from the computer module.
0. 46. The method of claim 45 wherein providing the attached computer module further comprises:
inserting the computer module into the console to create a “plug and play” operation, and
powering on the computer module by the console.
0. 48. The method of claim 45 further comprising providing with security the external network, credit card information of the attached computer module.
0. 50. The method of claim 49 wherein the computer module further comprising:
managing a user interface with a high-level security program; and
accessing data content of the computer module utilizing a program security ID.
0. 51. The method of claim 49 wherein the computer module further comprises security identification, the method further comprising
providing the security identification to the security program,
determining a predetermined security status, and controlling different levels of access privilege to said attached computer module.
0. 53. The system of claim 52 wherein the console further comprises a Read-only removable storage medium.
0. 55. The system of claim 54 wherein all peripheral data transaction of the attached computer module passes through said interface controller.
0. 57. The system of claim 56 wherein the attached computer module can be inserted into the console to create a “plug and play” operation.
0. 58. The system of claim 56 wherein the attached computer module further comprises a tamper resistant enclosure.
0. 61. The method of claim 60 wherein the attached computer module receives power from the console to form a functional computer.
0. 62. The method of claim 60 wherein all data transaction of the attached computer module passes through said interface controllers.

temper tamper resistant enclosure must be used to prevent removal of the hard disk drive and the flash memory inside ACM. Further details are shown throughout the present specification and more particularly below.

FIG. 4 is a simplified illustration of security systems 300 according to embodiments of the present invention. This illustration is merely an example, which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The systems show various examples of ways to implement the present invention. Here, a user relies upon certain consoles to access information. A company's shared portable console 325 can access general company information 303. Selected security identification information 315 is entered into the shared console to access the information via a network. The information generally includes owner, owner password, business, business password, console type, location, and access privilege information, which is displayed on a user display. The owner is generally the user name. Owner password is the user password. The business is the business unit name and business password is the business unit password. The console type can be portable for laptops, notebooks, and the like. Alternatively, the console type can be a desktop. The location generally specifies the desktop location or address for a networked system. Alternatively, the location can also be a home location. Access privilege can be categorized into many different levels. For example, the user can access general company information, but not information directed to other business units. The user can also be limited to access his/her private information, which is company related. Many other types of information can be restricted or accessed depending upon the embodiment.

Other types of access can be granted depending upon the consoles. For example, various consoles include, among others, a console at a user's home, e.g., “John Doe's,” a console in the user's office 329, a console in a co-worker's office 331, which the user can access. The access from John Doe's home console uses security identification 317 and provides restricted access 305. The user's use of the module 307 can be from a variety of consoles and is accessed using security identification 319. Here, access privilege is private, which allows the user to access private personal information or private company information that the user has created. The user's access from his office relies upon security identification 321, which grants access to private information and general company information. The co-worker's console can also be used with security identification 323, which allows the user to access general company information but not private information of John Doe, for example. Depending upon the console used by the user, the security system can provide partial or full access to information on servers via network as well as an attached computer module. Information can also be limited to read only for certain information sources such as a server, a hard drive, a floppy drive, and others.

In a specific embodiment, the present invention also provides a security feature for the ACM 307. Here, the user of the ACM can be granted access to information in the ACM if the correct security identification information 319 is provided to the combination of ACM and console. Once the correct information is provided, the user can access the information on the hard drive of the ACM, which can be for private use. Other levels of access and security can also be provided depending upon the application.

FIG. 5 is a simplified diagram 500 of a computer module in a console according to an embodiment of the present invention. This diagram is merely an illustration which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The block diagram 500 includes an attached computer module 501 and a peripheral console 503, as well as other elements as desired. These elements have a variety of features such as those noted above, as well as others. In the present diagram, different reference numerals are used to show the operation of the present system.

The block diagram 500 illustrates attached computer module 501. The module 501 has a central processing unit 502, which communicates to a north bridge 541, by way of a CPU bus 527. The north bridge couples to main memory 523 via memory bus 529. The main memory can be any suitable high speed memory device or devices such as dynamic random access memory (“DRAM”) integrated circuits and others. The DRAM includes at least 32 Meg. or 64 Meg. and greater of memory, but can also be less depending upon the application. Alternatively, the main memory can be coupled directly with the CPU in some embodiments. The north bridge also couples to a graphics subsystem 515 via bus 542. The graphics subsystem can include a graphics accelerator, graphics memory, and other devices. Graphics subsystem transmits a video signal to an interface connector, which couples to a display, for example.

The attached computer module also includes a primary hard disk drive 509 that serves as a main memory unit for programs and the like. The hard disk can be any suitable drive that has at least 2 GB and greater. As merely an example, the hard disk is a Marathon 2250 (2.25 GB, 2 ½ inch drive) product made by Seagate Corporation of Scotts Valley, but can be others. The hard disk communicates to the north bridge by way of a hard disk drive controller and bus lines 502 and 531. The hard disk drive controller couples to the north bridge by way of the host PCI bus 531, which connects bus 537 to the north bridge. The hard disk includes computer codes that implement a security program according to the present invention. Details of the security program are provided below.

The attached computer module also has a flash memory device 505 with a BIOS. The flash memory device 505 also has codes for a user password that can be stored in the device. The flash memory device generally permits the storage of such password without a substantial use of power, even when disconnected. As merely an example, the flash memory device has at least 512 kilobits or greater of memory, or 1 megabits or greater of memory. The flash memory device can store a security identification number or the like. The flash memory device is generally non-volatile and can preserve information even when the power is turned off, for example. The flash memory generally has at least 128 kilobits storage cells or more. The flash memory can be any product such as a W29C020 product made by a company called Winbond of Taiwan, but can also be others. The flash memory cell and user identification will be more fully described below in reference to the FIGS. A host interface controller 507 communications to the north bridge via bus 535 and host PCI bus. The host interface controller also has a data control 511. Host interface controller 507 communicates to the console using bus 513, which couples to connection 515 516.

Peripheral console 503 includes a variety of elements to interface to the module 501, display 551, and network 553. The console forms around south bridge 571, which couples to bus 563, which couples to bus 561. Bus 561 is in communication with network card 555, which is a local area network for Ethernet, for example. South bridge also couples through control 569 to peripheral interface controller 567, which also communicates to bus 561. Peripheral interface controller also couples to host interface controller through connection 515 516 and bus 513. The peripheral console has a primary removable drive 559 connected to south bridge through bus 575. South bridge also couples to secondary hard disk through bus 577.

In a specific embodiment, the peripheral console also has a serial EEPROM memory device 575, which is coupled to the peripheral interface controller. The memory device can store a security identification number or the like. The memory device is generally non-volatile and can preserve information even when the power is turned off, for example. The memory generally has at least 16 kilobits of storage cells or more. Preferably, the memory device is a 16 kilobit device or 64 megabit device or greater, depending upon the application. The memory can be any product such as a X24320 product made by a company called Xicor, but can also be others. The memory cell and user identification will be more fully described below in reference to the FIGS.

FIG. 6 is a simplified diagram of a security method 600 for a module according to an embodiment of the present invention. This diagram is merely an illustration which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The present method shows an example of how the present security method can be implemented. The present method uses a combination of software 601 and hardware 603, which is in the computer module. A plurality of external devices can be accessed depending upon the embodiment. These external devices include a secondary hard drive 618, a removable drive 619, a network (e.g., LAN, modem) device 621, and others. A keyboard 623 is also shown, which can act locally.

The software 601 includes an operating system 609, application programs 607, and a data security and initialization program 605. Other programs can also exist. Additionally, some of these programs may not exist. Preferably, the data security and initialization program exists. This data security and initialization program is initiated once the attached computer module is inserted into the console. The program interface and oversees a variety of hardware features, which will be used to control access to the external devices, for example. Of course, the particular configuration of the software will depend upon the application.

Hardware features can be implemented using a primary hard disk 611 coupled to a CPU/cache combination, which includes a main memory. The main memory is often a volatile memory such as dynamic random access memory. Data from any one of the external devices can enter the CPU/cache combination. For example, the secondary hard disk memory and I/O address range data is transferred 624 to the CPU/cache combination. The removable drive memory and I/O address range data can also transfer 625 to the CPU/cache combination. The LAN memory and I/O address range data can also transfer 626 to the CPU/cache combination. Keyboard data can also transfer 627 to the CPU/cache combination. To write data from the module into any one of these external elements, the data security program interfaces with the data detection and control circuit to determine of such data should be transferred to any one of the external elements. As noted, the external elements include, among others, secondary hard disk, and removable drive. Here, the data security program checks the security identification number with other numbers to determine the security access level. There are many other ways that the present invention can be implemented. These methods are described more fully below.

FIG. 7 is a simplified diagram 700 of a method according to an embodiment of the present invention. This diagram is merely an illustration which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The present method begins at power up, which is step 701. The present method reads a security code, which has been entered by a user, for example, in step 703. The security code can be a string of characters, including numbers and letters. The security code is preferably a mixture of numbers and letters, which are at least about 6 characters in length, but is not limited.

The present method reads (step 703) the security code, which has been entered. Next, the security code is compared with a stored code, which is in flash memory or the like (step 705). If the compared code matches with the stored code, the method resumes to step 708. Alternatively, the method goes to step 707 via branch 706 where no access is granted. When no access is granted, all data are blocked out from the user that attempts to log onto the system. Alternatively, the method determines if a certain level of access is granted, step 708. Depending upon the embodiment, the present method can grant full access, step 710, via branch 716. The present method allows full access based upon information stored in the flash memory device. Alternatively, the method can allow the user to access a limited amount of information.

Here, the present method allows for at least one or more than two levels of access. In a specific embodiment, the present method allows for the user of the module to access peripheral storage (step 711). The access privilege is read-only. The user can read information on the peripheral storage including hard disks and the like. Once the user accesses the storage, the method data control, step 719, takes over, where the hardware prevents the user from accessing other information, step 721. In a specific embodiment, the method can allow information to be removed from the peripheral storage. If the method allows for data to be removed, step 723, the method goes through branch 731 to let data out, which can occur through the module. Alternatively, the method goes to block data (step 725) via branch 733. Depending upon the embodiment, the method returns to the decision block, step 723. Alternatively, the method traverses branch 714 to a peripheral read-only process, step 712. The read-only process programs data control, step 713. Next, the hardware takes over (step 715). The method blocks all data from being accessed by the user, step 717.

FIG. 8 is a simplified diagram of a system 800 according to an alternative embodiment of the present invention. This diagram is merely an example which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize many other variations, modifications, and alternatives. The system 800 includes an attached computer module 801, which can be inserted into one of a plurality of console devices to create a “plug and play” operation. For example, the console device can be peripheral console 801 or peripheral console 805. Each peripheral console can have similar or different connection characteristics. Peripheral console 803 couples to a local area network using Ethernet 817. Peripheral console 805 couples to a DSL line 827 through a DSL modem 825. Other consoles can also be included to use other types of networks such as ADSL, Cable Modem, wireless, Token Ring, and the like.

As shown, the attached computer module has elements such as a memory region 807, which stores BIOS information, a security code, and a security identification number on a flash memory device or the like. The memory region couples to a central processing region 809, which can include CPU, chipset, cache memory, graphics, and a hard disk drive, as well as other features. The central processing region couples to a host interface controller, which interfaces the attached computer module to one of the peripheral consoles. Any of the above information can also be included in the attached computer module.

Each peripheral console also has a variety of elements. These elements include a region 813, 821, which has a flash memory device with a security identification number, a password, access information, access privileges, internet service provider access information, as well as other features, which were previously noted. The peripheral console also has an interface controller 815, 823, which couples region 813, 821, respectively to a networking device 817, 825. The networking device can be an Ethernet card 817, which allows communication to the local area network 819. Alternatively, the networking device can be a DSL modem 825, which allows communication to a DSL (or ADSL) phone line. Other types of networking device can also be used, depending upon the application.

Each console provides a selected connection based upon set of predefined factors. These factors include communication hardware information so that software in attached computer module can read and allow a connection to a network. Here, access information can be provided to the user. Information about connection information will also be included. This connection information includes telephone numbers, account numbers, passwords (local), or a company password. The console and module combination will take care of charges, etc. based upon time bases. Module will have credit card information, but will have security. In a specific embodiment, the module inserts into the console. The module then asks the console which hardware will be used. If the hardware is an Ethernet connect, the module configures connection information to access the Ethernet connection. Alternatively, if the hardware requires a DSL connection, the module configures connection information to access the DSL connection. Other configuration information such as company server information, password, can also be provided.

Although the functionality above has been generally described in terms of a specific sequence of steps, other steps can also be used. Here, the steps can be implemented in a combination of hardware, firmware, and software. Either of these can be further combined or even separated. Depending upon the embodiment, the functionality can be implemented in a number of different ways without departing from the spirit and scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives.

While the above is a full description of the specific embodiments, various modifications, alternative constructions and equivalents may be used. Therefore, the above description and illustrations should not be taken as limiting the scope of the present invention which is defined by the appended claims.

Chu, William W. Y.

Patent Priority Assignee Title
10437608, Aug 24 2009 Microminiature personal computer and method of using thereof
7722468, Mar 09 2005 IGT Magnetoresistive memory units as read only memory devices in gaming machines
7844513, Jul 17 2000 RPX Corporation Method and system for operating a commissioned e-commerce service prover
7931533, Sep 28 2001 IGT Game development architecture that decouples the game logic from the graphics logics
8041873, May 14 1999 ACQIS LLC Multiple module computer system and method including differential signal channel comprising unidirectional serial bit channels to transmit encoded peripheral component interconnect bus transaction data
8234436, May 14 1999 ACQIS LLC Computer system including peripheral bridge to communicate serial bits of peripheral component interconnect bus transaction and low voltage differential signal channel to convey the serial bits
8302100, Jan 18 2000 RPX Corporation System for balance distribution of requests across multiple servers using dynamic metrics
8316131, Nov 10 2000 RPX Corporation Method and system for providing dynamic hosted service management across disparate accounts/sites
8429049, Jul 17 2000 RPX Corporation Method and system for allocating computing resources
8538843, Jul 17 2000 RPX Corporation Method and system for operating an E-commerce service provider
8626977, May 14 1999 ACQIS LLC Computer system including CPU or peripheral bridge to communicate serial bits of peripheral component interconnect bus transaction and low voltage differential signal channel to convey the serial bits
8671153, Aug 20 2010 ACQIS LLC Low cost, high performance and high data throughput server blade
8756359, May 14 1999 ACQIS LLC Computer system including CPU or peripheral bridge to communicate serial bits of peripheral component interconnect bus transaction and low voltage differential signal channel to convey the serial bits
8977797, May 14 1999 ACQIS LLC Method of improving peripheral component interface communications utilizing a low voltage differential signal channel
9529768, May 14 1999 ACQIS LLC Computer system including CPU or peripheral bridge directly connected to a low voltage differential signal channel that communicates serial bits of a peripheral component interconnect bus transaction in opposite directions
9529769, Mar 31 2005 ACQIS LLC Computer system including CPU or peripheral bridge directly connected to a low voltage differential signal channel that communicates serial bits of a peripheral component interconnect bus transaction in opposite directions
9703750, May 14 1999 ACQIS LLC Computer system including CPU or peripheral bridge directly connected to a low voltage differential signal channel that communicates serial bits of a peripheral component interconnect bus transaction in opposite directions
RE42814, Oct 30 1998 ACQIS LLC Password protected modular computer method and device
RE42984, May 14 1999 ACQIS LLC Data security method and device for computer modules
RE43119, Oct 30 1998 ACQIS LLC Password protected modular computer method and device
RE43171, May 14 1999 ACQIS LLC Data security method and device for computer modules
RE43602, May 14 1999 ACQIS LLC Data security method and device for computer modules
RE44468, May 14 1999 ACQIS LLC Data security method and device for computer modules
RE44654, May 14 1999 ACQIS LLC Data security method and device for computer modules
RE44739, May 14 1999 ACQIS LLC Data security method and device for computer modules
RE44933, Oct 30 1998 ACQIS LLC Password protected modular computer method and device
RE45140, May 14 1999 ACQIS LLC Data security method and device for computer modules
RE46947, May 14 1999 ACQIS LLC Data security method and device for computer modules
RE48365, Dec 19 2006 Mobile Motherboard Inc. Mobile motherboard
Patent Priority Assignee Title
3996585, Jun 11 1974 International Business Machines Corporation Video generator circuit for a dynamic digital television display
4623964, Dec 23 1981 INTERNATIONAL BUSINESS MACHINES CORPORATION, A CORP OF NEW YORK Homogeneous hierarchial computer business system
4700362, Oct 07 1983 DOLBY LABORATORIES LICENSING CORPORATION, SAN FRANCISCO, CA , A NY CORP A-D encoder and D-A decoder system
4769764, Aug 11 1986 Modular computer system with portable travel unit
4799258, Feb 13 1984 British Technology Group Limited Apparatus and methods for granting access to computers
4872091, Jul 21 1986 Ricoh Company, Ltd. Memory cartridge
4890282, Mar 08 1988 NETWORK EQUIPMENT TECHNOLOGIES, INC , A DE CORP Mixed mode compression for data transmission
4918572, Dec 27 1988 Motorola Inc Modular electronic package
4939735, Jul 21 1988 International Business Machines Corporation Information handling system having serial channel to control unit link
5056141, Jun 18 1986 Method and apparatus for the identification of personnel
5086499, May 23 1989 DaimlerChrysler AG Computer network for real time control with automatic fault identification and by-pass
5278509, Feb 03 1992 AT&T Bell Laboratories Method for monitoring battery discharge by determining the second derivative of battery voltage over time
5278730, Jun 29 1992 PDACO LTD Modular notebook computer having a planar array of module bays
5293497, Mar 13 1991 Microsoft Technology Licensing, LLC Cable for transmitting eight-bit parallel data
5311397, Aug 06 1992 3RE COM, INC Computer with modules readily replaceable by unskilled personnel
5317477, Jun 30 1992 International Business Machines Corporation; International Business Corporation High density interconnection assembly
5319771, May 10 1989 Seiko Epson Corporation CPU clock generator having a low frequency output during I/O operations and a high frequency output during memory operations
5331509, Jun 29 1992 PDACO LTD Modular notebook computer having a planar array of module bays and a pivotally attached flat-panel display
5355391, Mar 06 1992 RAMBUS INC A CORP OF CALIFORNIA High speed bus system
5428806, Jan 22 1993 QUANTUMNET INC Computer networking system including central chassis with processor and input/output modules, remote transceivers, and communication links between the transceivers and input/output modules
5436857, Nov 22 1993 Intellectual Ventures I LLC Personal computer module system and method of using
5463742, Mar 05 1993 Hitachi Computer Products (America), Inc.; HITACHI COMPUTER PRODUCTS AMERICA , INC Personal processor module and docking station for use therewith
5539616, Jun 29 1992 PDACO LTD Modular portable computer
5546463, Jul 12 1994 SAFENET, INC Pocket encrypting and authenticating communications device
5550710, Sep 09 1994 HITACHI COMPUTER PRODUCTS AMERICA , INC Packaging and cooling structure for the personal processor module
5550861, Sep 27 1994 FLAT CONNECTIONS, INC Modular PCMCIA modem and pager
5578940, Apr 04 1995 Rambus, Inc Modular bus with single or double parallel termination
5600800, Jun 29 1992 INPRO II LICENSING SARL Personal computer system having a docking bay and a hand-held portable computer adapted to dock in the docking bay by a full-service parallel bus
5606717, Apr 18 1990 Rambus, Inc. Memory circuitry having bus interface for receiving information in packets and access time registers
5608608, Jan 04 1995 Lenovo PC International Cartridge-based design for portable and fixed computers
5623637, Dec 06 1993 HELIOSTAR LLC Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
5630057, Jun 14 1988 PATEVO INC Secure architecture and apparatus using an independent computer cartridge
5638521, Oct 12 1992 Leunig GmbH Apparatus using a parallel interface for data transfer between a plurality of computers, as well as for transfer of data from computers to shared peripheral devices
5640302, Jun 29 1992 PDACO LTD Modular portable computer
5659773, Nov 14 1990 LENOVO SINGAPORE PTE LTD Personal computer with input/output subsystem
5663661, Apr 04 1995 Rambus, Inc. Modular bus with single or double parallel termination
5673174, Mar 23 1995 NEXAR TECHNOLOGIES, INC ; PALOMAR MEDICAL TECHNOLOGIES, INC System permitting the external replacement of the CPU and/or DRAM SIMMs microchip boards
5680126, Jun 29 1992 PDACO LTD Modular portable computer
5689654, Jun 29 1992 INPRO II LICENSING SARL Digital assistant system including a host computer with a docking bay for the digital assistant wherein a heat sink is moved into contact with a docked digital assistant for cooling the digital assistant
5721837, Oct 28 1993 INPRO II LICENSING SARL Micro-personal digital assistant including a temperature managed CPU
5721842, Aug 25 1995 AVOCENT REDMOND CORP Interconnection system for viewing and controlling remotely connected computers with on-screen video overlay for controlling of the interconnection switch
5745733, Aug 09 1995 NCR Corporation Computer system including a portable portion and a stationary portion providing both uni-processing and multiprocessing capabilities
5752080, Dec 22 1994 Intel Corporation Cable terminal unit using bit set for selectively enabling a plurality of hardware functions with some functions having a plurality of selectively enabled hardware functions
5774704, Jul 30 1996 Hewlett Packard Enterprise Development LP Apparatus and method for dynamic central processing unit clock adjustment
5795228, Jul 03 1996 Ridefilm Corporation Interactive computer-based entertainment system
5809538, Feb 07 1996 Google Technology Holdings LLC DRAM arbiter for video decoder
5815681, May 21 1996 PDACO LTD Integrated network switching hub and bus structure
5819050, Feb 29 1996 SCHNEIDER ELECTRIC SYSTEMS USA, INC Automatically configurable multi-purpose distributed control processor card for an industrial control system
5826048, Jan 31 1997 ST Wireless SA PCI bus with reduced number of signals
5848249, Jun 15 1995 Intel Corporation Method and apparatus for enabling intelligent I/O subsystems using PCI I/O devices
5859669, Nov 26 1996 Texas Instruments Incorporated System for encoding an image control signal onto a pixel clock signal
5907566, May 29 1997 Hewlett Packard Enterprise Development LP Continuous byte-stream encoder/decoder using frequency increase and cyclic redundancy check
5941965, May 16 1996 RATEZE REMOTE MGMT L L C Universal docking station
5948047, Aug 29 1996 RPX Corporation Detachable computer structure
5960213, Dec 18 1995 RPX Corporation Dynamically reconfigurable multi-function PCI adapter device
5968144, Jun 27 1996 VLSI Technology, Inc. System for supporting DMA I/O device using PCI bus and PCI-PCI bridge comprising programmable DMA controller for request arbitration and storing data transfer information
5977989, May 24 1995 International Business Machines Corporation Method and apparatus for synchronizing video and graphics data in a multimedia display system including a shared frame buffer
5982363, Oct 24 1997 Google Technology Holdings LLC Personal computer-based set-top converter for television services
5991163, Nov 12 1998 WSOU Investments, LLC Electronic circuit board assembly and method of closely stacking boards and cooling the same
5991844, Apr 17 1998 PMC-SIERRA, INC Redundant bus bridge systems and methods using selectively synchronized clock signals
5999952, Aug 15 1997 RPX Corporation Core computer unit
6002442, Apr 01 1997 Aitech International Corp. Method and apparatus for reducing flickers in video signal conversions
6011546, Nov 01 1995 MEDIATEK INC Programming structure for user interfaces
6028643, Sep 03 1997 Contemporary Display LLC Multiple-screen video adapter with television tuner
6029183, Aug 29 1996 RPX Corporation Transferable core computer
6038621, Nov 04 1996 Hewlett-Packard Company Dynamic peripheral control of I/O buffers in peripherals with modular I/O
6040792, Nov 19 1997 MONTEREY RESEARCH, LLC Universal serial bus to parallel bus signal converter and method of conversion
6052513, Jun 05 1996 Hewlett Packard Enterprise Development LP Multi-threaded bus master
6069615, Aug 19 1996 RARITAN AMERICAS, INC Single pointing device/keyboard for multiple computers
6088224, Dec 03 1997 EMC IP HOLDING COMPANY LLC Cabinet for storing a plurality of processing unit modules
6163464, Aug 08 1997 Hitachi, Ltd. Apparatus for interconnecting logic boards
6202169, Dec 31 1997 AVAYA Inc Transitioning between redundant computer systems on a network
6208522, Feb 12 1999 Hewlett Packard Enterprise Development LP Computer chassis assembly with a single center pluggable midplane board
6216185, May 01 1998 ACQIS LLC Personal computer peripheral console with attached computer module
6304895, Aug 22 1997 AVOCENT REDMOND CORP Method and system for intelligently controlling a remotely located computer
6311268, Nov 06 1998 ACQIS LLC Computer module device and method for television use
6314522, Jan 13 1999 ACQIS LLC Multi-voltage level CPU module
6317329, Nov 13 1998 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Data storage module alignment system and method
6321335,
6332180, Jun 10 1998 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Method and apparatus for communication in a multi-processor computer system
6345330, May 01 1998 ACQIS LLC Communication channel and interface devices for bridging computer interface buses
6366951, Feb 03 1997 Distributed processing system where a management computer automatically connects remote reduced-capability workstations with centralized computing modules
6378009, Aug 25 1998 VERTIV IT SYSTEMS, INC ; Avocent Corporation KVM (keyboard, video, and mouse) switch having a network interface circuit coupled to an external network and communicating in accordance with a standard network protocol
6381602, Jan 26 1999 Microsoft Technology Licensing, LLC Enforcing access control on resources at a location other than the source location
6393561, Apr 09 1997 Renesas Electronics Corporation Disk drive computer with programmable nonvolatile memory capable of rewriting a control program of the disk drive
6401124, Jan 13 1999 HANGER SOLUTIONS, LLC Network peripheral sharing system
6452790, Jul 07 1999 ACQIS TECHNOLOGY, INC Computer module device and method
6453344, Mar 31 1999 Amdahl Corporation Multiprocessor servers with controlled numbered of CPUs
6496361, Nov 16 1998 Wistron Corp Embedded CMOS camera in a laptop computer
6549966, Feb 09 1999 Adder Technology Limited Data routing device and system
6643777, May 14 1999 ACQIS LLC Data security method and device for computer modules
6718415, May 14 1999 ACQIS LLC Computer system and method including console housing multiple computer modules having independent processing units, mass storage devices, and graphics controllers
EP722138,
JP6289953,
WO9218924,
WO9400097,
WO9513640,
///
Executed onAssignorAssigneeConveyanceFrameReelDoc
May 06 1999CHU, WILLIAM W Y ACQIS TECHNOLOGY, INC ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0224630447 pdf
Feb 10 2005ACQis Technology, Inc.(assignment on the face of the patent)
Nov 01 2011ACQIS TECHNOLOGY, INC ACQIS LLCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0271540398 pdf
Date Maintenance Fee Events
Apr 07 2011M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
May 05 2011R2552: Refund - Payment of Maintenance Fee, 8th Yr, Small Entity.
May 05 2011STOL: Pat Hldr no Longer Claims Small Ent Stat


Date Maintenance Schedule
Jan 26 20134 years fee payment window open
Jul 26 20136 months grace period start (w surcharge)
Jan 26 2014patent expiry (for year 4)
Jan 26 20162 years to revive unintentionally abandoned end. (for year 4)
Jan 26 20178 years fee payment window open
Jul 26 20176 months grace period start (w surcharge)
Jan 26 2018patent expiry (for year 8)
Jan 26 20202 years to revive unintentionally abandoned end. (for year 8)
Jan 26 202112 years fee payment window open
Jul 26 20216 months grace period start (w surcharge)
Jan 26 2022patent expiry (for year 12)
Jan 26 20242 years to revive unintentionally abandoned end. (for year 12)