WO2006074490A1 - Access protection for a computer by means of a portable storage medium - Google Patents

Access protection for a computer by means of a portable storage medium Download PDF

Info

Publication number
WO2006074490A1
WO2006074490A1 PCT/ZA2005/000176 ZA2005000176W WO2006074490A1 WO 2006074490 A1 WO2006074490 A1 WO 2006074490A1 ZA 2005000176 W ZA2005000176 W ZA 2005000176W WO 2006074490 A1 WO2006074490 A1 WO 2006074490A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
unique
memory
memory device
managing
Prior art date
Application number
PCT/ZA2005/000176
Other languages
French (fr)
Inventor
Hjalmar Douglas Fuchs
Original Assignee
Hjalmar Douglas Fuchs
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hjalmar Douglas Fuchs filed Critical Hjalmar Douglas Fuchs
Publication of WO2006074490A1 publication Critical patent/WO2006074490A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Definitions

  • This Invention relates to a memory device such as a memory stick with a unique identifier
  • the electronic device i.e. a PC or laptop much the same as how a vehicle key is used to switch on and switch of the engine of a motor vehicle.
  • USB Sticks or memory
  • the present invention allows for the use of a the memory device to not only control power
  • a further object of the invention is to provide a unique and innovative product which is
  • the present invention aims to provide a solution for large quantities of
  • Single users can benefit from top level security by controlling access to their personal computers through the memory device which acts in the capacity as a key.
  • the present invention adds extra functionality to existing external memory market. It
  • system software for identifying the unique ID and allowing a user to control
  • controlling operation may include but not
  • the electronic device may include any one or
  • a Personal Computer a Laptop Computer, a Network Computer, a Desktop
  • the memory device may include any one or
  • a memory stick a flash memory device, a memory card, a bluetooth device/dongle
  • memory device may be connected or
  • a physical port or connector including but not limiter to USB, Rs232, Serial Port, Parallel Port, Fire Wire naming but a few.
  • the memory device may be c onnected or
  • wireless connection including but not limited to;
  • the unique ID may include any one or more of;
  • the systems software may be installed on the
  • the method my include controlling operation
  • the method may include the seizing or
  • the step of reading the unique ID maybe done
  • Figure 1 is a first and simplified embodiment of the invention ;
  • Figure 2 relates to a second embodiment of the invention including the process or
  • Figure 3 relates to a preferred embodiment where a user may use one electronic device
  • FIG. 1 there is included a first embodiment of the invention 1 including an
  • ports 2 such as a USB port for use in connecting 4 a memory device 3 such as a Memory
  • connection may be a physical connection such as through a known
  • the electronic device may include but not be limited to a Personal computer, Laptop
  • the Memory device may include any electronic device having memory or memory means
  • CHIP ID a unique identifier
  • ID a unique identifier
  • serial Code a unique identifier
  • the memory device In operation and in its simplest form the memory device needs to be connected to the
  • on the electronic device and/or memory device manages the access and services to one
  • the invention uses as example a memory stick / flash drive as memory
  • security triggers are used by means of security triggers. These security triggers and/or functionalities is done by means of security triggers.
  • system software forming part of the operating system i.e. for example as part of MS
  • Windows based products such as Xp or another provider i.e. Linux and/or form part of
  • the device can be divided into two major components, the physical device and the
  • connection is
  • the electronic device i.e. a Laptop or PC would be operational.
  • This scanning or reading process may be
  • Figure 3 relates to a preferred embodiment 22 where a user may use one electronic device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

This Invention relates to a memory device such as a memory stick with a unique identifier or ID to be used in conduction with an electronic device such as a Personal Computer as to enable a user to gain access or operate or control devices or services associated with the electronic device for example a PC or Laptop. The systems software running or operational on the electronic device and/or memory device will search and read a unique identifier on the memory device such as a serial number or code. Should the serial number or code not be Read operation of the electronic device is seized.

Description

ACCESS PROTECTION FOR A COMPUTER BY MEANS OF A PORTABLE STORAGE MEDIUM
INTRODUCTIONAND BACKGROUND
This Invention relates to a memory device such as a memory stick with a unique identifier
or ID to be used in conjunction with an electronic device such as a Personal Computer as
to enable a user to gain access or operate or control devices or services associated with the
electronic device for example a PC or Laptop.
In use systems software running op operational on the electronic device and/or memory
device will search and read a unique identifier on the memory device such as a serial number
or code.
The existing problem of course is that although many security systems and products exist
they run the systems software and usually includes passwords and codes which can be
copied, hacked or passed on. Of course the present invention may be used in conjunction
with a password or ID Code should the memory device fall into the wrong or unauthorized
users possession.
Should there be a simplified method and system for using a physical device with a unique
ID such as a memory stick or flashdrive the memory device could become a virtual "key"
for the electronic device i.e. a PC or laptop much the same as how a vehicle key is used to switch on and switch of the engine of a motor vehicle.
In the case of computers it will be very effective for security reasons ; no one can use your
computer unless they have the key(memory-stick) and each Memory-stick has a unique
programming code , thus each key is unique.
In this the memory stick acts as a key to activate the computer or laptop and therefor act in
the capacity of a USB security device. Most Computer users do have USB Sticks or memory
devices/cards which they use in conjunction with Personal Computers, Mobile Phones,
Digital Cameras, Media Players naming but a few.
In use the systems software or application could be distributed with each new memory stick
or card sold and/or be downloaded from the Internet or be purchased at chain stores or
Computer dealers.
The present invention allows for the use of a the memory device to not only control power
and/or operation of the electronic device but for it to be used to control services, processes
and devices connected or connectable to the electronic device i.e. in a network environment. OBJECT OF THE INVENTION
Accordingly it is an object of the present invention to provide a memory device having a
unique identifier which is used in conjunction with an electronic device such as a Personal
Computer to be able to control access and/or services and/or processes on the electronic
device where problems and shortfalls of known systems such as password protection may
at least be alleviated.
A further object of the invention is to provide a unique and innovative product which is
believed to be a market activity generator for increased sales providing the following
benefits:
• Creates a security environment by locking and unlocking the personal computer via
an external hardware device.
• Scalability - usage range from individual to corporate users.
• Cutting edge and new technology.
• Value added product to current users
Furthermore the present invention aims to provide a solution for large quantities of
computers in a corporate environment that can be manipulated and controlled by single or
multiple "key holders" in the form of the memory device.
Single users can benefit from top level security by controlling access to their personal computers through the memory device which acts in the capacity as a key.
The present invention adds extra functionality to existing external memory market. It
provides the user of this market with a security extension.
It is envisaged that the present invention may be distributed with each memory stick or card
sold thereby giving a lower all over cost to both individual and corporate users.
SUMMARY
According to the 1st aspect of the invention there is included a system for controlling
operation of an electronic device the system comprising:
- a memory device having a unique ID connected or connectable with the electronic
device; and
system software for identifying the unique ID and allowing a user to control
operation of the said electronic device.
According to the 2nd aspect of the invention the controlling operation may include but not
be limited to access to the electronic device; managing of the electronic device, managing
of processes and services and managing tasks.
According to the 3rd aspect of the invention the electronic device may include any one or
more of; a Personal Computer, a Laptop Computer, a Network Computer, a Desktop
Computer, a Cellular or Mobile phone and a PDA.
According to the 4th aspect of the invention the memory device may include any one or
more of; a memory stick, a flash memory device, a memory card, a bluetooth device/dongle
or the like.
According to the 5th aspect of the invention memory device may be connected or
connectable to the electronic device via a physical port or connector including but not limiter to USB, Rs232, Serial Port, Parallel Port, Fire Wire naming but a few.
According to the 6th aspect of the invention the memory device may be c onnected or
connectable to the electronic device via wireless connection including but not limited to;
infra red, wireless WAN, wireless LAN and Bluetooth naming but a few.
According to the 7th aspect of the invention the unique ID may include any one or more of;
a serial number or code, a chip or electronic ID, firmware ID naming but a few
According to the 8th aspect of the invention the systems software may be installed on the
memory device and/or the electronic device.
According to the 9th aspect of the included a method for controlling operation of an
electronic device the method including the step of:
- providing a memory device having a unique ID connected or connectable with the
electronic device; and
- providing system software for identifying the unique ID and
- upon reading the unique ID allowing a user to control operation of the said electronic
device. According to the 10th aspect of the invention the method my include controlling operation
related to any one or more of: access to the electronic device; managing of the electronic
device, managing of processes and services and managing tasks.
According to the 11th aspect of the invention the method may include the seizing or
disablement of operation upon non or misreading of the unique ID.
According to the 12th aspect of the invention the step of reading the unique ID maybe done
in real time or in preset time increments.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will now be described with reference to the accompanying diagrams
, flow and process charts without implying any limitations to the invention of which:
Figure 1 is a first and simplified embodiment of the invention ;
Figure 2 relates to a second embodiment of the invention including the process or
workings of the systems software ; and
Figure 3 relates to a preferred embodiment where a user may use one electronic device
in conjunction with the said memory device to control access and/or services
DESCRIPTIONS OF THE PREFERRED EMBODIMENTS
Turning to Figure 1 there is included a first embodiment of the invention 1 including an
electronic device such as a Laptop or Personal Computer 2 with one or more connection
ports 2 such as a USB port for use in connecting 4 a memory device 3 such as a Memory
Stick 3 to the electronic device as shown in 5 so that communication and/or connection 6
may take place between the memory device and the electronic device as shown.
It is envisaged that the connection may be a physical connection such as through a known
port or communication interface and/or through a wireless connection such as via wireless
LAN, Bluetooth or infra red.
The electronic device may include but not be limited to a Personal computer, Laptop
Computer, PDA (Personal Desktop Assistant) Media Player, Cellular or Mobile phone
naming but a few.
The Memory device may include any electronic device having memory or memory means
and having a unique identifier such as a CHIP ID, ID or serial Code or the like and may
include a Memory Stick, Flash Memory, Bluetooth Dongle or the like.
In operation and in its simplest form the memory device needs to be connected to the
electronic device to allow operation of said electronic device. In this the use of the memory
device becomes to the electronic device the same as car keys becomes to a vehicle. When the memory device is removed the electronic device becomes disabled. Systems software
on the electronic device and/or memory device manages the access and services to one
electronic device or where a network is installed multiple electronic devices.
In this example the invention uses as example a memory stick / flash drive as memory
device that can manipulate a computers (electronic device) through the operating system
by means of a power on/of activation or to make the operating system usable or not usable
by means of security triggers. These security triggers and/or functionalities is done by means
of system software forming part of the operating system i.e. for example as part of MS
Windows based products such as Xp or another provider i.e. Linux and/or form part of
special software applications distributed with the memory device and/or electronic device.
In use the moment the given memory-stick enters the USB port on the given computer ; the
computer will either switch on immediately , prompted by the specially installed software
or the computer may be on already but only useable once the memory stick/flashdrive is
inserted into the USB port .
It is a priority that the electronic device combines the functionality of a single memory stick
and the written software.
Therefor the device can be divided into two major components, the physical device and the
software managing or controlling the electronic device Figure 2 relates to a second embodiment of the invention 8 including the process or
workings of the systems software which is initiated 9 and loaded 10 after which it searches
or tries to identify and communicate/connect 11 to the memory device. If connection is
made it reads the unique identifier or code and if it corresponds 12 with the one stored or
saved in the electronic device it gives access to the device for usage thereof. If the the
unique identifier or code is not read or detected 13 it will lock the electronic device 14 and
try to read or identify it again 11 in real time or upon a preprogramed or selected time frame.
Should the electronic device not read or detect the unique identifier or code after access is
granted and the presence of the memory device not found 15 it will go back 16 to the
process or step of trying to read or identity the memory device.
In use the user would be required to insert the memory device into the electronic device
after which the electronic device i.e. a Laptop or PC would be operational. When the user
disconnects the memory device the electronic device would be locked until the memory
device is again connected to the electronic device. This scanning or reading process may be
continuos of nature and be repeatedly done i.e. in real time or a pre selected time intervals
i.e. each second, minute or the like. In an advanced form 17 the user may use the present
invention to monitor and control 15 services such as access to other networks 18, programs
19, databases 20 and/or to devices 21. Figure 3 relates to a preferred embodiment 22 where a user may use one electronic device
23 in conjunction with the said memory device 24 to control access and/or services on other
electronic devices i.e. PC's or workstations 26, 27, 28, 29, 30 connected or connectable to
a network 25 and/or to a another 32 or multiple networks (not shown) with electronic
devices 33 connected thereto. In this use the user may control multiple devices/electronic
devices and networks. This may prove to be very helpful and efficient in high security
environments such as banks, large corporations and the like.
It is envisaged that the specially written software program for the USB. devices, will give
an extra functionality to the corporate environment by controlling the computers remotely
through the applicable WAN, LAN or wireless networks. The services and processes can
now be manipulated through the use of the mentioned program, conclusive of the device.
Further functions of and benefits may include but not be limited to
• Controls individual tasks, services and processes on the machine and can be extended
to be customized to a unique setting for each individual key holder.
• Tasks : i nclude t he c ontrolling o f w hich actions are a Uowed to t ake p lace for
example, when "Network Shares" are allowed to be seen or not.
• Services: the controlling of individual service actions like "Pause" and "Start", for
each individual running service on the machine.
• Processes: setting up each access device to only be allowed to run applications that
were set up during initial set up and configuration.

Claims

1 A system for controlling operation of an electronic device the system comprising:
- a memory device having a unique ID connected or connectable with the electronic
device; and
- system software for identifying the unique ID and allowing a user to control
operation of the said electronic device.
2 A system as claimed in claim 1 wherein the controlling operation includes but is not
be limited to: access to the electronic device; managing of the electronic device,
managing of processes and services and managing tasks.
3 A system as claimed in claim 1 wherein the electronic device includes any one or
more of; a Personal Computer, a Laptop Computer, a Network Computer, a Desktop
Computer, a Cellular or Mobile phone and a PDA.
4 A system as claimed in claim 1 wherein the memory device includes any one or more
of; a memory stick, a flash memory device, a memory card, a bluetooth
device/Dongle or the like.
5 A system as claimed in claim 1 wherein the memory device is connected or
connectable to the electronic device via a physical port or connector including but not
limiter to USB, Rs232, Serial Port, Parallel Port, Fire Wire naming but a few. 6 A system as claimed in claim 1 wherein the device is connected or connectable to the
electronic device via wireless connection including but not limited to; infra red,
wireless WAN, wireless LAN and Bluetooth naming but a few.
7 A system as claimed in claim 1 wherein the unique ID includes any one or more of;
a serial number or code, a chip or electronic ID, firmware ID naming but a few.
8 A system as claimed in claim 1 wherein the software is installed on the memory
device and/or the electronic device.
9 A method for controlling operation of an electronic device the method including the
step of:
- providing a memory device having a unique ID connected or connectable with the
electronic device; and
- providing system software for identifying the unique ID and
- upon reading the unique ID allowing a user to control operation of the said electronic
device.
10 A method as claimed in claim 9 wherein the method includes controlling operation
related to any one or more of: access to the electronic device; managing of the
electronic device, managing of processes and services and managing tasks. A Method as claimed in claim 9 and claim 10 wherein the the method includes the
seizing or disablement of operation upon non or misreading of the unique ID.
A Method as claimed in claim any of the preceding claims wherein step of reading
the unique ID is be done in real time or in preset time increments.
PCT/ZA2005/000176 2004-11-30 2005-11-30 Access protection for a computer by means of a portable storage medium WO2006074490A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZAZA2004/9657 2004-11-30
ZA200409657 2004-11-30

Publications (1)

Publication Number Publication Date
WO2006074490A1 true WO2006074490A1 (en) 2006-07-13

Family

ID=36406021

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2005/000176 WO2006074490A1 (en) 2004-11-30 2005-11-30 Access protection for a computer by means of a portable storage medium

Country Status (2)

Country Link
WO (1) WO2006074490A1 (en)
ZA (1) ZA200607720B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2440237A (en) * 2006-07-11 2008-01-23 Lenovo Computer security control on USB flash disk
EP2336940A1 (en) * 2009-12-21 2011-06-22 Giga-Byte Technology Co., Ltd. Method for password management and authentication
EP2336942A1 (en) * 2009-12-21 2011-06-22 Giga-Byte Technology Co., Ltd. Computer readable medium storing a program for password management and user authentication
US9449165B2 (en) 2014-02-06 2016-09-20 Untethered Labs, Inc. System and method for wireless proximity-based access to a computing device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL9101506A (en) * 1991-09-06 1993-04-01 Nederland Ptt Method for securing personal computers, computer terminals and the like
DE19508288A1 (en) * 1995-03-09 1995-10-05 Peter Prof Dr Ing Liell Prevention of unauthorised access to computer system
FR2783943A1 (en) * 1998-09-25 2000-03-31 Sami Abikhalil Computer functionality access control device, in addition to computer access control, power supply to peripherals is controlled
US6401205B1 (en) * 1998-02-11 2002-06-04 Durango Corporation Infrared type security system for a computer
WO2003079163A2 (en) * 2002-03-13 2003-09-25 Fujitsu Siemens Computers Gmbh Access protection for a computer by means of a transportable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL9101506A (en) * 1991-09-06 1993-04-01 Nederland Ptt Method for securing personal computers, computer terminals and the like
DE19508288A1 (en) * 1995-03-09 1995-10-05 Peter Prof Dr Ing Liell Prevention of unauthorised access to computer system
US6401205B1 (en) * 1998-02-11 2002-06-04 Durango Corporation Infrared type security system for a computer
FR2783943A1 (en) * 1998-09-25 2000-03-31 Sami Abikhalil Computer functionality access control device, in addition to computer access control, power supply to peripherals is controlled
WO2003079163A2 (en) * 2002-03-13 2003-09-25 Fujitsu Siemens Computers Gmbh Access protection for a computer by means of a transportable storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2440237A (en) * 2006-07-11 2008-01-23 Lenovo Computer security control on USB flash disk
GB2440237B (en) * 2006-07-11 2008-09-10 Lenovo Computer security control method based USB flash disk
EP2336940A1 (en) * 2009-12-21 2011-06-22 Giga-Byte Technology Co., Ltd. Method for password management and authentication
EP2336942A1 (en) * 2009-12-21 2011-06-22 Giga-Byte Technology Co., Ltd. Computer readable medium storing a program for password management and user authentication
US9449165B2 (en) 2014-02-06 2016-09-20 Untethered Labs, Inc. System and method for wireless proximity-based access to a computing device

Also Published As

Publication number Publication date
ZA200607720B (en) 2007-01-31

Similar Documents

Publication Publication Date Title
KR101052128B1 (en) Authentication method, device and system of external storage device
US7877563B2 (en) Programmable memory device security
US11190936B2 (en) Wireless authentication system
US20080307409A1 (en) Method for virtualizing a personal working environment and device for the same
US20060069814A1 (en) Mass storage device with near field communications
US7870376B2 (en) System, method and program product for controlling access to computer system
US20100023650A1 (en) System and method for using a smart card in conjunction with a flash memory controller to detect logon authentication
US20100325736A1 (en) Remote access control of storage devices
TW200814720A (en) Device and method for controlling usage of a memory card
JP2009070073A (en) Information processor and agent computer program
US20120198538A1 (en) Multi-enclave token
WO2010030157A1 (en) A method of authentication of computer id for portable data storage devices
TWI753286B (en) Self-encrypting device, management server, method for data security, and non-transitory machine-readable srotage medium thereof
US20090254762A1 (en) Access control for a memory device
WO2008003175A1 (en) One time password access to portable credential entry and memory storage devices
US8245054B2 (en) Secure and convenient access control for storage devices supporting passwords for individual partitions
US20050235364A1 (en) Authentication mechanism permitting access to data stored in a data processing device
JP7042526B2 (en) Deadline management server, agent program and terminal lending system
WO2011003304A1 (en) Phone-card locking method and device for wireless communication
WO2006074490A1 (en) Access protection for a computer by means of a portable storage medium
WO2016187966A1 (en) Terminal and method for protecting data security of terminal
WO2007055939A1 (en) A method, apparatus, and system for securing data on a removable memory device
JP2010535380A (en) System and method for unauthorized use prevention control
CN111125710B (en) Information processing method and device, electronic equipment and storage medium
KR101348196B1 (en) Computer security device linked with mobile phone

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05856152

Country of ref document: EP

Kind code of ref document: A1