WO2006074490A1 - Access protection for a computer by means of a portable storage medium - Google Patents
Access protection for a computer by means of a portable storage medium Download PDFInfo
- Publication number
- WO2006074490A1 WO2006074490A1 PCT/ZA2005/000176 ZA2005000176W WO2006074490A1 WO 2006074490 A1 WO2006074490 A1 WO 2006074490A1 ZA 2005000176 W ZA2005000176 W ZA 2005000176W WO 2006074490 A1 WO2006074490 A1 WO 2006074490A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- unique
- memory
- memory device
- managing
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Definitions
- This Invention relates to a memory device such as a memory stick with a unique identifier
- the electronic device i.e. a PC or laptop much the same as how a vehicle key is used to switch on and switch of the engine of a motor vehicle.
- USB Sticks or memory
- the present invention allows for the use of a the memory device to not only control power
- a further object of the invention is to provide a unique and innovative product which is
- the present invention aims to provide a solution for large quantities of
- Single users can benefit from top level security by controlling access to their personal computers through the memory device which acts in the capacity as a key.
- the present invention adds extra functionality to existing external memory market. It
- system software for identifying the unique ID and allowing a user to control
- controlling operation may include but not
- the electronic device may include any one or
- a Personal Computer a Laptop Computer, a Network Computer, a Desktop
- the memory device may include any one or
- a memory stick a flash memory device, a memory card, a bluetooth device/dongle
- memory device may be connected or
- a physical port or connector including but not limiter to USB, Rs232, Serial Port, Parallel Port, Fire Wire naming but a few.
- the memory device may be c onnected or
- wireless connection including but not limited to;
- the unique ID may include any one or more of;
- the systems software may be installed on the
- the method my include controlling operation
- the method may include the seizing or
- the step of reading the unique ID maybe done
- Figure 1 is a first and simplified embodiment of the invention ;
- Figure 2 relates to a second embodiment of the invention including the process or
- Figure 3 relates to a preferred embodiment where a user may use one electronic device
- FIG. 1 there is included a first embodiment of the invention 1 including an
- ports 2 such as a USB port for use in connecting 4 a memory device 3 such as a Memory
- connection may be a physical connection such as through a known
- the electronic device may include but not be limited to a Personal computer, Laptop
- the Memory device may include any electronic device having memory or memory means
- CHIP ID a unique identifier
- ID a unique identifier
- serial Code a unique identifier
- the memory device In operation and in its simplest form the memory device needs to be connected to the
- on the electronic device and/or memory device manages the access and services to one
- the invention uses as example a memory stick / flash drive as memory
- security triggers are used by means of security triggers. These security triggers and/or functionalities is done by means of security triggers.
- system software forming part of the operating system i.e. for example as part of MS
- Windows based products such as Xp or another provider i.e. Linux and/or form part of
- the device can be divided into two major components, the physical device and the
- connection is
- the electronic device i.e. a Laptop or PC would be operational.
- This scanning or reading process may be
- Figure 3 relates to a preferred embodiment 22 where a user may use one electronic device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
This Invention relates to a memory device such as a memory stick with a unique identifier or ID to be used in conduction with an electronic device such as a Personal Computer as to enable a user to gain access or operate or control devices or services associated with the electronic device for example a PC or Laptop. The systems software running or operational on the electronic device and/or memory device will search and read a unique identifier on the memory device such as a serial number or code. Should the serial number or code not be Read operation of the electronic device is seized.
Description
ACCESS PROTECTION FOR A COMPUTER BY MEANS OF A PORTABLE STORAGE MEDIUM
INTRODUCTIONAND BACKGROUND
This Invention relates to a memory device such as a memory stick with a unique identifier
or ID to be used in conjunction with an electronic device such as a Personal Computer as
to enable a user to gain access or operate or control devices or services associated with the
electronic device for example a PC or Laptop.
In use systems software running op operational on the electronic device and/or memory
device will search and read a unique identifier on the memory device such as a serial number
or code.
The existing problem of course is that although many security systems and products exist
they run the systems software and usually includes passwords and codes which can be
copied, hacked or passed on. Of course the present invention may be used in conjunction
with a password or ID Code should the memory device fall into the wrong or unauthorized
users possession.
Should there be a simplified method and system for using a physical device with a unique
ID such as a memory stick or flashdrive the memory device could become a virtual "key"
for the electronic device i.e. a PC or laptop much the same as how a vehicle key is used to
switch on and switch of the engine of a motor vehicle.
In the case of computers it will be very effective for security reasons ; no one can use your
computer unless they have the key(memory-stick) and each Memory-stick has a unique
programming code , thus each key is unique.
In this the memory stick acts as a key to activate the computer or laptop and therefor act in
the capacity of a USB security device. Most Computer users do have USB Sticks or memory
devices/cards which they use in conjunction with Personal Computers, Mobile Phones,
Digital Cameras, Media Players naming but a few.
In use the systems software or application could be distributed with each new memory stick
or card sold and/or be downloaded from the Internet or be purchased at chain stores or
Computer dealers.
The present invention allows for the use of a the memory device to not only control power
and/or operation of the electronic device but for it to be used to control services, processes
and devices connected or connectable to the electronic device i.e. in a network environment.
OBJECT OF THE INVENTION
Accordingly it is an object of the present invention to provide a memory device having a
unique identifier which is used in conjunction with an electronic device such as a Personal
Computer to be able to control access and/or services and/or processes on the electronic
device where problems and shortfalls of known systems such as password protection may
at least be alleviated.
A further object of the invention is to provide a unique and innovative product which is
believed to be a market activity generator for increased sales providing the following
benefits:
• Creates a security environment by locking and unlocking the personal computer via
an external hardware device.
• Scalability - usage range from individual to corporate users.
• Cutting edge and new technology.
• Value added product to current users
Furthermore the present invention aims to provide a solution for large quantities of
computers in a corporate environment that can be manipulated and controlled by single or
multiple "key holders" in the form of the memory device.
Single users can benefit from top level security by controlling access to their personal
computers through the memory device which acts in the capacity as a key.
The present invention adds extra functionality to existing external memory market. It
provides the user of this market with a security extension.
It is envisaged that the present invention may be distributed with each memory stick or card
sold thereby giving a lower all over cost to both individual and corporate users.
SUMMARY
According to the 1st aspect of the invention there is included a system for controlling
operation of an electronic device the system comprising:
- a memory device having a unique ID connected or connectable with the electronic
device; and
system software for identifying the unique ID and allowing a user to control
operation of the said electronic device.
According to the 2nd aspect of the invention the controlling operation may include but not
be limited to access to the electronic device; managing of the electronic device, managing
of processes and services and managing tasks.
According to the 3rd aspect of the invention the electronic device may include any one or
more of; a Personal Computer, a Laptop Computer, a Network Computer, a Desktop
Computer, a Cellular or Mobile phone and a PDA.
According to the 4th aspect of the invention the memory device may include any one or
more of; a memory stick, a flash memory device, a memory card, a bluetooth device/dongle
or the like.
According to the 5th aspect of the invention memory device may be connected or
connectable to the electronic device via a physical port or connector including but not
limiter to USB, Rs232, Serial Port, Parallel Port, Fire Wire naming but a few.
According to the 6th aspect of the invention the memory device may be c onnected or
connectable to the electronic device via wireless connection including but not limited to;
infra red, wireless WAN, wireless LAN and Bluetooth naming but a few.
According to the 7th aspect of the invention the unique ID may include any one or more of;
a serial number or code, a chip or electronic ID, firmware ID naming but a few
According to the 8th aspect of the invention the systems software may be installed on the
memory device and/or the electronic device.
According to the 9th aspect of the included a method for controlling operation of an
electronic device the method including the step of:
- providing a memory device having a unique ID connected or connectable with the
electronic device; and
- providing system software for identifying the unique ID and
- upon reading the unique ID allowing a user to control operation of the said electronic
device.
According to the 10th aspect of the invention the method my include controlling operation
related to any one or more of: access to the electronic device; managing of the electronic
device, managing of processes and services and managing tasks.
According to the 11th aspect of the invention the method may include the seizing or
disablement of operation upon non or misreading of the unique ID.
According to the 12th aspect of the invention the step of reading the unique ID maybe done
in real time or in preset time increments.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will now be described with reference to the accompanying diagrams
, flow and process charts without implying any limitations to the invention of which:
Figure 1 is a first and simplified embodiment of the invention ;
Figure 2 relates to a second embodiment of the invention including the process or
workings of the systems software ; and
Figure 3 relates to a preferred embodiment where a user may use one electronic device
in conjunction with the said memory device to control access and/or services
DESCRIPTIONS OF THE PREFERRED EMBODIMENTS
Turning to Figure 1 there is included a first embodiment of the invention 1 including an
electronic device such as a Laptop or Personal Computer 2 with one or more connection
ports 2 such as a USB port for use in connecting 4 a memory device 3 such as a Memory
Stick 3 to the electronic device as shown in 5 so that communication and/or connection 6
may take place between the memory device and the electronic device as shown.
It is envisaged that the connection may be a physical connection such as through a known
port or communication interface and/or through a wireless connection such as via wireless
LAN, Bluetooth or infra red.
The electronic device may include but not be limited to a Personal computer, Laptop
Computer, PDA (Personal Desktop Assistant) Media Player, Cellular or Mobile phone
naming but a few.
The Memory device may include any electronic device having memory or memory means
and having a unique identifier such as a CHIP ID, ID or serial Code or the like and may
include a Memory Stick, Flash Memory, Bluetooth Dongle or the like.
In operation and in its simplest form the memory device needs to be connected to the
electronic device to allow operation of said electronic device. In this the use of the memory
device becomes to the electronic device the same as car keys becomes to a vehicle. When
the memory device is removed the electronic device becomes disabled. Systems software
on the electronic device and/or memory device manages the access and services to one
electronic device or where a network is installed multiple electronic devices.
In this example the invention uses as example a memory stick / flash drive as memory
device that can manipulate a computers (electronic device) through the operating system
by means of a power on/of activation or to make the operating system usable or not usable
by means of security triggers. These security triggers and/or functionalities is done by means
of system software forming part of the operating system i.e. for example as part of MS
Windows based products such as Xp or another provider i.e. Linux and/or form part of
special software applications distributed with the memory device and/or electronic device.
In use the moment the given memory-stick enters the USB port on the given computer ; the
computer will either switch on immediately , prompted by the specially installed software
or the computer may be on already but only useable once the memory stick/flashdrive is
inserted into the USB port .
It is a priority that the electronic device combines the functionality of a single memory stick
and the written software.
Therefor the device can be divided into two major components, the physical device and the
software managing or controlling the electronic device
Figure 2 relates to a second embodiment of the invention 8 including the process or
workings of the systems software which is initiated 9 and loaded 10 after which it searches
or tries to identify and communicate/connect 11 to the memory device. If connection is
made it reads the unique identifier or code and if it corresponds 12 with the one stored or
saved in the electronic device it gives access to the device for usage thereof. If the the
unique identifier or code is not read or detected 13 it will lock the electronic device 14 and
try to read or identify it again 11 in real time or upon a preprogramed or selected time frame.
Should the electronic device not read or detect the unique identifier or code after access is
granted and the presence of the memory device not found 15 it will go back 16 to the
process or step of trying to read or identity the memory device.
In use the user would be required to insert the memory device into the electronic device
after which the electronic device i.e. a Laptop or PC would be operational. When the user
disconnects the memory device the electronic device would be locked until the memory
device is again connected to the electronic device. This scanning or reading process may be
continuos of nature and be repeatedly done i.e. in real time or a pre selected time intervals
i.e. each second, minute or the like. In an advanced form 17 the user may use the present
invention to monitor and control 15 services such as access to other networks 18, programs
19, databases 20 and/or to devices 21.
Figure 3 relates to a preferred embodiment 22 where a user may use one electronic device
23 in conjunction with the said memory device 24 to control access and/or services on other
electronic devices i.e. PC's or workstations 26, 27, 28, 29, 30 connected or connectable to
a network 25 and/or to a another 32 or multiple networks (not shown) with electronic
devices 33 connected thereto. In this use the user may control multiple devices/electronic
devices and networks. This may prove to be very helpful and efficient in high security
environments such as banks, large corporations and the like.
It is envisaged that the specially written software program for the USB. devices, will give
an extra functionality to the corporate environment by controlling the computers remotely
through the applicable WAN, LAN or wireless networks. The services and processes can
now be manipulated through the use of the mentioned program, conclusive of the device.
Further functions of and benefits may include but not be limited to
• Controls individual tasks, services and processes on the machine and can be extended
to be customized to a unique setting for each individual key holder.
• Tasks : i nclude t he c ontrolling o f w hich actions are a Uowed to t ake p lace for
example, when "Network Shares" are allowed to be seen or not.
• Services: the controlling of individual service actions like "Pause" and "Start", for
each individual running service on the machine.
• Processes: setting up each access device to only be allowed to run applications that
were set up during initial set up and configuration.
Claims
1 A system for controlling operation of an electronic device the system comprising:
- a memory device having a unique ID connected or connectable with the electronic
device; and
- system software for identifying the unique ID and allowing a user to control
operation of the said electronic device.
2 A system as claimed in claim 1 wherein the controlling operation includes but is not
be limited to: access to the electronic device; managing of the electronic device,
managing of processes and services and managing tasks.
3 A system as claimed in claim 1 wherein the electronic device includes any one or
more of; a Personal Computer, a Laptop Computer, a Network Computer, a Desktop
Computer, a Cellular or Mobile phone and a PDA.
4 A system as claimed in claim 1 wherein the memory device includes any one or more
of; a memory stick, a flash memory device, a memory card, a bluetooth
device/Dongle or the like.
5 A system as claimed in claim 1 wherein the memory device is connected or
connectable to the electronic device via a physical port or connector including but not
limiter to USB, Rs232, Serial Port, Parallel Port, Fire Wire naming but a few.
6 A system as claimed in claim 1 wherein the device is connected or connectable to the
electronic device via wireless connection including but not limited to; infra red,
wireless WAN, wireless LAN and Bluetooth naming but a few.
7 A system as claimed in claim 1 wherein the unique ID includes any one or more of;
a serial number or code, a chip or electronic ID, firmware ID naming but a few.
8 A system as claimed in claim 1 wherein the software is installed on the memory
device and/or the electronic device.
9 A method for controlling operation of an electronic device the method including the
step of:
- providing a memory device having a unique ID connected or connectable with the
electronic device; and
- providing system software for identifying the unique ID and
- upon reading the unique ID allowing a user to control operation of the said electronic
device.
10 A method as claimed in claim 9 wherein the method includes controlling operation
related to any one or more of: access to the electronic device; managing of the
electronic device, managing of processes and services and managing tasks.
A Method as claimed in claim 9 and claim 10 wherein the the method includes the
seizing or disablement of operation upon non or misreading of the unique ID.
A Method as claimed in claim any of the preceding claims wherein step of reading
the unique ID is be done in real time or in preset time increments.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ZAZA2004/9657 | 2004-11-30 | ||
ZA200409657 | 2004-11-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006074490A1 true WO2006074490A1 (en) | 2006-07-13 |
Family
ID=36406021
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/ZA2005/000176 WO2006074490A1 (en) | 2004-11-30 | 2005-11-30 | Access protection for a computer by means of a portable storage medium |
Country Status (2)
Country | Link |
---|---|
WO (1) | WO2006074490A1 (en) |
ZA (1) | ZA200607720B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2440237A (en) * | 2006-07-11 | 2008-01-23 | Lenovo | Computer security control on USB flash disk |
EP2336940A1 (en) * | 2009-12-21 | 2011-06-22 | Giga-Byte Technology Co., Ltd. | Method for password management and authentication |
EP2336942A1 (en) * | 2009-12-21 | 2011-06-22 | Giga-Byte Technology Co., Ltd. | Computer readable medium storing a program for password management and user authentication |
US9449165B2 (en) | 2014-02-06 | 2016-09-20 | Untethered Labs, Inc. | System and method for wireless proximity-based access to a computing device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL9101506A (en) * | 1991-09-06 | 1993-04-01 | Nederland Ptt | Method for securing personal computers, computer terminals and the like |
DE19508288A1 (en) * | 1995-03-09 | 1995-10-05 | Peter Prof Dr Ing Liell | Prevention of unauthorised access to computer system |
FR2783943A1 (en) * | 1998-09-25 | 2000-03-31 | Sami Abikhalil | Computer functionality access control device, in addition to computer access control, power supply to peripherals is controlled |
US6401205B1 (en) * | 1998-02-11 | 2002-06-04 | Durango Corporation | Infrared type security system for a computer |
WO2003079163A2 (en) * | 2002-03-13 | 2003-09-25 | Fujitsu Siemens Computers Gmbh | Access protection for a computer by means of a transportable storage medium |
-
2005
- 2005-11-30 WO PCT/ZA2005/000176 patent/WO2006074490A1/en active Application Filing
-
2006
- 2006-09-04 ZA ZA200607720A patent/ZA200607720B/en unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL9101506A (en) * | 1991-09-06 | 1993-04-01 | Nederland Ptt | Method for securing personal computers, computer terminals and the like |
DE19508288A1 (en) * | 1995-03-09 | 1995-10-05 | Peter Prof Dr Ing Liell | Prevention of unauthorised access to computer system |
US6401205B1 (en) * | 1998-02-11 | 2002-06-04 | Durango Corporation | Infrared type security system for a computer |
FR2783943A1 (en) * | 1998-09-25 | 2000-03-31 | Sami Abikhalil | Computer functionality access control device, in addition to computer access control, power supply to peripherals is controlled |
WO2003079163A2 (en) * | 2002-03-13 | 2003-09-25 | Fujitsu Siemens Computers Gmbh | Access protection for a computer by means of a transportable storage medium |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2440237A (en) * | 2006-07-11 | 2008-01-23 | Lenovo | Computer security control on USB flash disk |
GB2440237B (en) * | 2006-07-11 | 2008-09-10 | Lenovo | Computer security control method based USB flash disk |
EP2336940A1 (en) * | 2009-12-21 | 2011-06-22 | Giga-Byte Technology Co., Ltd. | Method for password management and authentication |
EP2336942A1 (en) * | 2009-12-21 | 2011-06-22 | Giga-Byte Technology Co., Ltd. | Computer readable medium storing a program for password management and user authentication |
US9449165B2 (en) | 2014-02-06 | 2016-09-20 | Untethered Labs, Inc. | System and method for wireless proximity-based access to a computing device |
Also Published As
Publication number | Publication date |
---|---|
ZA200607720B (en) | 2007-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101052128B1 (en) | Authentication method, device and system of external storage device | |
US7877563B2 (en) | Programmable memory device security | |
US11190936B2 (en) | Wireless authentication system | |
US20080307409A1 (en) | Method for virtualizing a personal working environment and device for the same | |
US20060069814A1 (en) | Mass storage device with near field communications | |
US7870376B2 (en) | System, method and program product for controlling access to computer system | |
US20100023650A1 (en) | System and method for using a smart card in conjunction with a flash memory controller to detect logon authentication | |
US20100325736A1 (en) | Remote access control of storage devices | |
TW200814720A (en) | Device and method for controlling usage of a memory card | |
JP2009070073A (en) | Information processor and agent computer program | |
US20120198538A1 (en) | Multi-enclave token | |
WO2010030157A1 (en) | A method of authentication of computer id for portable data storage devices | |
TWI753286B (en) | Self-encrypting device, management server, method for data security, and non-transitory machine-readable srotage medium thereof | |
US20090254762A1 (en) | Access control for a memory device | |
WO2008003175A1 (en) | One time password access to portable credential entry and memory storage devices | |
US8245054B2 (en) | Secure and convenient access control for storage devices supporting passwords for individual partitions | |
US20050235364A1 (en) | Authentication mechanism permitting access to data stored in a data processing device | |
JP7042526B2 (en) | Deadline management server, agent program and terminal lending system | |
WO2011003304A1 (en) | Phone-card locking method and device for wireless communication | |
WO2006074490A1 (en) | Access protection for a computer by means of a portable storage medium | |
WO2016187966A1 (en) | Terminal and method for protecting data security of terminal | |
WO2007055939A1 (en) | A method, apparatus, and system for securing data on a removable memory device | |
JP2010535380A (en) | System and method for unauthorized use prevention control | |
CN111125710B (en) | Information processing method and device, electronic equipment and storage medium | |
KR101348196B1 (en) | Computer security device linked with mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 05856152 Country of ref document: EP Kind code of ref document: A1 |