WO2008124396A1 - Prepaid computing access using portable storage devices - Google Patents

Prepaid computing access using portable storage devices Download PDF

Info

Publication number
WO2008124396A1
WO2008124396A1 PCT/US2008/059030 US2008059030W WO2008124396A1 WO 2008124396 A1 WO2008124396 A1 WO 2008124396A1 US 2008059030 W US2008059030 W US 2008059030W WO 2008124396 A1 WO2008124396 A1 WO 2008124396A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
metered
computing device
removable
secure
Prior art date
Application number
PCT/US2008/059030
Other languages
French (fr)
Inventor
William J. Westerinen
Todd Carpenter
Stephen R. Drake
Mark Myers
Original Assignee
Microsoft Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corporation filed Critical Microsoft Corporation
Priority to EP08744868A priority Critical patent/EP2149113A4/en
Priority to BRPI0809218-4A priority patent/BRPI0809218A2/en
Publication of WO2008124396A1 publication Critical patent/WO2008124396A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • G06Q20/145Payments according to the detected use or quantity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/127Shopping or accessing services according to a time-limitation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/342Cards defining paid or billed services or quantities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/0014Coin-freed apparatus for hiring articles; Coin-freed facilities or services for vending, access and use of specific services not covered anywhere else in G07F17/00
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/16Coin-freed apparatus for hiring articles; Coin-freed facilities or services for devices exhibiting advertisements, announcements, pictures or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/02Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
    • G07F7/025Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices by means, e.g. cards, providing billing information at the time of purchase, e.g. identification of seller or purchaser, quantity of goods delivered or to be delivered
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system

Definitions

  • Pay-as-you-go or pay-per-use and subscription business models have been used in many areas of commerce, from cellular telephones to commercial launderettes.
  • a provider for example, a cellular telephone provider, offers the use of hardware (a cellular telephone) at a lower-than-market cost in exchange for a commitment to remain a subscriber to their network.
  • the customer receives a cellular phone for little or no money in exchange for signing a contract to become a subscriber for a given period of time. Over the course of the contract, the service provider recovers the cost of the hardware by charging the consumer for using the cellular phone.
  • the pay-as-you-go business model is predicated on the concept that the hardware provided has little or no value, or use, if disconnected from the service provider.
  • the service provider deactivates their account, and while the cellular telephone may power up, calls cannot be made because the service provider will not allow them.
  • the deactivated phone has no "salvage" value, because the phone will not work elsewhere and the component parts are not easily salvaged nor do they have a significant street value.
  • the service provider will reconnect the device to network and allow the subscriber to make calls.
  • a user purchases a code that is redeemable for a number of computing hours at a specially-equipped electronic device.
  • the user may add time to an existing account balance by purchasing additional codes.
  • the system stores data representing the time balance in a secure module at the device itself. Storing the user's time balance on one device prevents the user from accessing computer services at any machine other than the device containing the account balance.
  • a form of removable storage such as a universal serial bus (USB) flash device (UFD) may allow secure storage of and access to a time balance of a pay-per-use or subscription computing system.
  • a computing device may establish a secure connection to a portable secure computing device to access a stored time balance or other device- enabling, exhaustible data. During operation, the device may deplete the balance. Upon reaching a threshold depletion of the balance, the user may add more data to continue device use.
  • the device may include a processor and storage including identification and subscription data. Further, the device may store configuration data that may be used by the computer to bind the device to a particular subscription service or internet service provider.
  • FIG. 1 is an illustration of a computer that implements a method or includes an apparatus for using USB flash devices and other portable storage as a means to access prepaid computing;
  • FIG. 2 is a simplified and representative block diagram of a storage device to enable prepaid computing
  • FIG. 3 is a simplified and exemplary block diagram of a system supporting a pay- per-use and subscription business model
  • FIG. 4 is a simplified and exemplary block diagram of a method for enabling a secure computer using a portable storage device to monitor and store an amount of purchased access or subscription time in a prepaid computing system
  • Fig. 5 is another simplified and exemplary block diagram of a method for enabling a secure computer using a portable storage device to monitor and store an amount of purchased access or subscription time in a prepaid computing system
  • FIG. 6 is a yet another simplified and exemplary block diagram of a method for enabling a secure computer using a portable storage device to monitor and store an amount of purchased access or subscription time in a prepaid computing system.
  • a service provider i.e., an "ISP" or other enforcement entity
  • a first stage of enforcement may include a simple pop up or other graphical interface warning, indicating the terms of the contract are nearing a critical point.
  • a second stage of enforcement for example, after pay-per-use minutes have expired or a subscription period has lapsed, may be to present a system modal user interface for adding value and restoring service.
  • a provider's ultimate leverage for enforcing the terms of a subscription or pay-as-you go agreement is to disable the device. Such a dramatic step may be appropriate when it appears that the user has made a deliberate attempt to subvert the metering or other security systems active in the device.
  • Uses for the ability to place an electronic device into a limited function mode may extend beyond subscription and pay-per-use applications.
  • techniques for capacity consumption could be used for licensing enforcement of an operating system or individual applications.
  • Fig. 1 illustrates a logical view of a computing device in the form of a computer 110 that may be used in a pay-per-use or subscription mode.
  • the computer 110 is used to illustrate the principles of the instant disclosure. However, such principles apply equally to other electronic devices, including, but not limited to, cellular telephones, personal digital assistants, media players, appliances, gaming systems, entertainment systems, set top boxes, and automotive dashboard electronics, to name a few.
  • an exemplary system for implementing the claimed method and apparatus includes a general purpose computing device in the form of a computer 110. Components shown in dashed outline are not technically part of the computer 110, but are used to illustrate the exemplary embodiment of Fig. 1.
  • Components of computer 110 may include, but are not limited to, a processor 112, a system memory 114, a memory/graphics interface 116, also known as a Northbridge chip, and an I/O interface 118, also known as a Southbridge chip.
  • the memory 114 and a graphics processor 120 may be coupled to the memory/graphics interface 116.
  • a monitor 122 or other graphic output device may be coupled to the graphics processor 120.
  • a series of system busses may couple various system components including a high speed system bus 124 between the processor 112, the memory/graphics interface 116 and the I/O interface 118, a front-side bus 126 between the memory/graphics interface 116 and the system memory 114, and an advanced graphics processing (AGP) bus 128 between the memory/graphics interface 116 and the graphics processor 120.
  • the system bus 124 may be any of several types of bus structures including, by way of example, and not limitation, an Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus and Enhanced ISA (EISA) bus.
  • ISA Industry Standard Architecture
  • MCA Micro Channel Architecture
  • EISA Enhanced ISA
  • Computer 110 typically includes a variety of computer readable media.
  • Computer readable media may be any available media that is accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media.
  • Computer readable media may comprise computer storage media and communication media.
  • Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer 110.
  • Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
  • modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
  • the system memory 114 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 130 and random access memory (RAM) 132.
  • the system ROM 130 may contain permanent system data 134, such as identifying and manufacturing information.
  • a basic input/output system (BIOS) may also be stored in system ROM 130.
  • RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processor 112.
  • Fig. 1 illustrates operating system 136, application programs 138, other program modules 140, and program data 142.
  • the I/O interface 118 may couple the system bus 124 with a number of other busses 144, 146, and 148 that join a variety of internal and external devices to the computer 110.
  • a serial peripheral interface (SPI) bus 144 may connect to a basic input/output system (BIOS) memory 150 containing basic routines to help transfer information between elements within computer 110.
  • BIOS basic input/output system
  • the BIOS may execute during start-up.
  • a super input/output chip 152 may be used to connect to a number of 'legacy' peripherals, such as floppy disk 154, keyboard/mouse 156, and printer 158.
  • the super I/O chip 152 is connected to the I/O interface 118 with a low pin count (LPC) bus 146.
  • LPC low pin count
  • bus 148 may be a Peripheral Component Interconnect (PCI) bus, or a variation thereof, may be used to connect higher speed peripherals to the I/O interface 118.
  • PCI Peripheral Component Interconnect
  • a PCI bus may also be known as a Mezzanine bus.
  • Variations of the PCI bus include the Peripheral Component Interconnect-Express (PCI-E) and the Peripheral Component Interconnect - Extended (PCI-X) busses, the former having a serial interface and the latter being a backward compatible parallel interface.
  • bus 148 may be an advanced technology attachment (ATA) bus, in the form of a serial ATA bus (SATA) or parallel ATA (PATA).
  • ATA advanced technology attachment
  • the computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media.
  • Fig. 1 illustrates a hard disk drive 160 that reads from or writes to non-removable, nonvolatile magnetic media.
  • Removable media such as a universal serial bus (USB) memory 162 or CD/DVD drive 164 may be connected to the PCI bus 148 directly or through an interface 166.
  • USB universal serial bus
  • Other removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like.
  • the drives and their associated computer storage media discussed above and illustrated in Fig. 1, provide storage of computer readable instructions, data structures, program modules and other data for the computer 110.
  • hard disk drive 160 is illustrated as storing operating system 168, application programs 170, other program modules 172, and program data 174. Note that these components can either be the same as or different from operating system 136, application programs 138 other program modules 140, and program data 142.
  • Operating system 168, application programs 170, other program modules 172, and program data 174 are given different numbers here to illustrate that, at a minimum, they are different copies.
  • a user may enter commands and information into the computer 110 through input devices such as a mouse/keyboard 156 or other input device combination.
  • Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 112 through one of the I/O interface busses, such as the SPI 144, the LPC 146, or the PCI 148, but other busses may be used. In some embodiments, other devices may be coupled to parallel ports, infrared interfaces, game ports, and the like (not depicted), via the super I/O chip 152.
  • the computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 178 via a network interface controller (NIC) 180.
  • the remote computer 178 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110.
  • the logical connection depicted in Fig. 1 may include a local area network (LAN), a wide area network (WAN), or both, but may also include other networks.
  • LAN local area network
  • WAN wide area network
  • Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
  • the network interface may use a modem (not depicted) when a broadband connection is not available or is not used. It will be appreciated that the network connection shown is exemplary and other means of establishing a communications link between the computers may be used.
  • the computer 110 may also include a security module (SM) 182.
  • the SM 182 may be enabled to perform security monitoring, pay-per-use and subscription usage management, and policy enforcement related to terms and conditions associated with paid use.
  • the SM 182 may be particularly suited to securely enabling a computer 110 in a subsidized purchase business model.
  • the SM 182 may be a set of virtualized containers executing on the processor 112 or real containers such as an embedded processor or controller.
  • the SM 182 is connected to I/O Interface 118 on the SPI bus 144.
  • the SM 182 may be embodied in the processing unit 112, as a standalone component, or in a hybrid, such as a multi-chip module.
  • a clock 184 may be incorporated into the SM 182 to help ensure tamper resistance. To allow user management of local time setting, including daylight savings or movement between time zones, the clock 184 may maintain its time in a coordinated universal time (UTC) format and user time may be calculated using a user-settable offset.
  • the SM 182 may also include a cryptographic function or a cryptographic core that may act as an authentication device for all communication between the SM 182 and other devices.
  • the cryptographic core of the SM 182 may provide a processing and encryption subsystem of the security module 182 that reaches a suitable Common Criteria Evaluation Assurance Level to ensure that the computer 110 and any communication with the SM 182 may not be compromised.
  • the SM may include firmware and a form of secure memory or storage 186.
  • the secure storage 186 may include routines or applications that may facilitate the secure operation of the computer 110 through the security module 182. Additionally, the secure storage 186 may include any other data that may be securely accessed, stored, or modified without unauthorized tampering.
  • the secure storage 186 includes a local provisioning module that manages the allocation of the usage time. The local provisioning module of the secure storage 186 may account for a user's pre-paid access time or subscription information and may be described by U.S. Patent Application No. 10/988,907, and U.S. Patent Application No. 11/612,433 the entire disclosure of which is hereby incorporated by reference.
  • the secure storage 186 may also store encryption keys or other information to facilitate secure communication with the SM 182.
  • the storage 186 may also include storage for system-critical items such as a BIOS for a computer or other electronic device in which the SM 182 is operating.
  • the secure storage 186 may also include memory dedicated to the operation of the SM 182 itself, such as storage, for example, for storing metering code to access and decrement subscription data.
  • an application for use in providing functionality during limited operation modes such as a "hardware limited mode,” (HLM) may also be stored in the secure storage 186.
  • HARM hardware limited mode
  • a second BIOS and optionally, an alternate copy of the second BIOS, may also be stored in the secure storage 186.
  • the second BIOS may be used for booting the computer or other electronic device incorporating the SM 182.
  • the second BIOS may be activated as a secure boot environment to replace the standard BIOS 150 to enforce a subscription or other security policy.
  • the SM 182 may also have an ability to force a system reset at any time which may ensure that pay per use or subscription terms are met, as well as provide a clean environment to start with either a normal or a restricted operation BIOS.
  • Another device 188 may store user identification and data related to a subscription account balance to enable a computer 110 equipped with a SM 182.
  • a metering application stored in the secure storage 186 of the SM 182 may communicate with a metered computing device 188 to access the identification and subscription account balance data.
  • the metered computing device 188 may be any form of removable memory.
  • the metered computing device 188 is universal serial bus (USB) flash drive (UFD).
  • the metered computing device 188 may include an execution unit 205 that may include a processor to establish a secure connection with the SM 182.
  • the SM 182 and the metered computing device 188 establish a secure communication channel by a public key infrastructure (PKI).
  • PKI public key infrastructure
  • the metered computing device 188 may communicate with the SM 182.
  • the device 188 communicates with the SM 182 through an interface of the computer 110.
  • the memory device may communicate with the computer 110 through any combination of 1394, USB, Internet Small Computer Systems Interface, serial, parallel, infrared, Near Field Communication, BlueTooth, 802.x, or other connection.
  • the device 188 communicates with the security module 182 through a BIOS 150 or a secure pre-boot environment stored in the SM 182 secure storage 186, as further explained below.
  • the metered computing device 188 communicates with the SM 182 through an API running on the computer 110. The SM 182 may force the computer 110 to reset when a metered computing device 188 containing subscription data is removed.
  • Other embodiments may include an activation fuse 189.
  • the fuse 189 may be any type of device or firmware that may be selectively activated from an inactive state to enable communication between the I/O Interface 118 and the SM 182.
  • the computer 110 When deactivated, i.e., when the fuse 189 does not maintain a connection between the SM 182 and the I/O Interface 118, the computer 110 may not operate as a subscription-based computing device, but rather, as a normal PC. However, when activated, i.e., when the fuse 189 maintains a connection between the SM 182 and the I/O Interface 118, the computer may operate as a subscription-based computing device.
  • the fuse 189 once activated to enable communication between the SM 182 and other components and devices, may not be deactivated.
  • the computer 110 may be manufactured initially to operate as a normal, non-subscription-based PC and may later be activated by an underwriter or subscriber to operate as a subscription-based PC. Therefore, while the fuse is activated and upon boot-up, connection, or disconnection of the device 188, firmware of the SM 182 (i.e., the previously-described local provisioning module of the secure storage 186) may seek subscription or usage time stored in the metered computing device 188.
  • the device 188 as illustrated may be represented and arranged in a variety of forms to include the elements as described below.
  • the device 188 may include an interface 207 that may enable communication between the device 188 and the SM 182.
  • the device 188 may communicate with the computer 110 via the SM 182 through any combination of 1394, USB, Internet Small Computer Systems Interface, serial, parallel, infrared, Near Field Communication, BlueTooth, 802.x, or other connection.
  • the interface 205 is a male type- A USB connector that provides an interface to the host computer 110.
  • the device 188 may also include a memory or storage area 210.
  • the storage area 210 may be a single flash memory chip or multiple flash memory chips that store a unique hardware identification (HWID) or Universal Property Identifier (UPID) 215.
  • HWID unique hardware identification
  • UPID Universal Property Identifier
  • the HWID or UPID may uniquely identify the device to any other connected device, for example, a computing device 110 or remote computing device 178.
  • the device 188 may store data representing a user's subscription or access data 220 to enable a computer 110 or to execute metered applications.
  • the storage area 210 may include configuration data 222.
  • the configuration data may provide information that may bind a computer 110 that is enabled with the device 188 to a particular internet service provider (ISP).
  • ISP internet service provider
  • the metered computing device 188 may include an execution unit 205 that may enable a secure connection between the device 188 and any other device, for example, a computer 110.
  • the execution unit 205 includes a cryptographic function, as previously described in relation to the secure storage 186 of the SM 182.
  • the cryptographic function of the device 188 that may act as an authentication module for all communication between the device 188 and the computer 110.
  • the cryptographic function of the execution unit 205 may provide a processing and encryption subsystem of the device 188 that reaches a suitable Common Criteria Evaluation Assurance Level to ensure that the device 188 and any communication between the device 188 and the computer 110 may not be compromised.
  • the cryptographic core and the execution unit 205 operates as the SLE series of smartcards as produced by Infineon Technologies AG of Kunststoff, Germany.
  • a metered computing device 188 include a battery 230 to preserve certain data of the storage 210 or may provide a power source for an indicator 235 that may be activated when the subscription data 220 reaches a threshold or the device 188 is compromised or may no longer function.
  • indicator LEDs 235 may convey different notifications to the user, for example, a notification of a low time 220 or other usage balance or a notification of a full or adequate balance.
  • the indicator 235 may also include a video screen that conveys a numerical balance of access time remaining on the device 188 or any other information related to any data stored on the device 188.
  • Fig. 3 is a simplified and exemplary block diagram of a system 300 supporting pay-per-use and subscription usage of a computer or other electronic device.
  • a provisioning server 302 may serve as a trusted endpoint for provisioning requests from one or more electronic devices participating in the pay-per-use business ecosystem.
  • One electronic device 304 may be similar to computer 110 of Fig. 1 with a connected metered computing device 188.
  • Other electronic devices 306 may perform substantially the same as the exemplary device 304.
  • Communication between the provisioning server 302 and the electronic device 304 may be accomplished through a network 308 that may include landline, wireless, or broadband networks, or other networks known in the art.
  • An accounting server 310 may be linked to the provisioning server 302 and may maintain account data corresponding to the electronic device 304. Account data may also be stored at the device 188.
  • the accounting server 310 may also serve as a clearinghouse for financial transactions related to the electronic device 304, such as, replenishing or adding value to a pay-per-use account maintained on the accounting server 310 and recorded at the device 188.
  • the electronic device 304 enabled with the metered computing device 188, establishes a connection with a vendor 312 that communicates with the accounting server 310.
  • the metered computing device 188 establishes a connection directly with the accounting server 310.
  • the vendor may be a vending machine or other stand-alone, self-service kiosk.
  • a user may plug the metered computing device 188 directly into the vendor 312, select an amount of OS, application, or other subscription time for loading to the device 188, pay, and receive the access data.
  • the access data may be any value, access time 220 to any secure OS or application of the electronic device 304, 306, or any other data that may be recorded at the accounting server 310 and stored at the device 188 for use with a computer 110.
  • the user may purchase a generic amount of time that may be used for any OS, application, or any other activity at a secure electronic device 304.
  • many other types of data, access time, and subscription information may be purchased and stored on the metered computing device 188.
  • a user desiring to add time to a device 188 may connect the device 188 to a vendor 312 at a retail outlet or through another computer 110, navigate through a series of UIs to pay for access time 220, and load time 220 to the device 188. The user may then use the purchased time 220 at a secure computing client 110 by connecting the device 188 to the computer 110. The device 188 may then establish a secure connection with the computer 110 which may, in turn, transmit a code to a server
  • the packet may contain the data representing the amount of time 220 the user purchased.
  • the computer 110 may consume the access time 220 of the device 188, transferring it to the LPM (Lower Provisioning Module) of the secure storage 186 and the time balance 220 may be updated.
  • the LPM may be executed in a security module 182 or other hardware or hardware-assisted "container" in the system 110.
  • the LPM accesses and updates purchased time balances provided in the device 188.
  • the LPM synchronizes a time balance of the device 188 with a balance stored locally in the secure storage 186.
  • HLM Hardware Locked Mode
  • SMM System Management Mode
  • the user purchases an amount of time to use metered software on the computer 110 such as an OS, applications, or both.
  • the user may also purchase the ability to use a metered word processing or other applications stored at the computer 110 for a number of uses, a number of completed pages, or any other measurable use.
  • applications at the device 304, 306 are stored in a secure storage area 186 in a manner that may not install or store the application on a hard disk drive 160 of the computer 110.
  • the applications at the computer 110 may be in a Softgrid® format as produced by the Microsoft Corporation of Redmond, Washington.
  • a user may transfer his or her access to a computer 110 in a pay-for-use system to any computer 110 configured to access the metered computing device 188.
  • the user transports his or her usage time to a computer 110 in an internet cafe including machines with a security module 182.
  • the cafe computer 110 may function only if a patron connects a metered computing device 188 that includes valid access time data 220.
  • Other prepaid account funds transfer systems are well known, for example, with respect to prepaid cellular phones or other mobile computing systems, and are equally applicable in this business model.
  • Fig. 4 is a simplified and exemplary block diagram of a method 400 for enabling a secure computer 110 using a portable memory device 188 to monitor and store an amount of purchased access or subscription time 220 for operating systems, 136, 168, application programs 138, 170, other program modules 140, 172, and other data 142, 174.
  • the method 400 comprises a number of actions represented graphically in Fig. 4 as blocks. The actions may be executed in any suitable order to accomplish the described task.
  • the computer 110 may boot or re-boot. For example, if, before the computer 110 is turned on, the user connects the device 188, the computer 110 may be configured by its BIOS 150, to check for a connection with a device 188 during boot up. If the user connects the device 188 after boot up, the computer 110 may re-boot to begin operating with the device 188.
  • the boot process may involve following a normal boot sequence known in the art, with the exception that a request for BIOS code from the I/O Interface 118 may not result in reading BIOS boot code directly from memory, such as memory 150, but may result in a request from the I/O Interface 118 to the SM 182 for BIOS boot code stored in the secure storage 186 such as a secure boot environment BIOS.
  • the I/O Interface accesses the BIOS of the SM 182 only if the fuse 189 is activated, as previously described.
  • communication between a device 188 and the computer 110 may be established.
  • communication between the device 188 and the computer 110 may be secure.
  • a secure channel may be established between the device 188 and the computer 110 by least one of the previously described cryptographic core of the SM 182 secure storage 186 and the cryptographic function of the device 188 execution unit 205.
  • the HWID/UPID 215 of the device 188 may also be confirmed by the SM 182 to establish secure communication.
  • one of a dedicated or a hardware switched communication port may be used to establish secure communication between the device 188 and the computer.
  • the dedicated path may be created between the device 188 and the SM 182 at boot up and may be a USB communication path that directly connects the device 188 to the SM 182.
  • the device 188 remains attached to the port, directly connecting it to the SM 182 during operation.
  • a heartbeat signal exchanged between the SM 182 and the device 188 may be monitored by firmware of the SM 182 to ensure secure communication maintenance.
  • switching hardware may handle multiplexing of the path, with a secondary path using the OS as a proxy, once the computer 110 completes booting and establishes the secure channel. Because the switched path may also use the OS and various drivers as a pathway, a switch from the path may occur during boot up which may result in a security risk.
  • a watchdog timer may be included in the secure storage 186 of the SM 182. In one embodiment, the watchdog timer is set for a duration to account for OS and driver loading. If, at block 412, the watchdog timer expires before the secure channel is re-established through the OS, the computer 110 may be rebooted or transitioned into a degraded mode as described at block 420.
  • the watchdog timer recognizes a secure channel by receiving a heartbeat signal initiated by the SM 182 and sent to an OS proxy application, through USB storage stacks, and into the device 188.
  • the SM 182 delays a "power OK" signal to the processor 112 and loads the SM 182 with the Lower Provisioning Module (LPM) of the secure storage 186.
  • the SM 182 may then exchange credentials with the device 188 by, for example, a public key infrastructure, over the established secure path.
  • the SM 182 may check the balance of time 220 on the device 188.
  • an LPM of the secure storage 186 may access the device 188 to check the time balance 220. If there is no time remaining on the device or time is below a threshold, at block 420, the computer 110 may enter a degraded mode of operation. In one embodiment, the SM 182 forces the computer 110 into a progressively more degraded operational state that finally results in the computer 110 entering a Hardware Locked Mode, as previously described. A user interface of the Hardware Locked Mode may ask a user to connect a device 188 with a valid time balance. The computer 110 may enter a degraded mode by accessing a limited operation BIOS stored on the SM 182. Time may not be decremented from the device 188 while the computer 110 is in Hardware Locked Mode.
  • the LPM may access the configuration data 222 of the device.
  • the configuration data 222 may allow the LPM to bind the device 188 to a particular ISP.
  • the configuration data 222 may by authentication keys implementing a PKI that may represent authentication and authorization between the user and the ISP. The keys may be exchanged during an initial provisioning of the device 188, for example, upon connection to the computer 110.
  • the computer 110 may operate.
  • the computer may operate according to a normal operation BIOS accessed by the computer 110 from the SM 182 secure storage 186 or memory 150.
  • a user's actions during operation may be regulated according to the subscription or other access data 220 stored on the device 188.
  • the user may have purchased access 220 for an operating system 136, 168, individual or groups of application programs 138, 170, or other modules 140, 172 stored on the computer 110.
  • the access time 220 may allow the user to operate applications stored at the secure storage 186 of the SM 182.
  • the operating system(s) and applications may be in a Softgrid® format that may be securely accessed by, though not stored on, the computer 110. Operation of the computer 110 may also include decrementing the access data 220 associated with executed programs. In one embodiment, the LPM of the SM 182 may continuously decrement and update the access data 220 of the device 188.
  • the computer 110 may check the connection established with the device 188 at block 410. If the device 188 is no longer connected to the computer 110, it may transition to a degraded mode as described in relation to block 420. If the device 188 remains connected to the computer 100, the method 400 may transition to block 415 to re- check the balance and continue.
  • Fig. 5 is another simplified and exemplary block diagram of a method 500 for enabling a secure computer 110 using a portable memory device 188 to monitor and store an amount of purchased access or subscription time 220 for operating systems, 136, 168, application programs 138, 170, other program modules 140, 172, and other data 142, 174.
  • the computer 100 may boot or re-boot as described in relation to Fig. 4.
  • the SM 182 may delay a "power OK" signal to the I/O interface 118 to load the SM 182 with the LPM of the secure storage 186.
  • the LPM may not have access to any subscription or time data 220 of the device 188.
  • the SM 182 may establish a secure channel with the device 188.
  • the SM 182 may load a secure boot environment stored in the secure storage 186.
  • the SM 182 may load a securely-configured BIOS from the secure storage 186. This BIOS may have routines to enumerate and connect a secure channel between the SM 182 and the device 188.
  • the secure boot environment BIOS may be written with minimal code to mitigate potential security risks.
  • the SM 182 may then exchange credentials with the device 188 to establish a secure channel.
  • the SM 182 may check the balance of time 220 on the device 188 as described in relation to block 415. If there is no time remaining on the device, at block 520, the computer 110 may enter a degraded mode of operation. If, at block 515, time remains on the device 188, at block 525, the computer 110 may operate. As before, operation of the computer 110 may also include decrementing the access data 220 associated with executed programs.
  • the computer 110 may check the connection established with the device 188 at block 510. If the device 188 is no longer connected to the computer 110, it may transition to a degraded mode 520 as described in relation to block 420. If the device 188 remains connected to the computer 110, the method 500 may transition to block 515 to re-check the balance and continue.
  • FIG. 6 is another simplified and exemplary block diagram of a method 600 for enabling a secure computer 110 using a portable memory device 188 to monitor and store an amount of purchased access or subscription time 220 for operating systems, 136, 168, application programs 138, 170, other program modules 140, 172, and other data 142, 174.
  • the computer 110 may boot normally, as if the LPM of the device 188 had already detected a positive balance at the device 188.
  • the SM 182 may initiate a watchdog timer that may monitor for a heartbeat signal from the device 188 within an amount of time. In another embodiment, the watchdog timer may monitor for the heartbeat signal though an established secure channel between the SM 182 and the device 188.
  • the watchdog timer is stored and executed within the secure storage 186 of the SM 182.
  • software executing within the loaded OS may establish a secure channel from the SM 182 to the device 188.
  • the SM 182 exchanges credentials with the device 188 and initiates the heartbeat signal.
  • the watchdog timer may force the computer 110 into a degraded operation mode.
  • the SM 182 may force the computer 110 to reboot. If, however, the watchdog timer has not expired, at block 630, the method 600 may operate as described in relation to Figs. 4 and 5.
  • the SM 182 may check the balance of time 220 on the device 188 as described in relation to block 415. If there is no time remaining on the device, at block 625, the computer 110 may enter a degraded mode of operation. If, at block 630, time remains on the device 188, at block 635, the computer 110 may operate. As before, operation of the computer 110 may also include decrementing the access data 220 associated with executed programs.
  • the computer 110 may check the connection established with the device 188 at block 615. If the device 188 is no longer connected to the computer 110, it may transition to a degraded mode as described in relation to block 420. If the device 188 remains connected to the computer 110, the method 600 may transition to block 630 to re-check the balance and continue.
  • a device 188 may enable a secure computer 110 by securely storing an amount of purchased access or subscription time 220 for operating systems, 136, 168, application programs 138, 170, other program modules 140, 172, and other data 142, 174.
  • a security module 182 of the computer 110 users of a subscription-based or pay-as-you-go computing system may enable any secure computer 110 with subscription and access information stored on a portable memory device 188.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Hardware Redundancy (AREA)
  • Stored Programmes (AREA)

Abstract

A form of removable memory, such as a universal serial bus (USB) flash device (UFD), may allow secure storage of and access to a time balance of a pay-per-use or subscription computing system. A computing device may establish a secure connection to a portable secure computing device to access a stored time balance or other device-enabling, exhaustible data. During operation, the device may deplete the balance. Upon reaching a threshold depletion of the balance, the user may add more data to continue device use. The device may include a processor and a secure memory including identification and subscription data. Further, the device may store configuration data that may be used by the computer to bind the device to a particular subscription service or internet service provider.

Description

PREPAID COMPUTING ACCESS USING PORTABLE STORAGE DEVICES
BACKGROUND
[0001] This Background is intended to provide the basic context of this patent application and is not intended to describe a specific problem to be solved.
[0002] Pay-as-you-go or pay-per-use and subscription business models have been used in many areas of commerce, from cellular telephones to commercial launderettes. In developing a pay-as-you go business, a provider, for example, a cellular telephone provider, offers the use of hardware (a cellular telephone) at a lower-than-market cost in exchange for a commitment to remain a subscriber to their network. In this specific example, the customer receives a cellular phone for little or no money in exchange for signing a contract to become a subscriber for a given period of time. Over the course of the contract, the service provider recovers the cost of the hardware by charging the consumer for using the cellular phone.
[0003] The pay-as-you-go business model is predicated on the concept that the hardware provided has little or no value, or use, if disconnected from the service provider. To illustrate, should the subscriber mentioned above cease to pay his or her bill, the service provider deactivates their account, and while the cellular telephone may power up, calls cannot be made because the service provider will not allow them. The deactivated phone has no "salvage" value, because the phone will not work elsewhere and the component parts are not easily salvaged nor do they have a significant street value. When the account is brought current, the service provider will reconnect the device to network and allow the subscriber to make calls.
[0004] This model works well when the service provider, or other entity taking the financial risk of providing subsidized hardware, has tight control on the use of the hardware and when the device has little salvage value. This business model does not work well when the hardware has substantial uses outside the service provider's span of control. Thus, a typical personal computer does not meet these criteria since a personal computer may have substantial uses beyond an original intent and the components of a personal computer, e.g. a display or disk drive, may have a significant salvage value.
[0005] In a typical pay-as-you-go computing system, a user purchases a code that is redeemable for a number of computing hours at a specially-equipped electronic device.
The user may add time to an existing account balance by purchasing additional codes. However, to ensure security of the user's time balance and securely track consumed time, the system stores data representing the time balance in a secure module at the device itself. Storing the user's time balance on one device prevents the user from accessing computer services at any machine other than the device containing the account balance.
SUMMARY
[0006] This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
[0007] A form of removable storage, such as a universal serial bus (USB) flash device (UFD), may allow secure storage of and access to a time balance of a pay-per-use or subscription computing system. A computing device may establish a secure connection to a portable secure computing device to access a stored time balance or other device- enabling, exhaustible data. During operation, the device may deplete the balance. Upon reaching a threshold depletion of the balance, the user may add more data to continue device use. The device may include a processor and storage including identification and subscription data. Further, the device may store configuration data that may be used by the computer to bind the device to a particular subscription service or internet service provider.
BRIEF DESCRIPTION OF THE FIGURES
[0008] Fig. 1 is an illustration of a computer that implements a method or includes an apparatus for using USB flash devices and other portable storage as a means to access prepaid computing;
[0009] Fig. 2 is a simplified and representative block diagram of a storage device to enable prepaid computing;
[0010] Fig. 3 is a simplified and exemplary block diagram of a system supporting a pay- per-use and subscription business model;
[0011] Fig. 4 is a simplified and exemplary block diagram of a method for enabling a secure computer using a portable storage device to monitor and store an amount of purchased access or subscription time in a prepaid computing system; [0012] Fig. 5 is another simplified and exemplary block diagram of a method for enabling a secure computer using a portable storage device to monitor and store an amount of purchased access or subscription time in a prepaid computing system; and
[0013] Fig. 6 is a yet another simplified and exemplary block diagram of a method for enabling a secure computer using a portable storage device to monitor and store an amount of purchased access or subscription time in a prepaid computing system.
SPECIFICATION
[0014] Although the following text sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the description is defined by the words of the claims set forth at the end of this disclosure. The detailed description is to be construed as exemplary only and does not describe every possible embodiment since describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
[0015] It should also be understood that, unless a term is expressly defined in this patent using the sentence "As used herein, the term ' ' is hereby defined to mean..." or a similar sentence, there is no intent to limit the meaning of that term, either expressly or by implication, beyond its plain or ordinary meaning, and such term should not be interpreted to be limited in scope based on any statement made in any section of this patent (other than the language of the claims). To the extent that any term recited in the claims at the end of this patent is referred to in this patent in a manner consistent with a single meaning, that is done for sake of clarity only so as to not confuse the reader. It is not intended that such claim term be limited, by implication or otherwise, to that single meaning. Finally, unless a claim element is defined by reciting the word "means" and a function without the recital of any structure, it is not intended that the scope of any claim element be interpreted based on the application of 35 U.S. C. § 112, sixth paragraph.
[0016] Much of the inventive functionality and many of the inventive principles are best implemented with or in software programs or instructions and integrated circuits (ICs) such as application specific ICs. It is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation. Therefore, in the interest of brevity and minimization of any risk of obscuring the present invention's principles and concepts, further discussion of such software and ICs, if any, will be limited to the essentials with respect to the preferred embodiments.
[0017] Many prior-art high-value computers, personal digital assistants, organizers, and the like, are not suitable for secure subscription use without modification. The ability to enforce a contract requires a service provider, i.e., an "ISP" or other enforcement entity, to be able to affect a device's operation even though the device may not be connected to the service provider, e.g. connected to the Internet. A first stage of enforcement may include a simple pop up or other graphical interface warning, indicating the terms of the contract are nearing a critical point. A second stage of enforcement, for example, after pay-per-use minutes have expired or a subscription period has lapsed, may be to present a system modal user interface for adding value and restoring service. A provider's ultimate leverage for enforcing the terms of a subscription or pay-as-you go agreement is to disable the device. Such a dramatic step may be appropriate when it appears that the user has made a deliberate attempt to subvert the metering or other security systems active in the device.
[0018] Uses for the ability to place an electronic device into a limited function mode may extend beyond subscription and pay-per-use applications. For example, techniques for capacity consumption could be used for licensing enforcement of an operating system or individual applications.
[0019] Fig. 1 illustrates a logical view of a computing device in the form of a computer 110 that may be used in a pay-per-use or subscription mode. For the sake of illustration, the computer 110 is used to illustrate the principles of the instant disclosure. However, such principles apply equally to other electronic devices, including, but not limited to, cellular telephones, personal digital assistants, media players, appliances, gaming systems, entertainment systems, set top boxes, and automotive dashboard electronics, to name a few. With reference to Fig. 1, an exemplary system for implementing the claimed method and apparatus includes a general purpose computing device in the form of a computer 110. Components shown in dashed outline are not technically part of the computer 110, but are used to illustrate the exemplary embodiment of Fig. 1. Components of computer 110 may include, but are not limited to, a processor 112, a system memory 114, a memory/graphics interface 116, also known as a Northbridge chip, and an I/O interface 118, also known as a Southbridge chip. The memory 114 and a graphics processor 120 may be coupled to the memory/graphics interface 116. A monitor 122 or other graphic output device may be coupled to the graphics processor 120.
[0020] A series of system busses may couple various system components including a high speed system bus 124 between the processor 112, the memory/graphics interface 116 and the I/O interface 118, a front-side bus 126 between the memory/graphics interface 116 and the system memory 114, and an advanced graphics processing (AGP) bus 128 between the memory/graphics interface 116 and the graphics processor 120. The system bus 124 may be any of several types of bus structures including, by way of example, and not limitation, an Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus and Enhanced ISA (EISA) bus. As system architectures evolve, other bus architectures and chip sets may be used but often generally follow this pattern. For example, companies such as Intel and AMD support the Intel Hub Architecture (IHA) and the Hypertransport architecture, respectively.
[0021] Computer 110 typically includes a variety of computer readable media. Computer readable media may be any available media that is accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer 110. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
[0022] The system memory 114 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 130 and random access memory (RAM) 132. The system ROM 130 may contain permanent system data 134, such as identifying and manufacturing information. In some embodiments, a basic input/output system (BIOS) may also be stored in system ROM 130. RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processor 112. By way of example, and not limitation, Fig. 1 illustrates operating system 136, application programs 138, other program modules 140, and program data 142.
[0023] The I/O interface 118 may couple the system bus 124 with a number of other busses 144, 146, and 148 that join a variety of internal and external devices to the computer 110. A serial peripheral interface (SPI) bus 144 may connect to a basic input/output system (BIOS) memory 150 containing basic routines to help transfer information between elements within computer 110. For example, the BIOS may execute during start-up.
[0024] A super input/output chip 152 may be used to connect to a number of 'legacy' peripherals, such as floppy disk 154, keyboard/mouse 156, and printer 158. In one embodiment, the super I/O chip 152 is connected to the I/O interface 118 with a low pin count (LPC) bus 146. The super I/O chip is widely available in the commercial marketplace.
[0025] In one embodiment, bus 148 may be a Peripheral Component Interconnect (PCI) bus, or a variation thereof, may be used to connect higher speed peripherals to the I/O interface 118. A PCI bus may also be known as a Mezzanine bus. Variations of the PCI bus include the Peripheral Component Interconnect-Express (PCI-E) and the Peripheral Component Interconnect - Extended (PCI-X) busses, the former having a serial interface and the latter being a backward compatible parallel interface. In other embodiments, bus 148 may be an advanced technology attachment (ATA) bus, in the form of a serial ATA bus (SATA) or parallel ATA (PATA). [0026] The computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only, Fig. 1 illustrates a hard disk drive 160 that reads from or writes to non-removable, nonvolatile magnetic media. Removable media, such as a universal serial bus (USB) memory 162 or CD/DVD drive 164 may be connected to the PCI bus 148 directly or through an interface 166. Other removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like.
[0027] The drives and their associated computer storage media discussed above and illustrated in Fig. 1, provide storage of computer readable instructions, data structures, program modules and other data for the computer 110. In Fig. 1, for example, hard disk drive 160 is illustrated as storing operating system 168, application programs 170, other program modules 172, and program data 174. Note that these components can either be the same as or different from operating system 136, application programs 138 other program modules 140, and program data 142. Operating system 168, application programs 170, other program modules 172, and program data 174 are given different numbers here to illustrate that, at a minimum, they are different copies. A user may enter commands and information into the computer 110 through input devices such as a mouse/keyboard 156 or other input device combination. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 112 through one of the I/O interface busses, such as the SPI 144, the LPC 146, or the PCI 148, but other busses may be used. In some embodiments, other devices may be coupled to parallel ports, infrared interfaces, game ports, and the like (not depicted), via the super I/O chip 152.
[0028] The computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 178 via a network interface controller (NIC) 180. The remote computer 178 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110. The logical connection depicted in Fig. 1 may include a local area network (LAN), a wide area network (WAN), or both, but may also include other networks. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
[0029] In some embodiments, the network interface may use a modem (not depicted) when a broadband connection is not available or is not used. It will be appreciated that the network connection shown is exemplary and other means of establishing a communications link between the computers may be used.
[0030] The computer 110 may also include a security module (SM) 182. The SM 182 may be enabled to perform security monitoring, pay-per-use and subscription usage management, and policy enforcement related to terms and conditions associated with paid use. The SM 182 may be particularly suited to securely enabling a computer 110 in a subsidized purchase business model. The SM 182 may be a set of virtualized containers executing on the processor 112 or real containers such as an embedded processor or controller. In one embodiment, the SM 182 is connected to I/O Interface 118 on the SPI bus 144. In another embodiment, the SM 182 may be embodied in the processing unit 112, as a standalone component, or in a hybrid, such as a multi-chip module. A clock 184 may be incorporated into the SM 182 to help ensure tamper resistance. To allow user management of local time setting, including daylight savings or movement between time zones, the clock 184 may maintain its time in a coordinated universal time (UTC) format and user time may be calculated using a user-settable offset. The SM 182 may also include a cryptographic function or a cryptographic core that may act as an authentication device for all communication between the SM 182 and other devices. For example, the cryptographic core of the SM 182 may provide a processing and encryption subsystem of the security module 182 that reaches a suitable Common Criteria Evaluation Assurance Level to ensure that the computer 110 and any communication with the SM 182 may not be compromised.
[0031] Additionally, the SM may include firmware and a form of secure memory or storage 186. The secure storage 186 may include routines or applications that may facilitate the secure operation of the computer 110 through the security module 182. Additionally, the secure storage 186 may include any other data that may be securely accessed, stored, or modified without unauthorized tampering. In one embodiment, the secure storage 186 includes a local provisioning module that manages the allocation of the usage time. The local provisioning module of the secure storage 186 may account for a user's pre-paid access time or subscription information and may be described by U.S. Patent Application No. 10/988,907, and U.S. Patent Application No. 11/612,433 the entire disclosure of which is hereby incorporated by reference. The secure storage 186 may also store encryption keys or other information to facilitate secure communication with the SM 182.
[0032] The storage 186 may also include storage for system-critical items such as a BIOS for a computer or other electronic device in which the SM 182 is operating. The secure storage 186 may also include memory dedicated to the operation of the SM 182 itself, such as storage, for example, for storing metering code to access and decrement subscription data. Further, an application for use in providing functionality during limited operation modes, such as a "hardware limited mode," (HLM) may also be stored in the secure storage 186. To support a limited operation mode, a second BIOS, and optionally, an alternate copy of the second BIOS, may also be stored in the secure storage 186. The second BIOS may be used for booting the computer or other electronic device incorporating the SM 182. The second BIOS may be activated as a secure boot environment to replace the standard BIOS 150 to enforce a subscription or other security policy. Furthermore, the SM 182 may also have an ability to force a system reset at any time which may ensure that pay per use or subscription terms are met, as well as provide a clean environment to start with either a normal or a restricted operation BIOS.
[0033] Another device 188 may store user identification and data related to a subscription account balance to enable a computer 110 equipped with a SM 182. In one embodiment, a metering application stored in the secure storage 186 of the SM 182 may communicate with a metered computing device 188 to access the identification and subscription account balance data. With reference to Fig. 2, the metered computing device 188 may be any form of removable memory. In one embodiment, the metered computing device 188 is universal serial bus (USB) flash drive (UFD). The metered computing device 188 may include an execution unit 205 that may include a processor to establish a secure connection with the SM 182. In one embodiment, upon startup or insertion of the metered computing device 188, the SM 182 and the metered computing device 188 establish a secure communication channel by a public key infrastructure (PKI). The metered computing device 188 may communicate with the SM 182. In one embodiment, the device 188 communicates with the SM 182 through an interface of the computer 110.
The memory device may communicate with the computer 110 through any combination of 1394, USB, Internet Small Computer Systems Interface, serial, parallel, infrared, Near Field Communication, BlueTooth, 802.x, or other connection.
[0034] In a further embodiment, the device 188 communicates with the security module 182 through a BIOS 150 or a secure pre-boot environment stored in the SM 182 secure storage 186, as further explained below. In a still further embodiment, the metered computing device 188 communicates with the SM 182 through an API running on the computer 110. The SM 182 may force the computer 110 to reset when a metered computing device 188 containing subscription data is removed.
[0035] Other embodiments may include an activation fuse 189. The fuse 189 may be any type of device or firmware that may be selectively activated from an inactive state to enable communication between the I/O Interface 118 and the SM 182. When deactivated, i.e., when the fuse 189 does not maintain a connection between the SM 182 and the I/O Interface 118, the computer 110 may not operate as a subscription-based computing device, but rather, as a normal PC. However, when activated, i.e., when the fuse 189 maintains a connection between the SM 182 and the I/O Interface 118, the computer may operate as a subscription-based computing device. In one embodiment, the fuse 189, once activated to enable communication between the SM 182 and other components and devices, may not be deactivated. For example, the computer 110 may be manufactured initially to operate as a normal, non-subscription-based PC and may later be activated by an underwriter or subscriber to operate as a subscription-based PC. Therefore, while the fuse is activated and upon boot-up, connection, or disconnection of the device 188, firmware of the SM 182 (i.e., the previously-described local provisioning module of the secure storage 186) may seek subscription or usage time stored in the metered computing device 188.
[0036] Returning to Fig. 2, the device 188 as illustrated may be represented and arranged in a variety of forms to include the elements as described below. For example, the device 188 may include an interface 207 that may enable communication between the device 188 and the SM 182. As previously described, the device 188 may communicate with the computer 110 via the SM 182 through any combination of 1394, USB, Internet Small Computer Systems Interface, serial, parallel, infrared, Near Field Communication, BlueTooth, 802.x, or other connection. In one embodiment, the interface 205 is a male type- A USB connector that provides an interface to the host computer 110. [0037] The device 188 may also include a memory or storage area 210. The storage area 210 may be a single flash memory chip or multiple flash memory chips that store a unique hardware identification (HWID) or Universal Property Identifier (UPID) 215. The HWID or UPID may uniquely identify the device to any other connected device, for example, a computing device 110 or remote computing device 178. In a further embodiment, the device 188 may store data representing a user's subscription or access data 220 to enable a computer 110 or to execute metered applications. Additionally, the storage area 210 may include configuration data 222. In one embodiment, the configuration data may provide information that may bind a computer 110 that is enabled with the device 188 to a particular internet service provider (ISP).
[0038] Also, as previously discussed, the metered computing device 188 may include an execution unit 205 that may enable a secure connection between the device 188 and any other device, for example, a computer 110. In one embodiment, the execution unit 205 includes a cryptographic function, as previously described in relation to the secure storage 186 of the SM 182. The cryptographic function of the device 188 that may act as an authentication module for all communication between the device 188 and the computer 110. For example, the cryptographic function of the execution unit 205 may provide a processing and encryption subsystem of the device 188 that reaches a suitable Common Criteria Evaluation Assurance Level to ensure that the device 188 and any communication between the device 188 and the computer 110 may not be compromised. In one embodiment, the cryptographic core and the execution unit 205 operates as the SLE series of smartcards as produced by Infineon Technologies AG of Munich, Germany.
[0039] Other embodiments of a metered computing device 188 include a battery 230 to preserve certain data of the storage 210 or may provide a power source for an indicator 235 that may be activated when the subscription data 220 reaches a threshold or the device 188 is compromised or may no longer function. Several indicator LEDs 235 may convey different notifications to the user, for example, a notification of a low time 220 or other usage balance or a notification of a full or adequate balance. The indicator 235 may also include a video screen that conveys a numerical balance of access time remaining on the device 188 or any other information related to any data stored on the device 188.
[0040] Fig. 3 is a simplified and exemplary block diagram of a system 300 supporting pay-per-use and subscription usage of a computer or other electronic device. A provisioning server 302 may serve as a trusted endpoint for provisioning requests from one or more electronic devices participating in the pay-per-use business ecosystem. One electronic device 304 may be similar to computer 110 of Fig. 1 with a connected metered computing device 188. Other electronic devices 306 may perform substantially the same as the exemplary device 304. Communication between the provisioning server 302 and the electronic device 304 may be accomplished through a network 308 that may include landline, wireless, or broadband networks, or other networks known in the art.
[0041] An accounting server 310 may be linked to the provisioning server 302 and may maintain account data corresponding to the electronic device 304. Account data may also be stored at the device 188. The accounting server 310 may also serve as a clearinghouse for financial transactions related to the electronic device 304, such as, replenishing or adding value to a pay-per-use account maintained on the accounting server 310 and recorded at the device 188. In one embodiment, the electronic device 304, enabled with the metered computing device 188, establishes a connection with a vendor 312 that communicates with the accounting server 310. In another embodiment, the metered computing device 188 establishes a connection directly with the accounting server 310. The vendor may be a vending machine or other stand-alone, self-service kiosk. A user may plug the metered computing device 188 directly into the vendor 312, select an amount of OS, application, or other subscription time for loading to the device 188, pay, and receive the access data. The access data may be any value, access time 220 to any secure OS or application of the electronic device 304, 306, or any other data that may be recorded at the accounting server 310 and stored at the device 188 for use with a computer 110. In a further embodiment, the user may purchase a generic amount of time that may be used for any OS, application, or any other activity at a secure electronic device 304. Of course, many other types of data, access time, and subscription information may be purchased and stored on the metered computing device 188.
[0042] In one scenario, a user desiring to add time to a device 188 may connect the device 188 to a vendor 312 at a retail outlet or through another computer 110, navigate through a series of UIs to pay for access time 220, and load time 220 to the device 188. The user may then use the purchased time 220 at a secure computing client 110 by connecting the device 188 to the computer 110. The device 188 may then establish a secure connection with the computer 110 which may, in turn, transmit a code to a server
302 which returns a signed packet to the computer 110. The packet may contain the data representing the amount of time 220 the user purchased. The computer 110 may consume the access time 220 of the device 188, transferring it to the LPM (Lower Provisioning Module) of the secure storage 186 and the time balance 220 may be updated. As previously explained, the LPM may be executed in a security module 182 or other hardware or hardware-assisted "container" in the system 110. In one embodiment, the LPM accesses and updates purchased time balances provided in the device 188. In another embodiment, the LPM synchronizes a time balance of the device 188 with a balance stored locally in the secure storage 186. When the purchased time 220 expires or is consumed on the computer 110, the user may be given several warnings that may be accompanied by reduced computer 110 functionality. If the user does not pay for more access time 220, the computer 110 ultimately transitions to a mode where the user may be presented with a text-only interface that may only allow him to connect a replenished device 188. In this state, which may be referred to as Hardware Locked Mode (HLM), the computer 110 may be unusable for anything but connecting a valid device 188. The computer 110 may enforce HLM by only operating in System Management Mode (SMM) which may not permit operating systems or applications to load other than a restricted HLM BIOS and associated code.
[0043] In another scenario, the user purchases an amount of time to use metered software on the computer 110 such as an OS, applications, or both. The user may also purchase the ability to use a metered word processing or other applications stored at the computer 110 for a number of uses, a number of completed pages, or any other measurable use. Once the user depletes the purchased usage 220 for an application, a user may not access the application from the computer 110 unless more time is purchased. In one embodiment, applications at the device 304, 306 are stored in a secure storage area 186 in a manner that may not install or store the application on a hard disk drive 160 of the computer 110. For example, the applications at the computer 110 may be in a Softgrid® format as produced by the Microsoft Corporation of Redmond, Washington.
[0044] A user may transfer his or her access to a computer 110 in a pay-for-use system to any computer 110 configured to access the metered computing device 188. In one embodiment, the user transports his or her usage time to a computer 110 in an internet cafe including machines with a security module 182. The cafe computer 110 may function only if a patron connects a metered computing device 188 that includes valid access time data 220. Other prepaid account funds transfer systems are well known, for example, with respect to prepaid cellular phones or other mobile computing systems, and are equally applicable in this business model.
[0045] Fig. 4 is a simplified and exemplary block diagram of a method 400 for enabling a secure computer 110 using a portable memory device 188 to monitor and store an amount of purchased access or subscription time 220 for operating systems, 136, 168, application programs 138, 170, other program modules 140, 172, and other data 142, 174. The method 400 comprises a number of actions represented graphically in Fig. 4 as blocks. The actions may be executed in any suitable order to accomplish the described task. At block 405, the computer 110 may boot or re-boot. For example, if, before the computer 110 is turned on, the user connects the device 188, the computer 110 may be configured by its BIOS 150, to check for a connection with a device 188 during boot up. If the user connects the device 188 after boot up, the computer 110 may re-boot to begin operating with the device 188.
[0046] The boot process may involve following a normal boot sequence known in the art, with the exception that a request for BIOS code from the I/O Interface 118 may not result in reading BIOS boot code directly from memory, such as memory 150, but may result in a request from the I/O Interface 118 to the SM 182 for BIOS boot code stored in the secure storage 186 such as a secure boot environment BIOS. In one embodiment, the I/O Interface accesses the BIOS of the SM 182 only if the fuse 189 is activated, as previously described.
[0047] At block 410, communication between a device 188 and the computer 110 may be established. In one embodiment, communication between the device 188 and the computer 110 may be secure. For example, a secure channel may be established between the device 188 and the computer 110 by least one of the previously described cryptographic core of the SM 182 secure storage 186 and the cryptographic function of the device 188 execution unit 205. The HWID/UPID 215 of the device 188 may also be confirmed by the SM 182 to establish secure communication.
[0048] In a further embodiment, one of a dedicated or a hardware switched communication port may be used to establish secure communication between the device 188 and the computer. The dedicated path may be created between the device 188 and the SM 182 at boot up and may be a USB communication path that directly connects the device 188 to the SM 182. During operation, the device 188 remains attached to the port, directly connecting it to the SM 182 during operation. A heartbeat signal exchanged between the SM 182 and the device 188 may be monitored by firmware of the SM 182 to ensure secure communication maintenance.
[0049] Alternatively, switching hardware may handle multiplexing of the path, with a secondary path using the OS as a proxy, once the computer 110 completes booting and establishes the secure channel. Because the switched path may also use the OS and various drivers as a pathway, a switch from the path may occur during boot up which may result in a security risk. To mitigate the possibility of a security risk, a watchdog timer may be included in the secure storage 186 of the SM 182. In one embodiment, the watchdog timer is set for a duration to account for OS and driver loading. If, at block 412, the watchdog timer expires before the secure channel is re-established through the OS, the computer 110 may be rebooted or transitioned into a degraded mode as described at block 420. In one embodiment, the watchdog timer recognizes a secure channel by receiving a heartbeat signal initiated by the SM 182 and sent to an OS proxy application, through USB storage stacks, and into the device 188. Using either the dedicated or switched path, the SM 182 delays a "power OK" signal to the processor 112 and loads the SM 182 with the Lower Provisioning Module (LPM) of the secure storage 186. The SM 182 may then exchange credentials with the device 188 by, for example, a public key infrastructure, over the established secure path.
[0050] At block 415, the SM 182 may check the balance of time 220 on the device 188. In one embodiment, an LPM of the secure storage 186 may access the device 188 to check the time balance 220. If there is no time remaining on the device or time is below a threshold, at block 420, the computer 110 may enter a degraded mode of operation. In one embodiment, the SM 182 forces the computer 110 into a progressively more degraded operational state that finally results in the computer 110 entering a Hardware Locked Mode, as previously described. A user interface of the Hardware Locked Mode may ask a user to connect a device 188 with a valid time balance. The computer 110 may enter a degraded mode by accessing a limited operation BIOS stored on the SM 182. Time may not be decremented from the device 188 while the computer 110 is in Hardware Locked Mode.
[0051] Additionally, the LPM may access the configuration data 222 of the device. In one embodiment, the configuration data 222 may allow the LPM to bind the device 188 to a particular ISP. For example, the configuration data 222 may by authentication keys implementing a PKI that may represent authentication and authorization between the user and the ISP. The keys may be exchanged during an initial provisioning of the device 188, for example, upon connection to the computer 110.
[0052] If, at block 415, time remains on the device 188, at block 425, the computer 110 may operate. In one embodiment, the computer may operate according to a normal operation BIOS accessed by the computer 110 from the SM 182 secure storage 186 or memory 150. A user's actions during operation may be regulated according to the subscription or other access data 220 stored on the device 188. For example, the user may have purchased access 220 for an operating system 136, 168, individual or groups of application programs 138, 170, or other modules 140, 172 stored on the computer 110. Further, the access time 220 may allow the user to operate applications stored at the secure storage 186 of the SM 182. As previously described, the operating system(s) and applications may be in a Softgrid® format that may be securely accessed by, though not stored on, the computer 110. Operation of the computer 110 may also include decrementing the access data 220 associated with executed programs. In one embodiment, the LPM of the SM 182 may continuously decrement and update the access data 220 of the device 188.
[0053] At block 430, the computer 110 may check the connection established with the device 188 at block 410. If the device 188 is no longer connected to the computer 110, it may transition to a degraded mode as described in relation to block 420. If the device 188 remains connected to the computer 100, the method 400 may transition to block 415 to re- check the balance and continue.
[0054] Fig. 5 is another simplified and exemplary block diagram of a method 500 for enabling a secure computer 110 using a portable memory device 188 to monitor and store an amount of purchased access or subscription time 220 for operating systems, 136, 168, application programs 138, 170, other program modules 140, 172, and other data 142, 174. At block 505, the computer 100 may boot or re-boot as described in relation to Fig. 4. As before, the SM 182 may delay a "power OK" signal to the I/O interface 118 to load the SM 182 with the LPM of the secure storage 186. However, as no secure channel is yet established, the LPM may not have access to any subscription or time data 220 of the device 188. [0055] At block 510, the SM 182 may establish a secure channel with the device 188. In one embodiment, the SM 182 may load a secure boot environment stored in the secure storage 186. For example, the SM 182 may load a securely-configured BIOS from the secure storage 186. This BIOS may have routines to enumerate and connect a secure channel between the SM 182 and the device 188. In a further embodiment, the secure boot environment BIOS may be written with minimal code to mitigate potential security risks. The SM 182 may then exchange credentials with the device 188 to establish a secure channel.
[0056] At block 515, the SM 182 may check the balance of time 220 on the device 188 as described in relation to block 415. If there is no time remaining on the device, at block 520, the computer 110 may enter a degraded mode of operation. If, at block 515, time remains on the device 188, at block 525, the computer 110 may operate. As before, operation of the computer 110 may also include decrementing the access data 220 associated with executed programs. At block 530, the computer 110 may check the connection established with the device 188 at block 510. If the device 188 is no longer connected to the computer 110, it may transition to a degraded mode 520 as described in relation to block 420. If the device 188 remains connected to the computer 110, the method 500 may transition to block 515 to re-check the balance and continue.
[0057] Fig. 6 is another simplified and exemplary block diagram of a method 600 for enabling a secure computer 110 using a portable memory device 188 to monitor and store an amount of purchased access or subscription time 220 for operating systems, 136, 168, application programs 138, 170, other program modules 140, 172, and other data 142, 174. At block 605, the computer 110 may boot normally, as if the LPM of the device 188 had already detected a positive balance at the device 188. At block 610, the SM 182 may initiate a watchdog timer that may monitor for a heartbeat signal from the device 188 within an amount of time. In another embodiment, the watchdog timer may monitor for the heartbeat signal though an established secure channel between the SM 182 and the device 188. In one embodiment, the watchdog timer is stored and executed within the secure storage 186 of the SM 182. Once boot is complete, at block 615, software executing within the loaded OS may establish a secure channel from the SM 182 to the device 188. In another embodiment, the SM 182 exchanges credentials with the device 188 and initiates the heartbeat signal. [0058] If, at block 620, the watchdog timer has expired before it receives a heartbeat signal indicating an established secure channel between the SM 182 and the device 188, then, at block 625, the SM 182 may force the computer 110 into a degraded operation mode. Alternatively, at watchdog timer expiration, the SM 182 may force the computer 110 to reboot. If, however, the watchdog timer has not expired, at block 630, the method 600 may operate as described in relation to Figs. 4 and 5.
[0059] At block 630, the SM 182 may check the balance of time 220 on the device 188 as described in relation to block 415. If there is no time remaining on the device, at block 625, the computer 110 may enter a degraded mode of operation. If, at block 630, time remains on the device 188, at block 635, the computer 110 may operate. As before, operation of the computer 110 may also include decrementing the access data 220 associated with executed programs. At block 640, the computer 110 may check the connection established with the device 188 at block 615. If the device 188 is no longer connected to the computer 110, it may transition to a degraded mode as described in relation to block 420. If the device 188 remains connected to the computer 110, the method 600 may transition to block 630 to re-check the balance and continue.
[0060] Thus, a device 188 may enable a secure computer 110 by securely storing an amount of purchased access or subscription time 220 for operating systems, 136, 168, application programs 138, 170, other program modules 140, 172, and other data 142, 174. By ensuring a secure channel of communication between a security module 182 of the computer 110 and the device 188, users of a subscription-based or pay-as-you-go computing system may enable any secure computer 110 with subscription and access information stored on a portable memory device 188.
[0061] Many modifications and variations may be made in the techniques and structures described and illustrated herein without departing from the spirit and scope of the present invention. Accordingly, it should be understood that the methods and apparatus described herein are illustrative only and are not limiting upon the scope of the invention

Claims

Claims:
1. A system for enabling a subscription-based computer 110 comprising: a removable metered computing device 188 including a cryptographic unit 205 and a secure memory 210 storing a number of subscription metering units; a security module 182 residing on the computer 110 in communication with the removable metered computing device 188, the security module 182 including a computer- readable medium having computer executable instructions comprising: a communication module for establishing a secure communication channel between the removable metered computing device 188 and the security module 182; a provisioning module for accessing, decrementing, and storing the number of subscription units during operation of the subscription-based computer 110; an authentication module in communication with the cryptographic unit 205 for verifying the secure communication channel; and a processing module 112 for enabling execution of at least one application by the computer 110 if the secure communication channel is verified and the number of subscription units remains above a threshold.
2. The system of claim 1, wherein the secure communication channel comprises a dedicated path between the removable metered computing device 188 and the security module 182.
3. The system of claim 1, wherein the secure communication channel comprises a hardware switched communication port between the removable metered computing device 188 and the security module 182.
4. The system of claim 3, wherein the hardware switched communication port includes a computer-readable medium having computer executable instructions comprising: a multiplexing module for securely communicating between the removable metered computing device 188 and the security module 182 over a selected one of a dedicated path and an operating system 136, 168 of the computer 110.
5. The system of claim 1 , further comprising a watchdog timer module for measuring an amount of time to load the operating system 136, 168 and drivers of the computer 110.
6. The system of claim 5, further comprising a disabling module for restricting the execution of the at least one application 138, 170 if the amount of time measured by the watchdog timer module is above a threshold.
7. The system of claim 1, further comprising a binding module for limiting access of the computer 110 to at least one internet service provider.
8. The system of claim 1, wherein the communication module further comprises a secure boot environment module for enumerating and connecting the secure communication channel between the removable metered computing device 188 and the security module 182.
9. The system of claim 1 , wherein, through the secure connection, the removable metered computing device 188 communicates only with the security module 182.
10. A method for enabling a subscription-based computer 110 including a security module 182 comprising: connecting a removable metered computing device 188 including a number of metered access units to the security module 182 of the subscription-based computer 110; securing the connection between the metered computing device 188 and the security module 182; determining if the number of metered access units is above a threshold; restricting a function of the computer 110 if the number of metered access units is below a threshold; executing at least one application 138, 170 by the computer 110 if the number of metered access units is above a threshold; maintaining the secure connection between the metered computing device 188 and the security module 182 during execution of the at least one application 138, 170; and decrementing the number of metered access units during execution of the at least one application 138, 170.
11. The method of claim 10, wherein the connection between the metered computing device 188 and the security module 182 comprises a dedicated path.
12. The method of claim 10, further comprising multiplexing the connection between one of a dedicated path and an operating system 136, 168 of the computer 110; measuring an amount of time to load the operating system 136, 168 and drivers of the computer 110; and restricting the execution of the at least one application 138, 170 if the amount of time measured is above a threshold.
13. The method of claim 10, wherein the removable metered computing device 188 includes service provider configuration data.
14. The method of claim 13, further comprising identifying a service provider and provider access data from the service provider configuration data; and binding the computer 110 to the identified service provider using the provider access data.
15. The method of claim 10, further comprising enumerating and connecting a secure channel between the removable metered computing device 188 and the security module 182 through a secure boot environment stored at the security module 182.
16. A system including a removable metered computing device 188 in communication with a security module 182 of a subscription-based computer 110, at least one of the removable metered computing device 188 and the security module 182 including a protected memory 186, 205 and a protected processor physically configured to execute computer executable code for: establishing a secure connection between the removable metered computing device 188 and the security module 182 of the subscription-based computer 110; communicating a number of metered access units from the removable metered computing device 188 to the security module 182; executing at least one application of the computer 182 if the number of metered access units is above a threshold; and restricting a function of the computer 110 if the number of metered access units is below a threshold.
17. The system of claim 16, wherein the connection between the removable metered computing device 188 and the security module comprises a dedicated path.
18. The system of claim 16, further comprising computer executable code for: multiplexing the secure connection between one of a dedicated path and an operating system 136, 168 of the computer 110; measuring an amount of time to load the operating system 136, 168 and drivers of the computer 110; and restricting the execution of the at least one application 138, 170 if the amount of time measured is above a threshold.
19. The system of claim 16, wherein the removable metered computing device 188 includes service provider configuration data.
20. The system of claim 19, further comprising computer executable code for: identifying a service provider and provider access data from the service provider configuration data; and binding the computer 110 to the identified service provider using the provider access data.
PCT/US2008/059030 2007-04-04 2008-04-01 Prepaid computing access using portable storage devices WO2008124396A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP08744868A EP2149113A4 (en) 2007-04-04 2008-04-01 Prepaid computing access using portable storage devices
BRPI0809218-4A BRPI0809218A2 (en) 2007-04-04 2008-04-01 ACCESS TO PREPAID COMPUTER USING PORTABLE STORAGE DEVICES

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/696,350 US20080250250A1 (en) 2007-04-04 2007-04-04 Method and Apparatus for Using USB Flash Devices and Other Portable Storage as a Means to Access Prepaid Computing
US11/696,350 2007-04-04

Publications (1)

Publication Number Publication Date
WO2008124396A1 true WO2008124396A1 (en) 2008-10-16

Family

ID=39828003

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/059030 WO2008124396A1 (en) 2007-04-04 2008-04-01 Prepaid computing access using portable storage devices

Country Status (7)

Country Link
US (1) US20080250250A1 (en)
EP (1) EP2149113A4 (en)
BR (1) BRPI0809218A2 (en)
CL (1) CL2008000937A1 (en)
RU (1) RU2463658C2 (en)
TW (1) TW200844791A (en)
WO (1) WO2008124396A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014078839A1 (en) * 2012-11-19 2014-05-22 Bmm International, Llc System and method to test and certify equipment for regulatory compliance

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8607034B2 (en) * 2008-05-24 2013-12-10 Via Technologies, Inc. Apparatus and method for disabling a microprocessor that provides for a secure execution mode
US8132267B2 (en) * 2008-09-30 2012-03-06 Intel Corporation Apparatus and method to harden computer system
US20100083365A1 (en) * 2008-09-30 2010-04-01 Naga Gurumoorthy Apparatus and method to harden computer system
US8112062B2 (en) * 2009-12-22 2012-02-07 Cellco Partnership System and method for sending threshold notification in real time
EP2515552A1 (en) 2011-04-18 2012-10-24 Nagravision S.A. Secure utility metering monitoring module
US8881256B1 (en) * 2011-12-21 2014-11-04 Amazon Technologies, Inc. Portable access to auditing information
JP7212716B2 (en) * 2021-05-25 2023-01-25 レノボ・シンガポール・プライベート・リミテッド Information processing device, management system, and management method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060092493A (en) * 2005-02-18 2006-08-23 임창순 Method for prepaying pc-bang charge
US7164927B1 (en) * 1998-07-27 2007-01-16 Swisscom Mobile Ag Telecommunication method and suitable system for establishing a connection with a mobile station
KR20070015671A (en) * 2005-08-01 2007-02-06 (주)이월리서치 Method of managing USB devices using Security Controller added into USB host controller
KR20070017609A (en) * 2005-08-08 2007-02-13 (주)이월리서치 Method of managing USB devices

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5386369A (en) * 1993-07-12 1995-01-31 Globetrotter Software Inc. License metering system for software applications
US5771354A (en) * 1993-11-04 1998-06-23 Crawford; Christopher M. Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services
US5815665A (en) * 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network
US7046682B2 (en) * 1997-02-12 2006-05-16 Elster Electricity, Llc. Network-enabled, extensible metering system
US5915093A (en) * 1997-04-24 1999-06-22 Howard Berlin Computer network debit disk used for prepayment to transfer information from a central computer
US20050203835A1 (en) * 1998-01-30 2005-09-15 Eli Nhaissi Internet billing
US6363356B1 (en) * 1998-07-16 2002-03-26 Preview Software Referrer-based system for try/buy electronic software distribution
US7076467B1 (en) * 2000-08-04 2006-07-11 Sony Computer Entertainment America Inc. Network-based method and system for transmitting digital data to a client computer and charging only for data that is used by the client computer user
US8271400B2 (en) * 2002-01-15 2012-09-18 Hewlett-Packard Development Company, L.P. Hardware pay-per-use
US7571143B2 (en) * 2002-01-15 2009-08-04 Hewlett-Packard Development Company, L.P. Software pay-per-use pricing
US7523071B2 (en) * 2002-09-16 2009-04-21 Yahoo! Inc. On-line software rental
US6990330B2 (en) * 2003-01-09 2006-01-24 Qualcomm Incorporated Method and apparatus providing user with account balance notification of prepaid wireless packet data services
US8135795B2 (en) * 2003-04-03 2012-03-13 International Business Machines Corporation Method to provide on-demand resource access
US7500108B2 (en) * 2004-03-01 2009-03-03 Microsoft Corporation Metered execution of code
US7616746B2 (en) * 2004-08-13 2009-11-10 Qualcomm Incorporated Methods and apparatus for tracking and charging for communications resource reallocation
US20060165005A1 (en) * 2004-11-15 2006-07-27 Microsoft Corporation Business method for pay-as-you-go computer and dynamic differential pricing
US20070156713A1 (en) * 2005-12-27 2007-07-05 Microsoft Corporation Database schema for hosting prepaid and subscription information
US20080162159A1 (en) * 2006-12-29 2008-07-03 Zhou Wang Component to support prepaid devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7164927B1 (en) * 1998-07-27 2007-01-16 Swisscom Mobile Ag Telecommunication method and suitable system for establishing a connection with a mobile station
KR20060092493A (en) * 2005-02-18 2006-08-23 임창순 Method for prepaying pc-bang charge
KR20070015671A (en) * 2005-08-01 2007-02-06 (주)이월리서치 Method of managing USB devices using Security Controller added into USB host controller
KR20070017609A (en) * 2005-08-08 2007-02-13 (주)이월리서치 Method of managing USB devices

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2149113A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014078839A1 (en) * 2012-11-19 2014-05-22 Bmm International, Llc System and method to test and certify equipment for regulatory compliance

Also Published As

Publication number Publication date
CL2008000937A1 (en) 2008-12-26
BRPI0809218A2 (en) 2014-09-02
RU2009136566A (en) 2011-04-10
TW200844791A (en) 2008-11-16
EP2149113A4 (en) 2011-11-30
EP2149113A1 (en) 2010-02-03
US20080250250A1 (en) 2008-10-09
RU2463658C2 (en) 2012-10-10

Similar Documents

Publication Publication Date Title
US20080250250A1 (en) Method and Apparatus for Using USB Flash Devices and Other Portable Storage as a Means to Access Prepaid Computing
CN101263473B (en) Processing unit enclosed operating system
US8533801B2 (en) System and method for binding a subscription-based computing system to an internet service
US20080250237A1 (en) Operating System Independent Architecture for Subscription Computing
US8255988B2 (en) Direct peripheral communication for restricted mode operation
US20060106845A1 (en) System and method for computer-based local generic commerce and management of stored value
US20070192824A1 (en) Computer hosting multiple secure execution environments
US7913295B2 (en) Method and apparatus to enable a securely provisioned computing environment
JP2008521093A (en) Precise accounting of computer usage
EP1984878B1 (en) Disaggregated secure execution environment
US20090183245A1 (en) Limited Functionality Mode for Secure, Remote, Decoupled Computer Ownership
WO2008157712A1 (en) Packet schema for pay-as-you-go service provisioning
US20080319925A1 (en) Computer Hardware Metering
US20080077420A1 (en) System and Method for Securely Updating Remaining Time or Subscription Data for a Rental Computer
US20070192826A1 (en) I/O-based enforcement of multi-level computer operating modes
KR101279697B1 (en) Using power state to enforce software metering state
KR20070088633A (en) Delicate metering of computer usage
MX2008009867A (en) Disaggregated secure execution environment
MX2008009868A (en) Computer hosting multiple secure execution environments
US20090094455A1 (en) Frequency Managed Performance
MXPA05012285A (en) Business method for pay-as-you-go computer and dynamic differential pricing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08744868

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 5601/CHENP/2009

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2009136566

Country of ref document: RU

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2008744868

Country of ref document: EP

ENP Entry into the national phase

Ref document number: PI0809218

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20090923