2012年12月4日 星期二

定位技術專利戰

NovelPoint Tracking LLC於2012.10.31.向東德州地方法院控告Ford汽車的車用通訊整合系統侵害其專利,系爭專利為:US5,434,562及US6,212,635。

US5,434,562
Title : Method for limiting computer access to peripheral devices
Filing Date : 1993.7.12.
Issue Date : 1995.7.18.
Abstract :
One or more user accessible switches are provided by which the authorized user may fully or partially limit the computer\'s access to one or more of its peripheral devices. The switch inhibits power or control lines to the peripheral device, or enables the programming of access limits to the peripheral device, in a manner which cannot be overridden by the computer. This added level of control allows the user to control the computer\'s activities so that access to these peripheral devices is allowed only under secure conditions, so as to preclude alteration or destruction of data by unauthorized users or computer viruses. Methods are disclosed by which the switches can render peripheral devices totally inactive, or made to be temporarily read-only, write-only, or write-once in order to implement a number or security protocols for single or multi-user environments.

US6,212,635
Title : Network security system allowing access and modification to a security subsystem after initial installation when a master token is in place
Filing Date : 1998.7.14.
Issue Date : 2001.4.3.
Abstract :
Apparatus and process are disclosed by which to disable a computer\'s access to all or a part of the computer\'s memory system or associated peripherals, so as to protect the computer from accidental or malicious damage of data files or programs that may result from the activity of computer users or computer viruses. This result is achieved by providing the authorized user with a token whereby the user can configure the security gateway to completely or partially disable the peripheral device without disrupting the operation of the computer or other peripherals. The principal hardware component of one embodiment of the invention is the security gateway which in a typical configuration simply adds new security functions to the programmable controllers that are typically used for an I/O controller or hard drive controller, although this is not always necessary. The process can just as easily be incorporated into a local network controller, a communications controller, or a main processor board for a system. The speed of the security gateway can be further enhanced by adding additional computational or encryption hardware to the chip sets used in said I/O or hard drive controllers.

沒有留言: