NovelPoint Tracking
LLC於2012.10.31.向東德州地方法院控告Ford汽車的車用通訊整合系統侵害其專利,系爭專利為:US5,434,562及US6,212,635。
US5,434,562
Title
: Method for limiting computer access to peripheral devices
Filing Date :
1993.7.12.
Issue Date : 1995.7.18.
Abstract :
One or more user
accessible switches are provided by which the authorized user may fully or
partially limit the computer\'s access to one or more of its peripheral devices.
The switch inhibits power or control lines to the peripheral device, or enables
the programming of access limits to the peripheral device, in a manner which
cannot be overridden by the computer. This added level of control allows the
user to control the computer\'s activities so that access to these peripheral
devices is allowed only under secure conditions, so as to preclude alteration or
destruction of data by unauthorized users or computer viruses. Methods are
disclosed by which the switches can render peripheral devices totally inactive,
or made to be temporarily read-only, write-only, or write-once in order to
implement a number or security protocols for single or multi-user
environments.
US6,212,635
Title : Network security system allowing
access and modification to a security subsystem after initial installation when
a master token is in place
Filing Date : 1998.7.14.
Issue Date :
2001.4.3.
Abstract :
Apparatus and process are disclosed by which to
disable a computer\'s access to all or a part of the computer\'s memory system
or associated peripherals, so as to protect the computer from accidental or
malicious damage of data files or programs that may result from the activity of
computer users or computer viruses. This result is achieved by providing the
authorized user with a token whereby the user can configure the security gateway
to completely or partially disable the peripheral device without disrupting the
operation of the computer or other peripherals. The principal hardware component
of one embodiment of the invention is the security gateway which in a typical
configuration simply adds new security functions to the programmable controllers
that are typically used for an I/O controller or hard drive controller, although
this is not always necessary. The process can just as easily be incorporated
into a local network controller, a communications controller, or a main
processor board for a system. The speed of the security gateway can be further
enhanced by adding additional computational or encryption hardware to the chip
sets used in said I/O or hard drive controllers.
沒有留言:
張貼留言