Download Password protected modular computer method and device
Transcript
USO0RE41294E (19) United States (12) Reissued Patent (10) Patent Number: US RE41,294 E (45) Date of Reissued Patent: *Apr. 27, 2010 Chu (54) PASSWORD PROTECTED MODULAR COMPUTER METHOD AND DEVICE (75) Inventor: 5,103,446 A 5,191,581 A 5,251,097 A William W. Y. Chu, Los Altos, CA (US) (73) Assignee: ACQIS Techonology, Inc., Mountain View, CA (US) (*) Notice: This patent is subject to a terminal dis claimer. (51) Issued: Nov. 20, 2001 Appl. No.: 09/183,493 Filed: Oct. 30, 1998 web on Jun. 23, 2004, 3 pgs. “SQL Server and NT Cluster Manager Availability Demo,” Microsoft Server Programmer Developers Conference, Nov. 1996, 15 pages total. Agerwala, T., Systems Journal “SP2 System Architecture” Int. Cl. vol. 34, No. 2, 1995 Scalable Parallel Computing vol. 34, No. 2, 1995. (Continued) US. Cl. .......................... .. 713/193; 710/301; 726/9; 726/18; 726/28 (58) Field of Classi?cation Search ................ .. 713/164, Primary ExamineriBeemnet W Dada (74) Attorney, Agent, or FirmACooIey Godward Kronish 713/172, 189, 190, 194, 193; 711/164; 710/100, LLP 710/301; 726/2, 9, 17, 18, 19, 20, 28; 361/687 See application ?le for complete search history. (57) (56) puter Module Bay (“CMB”) 40 within a peripheral console U.S. PATENT DOCUMENTS > 12/1976 11/1986 10/1987 9/1988 10/1989 12/1989 4/1990 7/1990 10/1991 2/1992 ABSTRACT A method and device for securing a removable Attached Computer Module (“ACM”) 10. ACM 10 inserts into a Com References Cited 3,996,585 4,623,964 4,700,362 4,769,764 4,872,091 4,890,282 4,918,572 4,939,735 5,056,141 5,086,499 7/1996 10/1994 10/1992 1/1994 5/1995 1/1997 mes.com/testing/97feb/702b072a.html>>, downloaded from (2006.01) (52) 722138 A1 6-289953 WO 92/18924 WO 94/00097 WO 95/13640 WO97/00481 “Features Chart”, (Feb. 1, 1997) <<http://www.lanti Related US. Patent Documents 6,321,335 EP JP W0 W0 W0 WO OTHER PUBLICATIONS Reissue of: Patent No.: (Continued) FOREIGN PATENT DOCUMENTS (21) Appl. No.: 11/474,256 Jun. 23, 2006 (22) Filed: (64) 4/1992 Fischer 3/1993 Woodbury et 31. 10/1993 Simmons et a1. to form a functional computer such as a desktop computer or Hogan portable computer. The present ACM 10 includes a locking system, which includes hardware and software 600, 700, to GetZ et 31. Todd et a1. Levanon Maniwa et a1. Lambert et a1. Tarver et a1. Fredericks et a1. prevent accidental removal or theft of the ACM from the peripheral console. While ACM is in transit, further security is necessary against illegal or unauthorized use. If ACM con tains con?dential data, a high security method is needed to safeguard against theft. Dyke Mutone 36 Claims, 12 Drawing Sheets ATTACHED COMPUTER MODULE e 527 529,”; MiélllgR‘l CPU ‘L. g?ggg CPU | ' Bus R comer. sax-P FLASH MEM 1% 505 WITH BIOS a HOEJSPCI 533 USER PASSWORD I IEORST |__-\.510 FT- CONTROLLER INT FACE \ LOCK CONTROL INTERFACE CONNECTORS US RE41,294 E Page 2 US. PATENT DOCUMENTS 5,278,509 A 5,278,730 A 5,293,497 A 1/1994 Haynes etal. V1994 Kikinis 3/1994 Free 5,311,397 A 5,317,477 A 5,319,771 A 5/1994 5/1994 6/1994 7/1994 10/1994 6/1995 7/1995 10/1995 5/1996 7/1996 8/1996 5,331,509 A 5355391 5,428,806 5436857 5,463,742 5,519,843 5,539,616 5,550,710 5,550,861 5,572,441 5,578,940 5,600,800 5,603,044 5,606,717 5,608,608 A A A A A A A A A A A A A A 5,623,637 A 4/2000 5/2000 5/2000 7/2000 7/2()()() 8/2000 MacLaren Abraham et a1. Ahern Gallagher et a1. Ahem Cosleyetal. 12/2000 Gallagher et a1. 6,163,464 6,175,490 6,202,169 6,208,522 6,216,185 6,256,689 6,260,155 6,266,539 6,289,376 6,304,895 6,311,268 6,314,522 6,317,329 6,321,335 A B1 B1 B1 B1 B1 B1 B1 B1 B1 B1 B1 B1 B1 12/2000 1/2001 3/2001 3/2001 4/2001 7/2001 7/2001 7/2001 9/2001 10/2001 10/2001 11/2001 11/2001 11/2001 Ishibashietal. Papa et al. RaZZaghe-Ashra? et a1. Manweileretal. Chu Khosrowpour Dellacona Pardo Tayloretal. Schneider etal. Chu Chu et a1. Dowdy etal. Chu 4/1997 Jones et a1. ............... .. 711/164 6,332,180 B1 l2/200l Kauffman et 31‘ 5/1997 Hair 6/1997 Buchalaet al. 6,345,330 B2 6,366,951 B1 2/2002 Chu 4/2002 Schmidt 2/1997 2/1997 2/1997 3/1997 Kikinis et 31. Annapareddy eta1~ Farmwaldet a1~ Flintet 31. 6/1997 Kikinis ..................... .. 361/687 6,378,009 B1 4/2002 Pinkston, H et 31‘ 5,648,762 A 7/1997 lchimum er 91- 6,381,602 B1 4/2002 Shoroffetal. 5,659,773 A 8/1997 Huynh eta1~ 6,393,561 B1 5,663,661 5,673,174 5,680,126 5689654 5,721,837 5,721,842 5,745,733 5,751,711 5,752,080 5,764,924 5,774,704 5,795,228 5,809,538 5,815,681 5,819,050 5,826,048 5,838,932 * 6,052,513 A 6,069,615 A 6,070,214 A 6,157,534 A 8/1996 Chan et al. * 3/2000 Watson et a1. 4/2000 Bovio et al. 6,088,224 A 6,088,752 A 6,104,921 A 11/1996 Boie 11/1996 Dillon 5,630,057 A 5,638,521 A 5,640,302 A HarshbergeretalGillett Takeda Kikinis HOIOWIIZ etal Poems Nelson et a1~ Kobayashi Moran etal. Kikinis R?hamim eta1~ 6,040,792 A 6,046,571 A A A A A A A A A A A A A A A A A A 9/1997 9/1997 10/1997 11/1997 2/1998 2/1998 4/1998 5/1998 5/1998 6/1998 6/1998 8/1998 9/1998 9/1998 10/1998 10/1998 11/1998 5,848,249 A ’ 6,401,124 6,425,033 6,452,789 6,452,790 6,453,344 6,496,361 6,549,966 6,564,274 6,643,777 6,718,415 6,725,317 7,099,981 7,146,446 2001/0011312 gin“? 1 5/2002 Hagiwaraetal. B1 B1 B1 B1 B1 B2 B1 B1 B1 B1 B1 B2 B2 A1 6/2002 7/2002 9/2002 9/2002 9/2002 12/2002 4/2003 5/2003 11/2003 4/2004 4/2004 8/2006 12/2006 8/2001 Yang etal‘ Conway et a1. Pallotti et a1. Chu et a1. Ellsworth Kimetal. Dickens et a1. Heath et a1. Chu Chu Bouchieretal. Chu Chu Chu OTHER PUBLICATIONS 12/1998 Gums i * ’ Dillon et al. Hamirani Kikinis Kikinis Kikinis Beasleyetal' Robinson Sakaue Ryan H9118 Williams Trumbull Pollmann Kikinis Boehling et 211. Dempsey et a1. AlZien Bemal, Carlos, product brochure entitled: “PoWerSMP 717/125 Vameta' """"""" " Series 4000”, (Mar. 1998) <<http://WWW/Winnetmag,com/ WindoWs/Article/Article1D/3095/3095.html, downloaded 5,907,566 A 5,933,609 A 5/1999 Benson et 31. 8/1999 Walker et a1. from Web on 1119223200432 Pgs' 5,941,965 A 5,948,047 A 5,960,213 A 8/1999 MoroZ 9/1999 Jenkins et a1. 9/1999 Wilson CETIA Brochure “CETIA PoWerengine CVME 603e” pp. 1A6 doWnloaded from the internet at. http://WWW.cetia.com/ ProductAddOns/WpA47A01.pdf on Feb. 15, 2006. gillljghztrllt'al‘ 5,977,989 A 5,978,919 A 5,982,363 A 2733i’ , 11/1999 Lee et a1‘ * 11/1999 Doietal. .................... .. 726/36 11/1999 Naiff 2 Efrem“ et 31' , Cragle, Jonathan, “Density System 1100i’, May‘ 1999) <<http://WWW.W1nnetmag.com/W1ndoWs/Art1cle/Art1cle1D/ 5199/5199~hIm1>>, downloaded from Web 011 Jun-21, 2004, 3pgs. Crystal Advertisement for “QuickConnect® Cable Manage osroWpour ” 5,999,952 A * 12/1999 Jenkins etal. ............ .. 708/100 . _ {11230111322202 Li et a1. ‘1 ' sijigc'ocno?mlg 6,002,442 A 12/1999 6,003,105 A 12/1999 Vicard et a1. 2004,4Pgs P ' ’ 6,006,243 A 6,009,488 A 12/1999 Karidis 12/1999 KaViPumPu Crystal Advertisement for “Rackmount Computers”, (@ 2000A2004) <<http://WWW.crystalpc.com/products/roserv 6,011,546 A V2000 Bertram 6,012,145 A 1/2000 6,016,252 A 6,028,643 A V2000 pignolet et a1‘ 2/2000 Jordan et a1‘ Cub1x Product Brochure ent1tled, Density System , (@ 2000) <<http://64.173.211.7/support/techmfo/system/den 6,()29,1g3 A 6,038,621 A 2/2()()() Jenkins et a1, 3/2000 Gale et a1. sity/densityl0.htm>> downloaded from Web on Jun. 22, 2004, 3 pgs. Mathers et al. ers.asp>>, doWnloaded from Web on Jun. 17, 2004, 8 pgs. . . “ . ,, US RE41,294 E Page 3 Cubix Product Brochure entitled, “Density System, Techni eBay Advertisement for “Total IT Group Network Engines”, cal Speci?cations”, (@ 2000) <<http://64.173.211.7/support/ <<http://cgi.ebay.com/we/eBayISAPI.dll?ViewItem&item= 5706388046&sspagename+STRK%3AMDBI% techinfo/system/density/info/spec.htm>> downloaded from Cubix Product Manual entitled, “Density System”, Chapter 3MEBI3AIT&rd=1>>, downloaded from web on Jun. 25, 2004, 1 pgs. 1*Introduction, (@ 2000) <<http://64.173.211.7/support/ Eversys Corp. “Eversys System 8000 Consolidated Network techinfo/manuals/density/Chapi1.htm>> downloaded from Server Market and Product Overview,” Slide Presentation, downloaded from <<http://eversys.com>>, 20 pages total. web on Jun. 22, 2004, 2 pgs. web on Jun. 22, 2004, 5 pgs. Cubix Product Manual entitled, “Density System”, Chapter 2*Installation, (@ 2000) <<http://64.173.211.7/support/ techinfo/manuals/density/Chapi2.htm>> downloaded from web on Jun. 22, 2004, 9 pgs. Cubix Product Manual entitled, “Density System”, Chapter 3*Operation, (@ 2000) <<http://64.173.211.7/support/ techinfo/manuals/density/Chapi3.htm>> downloaded from web on Jun. 22, 2004, 4 pgs. Cubix Product Manual entitled, “Density System”, Chapter 4*Maintenance and Repair, (@ 2000) <<http://64.173.211.7/ support/techinfo/manuals/density/Chapi4.htm>> down Feldman, Jonathan, “Rack Steady: The Four RackiMounted Servers That Rocked Our Networ ”, <<http://www.net workcomputing.com/shared/printArticlejhtml?article=/ 910/910r3side1.htm...>> Jun. 23, 2004, 3 pg. Fetters, Dave, “Cubix HighiDensity Server Leads the Way With Standout Management Software”, (Feb. 8, 1999) <<http://www.nwc.com/shared/printArticle.jhtml?article=/ 1003/1003r3full.html&pub=nwc>>, downloaded from web on Jun. 23, 2004, 5 pgs. Gardner, Michael and Null, Christopher, “A Server Condo loaded from web on Jun. 22, 2004, 5 pgs. minium”, Cubix, “Click on the front panel that matches your system”, 806a042a.html>>, Jun. 23, 2004, 3 pgs. Harrison, Dave, “VME in the Military: The M1A2 Main (@ 2000) <<http://64.173.211.7/support/techinfo/system/ density/density.htm>> downloaded from web on Jun. 22, 2004, 1 pg. Cubix, “DP 6200 ‘D’ Series Plugiin Computers” <<http:// 64.173.21 1.7/support/techinfo/bc/dp/6200d/intro.htm >>, downloaded from web on Jun. 22, 2004, 2 pgs. Cubix, “Installing DP or SP Series Boards”, (@ 2000) <<http ://www.lantimes.com/testing/98jun/ Battle Tank Upgrade Relies on COTS VME” <<http:// www.dy4.com>>, (Feb. 9, 1998), pp. 1434. Internet Telephone Roundup, “Industrial Computers”, <<http://www.tmcnet.com/articles/itmag/0499/0499round up.htm>>, downloaded from web on Jun. 23, 2004, 5 pgs. Microsoft Cluster Service Center, “MSCS Basics,” down <<http://64 . 1 73 .21 1 .7/support/techinfo/system/density/info/ loaded from <<http://www.nwnetworks.com/mscsbasics. pic*inst.htm">> downloaded from web on Jun. 22, 2004, 2 htm>>, Feb. 7, 2005, 4 pages total. MPL Brochure, “1st Rugged All in One Industrial P85 Cubix, “Multiplexing Video, Keyboard & Mouse with Mul tiple Density Systems”, (@ 2000) <<http://64.173.211.7/ support/techinfo/ system/density/info/vkmimux .htm>> downloaded from web on Jun. 22, 2004, 2 pgs. Cubix, “Powering On/Off or Resetting Plugiin Computers in an Density System”, (@ 2000) <<http://64.173.211.7/sup port/techinfo/system/density/info/power.htm>> downloaded 486FDX*133 MHZ PC” pp. 142, downloaded from the inter net at. http://www.mpl.ch/DOCs/ds48600.pdf on Feb. 15, 2006. MPL Brochure “IPM 486 Brochure/IPM5 User Manual” pp. 149 downloaded from the Internet at http://www.mpl.ch/ DOCs/u48600xd.pdf on Feb. 15, 2006. Cubix, “SP 5200 Series”Chapter 1*Introduction, (@ 2000) MPL, “The First Rugged AlliiniOne Industrial 486FDX*133 MHZ PC”, IPM486/IPM5 User Manual, 1998, <<http:// 64.173 .21 1 .7/ support/techinfo/manuals/ sp5200/ pp. 1452. from web on Jun. 22, 2004, 2 pgs. chap*1.htm>>, downloaded from web on Jun. 22, 2004, 3 Press Release: Hiawatha, Iowa, (Mar. 1, 1997) entitled Pg “Crystal Group Products Offer Industrial PCs with Builtiin Cubix, “SP 5200 Series”Chapter 2*Switches & Jumpers, (@ Flexibility”, 2000) leases/prodpr.asp>>, downloaded from web on May 14, 2004, 2 pgs. <<http://64.173.211.7/support/techinfo/manuals/ sp5200/chap*2.htm>>, downloaded from web on Jun. 22, 2004, 3 pgs. Cubix, “SP 5200 Series”Chapter 3*Installation, (@ 2000) <<http:// 64.173 .21 1 .7/ support/techinfo/manuals/ sp5200/ <<http://www.crystalpc.com/news/pressre Press Release: Kanata, Ontario, Canada, (Apr. 1998) entitled “Enhanced COTS SBC from DY 4 Systems features 166MHz PentiumTM Processor” <<http://www.realtime*in chap*3.htm>>, downloaded from web on Jun. 22, 2004, 4 fo.be/VPR/layout/display/pr.asp?/pr.asp?PRID=363>>, pgs. pgs. Product Brochure entitled: “SVME/DMil92 Pentium® II Cubix, “SP 5200 Series”Chapter 4*Technical Reference, (@ 2000) <<http://64.173.211.7/support/techinfo/manuals/ sp5200/chap*4.htm>>, downloaded from web on Jun. 22, 2004, 3 pgs. 2 Single Board Computer” (Jun. 1999) pp. 149. Product Brochure entitled: “System 8000”, <<http://www. bomara.com/Eversys/briefDefault.htm>>, downloaded from Cubix, “SP 5200XS Series Plugiin Computers”, (@ 2000) <<http:// 64.173 .21 1 .7/ support/techinfo/bc7/ sp5200Xs/in web on Jun. 22,2004, 4 pgs. tro.htm>>, downloaded from web on Jun. 22, 2004, 2 pgs. Product Brochure entitled: “ERS/FT II System”, (@ 2000) Cubix, “SP 5200XS Series Technical Speci?cations”, (@ <<http://64.173.21 1.7/support/techinfo/system/ersft2/ 2000) <<http://64.173.211.7/support/techinfo/bc/sp5200Xs/ ersft2.htm>>, downloaded from web on Jun. 22, 2004, 4 pgs. Product Manual entitled: “ERS II and ERS/FT II”, Chap. 3, spec.htm>>, downloaded from web on Jun. 22, 2004, 2 pg. 64 . 1 73 .21 1.7/support/techinfo/system/density/info/group System Components, <<http:// 64.173 .21 1 .7/ support/ techinfo/manuals/ers2/ers2ic3.htm>>, downloaded from s.htm>>, downloaded from web on Jun. 22, 2004, 3 pgs. web on Jun. 22, 2004, 22 pgs. Cubix, “What are Groups?”, (@ 2000) <<http:// US RE41,294 E Page 4 Product Manual entitled: “ERS H and ERS/FT ll”, Chap. 6, WindoWs Magazine, “Cubix PoWerSMP Series 4000”, Nov. Component Installation, <<http://64.173.211.7/support/ 1997, techinfo/manuals/ers2/ers2ic6.htm>>, downloaded from 1101/ntent008.htm>> doWnloaded from the Web on Jun. 22, Web on Jun. 22, 2004, 18 pgs. Synder, Joel “Better Management through consolidation’ <http://WWW.techWeb.com/Winmag/library/1997/ 2004, p. NT07. a pp. 146 doWnloaded from the internet at http:// WWW.opus 1 .COIn/WWW/jInS/nW*COI1*081 8rev.html. U.S. Appl. No. 12/322,858 ?led Feb. 5, 2009, Chu, William Williams, Dennis, “ChatCom Inc. Chatterbox”, (Feb. 17, Dirk S. Faegre et al., “CTOS Revealed”, http://WW.byte< 1997) <<http://WWW.lantimes.com/testing/97feb/ 702b066ahtml>> doWnloaded from Web on Jun. 23, 2004, 3 pgs. Williams, Dennis, “Consolidated Servers”, (Feb. 17, 1997) <<http://WWW.lantimes.com/testing/97compare/pccon sol.html>> doWnloaded from Web on Jun. 23, 2004, 2 pgs. Williams, Dennis, “Cubix Corp. ERS/FTH”, (Feb. 17, 1997) <<http://WWW.lantimes.com/testing/97feb/ 702b068b.html>> doWnloaded from Web on Jun. 23, 2004, 4 Pg5~ W.Y. com/art/9412/sec13/art2.htm. Jesse Berst’s Anchor Desk, http://WWW.Zdnet.com/an chordesk/talkback/talkbacki5 6 5 5 5 .html. Jesse Berst’s Anchor Desk, http://WWW.Zdnet.com/an chordesk/story/storyil 504.html. Kelly Spang, “Component House: Design Technology for PCs in a snap’iNeoSystmes Offers Building Blocks”, Williams, Dennis, “EVERSYS Corp. System 8000”, (Feb. Computer Reseller NeWs, Apr. 21, 1997, Issue 732, Section: Channel Assembly, http ://WWW.techWeb.com/se/ 17, directlink.cgi?CRN1 9970421 S0054. 1997) <<http://WWW.lantimes.com/testing/97feb/ 702b070b.html>> doWnloaded from Web on Jun. 22, 2004, 4 Pg5~ Williams, Dennis, “Executive Summary: Consolidate NoW”, (Feb. 17, 1997) <<http://WWW.lantimes.com/testing/97feb/ 702b064a.html>> doWnloaded from Web on Jun. 23, 2004, 2 Pg5~ Williams, Dennis, Top “Scores for Useability and Open Rick BoydiMerritt, “UngradeableiPC effort takes divergent paths”, http://techWeb.cmp.com/eet/neWs/97/949neWs.ef fort.html. “Think Modular”, PC MagaZine, Jun. 10, 1997, WysiWyg:// 60http://homeZdnet.com/pcmag/issues/1611/ pcmg0072.htm. ness”, (Feb. 17, 1997) <<http://WWW.lantimes.com/testing/ 97feb/702b070a.html>> doWnloaded from Web on Jun. 23, 2004, 2 pgs. * cited by examiner US. Patent Apr. 27, 2010 COMPUTER MODL?bE BAY Sheet 1 0f 12 US RE41,294 E MONITOR DESKTOP PERIPHERAL CON2%OLE 1° ATTACHED COMPUTER MODULE FIG.1 US. Patent Apr. 27, 2010 Sheet 2 0f 12 US RE41,294 E ACM ENCLOSURE OPENING FOR ENGAGING LOCK FIG.2 US. Patent Apr. 27, 2010 Sheet 3 0f 12 US RE41,294 E 10 W 26 FRONT 17 21 MANUAL KEY RELEASE {E033 11 1:24 / INSERTION BLOCKED \ “ 29 < 23 A ' r‘ PEFQIPHERAL mcgyuiléTsE/gr CONSOLE FRAME ENCLOSURE US. Patent Apr. 27, 2010 US RE41,294 E Sheet 4 0f 12 17 _ CMI CONNECTOR __ CMI CONNECTOR iI i I I I I I I 1I I 7I'; I Il \ POWER REGULATOR MAIN CIRCUIT I-__ /BOARD 431 \1 432 I [1] COMPONENT UNDERNEATH I ' I I CONNECTION T0 i /LOCK CONTROL i L 'IDECON. ]—---~__.__. 2427 FIG.4 SECURITY LOCK 15 US. Patent Apr. 27, 2010 Sheet 5 0f 12 US RE41,294 E //500 501 ATTACHED COMPUTER MODULE J I 523 PRIMARY HARD DISK wI SECURITY PROGRAM MAIN 502-1- MEMORY 525 e CPU — (I ‘ E L~ I] BUS 537 a EQFDQTGPE CPU ‘ _ HDD CONTROLLER 53‘ ' “0&5? GRAPHICS SUBSYSTEM ‘r SEFOJCRRTY 519 WITUSBEIQSSI _ PASSWORD @I _L ' A = ) l FLASH MEM ‘@505 CONTROL 1533 = 543w 515 N503 Y "L541 526 521 BUS ‘ 529O~ MEéIAgRY 2 527 DRIVE HOST '———'“‘-51° INTERFACE \\ CONTROLLER 535 \\ 511 LOCK CONTROL 3 v i 509 5” VIDEO 507 513 I INTERFACE CONNECTORS US. Patent Apr. 27, 2010 Sheet 6 0f 12 US RE41,294 E f/ 500 ATTACHED COMPUTER MODULE PROGRAM x 501 DRIVE , A BUS = HDD CONTROLLER r‘C503 q. FLASH MEM 533 H 0355"‘ wLTLLJTSEggs & V505 PASSWORD 507 l - ~ [J HOST INTERFACE CONTROLLER LOCK ONIOFF LOCK STATUS SOLENO") DRLVER SECURITY | T LOCK CONTROL BIT \ 551 J--\---' ( f 557 553 LOCK STATUS SIGNAL GND 559 FIG.5A BIT \ L 549 509 551 Mcc US. Patent Apr. 27, 2010 Sheet 7 0f 12 ACM INSERTED INTO CMB 600 US RE41,294 E ACM OUTSIDE OF CMB )A/ SECURITY 701 USE KEY PROGRAM “\- 603 6 / TO PREVENT ILLEGAL USE ( POWER UP h. 601 700 TO TURN ""1- 703 LOCK ON 014 605 NO _\- 705 7 LOCK STAYS OFF 2609 INTO CMB YES 606 SOFTWARE TURNS LOCK 0N I 607 T USE KEY TO TURN LOCK OFF E 61% OS TURNS POWER ‘366%; FAILURE Y @611 ACM CAN INSERT \ e17 UEEL'EEAYSTEO ' LOCK LOCK STAYS ON 622 621 ‘\ NO ‘7 STLAQWON 1S 62‘ ‘I ACM CAN BE REMOVED 627 —\_ s15 CMB 1 709 FIG.7 US. Patent Apr. 27, 2010 Sheet 9 0f 12 + PCK + —— Driver --—- Driver _.____. Omar Receiver Receiver + PD1 US RE41,294 E PCK u PDQ ~_- P01 + Receiver + + _____ Driver + +Receiver _-_-— Driver Receiver pCN __.‘ Driver H PCN FIG. ‘I US. Patent Apr. 27, 2010 Sheet 10 0f 12 US RE41,294 E Primary PCI Bus PCI Clock Asynchronous T 1 PCI Bus l0 Control Hostrf Controller 'me ace Controller XPBus pLL Controller ' Clock A A XPBus _\ _ ~_ _ ‘v ' ~‘l pCK PD[3::0]: \ é PCKR : PDRBUO] RSTEPti : l I l RSTEH” Peripheral # lnlerfa ce YY Asynchronous Controller XPBUS Controller 1 PLL Clock n’ PCI Bus |(_) Controller Comm' + PCI Clock + {v 1 PCI Secondary PCl Bus Device FIG. l'O US. Patent xOm Apr. 27, 2010 01 Sheet 12 0f 12 P01 mom US RE41,294 E mam WWW N_.OE yoI u 01 wDl Q NilQ US RE41,294 E 1 2 PASSWORD PROTECTED MODULAR COMPUTER METHOD AND DEVICE a typewriter format. The keyboard also has the length and width for easily inputting information by way of keys to the computer. The mouse also has a su?icient siZe and shape to Matter enclosed in heavy brackets [ ] appears in the original patent but forms no part of this reissue speci?ca another location. tion; matter printed in italics indicates the additions made by reissue. Other types of computing devices include portable com puting devices such as “laptop” computers and the like. easily move a curser on the display from one location to Although somewhat successful, laptop computers have CROSS REFERENCE TO RELATED APPLICATIONS many limitations. These computing devices have poor dis play technology. In fact, these devices often have a smaller [The following two commonly-owned copending ?at panel display that has poor viewing characteristics. Additionally, these devices also have poor input devices such as smaller keyboards and the like. Furthermore, these applications, including this one, are being ?led concurrently and the other one is hereby incorporated by reference in their entirety for all purposes:] [1. US. patent application Ser. No. 09/183,816, William devices have limited common platforms to transfer informa tion to and from these devices and other devices such as PCs. Up to now, there has been little common ground between W. Y. Chu, entitled, “Modular Computer Security Method and Device”. and] [2. US. patent application Ser. No. 09/183,493, William W. Y. Chu, entitled, “Password Protected Modular Computer Method and Device”.] these platforms including the PCs and laptops in terms of upgrading, ease-of-use, cost, performance, and the like. Many differences between these platforms, probably some 20 for the reissue of US. Pat. No. 6,321,335. The reissue appli cations are application Ser. No. 10/963,825 ?led Oct. 12, 2004, application Ser. No. 11/474,256?led Jun. 23, 2006 (the present application), application Ser. No. 11/517,601 ?led Sep. 6, 2006, and application Ser. No. 12/322, 858?led top and laptop to have “total” computing power, where the desktop serves as a “regular” computer and the laptop serves 25 Feb. 5, 2009, the present application being a continuation reissue ofU.S. Pat. No. 6,321,335. BACKGROUND OF THE INVENTION 30 The present invention relates to computing devices. More particularly, the present invention provides a method and device for securing a personal computer or set-top box using password protection techniques. Merely by way of example, the present invention is applied to a modular computing environment for desk top computers, but it will be recog niZed that the invention has a much wider range of applica as a “portable” computer. Purchasing both computers is often costly and runs “thousands” of dollars. The user also wastes a signi?cant amount of time transferring software and data between the two types of computers. For example, the user must often couple the portable computer to a local area network (i.e., LAN), to a serial port with a modem and then manually transfer over ?les and data between the desk top and the portable computer. Alternatively, the user often must use ?oppy disks to “Zip” up ?les and programs that 35 bility. It can be applied to a server as well as other portable or modular computing applications. what intentional, has bene?ted computer manufacturers at the cost of consumers. A drawback to having two separate computers is that the user must often purchase both the desk Notice: More than one reissue application has been ?led 40 Many desktop or personal computers, which are com monly termed PCs, have been around and used for over ten years. The PCs often come with state-of-art microprocessors exceed the storage capacity of conventional ?oppy disks, and transfer the ?oppy disk data manually. Another drawback with the current model of separate por table and desktop computer is that the user has to spend money to buy components and peripherals the are duplicated in at least one of these computers. For example, both the desktop and portable computers typically include hard disk drives, ?oppy drives, CD-ROMs, computer memory, host processors, graphics, accelerators, and the like. Because pro gram software and supporting programs generally must be such as the Intel PentiumTM microprocessor chips. They also include a hard or ?xed disk drive such as memory in the 45 installed upon both hard drives in order for the user to oper giga-bit range. Additionally, the PCs often include a random access memory integrated circuit device such as a dynamic random access memory device, which is commonly termed DRAM. The DRAM devices now provide up to millions of memory cells (i.e., mega-bit) on a single slice of silicon. PCs also include a high resolution display such as cathode ray 50 tubes or CRTs. In most cases, the CRTs are at least 15 inches rate monitor, keyboard, mouse, and the like and is generally incompatible with other desktop PCs. The docking station is or 17 inches or 20 inches in diameter. High resolution ?at panel displays are also used with PCs. Many external or peripheral devices can be used with the PCs. Among others, these peripherals devices include mass storage devices such as a ZipTM Drive product sold by ate programs on the road and in the o?ice, hard disk space is often wasted. One approach to reduce some of these drawbacks has been the use of a docking station with a portable computer. Here, the user has the portable computer for “on the road” use and a docking station that houses the portable computer for of?ce use. The docking station typically includes a sepa 55 also generally not compatible with portable computers of other vendors. Another drawback to this approach is that the portable computer typically has lower performance and functionality than a conventional desktop PC. For example, the processor of the portable is typically much slower than processors in dedicated desktop computers, because of Iomega Corporation of Utah. Other storage devices include external hard drives, tape drives, and other. Additional devices include communication devices such as a modem, 60 power consumption and heat dissipation concerns. As an which can be used to link the PC to a wide area network of computers such as the Internet. Furthermore, the PC can include output devices such as a printer and other output means. Moreover, the PC can include special audio output devices such as speakers the like. PCs also have easy to use keyboards, mouse input devices, and the like. The keyboard is generally con?gured similar to example, it is noted that at the time of drafting of the present application, some top-of-the-line desktops include 400 MHZ processors, whereas top-of-the-line notebook computers 65 include 266 MHZ processors. Another drawback to the docking station approach is that the typical cost of portable computers with docking stations US RE41,294 E 3 4 can approach the cost of having a separate portable computer and a separate desktop computer. Further, as noted above, because different vendors of portable computers have pro present invention is also implemented using conventional technologies that can be provided in the present computer prietary docking stations, computer users are held captive by their investments and must rely upon the particular computer vendor for future upgrades, support, and the like. embodiment, one or more of these bene?ts can be available. system in an easy and e?icient manner. Depending upon the These and other advantages or bene?ts are described throughout the present speci?cation and are described more particularly beloW. Thus What is needed are computer systems that provide reduced user investment in redundant computer components and provide a variable level of performance based upon Well as its advantages and features, are described in more computer con?guration. detail in conjunction With the text beloW and attached FIGS. These and other embodiments of the present invention, as SUMMARY OF THE INVENTION BRIEF DESCRIPTION OF THE DRAWINGS According to the present invention, a technique including FIG. 1 is a simpli?ed diagram of a computer system according to an embodiment of the present invention; FIG. 2 is a simpli?ed diagram of a computer module according to an embodiment of the present invention; FIG. 3 is a simpli?ed side-vieW diagram of a computer module according to an embodiment of the present inven a method and device for securing a computer module using a passWord in a computer system is provided. In an exemplary embodiment, the present invention provides a security sys tem for an attached computer module (“ACM”). In an embodiment, the ACM inserts into a Computer Module Bay (CMB) Within a peripheral console to form a functional computer. 20 FIG. 4 is a simpli?ed layout diagram of a security system In a speci?c embodiment, the present invention provides a computer module. The computer module has an enclosure for a computer system according to an embodiment of the present invention; that is insertable into a console. The module also has a cen tral processing unit (i.e., integrated circuit chip) in the enclo FIG. 5 is a simpli?ed block diagram of a security system 25 sure. The module has a hard disk drive in the enclosure, for a computer module according to an embodiment of the present invention; and FIGS. 6 and 7 shoW simpli?ed ?oW diagrams of security Where the hard disk drive is coupled to the central processing unit. The module further has a programmable memory device in the enclosure, Where the programmable memory device can be con?gurable to store a passWord for prevent ing a possibility of unauthorized use of the hard disk drive tion; 30 methods according to embodiments of the present invention. FIG. 8 is a detailed block diagram ofone embodiment of and/or other module elements. The stored passWord can be the host interface controller (HIC) of the present invention. FIG. 9 is a schematic diagram ofthe signal lines PCK, any suitable key strokes that a user can change from time to time. In a further embodiment, the present invention pro PDO to PD3, and PCN. vides a permanent passWord or user identi?cation code 35 stored in ?ash memory, Which also can be in the processing unit, or other integrated circuit element. The permanent passWord or user identi?cation code is designed to provide a permanent “?nger print” on the attached computer module. In a speci?c embodiment, the present invention provides a variety of methods. In one embodiment, the present inven tion provides a method for operating a computer system such 40 I. System HardWare includes inserting an attached computer module (“ACM”) 45 microprocessor unit (e.g., microcontroller, microprocessor) coupled to a mass memory storage device (e.g., hard disk). The method also includes applying poWer to the computer system and the ACM to execute a security program, Which is stored in the mass memory storage device. The method also and PDO to PD3. DESCRIPTION OF SPECIFIC EMBODIMENTS as a modular computer system and others. The method into a bay of a modular computer system. The ACM has a FIG. I0 is a block diagram ofanother embodiment ofthe HIC and PIC ofthepresent invention and the interface ther ebetween. FIG. I] is a detailed block diagram ofanother embodi ment ofthe HIC ofthe present invention. FIG. I2 is a schematic diagram ofthe signal lines PCK FIG. 1 is a simpli?ed diagram of a computer system 1 according to an embodiment of the present invention. This diagram is merely an illustration and should not limit the scope of the claims herein. One of ordinary skill in the art Would recognize other variations, modi?cations, and altema tives. The computer system 1 includes an attached computer 50 includes prompting for a user passWord from a user on a module (i.e., ACM) 10, a desktop console 20, among other elements. The computer system is modular and has a variety display (e.g., ?at panel, CRT). In a further embodiment, the of components that are removable. Some of these compo present method includes a step of reading a permanent pass nents (or modules) can be used in different computers, Word or user identi?cation code stored in ?ash memory, or other integrated circuit element. The permanent passWord or user identi?cation code provides a permanent ?nger print on the attached computer module. The present invention includes a variety of these methods that can be implemented in computer codes, for example, as Well as hardWare. Numerous bene?ts are achieved using the present inven Workstations, computerized television sets, and portable or 55 laptop units. In the present embodiment, ACM 10 includes computer components, as Will be described beloW, including a central processing unit (“CPU”), IDE controller, hard disk drive, 60 computer memory, and the like. The computer module bay (i.e., CMB) 40 is an opening or slot in the desktop console. tion over previously existing techniques. The present inven tion provides mechanical and electrical security systems to The CMB houses the ACM and provides communication to and from the ACM. The CMB also provides mechanical pro prevent theft or unauthorized use of the computer system in tection and support to ACM 10. The CMB has a mechanical a speci?c embodiment. Additionally, the present invention substantially prevents accidental removal of the ACM from the console. In some embodiments, the present invention prevents illegal or unauthorized use during transit. The 65 alignment mechanism for mating a portion of the ACM to the console. The CMB further has thermal heat dissipation sinks, electrical connection mechanisms, and the like. Some details of the ACM can be found in co-pending patent appli US RE41,294 E 6 5 cation Nos. 09/149,882 and 09/149,548 ?led Sep. 8, 1998, 1) A CPU With cache memory; 2) Core logic device or means; commonly assigned, and hereby incorporated by reference for all purposes. In a preferred embodiment, the present system has a secu rity system, Which includes a mechanical locking system, an 5 electrical locking system, and others. The mechanical lock ing system includes at least a key 11. The key 11 mates With key hole 13 in a lock, Which provides a mechanical latch 15 in a closed position. The mechanical latch, in the closed position, mates and interlocks the ACM to the computer module bay. The mechanical latch, Which also has an open position, alloWs the ACM to be removed from the computer module bay. Further details of the mechanical locking sys tem are shoWn in the Fig. beloW. FIG. 2 is a simpli?ed diagram of a computer module 10 according to an embodiment of the present invention. This diagram is merely an illustration and should not limit the scope of the claims herein. One of ordinary skill in the art user passWord; 6) Operating System, application softWare, data ?les on primary HDD; 7) An interface device and connectors to peripheral con sole; 8) A softWare controllable mechanical lock, lock control 5 means, and other accessories. The ACM connects to a peripheral console With poWer supply, a display device, an input device, and other elements. Some details of these elements With the present security sys tem are described in more detail beloW. FIG. 4 is a simpli?ed layout diagram of a security system Would recogniZe other variations, modi?cations, and alterna tives. Some of the reference numerals are similar to the pre 3) Main memory; 4) A single primary Hard Disk Drive (“HDD”) that has a security program; 5) Flash memory With system BIOS and programmable 20 for a computer system according to an embodiment of the vious Fig. for easy reading. The computer module 10 includes key 11, Which is insertable into keyhole 13 of the present invention. This diagram is merely an illustration and lock. The lock has at least tWo position, including a latched or closed position and an unlatched or open position. The latched position secures the ACM to the computer module bay. The unlatched or open position alloWs the ACM to be inserted into or removed from the computer bay module. As shoWn, the ACM also has a slot or opening 14, Which alloWs nary skill in the art Would recogniZe other variations, should not limit the scope of the claims herein. One of ordi modi?cations, and alternatives. The layout diagram illus 25 components (e.g., Host Interface Controller) are depicted in dashed lines. The layout diagram has a ?rst portion, Which includes a central processing unit (“CPU”) module 400, and the latch to move into and out of the ACM. The ACM also has openings 17 in the backside for an electrical and/or mechanical connection to the computer module bay, Which is connected to the console. FIG. 3 is a simpli?ed side-vieW diagram of a computer module according to an embodiment of the present inven tion. This diagram is merely an illustration and should not limit the scope of the claims herein. One of ordinary skill in trates the top-vieW of the module 10, Where the backside 30 a second portion, Which includes a hard drive module 420. A common printed circuit board 437 houses these modules and the like. Among other features, the ACM includes the central processing unit module 400 With a cache memory 405, Which is coupled to a north bridge unit 421, and a host inter 35 face controller 401. The host interface controller includes a lock control 403. As shoWn, the CPU module is disposed on a ?rst portion of the attached computer module, and couples the art Would recogniZe other variations, modi?cations, and to connectors 17. Here, the CPU module is spatially located alternatives. Some of the reference numerals are similar to near connector 17. the previous FIG. for easy reading. As shoWn, the ACM module inserts into the computer module bay frame 19, The CPU module can use a suitable microprocessing unit, 40 Which is in the console. A side 27 and a bottom 19 ofACM slide and ?t ?rmly into the computer module bay frame, microcontroller, digital signal processor, and the like. In a speci?c embodiment, the CPU module uses, for example, a 400 MHZ Pentium II microprocessor module from Intel Cor Which has at least a bottom portion 19 and back portion 26. A backside 23 of the ACM faces backside 26 of the frame. poration and like microprocessors from AMD Corporation, ACM also has a front-side or face 25 that houses the lock and exposes the keyhole 13 to a user. The key 11 is insertable Corporation), and others. In other aspects, the microproces from the face into the keyhole. As the ACM inserts into the frame, connector 17 couples and inserts into connector 21. Connector 17 electrically and mechanically interface elements of the ACM to the console through connector 21. Latch 14 should be moved aWay from the bottom side 19 of the module bay frame before inserting the ACM into the frame. Once the ACM is inserted fully into the frame, latch 15 is placed in a closed or lock position, Where it keeps the ACM ?rmly in place. That is, latch 15 biases against a backside portion 29 of the ACM enclosure to hold the ACM in place, Where the connector 17 ?rmly engages, electrically and mechanically, With connector 21. Alpha Chip, Apple Computer Corporation PoWerPC G3 To remove the ACM, latch 15 is moved aWay or opened from the back side portion of the ACM enclosure. ACM is manu Cyrix Corporation (noW National Semiconductor sor can be one such as the Compaq Computer Corporation 50 processor, and the like. Further, higher speed processors are contemplated in other embodiments as technology increases in the future. In the CPU module, host interface controller 401 is coupled to BIOS/?ash memory 405. Additionally, the host interface controller is coupled to a clock control logic, a con?guration signal, and a peripheral bus. The present 55 invention has a host interface controller that has lock control 403 to provide security features to the present ACM. Furthermore, the present invention uses a ?ash memory that includes codes to provide passWord protection or other elec 60 tronic security methods. The second portion of the attached computer module has ally pulled out of the computer module bay frame, Where the hard drive module 420. Among other elements, the hard connector 17 disengages With connector 21. As shoWn, the key 11 is used to selectively move the latch in the open or locked position to secure the ACM into the frame module. drive module includes north bridge 421, graphics accelerator In most embodiments, the ACM includes an enclosure such as the one described With the folloWing components, Which should not be limiting: 65 423, graphics memory 425, a poWer controller 427, an IDE controller 429, and other components. Adjacent to and in parallel alignment With the hard drive module is a personal computer interface (“PCI”) bus 431, 432. A poWer regulator 435 is disposed near the PCI bus. US RE41,294 E 7 8 In a speci?c embodiment, north bridge unit 421 often couples to a computer memory, to the graphics accelerator 423, to the IDE controller, and to the host interface controller via the PCI bus. Graphics accelerator 423 typically couples memory device or devices such as dynamic random access memory (“DRAM”) integrated circuits and others. The DRAM includes at least 32 Meg. or 64 Meg. and greater of memory, but can also be less depending upon the applica tion. Alternatively, the main memory can be coupled directly With the CPU in some embodiments. The north bridge also couples to a graphics subsystem 515 via bus 542. The graph ics subsystem can include a graphics accelerator, graphics memory, and other devices. Graphics subsystem transmits a video signal to an interface connector, Which couples to a to a graphics memory 423, and other elements. IDE control ler 429 generally supports and provides timing signals nec essary for the IDE bus. In the present embodiment, the IDE controller is embodied as a 643U2 PCI-to IDE chip from CMD Technology, for example. Other types of buses than IDE are contemplated, for example EIDE, SCSI, 1394, and the like in alternative embodiments of the present invention. The hard drive module or mass storage unit 420 typically display, for example. includes a computer operating system, application software program ?les, data ?les, and the like. In a speci?c embodiment, the computer operating system may be the WindoWs98 operating system from Microsoft Corporation hard disk drive that serves as a main memory unit for pro of Redmond Wash. Other operating systems, such as WindoWsNT, MacOS8, Unix, and the like are also contem plated in alternative embodiments of the present invention. Further, some typical application softWare programs can The attached computer module also includes a primary grams and the like. The hard disk can be any suitable drive that has at least 2 GB and greater. As merely an example, the hard disk is a Marathon 2250 (2.25 GB, 2 1/2 inch drive) product made by Seagate Corporation of Scotts Valley, but can be others. The hard disk communicates to the north 20 include O?ice98 by Microsoft Corporation, Core1 Perfect Suite by Corel, and others. Hard disk module 420 includes a hard disk drive. The hard disk drive, hoWever, can also be replaced by removable hard disk drives, read/Write CD ROMs, ?ash memory, ?oppy disk drives, and the like. A small form factor, for example 2.5", is currently contemplated, hoWever, other form factors, such as PC card, and the like are also contemplated. Mass storage unit 240 may also support other interfaces than IDE. Among other features, the computer system includes an ACM With secu rity protection. The ACM connects to the console, Which has 25 device 505 With a BIOS. The ?ash memory device 505 also has codes for a user passWord that can be stored in the device. The ?ash memory device generally permits the stor 30 at least the following elements, Which should not be limiting. 1) Connection to input devices, e. g. keyboard or mouse; 2) Connection to display devices, eg Monitor; 3) Add-on means, eg PCI add-on slots; 35 4) Removable storage media subsystem, e.g. Floppy drive, CDROM drive; 5) Communication device. eg LAN or modern; 6) An interface device and connectors to ACM; 7) A computer module bay With a notch in the frame for ACM’s lock; and 40 507 communications to the north bridge via bus 535 and host PCI bus. The host interface controller also has a lock control 509, Which couples to a lock. The lock is attached to the controller 507 communicates to the console using bus 511, Which couples to connection 513. In one aspect of the present invention the security system uses a combination of electrical and mechanical locking mechanisms. Referring to FIG. 5A, for example, the present 45 module bay provides mechanical support and protection to ACM. The module bay also includes, among other elements, a variety of thermal components for heat dissipation, a frame the provides connector alignment, and a lock engagement, Which secures the ACM to the console. The bay also has a printed circuit board to mount and mate the connector from the ACM to the console. The connector provides an interface betWeen the ACM and other accessories. FIG. 5 is a simpli?ed block diagram 500 of a security system for a computer module according to an embodiment age of such passWord Without a substantial use of poWer, even When disconnected. As merely an example, the ?ash memory device has at least 4 Meg. or greater of memory, or 16 Meg. or greater of memory. A host interface controller module and has a manual override to the lock on the host interface controller in some embodiments. Host interface 8) PoWer supply and other accessories. As noted, the computer module bay is an opening in a peripheral console that receives the ACM. The computer bridge by Way of a hard disk drive controller and bus lines 502 and 531. The hard disk drive controller couples to the north bridge by Way of the host PCI bus, Which connects bus 537 to the north bridge. The hard disk includes computer codes that implement a security program according to the present invention. Details of the security program are pro vided beloW. The attached computer module also has a ?ash memory 50 55 of the present invention. This diagram is merely an illustra system provides a lock status mechanism in the host inter face controller 509. The lock status of the lock is determined by checking a lock status bit 549, Which is in the host inter face controller. The lock status bit is determined by a signal 553, Which is dependent upon the position of the lock. Here, the position of the lock is closed in the ground 559 position, Where the latch couples to a ground plane in the module and/or system. Alternatively, the signal of the lock is at Vcc, for example, Which is open. Alternatively, the signal can be ground in the open position and Vcc in the closed position, depending upon the application. Other signal schemes can also be used depending upon the application. Once the status is determined, the host interface controller tion and should not limit the scope of the claims herein. One turns the lock via solenoid 557 in a lock on or lock off of ordinary skill in the art Would recogniZe other variations, position, Which is provided through the control bit 551, for example. The control bit is in a register of the host interface modi?cations, and alternatives. The block diagram 500 has a variety of features such as those noted above, as Well as 60 others. In the present diagram, different reference numerals are used to shoW the operation of the present system. The block diagram is an attached computer module 500. The module 500 has a central processing unit, Which com municates to a north bridge 541, by Way of a CPU bus 527. The north bridge couples to main memory 523 via memory bus 529. The main memory can be any suitable high speed controller in the present example. By Way of the signal schemes noted and the control bit, it is possible to place the lock in the lock or unlock position in an electronic manner. Once the status of the lock is determined, the host interface controller can either lock or unlock the latch on the module 65 using a variety of prompts, for example. In a preferred embodiment, the present invention uses a passWord protection scheme to electronically prevent unau