US20030182527A1 - Write Protection State Change Initiation Sequence - Google Patents
Write Protection State Change Initiation Sequence Download PDFInfo
- Publication number
- US20030182527A1 US20030182527A1 US10/248,424 US24842403A US2003182527A1 US 20030182527 A1 US20030182527 A1 US 20030182527A1 US 24842403 A US24842403 A US 24842403A US 2003182527 A1 US2003182527 A1 US 2003182527A1
- Authority
- US
- United States
- Prior art keywords
- computer
- status
- user
- state
- change
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/10—Program control for peripheral devices
- G06F13/102—Program control for peripheral devices where the programme performs an interfacing function, e.g. device driver
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/207—Surveillance aspects at ATMs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1417—Boot up procedures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Definitions
- Such operations include, for example, operations that are potentially damaging or result in irreversible changes to the computer, such as a low-level disk formatting of the computer's hard drive; restoring the computer to a previous, known state; reinstallation of the operating system of the computer; or performing emergency repair operations on the computer. Additional operations, for example, are set forth and discussed in the “Exemplary Commercial Utilizations” section below and in the incorporated international application.
- User confirmation is determined by: (1) communicating by the computer a warning to the user through a user-output device associated with the computer; and (2) in response thereto, communicating by the user a signal to the computer through a traditional user-input device associated with the computer.
- a user-output device includes, for example, a video display monitor, a light, or a speaker and the like.
- a traditional user-input device includes, for example, a keyboard, a touch screen, a mouse, or a microphone and the like.
- a user's intention to perform an operation cannot be confirmed beforehand and, thus, the operation is unprotected from accidental performance.
- a user's intention to perform an operation cannot be confirmed when there are no traditional user-input and/or user-output devices.
- a user's intention to perform an operation also cannot be confirmed when user-input and/or user-output devices associated with a computer malfunction or otherwise are disabled.
- a user's intention to perform an operation also cannot be confirmed when the operation itself must be successfully performed on the computer before the associated user-input and/or user-output devices may even be initialized.
- a “headless server” is a computer that has neither monitor, keyboard, nor mouse and that functions as a server in a computer network. Headless servers are found in common computer networks.
- a bootstrap program is a program that automatically executes upon starting (or “booting”) of a computer.
- the headless server When an operation is to be performed on a headless server using a bootstrap program, the headless server is booted from auto-running bootstrap media, such as a floppy disk or ZIP disk having the bootstrap program, by placing the floppy disk or ZIP disk in a drive of the headless server and rebooting the server.
- auto-running bootstrap media such as a floppy disk or ZIP disk having the bootstrap program
- a headless server can be initialized with a base operating system (“O/S”) or otherwise restored to an operational condition.
- O/S base operating system
- the server then can be configured, for example, by way of a network connected terminal.
- the headless server then might run unattended for months or years.
- the bootstrap media is inadvertently left in the drive of the headless server (which frequently happens)
- the operation performed by the auto-running bootstrap program on the headless server automatically restarts contrary to the actual intention of the user.
- Such an accidental restarting of the bootstrap program (which does not seek to confirm a user's intention to perform again the operation) often indicates deletion of or damage to data and security information on the headless server.
- a solution to the “forgotten media” problem is to require a reboot after execution of the operation in order for the headless server to resume normal operations. Leaving the bootstrap media in the drive then will place the computer in an endless loop of repeatedly rebooting and running the protected program until the bootstrap media is removed or otherwise disabled. While certainly not as costly as destroying months or years of data, the requirement of a reboot nonetheless proves wasteful and frustrating when the bootstrap media is inadvertently left in the drive.
- the field of the present invention generally relates to performance of operations and, in particular, to a system and method for initiating an operation after a user's intention to perform such operation is confirmed.
- the present invention guards against a computer operation being inadvertently performed.
- the present invention broadly relates to a system and method in which a user's intention to perform an operation is confirmed.
- a user's intention is confirmed by determining a change in state of write protection (WP) status.
- Detection of the state change represents confirmation of the user's intention to perform the operation and forms part of the initiation sequence for the protected operation.
- the WP state change includes: (1) a change from “enabled” to “disabled,” as well as (2) a change from “disabled” to “enabled.”
- “enabled” means writable or rewritable and “disabled” means read only.
- the WP state change preferably is accomplished by a physical act of a user. Accordingly, the WP state change tends to indicate: (1) that a user is present, and (2) that the protected computer operation is specifically intended by the user to be initiated.
- the WP state change pertains to a physical, computer-readable medium such as, for example, a floppy disk, a ZIP disk, a USB storage device, a hard disk drive, or the like.
- the WP state change pertains to a logical container having the capability of being write protected as well as being unprotected from writes.
- a logical container includes, for example, a file, a folder, a name space, a logical drive, a virtual device, or the like.
- a method in accordance with the present invention for protecting against an unintentional operation being performed includes the step of initiating the operation only after a user's intention to perform the operation is confirmed.
- the user's intention to perform the operation is confirmed by: (i) initially checking a WP status of a computer-readable medium or logical container within a computer configuration; (ii) subsequently checking the WP status of the computer-readable medium or logical container within the computer configuration; and (iii) based on the initial and subsequent checks, determining whether there has been a state change in the WP status.
- the check preferably includes reading an attribute of the computer-readable medium or the logical container that is maintained within the computer configuration.
- the check of the computer-readable medium or the logical container preferably includes writing to the computer-readable medium or to the logical container. If the write is successful, then the WP status is determined to be enabled. If the write is unsuccessful, then the WP status is determined to be disabled. Upon a detection of the change in the write protection status, the user's intention is deemed confirmed. In a feature of the method, the user's intention is confirmed without requiring use of a user-input device.
- the subsequent check of the WP status preferably occurs after a predetermined period of time. Additionally, the check preferably is made for a predetermined number or times, or for a predetermined period of time, before the method times out and results in the subsequent termination of the initiation sequence without performance of the operation. Following termination of the initiation sequence, the initiation sequence preferably must begin again in order to perform the protected operation. Thus, the initiation sequence preferably is a prerequisite to performing the operation.
- An apparatus in accordance with the present invention includes a computer-readable medium having computer-executable instructions for performing the steps of the preferred method described above.
- this computer-readable medium is a bootstrap medium and the computer-executable instructions are part of a bootstrap program or are part of a program that is run by the bootstrap program during boot up.
- the operation that is protected by the initiation sequence is a restore operation from a backup medium onto a headless server.
- Another apparatus in accordance with the present invention includes a computer configuration including a computer-readable medium having computer-executable instructions for performing the preferred method described above.
- FIG. 1 illustrates a first preferred embodiment of a digital computer configuration of the invention
- FIG. 2 illustrates a second preferred embodiment of a digital computer configuration of the invention
- FIG. 3 illustrates a third preferred embodiment of a digital computer configuration of the invention.
- FIG. 4 illustrates a flow diagram of steps of a preferred embodiment of a method of the invention.
- the computer configuration 100 includes a digital computer 102 illustrated as a laptop computer and hardware 104 comprising a ZIP drive that can read from and write to Zip disks.
- Removable storage medium 106 is illustrated as a Zip disk. The disk is insertable into the drive of the computer configuration 100 for reading thereof and writing thereto by the computer 102 .
- the computer configuration 100 includes computer-readable media having computer-executable instructions for performing the preferred method of the present invention described in detail below.
- FIG. 2 A second preferred computer configuration 200 is shown in FIG. 2 in accordance with the present invention. Similar to the computer configuration 100 of FIG. 1, the computer configuration 200 of FIG. 2 includes a digital computer 202 having hardware 204 in which a removable storage medium 206 is insertable for reading therefrom and writing thereto by the computer 202 . Unlike the computer configuration 100 of FIG. 1, the computer 202 is illustrated as a headless server, as the computer configuration 200 includes no user-input or output devices; the hardware 204 comprises a floppy drive; and the removable storage medium 208 comprises a floppy disk.
- the computer configuration 200 includes computer-readable media having computer-executable instructions for performing the preferred method of the present invention described in detail below.
- a third preferred computer configuration 300 is shown in FIG. 3 in accordance with the present invention and includes a computer network 312 .
- the computer configuration 200 of FIG. 2 forms part of the computer configuration 300 illustrated FIG. 3, as the computer configuration 200 represents a node 310 of the computer network 312 .
- the computer configuration 200 includes the digital computer 202 and hardware 204 in which removable storage medium 306 is insertable for reading thereof and writing thereto by the computer 202 .
- the computer network 312 also includes a network attached device (NAD) 318 with network attached storage (NAS) 316 .
- the NAS 316 includes therein a logical container comprising a file titled “confirm.txt” and, in turn, this file is located within another logical container comprising a folder.
- the folder is titled “Restore” and, in turn, the folder is located within another logical container comprising a logical drive or volume titled “T” (also referred to as the “T drive”).
- the file “confirm.txt” preferably includes an attribute that is recorded within the computer configuration that identifies a WP status of the file. This attribute typically is part of the metadata associated with the file.
- the folder includes an attribute that is recorded within the computer configuration that identifies a WP status of the files contained within the folder
- the T drive includes an attribute that is recorded within the computer configuration that identifies a WP status of all of the folders and/or of all of the files contained within the T drive.
- the computer configuration 300 includes computer-readable media having computer-executable instructions for performing the preferred method of the present invention described in detail below.
- the preferred method 400 begins at Step 402 when a protected operation is to be performed.
- Step 404 a WP status is determined.
- the WP status of the disk 106 is determined; with regard to the preferred computer configuration 200 of FIG. 2, the WP status of the disk 206 is determined; and with regard to the preferred computer configuration 300 of FIG. 3, the WP status of either the disk 306 or of one of the logical structures of the NAS 316 is determined.
- the WP status is determined by reading an attribute of the computer-readable medium or of the logical structure that indicates the WP status.
- the WP status is determined by attempting to write to the computer-readable medium or to the logical structure. If the write is successful, then the WP status is determined to be enabled. Thus, for instance, the WP status of the file “confirm.txt” on the T drive of the NAS 316 may be determined by writing to the file.
- the method determines again (Step 412 ) the WP status. If the WP status is changed based on a comparison of the initial and subsequent checks, i.e., if the WP status is now “enabled,” then the method initiates the operation at Step 418 , and the method then ends at Step 420 .
- Step 412 if the WP status is determined to be “disabled” at Step 412 , i.e., if the WP status is determined not to have changed based on a comparison of the initial and subsequent checks, then the method ends at Step 420 without the operation being initiated.
- Step 416 the WP status is “enabled” as initially determined in Step 404 . If the WP status is “enabled” as initially determined in Step 404 , then the method determines again (Step 416 ) the WP status. If the WP status is changed based on a comparison of the initial and subsequent checks, i.e., if the WP status is now “disabled,” then the method initiates the operation at Step 418 , and the method then ends at Step 420 .
- Step 416 if the WP status is determined to be “enabled” at Step 416 , i.e., if the WP status is determined not to have changed based on a comparison of the initial and subsequent checks, then the method ends at Step 420 without the operation being initiated.
- a sufficient period preferably is provided before the respective subsequent checks at Steps 412 and 416 .
- Step 404 the method waits (Step 406 ) for some period of time, and if the WP status is determined to be “enabled” at Step 404 , then the method waits (Step 408 ) for some period of time. Thereafter, a subsequent check respectively is made at Step 412 and Step 416 . Furthermore, the method continues to check the WP status until either the WP status is determined to have changed or the method times out. The method times out at Steps 410 , 414 after a predetermined period of time or after a predetermined number of subsequent checks of the WP status have been made. If the method times out at Step 410 or Step 414 , then the method ends at Step 420 without the operation being initiated.
- the WP status of the disk 106 is changed by the user by unchecking a “read only” attribute in the properties box for the disk 106 ; with regard to the disk 206 of FIG. 2 or to the disk 306 of FIG. 3, the WP status of the disk is changed by the user physically toggling a write protection tab on the disk; and with regard to one of the logical containers of FIG. 3, the WP status of the logical structure is changed by the user by unchecking a “read only” attribute in the properties box for the particular logical container.
- the operation will not be initiated without the successful determination of a change in state of the WP status and, hence, confirmation of the user's intention to perform the operation.
- the operation can only be initiated following confirmation of the user's intention to perform the operation.
- the physical toggling of the write protection tab on disks 206 , 306 206 , 306 is an act that necessarily must be performed by a user at the time of the initialization of the operation, and represents confirmation of the user's intentions to initiate and perform the operation at that time.
- a first removable storage medium such as disk 206 in FIG. 2 comprising a bootstrap disk is inserted into a floppy drive of the laptop and the laptop then is started. During booting of the laptop, the laptop boots from the bootstrap disk.
- the bootstrap disk includes a program that is executed by the laptop that causes the computer to determine the WP status of the disk and then to determine, again, the WP status of the disk.
- the subsequent determination is made after a sufficient period of time in which the user can remove the disk from the drive, physically toggle the write protection tab of the disk, and then reinsert the disk into the drive. Accordingly, when the subsequent check is made to determine the WP status of the disk, a comparison of the initial and subsequent checks reveals a change in the state of the WP status.
- the bootstrap program emulates keystrokes of a user. In this regard, the sequence of keystrokes is predetermined and results in the execution of the backup program on the laptop's hard disk drive.
- the sequence of keystrokes preferably identifies a backup location external to the laptop, such as, for example, a network storage device or a USB hard drive attached directly to a USB port of the laptop.
- a backup location external to the laptop, such as, for example, a network storage device or a USB hard drive attached directly to a USB port of the laptop.
- FIG. 4 Another example of a commercial utilization of the present invention includes backup and restore operations on a headless server. Inadvertent or unauthorized restoration of a backup image on a headless or blind server can destroy valuable data.
- the restore program is stored on a first bootstrap computer-readable medium such as a floppy disk. Upon booting from this disk, a bootstrap program thereon determines the WP status of the disk and then determines, again, the WP status of the disk in accordance with the method of FIG. 4. The second determination is made after a sufficient period of time in which the user can remove the disk from the drive of the headless server, toggle a write protection tab of the disk, and then reinsert the disk into the drive.
- the bootstrap program initiates a restore operation in which backup data is written to the headless server.
- the backup data could be written from a secondary drive of the headless server or from a remote location, such as network attached storage.
- the physical change in the write protection tab of the disk ensures that it is impossible to inadvertently perform a restore operation to the headless server by simply leaving the bootstrap disk in the drive and later rebooting the headless server.
- the restore operation nevertheless will not be executed upon a later reboot, as the state of the WP status of the disk will not change absent user action.
- the initiation sequence simply will time out and, if the restore operations is indeed desired, the headless server will have to reboot with the bootstrap disk in the drive.
- an inadvertent or unauthorized saving of backup data from a headless server can likewise destroy previously saved backup data.
- the present invention can be utilized to safeguard against this type of disaster.
- the backup operation to successfully execute requires, as a prerequisite, the change in state of the WP status of a disk.
- This disk also can be additionally used to load backup parameters and to save operational results of the backup for review by a user on another computer.
- the installation program itself is centrally located on a network attached device.
- the installation may destroy important data on the local machine if inadvertently performed, or if inadvertently performed remotely on the wrong local machine (hundreds or even thousands of local machines can exist on a network).
- the present invention can be utilized to ensure installation to the proper machine and to limit unintentional installations.
- a technician physically disposed at the local machine inserts a computer-readable medium comprising a disk into a drive associated with the local machine.
- the computer reads an identifier from the drive that is unique to, and thereby identifies to the local computer, the program to be installed on the local machine from the central network location.
- the computer also checks the WP status of the disk. Thereafter, the technician changes the state of the WP status of the disk and, after a predetermined period, the computer again checks the WP status of the disk.
- the computer Upon the successful determination of a change in state of the WP status of the disk, the computer initiates the installation program for installation to the local machine from the central network location. Furthermore, the identifier read from the disk is checked at the central network location against a list of identifiers that are associated with local machines to insure that the identifier read from the disk is, in fact, associated with the particular local machine so that the appropriate program will be installed for that machine. On the other hand, if the determination of a change in the state of the WP status of the disk is unsuccessful, or if a timeout occurs, which would occur in the absence of the technician, then the initiation sequence ends and the installation operation simply is not initiated.
- the program of the initiation sequence may or may not comprise a bootstrap program and/or may or may not reside upon a bootstrap disk.
- the program does comprise a bootstrap program, or resides on a bootstrap disk and is called by the bootstrap program, then the required change in state of the WP status of the predetermined file on the disk ensures that the dangerous program cannot be inadvertently executed upon a reboot of the computer merely by leaving the disk within the drive; someone also must be present to change the state of the WP status of the predetermined file between the initial check and subsequent check performed as part of the initiation sequence.
- program may refer not only to a standalone set of code, but also, for example, to a snippet of code or a module forming part of a larger program.
- a laptop computer 102 is shown in FIG. 1 only for purposes of illustrating a digital computer.
- the laptop computer 102 further represents, for example, a desktop, a tower computer, and a headless server, as well as an embedded computer such as those computers found in ATMs, cash registers, vending machines, gaming machines, autos, appliances, etc.
- the headless server 202 of FIG. 2 equally could be the laptop computer 102 as shown in FIG. 1, etc.
- the Zip disk 106 and the floppy disk 206 are shown only for purposes of illustrating different types of computer-readable media. These further represent, for example, optical discs, floppy disks, Zip disks, and the like, with the drive 104 and disk drive 204 each representing the appropriate type of hardware of the computer configuration for reading thereof and writing thereto by the computer. In general, the Zip disk 106 and disk 206 represent any type of computer-readable media that can be read and written by the computer 102 , such as USB hard disk drives, USB memory devices, and the like.
- the computer configuration when the computer-readable media include USB devices, the computer configuration includes a USB port as the hardware for reading of the USB devices; when the computer-readable media include serial devices, the computer configuration includes a serial port as the hardware for reading the serial devices; when the computer-readable media include parallel devices, the computer configuration includes a parallel port as the hardware for reading the parallel devices; when the computer-readable media include a SCSI device, the computer configuration includes a SCSI connection as the hardware for reading the SCSI devices; and when the computer-readable media include infrared devices, the computer configuration includes an infrared port as the hardware for reading the infrared devices, etc.
- a software program effects the change in the WP status rather than a user.
- a software program may run remotely or within the computer configuration, and preferably is executed by the user to run at one or more specified times when the user intends the operation to be initiated. In this situation, the software program that effects the state change in the WP status does not itself confirm the intention of the user to perform the operation by determining that a state change of the WP status has occurred.
- One or more methods also have been described as including the booting of a computer from a bootstrap storage medium.
- a variation of the present invention further includes such methods absent the actual booting of the computer from such storage media.
- the computer be booted from another storage medium, such as a hard disk drive of the computer configuration, a remote server in a networked computer configuration, etc., while otherwise still performing the other steps of the respective method described herein.
- Booting from a removable storage medium clearly is not a necessary element of the invention in its broadest scope.
- embodiments of the present invention may overlap to various extents and, accordingly, are not mutually exclusive.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Quality & Reliability (AREA)
- Stored Programmes (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- The present application claims priority under 35 U.S.C. § 119(e) to U.S. provisional patent application serial No. 60/350,434, filed Jan. 22, 2002, which is incorporated herein by reference, and relates to the same field of the invention as the current assignee's International patent application serial no. PCT/US02/40106, filed Dec. 16, 2002, which is incorporated herein by reference.
- It is desirable when a certain operation is to be performed on a computer to require user confirmation for such operation before initiation thereof. By way of example and not limitation, such operations include, for example, operations that are potentially damaging or result in irreversible changes to the computer, such as a low-level disk formatting of the computer's hard drive; restoring the computer to a previous, known state; reinstallation of the operating system of the computer; or performing emergency repair operations on the computer. Additional operations, for example, are set forth and discussed in the “Exemplary Commercial Utilizations” section below and in the incorporated international application.
- By confirming an intention of a user to perform an operation on the computer, the operation is “protected” from accidentally being performed. User confirmation is determined by: (1) communicating by the computer a warning to the user through a user-output device associated with the computer; and (2) in response thereto, communicating by the user a signal to the computer through a traditional user-input device associated with the computer. A user-output device includes, for example, a video display monitor, a light, or a speaker and the like. A traditional user-input device includes, for example, a keyboard, a touch screen, a mouse, or a microphone and the like.
- Unfortunately, there are circumstances in which a user's intention to perform an operation cannot be confirmed beforehand and, thus, the operation is unprotected from accidental performance. For example, a user's intention to perform an operation cannot be confirmed when there are no traditional user-input and/or user-output devices. A user's intention to perform an operation also cannot be confirmed when user-input and/or user-output devices associated with a computer malfunction or otherwise are disabled. A user's intention to perform an operation also cannot be confirmed when the operation itself must be successfully performed on the computer before the associated user-input and/or user-output devices may even be initialized.
- Under these circumstances, allowing an operation to be performed on the computer without user confirmation is undesirable but, nevertheless, necessary.
- The disadvantages of not being able to confirm a user's intentions to perform an operation are particularly apparent when an operation is to be performed on a “headless server” using a “bootstrap program.” In this regard, a “headless server” is a computer that has neither monitor, keyboard, nor mouse and that functions as a server in a computer network. Headless servers are found in common computer networks. A bootstrap program is a program that automatically executes upon starting (or “booting”) of a computer.
- When an operation is to be performed on a headless server using a bootstrap program, the headless server is booted from auto-running bootstrap media, such as a floppy disk or ZIP disk having the bootstrap program, by placing the floppy disk or ZIP disk in a drive of the headless server and rebooting the server. Using such auto-running bootstrap media, a headless server can be initialized with a base operating system (“O/S”) or otherwise restored to an operational condition. Once running, the server then can be configured, for example, by way of a network connected terminal.
- The headless server then might run unattended for months or years. Unfortunately, if the bootstrap media is inadvertently left in the drive of the headless server (which frequently happens), then, upon reboot months or years later, the operation performed by the auto-running bootstrap program on the headless server automatically restarts contrary to the actual intention of the user. Such an accidental restarting of the bootstrap program (which does not seek to confirm a user's intention to perform again the operation) often indicates deletion of or damage to data and security information on the headless server.
- A solution to the “forgotten media” problem is to require a reboot after execution of the operation in order for the headless server to resume normal operations. Leaving the bootstrap media in the drive then will place the computer in an endless loop of repeatedly rebooting and running the protected program until the bootstrap media is removed or otherwise disabled. While certainly not as costly as destroying months or years of data, the requirement of a reboot nonetheless proves wasteful and frustrating when the bootstrap media is inadvertently left in the drive.
- In view of the foregoing, a need exists for a system and method for confirming a user's intention to perform a computer operation when there are no traditional user-input and/or user-output devices connected to a computer. A need further exists for system and method for confirming a user's intention to perform a computer operation when user-input and/or user-output devices associated with a computer malfunction, and/or when user-input and/or user-output devices associated with a computer are disabled. A need also exists for a system and method for confirming a user's intention to perform a computer operation when the operation itself must be successfully performed on a computer before the associated user-input and/or user-output devices may even be initialized.
- Additionally, a particular need exists for a system and method for confirming a user's intention to perform an operation on a headless computer, especially one that functions as a server in a computer network.
- One or more of these needs are met by one or more embodiments of the present invention.
- The field of the present invention generally relates to performance of operations and, in particular, to a system and method for initiating an operation after a user's intention to perform such operation is confirmed. Thus, the present invention guards against a computer operation being inadvertently performed.
- Briefly described, the present invention broadly relates to a system and method in which a user's intention to perform an operation is confirmed. A user's intention is confirmed by determining a change in state of write protection (WP) status. Detection of the state change represents confirmation of the user's intention to perform the operation and forms part of the initiation sequence for the protected operation. The WP state change includes: (1) a change from “enabled” to “disabled,” as well as (2) a change from “disabled” to “enabled.” In this regard, “enabled” means writable or rewritable and “disabled” means read only. The WP state change preferably is accomplished by a physical act of a user. Accordingly, the WP state change tends to indicate: (1) that a user is present, and (2) that the protected computer operation is specifically intended by the user to be initiated.
- In certain preferred embodiments, the WP state change pertains to a physical, computer-readable medium such as, for example, a floppy disk, a ZIP disk, a USB storage device, a hard disk drive, or the like. In other preferred embodiments, the WP state change pertains to a logical container having the capability of being write protected as well as being unprotected from writes. A logical container includes, for example, a file, a folder, a name space, a logical drive, a virtual device, or the like.
- A method in accordance with the present invention for protecting against an unintentional operation being performed includes the step of initiating the operation only after a user's intention to perform the operation is confirmed. The user's intention to perform the operation is confirmed by: (i) initially checking a WP status of a computer-readable medium or logical container within a computer configuration; (ii) subsequently checking the WP status of the computer-readable medium or logical container within the computer configuration; and (iii) based on the initial and subsequent checks, determining whether there has been a state change in the WP status. The check preferably includes reading an attribute of the computer-readable medium or the logical container that is maintained within the computer configuration. Alternatively, the check of the computer-readable medium or the logical container preferably includes writing to the computer-readable medium or to the logical container. If the write is successful, then the WP status is determined to be enabled. If the write is unsuccessful, then the WP status is determined to be disabled. Upon a detection of the change in the write protection status, the user's intention is deemed confirmed. In a feature of the method, the user's intention is confirmed without requiring use of a user-input device.
- The subsequent check of the WP status preferably occurs after a predetermined period of time. Additionally, the check preferably is made for a predetermined number or times, or for a predetermined period of time, before the method times out and results in the subsequent termination of the initiation sequence without performance of the operation. Following termination of the initiation sequence, the initiation sequence preferably must begin again in order to perform the protected operation. Thus, the initiation sequence preferably is a prerequisite to performing the operation.
- An apparatus in accordance with the present invention includes a computer-readable medium having computer-executable instructions for performing the steps of the preferred method described above. Preferably, this computer-readable medium is a bootstrap medium and the computer-executable instructions are part of a bootstrap program or are part of a program that is run by the bootstrap program during boot up. In a preferred embodiment, the operation that is protected by the initiation sequence is a restore operation from a backup medium onto a headless server. Another apparatus in accordance with the present invention includes a computer configuration including a computer-readable medium having computer-executable instructions for performing the preferred method described above.
- Further features and benefits of the present invention will be apparent from a detailed description of preferred embodiments thereof taken in conjunction with the following drawings, wherein similar elements are referred to with similar reference numbers, and wherein:
- FIG. 1 illustrates a first preferred embodiment of a digital computer configuration of the invention;
- FIG. 2 illustrates a second preferred embodiment of a digital computer configuration of the invention;
- FIG. 3 illustrates a third preferred embodiment of a digital computer configuration of the invention; and
- FIG. 4 illustrates a flow diagram of steps of a preferred embodiment of a method of the invention.
- As a preliminary matter, it will readily be understood by those persons skilled in the art that the present invention is susceptible of broad utility and application in view of the following detailed description of preferred embodiments of the present invention. Many devices, methods, embodiments, and adaptations of the present invention other than those herein described, as well as many variations, modifications, and equivalent arrangements thereof, will be apparent from or reasonably suggested by the present invention and the following detailed description thereof, without departing from the substance or scope of the present invention. Accordingly, while the present invention is described herein in detail in relation to preferred embodiments, it is to be understood that this disclosure is illustrative and exemplary and is made merely for purposes of providing a full and enabling disclosure of the invention. The detailed disclosure herein is not intended nor is to be construed to limit the present invention or otherwise to exclude any such other embodiments, adaptations, variations, modifications and equivalent arrangements, the present invention being limited only by the claims appended hereto and the equivalents thereof.
- A First Preferred Embodiment of a Computer Configuration of the Present Invention
- Referring to FIG. 1, a first
preferred computer configuration 100 is shown in accordance with the present invention. Thecomputer configuration 100 includes adigital computer 102 illustrated as a laptop computer andhardware 104 comprising a ZIP drive that can read from and write to Zip disks.Removable storage medium 106 is illustrated as a Zip disk. The disk is insertable into the drive of thecomputer configuration 100 for reading thereof and writing thereto by thecomputer 102. Thecomputer configuration 100 includes computer-readable media having computer-executable instructions for performing the preferred method of the present invention described in detail below. - A Second Preferred Embodiment of a Computer Configuration of the Present Invention
- A second
preferred computer configuration 200 is shown in FIG. 2 in accordance with the present invention. Similar to thecomputer configuration 100 of FIG. 1, thecomputer configuration 200 of FIG. 2 includes adigital computer 202 havinghardware 204 in which aremovable storage medium 206 is insertable for reading therefrom and writing thereto by thecomputer 202. Unlike thecomputer configuration 100 of FIG. 1, thecomputer 202 is illustrated as a headless server, as thecomputer configuration 200 includes no user-input or output devices; thehardware 204 comprises a floppy drive; and the removable storage medium 208 comprises a floppy disk. Thecomputer configuration 200 includes computer-readable media having computer-executable instructions for performing the preferred method of the present invention described in detail below. - A Third Preferred Embodiment of a Computer Configuration of the Present Invention
- A third
preferred computer configuration 300 is shown in FIG. 3 in accordance with the present invention and includes acomputer network 312. Thecomputer configuration 200 of FIG. 2 forms part of thecomputer configuration 300 illustrated FIG. 3, as thecomputer configuration 200 represents anode 310 of thecomputer network 312. Thecomputer configuration 200 includes thedigital computer 202 andhardware 204 in whichremovable storage medium 306 is insertable for reading thereof and writing thereto by thecomputer 202. - The
computer network 312 also includes a network attached device (NAD) 318 with network attached storage (NAS) 316. TheNAS 316 includes therein a logical container comprising a file titled “confirm.txt” and, in turn, this file is located within another logical container comprising a folder. The folder is titled “Restore” and, in turn, the folder is located within another logical container comprising a logical drive or volume titled “T” (also referred to as the “T drive”). The file “confirm.txt” preferably includes an attribute that is recorded within the computer configuration that identifies a WP status of the file. This attribute typically is part of the metadata associated with the file. Alternatively, the folder includes an attribute that is recorded within the computer configuration that identifies a WP status of the files contained within the folder, or the T drive includes an attribute that is recorded within the computer configuration that identifies a WP status of all of the folders and/or of all of the files contained within the T drive. Thecomputer configuration 300 includes computer-readable media having computer-executable instructions for performing the preferred method of the present invention described in detail below. - A Preferred Embodiment of a Method of the Present Invention
- Referring now to FIG. 4, steps of a
preferred method 400 in accordance with the present invention are illustrated. Thepreferred method 400 begins atStep 402 when a protected operation is to be performed. At Step 404 a WP status is determined. With regard to thepreferred computer configuration 100 of FIG. 1, the WP status of thedisk 106 is determined; with regard to thepreferred computer configuration 200 of FIG. 2, the WP status of thedisk 206 is determined; and with regard to thepreferred computer configuration 300 of FIG. 3, the WP status of either thedisk 306 or of one of the logical structures of theNAS 316 is determined. Preferably, the WP status is determined by reading an attribute of the computer-readable medium or of the logical structure that indicates the WP status. Alternatively, the WP status is determined by attempting to write to the computer-readable medium or to the logical structure. If the write is successful, then the WP status is determined to be enabled. Thus, for instance, the WP status of the file “confirm.txt” on the T drive of theNAS 316 may be determined by writing to the file. - If the WP status is “disabled,” then the method determines again (Step412) the WP status. If the WP status is changed based on a comparison of the initial and subsequent checks, i.e., if the WP status is now “enabled,” then the method initiates the operation at
Step 418, and the method then ends atStep 420. - On the other hand, if the WP status is determined to be “disabled” at
Step 412, i.e., if the WP status is determined not to have changed based on a comparison of the initial and subsequent checks, then the method ends atStep 420 without the operation being initiated. - Alternatively, if the WP status is “enabled” as initially determined in
Step 404, then the method determines again (Step 416) the WP status. If the WP status is changed based on a comparison of the initial and subsequent checks, i.e., if the WP status is now “disabled,” then the method initiates the operation atStep 418, and the method then ends atStep 420. - On the other hand, if the WP status is determined to be “enabled” at
Step 416, i.e., if the WP status is determined not to have changed based on a comparison of the initial and subsequent checks, then the method ends atStep 420 without the operation being initiated. - In order for a user to change the WP status of the computer-readable medium or logical container for which the WP status is determined, a sufficient period preferably is provided before the respective subsequent checks at
Steps - Accordingly, if the WP status is determined to be “disabled” at
Step 404, then the method waits (Step 406) for some period of time, and if the WP status is determined to be “enabled” atStep 404, then the method waits (Step 408) for some period of time. Thereafter, a subsequent check respectively is made atStep 412 andStep 416. Furthermore, the method continues to check the WP status until either the WP status is determined to have changed or the method times out. The method times out atSteps Step 410 orStep 414, then the method ends atStep 420 without the operation being initiated. - With regard to the
preferred computer configuration 100 of FIG. 1, the WP status of thedisk 106 is changed by the user by unchecking a “read only” attribute in the properties box for thedisk 106; with regard to thedisk 206 of FIG. 2 or to thedisk 306 of FIG. 3, the WP status of the disk is changed by the user physically toggling a write protection tab on the disk; and with regard to one of the logical containers of FIG. 3, the WP status of the logical structure is changed by the user by unchecking a “read only” attribute in the properties box for the particular logical container. - In view of the foregoing detailed description, it will be apparent that the operation will not be initiated without the successful determination of a change in state of the WP status and, hence, confirmation of the user's intention to perform the operation. Preferably, the operation can only be initiated following confirmation of the user's intention to perform the operation.
- Moreover, in view of the foregoing detailed description, it will be apparent that, at least with regard to certain embodiments of the present invention, a user's intention to perform the operation actually is confirmed without requiring the use of user-input and user-output devices. No keyboard, mouse, monitor, microphone, speaker, touch screen, or the like is required in order to perform the initiation sequence for the operation. Nor is an on-screen user prompt required in order to confirm the user's intention to perform the operation on the computer. The physical toggling of the write protection tab on
disks - Exemplary Commercial Utilizations of the Present Invention
- The following represent examples of contemplated commercial utilizations of the present invention.
- Keystroke Emulation Program
- In certain circumstances, it is desirable to emulate keystrokes, especially when a keyboard or keypad is absent, malfunctioning, or otherwise unavailable. For instance, one may desire to create a backup of one's hard drive on a laptop computer using a backup program on the hard drive. This may be impossible, or at least very difficult, without the use of a keyboard. Utilizing a method of the present invention, a first removable storage medium such as
disk 206 in FIG. 2 comprising a bootstrap disk is inserted into a floppy drive of the laptop and the laptop then is started. During booting of the laptop, the laptop boots from the bootstrap disk. The bootstrap disk includes a program that is executed by the laptop that causes the computer to determine the WP status of the disk and then to determine, again, the WP status of the disk. The subsequent determination is made after a sufficient period of time in which the user can remove the disk from the drive, physically toggle the write protection tab of the disk, and then reinsert the disk into the drive. Accordingly, when the subsequent check is made to determine the WP status of the disk, a comparison of the initial and subsequent checks reveals a change in the state of the WP status. Following successfully determining the change in state of the WP status, the bootstrap program emulates keystrokes of a user. In this regard, the sequence of keystrokes is predetermined and results in the execution of the backup program on the laptop's hard disk drive. Moreover, the sequence of keystrokes preferably identifies a backup location external to the laptop, such as, for example, a network storage device or a USB hard drive attached directly to a USB port of the laptop. The determination of the change in state of the WP status of the bootstrap disk is a prerequisite to initiation of the keystroke emulation. Consequently, inadvertently booting the laptop with the disk does not result in an unintended performance of the backup operation. - Headless Server Restore and Backup
- Another example of a commercial utilization of the present invention includes backup and restore operations on a headless server. Inadvertent or unauthorized restoration of a backup image on a headless or blind server can destroy valuable data. In this context, the restore program is stored on a first bootstrap computer-readable medium such as a floppy disk. Upon booting from this disk, a bootstrap program thereon determines the WP status of the disk and then determines, again, the WP status of the disk in accordance with the method of FIG. 4. The second determination is made after a sufficient period of time in which the user can remove the disk from the drive of the headless server, toggle a write protection tab of the disk, and then reinsert the disk into the drive. Accordingly, when the comparison is made for a change in state of the WP status of the disk, such a change is determined. Following this successful determination, the bootstrap program initiates a restore operation in which backup data is written to the headless server. The backup data could be written from a secondary drive of the headless server or from a remote location, such as network attached storage. In this way, the physical change in the write protection tab of the disk ensures that it is impossible to inadvertently perform a restore operation to the headless server by simply leaving the bootstrap disk in the drive and later rebooting the headless server. Indeed, even if the bootstrap disk is inadvertently left in the drive, the restore operation nevertheless will not be executed upon a later reboot, as the state of the WP status of the disk will not change absent user action. In such case, the initiation sequence simply will time out and, if the restore operations is indeed desired, the headless server will have to reboot with the bootstrap disk in the drive.
- Correspondingly, an inadvertent or unauthorized saving of backup data from a headless server can likewise destroy previously saved backup data. As in the restore operation, the present invention can be utilized to safeguard against this type of disaster. In this regard, the backup operation to successfully execute requires, as a prerequisite, the change in state of the WP status of a disk. This disk also can be additionally used to load backup parameters and to save operational results of the backup for review by a user on another computer.
- Remote Network Install on Local Machine
- In certain arrangements it may be desirable to install a program on a local machine that is connected to a network, wherein the installation program itself is centrally located on a network attached device. The installation, however, may destroy important data on the local machine if inadvertently performed, or if inadvertently performed remotely on the wrong local machine (hundreds or even thousands of local machines can exist on a network). The present invention can be utilized to ensure installation to the proper machine and to limit unintentional installations. When an installation is to be performed at a local machine, a technician physically disposed at the local machine inserts a computer-readable medium comprising a disk into a drive associated with the local machine. The computer reads an identifier from the drive that is unique to, and thereby identifies to the local computer, the program to be installed on the local machine from the central network location. The computer also checks the WP status of the disk. Thereafter, the technician changes the state of the WP status of the disk and, after a predetermined period, the computer again checks the WP status of the disk.
- Upon the successful determination of a change in state of the WP status of the disk, the computer initiates the installation program for installation to the local machine from the central network location. Furthermore, the identifier read from the disk is checked at the central network location against a list of identifiers that are associated with local machines to insure that the identifier read from the disk is, in fact, associated with the particular local machine so that the appropriate program will be installed for that machine. On the other hand, if the determination of a change in the state of the WP status of the disk is unsuccessful, or if a timeout occurs, which would occur in the absence of the technician, then the initiation sequence ends and the installation operation simply is not initiated.
- Dangerous Program Isolation
- Execution of programs that, if inadvertently or maliciously executed would cause severe damage, may be contained by utilizing the present invention. In this regard, such a program is stored on a removable storage medium such as a floppy disk and not, for example, on a hard disk drive of a computer. This physical isolation of the program safeguards against malicious execution of the program by someone who merely gains access to the computer and its non-removable storage media. To execute the program utilizing the present invention, the floppy disk is inserted into a drive of the computer and the program including the initiation sequence is run. Upon running, the program first determines the WP status of a predetermined file on the disk. Thereafter, the program again determines the WP status of the predetermined file. If the WP status of the predetermined file does not change between the initial and subsequent checks, then the program ends without the dangerous program being successfully executed. If the WP status of the disk changes, then the dangerous program is then successfully initiated.
- In this example, the program of the initiation sequence may or may not comprise a bootstrap program and/or may or may not reside upon a bootstrap disk. However, if the program does comprise a bootstrap program, or resides on a bootstrap disk and is called by the bootstrap program, then the required change in state of the WP status of the predetermined file on the disk ensures that the dangerous program cannot be inadvertently executed upon a reboot of the computer merely by leaving the disk within the drive; someone also must be present to change the state of the WP status of the predetermined file between the initial check and subsequent check performed as part of the initiation sequence.
- Scope of the Present Invention
- In view of the foregoing detailed description of preferred embodiments of the present invention, it readily will be understood by those persons skilled in the art that the present invention in all its aspects is susceptible of broad utility and application. While various embodiments of the present invention have been described herein in certain contexts, the embodiments may be useful in other contexts as well. Many embodiments and adaptations thereof other than those herein described, as well as many variations, modifications, and equivalent arrangements, will be apparent from or reasonably suggested by the present invention and the foregoing description thereof, without departing from the substance or scope of the present invention. Furthermore, any sequence(s) and/or temporal order of steps of various processes described and claimed herein are those considered to be the best mode contemplated for one or more preferred embodiments of the present invention. It should also be understood that, although steps of various processes may be shown and described as being in a preferred sequence or temporal order, the steps of any such processes are not limited to being carried out in any particular sequence or order, absent a specific indication of such. In many cases, the steps of such processes may be able to be carried out in various different sequences and orders, while still falling within the scope of the present invention. Accordingly, while the present invention has been described herein in detail in relation to preferred embodiments, it is to be understood that this disclosure is only illustrative and exemplary of the present invention and is made merely for purposes of providing a full and enabling disclosure of the invention. The foregoing disclosure is not intended nor is to be construed to limit the present invention or otherwise to exclude any such other embodiments, adaptations, variations, modifications and equivalent arrangements thereof, the present invention being limited only by the claims appended hereto and the equivalents thereof.
- Thus, the use of “program” herein may refer not only to a standalone set of code, but also, for example, to a snippet of code or a module forming part of a larger program. Furthermore, for example, a
laptop computer 102 is shown in FIG. 1 only for purposes of illustrating a digital computer. Thelaptop computer 102 further represents, for example, a desktop, a tower computer, and a headless server, as well as an embedded computer such as those computers found in ATMs, cash registers, vending machines, gaming machines, autos, appliances, etc. Similarly, theheadless server 202 of FIG. 2 equally could be thelaptop computer 102 as shown in FIG. 1, etc. TheZip disk 106 and thefloppy disk 206 are shown only for purposes of illustrating different types of computer-readable media. These further represent, for example, optical discs, floppy disks, Zip disks, and the like, with thedrive 104 anddisk drive 204 each representing the appropriate type of hardware of the computer configuration for reading thereof and writing thereto by the computer. In general, theZip disk 106 anddisk 206 represent any type of computer-readable media that can be read and written by thecomputer 102, such as USB hard disk drives, USB memory devices, and the like. - Thus, for example, when the computer-readable media include USB devices, the computer configuration includes a USB port as the hardware for reading of the USB devices; when the computer-readable media include serial devices, the computer configuration includes a serial port as the hardware for reading the serial devices; when the computer-readable media include parallel devices, the computer configuration includes a parallel port as the hardware for reading the parallel devices; when the computer-readable media include a SCSI device, the computer configuration includes a SCSI connection as the hardware for reading the SCSI devices; and when the computer-readable media include infrared devices, the computer configuration includes an infrared port as the hardware for reading the infrared devices, etc.
- In addition to a user effecting a change in the WP status within the computer configuration, it is also contemplated that, within certain embodiments of the present invention, a software program effects the change in the WP status rather than a user. Such a software program may run remotely or within the computer configuration, and preferably is executed by the user to run at one or more specified times when the user intends the operation to be initiated. In this situation, the software program that effects the state change in the WP status does not itself confirm the intention of the user to perform the operation by determining that a state change of the WP status has occurred.
- One or more methods also have been described as including the booting of a computer from a bootstrap storage medium. A variation of the present invention further includes such methods absent the actual booting of the computer from such storage media. Instead, it is contemplated within the scope of the invention that in each such method the computer be booted from another storage medium, such as a hard disk drive of the computer configuration, a remote server in a networked computer configuration, etc., while otherwise still performing the other steps of the respective method described herein. Booting from a removable storage medium clearly is not a necessary element of the invention in its broadest scope. Moreover, it will be recognized that embodiments of the present invention may overlap to various extents and, accordingly, are not mutually exclusive.
Claims (42)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/248,424 US20030182527A1 (en) | 2002-01-22 | 2003-01-18 | Write Protection State Change Initiation Sequence |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US35043402P | 2002-01-22 | 2002-01-22 | |
PCT/US2002/040106 WO2004059509A1 (en) | 2002-12-16 | 2002-12-16 | Initiation sequences for performing protected computer operations |
WOPCT/US02/40106 | 2002-12-16 | ||
US10/248,424 US20030182527A1 (en) | 2002-01-22 | 2003-01-18 | Write Protection State Change Initiation Sequence |
Publications (1)
Publication Number | Publication Date |
---|---|
US20030182527A1 true US20030182527A1 (en) | 2003-09-25 |
Family
ID=32679921
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/248,424 Abandoned US20030182527A1 (en) | 2002-01-22 | 2003-01-18 | Write Protection State Change Initiation Sequence |
US10/248,429 Expired - Fee Related US6868465B2 (en) | 2002-12-16 | 2003-01-19 | RSM removal initiation sequence |
US10/248,425 Expired - Fee Related US6865629B2 (en) | 2002-12-16 | 2003-01-19 | RSM-resident program pair initiation sequence |
US10/248,426 Expired - Fee Related US6862638B2 (en) | 2002-12-16 | 2003-01-19 | RSM-resident program initiation sequence |
US10/248,427 Expired - Fee Related US6763411B1 (en) | 2002-12-16 | 2003-01-19 | Sequential RSM presence initiation sequence |
US10/248,430 Abandoned US20040117646A1 (en) | 2002-12-16 | 2003-01-19 | Combined RSM State-Change Initiation Sequence |
US10/248,428 Expired - Fee Related US6763412B1 (en) | 2002-12-16 | 2003-01-19 | Bootstrap RSM removal initiation sequence |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/248,429 Expired - Fee Related US6868465B2 (en) | 2002-12-16 | 2003-01-19 | RSM removal initiation sequence |
US10/248,425 Expired - Fee Related US6865629B2 (en) | 2002-12-16 | 2003-01-19 | RSM-resident program pair initiation sequence |
US10/248,426 Expired - Fee Related US6862638B2 (en) | 2002-12-16 | 2003-01-19 | RSM-resident program initiation sequence |
US10/248,427 Expired - Fee Related US6763411B1 (en) | 2002-12-16 | 2003-01-19 | Sequential RSM presence initiation sequence |
US10/248,430 Abandoned US20040117646A1 (en) | 2002-12-16 | 2003-01-19 | Combined RSM State-Change Initiation Sequence |
US10/248,428 Expired - Fee Related US6763412B1 (en) | 2002-12-16 | 2003-01-19 | Bootstrap RSM removal initiation sequence |
Country Status (3)
Country | Link |
---|---|
US (7) | US20030182527A1 (en) |
AU (1) | AU2002351383A1 (en) |
WO (1) | WO2004059509A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060107006A1 (en) * | 2002-01-22 | 2006-05-18 | Green Robbie A | Persistent snapshot management system |
US20080109747A1 (en) * | 2006-11-08 | 2008-05-08 | Cao Andrew H | Dynamic input field protection |
US20090037750A1 (en) * | 2007-07-31 | 2009-02-05 | Paul Boerger | Making a storage device unusable until a request is provided to recover an operating system or system firmware |
US7516357B2 (en) * | 1999-10-19 | 2009-04-07 | Idocrase Investments Llc | Stored memory recovery system |
US7818617B2 (en) | 1999-10-19 | 2010-10-19 | Shen Andrew W | Operating system and data protection |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7769845B2 (en) * | 2001-05-04 | 2010-08-03 | Whale Communications Ltd | Method and system for terminating an authentication session upon user sign-off |
WO2004059509A1 (en) * | 2002-12-16 | 2004-07-15 | Columbia Data Products, Inc. | Initiation sequences for performing protected computer operations |
US8472329B2 (en) * | 2004-05-03 | 2013-06-25 | Nokia Corporation | Presenting confirmation queries for network usage |
US7765334B2 (en) * | 2004-05-12 | 2010-07-27 | Canon Kabushiki Kaisha | Electronic apparatus for use with removable storage medium, control method therefor, and program for implementing the method |
GB0420017D0 (en) * | 2004-09-09 | 2004-10-13 | Sony Comp Entertainment Europe | Data processing |
WO2006027596A1 (en) * | 2004-09-09 | 2006-03-16 | Sony Computer Entertainment Europe Limited | Data processing |
JP2006113759A (en) * | 2004-10-13 | 2006-04-27 | Pioneer Electronic Corp | Network management system and its data sharing method |
US8276185B2 (en) * | 2005-01-19 | 2012-09-25 | Micron Technology, Inc. | Enhanced security memory access method and architecture |
US20080162604A1 (en) * | 2005-03-01 | 2008-07-03 | Serge Soulet | System and Method For Migrating a Platform, User Data, and Applications From at Least One Server to at Least One Computer |
GB0516450D0 (en) * | 2005-08-10 | 2005-09-14 | Symbian Software Ltd | Data storage on writeable removable media in a computing device |
US20070136523A1 (en) * | 2005-12-08 | 2007-06-14 | Bonella Randy M | Advanced dynamic disk memory module special operations |
US9268585B2 (en) * | 2007-05-29 | 2016-02-23 | Trimble Navigation Limited | Utilizing scripting for provisioning actions |
CN114143520B (en) * | 2021-11-29 | 2023-09-26 | 中船重工(武汉)凌久电子有限责任公司 | Method for realizing multi-channel HDMI interface transmission and automatic correction |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5675782A (en) * | 1995-06-06 | 1997-10-07 | Microsoft Corporation | Controlling access to objects on multiple operating systems |
US6041394A (en) * | 1997-09-24 | 2000-03-21 | Emc Corporation | Disk array write protection at the sub-unit level |
US20020064113A1 (en) * | 2000-11-30 | 2002-05-30 | Randy Geeslin | Methods for protecting optical disc media |
US20030023822A1 (en) * | 2001-07-11 | 2003-01-30 | Intel Corporation | Memory access control system, apparatus, and method |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04265592A (en) * | 1991-02-21 | 1992-09-21 | Pioneer Electron Corp | Information reproducing device |
JPH09106607A (en) | 1995-10-11 | 1997-04-22 | Nakamichi Corp | Changer-type disc-reproducing apparatus |
US6125408A (en) * | 1997-03-10 | 2000-09-26 | Compaq Computer Corporation | Resource type prioritization in generating a device configuration |
US6178503B1 (en) * | 1998-09-11 | 2001-01-23 | Powerquest Corporation | Managing multiple operating systems on a single computer |
US6345318B1 (en) * | 1998-10-07 | 2002-02-05 | International Business Machines Corporation | System for maintaining a user-modifiable confirmation message configuration record that specifying with respect to a plurality of operations whether to communicate a confirmation message |
US6324692B1 (en) * | 1999-07-28 | 2001-11-27 | Data General Corporation | Upgrade of a program |
GB2407896B (en) * | 2001-01-31 | 2005-06-22 | Hewlett Packard Co | Storage apparatus |
EP1257162A3 (en) * | 2001-05-07 | 2003-08-13 | Pioneer Corporation | Protection of electronic apparatus against static electricity and erroneous operations |
WO2004059509A1 (en) * | 2002-12-16 | 2004-07-15 | Columbia Data Products, Inc. | Initiation sequences for performing protected computer operations |
-
2002
- 2002-12-16 WO PCT/US2002/040106 patent/WO2004059509A1/en not_active Application Discontinuation
- 2002-12-16 AU AU2002351383A patent/AU2002351383A1/en not_active Abandoned
-
2003
- 2003-01-18 US US10/248,424 patent/US20030182527A1/en not_active Abandoned
- 2003-01-19 US US10/248,429 patent/US6868465B2/en not_active Expired - Fee Related
- 2003-01-19 US US10/248,425 patent/US6865629B2/en not_active Expired - Fee Related
- 2003-01-19 US US10/248,426 patent/US6862638B2/en not_active Expired - Fee Related
- 2003-01-19 US US10/248,427 patent/US6763411B1/en not_active Expired - Fee Related
- 2003-01-19 US US10/248,430 patent/US20040117646A1/en not_active Abandoned
- 2003-01-19 US US10/248,428 patent/US6763412B1/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5675782A (en) * | 1995-06-06 | 1997-10-07 | Microsoft Corporation | Controlling access to objects on multiple operating systems |
US6041394A (en) * | 1997-09-24 | 2000-03-21 | Emc Corporation | Disk array write protection at the sub-unit level |
US20020064113A1 (en) * | 2000-11-30 | 2002-05-30 | Randy Geeslin | Methods for protecting optical disc media |
US20030023822A1 (en) * | 2001-07-11 | 2003-01-30 | Intel Corporation | Memory access control system, apparatus, and method |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7516357B2 (en) * | 1999-10-19 | 2009-04-07 | Idocrase Investments Llc | Stored memory recovery system |
US7783923B2 (en) | 1999-10-19 | 2010-08-24 | Shen Andrew W | Stored memory recovery system |
US7818617B2 (en) | 1999-10-19 | 2010-10-19 | Shen Andrew W | Operating system and data protection |
US7844855B2 (en) * | 1999-10-19 | 2010-11-30 | Shen Andrew W | Stored memory recovery system |
US20060107006A1 (en) * | 2002-01-22 | 2006-05-18 | Green Robbie A | Persistent snapshot management system |
US7237080B2 (en) | 2002-01-22 | 2007-06-26 | Columbia Data Products, Inc. | Persistent snapshot management system |
US20080109747A1 (en) * | 2006-11-08 | 2008-05-08 | Cao Andrew H | Dynamic input field protection |
US7716596B2 (en) | 2006-11-08 | 2010-05-11 | International Business Machines Corporation | Dynamic input field protection |
US20090037750A1 (en) * | 2007-07-31 | 2009-02-05 | Paul Boerger | Making a storage device unusable until a request is provided to recover an operating system or system firmware |
US7822997B2 (en) * | 2007-07-31 | 2010-10-26 | Hewlett-Packard Development Company, L.P. | Making a storage device unusable until a request is provided to recover an operating system or system firmware |
Also Published As
Publication number | Publication date |
---|---|
US20040128525A1 (en) | 2004-07-01 |
WO2004059509A1 (en) | 2004-07-15 |
US6763411B1 (en) | 2004-07-13 |
US20040117523A1 (en) | 2004-06-17 |
US20040117524A1 (en) | 2004-06-17 |
AU2002351383A1 (en) | 2004-07-22 |
US20040128527A1 (en) | 2004-07-01 |
US6868465B2 (en) | 2005-03-15 |
US6763412B1 (en) | 2004-07-13 |
US6862638B2 (en) | 2005-03-01 |
US20040117646A1 (en) | 2004-06-17 |
US6865629B2 (en) | 2005-03-08 |
US20040128526A1 (en) | 2004-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030182527A1 (en) | Write Protection State Change Initiation Sequence | |
EP1434135B1 (en) | Method for backing up and recovering data in the hard disk of a computer | |
US7913113B2 (en) | Self-managed processing device | |
US6167494A (en) | Method and system for recovering from operating system failure | |
US7203865B2 (en) | Application level and BIOS level disaster recovery | |
US20110145923A1 (en) | Computer having special purpose subsystems and cyber-terror and virus immunity and protection features | |
US8667576B2 (en) | Method for preventing data in a computer system from being accessed by unauthorized user | |
US20080155216A1 (en) | Protection and Recovery System for Automatic Disk Recovery | |
CN108292342B (en) | Notification of intrusions into firmware | |
US20100037092A1 (en) | System and method for backup, reboot, and recovery | |
US8978151B1 (en) | Removable drive security monitoring method and system | |
KR100376435B1 (en) | Apparatus and method for protecting data on computer hard-disk and computer readable recording medium having computer readable programs stored therein for causing computer to perform the method | |
KR100877239B1 (en) | System remote recovery method | |
US8868979B1 (en) | Host disaster recovery system | |
CN109902490B (en) | Linux kernel level file system tamper-proof application method | |
KR100300584B1 (en) | Method for recovering environment of computer system | |
KR100706514B1 (en) | Booting method of operating system on hard disk | |
WO2001093016A2 (en) | Method for loading an operating system from a data storage media not designed therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: COLUMBIA DATA PRODUCTS, INC., FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WITT, LOUIS PERRY;REEL/FRAME:013396/0321 Effective date: 20030129 |
|
AS | Assignment |
Owner name: COLUMBIA DATA PRODUCTS, INC., FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GREEN, ROBBIE A.;WITT, LOUIS P., JR.;REEL/FRAME:014231/0184 Effective date: 20030505 |
|
AS | Assignment |
Owner name: COLUMBIA DATA PRODUCTS, INC., FLORIDA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE NAMES AND THE DOCUMENT DATES OF THE INVENTORS PREVIOUSLY RECORDED AT REEL 014231 FRAME 0184;ASSIGNORS:CROSS, DONALD D.;WITT, LOUIS PERRY, JR.;REEL/FRAME:016917/0852;SIGNING DATES FROM 20030129 TO 20030617 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |