USRE43602E1 - Data security method and device for computer modules - Google Patents

Data security method and device for computer modules Download PDF

Info

Publication number
USRE43602E1
USRE43602E1 US13/294,108 US201113294108A USRE43602E US RE43602 E1 USRE43602 E1 US RE43602E1 US 201113294108 A US201113294108 A US 201113294108A US RE43602 E USRE43602 E US RE43602E
Authority
US
United States
Prior art keywords
console
computer module
cpu
security
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US13/294,108
Inventor
William W. Y. Chu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ACQIS LLC
Original Assignee
ACQIS LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=29270405&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=USRE43602(E1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority to US13/294,108 priority Critical patent/USRE43602E1/en
Application filed by ACQIS LLC filed Critical ACQIS LLC
Assigned to ACQIS TECHNOLOGY, INC. reassignment ACQIS TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHU, WILLIAM W.Y.
Assigned to ACQIS LLC reassignment ACQIS LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ACQIS TECHNOLOGY, INC.
Priority to US13/562,210 priority patent/USRE44468E1/en
Publication of USRE43602E1 publication Critical patent/USRE43602E1/en
Application granted granted Critical
Priority to US13/649,078 priority patent/USRE44654E1/en
Priority to US13/899,484 priority patent/USRE44739E1/en
Priority to US14/087,640 priority patent/USRE46947E1/en
Priority to US14/109,749 priority patent/USRE45140E1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99939Privileged access

Definitions

  • the present invention relates to computing devices. More particularly, the present invention provides a method and device for securing a personal computer or set-top box. Merely by way of example, the present invention is applied to a modular computing environment for desk top computers, but it will be recognized that the invention has a much wider range of applicability. It can be applied to other portable or modular computing applications.
  • PCs Many desktop or personal computers, which are commonly termed PCs, have been around and used for over ten years.
  • the PCs often come with state-of-art microprocessors such as the Intel PentiumTM microprocessor chips. They also include a hard or fixed disk drive including memory in the giga-byte range. Additionally, the PCs often include a random access memory integrated circuit device such as a dynamic random access memory device, which is commonly termed DRAM.
  • DRAM dynamic random access memory device
  • the DRAM devices now provide up to millions of memory cells (i.e., mega-bit) on a single slice of silicon.
  • PCs also include a high resolution display such as cathode ray tubes or CRTs. In most cases, the CRTs are at least 15 inches or 17 inches or 19 inches in diameter. High resolution flat panel displays are also used with PCs.
  • peripheral devices can be used with the PCs.
  • these peripheral devices include mass storage devices such as a ZipTM Drive product sold by Iomega Corporation of Utah.
  • Other storage devices include external hard drives, tape drives, and others.
  • Additional devices include communication devices such as a modem, which can be used to link the PC to a wide area network of computers such as the Internet.
  • the PC can include output devices such as a printer and other output means.
  • the PC can include special audio output devices such as speakers the like.
  • PCs also have easy to use keyboards, mouse input devices, and the like.
  • the keyboard is generally configured similar to a typewriter format.
  • the keyboard also has the length and width for easily inputting information by way of keys to the computer.
  • the mouse also has a sufficient size and shape to easily move a cursor on the display from one location to another location.
  • computing devices include portable computing devices such as “laptop” computers and the like. Although somewhat successful, laptop computers have many limitations. These computing devices have expensive display technology. In fact, these devices often have a smaller flat panel display that has poor viewing characteristics. Additionally, these devices also have poor input devices such as smaller keyboards and the like. Furthermore, these devices have limited common platforms to transfer information to and from these devices and other devices such as PCs.
  • the user must often couple the portable computer to a local area network (i.e., LAN), to a serial port with a modem and then manually transfer over files and data between the desktop and the portable computer.
  • a local area network i.e., LAN
  • serial port with a modem
  • the user often must use floppy disks to “zip” up files and programs that exceed the storage capacity of conventional floppy disks, and transfer the floppy disk data manually.
  • both the desktop and portable computers typically include hard disk drives, floppy drives, CD-ROMs, computer memory, host processors, graphics accelerators, and the like. Because program software and supporting programs generally must be installed upon both hard drives in order for the user to operate programs on the road and in the office, hard disk space is often wasted.
  • a docking station with a portable computer.
  • the user has the portable computer for “on the road” use and a docking station that houses the portable computer for office use.
  • the docking station typically includes a separate monitor, keyboard, mouse, and the like and is generally incompatible with other desktop PCs.
  • the docking station is also generally not compatible with portable computers of other vendors.
  • Another drawback to this approach is that the portable computer typically has lower performance and functionality than a conventional desktop PC.
  • the processor of the portable is typically much slower than processors in dedicated desktop computers, because of power consumption and heat dissipation concerns.
  • some top-of-the-line desktops include 400 MHz processors
  • top-of-the-line notebook computers include 266 MHz processors.
  • PC architecture generally allows freedom of data flow between memory and peripheral devices within the allowed memory and I/O address spaces.
  • a peripheral bus i.e. PCI bus
  • PCI bus allows any device to be a bus master and perform data transaction with another device. Also when a software program is in control, it can move data between any two devices.
  • the conventional PC is a single machine that does not have a mechanism to perform security ID matching in hardware.
  • the present invention provides a security system for an attached computer module (“ACM”).
  • ACM inserts into a computer module bay (CMB) within a peripheral console to form a functional computer.
  • a security program reads an identification number in a security memory device to determine a security level of the ACM according to one embodiment.
  • the present invention provides a system for secured information transactions.
  • the system has a console (e.g., computer housing) comprising a peripheral controller housed in the console; and a security memory device (e.g., flash memory device) coupled to the peripheral controller.
  • the system also has an attached computer module (i.e., a removable module with memory and microprocessor) coupled to the console.
  • the attached computer module has a host interface controller housed within the attached computer module to interface to the security memory device through the peripheral controller.
  • the present invention provides a security protection method for a computer module.
  • the method includes steps or acts of inserting the computer module into a console. Once the module has been inserted, the method initiates a security program in the module to read a security identification of the console and to read a security identification of the computer module. Based upon a relationship of the console identification and the computer module identification, a predetermined security status is determined from, for example, a look up table or the like. The method then selects the predetermined security status, which can be one of many. The method then operates the computer module based upon the security status.
  • the present invention provides a method for identifying a user for a computer module.
  • the method includes inserting a computer module into a console; and initiating a security program in memory of the computer module.
  • the method prompts a plurality of input fields corresponding to respective input information on a user interface to be provided by a user of the computer module.
  • the method inputs the input information into the user interface of the computer module.
  • the input information includes a user (e.g., owner) name, a user (e.g., owner) password, a business name, a business password, and a location.
  • the present invention provides a system for secured information transactions, e.g., data security, electronic commerce, private communications.
  • the system includes a console comprising a peripheral controller housed in the console.
  • a user identification input device e.g., keyboard, retinal reader, finger print reader, voice recognition unit
  • the user identification input device is provided for user identification data of the user.
  • the system has an attached computer module coupled to the console.
  • the attached computer module has a security memory device (e.g., flash memory device) stored with the user identification data.
  • the present invention provides mechanical and electrical security systems to prevent theft or unauthorized use of the computer system in a specific embodiment. Additionally, the present invention substantially prevents accidental removal of the ACM from the console. In some embodiments, the present invention prevents illegal or unauthorized use during transit.
  • the present invention is also implemented using conventional technologies that can be provided in the present computer system in an easy and efficient manner. Depending upon the embodiment, one or more of these benefits can be available.
  • FIG. 1 is a simplified diagram of a computer system according to an embodiment of the present invention
  • FIG. 2 is a simplified diagram of a computer module according to an embodiment of the present invention.
  • FIG. 3 is a simplified top-view diagram of a computer module according to an embodiment of the present invention.
  • FIG. 4 is a simplified illustration of security systems according to embodiments of the present invention.
  • FIG. 5 is a simplified diagram of a computer module in a console according to an embodiment of the present invention.
  • FIG. 6 is a simplified diagram of a security method for a module according to an embodiment of the present invention.
  • FIG. 7 is a simplified diagram of a method according to an embodiment of the present invention.
  • FIG. 8 is a simplified diagram of a system 800 according to an alternative embodiment of the present application.
  • FIG. 9 depicts a peripheral console configuration.
  • FIG. 10 is a block diagram of one embodiment of a computer system employing the present invention.
  • FIG. 11 is a block diagram of an attached computing module (ACM).
  • ACM attached computing module
  • FIG. 12 is a block diagram of a peripheral console (PCON).
  • PCON peripheral console
  • FIG. 13 is a block diagram of one embodiment of a computer system using the interface of the present invention.
  • FIG. 14 is a detailed block diagram of one embodiment of the host interface controller of the present invention.
  • FIG. 15 is a detailed block diagram of one embodiment of the PIC of the present invention.
  • FIG. 16 is a schematic diagram of the signal lines PCK, PD0 to PD3, and PCN.
  • FIG. 17 is a partial block diagram of a computer system using the interface of the present invention as a bridge between the north and south bridges of the computer system.
  • FIG. 18 is a partial block diagram of a computer system in which the north and south bridges are integrated with the host and peripheral interface controllers, respectively.
  • FIG. 19 shows an attached computer module with Integrated CPU/NB/Graphics and Integrated HIC/SB.
  • FIG. 20 shows an attached computer module with single chip fully integrated: CPU, Cache, Core Logic, Graphics controller and Interface controller.
  • FIG. 1 is a simplified diagram of a computer system 1 according to an embodiment of the present invention. This diagram is merely an illustration and should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives.
  • the computer system 1 includes an attached computer module (i.e., ACM) 10 , a desktop console 20 , among other elements.
  • ACM attached computer module
  • the computer system is modular and has a variety of components that are removable. Some of these components (or modules) can be used in different computers, workstations, computerized television sets, and portable or laptop units.
  • ACM 10 includes computer components, as will be described below, including a central processing unit (“CPU”), IDE controller, hard disk drive, computer memory, and the like.
  • the computer module bay (i.e., CMB) 40 is an opening or slot in the desktop console.
  • the CMB houses the ACM and provides communication to and from the ACM.
  • the CMB also provides mechanical protection and support to ACM 10 .
  • the CMB has a mechanical alignment mechanism for mating a portion of the ACM to the console.
  • the CMB further has thermal heat dissipation sinks, electrical connection mechanisms, and the like.
  • the present system has a security system, which includes a mechanical locking system, an electrical locking system, and others.
  • the mechanical locking system includes at least a key 11 .
  • the key 11 mates with key hole 13 in a lock, which provides a mechanical latch 15 in a closed position.
  • the mechanical latch in the closed position, mates and interlocks the ACM to the computer module bay.
  • the mechanical latch which also has an open position, allows the ACM to be removed from the computer module bay. Further details of the mechanical locking system are shown in the FIG. below.
  • FIG. 2 is a simplified diagram of a computer module 10 according to an embodiment of the present invention.
  • the computer module 10 includes key 11 , which is insertable into keyhole 13 of the lock.
  • the lock has at least two position, including a latched or closed position and an unlatched or open position.
  • the latched position secures the ACM to the computer module bay.
  • the unlatched or open position allows the ACM to be inserted into or removed from the computer bay module.
  • the ACM also has a slot or opening 14 , which allows the latch to move into and out of the ACM.
  • the ACM also has openings 17 in the backside for an electrical and/or mechanical connection to the computer module bay, which is connected to the console.
  • FIG. 3 is a simplified top-view diagram 10 of a computer module for computer system according to an embodiment of the present invention.
  • the layout diagram illustrates the top-view of the module 10 , where the backside components (e.g., Host Interface Controller) are depicted in dashed lines.
  • the layout diagram has a first portion, which includes a central processing unit (“CPU”) module 400 , and a second portion, which includes a hard drive module 420 .
  • a common printed circuit board 437 houses these modules and the like.
  • the ACM includes the central processing unit module 400 with a cache memory 405 , which is coupled to a north bridge unit 421 , and a host interface controller 401 .
  • the host interface controller includes a lock control 403 .
  • the CPU module is disposed on a first portion of the attached computer module, and couples to connectors 17 .
  • the CPU module is spatially located near connector 17 .
  • the CPU module can use a suitable microprocessing unit, microcontroller, digital signal processor, and the like.
  • the CPU module uses, for example, a 400 MHz Pentium II microprocessor module from Intel Corporation and like microprocessors from AMD Corporation, Cyrix Corporation (now National Semiconductor Corporation), and others.
  • the microprocessor can be one such as the Compaq Computer Corporation Alpha Chip, Apple Computer Corporation PowerPC G3 processor, and the like. Further, higher speed processors are contemplated in other embodiments as technology increases in the future.
  • host interface controller 401 is coupled to BIOS/flash memory 405 . Additionally, the host interface controller is coupled to a clock control logic, a configuration signal, and a peripheral bus.
  • the present invention has a host interface controller that has lock control 403 to provide security features to the present ACM. Furthermore, the present invention uses a flash memory that includes codes to provide password protection or other electronic security methods.
  • the second portion of the attached computer module has the hard drive module 420 .
  • the hard drive module includes north bridge 421 , graphics accelerator 423 , graphics memory 425 , a power controller 427 , an IDE controller 429 , and other components.
  • Adjacent to and in parallel alignment with the hard drive module is a personal computer interface (“PCI”) bus 431 , 432 .
  • PCI personal computer interface
  • a power regulator 435 is disposed near the PCI bus.
  • north bridge unit 421 often couples to a computer memory, to the graphics accelerator 423 , to the IDE controller, and to the host interface controller via the PCI bus.
  • Graphics accelerator 423 typically couples to a graphics memory 423 , and other elements.
  • IDE controller 429 generally supports and provides timing signals necessary for the IDE bus.
  • the IDE controller is embodied as a 643U2 PCI-to IDE chip from CMD Technology, for example.
  • Other types of buses than IDE are contemplated, for example EIDE, SCSI, USB, and the like in alternative embodiments of the present invention.
  • the hard drive module or mass storage unit 420 typically includes a computer operating system, application software program files, data files, and the like.
  • the computer operating system may be the Windows98 operating system from Microsoft Corporation of Redmond Washington.
  • Other operating systems such as WindowsNT, MacOS8, Unix, and the like are also contemplated in alternative embodiments of the present invention.
  • some typical application software programs can include Office98 by Microsoft Corporation, Corel Perfect Suite by Corel, and others.
  • Hard disk module 420 includes a hard disk drive.
  • the hard disk drive can also be replaced by removable hard disk drives, read/write CD ROMs, flash memory, floppy disk drives, and the like.
  • a small form factor, for example 2.5′′, is currently contemplated, however, other form factors, such as PC card, and the like are also contemplated.
  • Mass storage unit 240 may also support other interfaces than IDE.
  • the present invention provides a file and data protection security system and method for a removable computer module or ACM.
  • ACM contains the primary hard disk drive (HDD) where the operating system, application programs, and data files reside.
  • the security system is used to prevent illegal access and copying of any file residing on the HDD inside ACM.
  • An ACM is a self-contained computing device that can be armed with security software and hardware to protect its owner's private files and data.
  • ACM docks with a computer bay in a wide variety of peripheral consoles.
  • the combined ACM and peripheral console function as a personal computer.
  • a computer module interface bus connects ACM and peripheral device.
  • all ACM data passes through computer module interface (CMI) bus to reach any device in the peripheral console, i.e.
  • CMI computer module interface
  • CMI bus data transfer is controlled by a pair of interface controllers on either side of the bus. This partitioning of a personal computer offer a way of protecting against illegal access of data residing within ACM by guarding data transaction through the computer module interface bus.
  • a secured ACM has an enclosure that includes the following components:
  • a peripheral console includes some of the following elements:
  • the Computer Module Bay is an opening in a peripheral console that receives ACM. CMB provides mechanical protection and electrical connection to ACM.
  • the Computer Module Interface bus is made up of 3 bus components: video bus, peripheral data bus, and power bus.
  • Video Bus consists of video output of graphics devices, i.e. analog RGB and control signals for monitor, or digital video signals to drive flat panel displays.
  • Power bus supplies the power for ACM.
  • Peripheral data bus is a high speed, compressed, peripheral bridge bus managed by a Host Interface Controller in ACM and a peripheral Interface Controller in peripheral console. In some embodiments, all peripheral data transaction passes through the interface controllers.
  • the implementation of the secured ACM generally includes the following elements:
  • security levels are:
  • Typical security ID can include:
  • the user through the security program can activate different levels of password protection, which can be stored in a look up table.
  • the company through the security program can control different levels of access privilege of a user, a business group, or equipment.
  • the security code then program the security level allowed by the access privilege determined by the security ID matching result. For example, if an unidentified peripheral console is detected upon power up by the low level security code, e.g. a home unit, the access privilege can set to Peripheral Read-only. With Read-only access privilege for all peripheral devices in peripheral console, the data detection and control circuitry is programmed to monitor all data traffic going to the peripheral console. Any memory block transfer to peripheral console will be detected and blocked. Under this mode, a user can use the computer with free access to the primary HDD in ACM. Any files can be read from other storage media in the peripheral console. But no files from the primary HDD can be copied to another media.
  • the data detection circuitry separately monitors peripheral bus operation type and memory address range being accessed.
  • a specific address range for memory accesses and for I/O accesses can be programmed for the data detection circuitry to flag a match.
  • a data blocking circuitry is triggered by the detection circuitry when a match occurs, and blank out the data that is being sent to the peripheral console.
  • a temper tamper resistant enclosure must be used to prevent removal of the hard disk drive and the flash memory inside ACM. Further details are shown throughout the present specification and more particularly below.
  • FIG. 4 is a simplified illustration of security systems 300 according to embodiments of the present invention. This illustration is merely an example, which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives.
  • the systems show various examples of ways to implement the present invention.
  • a user relies upon certain consoles to access information.
  • a company's shared portable console 325 can access general company information 303 .
  • Selected security identification information 315 is entered into the shared console to access the information via a network.
  • the information generally includes owner, owner password, business, business password, console type, location, and access privilege information, which is displayed on a user display.
  • the owner is generally the user name. Owner password is the user password.
  • the business is the business unit name and business password is the business unit password.
  • the console type can be portable for laptops, notebooks, and the like.
  • the console type can be a desktop.
  • the location generally specifies the desktop location or address for a networked system.
  • the location can also be a home location.
  • Access privilege can be categorized into many different levels. For example, the user can access general company information, but not information directed to other business units. The user can also be limited to access his/her private information, which is company related. Many other types of information can be restricted or accessed depending upon the embodiment.
  • consoles include, among others, a console at a user's home, e.g., “John Doe's,” a console in the user's office 329 , a console in a co-worker's office 331 , which the user can access.
  • the access from John Doe's home console uses security identification 317 and provides restricted access 305 .
  • the user's use of the module 307 can be from a variety of consoles and is accessed using security identification 319 .
  • access privilege is private, which allows the user to access private personal information or private company information that the user has created.
  • the user's access from his office relies upon security identification 321 , which grants access to private information and general company information.
  • the co-worker's console can also be used with security identification 323 , which allows the user to access general company information but not private information of John Doe, for example.
  • security system can provide partial or full access to information on servers via network as well as an attached computer module. Information can also be limited to read only for certain information sources such as a server, a hard drive, a floppy drive, and others.
  • the present invention also provides a security feature for the ACM 307 .
  • the user of the ACM can be granted access to information in the ACM if the correct security identification information 319 is provided to the combination of ACM and console. Once the correct information is provided, the user can access the information on the hard drive of the ACM, which can be for private use. Other levels of access and security can also be provided depending upon the application.
  • FIG. 5 is a simplified diagram 500 of a computer module in a console according to an embodiment of the present invention.
  • the block diagram 500 includes an attached computer module 501 and a peripheral console 503 , as well as other elements as desired. These elements have a variety of features such as those noted above, as well as others.
  • different reference numerals are used to show the operation of the present system.
  • the block diagram 500 illustrates attached computer module 501 .
  • the module 501 has a central processing unit 502 , which communicates to a north bridge 541 , by way of a CPU bus 527 .
  • the north bridge couples to main memory 523 via memory bus 529 .
  • the main memory can be any suitable high speed memory device or devices such as dynamic random access memory (“DRAM”) integrated circuits and others.
  • the DRAM includes at least 32 Meg. or 64 Meg. and greater of memory, but can also be less depending upon the application.
  • the main memory can be coupled directly with the CPU in some embodiments.
  • the north bridge also couples to a graphics subsystem 515 via bus 542 .
  • the graphics subsystem can include a graphics accelerator, graphics memory, and other devices. Graphics subsystem transmits a video signal to an interface connector, which couples to a display, for example.
  • the attached computer module also includes a primary hard disk drive 509 that serves as a main memory unit for programs and the like.
  • the hard disk can be any suitable drive that has at least 2 GB and greater. As merely an example, the hard disk is a Marathon 2250 (2.25 GB, 2 1 ⁇ 2 inch drive) product made by Seagate Corporation of Scotts Valley, but can be others.
  • the hard disk communicates to the north bridge by way of a hard disk drive controller and bus lines 502 and 531 .
  • the hard disk drive controller couples to the north bridge by way of the host PCI bus 531 , which connects bus 537 to the north bridge.
  • the hard disk includes computer codes that implement a security program according to the present invention. Details of the security program are provided below.
  • the attached computer module also has a flash memory device 505 with a BIOS.
  • the flash memory device 505 also has codes for a user password that can be stored in the device.
  • the flash memory device generally permits the storage of such password without a substantial use of power, even when disconnected.
  • the flash memory device has at least 512 kilobits or greater of memory, or 1 megabits or greater of memory.
  • the flash memory device can store a security identification number or the like.
  • the flash memory device is generally non-volatile and can preserve information even when the power is turned off, for example.
  • the flash memory generally has at least 128 kilobits storage cells or more.
  • the flash memory can be any product such as a W29C020 product made by a company called Winbond of Taiwan, but can also be others.
  • a host interface controller 507 communications to the north bridge via bus 535 and host PCI bus.
  • the host interface controller also has a data control 511 .
  • Host interface controller 507 communicates to the console using bus 513 , which couples to connection 515 .
  • Peripheral console 503 includes a variety of elements to interface to the module 501 , display 551 , and network 553 .
  • the console forms around south bridge 571 , which couples to bus 563 , which couples to bus 561 .
  • Bus 561 is in communication with network card 555 , which is a local area network for Ethernet, for example.
  • South bridge also couples through control 569 to peripheral interface controller 567 , which also communicates to bus 561 .
  • Peripheral interface controller also couples to host interface controller through connection 515 and bus 513 .
  • the peripheral console has a primary removable drive 559 connected to south bridge through bus 575 .
  • South bridge also couples to secondary hard disk through bus 577 .
  • the peripheral console also has a serial EEPROM memory device 575 , which is coupled to the peripheral interface controller.
  • the memory device can store a security identification number or the like.
  • the memory device is generally non-volatile and can preserve information even when the power is turned off, for example.
  • the memory generally has at least 16 kilobits of storage cells or more.
  • the memory device is a 16 kilobit device or 64 megabit device or greater, depending upon the application.
  • the memory can be any product such as a X24320 product made by a company called Xicor, but can also be others.
  • the memory cell and user identification will be more fully described below in reference to the FIGS.
  • FIG. 6 is a simplified diagram of a security method 600 for a module according to an embodiment of the present invention.
  • the present method shows an example of how the present security method can be implemented.
  • the present method uses a combination of software 601 and hardware 603 , which is in the computer module.
  • a plurality of external devices can be accessed depending upon the embodiment. These external devices include a secondary hard drive 618 , a removable drive 619 , a network (e.g., LAN, modem) device 621 , and others.
  • a keyboard 623 is also shown, which can act locally.
  • the software 601 includes an operating system 609 , application programs 607 , and a data security and initialization program 605 . Other programs can also exist. Additionally, some of these programs may not exist. Preferably, the data security and initialization program exists. This data security and initialization program is initiated once the attached computer module is inserted into the console. The program interface and oversees a variety of hardware features, which will be used to control access to the external devices, for example. Of course, the particular configuration of the software will depend upon the application.
  • Hardware features can be implemented using a primary hard disk 611 coupled to a CPU/cache combination, which includes a main memory.
  • the main memory is often a volatile memory such as dynamic random access memory.
  • Data from any one of the external devices can enter the CPU/cache combination.
  • the secondary hard disk memory and I/O address range data is transferred 624 to the CPU/cache combination.
  • the removable drive memory and I/O address range data can also transfer 625 to the CPU/cache combination.
  • the LAN memory and 1 / 0 address range data can also transfer 626 to the CPU/cache combination. Keyboard data can also transfer 627 to the CPU/cache combination.
  • the data security program interfaces with the data detection and control circuit to determine of such data should be transferred to any one of the external elements.
  • the external elements include, among others, secondary hard disk, and removable drive.
  • the data security program checks the security identification number with other numbers to determine the security access level.
  • FIG. 7 is a simplified diagram 700 of a method according to an embodiment of the present invention. This diagram is merely an illustration which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives.
  • the present method begins at power up, which is step 701 .
  • the present method reads a security code, which has been entered by a user, for example, in step 703 .
  • the security code can be a string of characters, including numbers and letters.
  • the security code is preferably a mixture of numbers and letters, which are at least about 6 characters in length, but is not limited.
  • the present method reads (step 703 ) the security code, which has been entered.
  • the security code is compared with a stored code, which is in flash memory or the like (step 705 ). If the compared code matches with the stored code, the method resumes to step 708 .
  • the method goes to step 707 via branch 706 where no access is granted. When no access is granted, all data are blocked out from the user that attempts to log onto the system.
  • the method determines if a certain level of access is granted, step 708 .
  • the present method can grant full access, step 710 , via branch 716 .
  • the present method allows full access based upon information stored in the flash memory device. Alternatively, the method can allow the user to access a limited amount of information.
  • the present method allows for at least one or more than two levels of access.
  • the present method allows for the user of the module to access peripheral storage (step 711 ).
  • the access privilege is read-only.
  • the user can read information on the peripheral storage including hard disks and the like.
  • the method data control, step 719 takes over, where the hardware prevents the user from accessing other information, step 721 .
  • the method can allow information to be removed from the peripheral storage. If the method allows for data to be removed, step 723 , the method goes through branch 731 to let data out, which can occur through the module. Alternatively, the method goes to block data (step 725 ) via branch 733 .
  • the method returns to the decision block, step 723 .
  • the method traverses branch 714 to a peripheral read-only process, step 712 .
  • the read-only process programs data control, step 713 .
  • the hardware takes over (step 715 ).
  • the method blocks all data from being accessed by the user, step 717 .
  • FIG. 8 is a simplified diagram of a system 800 according to an alternative embodiment of the present invention.
  • the system 800 includes an attached computer module 801 , which can be inserted into one of a plurality of console devices to create a “plug and play” operation.
  • the console device can be peripheral console 801 or peripheral console 805 .
  • Each peripheral console can have similar or different connection characteristics.
  • Peripheral console 803 couples to a local area network using Ethernet 817 .
  • Peripheral console 805 couples to a DSL line 827 through a DSL modem 825 .
  • Other consoles can also be included to use other types of networks such as ADSL, Cable Modem, wireless, Token Ring, and the like.
  • the attached computer module has elements such as a memory region 807 , which stores BIOS information, a security code, and a security identification number on a flash memory device or the like.
  • the memory region couples to a central processing region 809 , which can include CPU, chipset, cache memory, graphics, and a hard disk drive, as well as other features.
  • the central processing region couples to a host interface controller, which interfaces the attached computer module to one of the peripheral consoles. Any of the above information can also be included in the attached computer module.
  • Each peripheral console also has a variety of elements. These elements include a region 813 , 821 , which has a flash memory device with a security identification number, a password, access information, access privileges, internet service provider access information, as well as other features, which were previously noted.
  • the peripheral console also has an interface controller 815 , 823 , which couples region 813 , 821 , respectively to a networking device 817 , 825 .
  • the networking device can be an Ethernet card 817 , which allows communication to the local area network 819 .
  • the networking device can be a DSL modem 825 , which allows communication to a DSL (or ADSL) phone line. Other types of networking device can also be used, depending upon the application.
  • Each console provides a selected connection based upon set of predefined factors. These factors include communication hardware information so that software in attached computer module can read and allow a connection to a network. Here, access information can be provided to the user. Information about connection information will also be included. This connection information includes telephone numbers, account numbers, passwords (local), or a company password. The console and module combination will take care of charges, etc. based upon time bases. Module will have credit card information, but will have security. In a specific embodiment, the module inserts into the console. The module then asks the console which hardware will be used. If the hardware is an Ethernet connect, the module configures connection information to access the Ethernet connection. Alternatively, if the hardware requires a DSL connection, the module configures connection information to access the DSL connection. Other configuration information such as company server information, password, can also be provided.
  • a personal computer system that comprises two physically separate units and the interconnection between them is disclosed.
  • the first unit an attached computing module (ACM) contains the core computing power and environment for a computer user.
  • the second unit a peripheral console (PCON), contains the power supply and primary input and output devices for the computer system.
  • An ACM and a PCON are coupled with one another to form a fully functional personal computer system.
  • FIG. 9 depicts a notebook computer PCON configuration.
  • the opening of the computer bay 992 is visible at the side of the PCON unit 900.
  • the PCON 900 provides an integrated LCD display panel 910 as the user's primary display device.
  • the PCON 900 provides an integrated keyboard 922 as the user's primary input device.
  • FIG. 10 is a block diagram of the components in one computer system.
  • the computer system comprises an attached computer module (ACM) 1000, a peripheral console (PCON) 1001, and the interconnection apparatus 1003 between them.
  • the ACM 1000 includes the central processing unit (CPU) 1010, system memory 1020, high performance devices 1050, primary mass storage 1030, and related interface and support circuitry 1040.
  • the PCON 1001 includes primary display 1011, primary input 1021, secondary mass storage 1051, other devices 1061, expansion slots 1071, the primary power supply 1031, and related interface and support circuitry 1041.
  • the interconnection apparatus 1003 includes circuitry to convey power and operational signals between the ACM 1000 and PCON 1001.
  • the CPU 1010 executes instructions and manipulates data stored in the system memory 1020.
  • the CPU 1010 and system memory 1020 represent the user's core computing power.
  • the core computing power may also include high performance devices 1050 such as advanced graphics processor chips that greatly increase overall system performance and which, because of their speed, need to be located close to the CPU 1010.
  • the primary mass storage 1030 contains persistent copies of the operating system software, application software, configuration data, and user data.
  • the software and data stored in the primary mass storage device 1030 represent the user's computing environment.
  • Interface and support circuitry 1040 primarily includes interface chips and signal busses that interconnect the CPU 1010, system memory 1020, high performance devices 1050, and primary mass storage 1030.
  • the interface and support circuitry 1040 also connects ACM-resident components with the ACM-to-PCON interconnection apparatus 1003 as needed.
  • the primary display component 1011 may include an integrated display device or connection circuitry for an external display device.
  • This primary display device 1011 may be, for example, an LCD, plasma, or CRT display screen used to display text and graphics to the user for interaction with the operating system and application software.
  • the primary display component 1011 is the primary output of the computer system, i.e., the paramount vehicle by which programs executing on the CPU 1010 can communicate toward the user.
  • the primary input component 1021 of the PCON 1001 may include an integrated input device or connection circuitry for attachment to an external input device.
  • the primary input 1021 may be, for example, a keyboard, touch screen, keypad, mouse, trackball, digitizing pad, or some combination thereof to enable the user to interact with the operating system and application software.
  • the primary input component 1021 is the paramount vehicle by which programs executing on the CPU 1010 receive signals from the user.
  • the PCON 1001 may contain secondary mass storage 1051 to provide additional high capacity storage for data and software.
  • Secondary mass storage 1051 may have fixed or removable media and may include, for example, devices such as diskette drives, hard disks, CD-ROM drives, DVD drives, and tape drives.
  • the PCON 1001 may be enhanced with additional capability through the use of integrated “Other Devices” 1061 or add-on cards inserted into the PCON's expansion slots 1071. Examples of additional capability include sound generators, LAN connections, and modems.
  • Interface and support circuitry 1041 primarily includes interface chips, driver chips, and signal busses that interconnect the other components within the PCON 1001. The interface and support circuitry 1041 also connects PCON-resident components with the ACM-to-PCON interconnection apparatus 1003 as needed.
  • the PCON 1001 houses the primary power supply 1031.
  • the primary power supply 1031 has sufficient capacity to power both the PCON 1001 and the ACM 1000 for normal operation.
  • the ACM 1000 may include a secondary “power supply” in the form, for example, of a small battery. Such a power supply would be included in the ACM 1000 to maintain, for example, a time-of-day clock, configuration settings when the ACM 1000 is not attached to a PCON, or machine state when moving an active ACM immediately from one PCON to another.
  • FIG. 11 is a block diagram of an attached computing module (ACM) 1100.
  • the physical ACM package 1100 contains the ACM functional components 1101 and the ACM side of the ACM-to-PCON Interconnection 1700.
  • the ACM 1101 comprises a CPU component 1110, a system memory component 1120, a primary mass storage component 1130, a high performance devices components 1150, and an interface and support component 1140.
  • the ACM side of the ACM-to-PCON Interconnection 1700 comprises a Host Interface Controller (HIC) component 1720 and an ACM connector component 1730.
  • the HIC 1720 and connector 1730 components couple the ACM functional components 1100 with the signals of an ACM-to-PCON interface bus 1710 used to operatively connect an ACM with a PCON.
  • the ACM-to-PCON interface bus 1710 comprises conveyance for electrical power 1714 and signals for a peripheral bus 1712, video 1716, video port 1717, and console type 1718.
  • the preferred ACM-to-PCON Interconnection 1700 is described in detail in a companion U.S.
  • the preferred ACM-to-PCON interconnection 1700 includes circuitry to transmit and receive parallel bus information from multiple signal paths as a serial bit stream on a single signal path. This reduces the number of physical signal paths required to traverse the interconnection 1700. Further, employing low-voltage differential signaling (LVDS) on the bit stream data paths provides very reliable, high-speed transmission across cables. This represents a further advantage of the present invention.
  • LVDS low-voltage differential signaling
  • Clocking circuitry 1144 generates clock signals for distribution to other components within the ACM 1100 that require a timing and synchronization clock source.
  • the CPU 1110 is one such component. Often, the total power dissipated by a CPU is directly proportional to the frequency of its main clock signal.
  • the presently described embodiment of the ACM 1100 includes circuitry that can vary the frequency of the main CPU clock signal conveyed to the CPU 1110 via signal path 1162, in response to a signal received from the host interface controller (HIC) 1720 via signal path 1161.
  • HIC host interface controller
  • the generation and variable frequency control of clocking signals is well understood in the art. By varying the frequency, the power consumption of the CPU 1110 (and thus the entire ACM 1100) can be varied.
  • variable clock rate generation may be exploited to match the CPU power consumption to the available electrical power.
  • Circuitry in the host interface controller (HIC) 1720 of the presently described embodiment adjusts the frequency control signal sent via signal path 1161 to the clocking circuitry 1144, based on the “console type” information signal 1718 conveyed from the peripheral console (PCON) by the CPU-to-PCON interconnection 1700.
  • FIG. 12 is a block diagram of a peripheral console (PCON).
  • a peripheral console couples with an ACM to form an operating personal computer system.
  • the peripheral console (PCON) supplies an ACM with primary input, display, and power supply; the ACM supplies the core computing power and environment of the user.
  • the physical PCON package 1200 contains the PCON functional components 1201 and the PCON side of the ACM-to-PCON Interconnection 1800.
  • the PCON functional components 1201 comprise primary display 1210, a primary input 1220, a primary power supply 1230, interface and support 1240, secondary mass storage 1250, other devices 1260, and expansion slots 1270.
  • the PCON side of the ACM-to-PCON Interconnection 1800 comprises a Peripheral Interface Controller (PIC) component 1840, a PCON connector component 1850, console-type component 1842, and flash memory device 1848.
  • the PIC 1840 and connector 1850 components couple the PCON functional components 1201 with the signals of an ACM-to-PCON interface bus 1810 used to operatively connect an ACM with a PCON.
  • the ACM-to-PCON interface bus 1810 comprises conveyance for electrical power 1814 and signals for a peripheral bus 1812, video 1816, video port 1817, and console-type 1818.
  • the preferred ACM-to-PCON Interconnection 1800 is described in detail in the U.S.
  • Connector component 1850 may be selected to mate directly with the connector component 1730 of an ACM (shown in FIG. 11). Alternatively, connector component 1850 may be selected to mate with, for example, the connector on one end of a cable intervening between the PCON and an ACM in a particular embodiment.
  • the ACM-to-PCON interconnection described in the aforementioned companion patent application has the advantage of providing reliable signal conveyance across low cost cables.
  • Flash memory device 1848 provides non-volatile storage. This storage may be accessible to devices in both the ACM and the PCON, including the host interface controller and the peripheral interface controller 1840 to which it is connected. As such, flash memory 1848 may be used to store configuration and security data to facilitate an intelligent mating between an ACM and a PCON that needs no participation of the CPU.
  • the secondary mass storage component 1250 of the PCON functional circuitry 1201 of the presently described embodiment comprises diskette drive 1254, hard disk drive 1252, and CD-ROM drive 1256.
  • Secondary mass storage 1250 generally provides low-cost, non-volatile storage for data files which may include software program files. Data files stored on secondary mass storage 1250 are not part of a computer user's core computing power and environment. Secondary mass storage 1250 may be used to store, for example, seldom used software programs, software programs that are used only with companion hardware devices installed in the same peripheral console 1200, or archival copies of data files that are maintained in primary mass storage 1130 of an ACM (shown in FIG. 11).
  • Storage capacities for secondary mass storage 1250 devices may vary from the 1.44 megabytes of the 3.5-inch high density diskette drive 1254, to more than 10 gigabytes for a large format (5-inch) hard disk drive 1252.
  • Hard disk drive 1252 employs fixed recording media, while diskette drive 1254 and CD-ROM drive 1256 employ removable media.
  • Diskette drive 1254 and hard disk drive 1252 support both read and write operations (i.e., data stored on their recording media may be both recalled and modified) while CD-ROM drive 1256 supports only read operations.
  • PCI control signals are encoded into control bits, and the control bits, rather than the control signals that they represent, and are transmitted on the interface channel.
  • the control bits representing control signals are decoded back into PCI control signals prior to being transmitted to the intended PCI bus.
  • control bits rather than control signals are transmitted on the interface channel allows using a smaller number of signal channels and a correspondingly small number of conductive lines in the interface channel than would otherwise be possible. This is because the control bits can be more easily multiplexed at one end of the interface channel and recovered at the other end than control signals.
  • This relatively small number of signal channels used in the interface channel allows using LVDS channels for the interface.
  • an LVDS channel is more cable friendly, faster, consumes less power, and generates less noise than a PCI bus channel. Therefore, an LVDS channel is advantageously used for the hereto unused purpose of interfacing PCI or PCI-like buses.
  • the relatively smaller number of signal channels in the interface also allows using connectors having smaller pins counts.
  • the present invention encompasses an apparatus for bridging a first computer interface bus and a second computer interface bus, in a microprocessor based computer system where each of the first and second computer interface buses have a number of parallel multiplexed address/data bus lines and operate at a clock speed in a predetermined clock speed range having a minimum clock speed and a maximum clock speed.
  • the apparatus comprises an interface channel having a clock channel and a plurality of bit channels for transmitting bits; a first interface controller coupled to the first computer interface bus and to the interface channel to encode first control signals from the first computer interface bus into first control bits to be transmitted on the interface channel and to decode second control bits received from the interface channel into second control signals to be transmitted to the first computer interface bus; and a second interface controller coupled to the interface channel and the second computer interface bus to decode the first control bits from the interface channel into third control signals to be transmitted on the second computer interface bus and to encode fourth control signals from the second computer interface bus into the second control bits to be transmitted on the interface channel.
  • the first and second interface controllers comprise a host interface controller (HIC) and a peripheral interface controller (PIC), respectively
  • the first and second computer interface buses comprise a primary PCI and a secondary PCI bus, respectively
  • the interface channel comprises an LVDS channel.
  • the interface channel has a plurality of serial bit channels numbering fewer than the number of parallel bus lines in each of the PCI buses and operates at a clock speed higher than the clock speed at which any of the bus lines operates. More specifically, the interface channel includes two sets of unidirectional serial bit channels which transmit data in opposite directions such that one set of bit channels transmits serial bits from the HIC to the PIC while the other set transmits serial bits from the PIC to the HIC. For each cycle of the PCI clock, each bit channel of the interface channel transmits a packet of serial bits.
  • the HIC and PIC each include a bus controller to interface with the first and second computer interface buses, respectively, and to manage transactions that occur therewith.
  • the HIC and PIC also include a translator coupled to the bus controller to encode control signals from the first and second computer interface buses, respectively, into control bits and to decode control bits from the interface channel into control signals.
  • the HIC and PIC each include a transmitter and a receiver coupled to the translator. The transmitter converts parallel bits into serial bits and transmits the serial bits to the interface channel. The receiver receives serial bits from the interface channel and converts them into parallel bits.
  • FIG. 13 is a block diagram of one embodiment of a computer system 1300 using the interface of the present invention.
  • Computer system 1300 includes an attached computer module (ACM) 1305 and a peripheral console 1310, which are described in greater detail in the application of William W. Y. Chu, Ser. No. 09/149,548, for “Personal Computer Peripheral Console With Attached Computer Module” filed on Sep. 8, 1998 and incorporated herein by reference.
  • the ACM 1305 and the peripheral console 1310 are interfaced through an exchange interface system (XIS) bus 1315.
  • the XIS bus 1315 includes power bus 1316, video bus 1317 and peripheral bus (XPBus) 1318, which is also herein referred to as an interface channel.
  • XIS exchange interface system
  • XPBus peripheral bus
  • the power bus 1316 transmits power between ACM 1305 and peripheral console 1310. In a preferred embodiment power bus 1316 transmits power at voltage levels of 3.3 volts, 5 volts and 12 volts.
  • Video bus 1317 transmits video signals between the ACM 1305 and the peripheral console 1310. In a preferred embodiment, the video bus 1317 transmits analog Red Green Blue (RGB) video signals for color monitors, digital video signals (such as Video Electronics Standards Association (VESA) Plug and Display's Transition Minimized Differential Signaling (TMDS) signals for flat panel displays), and television (TV) and/or super video (S-video) signals.
  • the XPBus 1318 is coupled to host interface controller (HIC) 1319 and to peripheral interface controller (PIC) 1320, which is also sometimes referred to as a bay interface controller.
  • HIC host interface controller
  • PIC peripheral interface controller
  • HIC 1319 is coupled to an integrated unit 1321 that includes a CPU, a cache and a north bridge.
  • the CPU 1705 and north bridge 1710 are separate rather than integrated units.
  • the HIC and PIC are integrated with the north and south bridges, respectively, such that integrated HIC and north bridge unit 1805 includes an HIC and a north bridge, while integrated PIC and south bridge unit 1810 includes a PIC and a south bridge.
  • FIG. 19 shows an attached computer module with integrated CPU/NB/Graphics 1915 and Integrated HIC/SB 1920.
  • FIG. 20 shows an attached computer module with single chip 2025 fully integrated: CPU, Cache, Core Logic, Graphics controller and Interface controller.
  • FIG. 14 is a detailed block diagram of one embodiment of the HIC of the present invention.
  • HIC 1600 comprises bus controller 1610, translator 1620, transmitter 1630, receiver 1640, a PLL 1650, an address/data multiplexer (A/D MUX) 1660, a read/write controller (RD/WR Cntl) 1670, a video serial to parallel converter 1680 and a CPU control & general purpose input/output latch/driver (CPU CNTL & GPIO latch/driver) 1690.
  • A/D MUX address/data multiplexer
  • RD/WR Cntl read/write controller
  • video serial to parallel converter 1680 a video serial to parallel converter
  • CPU control & general purpose input/output latch/driver CPU CNTL & GPIO latch/driver
  • HIC 1600 is coupled to an optional flash memory BIOS configuration unit 1601.
  • Flash memory unit 1601 stores basic input output system (BIOS) and PCI configuration information and supplies the BIOS and PCI configuration information to A/D MUX 1660 and RD/WR Control 1670, which control the programming, read, and write of flash memory unit 1601.
  • BIOS basic input output system
  • A/D MUX 1660 and RD/WR Control 1670 which control the programming, read, and write of flash memory unit 1601.
  • Bus controller 1610 is coupled to the host PCI bus, which is also referred to herein as the primary PCI bus, and manages PCI bus transactions on the host PCI bus.
  • Bus controller 1610 includes a slave (target) unit 1611 and a master unit 1616.
  • Both slave unit 1611 and master unit 1616 each include two first in first out (FIFO) buffers, which are preferably asynchronous with respect to each other since the input and output of the two FIFOs in the master unit 1616 as well as the two FIFOs in the slave unit 1611 are clocked by different clocks, namely the PCI clock and the PCK.
  • slave unit 1611 includes encoder 1622 and decoder 1623
  • master unit 1616 includes encoder 1627 and decoder 1628.
  • the FIFOs 1612, 1613, 1617 and 1618 manage data transfers between the host PCI bus and the XPBus, which in the embodiment shown in FIG. 14 operate at 33 MHz and 66 MHz, respectively.
  • PCI address/data (AD) from the host PCI bus is entered into FIFOs 1612 and 1617 before they are encoded by encoders 1622 and 1627.
  • Encoders 1622 and 1627 format the PCI address/data bits to a form more suitable for parallel to serial conversion prior to transmittal on the XPBus.
  • address and data information from the receivers is decoded by decoders 1623 and 1628 to a form more suitable for transmission on the host PCI bus.
  • the multiplexed parallel A/D bits and some control bits input to transmitter 1630 are serialized by parallel to serial converters 1632 of transmitter 1630 into 10 bit packets. These bit packets are then output on data lines PD0 to PD3 of the XPBus. Other control bits are serialized by parallel to serial converter 1633 into 10 bit packets and sent out on control line PCN of the XPBus.
  • FIG. 15 is a detailed block diagram of one embodiment of the PIC of the present invention.
  • PIC 11100 is nearly identical to HIC 1600 in its function, except that HIC 1600 interfaces the host PCI bus to the XPBus while PIC 11100 interfaces the secondary PCI bus to the XPBus.
  • the components in PIC 11100 serve the same function as their corresponding components in HIC 1600.
  • Reference numbers for components in PIC 11100 have been selected such that a component in PIC 11100 and its corresponding component in HIC 1600 have reference numbers having the same two least significant digits.
  • the bus controller in PIC 11100 is referenced as bus controller 11110 while the bus controller in HIC 1600 is referenced as bus controller 1610.
  • FIG. 16 is a schematic diagram of lines PCK, PD0 to PD3, and PCN. These lines are unidirectional LVDS lines for transmitting clock signals and bits from the HIC to the PIC. The bits on the PD0 to PD3 and the PCN lines are sent synchronously within every clock cycle of the PCK. Another set of lines, namely PCKR, PDR0 to PDR3, and PCNR, are used to transmit clock signals and bits from the PIC to HIC.
  • the lines used for transmitting information from the PIC to the HIC have the same structure as those shown in FIG. 16, except that they transmit data in a direction opposite to that in which the lines shown in FIG. 16 transmit data. In other words they transmit information from the PIC to the HIC.
  • control information that may be sent in the reverse direction, i.e., on PCNR line, include a request to switch data bus direction because of a pending operation (such as read data available), a control signal change in the target requiring communication in the reverse direction, target busy, and transmission error detected.
  • the XPBus which includes lines PCK, PD0 to PD3, PCN, PCKR, PDR0 to PDR3, and PCNR, has two sets of unidirectional lines transmitting clock signals and bits in opposite directions.
  • the first set of unidirectional lines includes PCK, PD0 to PD3, and PCN.
  • the second set of unidirectional lines includes PCKR, PDR0 to PDR3, and PCNR.
  • Each of these unidirectional set of lines is a point-to-point bus with a fixed transmitter and receiver, or in other words a fixed master and slave bus.
  • the HIC is a fixed transmitter/master whereas the PIC is a fixed receiver/slave.
  • the PIC is a fixed transmitter/master whereas the HIC is a fixed receiver/slave.
  • the LVDS lines of XPBus a cable friendly and remote system I/O bus, transmit fixed length data packets within a clock cycle.
  • the XPBus lines, PD0 to PD3, PCN, PDR0 to PDR3 and PCNR, and the video data and clock lines, VPD and VPCK, are not limited to being LVDS lines, as they may be other forms of bit based lines.
  • the XPBus lines may be IEEE 1394 lines.
  • each of the lines PCK, PD0 to PD3, PCN, PCKR, PDR0 to PDR3, PCNR, VPCK, and VPD is referred to as a line, in the singular rather than plural, each such line may contain more than one physical line.
  • each of lines PCK, PD0 to PD3 and PCN includes two physical lines between each driver and its corresponding receiver.
  • the term line when not directly preceded by the terms physical or conductive, is herein used interchangeably with a signal or bit channel of one or more physical lines for transmitting a signal.
  • non-differential signal lines generally only one physical line is used to transmit one signal.
  • a pair of physical lines is used to transmit one signal.
  • a pair of physical lines together transmit a signal in a bit line or bit channel in an LVDS or IEEE 1394 interface.
  • a bit based line (i.e., a bit line) is a line for transmitting serial bits.
  • Bit based lines typically transmit bit packets and use a serial data packet protocol. Examples of bit lines include an LVDS line, an IEEE 1394 line, and a Universal Serial Bus (USB) line.

Abstract

A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer module and compares it to a security identification number in a console, which houses the attached computer module. Based upon a relationship between these numbers, a security status is selected. The security status determines the security level of operating the computer system.

Description

Notice: More than one reissue application has been filed for the reissue of U.S. Pat. No. 6,643,777. The reissue applications are U.S. application Ser. Nos. 11/056,604 (a parent reissue application), 11/545,056 (which is a continuation reissue of the parent reissue application), 12/561,138 (which is a continuation reissue of the parent reissue application), and 13/294,108 (the present application, which is a continuation reissue of U.S. application Ser. No. 12/561,138).
This application is a continuation reissue of U.S. application Ser. No. 12/561,138, which is a continuation reissue of U.S. application Ser. No. 11/056,604 filed Feb. 10, 2005, now U.S. Pat. No. RE41,092, which is a reissue of U.S. Pat. No. 6,643,777, which are incorporated herein by reference.
BACKGROUND OF THE INVENTION
The present invention relates to computing devices. More particularly, the present invention provides a method and device for securing a personal computer or set-top box. Merely by way of example, the present invention is applied to a modular computing environment for desk top computers, but it will be recognized that the invention has a much wider range of applicability. It can be applied to other portable or modular computing applications.
Many desktop or personal computers, which are commonly termed PCs, have been around and used for over ten years. The PCs often come with state-of-art microprocessors such as the Intel Pentium™ microprocessor chips. They also include a hard or fixed disk drive including memory in the giga-byte range. Additionally, the PCs often include a random access memory integrated circuit device such as a dynamic random access memory device, which is commonly termed DRAM. The DRAM devices now provide up to millions of memory cells (i.e., mega-bit) on a single slice of silicon. PCs also include a high resolution display such as cathode ray tubes or CRTs. In most cases, the CRTs are at least 15 inches or 17 inches or 19 inches in diameter. High resolution flat panel displays are also used with PCs.
Many external or peripheral devices can be used with the PCs. Among others, these peripheral devices include mass storage devices such as a Zip™ Drive product sold by Iomega Corporation of Utah. Other storage devices include external hard drives, tape drives, and others. Additional devices include communication devices such as a modem, which can be used to link the PC to a wide area network of computers such as the Internet. Furthermore, the PC can include output devices such as a printer and other output means. Moreover, the PC can include special audio output devices such as speakers the like.
PCs also have easy to use keyboards, mouse input devices, and the like. The keyboard is generally configured similar to a typewriter format. The keyboard also has the length and width for easily inputting information by way of keys to the computer. The mouse also has a sufficient size and shape to easily move a cursor on the display from one location to another location.
Other types of computing devices include portable computing devices such as “laptop” computers and the like. Although somewhat successful, laptop computers have many limitations. These computing devices have expensive display technology. In fact, these devices often have a smaller flat panel display that has poor viewing characteristics. Additionally, these devices also have poor input devices such as smaller keyboards and the like. Furthermore, these devices have limited common platforms to transfer information to and from these devices and other devices such as PCs.
Up to now, there has been little common ground between these platforms including the PCs and laptops in terms of upgrading, ease-of-use, cost, performance, and the like. Many differences between these platforms, probably somewhat intentional, has benefited computer manufacturers at the cost of consumers. A drawback to having two separate computers is that the user must often purchase both the desktop and laptop to have “total” computing power, where the desktop serves as a “regular” computer and the laptop serves as a “portable” computer. Purchasing both computers is often costly and runs “thousands” of dollars. The user also wastes a significant amount of time transferring software and data between the two types of computers. For example, the user must often couple the portable computer to a local area network (i.e., LAN), to a serial port with a modem and then manually transfer over files and data between the desktop and the portable computer. Alternatively, the user often must use floppy disks to “zip” up files and programs that exceed the storage capacity of conventional floppy disks, and transfer the floppy disk data manually.
Another drawback with the current model of separate portable and desktop computer is that the user has to spend money to buy components and peripherals the are duplicated in at least one of these computers. For example, both the desktop and portable computers typically include hard disk drives, floppy drives, CD-ROMs, computer memory, host processors, graphics accelerators, and the like. Because program software and supporting programs generally must be installed upon both hard drives in order for the user to operate programs on the road and in the office, hard disk space is often wasted.
One approach to reduce some of these drawbacks has been the use of a docking station with a portable computer. Here, the user has the portable computer for “on the road” use and a docking station that houses the portable computer for office use. The docking station typically includes a separate monitor, keyboard, mouse, and the like and is generally incompatible with other desktop PCs. The docking station is also generally not compatible with portable computers of other vendors. Another drawback to this approach is that the portable computer typically has lower performance and functionality than a conventional desktop PC. For example, the processor of the portable is typically much slower than processors in dedicated desktop computers, because of power consumption and heat dissipation concerns. As an example, it is noted that at the time of drafting of the present application, some top-of-the-line desktops include 400 MHz processors, whereas top-of-the-line notebook computers include 266 MHz processors.
Another drawback to the docking station approach is that the typical cost of portable computers with docking stations can approach the cost of having a separate portable computer and a separate desktop computer. Further, as noted above, because different vendors of portable computers have proprietary docking stations, computer users are held captive by their investments and must rely upon the particular computer vendor for future upgrades, support, and the like.
To date, most personal computers provide data file security through software only. A wide variety of removable storage media are available for a personal computer. These removable media do not provide any access security protection in hardware. Data encryption program often must be used for protection. Such program is cumbersome to handle for the user requiring extra cost and time. Data encryption is more commonly used for communication over an unprotected network or the Internet. Having a large number of frequently used files managed by encryption software is not practical. Without software security program, any file can be read and copied illegally from a hard disk drive on a PC or any removable media.
PC architecture generally allows freedom of data flow between memory and peripheral devices within the allowed memory and I/O address spaces. In conventional PC architecture, a peripheral bus, i.e. PCI bus, is used to control all data transactions among peripheral devices. PCI bus allows any device to be a bus master and perform data transaction with another device. Also when a software program is in control, it can move data between any two devices. There is no hardware or protocol security mechanism on a standard peripheral bus such as PCI Bus to detect or block data transactions. Operating system may have individual files read or write protected. These types of special security feature require significant additional user interaction to control. This is too cumbersome for a typical user to manage. There is no mechanism in current PCs to allow access to the primary hard disk drive and yet prevent copying of its content. The conventional PC is a single machine that does not have a mechanism to perform security ID matching in hardware.
Thus, what is needed are computer systems that provide improved security features to prevent illegal or unauthorized access to information.
SUMMARY OF THE INVENTION
According to the present invention, a technique including a method and device for securing a computer module in a computer system is provided. In an exemplary embodiment, the present invention provides a security system for an attached computer module (“ACM”). In an embodiment, the ACM inserts into a computer module bay (CMB) within a peripheral console to form a functional computer. A security program reads an identification number in a security memory device to determine a security level of the ACM according to one embodiment.
In a specific embodiment, the present invention provides a system for secured information transactions. The system has a console (e.g., computer housing) comprising a peripheral controller housed in the console; and a security memory device (e.g., flash memory device) coupled to the peripheral controller. The system also has an attached computer module (i.e., a removable module with memory and microprocessor) coupled to the console. The attached computer module has a host interface controller housed within the attached computer module to interface to the security memory device through the peripheral controller.
In an alternative embodiment, the present invention provides a security protection method for a computer module. The method includes steps or acts of inserting the computer module into a console. Once the module has been inserted, the method initiates a security program in the module to read a security identification of the console and to read a security identification of the computer module. Based upon a relationship of the console identification and the computer module identification, a predetermined security status is determined from, for example, a look up table or the like. The method then selects the predetermined security status, which can be one of many. The method then operates the computer module based upon the security status.
In a further alternative embodiment, the present invention provides a method for identifying a user for a computer module. The method includes inserting a computer module into a console; and initiating a security program in memory of the computer module. The method prompts a plurality of input fields corresponding to respective input information on a user interface to be provided by a user of the computer module. Next, the method inputs the input information into the user interface of the computer module. The input information includes a user (e.g., owner) name, a user (e.g., owner) password, a business name, a business password, and a location.
Still further, the present invention provides a system for secured information transactions, e.g., data security, electronic commerce, private communications. The system includes a console comprising a peripheral controller housed in the console. A user identification input device (e.g., keyboard, retinal reader, finger print reader, voice recognition unit) is coupled to the peripheral controller. The user identification input device is provided for user identification data of the user. The system has an attached computer module coupled to the console. The attached computer module has a security memory device (e.g., flash memory device) stored with the user identification data.
Numerous benefits are achieved using the present invention over previously existing techniques. The present invention provides mechanical and electrical security systems to prevent theft or unauthorized use of the computer system in a specific embodiment. Additionally, the present invention substantially prevents accidental removal of the ACM from the console. In some embodiments, the present invention prevents illegal or unauthorized use during transit. The present invention is also implemented using conventional technologies that can be provided in the present computer system in an easy and efficient manner. Depending upon the embodiment, one or more of these benefits can be available. These and other advantages or benefits are described throughout the present specification and are described more particularly below.
These and other embodiments of the present invention, as well as its advantages and features, are described in more detail in conjunction with the text below and attached FIGS.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a simplified diagram of a computer system according to an embodiment of the present invention;
FIG. 2 is a simplified diagram of a computer module according to an embodiment of the present invention;
FIG. 3 is a simplified top-view diagram of a computer module according to an embodiment of the present invention;
FIG. 4 is a simplified illustration of security systems according to embodiments of the present invention;
FIG. 5 is a simplified diagram of a computer module in a console according to an embodiment of the present invention;
FIG. 6 is a simplified diagram of a security method for a module according to an embodiment of the present invention; and
FIG. 7 is a simplified diagram of a method according to an embodiment of the present invention.
FIG. 8 is a simplified diagram of a system 800 according to an alternative embodiment of the present application.
FIG. 9 depicts a peripheral console configuration.
FIG. 10 is a block diagram of one embodiment of a computer system employing the present invention.
FIG. 11 is a block diagram of an attached computing module (ACM).
FIG. 12 is a block diagram of a peripheral console (PCON).
FIG. 13 is a block diagram of one embodiment of a computer system using the interface of the present invention.
FIG. 14 is a detailed block diagram of one embodiment of the host interface controller of the present invention.
FIG. 15 is a detailed block diagram of one embodiment of the PIC of the present invention.
FIG. 16 is a schematic diagram of the signal lines PCK, PD0 to PD3, and PCN.
FIG. 17 is a partial block diagram of a computer system using the interface of the present invention as a bridge between the north and south bridges of the computer system.
FIG. 18 is a partial block diagram of a computer system in which the north and south bridges are integrated with the host and peripheral interface controllers, respectively.
FIG. 19 shows an attached computer module with Integrated CPU/NB/Graphics and Integrated HIC/SB.
FIG. 20 shows an attached computer module with single chip fully integrated: CPU, Cache, Core Logic, Graphics controller and Interface controller.
DESCRIPTION OF THE SPECIFIC EMBODIMENTS
FIG. 1 is a simplified diagram of a computer system 1 according to an embodiment of the present invention. This diagram is merely an illustration and should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The computer system 1 includes an attached computer module (i.e., ACM) 10, a desktop console 20, among other elements. The computer system is modular and has a variety of components that are removable. Some of these components (or modules) can be used in different computers, workstations, computerized television sets, and portable or laptop units.
In the present embodiment, ACM 10 includes computer components, as will be described below, including a central processing unit (“CPU”), IDE controller, hard disk drive, computer memory, and the like. The computer module bay (i.e., CMB) 40 is an opening or slot in the desktop console. The CMB houses the ACM and provides communication to and from the ACM. The CMB also provides mechanical protection and support to ACM 10. The CMB has a mechanical alignment mechanism for mating a portion of the ACM to the console. The CMB further has thermal heat dissipation sinks, electrical connection mechanisms, and the like. Some details of the ACM can be found in co-pending U.S. patent application Ser. Nos. 09/149,882 and 09/149,548 filed Sep. 8, 1998 commonly assigned, and hereby incorporated by reference for all purposes.
In a preferred embodiment, the present system has a security system, which includes a mechanical locking system, an electrical locking system, and others. The mechanical locking system includes at least a key 11. The key 11 mates with key hole 13 in a lock, which provides a mechanical latch 15 in a closed position. The mechanical latch, in the closed position, mates and interlocks the ACM to the computer module bay. The mechanical latch, which also has an open position, allows the ACM to be removed from the computer module bay. Further details of the mechanical locking system are shown in the FIG. below.
FIG. 2 is a simplified diagram of a computer module 10 according to an embodiment of the present invention. This diagram is merely an illustration and should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. Some of the reference numerals are similar to the previous FIG. for easy reading. The computer module 10 includes key 11, which is insertable into keyhole 13 of the lock. The lock has at least two position, including a latched or closed position and an unlatched or open position. The latched position secures the ACM to the computer module bay. The unlatched or open position allows the ACM to be inserted into or removed from the computer bay module. As shown, the ACM also has a slot or opening 14, which allows the latch to move into and out of the ACM. The ACM also has openings 17 in the backside for an electrical and/or mechanical connection to the computer module bay, which is connected to the console.
FIG. 3 is a simplified top-view diagram 10 of a computer module for computer system according to an embodiment of the present invention. This diagram is merely an illustration and should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The layout diagram illustrates the top-view of the module 10, where the backside components (e.g., Host Interface Controller) are depicted in dashed lines. The layout diagram has a first portion, which includes a central processing unit (“CPU”) module 400, and a second portion, which includes a hard drive module 420. A common printed circuit board 437 houses these modules and the like. Among other features, the ACM includes the central processing unit module 400 with a cache memory 405, which is coupled to a north bridge unit 421, and a host interface controller 401. The host interface controller includes a lock control 403. As shown, the CPU module is disposed on a first portion of the attached computer module, and couples to connectors 17. Here, the CPU module is spatially located near connector 17.
The CPU module can use a suitable microprocessing unit, microcontroller, digital signal processor, and the like. In a specific embodiment, the CPU module uses, for example, a 400 MHz Pentium II microprocessor module from Intel Corporation and like microprocessors from AMD Corporation, Cyrix Corporation (now National Semiconductor Corporation), and others. In other aspects, the microprocessor can be one such as the Compaq Computer Corporation Alpha Chip, Apple Computer Corporation PowerPC G3 processor, and the like. Further, higher speed processors are contemplated in other embodiments as technology increases in the future.
In the CPU module, host interface controller 401 is coupled to BIOS/flash memory 405. Additionally, the host interface controller is coupled to a clock control logic, a configuration signal, and a peripheral bus. The present invention has a host interface controller that has lock control 403 to provide security features to the present ACM. Furthermore, the present invention uses a flash memory that includes codes to provide password protection or other electronic security methods.
The second portion of the attached computer module has the hard drive module 420. Among other elements, the hard drive module includes north bridge 421, graphics accelerator 423, graphics memory 425, a power controller 427, an IDE controller 429, and other components. Adjacent to and in parallel alignment with the hard drive module is a personal computer interface (“PCI”) bus 431, 432. A power regulator 435 is disposed near the PCI bus.
In a specific embodiment, north bridge unit 421 often couples to a computer memory, to the graphics accelerator 423, to the IDE controller, and to the host interface controller via the PCI bus. Graphics accelerator 423 typically couples to a graphics memory 423, and other elements. IDE controller 429 generally supports and provides timing signals necessary for the IDE bus. In the present embodiment, the IDE controller is embodied as a 643U2 PCI-to IDE chip from CMD Technology, for example. Other types of buses than IDE are contemplated, for example EIDE, SCSI, USB, and the like in alternative embodiments of the present invention.
The hard drive module or mass storage unit 420 typically includes a computer operating system, application software program files, data files, and the like. In a specific embodiment, the computer operating system may be the Windows98 operating system from Microsoft Corporation of Redmond Washington. Other operating systems, such as WindowsNT, MacOS8, Unix, and the like are also contemplated in alternative embodiments of the present invention. Further, some typical application software programs can include Office98 by Microsoft Corporation, Corel Perfect Suite by Corel, and others. Hard disk module 420 includes a hard disk drive. The hard disk drive, however, can also be replaced by removable hard disk drives, read/write CD ROMs, flash memory, floppy disk drives, and the like. A small form factor, for example 2.5″, is currently contemplated, however, other form factors, such as PC card, and the like are also contemplated. Mass storage unit 240 may also support other interfaces than IDE.
In a specific embodiment, the present invention provides a file and data protection security system and method for a removable computer module or ACM. ACM contains the primary hard disk drive (HDD) where the operating system, application programs, and data files reside. The security system is used to prevent illegal access and copying of any file residing on the HDD inside ACM. An ACM is a self-contained computing device that can be armed with security software and hardware to protect its owner's private files and data. ACM docks with a computer bay in a wide variety of peripheral consoles. The combined ACM and peripheral console function as a personal computer. A computer module interface bus connects ACM and peripheral device. In some embodiments, all ACM data passes through computer module interface (CMI) bus to reach any device in the peripheral console, i.e. floppy drive, removable media, secondary hard disk drive, modem, and others. CMI bus data transfer is controlled by a pair of interface controllers on either side of the bus. This partitioning of a personal computer offer a way of protecting against illegal access of data residing within ACM by guarding data transaction through the computer module interface bus.
In a specific embodiment, a secured ACM has an enclosure that includes the following components:
    • 1) ACPU,
    • 2) Main memory,
    • 3) A primary Hard Disk Drive (HDD),
    • 4) Operating System, application software, data files on primary HDD,
    • 5) Interface circuitry and connectors to peripheral console,
    • 6) Flash memory used for storing security code and ID,
    • 7) Data detection and control circuitry to manage data flow to peripheral console,
    • 8) Circuit board connecting the above components, and others.
A peripheral console includes some of the following elements:
    • 1) Input means, e.g. keyboard and mouse,
    • 2) Display means, e.g. CRT monitor, or integrated LCD display,
    • 3) Removable storage media subsystem, e.g. Floppy drive, CDROM drive,
    • 4) Communication device, e.g. LAN or modem,
    • 5) Computer Module Bay, interface device and connectors to ACM,
    • 6) Flash memory with security ID,
    • 7) Power supply or battery system, and other devices.
The Computer Module Bay (CMB) is an opening in a peripheral console that receives ACM. CMB provides mechanical protection and electrical connection to ACM. The Computer Module Interface bus is made up of 3 bus components: video bus, peripheral data bus, and power bus. Video Bus consists of video output of graphics devices, i.e. analog RGB and control signals for monitor, or digital video signals to drive flat panel displays. Power bus supplies the power for ACM. Peripheral data bus is a high speed, compressed, peripheral bridge bus managed by a Host Interface Controller in ACM and a peripheral Interface Controller in peripheral console. In some embodiments, all peripheral data transaction passes through the interface controllers.
The implementation of the secured ACM generally includes the following elements:
    • 1) A programmable Flash memory controlled by the Peripheral Interface Controller containing the security ID for the peripheral console,
    • 2) A programmable Flash memory controlled by the Host Interface Controller containing hardware specific security code and ID for the computer module,
    • 3) A data detection and control circuitry within Host Interface Controller to detect and manage data going out of ACM, and
    • 4) A low level hardware dependent security code to perform security ID matching, hardware programming to manage data flow,
    • 5) A high-level security program to manage user interface, program security ID, program security level, and other functions.
The hardware and software implementation allow more flexibility in the level of security protection offered to an ACM owner. Some examples of security levels are:
    • 1) No access—Security IDs do not match according to owner's requirement. The Host Interface Controller blocks all peripheral data traffic between ACM and peripheral console except for keyboard and mouse,
    • 2) Peripheral Read-only—No files can be written to any peripheral devices. All peripheral devices in peripheral console are managed as Read-only devices. The primary hard disk drive in ACM can be accessed freely,
    • 3) Limited access—Certain peripheral devices are allowed read/write access, i.e. modem, and other devices are Read-only, i.e. removable media devices,
    • 4) Full access—No restriction, and others.
Upon power up, the low level security code is executed to compare security ID between the respective flash memory between ACM and peripheral console. Typical security ID can include:
    • 1) User ID
    • 2) User password
    • 3) User Access privilege
    • 4) Business ID
    • 5) Business password
    • 6) Equipment ID
    • 7) Equipment access privilege, and any other security IDs.
The user through the security program can activate different levels of password protection, which can be stored in a look up table. The company through the security program can control different levels of access privilege of a user, a business group, or equipment. The security code then program the security level allowed by the access privilege determined by the security ID matching result. For example, if an unidentified peripheral console is detected upon power up by the low level security code, e.g. a home unit, the access privilege can set to Peripheral Read-only. With Read-only access privilege for all peripheral devices in peripheral console, the data detection and control circuitry is programmed to monitor all data traffic going to the peripheral console. Any memory block transfer to peripheral console will be detected and blocked. Under this mode, a user can use the computer with free access to the primary HDD in ACM. Any files can be read from other storage media in the peripheral console. But no files from the primary HDD can be copied to another media.
The data detection circuitry separately monitors peripheral bus operation type and memory address range being accessed. A specific address range for memory accesses and for I/O accesses can be programmed for the data detection circuitry to flag a match. A data blocking circuitry is triggered by the detection circuitry when a match occurs, and blank out the data that is being sent to the peripheral console. For the security system to be effective, a temper tamper resistant enclosure must be used to prevent removal of the hard disk drive and the flash memory inside ACM. Further details are shown throughout the present specification and more particularly below.
FIG. 4 is a simplified illustration of security systems 300 according to embodiments of the present invention. This illustration is merely an example, which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The systems show various examples of ways to implement the present invention. Here, a user relies upon certain consoles to access information. A company's shared portable console 325 can access general company information 303. Selected security identification information 315 is entered into the shared console to access the information via a network. The information generally includes owner, owner password, business, business password, console type, location, and access privilege information, which is displayed on a user display. The owner is generally the user name. Owner password is the user password. The business is the business unit name and business password is the business unit password. The console type can be portable for laptops, notebooks, and the like. Alternatively, the console type can be a desktop. The location generally specifies the desktop location or address for a networked system. Alternatively, the location can also be a home location. Access privilege can be categorized into many different levels. For example, the user can access general company information, but not information directed to other business units. The user can also be limited to access his/her private information, which is company related. Many other types of information can be restricted or accessed depending upon the embodiment.
Other types of access can be granted depending upon the consoles. For example, various consoles include, among others, a console at a user's home, e.g., “John Doe's,” a console in the user's office 329, a console in a co-worker's office 331, which the user can access. The access from John Doe's home console uses security identification 317 and provides restricted access 305. The user's use of the module 307 can be from a variety of consoles and is accessed using security identification 319. Here, access privilege is private, which allows the user to access private personal information or private company information that the user has created. The user's access from his office relies upon security identification 321, which grants access to private information and general company information. The co-worker's console can also be used with security identification 323, which allows the user to access general company information but not private information of John Doe, for example. Depending upon the console used by the user, the security system can provide partial or full access to information on servers via network as well as an attached computer module. Information can also be limited to read only for certain information sources such as a server, a hard drive, a floppy drive, and others.
In a specific embodiment, the present invention also provides a security feature for the ACM 307. Here, the user of the ACM can be granted access to information in the ACM if the correct security identification information 319 is provided to the combination of ACM and console. Once the correct information is provided, the user can access the information on the hard drive of the ACM, which can be for private use. Other levels of access and security can also be provided depending upon the application.
FIG. 5 is a simplified diagram 500 of a computer module in a console according to an embodiment of the present invention. This diagram is merely an illustration which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The block diagram 500 includes an attached computer module 501 and a peripheral console 503, as well as other elements as desired. These elements have a variety of features such as those noted above, as well as others. In the present diagram, different reference numerals are used to show the operation of the present system.
The block diagram 500 illustrates attached computer module 501. The module 501 has a central processing unit 502, which communicates to a north bridge 541, by way of a CPU bus 527. The north bridge couples to main memory 523 via memory bus 529. The main memory can be any suitable high speed memory device or devices such as dynamic random access memory (“DRAM”) integrated circuits and others. The DRAM includes at least 32 Meg. or 64 Meg. and greater of memory, but can also be less depending upon the application. Alternatively, the main memory can be coupled directly with the CPU in some embodiments. The north bridge also couples to a graphics subsystem 515 via bus 542. The graphics subsystem can include a graphics accelerator, graphics memory, and other devices. Graphics subsystem transmits a video signal to an interface connector, which couples to a display, for example.
The attached computer module also includes a primary hard disk drive 509 that serves as a main memory unit for programs and the like. The hard disk can be any suitable drive that has at least 2 GB and greater. As merely an example, the hard disk is a Marathon 2250 (2.25 GB, 2 ½ inch drive) product made by Seagate Corporation of Scotts Valley, but can be others. The hard disk communicates to the north bridge by way of a hard disk drive controller and bus lines 502 and 531. The hard disk drive controller couples to the north bridge by way of the host PCI bus 531, which connects bus 537 to the north bridge. The hard disk includes computer codes that implement a security program according to the present invention. Details of the security program are provided below.
The attached computer module also has a flash memory device 505 with a BIOS. The flash memory device 505 also has codes for a user password that can be stored in the device. The flash memory device generally permits the storage of such password without a substantial use of power, even when disconnected. As merely an example, the flash memory device has at least 512 kilobits or greater of memory, or 1 megabits or greater of memory. The flash memory device can store a security identification number or the like. The flash memory device is generally non-volatile and can preserve information even when the power is turned off, for example. The flash memory generally has at least 128 kilobits storage cells or more. The flash memory can be any product such as a W29C020 product made by a company called Winbond of Taiwan, but can also be others. The flash memory cell and user identification will be more fully described below in reference to the FIGS. A host interface controller 507 communications to the north bridge via bus 535 and host PCI bus. The host interface controller also has a data control 511. Host interface controller 507 communicates to the console using bus 513, which couples to connection 515.
Peripheral console 503 includes a variety of elements to interface to the module 501, display 551, and network 553. The console forms around south bridge 571, which couples to bus 563, which couples to bus 561. Bus 561 is in communication with network card 555, which is a local area network for Ethernet, for example. South bridge also couples through control 569 to peripheral interface controller 567, which also communicates to bus 561. Peripheral interface controller also couples to host interface controller through connection 515 and bus 513. The peripheral console has a primary removable drive 559 connected to south bridge through bus 575. South bridge also couples to secondary hard disk through bus 577.
In a specific embodiment, the peripheral console also has a serial EEPROM memory device 575, which is coupled to the peripheral interface controller. The memory device can store a security identification number or the like. The memory device is generally non-volatile and can preserve information even when the power is turned off, for example. The memory generally has at least 16 kilobits of storage cells or more. Preferably, the memory device is a 16 kilobit device or 64 megabit device or greater, depending upon the application. The memory can be any product such as a X24320 product made by a company called Xicor, but can also be others. The memory cell and user identification will be more fully described below in reference to the FIGS.
FIG. 6 is a simplified diagram of a security method 600 for a module according to an embodiment of the present invention. This diagram is merely an illustration which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The present method shows an example of how the present security method can be implemented. The present method uses a combination of software 601 and hardware 603, which is in the computer module. A plurality of external devices can be accessed depending upon the embodiment. These external devices include a secondary hard drive 618, a removable drive 619, a network (e.g., LAN, modem) device 621, and others. A keyboard 623 is also shown, which can act locally.
The software 601 includes an operating system 609, application programs 607, and a data security and initialization program 605. Other programs can also exist. Additionally, some of these programs may not exist. Preferably, the data security and initialization program exists. This data security and initialization program is initiated once the attached computer module is inserted into the console. The program interface and oversees a variety of hardware features, which will be used to control access to the external devices, for example. Of course, the particular configuration of the software will depend upon the application.
Hardware features can be implemented using a primary hard disk 611 coupled to a CPU/cache combination, which includes a main memory. The main memory is often a volatile memory such as dynamic random access memory. Data from any one of the external devices can enter the CPU/cache combination. For example, the secondary hard disk memory and I/O address range data is transferred 624 to the CPU/cache combination. The removable drive memory and I/O address range data can also transfer 625 to the CPU/cache combination. The LAN memory and 1/0 address range data can also transfer 626 to the CPU/cache combination. Keyboard data can also transfer 627 to the CPU/cache combination. To write data from the module into any one of these external elements, the data security program interfaces with the data detection and control circuit to determine of such data should be transferred to any one of the external elements. As noted, the external elements include, among others, secondary hard disk, and removable drive. Here, the data security program checks the security identification number with other numbers to determine the security access level. There are many other ways that the present invention can be implemented. These methods are described more fully below.
FIG. 7 is a simplified diagram 700 of a method according to an embodiment of the present invention. This diagram is merely an illustration which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. The present method begins at power up, which is step 701. The present method reads a security code, which has been entered by a user, for example, in step 703. The security code can be a string of characters, including numbers and letters. The security code is preferably a mixture of numbers and letters, which are at least about 6 characters in length, but is not limited.
The present method reads (step 703) the security code, which has been entered. Next, the security code is compared with a stored code, which is in flash memory or the like (step 705). If the compared code matches with the stored code, the method resumes to step 708. Alternatively, the method goes to step 707 via branch 706 where no access is granted. When no access is granted, all data are blocked out from the user that attempts to log onto the system. Alternatively, the method determines if a certain level of access is granted, step 708. Depending upon the embodiment, the present method can grant full access, step 710, via branch 716. The present method allows full access based upon information stored in the flash memory device. Alternatively, the method can allow the user to access a limited amount of information.
Here, the present method allows for at least one or more than two levels of access. In a specific embodiment, the present method allows for the user of the module to access peripheral storage (step 711). The access privilege is read-only. The user can read information on the peripheral storage including hard disks and the like. Once the user accesses the storage, the method data control, step 719, takes over, where the hardware prevents the user from accessing other information, step 721. In a specific embodiment, the method can allow information to be removed from the peripheral storage. If the method allows for data to be removed, step 723, the method goes through branch 731 to let data out, which can occur through the module. Alternatively, the method goes to block data (step 725) via branch 733. Depending upon the embodiment, the method returns to the decision block, step 723. Alternatively, the method traverses branch 714 to a peripheral read-only process, step 712. The read-only process programs data control, step 713. Next, the hardware takes over (step 715). The method blocks all data from being accessed by the user, step 717.
FIG. 8 is a simplified diagram of a system 800 according to an alternative embodiment of the present invention. This diagram is merely an example which should not limit the scope of the claims herein. One of ordinary skill in the art would recognize many other variations, modifications, and alternatives. The system 800 includes an attached computer module 801, which can be inserted into one of a plurality of console devices to create a “plug and play” operation. For example, the console device can be peripheral console 801 or peripheral console 805. Each peripheral console can have similar or different connection characteristics. Peripheral console 803 couples to a local area network using Ethernet 817. Peripheral console 805 couples to a DSL line 827 through a DSL modem 825. Other consoles can also be included to use other types of networks such as ADSL, Cable Modem, wireless, Token Ring, and the like.
As shown, the attached computer module has elements such as a memory region 807, which stores BIOS information, a security code, and a security identification number on a flash memory device or the like. The memory region couples to a central processing region 809, which can include CPU, chipset, cache memory, graphics, and a hard disk drive, as well as other features. The central processing region couples to a host interface controller, which interfaces the attached computer module to one of the peripheral consoles. Any of the above information can also be included in the attached computer module.
Each peripheral console also has a variety of elements. These elements include a region 813, 821, which has a flash memory device with a security identification number, a password, access information, access privileges, internet service provider access information, as well as other features, which were previously noted. The peripheral console also has an interface controller 815, 823, which couples region 813, 821, respectively to a networking device 817, 825. The networking device can be an Ethernet card 817, which allows communication to the local area network 819. Alternatively, the networking device can be a DSL modem 825, which allows communication to a DSL (or ADSL) phone line. Other types of networking device can also be used, depending upon the application.
Each console provides a selected connection based upon set of predefined factors. These factors include communication hardware information so that software in attached computer module can read and allow a connection to a network. Here, access information can be provided to the user. Information about connection information will also be included. This connection information includes telephone numbers, account numbers, passwords (local), or a company password. The console and module combination will take care of charges, etc. based upon time bases. Module will have credit card information, but will have security. In a specific embodiment, the module inserts into the console. The module then asks the console which hardware will be used. If the hardware is an Ethernet connect, the module configures connection information to access the Ethernet connection. Alternatively, if the hardware requires a DSL connection, the module configures connection information to access the DSL connection. Other configuration information such as company server information, password, can also be provided.
A personal computer system that comprises two physically separate units and the interconnection between them is disclosed. The first unit, an attached computing module (ACM), contains the core computing power and environment for a computer user. The second unit, a peripheral console (PCON), contains the power supply and primary input and output devices for the computer system. An ACM and a PCON are coupled with one another to form a fully functional personal computer system.
FIG. 9 depicts a notebook computer PCON configuration. The opening of the computer bay 992 is visible at the side of the PCON unit 900. The PCON 900 provides an integrated LCD display panel 910 as the user's primary display device. The PCON 900 provides an integrated keyboard 922 as the user's primary input device.
FIG. 10 is a block diagram of the components in one computer system. The computer system comprises an attached computer module (ACM) 1000, a peripheral console (PCON) 1001, and the interconnection apparatus 1003 between them. The ACM 1000 includes the central processing unit (CPU) 1010, system memory 1020, high performance devices 1050, primary mass storage 1030, and related interface and support circuitry 1040. The PCON 1001 includes primary display 1011, primary input 1021, secondary mass storage 1051, other devices 1061, expansion slots 1071, the primary power supply 1031, and related interface and support circuitry 1041. The interconnection apparatus 1003 includes circuitry to convey power and operational signals between the ACM 1000 and PCON 1001.
Within the ACM 1000, the CPU 1010 executes instructions and manipulates data stored in the system memory 1020. The CPU 1010 and system memory 1020 represent the user's core computing power. The core computing power may also include high performance devices 1050 such as advanced graphics processor chips that greatly increase overall system performance and which, because of their speed, need to be located close to the CPU 1010. The primary mass storage 1030 contains persistent copies of the operating system software, application software, configuration data, and user data. The software and data stored in the primary mass storage device 1030 represent the user's computing environment. Interface and support circuitry 1040 primarily includes interface chips and signal busses that interconnect the CPU 1010, system memory 1020, high performance devices 1050, and primary mass storage 1030. The interface and support circuitry 1040 also connects ACM-resident components with the ACM-to-PCON interconnection apparatus 1003 as needed.
Within the PCON 1001, the primary display component 1011 may include an integrated display device or connection circuitry for an external display device. This primary display device 1011 may be, for example, an LCD, plasma, or CRT display screen used to display text and graphics to the user for interaction with the operating system and application software. The primary display component 1011 is the primary output of the computer system, i.e., the paramount vehicle by which programs executing on the CPU 1010 can communicate toward the user.
The primary input component 1021 of the PCON 1001 may include an integrated input device or connection circuitry for attachment to an external input device. The primary input 1021 may be, for example, a keyboard, touch screen, keypad, mouse, trackball, digitizing pad, or some combination thereof to enable the user to interact with the operating system and application software. The primary input component 1021 is the paramount vehicle by which programs executing on the CPU 1010 receive signals from the user.
The PCON 1001 may contain secondary mass storage 1051 to provide additional high capacity storage for data and software. Secondary mass storage 1051 may have fixed or removable media and may include, for example, devices such as diskette drives, hard disks, CD-ROM drives, DVD drives, and tape drives.
The PCON 1001 may be enhanced with additional capability through the use of integrated “Other Devices” 1061 or add-on cards inserted into the PCON's expansion slots 1071. Examples of additional capability include sound generators, LAN connections, and modems. Interface and support circuitry 1041 primarily includes interface chips, driver chips, and signal busses that interconnect the other components within the PCON 1001. The interface and support circuitry 1041 also connects PCON-resident components with the ACM-to-PCON interconnection apparatus 1003 as needed.
Importantly, the PCON 1001 houses the primary power supply 1031. The primary power supply 1031 has sufficient capacity to power both the PCON 1001 and the ACM 1000 for normal operation. Note that the ACM 1000 may include a secondary “power supply” in the form, for example, of a small battery. Such a power supply would be included in the ACM 1000 to maintain, for example, a time-of-day clock, configuration settings when the ACM 1000 is not attached to a PCON, or machine state when moving an active ACM immediately from one PCON to another. The total energy stored in such a battery would, however, be insufficient to sustain operation of the CPU 1010 at its rated speed, along with the memory 1020 and primary mass storage 1030, for more than a fraction of an hour, if the battery were able to deliver the required level of electrical current at all.
FIG. 11 is a block diagram of an attached computing module (ACM) 1100. The physical ACM package 1100 contains the ACM functional components 1101 and the ACM side of the ACM-to-PCON Interconnection 1700. The ACM 1101 comprises a CPU component 1110, a system memory component 1120, a primary mass storage component 1130, a high performance devices components 1150, and an interface and support component 1140.
The ACM side of the ACM-to-PCON Interconnection 1700 comprises a Host Interface Controller (HIC) component 1720 and an ACM connector component 1730. The HIC 1720 and connector 1730 components couple the ACM functional components 1100 with the signals of an ACM-to-PCON interface bus 1710 used to operatively connect an ACM with a PCON. The ACM-to-PCON interface bus 1710 comprises conveyance for electrical power 1714 and signals for a peripheral bus 1712, video 1716, video port 1717, and console type 1718. The preferred ACM-to-PCON Interconnection 1700 is described in detail in a companion U.S. patent application Ser. No. 09/149,882, entitled “A Communication Channel and Interface Devices for Bridging Computer Interface Buses,” by the same inventor, filed on Sep. 8, 1998, and hereby incorporated by reference. The preferred ACM-to-PCON interconnection 1700 includes circuitry to transmit and receive parallel bus information from multiple signal paths as a serial bit stream on a single signal path. This reduces the number of physical signal paths required to traverse the interconnection 1700. Further, employing low-voltage differential signaling (LVDS) on the bit stream data paths provides very reliable, high-speed transmission across cables. This represents a further advantage of the present invention.
Clocking circuitry 1144 generates clock signals for distribution to other components within the ACM 1100 that require a timing and synchronization clock source. The CPU 1110 is one such component. Often, the total power dissipated by a CPU is directly proportional to the frequency of its main clock signal. The presently described embodiment of the ACM 1100 includes circuitry that can vary the frequency of the main CPU clock signal conveyed to the CPU 1110 via signal path 1162, in response to a signal received from the host interface controller (HIC) 1720 via signal path 1161. The generation and variable frequency control of clocking signals is well understood in the art. By varying the frequency, the power consumption of the CPU 1110 (and thus the entire ACM 1100) can be varied.
The variable clock rate generation may be exploited to match the CPU power consumption to the available electrical power. Circuitry in the host interface controller (HIC) 1720 of the presently described embodiment adjusts the frequency control signal sent via signal path 1161 to the clocking circuitry 1144, based on the “console type” information signal 1718 conveyed from the peripheral console (PCON) by the CPU-to-PCON interconnection 1700.
FIG. 12 is a block diagram of a peripheral console (PCON). A peripheral console couples with an ACM to form an operating personal computer system. The peripheral console (PCON) supplies an ACM with primary input, display, and power supply; the ACM supplies the core computing power and environment of the user. In the presently described embodiment the physical PCON package 1200 contains the PCON functional components 1201 and the PCON side of the ACM-to-PCON Interconnection 1800. The PCON functional components 1201 comprise primary display 1210, a primary input 1220, a primary power supply 1230, interface and support 1240, secondary mass storage 1250, other devices 1260, and expansion slots 1270.
The PCON side of the ACM-to-PCON Interconnection 1800 comprises a Peripheral Interface Controller (PIC) component 1840, a PCON connector component 1850, console-type component 1842, and flash memory device 1848. The PIC 1840 and connector 1850 components couple the PCON functional components 1201 with the signals of an ACM-to-PCON interface bus 1810 used to operatively connect an ACM with a PCON. The ACM-to-PCON interface bus 1810 comprises conveyance for electrical power 1814 and signals for a peripheral bus 1812, video 1816, video port 1817, and console-type 1818. The preferred ACM-to-PCON Interconnection 1800 is described in detail in the U.S. patent application entitled “A Communication Channel and Interface Devices for Bridging Computer Interface Buses,” already incorporated herein by reference.
Connector component 1850 may be selected to mate directly with the connector component 1730 of an ACM (shown in FIG. 11). Alternatively, connector component 1850 may be selected to mate with, for example, the connector on one end of a cable intervening between the PCON and an ACM in a particular embodiment. The ACM-to-PCON interconnection described in the aforementioned companion patent application has the advantage of providing reliable signal conveyance across low cost cables.
Flash memory device 1848 provides non-volatile storage. This storage may be accessible to devices in both the ACM and the PCON, including the host interface controller and the peripheral interface controller 1840 to which it is connected. As such, flash memory 1848 may be used to store configuration and security data to facilitate an intelligent mating between an ACM and a PCON that needs no participation of the CPU.
The secondary mass storage component 1250 of the PCON functional circuitry 1201 of the presently described embodiment comprises diskette drive 1254, hard disk drive 1252, and CD-ROM drive 1256. Secondary mass storage 1250 generally provides low-cost, non-volatile storage for data files which may include software program files. Data files stored on secondary mass storage 1250 are not part of a computer user's core computing power and environment. Secondary mass storage 1250 may be used to store, for example, seldom used software programs, software programs that are used only with companion hardware devices installed in the same peripheral console 1200, or archival copies of data files that are maintained in primary mass storage 1130 of an ACM (shown in FIG. 11). Storage capacities for secondary mass storage 1250 devices may vary from the 1.44 megabytes of the 3.5-inch high density diskette drive 1254, to more than 10 gigabytes for a large format (5-inch) hard disk drive 1252. Hard disk drive 1252 employs fixed recording media, while diskette drive 1254 and CD-ROM drive 1256 employ removable media. Diskette drive 1254 and hard disk drive 1252 support both read and write operations (i.e., data stored on their recording media may be both recalled and modified) while CD-ROM drive 1256 supports only read operations.
Two PCI or PCI-like buses are interfaced using a non-PCI or non-PCI-like channel. PCI control signals are encoded into control bits, and the control bits, rather than the control signals that they represent, and are transmitted on the interface channel. At the receiving end, the control bits representing control signals are decoded back into PCI control signals prior to being transmitted to the intended PCI bus.
The fact that control bits rather than control signals are transmitted on the interface channel allows using a smaller number of signal channels and a correspondingly small number of conductive lines in the interface channel than would otherwise be possible. This is because the control bits can be more easily multiplexed at one end of the interface channel and recovered at the other end than control signals. This relatively small number of signal channels used in the interface channel allows using LVDS channels for the interface. As mentioned above, an LVDS channel is more cable friendly, faster, consumes less power, and generates less noise than a PCI bus channel. Therefore, an LVDS channel is advantageously used for the hereto unused purpose of interfacing PCI or PCI-like buses. The relatively smaller number of signal channels in the interface also allows using connectors having smaller pins counts. As mentioned above an interface having a smaller number of signal channels and, therefore, a smaller number of conductive lines is less bulky and less expensive than one having a larger number of signal channels. Similarly, connectors having a smaller number of pins are also less expensive and less bulky than connectors having a larger number of pins.
In one embodiment, the present invention encompasses an apparatus for bridging a first computer interface bus and a second computer interface bus, in a microprocessor based computer system where each of the first and second computer interface buses have a number of parallel multiplexed address/data bus lines and operate at a clock speed in a predetermined clock speed range having a minimum clock speed and a maximum clock speed. The apparatus comprises an interface channel having a clock channel and a plurality of bit channels for transmitting bits; a first interface controller coupled to the first computer interface bus and to the interface channel to encode first control signals from the first computer interface bus into first control bits to be transmitted on the interface channel and to decode second control bits received from the interface channel into second control signals to be transmitted to the first computer interface bus; and a second interface controller coupled to the interface channel and the second computer interface bus to decode the first control bits from the interface channel into third control signals to be transmitted on the second computer interface bus and to encode fourth control signals from the second computer interface bus into the second control bits to be transmitted on the interface channel.
In one embodiment, the first and second interface controllers comprise a host interface controller (HIC) and a peripheral interface controller (PIC), respectively, the first and second computer interface buses comprise a primary PCI and a secondary PCI bus, respectively, and the interface channel comprises an LVDS channel.
In a preferred embodiment, the interface channel has a plurality of serial bit channels numbering fewer than the number of parallel bus lines in each of the PCI buses and operates at a clock speed higher than the clock speed at which any of the bus lines operates. More specifically, the interface channel includes two sets of unidirectional serial bit channels which transmit data in opposite directions such that one set of bit channels transmits serial bits from the HIC to the PIC while the other set transmits serial bits from the PIC to the HIC. For each cycle of the PCI clock, each bit channel of the interface channel transmits a packet of serial bits.
The HIC and PIC each include a bus controller to interface with the first and second computer interface buses, respectively, and to manage transactions that occur therewith. The HIC and PIC also include a translator coupled to the bus controller to encode control signals from the first and second computer interface buses, respectively, into control bits and to decode control bits from the interface channel into control signals. Additionally, the HIC and PIC each include a transmitter and a receiver coupled to the translator. The transmitter converts parallel bits into serial bits and transmits the serial bits to the interface channel. The receiver receives serial bits from the interface channel and converts them into parallel bits.
FIG. 13 is a block diagram of one embodiment of a computer system 1300 using the interface of the present invention. Computer system 1300 includes an attached computer module (ACM) 1305 and a peripheral console 1310, which are described in greater detail in the application of William W. Y. Chu, Ser. No. 09/149,548, for “Personal Computer Peripheral Console With Attached Computer Module” filed on Sep. 8, 1998 and incorporated herein by reference. The ACM 1305 and the peripheral console 1310 are interfaced through an exchange interface system (XIS) bus 1315. The XIS bus 1315 includes power bus 1316, video bus 1317 and peripheral bus (XPBus) 1318, which is also herein referred to as an interface channel. The power bus 1316 transmits power between ACM 1305 and peripheral console 1310. In a preferred embodiment power bus 1316 transmits power at voltage levels of 3.3 volts, 5 volts and 12 volts. Video bus 1317 transmits video signals between the ACM 1305 and the peripheral console 1310. In a preferred embodiment, the video bus 1317 transmits analog Red Green Blue (RGB) video signals for color monitors, digital video signals (such as Video Electronics Standards Association (VESA) Plug and Display's Transition Minimized Differential Signaling (TMDS) signals for flat panel displays), and television (TV) and/or super video (S-video) signals. The XPBus 1318 is coupled to host interface controller (HIC) 1319 and to peripheral interface controller (PIC) 1320, which is also sometimes referred to as a bay interface controller.
In the embodiment shown in FIG. 13, HIC 1319 is coupled to an integrated unit 1321 that includes a CPU, a cache and a north bridge. In another embodiment, such as that shown in FIG. 17, the CPU 1705 and north bridge 1710 are separate rather than integrated units. In yet another embodiment, such as that shown in FIG. 18, the HIC and PIC are integrated with the north and south bridges, respectively, such that integrated HIC and north bridge unit 1805 includes an HIC and a north bridge, while integrated PIC and south bridge unit 1810 includes a PIC and a south bridge. FIG. 19 shows an attached computer module with integrated CPU/NB/Graphics 1915 and Integrated HIC/SB 1920. FIG. 20 shows an attached computer module with single chip 2025 fully integrated: CPU, Cache, Core Logic, Graphics controller and Interface controller.
FIG. 14 is a detailed block diagram of one embodiment of the HIC of the present invention. As shown in FIG. 14, HIC 1600 comprises bus controller 1610, translator 1620, transmitter 1630, receiver 1640, a PLL 1650, an address/data multiplexer (A/D MUX) 1660, a read/write controller (RD/WR Cntl) 1670, a video serial to parallel converter 1680 and a CPU control & general purpose input/output latch/driver (CPU CNTL & GPIO latch/driver) 1690.
HIC 1600 is coupled to an optional flash memory BIOS configuration unit 1601. Flash memory unit 1601 stores basic input output system (BIOS) and PCI configuration information and supplies the BIOS and PCI configuration information to A/D MUX 1660 and RD/WR Control 1670, which control the programming, read, and write of flash memory unit 1601.
Bus controller 1610 is coupled to the host PCI bus, which is also referred to herein as the primary PCI bus, and manages PCI bus transactions on the host PCI bus. Bus controller 1610 includes a slave (target) unit 1611 and a master unit 1616. Both slave unit 1611 and master unit 1616 each include two first in first out (FIFO) buffers, which are preferably asynchronous with respect to each other since the input and output of the two FIFOs in the master unit 1616 as well as the two FIFOs in the slave unit 1611 are clocked by different clocks, namely the PCI clock and the PCK. Additionally, slave unit 1611 includes encoder 1622 and decoder 1623, while master unit 1616 includes encoder 1627 and decoder 1628. The FIFOs 1612, 1613, 1617 and 1618 manage data transfers between the host PCI bus and the XPBus, which in the embodiment shown in FIG. 14 operate at 33 MHz and 66 MHz, respectively. PCI address/data (AD) from the host PCI bus is entered into FIFOs 1612 and 1617 before they are encoded by encoders 1622 and 1627. Encoders 1622 and 1627 format the PCI address/data bits to a form more suitable for parallel to serial conversion prior to transmittal on the XPBus. Similarly, address and data information from the receivers is decoded by decoders 1623 and 1628 to a form more suitable for transmission on the host PCI bus.
The multiplexed parallel A/D bits and some control bits input to transmitter 1630 are serialized by parallel to serial converters 1632 of transmitter 1630 into 10 bit packets. These bit packets are then output on data lines PD0 to PD3 of the XPBus. Other control bits are serialized by parallel to serial converter 1633 into 10 bit packets and sent out on control line PCN of the XPBus.
FIG. 15 is a detailed block diagram of one embodiment of the PIC of the present invention. PIC 11100 is nearly identical to HIC 1600 in its function, except that HIC 1600 interfaces the host PCI bus to the XPBus while PIC 11100 interfaces the secondary PCI bus to the XPBus. Similarly, the components in PIC 11100 serve the same function as their corresponding components in HIC 1600. Reference numbers for components in PIC 11100 have been selected such that a component in PIC 11100 and its corresponding component in HIC 1600 have reference numbers having the same two least significant digits. Thus for example, the bus controller in PIC 11100 is referenced as bus controller 11110 while the bus controller in HIC 1600 is referenced as bus controller 1610. As many of the elements in PIC 11100 serve the same functions as those served by their corresponding elements in HIC 1600 and as the functions of the corresponding elements in HIC 1600 have been described in detail above, the function of elements of PIC 11100 having corresponding elements in HIC 1600 will not be further described herein. Reference may be made to the above description of FIG. 14 for an understanding of the functions of the elements of PIC 11100 having corresponding elements in HIC 1600.
FIG. 16 is a schematic diagram of lines PCK, PD0 to PD3, and PCN. These lines are unidirectional LVDS lines for transmitting clock signals and bits from the HIC to the PIC. The bits on the PD0 to PD3 and the PCN lines are sent synchronously within every clock cycle of the PCK. Another set of lines, namely PCKR, PDR0 to PDR3, and PCNR, are used to transmit clock signals and bits from the PIC to HIC. The lines used for transmitting information from the PIC to the HIC have the same structure as those shown in FIG. 16, except that they transmit data in a direction opposite to that in which the lines shown in FIG. 16 transmit data. In other words they transmit information from the PIC to the HIC. The bits on the PDR0 to PDR3 and the PCNR lines are sent synchronously within every clock cycle of the PCKR. Some of the examples of control information that may be sent in the reverse direction, i.e., on PCNR line, include a request to switch data bus direction because of a pending operation (such as read data available), a control signal change in the target requiring communication in the reverse direction, target busy, and transmission error detected.
The XPBus which includes lines PCK, PD0 to PD3, PCN, PCKR, PDR0 to PDR3, and PCNR, has two sets of unidirectional lines transmitting clock signals and bits in opposite directions. The first set of unidirectional lines includes PCK, PD0 to PD3, and PCN. The second set of unidirectional lines includes PCKR, PDR0 to PDR3, and PCNR. Each of these unidirectional set of lines is a point-to-point bus with a fixed transmitter and receiver, or in other words a fixed master and slave bus. For the first set of unidirectional lines, the HIC is a fixed transmitter/master whereas the PIC is a fixed receiver/slave. For the second set of unidirectional lines, the PIC is a fixed transmitter/master whereas the HIC is a fixed receiver/slave. The LVDS lines of XPBus, a cable friendly and remote system I/O bus, transmit fixed length data packets within a clock cycle.
The XPBus lines, PD0 to PD3, PCN, PDR0 to PDR3 and PCNR, and the video data and clock lines, VPD and VPCK, are not limited to being LVDS lines, as they may be other forms of bit based lines. For example, in another embodiment, the XPBus lines may be IEEE 1394 lines.
It is to be noted that although each of the lines PCK, PD0 to PD3, PCN, PCKR, PDR0 to PDR3, PCNR, VPCK, and VPD is referred to as a line, in the singular rather than plural, each such line may contain more than one physical line. For example, in the embodiment shown in FIG. 16, each of lines PCK, PD0 to PD3 and PCN includes two physical lines between each driver and its corresponding receiver. The term line, when not directly preceded by the terms physical or conductive, is herein used interchangeably with a signal or bit channel of one or more physical lines for transmitting a signal. In the case of non-differential signal lines, generally only one physical line is used to transmit one signal. However, in the case of differential signal lines, a pair of physical lines is used to transmit one signal. For example, a pair of physical lines together transmit a signal in a bit line or bit channel in an LVDS or IEEE 1394 interface.
A bit based line (i.e., a bit line) is a line for transmitting serial bits. Bit based lines typically transmit bit packets and use a serial data packet protocol. Examples of bit lines include an LVDS line, an IEEE 1394 line, and a Universal Serial Bus (USB) line.
Although the functionality above has been generally described in terms of a specific sequence of steps, other steps can also be used. Here, the steps can be implemented in a combination of hardware, firmware, and software. Either of these can be further combined or even separated. Depending upon the embodiment, the functionality can be implemented in a number of different ways without departing from the spirit and scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives.
While the above is a full description of the specific embodiments, various modifications, alternative constructions and equivalents may be used. Therefore, the above description and illustrations should not be taken as limiting the scope of the present invention which is defined by the appended claims.

Claims (45)

1. A security protection method for a computer module, said method comprising:
inserting the computer module into a console;
initiating a security program in said module to read a security identification of said console and to read a security identification of said computer module;
determining of a predetermined security status based upon a relationship of said console identification and said computer module identification;
selecting said predetermined security status; and
operating said computer module based upon said security status.
2. The method of claim 1 wherein said predetermined security status disables a network access to the computer module.
3. The method of claim 1 wherein said predetermined security status disables a secondary storage of information from said computer module to substantially prevent information to be transferred from a memory of the computer module to said secondary storage.
4. The method of claim 1 wherein said security program is provided in a system BIOS.
5. The method of claim 1 wherein said step of initiating reads said security identification of said computer module from a flash memory device.
6. The method of claim 1 wherein said step of initiating reads said security identification of said console from a flash memory device.
7. The method of claim 1 wherein said console is selected from a desktop home computing device, an office desktop computing device, a mobile computing device, a television sot-top computing device, and a co-worker's computing device.
8. A system for secured information transactions, the system comprising:
a console comprising a peripheral controller housed in the console;
a user identification input device coupled to the peripheral controller, the user identification input device being provided for user identification data; and
an attached computer module coupled to the console, the attached computer module comprising a security memory device stored with the user identification data.
9. The system of claim 8 wherein the user identification input device is a finger print reader.
10. The system of claim 8 wherein the user identification input device is a voice processing device.
11. A method for operating a module computer into one of a plurality of network systems, the method comprising:
providing a computer module, the module comprising a connection program;
inserting the computer module into a computer console, the computer console having access to a network;
receiving connection information from the computer console;
configuring the connection program to adapt to the connection information; and
establish a connection between the computer module and a server coupled to the network.
12. The method of claim 11 wherein the connection information comprises a connection protocol for providing the connection.
13. The method of claim 12 wherein the connection protocol is selected from TCP/IP, or mobile IP.
14. A system for information transactions, the system comprising:
a console comprising
a power supply connection, and
a first low voltage differential signal (LVDS) channel comprising two sets of unidirectional, serial bit channels to convey address and data bits of Peripheral Component Interface (PCI) bus transaction in opposite directions; and
a computer module configured to couple to the console, the computer module comprising
a central processing unit (CPU) comprising an interface controller integrated with the CPU as a single chip,
a main memory directly coupled to the CPU,
a mass storage device directly coupled to the CPU, and
a second LVDS channel directly extending from the CPU, the second LVDS channel comprising two sets of unidirectional, serial bit channels to convey data in opposite directions,
wherein the CPU is configured to couple to the console through the second LVDS channel, and
wherein the computer module is configured to receive power from the power supply connection upon coupling of the computer module to the console.
15. The system of claim 14, wherein the computer module is configured to couple to the console as a “plug and play” operation.
16. The system of claim 14, wherein the interface controller is configured to output a serial bit stream that is conveyed over the second LVDS channel.
17. The system of claim 16, wherein the serial bit stream comprises address and data bits of PCI bus transaction.
18. The system of claim 16, wherein the serial bit stream comprises information of Universal Serial Bus protocol.
19. The system of claim 14, wherein the console further comprises an enclosure with a connector on one side, and the connector is coupled to the first LVDS channel.
20. The system of claim 19, wherein the first LVDS channel is configured to couple to the second LVDS channel upon coupling of the computer module to the connector.
21. A system for information transactions, the system comprising:
a computer module configured to couple to a console, the computer module comprising
a central processing unit (CPU) comprising an interface controller integrated with the CPU as a single chip,
a main memory directly coupled to the CPU, and
a low voltage differential signal (LVDS) channel directly extending from the interface controller, the LVDS channel comprising two sets of unidirectional, serial bit channels to convey data in opposite directions,
wherein the CPU is configured to couple to the console through the LVDS channel.
22. The system of claim 21, further comprising the console comprising a power supply connection, and the computer module is configured to receive power from the power supply connection upon coupling of the computer module to the console.
23. The system of claim 21, further comprising the console comprising a Liquid Crystal Display.
24. The system of claim 23, wherein the computer module further comprises a graphics controller configured to couple to the Liquid Crystal Display upon coupling of the computer module to the console.
25. The system of claim 24, wherein the graphics controller is configured to output video data that is conveyed to the Liquid Crystal Display upon coupling of the computer module to the console.
26. The system of claim 25, wherein the computer module further comprises an enclosure with a connector on one side, the connector is coupled to the LVDS channel, and the CPU is configured to couple to the console through the connector.
27. The system of claim 26, wherein the connector is coupled to the graphics controller to convey the video data.
28. The system of claim 21, wherein the interface controller is configured to output address and data bits of PCI bus transaction in serial form that are conveyed over the LVDS channel.
29. The system of claim 21, wherein the interface controller is configured to output data packets of Universal Serial Bus protocol that are conveyed over the LVDS channel.
30. A system for information transactions, the system comprising:
a computer module configured to couple to a console, the computer module comprising
a central processing unit (CPU) comprising a serial interface and a graphics controller integrated with the CPU as a single chip, the serial interface configured to transmit and receive serial bits of bus transaction,
a main memory coupled to the CPU, and
a low voltage differential signal (LVDS) channel comprising at least two unidirectional, serial bit channels to convey data in opposite directions, the LVDS channel directly extending from the CPU to convey the serial bits of bus transaction as data packets,
wherein the computer module is configured to couple to the console through the LVDS channel.
31. The system of claim 30, further comprising the console comprising a user identification input device to provide user identification data.
32. The system of claim 31, wherein the computer module further comprises a memory device to store the user identification data.
33. The system of claim 30, wherein the computer module is configured to couple to the console as a “plug and play” operation.
34. The system of claim 30, wherein the serial bits comprise address and data bits of PCI bus transaction.
35. The system of claim 30, wherein the serial bits comprise information of Universal Serial Bus protocol.
36. The system of claim 30, wherein the computer module further comprises an enclosure with a connector on one side, the connector is coupled to the LVDS channel, and the computer module is configured to couple to the console through the connector.
37. The system of claim 36, wherein the connector is coupled to the graphics controller to convey video data.
38. A system for information transactions, the system comprising:
a console comprising a first interface controller; and
a computer module configured to couple to the console, the computer module comprising
a central processing unit (CPU) comprising a second interface controller integrated with the CPU as a single chip,
a main memory coupled to the CPU,
a mass storage device coupled to the CPU, the mass storage device comprising a flash memory device to store security identification data and code to provide password protection, and
a low voltage differential signal (LVDS) channel directly extending from the second interface controller, the LVDS channel comprising at least two unidirectional, serial bit channels to convey data in opposite directions,
wherein the CPU is configured to couple to the console through the LVDS channel, and
wherein the first interface controller and the second interface controller are configured to convey data between the mass storage device and the console.
39. The system of claim 38, wherein the mass storage device is directly coupled to the CPU.
40. The system of claim 38, wherein the first interface controller is configured to couple to the second interface controller through the LVDS channel.
41. The system of claim 40, wherein the second interface controller is configured to output a serial bit stream that is conveyed over the LVDS channel.
42. The system of claim 41, wherein the serial bit stream comprises address and data bits of PCI bus transaction.
43. The system of claim 42, wherein the computer module further comprises an enclosure with a connector on one side, the connector is coupled to the LVDS channel to convey the serial bit stream of PCI bus transaction, and the computer module is configured to couple to the console through the connector.
44. The system of claim 41, wherein the serial bit stream comprises information of Universal Serial Bus protocol.
45. The system of claim 38, wherein the computer module is configured to couple to the console as a “plug and play” operation.
US13/294,108 1999-05-14 2011-11-10 Data security method and device for computer modules Expired - Lifetime USRE43602E1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US13/294,108 USRE43602E1 (en) 1999-05-14 2011-11-10 Data security method and device for computer modules
US13/562,210 USRE44468E1 (en) 1999-05-14 2012-07-30 Data security method and device for computer modules
US13/649,078 USRE44654E1 (en) 1999-05-14 2012-10-10 Data security method and device for computer modules
US13/899,484 USRE44739E1 (en) 1999-05-14 2013-05-21 Data security method and device for computer modules
US14/087,640 USRE46947E1 (en) 1999-05-14 2013-11-22 Data security method and device for computer modules
US14/109,749 USRE45140E1 (en) 1999-05-14 2013-12-17 Data security method and device for computer modules

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/312,199 US6643777B1 (en) 1999-05-14 1999-05-14 Data security method and device for computer modules
US11/056,604 USRE41092E1 (en) 1999-05-14 2005-02-10 Data security method and device for computer modules
US13/294,108 USRE43602E1 (en) 1999-05-14 2011-11-10 Data security method and device for computer modules

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US09/312,199 Reissue US6643777B1 (en) 1999-05-14 1999-05-14 Data security method and device for computer modules
US12/561,138 Continuation USRE42984E1 (en) 1999-05-14 2009-09-16 Data security method and device for computer modules

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US09/312,199 Continuation US6643777B1 (en) 1999-05-14 1999-05-14 Data security method and device for computer modules
US13/562,210 Continuation USRE44468E1 (en) 1999-05-14 2012-07-30 Data security method and device for computer modules

Publications (1)

Publication Number Publication Date
USRE43602E1 true USRE43602E1 (en) 2012-08-21

Family

ID=29270405

Family Applications (10)

Application Number Title Priority Date Filing Date
US09/312,199 Ceased US6643777B1 (en) 1999-05-14 1999-05-14 Data security method and device for computer modules
US11/056,604 Expired - Lifetime USRE41092E1 (en) 1999-05-14 2005-02-10 Data security method and device for computer modules
US11/545,056 Expired - Lifetime USRE43171E1 (en) 1999-05-14 2006-10-06 Data security method and device for computer modules
US12/561,138 Expired - Lifetime USRE42984E1 (en) 1999-05-14 2009-09-16 Data security method and device for computer modules
US13/294,108 Expired - Lifetime USRE43602E1 (en) 1999-05-14 2011-11-10 Data security method and device for computer modules
US13/562,210 Expired - Lifetime USRE44468E1 (en) 1999-05-14 2012-07-30 Data security method and device for computer modules
US13/649,078 Ceased USRE44654E1 (en) 1999-05-14 2012-10-10 Data security method and device for computer modules
US13/899,484 Expired - Lifetime USRE44739E1 (en) 1999-05-14 2013-05-21 Data security method and device for computer modules
US14/087,640 Expired - Lifetime USRE46947E1 (en) 1999-05-14 2013-11-22 Data security method and device for computer modules
US14/109,749 Expired - Lifetime USRE45140E1 (en) 1999-05-14 2013-12-17 Data security method and device for computer modules

Family Applications Before (4)

Application Number Title Priority Date Filing Date
US09/312,199 Ceased US6643777B1 (en) 1999-05-14 1999-05-14 Data security method and device for computer modules
US11/056,604 Expired - Lifetime USRE41092E1 (en) 1999-05-14 2005-02-10 Data security method and device for computer modules
US11/545,056 Expired - Lifetime USRE43171E1 (en) 1999-05-14 2006-10-06 Data security method and device for computer modules
US12/561,138 Expired - Lifetime USRE42984E1 (en) 1999-05-14 2009-09-16 Data security method and device for computer modules

Family Applications After (5)

Application Number Title Priority Date Filing Date
US13/562,210 Expired - Lifetime USRE44468E1 (en) 1999-05-14 2012-07-30 Data security method and device for computer modules
US13/649,078 Ceased USRE44654E1 (en) 1999-05-14 2012-10-10 Data security method and device for computer modules
US13/899,484 Expired - Lifetime USRE44739E1 (en) 1999-05-14 2013-05-21 Data security method and device for computer modules
US14/087,640 Expired - Lifetime USRE46947E1 (en) 1999-05-14 2013-11-22 Data security method and device for computer modules
US14/109,749 Expired - Lifetime USRE45140E1 (en) 1999-05-14 2013-12-17 Data security method and device for computer modules

Country Status (1)

Country Link
US (10) US6643777B1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE44933E1 (en) 1998-10-30 2014-06-03 Acqis Llc Password protected modular computer method and device
USRE45140E1 (en) 1999-05-14 2014-09-16 Acqis Llc Data security method and device for computer modules
US20140281277A1 (en) * 2013-03-15 2014-09-18 Seagate Technology Llc Integrated system and storage media controlller
US8977797B2 (en) 1999-05-14 2015-03-10 Acqis Llc Method of improving peripheral component interface communications utilizing a low voltage differential signal channel
US20160371218A1 (en) * 2015-06-22 2016-12-22 Google Inc. Operating system card for multiple devices
USRE48365E1 (en) 2006-12-19 2020-12-22 Mobile Motherboard Inc. Mobile motherboard

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6938256B2 (en) * 2000-01-18 2005-08-30 Galactic Computing Corporation System for balance distribution of requests across multiple servers using dynamic metrics
US7844513B2 (en) * 2000-07-17 2010-11-30 Galactic Computing Corporation Bvi/Bc Method and system for operating a commissioned e-commerce service prover
US6816905B1 (en) 2000-11-10 2004-11-09 Galactic Computing Corporation Bvi/Bc Method and system for providing dynamic hosted service management across disparate accounts/sites
US8538843B2 (en) * 2000-07-17 2013-09-17 Galactic Computing Corporation Bvi/Bc Method and system for operating an E-commerce service provider
US7931533B2 (en) * 2001-09-28 2011-04-26 Igt Game development architecture that decouples the game logic from the graphics logics
US20030079140A1 (en) * 2001-10-24 2003-04-24 Yosuke Ura Multiple protecting system to protect personal computer data from burglary utilized flash memory drive
US20030191703A1 (en) * 2002-02-01 2003-10-09 Ubs Painewebber Inc. Method and system for providing interested party access to aggregated accounts information
WO2004038555A2 (en) 2002-10-22 2004-05-06 Isys Technologies Robust customizable computer processing system
CA2503793A1 (en) * 2002-10-22 2004-05-06 Jason A. Sullivan Systems and methods for providing a dynamically modular processing unit
US7256991B2 (en) 2002-10-22 2007-08-14 Sullivan Jason A Non-peripherals processing control module having improved heat dissipating properties
US20120173732A1 (en) * 2002-10-22 2012-07-05 Sullivan Jason A Systems and methods for providing resources and interactivity in computer systems
US7227748B2 (en) * 2003-03-31 2007-06-05 Sun Microsystems, Inc. Cooling module
US7526588B1 (en) 2004-04-27 2009-04-28 Apple Inc. Communication between an accessory and a media player using a protocol with multiple lingoes
US7673083B2 (en) * 2004-04-27 2010-03-02 Apple Inc. Method and system for controlling video selection and playback in a portable media player
US8117651B2 (en) 2004-04-27 2012-02-14 Apple Inc. Method and system for authenticating an accessory
US7529872B1 (en) 2004-04-27 2009-05-05 Apple Inc. Communication between an accessory and a media player using a protocol with multiple lingoes
US7441062B2 (en) 2004-04-27 2008-10-21 Apple Inc. Connector interface system for enabling data communication with a multi-communication device
US7529870B1 (en) 2004-04-27 2009-05-05 Apple Inc. Communication between an accessory and a media player with multiple lingoes
US7161756B2 (en) * 2004-05-10 2007-01-09 Tandberg Data Storage Asa Method and system for communication between a tape drive and an external device
US7823214B2 (en) 2005-01-07 2010-10-26 Apple Inc. Accessory authentication for electronic devices
US7722468B2 (en) * 2005-03-09 2010-05-25 Igt Magnetoresistive memory units as read only memory devices in gaming machines
US20060205513A1 (en) * 2005-03-09 2006-09-14 Igt MRAM as nonvolatile safe storage for power hit and ESD tolerance in gaming machines
US20070197100A1 (en) * 2006-02-17 2007-08-23 Robert Tsao Type of hard disk interface device
US8006019B2 (en) * 2006-05-22 2011-08-23 Apple, Inc. Method and system for transferring stored data between a media player and an accessory
US7415563B1 (en) 2006-06-27 2008-08-19 Apple Inc. Method and system for allowing a media player to determine if it supports the capabilities of an accessory
US8239919B2 (en) * 2006-07-06 2012-08-07 Mindspeed Technologies, Inc. Flexible hardware password protection and access control
US7558894B1 (en) 2006-09-11 2009-07-07 Apple Inc. Method and system for controlling power provided to an accessory
US20080289011A1 (en) * 2007-05-16 2008-11-20 Bridget Willoughby Dualistic Microprocessor System for Purpose of Controlling Personal Computer Internet Communication Resource
US7529932B1 (en) 2008-03-31 2009-05-05 International Business Machines Corporation Removable medium and system and method for writing data to same
US8239955B2 (en) * 2008-03-31 2012-08-07 International Business Machines Corporation System and method for adjusting the security level of a removable medium
TW201011551A (en) * 2008-09-03 2010-03-16 Inventec Corp Method for adding hardware
US8208853B2 (en) 2008-09-08 2012-06-26 Apple Inc. Accessory device authentication
US8238811B2 (en) 2008-09-08 2012-08-07 Apple Inc. Cross-transport authentication
CN101673201A (en) * 2008-09-09 2010-03-17 英业达股份有限公司 Hardware adding method
US8621554B1 (en) 2009-05-01 2013-12-31 Google Inc. User privacy framework
US10437608B2 (en) 2009-08-24 2019-10-08 Wagan Sarukhanov Microminiature personal computer and method of using thereof
US20110047599A1 (en) * 2009-08-24 2011-02-24 Wagan Sarukhanov Microminiature personal computer and method of using thereof
US8671153B1 (en) 2010-08-20 2014-03-11 Acqis Llc Low cost, high performance and high data throughput server blade
CN103176805B (en) * 2011-12-21 2017-09-19 富泰华工业(深圳)有限公司 The method and system that executable program is installed
US10834094B2 (en) 2013-08-06 2020-11-10 Bedrock Automation Platforms Inc. Operator action authentication in an industrial control system
US11314854B2 (en) 2011-12-30 2022-04-26 Bedrock Automation Platforms Inc. Image capture devices for a secure industrial control system
US11144630B2 (en) 2011-12-30 2021-10-12 Bedrock Automation Platforms Inc. Image capture devices for a secure industrial control system
US9191203B2 (en) 2013-08-06 2015-11-17 Bedrock Automation Platforms Inc. Secure industrial control system
US9600434B1 (en) 2011-12-30 2017-03-21 Bedrock Automation Platforms, Inc. Switch fabric having a serial communications interface and a parallel communications interface
US8868813B2 (en) 2011-12-30 2014-10-21 Bedrock Automation Platforms Inc. Communications control system with a serial communications interface and a parallel communications interface
US9437967B2 (en) 2011-12-30 2016-09-06 Bedrock Automation Platforms, Inc. Electromagnetic connector for an industrial control system
US8971072B2 (en) 2011-12-30 2015-03-03 Bedrock Automation Platforms Inc. Electromagnetic connector for an industrial control system
US9727511B2 (en) 2011-12-30 2017-08-08 Bedrock Automation Platforms Inc. Input/output module with multi-channel switching capability
US10834820B2 (en) 2013-08-06 2020-11-10 Bedrock Automation Platforms Inc. Industrial control system cable
US9467297B2 (en) 2013-08-06 2016-10-11 Bedrock Automation Platforms Inc. Industrial control system redundant communications/control modules authentication
WO2014046974A2 (en) 2012-09-20 2014-03-27 Case Paul Sr Case secure computer architecture
JP2014096133A (en) * 2012-10-10 2014-05-22 Ricoh Co Ltd Transmission terminal, transmission system, and program
US9203772B2 (en) 2013-04-03 2015-12-01 Hewlett-Packard Development Company, L.P. Managing multiple cartridges that are electrically coupled together
US10613567B2 (en) 2013-08-06 2020-04-07 Bedrock Automation Platforms Inc. Secure power supply for an industrial control system
US10680816B2 (en) * 2014-03-26 2020-06-09 Continental Teves Ag & Co. Ohg Method and system for improving the data security during a communication process
DE102014114197B4 (en) * 2014-09-30 2016-11-17 Infineon Technologies Ag Chip and method for identifying a chip
US9606939B2 (en) * 2015-02-26 2017-03-28 International Business Machines Corporation Memory data security
DE102015107137A1 (en) * 2015-03-16 2016-09-22 Hella Kgaa Hueck & Co. Arrangement of a lamp on a reflector of a lighting device for a vehicle
EP3209101B1 (en) * 2016-02-18 2020-04-08 Schneider Electric Industries SAS Module for a logic controller
IT201700062830A1 (en) 2017-06-08 2018-12-08 Stmicroelectronics Application Gmbh PROCESSING SYSTEM, RELATED INTEGRATED CIRCUIT, DEVICE AND PROCEDURE
IT201700062788A1 (en) * 2017-06-08 2018-12-08 Stmicroelectronics Application Gmbh PROCESSING SYSTEM, RELATED INTEGRATED CIRCUIT, DEVICE AND PROCEDURE
EP3480801A1 (en) * 2017-11-02 2019-05-08 Tata Consultancy Services Limited System and method for conducting a secured computer based candidate assessment
US11036887B2 (en) 2018-12-11 2021-06-15 Micron Technology, Inc. Memory data security

Citations (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4623964A (en) * 1981-12-23 1986-11-18 International Business Machines Corporation Homogeneous hierarchial computer business system
US4769764A (en) 1986-08-11 1988-09-06 Isaac Levanon Modular computer system with portable travel unit
US4799258A (en) 1984-02-13 1989-01-17 National Research Development Corporation Apparatus and methods for granting access to computers
US5056141A (en) * 1986-06-18 1991-10-08 Dyke David W Method and apparatus for the identification of personnel
US5086499A (en) 1989-05-23 1992-02-04 Aeg Westinghouse Transportation Systems, Inc. Computer network for real time control with automatic fault identification and by-pass
US5103446A (en) 1990-11-09 1992-04-07 Moses Computers, Inc. Local area network adaptive throughput control for instantaneously matching data transfer rates between personal computer nodes
WO1992018924A1 (en) 1991-04-16 1992-10-29 Boris Wallsten A computer comprising at least two easily interconnectable parts
US5191581A (en) 1990-12-07 1993-03-02 Digital Equipment Corporation Method and apparatus for providing high performance interconnection between interface circuits coupled to information buses
US5198806A (en) * 1990-12-31 1993-03-30 Lord & Sebastian, Inc. Remote control and secure access for personal computers
WO1994000970A1 (en) 1992-06-29 1994-01-06 Oakleigh Systems, Inc. Modular notebook computer
US5319771A (en) 1989-05-10 1994-06-07 Seiko Epson Corporation CPU clock generator having a low frequency output during I/O operations and a high frequency output during memory operations
JPH06289953A (en) 1993-03-31 1994-10-18 Hitachi Ltd Attachable/detachable information processor
WO1995013640A1 (en) 1993-11-12 1995-05-18 Oakleigh Systems, Inc. Cooling a large microprocessor in a small module
US5463742A (en) 1993-03-05 1995-10-31 Hitachi Computer Products (America), Inc. Personal processor module and docking station for use therewith
US5519843A (en) 1993-03-15 1996-05-21 M-Systems Flash memory system providing both BIOS and user storage capability
EP0722138A1 (en) 1995-01-04 1996-07-17 International Business Machines Corporation A cartridge-based design for portable and fixed computers
US5539616A (en) 1992-06-29 1996-07-23 Elonex Technologies, Inc. Modular portable computer
US5546463A (en) 1994-07-12 1996-08-13 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
US5550861A (en) 1994-09-27 1996-08-27 Novalink Technologies, Inc. Modular PCMCIA modem and pager
US5572441A (en) 1994-04-04 1996-11-05 Lucent Technologies Inc. Data connector for portable devices
US5590377A (en) 1995-06-07 1996-12-31 Ast Research, Inc. Automatic control of distributed DMAs in a PCI bus system supporting dual ISA buses
US5623637A (en) 1993-12-06 1997-04-22 Telequip Corporation Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
US5638521A (en) 1992-10-12 1997-06-10 Leunig Gmbh Apparatus using a parallel interface for data transfer between a plurality of computers, as well as for transfer of data from computers to shared peripheral devices
US5640302A (en) 1992-06-29 1997-06-17 Elonex Ip Holdings Modular portable computer
US5648762A (en) 1994-02-04 1997-07-15 Canon Kabushiki Kaisha Built-in electronic apparatus and device-detaching method therefor
US5689654A (en) 1992-06-29 1997-11-18 Elonex F.P. Holdings, Ltd. Digital assistant system including a host computer with a docking bay for the digital assistant wherein a heat sink is moved into contact with a docked digital assistant for cooling the digital assistant
US5721842A (en) 1995-08-25 1998-02-24 Apex Pc Solutions, Inc. Interconnection system for viewing and controlling remotely connected computers with on-screen video overlay for controlling of the interconnection switch
US5751950A (en) * 1996-04-16 1998-05-12 Compaq Computer Corporation Secure power supply for protecting the shutdown of a computer system
US5751711A (en) 1995-03-27 1998-05-12 Kabushiki Kaisha Toshiba Digital information processing device
US5764924A (en) 1995-08-24 1998-06-09 Ncr Corporation Method and apparatus for extending a local PCI bus to a remote I/O backplane
US5774704A (en) 1996-07-29 1998-06-30 Silicon Graphics, Inc. Apparatus and method for dynamic central processing unit clock adjustment
US5815681A (en) 1996-05-21 1998-09-29 Elonex Plc Ltd. Integrated network switching hub and bus structure
US5838932A (en) 1996-12-23 1998-11-17 Compaq Computer Corporation Transparent PCI to PCI bridge with dynamic memory and I/O map programming
US5857085A (en) 1996-11-13 1999-01-05 Cypress Semiconductor Corporation Interface device for XT/AT system devices on high speed local bus
US5862381A (en) 1996-11-26 1999-01-19 International Business Machines Corporation Visualization tool for graphically displaying trace data
US5878211A (en) 1996-12-20 1999-03-02 N C R Corporation Multi-functional retail terminal and associated method
US5884049A (en) 1996-12-31 1999-03-16 Compaq Computer Corporation Increased processor performance comparable to a desktop computer from a docked portable computer
US5907566A (en) 1997-05-29 1999-05-25 3Com Corporation Continuous byte-stream encoder/decoder using frequency increase and cyclic redundancy check
US5909559A (en) 1997-04-04 1999-06-01 Texas Instruments Incorporated Bus bridge device including data bus of first width for a first processor, memory controller, arbiter circuit and second processor having a different second data width
US5933609A (en) 1996-04-08 1999-08-03 Vlsi Technology, Inc. Method and system for hot docking a portable computer to a docking station via the primary PCI bus
US5935226A (en) 1997-03-20 1999-08-10 Micron Electronics, Inc. Method and apparatus for issuing transaction requests to a target device in accordance with the state of connection between the portable computer and the target device
US5941965A (en) 1996-05-16 1999-08-24 Electronics Accessory Specialists International, Inc. Universal docking station
US5974486A (en) 1997-08-12 1999-10-26 Atmel Corporation Universal serial bus device controller comprising a FIFO associated with a plurality of endpoints and a memory for storing an identifier of a current endpoint
US5978919A (en) 1996-09-18 1999-11-02 Kabushiki Kaisha Toshiba Mobile computer and a method for controlling in a mobile computer
US5991833A (en) 1998-03-13 1999-11-23 Compaq Computer Corporation Computer system with bridge logic that reduces interference to CPU cycles during secondary bus transactions
US5999952A (en) 1997-08-15 1999-12-07 Xybernaut Corporation Core computer unit
US5999476A (en) 1997-11-21 1999-12-07 Advanced Micro Devices, Inc. Bios memory and multimedia data storage combination
US6006243A (en) 1997-05-30 1999-12-21 International Business Machines Corporation Foldable personal computer with detachable cover section
US6012145A (en) 1993-11-13 2000-01-04 Calluna Technology Limited Security system for hard disk drive
US6025989A (en) 1998-04-21 2000-02-15 International Business Machines Corporation Modular node assembly for rack mounted multiprocessor computer
US6029183A (en) 1996-08-29 2000-02-22 Xybernaut Corporation Transferable core computer
US6038621A (en) 1996-11-04 2000-03-14 Hewlett-Packard Company Dynamic peripheral control of I/O buffers in peripherals with modular I/O
US6046571A (en) 1998-08-21 2000-04-04 Digital Equip Corp Port replicator with secure integral battery charging cradle
US6070214A (en) 1998-08-06 2000-05-30 Mobility Electronics, Inc. Serially linked bus bridge for expanding access over a first bus to a second bus
US6069615A (en) 1996-08-19 2000-05-30 International Business Machines Corporation Single pointing device/keyboard for multiple computers
US6104921A (en) 1997-10-14 2000-08-15 Marconi Communications Inc. Communications modular docking station
US6157534A (en) 1997-06-30 2000-12-05 Emc Corporation Backplane having strip transmission line ethernet bus
US6161157A (en) 1998-10-27 2000-12-12 Intel Corporation Docking system
US6161524A (en) 1998-02-10 2000-12-19 Deutz Ag Electronic control device
US6199134B1 (en) 1998-03-13 2001-03-06 Compaq Computer Corporation Computer system with bridge logic that asserts a system management interrupt signal when an address is made to a trapped address and which also completes the cycle to the target address
US6202169B1 (en) 1997-12-31 2001-03-13 Nortel Networks Corporation Transitioning between redundant computer systems on a network
US6216185B1 (en) 1998-05-01 2001-04-10 Acqis Technology, Inc. Personal computer peripheral console with attached computer module
US6226700B1 (en) 1998-03-13 2001-05-01 Compaq Computer Corporation Computer system with bridge logic that includes an internal modular expansion bus and a common master interface for internal master devices
US6256689B1 (en) 1998-06-11 2001-07-03 Adaptec, Inc. Bus system expandable by connection of a bus bridge circuit
US6266539B1 (en) 1998-06-12 2001-07-24 Cisco Technology, Inc. Telephone docking station for personal digital assistant
US20010011312A1 (en) 1998-05-01 2001-08-02 Acqis Technology, Inc. Communication channel and interface devices for bridging computer interface buses
US6301637B1 (en) 1998-06-08 2001-10-09 Storage Technology Corporation High performance data paths
US6304895B1 (en) 1997-08-22 2001-10-16 Apex Inc. Method and system for intelligently controlling a remotely located computer
US6311268B1 (en) 1998-11-06 2001-10-30 Acqis Technology, Inc. Computer module device and method for television use
US6314522B1 (en) 1999-01-13 2001-11-06 Acqis Technology, Inc. Multi-voltage level CPU module
US6321335B1 (en) 1998-10-30 2001-11-20 Acqis Technology, Inc. Password protected modular computer method and device
US6324605B1 (en) 1998-12-10 2001-11-27 Network Technologies, Inc. Computer and peripheral switch with USB
US6332180B1 (en) 1998-06-10 2001-12-18 Compaq Information Technologies Group, L.P. Method and apparatus for communication in a multi-processor computer system
US6366951B1 (en) 1997-02-03 2002-04-02 Curt A. Schmidt Distributed processing system where a management computer automatically connects remote reduced-capability workstations with centralized computing modules
US6378009B1 (en) 1998-08-25 2002-04-23 Avocent Corporation KVM (keyboard, video, and mouse) switch having a network interface circuit coupled to an external network and communicating in accordance with a standard network protocol
US6381602B1 (en) * 1999-01-26 2002-04-30 Microsoft Corporation Enforcing access control on resources at a location other than the source location
US6393561B1 (en) * 1996-04-11 2002-05-21 Hitachi, Ltd. Disk drive computer with programmable nonvolatile memory capable of rewriting a control program of the disk drive
US6401124B1 (en) 1998-12-16 2002-06-04 Mustek Systems Inc. Network peripheral sharing system
US6452790B1 (en) 1999-07-07 2002-09-17 Acquis Technology, Inc. Computer module device and method
US6453344B1 (en) 1999-03-31 2002-09-17 Amdahl Corporation Multiprocessor servers with controlled numbered of CPUs
US6460106B1 (en) 1998-10-20 2002-10-01 Compaq Information Technologies Group, L.P. Bus bridge for hot docking in a portable computer system
US6496361B2 (en) * 1998-11-16 2002-12-17 Acer Incorporated Embedded CMOS camera in a laptop computer
US6549966B1 (en) 1999-02-09 2003-04-15 Adder Technology Limited Data routing device and system
US6643777B1 (en) 1999-05-14 2003-11-04 Acquis Technology, Inc. Data security method and device for computer modules
US6718415B1 (en) 1999-05-14 2004-04-06 Acqis Technology, Inc. Computer system and method including console housing multiple computer modules having independent processing units, mass storage devices, and graphics controllers
US20060265361A1 (en) 2005-05-23 2006-11-23 Chu William W Intelligent search agent

Family Cites Families (177)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3996585A (en) 1974-06-11 1976-12-07 International Business Machines Corporation Video generator circuit for a dynamic digital television display
US4228496A (en) 1976-09-07 1980-10-14 Tandem Computers Incorporated Multiprocessor system
US4141068A (en) 1977-03-24 1979-02-20 Xerox Corporation Auxiliary ROM memory system
US4453215A (en) 1981-10-01 1984-06-05 Stratus Computer, Inc. Central processing apparatus for fault-tolerant computing
US4700362A (en) 1983-10-07 1987-10-13 Dolby Laboratories Licensing Corporation A-D encoder and D-A decoder system
US4570220A (en) 1983-11-25 1986-02-11 Intel Corporation High speed parallel bus and data transfer method
US4670837A (en) 1984-06-25 1987-06-02 American Telephone And Telegraph Company Electrical system having variable-frequency clock
US4680674A (en) 1984-07-16 1987-07-14 Moore Fergus E Modular computer system with integral electronic bus
US4615039A (en) 1984-10-01 1986-09-30 National Semiconductor Corporation Data network driver
JPH0784675B2 (en) 1986-07-28 1995-09-13 川崎製鉄株式会社 Plated steel with excellent press formability and image clarity after painting
US4872091A (en) 1986-07-21 1989-10-03 Ricoh Company, Ltd. Memory cartridge
JPH0764672B2 (en) 1987-11-02 1995-07-12 三菱マテリアル株式会社 Crystal growth equipment
US4760276A (en) 1987-11-09 1988-07-26 Unisys Corporation Power supply system, for segmented loads, having phantom redundancy
US4791524A (en) 1987-11-18 1988-12-13 International Business Machines Corporation Electrostatic discharge protection for electronic packages
US4890282A (en) 1988-03-08 1989-12-26 Network Equipment Technologies, Inc. Mixed mode compression for data transmission
US5581763A (en) 1988-06-14 1996-12-03 Progressive Technology Inc. Secure architecture and apparatus using an independent computer cartridge
US4939735A (en) 1988-07-21 1990-07-03 International Business Machines Corporation Information handling system having serial channel to control unit link
US4918572A (en) 1988-12-27 1990-04-17 Motorola Computer X, Inc. Modular electronic package
US5325517A (en) 1989-05-17 1994-06-28 International Business Machines Corporation Fault tolerant data processing system
IL96808A (en) 1990-04-18 1996-03-31 Rambus Inc Integrated circuit i/o using a high performance bus interface
US5251097A (en) 1990-06-11 1993-10-05 Supercomputer Systems Limited Partnership Packaging architecture for a highly parallel multiprocessor system
US5659773A (en) 1990-11-14 1997-08-19 International Business Machines Corporation Personal computer with input/output subsystem
US5261060A (en) 1991-03-13 1993-11-09 Traveling Software, Inc. Eight-bit parallel communications method and apparatus
US5187645A (en) 1991-06-07 1993-02-16 Ergo Computing, Inc. Portable computer with docking connector for peripheral devices
WO1993006695A1 (en) 1991-09-23 1993-04-01 Z-Microsystems Enhanced security system for computing devices
US5317441A (en) 1991-10-21 1994-05-31 Advanced Micro Devices, Inc. Transceiver for full duplex signalling on a fiber optic cable
US5293487A (en) 1991-12-27 1994-03-08 Digital Equipment Corporation Network adapter with high throughput data transfer circuit to optimize network data transfers, with host receive ring resource monitoring and reporting
US5278509A (en) 1992-02-03 1994-01-11 At&T Bell Laboratories Method for monitoring battery discharge by determining the second derivative of battery voltage over time
US5355391A (en) 1992-03-06 1994-10-11 Rambus, Inc. High speed bus system
US5227957A (en) 1992-05-14 1993-07-13 Deters John B Modular computer system with passive backplane
US5432939A (en) 1992-05-27 1995-07-11 International Business Machines Corp. Trusted personal computer system with management control over initial program loading
DE4221269C1 (en) 1992-06-26 1993-12-09 Lancaster Group Ag Preparation for topical use
US5600800A (en) 1992-06-29 1997-02-04 Elonex I.P. Holdings, Ltd. Personal computer system having a docking bay and a hand-held portable computer adapted to dock in the docking bay by a full-service parallel bus
US5708840A (en) 1992-06-29 1998-01-13 Elonex I.P. Holdings, Ltd. Micro personal digital assistant
US5680126A (en) 1992-06-29 1997-10-21 Elonex I.P. Holdings, Ltd. Modular portable computer
US5317477A (en) 1992-06-30 1994-05-31 International Business Machines Corporation High density interconnection assembly
US5311397A (en) 1992-08-06 1994-05-10 Logistics Management Inc. Computer with modules readily replaceable by unskilled personnel
US5537544A (en) 1992-09-17 1996-07-16 Kabushiki Kaisha Toshiba Portable computer system having password control means for holding one or more passwords such that the passwords are unreadable by direct access from a main processor
US5282247A (en) 1992-11-12 1994-01-25 Maxtor Corporation Apparatus and method for providing data security in a computer system having removable memory
US5347559A (en) 1992-12-30 1994-09-13 Digital Equipment Corporation Apparatus and method of data transfer between systems using different clocks
US5430607A (en) 1992-12-31 1995-07-04 North Atlantic Industries, Inc. Rugged modular portable computer including modules hinged along an edge
US5428806A (en) 1993-01-22 1995-06-27 Pocrass; Alan L. Computer networking system including central chassis with processor and input/output modules, remote transceivers, and communication links between the transceivers and input/output modules
AU6408294A (en) 1993-03-16 1994-10-11 Ht Research, Inc. A chassis for a multiple computer system
US5802391A (en) 1993-03-16 1998-09-01 Ht Research, Inc. Direct-access team/workgroup server shared by team/workgrouped computers without using a network operating system
JP3354622B2 (en) 1993-03-29 2002-12-09 富士通株式会社 Bidirectional transmission line switching ring network
JPH06289956A (en) 1993-03-31 1994-10-18 Hitachi Ltd Attachable/detachable information processor
US5533125A (en) 1993-04-06 1996-07-02 International Business Machines Corporation Removable computer security device
US6401158B1 (en) 1993-07-16 2002-06-04 Compaq Computer Corporation Apparatus for providing a CPU cluster via a disk I/O bus using a CPU brick which fits into a disk cavity
US6567877B1 (en) 1993-08-16 2003-05-20 Sun Microsystems, Inc. Automatically enabling terminator for internal SCSI buses with external SCSI bus expansion
JPH0764672A (en) 1993-08-24 1995-03-10 Toshiba Corp Constituting method for assembled-type work station and assembled-type work station device
JPH0784675A (en) 1993-09-16 1995-03-31 Hitachi Ltd Detachable information processor
US5721837A (en) 1993-10-28 1998-02-24 Elonex I.P. Holdings, Ltd. Micro-personal digital assistant including a temperature managed CPU
US5436857A (en) 1993-11-22 1995-07-25 Ncr Corporation Personal computer module system and method of using
US5680536A (en) 1994-03-25 1997-10-21 Tyuluman; Samuel A. Dual motherboard computer system
US5930110A (en) 1994-03-28 1999-07-27 Kabushiki Kaisha Toshiba Computer system having detachable expansion unit
US5485488A (en) * 1994-03-29 1996-01-16 Apple Computer, Inc. Circuit and method for twisted pair current source driver
US5436902A (en) 1994-04-05 1995-07-25 First Pacific Networks Ethernet extender
US5550710A (en) 1994-09-09 1996-08-27 Hitachi Computer Products (America), Inc. Packaging and cooling structure for the personal processor module
US6311287B1 (en) 1994-10-11 2001-10-30 Compaq Computer Corporation Variable frequency clock control for microprocessor-based computer systems
US5752080A (en) 1994-12-22 1998-05-12 Intel Corporation Cable terminal unit using bit set for selectively enabling a plurality of hardware functions with some functions having a plurality of selectively enabled hardware functions
DE19581859B4 (en) 1994-12-22 2005-04-14 Intel Corp., Santa Clara Connector for coupling to single ended SCSI interface bus without causing data loss - asserts busy signal for predetermined short period of time during disturbance of SCSI signal pins, e.g just prior to SCSI signal pins making contact or decoupling during hot modification
JPH08202468A (en) 1995-01-27 1996-08-09 Hitachi Ltd Multiprocessor system
US5603044A (en) 1995-02-08 1997-02-11 International Business Machines Corporation Interconnection network for a multi-nodal data processing system which exhibits incremental scalability
US5673174A (en) 1995-03-23 1997-09-30 Nexar Technologies, Inc. System permitting the external replacement of the CPU and/or DRAM SIMMs microchip boards
US5578940A (en) 1995-04-04 1996-11-26 Rambus, Inc. Modular bus with single or double parallel termination
US5608884A (en) 1995-05-17 1997-03-04 Dell Usa, L.P. Commonly housed multiple processor type computing system and method of manufacturing the same
US5737524A (en) 1995-05-22 1998-04-07 International Business Machines Corporation Add-in board with programmable configuration registers for use in PCI bus computers
JPH08331472A (en) 1995-05-24 1996-12-13 Internatl Business Mach Corp <Ibm> Method and apparatus for synchronizing video data with graphic data in multimedia display device containing communal frame buffer
US5696949A (en) 1995-06-15 1997-12-09 Intel Corporation System for PCI slots expansion using asynchronous PCI-to-PCI bridge with clock generator for providing clock signal to the expansion mother board and expansion side of bridge
US5848249A (en) 1995-06-15 1998-12-08 Intel Corporation Method and apparatus for enabling intelligent I/O subsystems using PCI I/O devices
GB2290894A (en) 1995-08-02 1996-01-10 Memory Corp Plc Memory module security
US5584053A (en) 1995-08-04 1996-12-10 Motorola, Inc. Commonly coupled high frequency transmitting/receiving switching module
US5588850A (en) 1995-08-08 1996-12-31 Tongrand Limited Grounding means for memory card connector
US5745733A (en) 1995-08-09 1998-04-28 Ncr Corporation Computer system including a portable portion and a stationary portion providing both uni-processing and multiprocessing capabilities
US5742840A (en) * 1995-08-16 1998-04-21 Microunity Systems Engineering, Inc. General purpose, multiple precision parallel operation, programmable media processor
JPH0997127A (en) 1995-09-29 1997-04-08 Toshiba Corp Computer system
US6049823A (en) 1995-10-04 2000-04-11 Hwang; Ivan Chung-Shung Multi server, interactive, video-on-demand television system utilizing a direct-access-on-demand workgroup
US6011546A (en) 1995-11-01 2000-01-04 International Business Machines Corporation Programming structure for user interfaces
US5960213A (en) 1995-12-18 1999-09-28 3D Labs Inc. Ltd Dynamically reconfigurable multi-function PCI adapter device
US5673172A (en) 1996-01-05 1997-09-30 Compaq Computer Corporation Apparatus for electromagnetic interference and electrostatic discharge shielding of hot plug-connected hard disk drives
US5774703A (en) 1996-01-05 1998-06-30 Motorola, Inc. Data processing system having a register controllable speed
US5809538A (en) 1996-02-07 1998-09-15 General Instrument Corporation DRAM arbiter for video decoder
US5819050A (en) 1996-02-29 1998-10-06 The Foxboro Company Automatically configurable multi-purpose distributed control processor card for an industrial control system
US5787259A (en) * 1996-03-29 1998-07-28 Microsoft Corporation Digital interconnects of a PC with consumer electronics devices
US6179489B1 (en) 1997-04-04 2001-01-30 Texas Instruments Incorporated Devices, methods, systems and software products for coordination of computer main microprocessor and second microprocessor coupled thereto
US5805903A (en) 1996-05-21 1998-09-08 Compaq Computer Corporation Protection of computer system against incorrect card insertion during start-up
US5819053A (en) * 1996-06-05 1998-10-06 Compaq Computer Corporation Computer system bus performance monitoring
US5822571A (en) 1996-06-05 1998-10-13 Compaq Computer Corporation Synchronizing data between devices
US6052513A (en) 1996-06-05 2000-04-18 Compaq Computer Corporation Multi-threaded bus master
US6570561B1 (en) * 1996-06-14 2003-05-27 Texas Instruments Incorporated Portable computer with low voltage differential signaling adapter
US5968144A (en) 1996-06-27 1999-10-19 Vlsi Technology, Inc. System for supporting DMA I/O device using PCI bus and PCI-PCI bridge comprising programmable DMA controller for request arbitration and storing data transfer information
US5795228A (en) 1996-07-03 1998-08-18 Ridefilm Corporation Interactive computer-based entertainment system
FR2751082B1 (en) 1996-07-10 1998-11-06 Aerospatiale SWITCHING DEVICE, IN PARTICULAR FOR A SYSTEM UNDER TEST
US5737194A (en) 1996-07-29 1998-04-07 Cray Research, Inc. Input/output module assembly
US5961623A (en) 1996-08-29 1999-10-05 Apple Computer, Inc. Method and system for avoiding starvation and deadlocks in a split-response interconnect of a computer system
US5948047A (en) 1996-08-29 1999-09-07 Xybernaut Corporation Detachable computer structure
US6715100B1 (en) 1996-11-01 2004-03-30 Ivan Chung-Shung Hwang Method and apparatus for implementing a workgroup server array
US6091737A (en) 1996-11-15 2000-07-18 Multi-Tech Systems, Inc. Remote communications server system
US5982614A (en) 1996-11-18 1999-11-09 Peripheral Vision, Inc. Docking station including a port replicator for sharing peripherals between a portable computer and desktop computer
EP0844567A1 (en) 1996-11-21 1998-05-27 Hewlett-Packard Company Long haul PCI-to-PCI bridge
US5859669A (en) 1996-11-26 1999-01-12 Texas Instruments Incorporated System for encoding an image control signal onto a pixel clock signal
US5826048A (en) 1997-01-31 1998-10-20 Vlsi Technology, Inc. PCI bus with reduced number of signals
US6465611B1 (en) 1997-02-25 2002-10-15 Corixa Corporation Compounds for immunotherapy of prostate cancer and methods for their use
JPH10268995A (en) * 1997-03-25 1998-10-09 Canon Inc Method and device for controlling interface
US6002442A (en) 1997-04-01 1999-12-14 Aitech International Corp. Method and apparatus for reducing flickers in video signal conversions
US5941968A (en) 1997-04-14 1999-08-24 Advanced Micro Devices, Inc. Computer system for concurrent data transferring between graphic controller and unified system memory and between CPU and expansion bus device
US5884053A (en) 1997-06-11 1999-03-16 International Business Machines Corporation Connector for higher performance PCI with differential signaling
US6070211A (en) 1997-06-11 2000-05-30 International Business Machines Corporation Driver/receiver circuitry for enhanced PCI bus with differential signaling
US6425033B1 (en) 1997-06-20 2002-07-23 National Instruments Corporation System and method for connecting peripheral buses through a serial bus
US6078503A (en) 1997-06-30 2000-06-20 Emc Corporation Partitionable cabinet
US6742068B2 (en) 1997-06-30 2004-05-25 Emc Corporation Data server with hot replaceable processing unit modules
US6016252A (en) 1997-06-30 2000-01-18 Emc Corporation Cable management system
JP3543555B2 (en) 1997-08-08 2004-07-14 株式会社日立製作所 Signal transmission equipment
US5987543A (en) * 1997-08-29 1999-11-16 Texas Instruments Incorporated Method for communicating digital information using LVDS and synchronous clock signals
US6356968B1 (en) * 1997-09-03 2002-03-12 Cirrus Logic, Inc Apparatus and method for transparent USB-to-1394 bridging and video delivery between a host computer system and a remote peripheral device
US6028643A (en) 1997-09-03 2000-02-22 Colorgraphic Communications Corporation Multiple-screen video adapter with television tuner
US5978821A (en) 1997-09-17 1999-11-02 Automated Business Companies Smart modular electronic machine
US6175490B1 (en) 1997-10-01 2001-01-16 Micron Electronics, Inc. Fault tolerant computer system
US5982363A (en) 1997-10-24 1999-11-09 General Instrument Corporation Personal computer-based set-top converter for television services
US6009488A (en) 1997-11-07 1999-12-28 Microlinc, Llc Computer having packet-based interconnect channel
US6040792A (en) 1997-11-19 2000-03-21 In-System Design, Inc. Universal serial bus to parallel bus signal converter and method of conversion
US6088224A (en) 1997-12-03 2000-07-11 Emc Corporation Cabinet for storing a plurality of processing unit modules
US5991844A (en) 1998-04-17 1999-11-23 Adaptec, Inc. Redundant bus bridge systems and methods using selectively synchronized clock signals
US6202115B1 (en) * 1998-04-17 2001-03-13 Adaptec, Inc. Fault tolerant redundant bus bridge systems and methods
US6145085A (en) 1998-04-30 2000-11-07 Compaq Computer Corporation Method and apparatus for providing remote access to security features on a computer network
US6260155B1 (en) 1998-05-01 2001-07-10 Quad Research Network information server
US6477593B1 (en) * 1998-06-11 2002-11-05 Adaptec, Inc. Stacked I/O bridge circuit assemblies having flexibly configurable connections
US6148357A (en) 1998-06-17 2000-11-14 Advanced Micro Devices, Inc. Integrated CPU and memory controller utilizing a communication link having isochronous and asynchronous priority modes
US6088752A (en) 1998-08-06 2000-07-11 Mobility Electronics, Inc. Method and apparatus for exchanging information between buses in a portable computer and docking station through a bridge employing a serial link
US6498361B1 (en) 1998-08-26 2002-12-24 Lightspeed Semiconductor Corporation Design information memory for configurable integrated circuits
US5991163A (en) 1998-11-12 1999-11-23 Nexabit Networks, Inc. Electronic circuit board assembly and method of closely stacking boards and cooling the same
US6317329B1 (en) 1998-11-13 2001-11-13 Hewlett-Packard Company Data storage module alignment system and method
US6321277B1 (en) * 1998-11-16 2001-11-20 International Business Machines Corporation Separable in-line automatic terminator for use with a data processing system bus
US6208522B1 (en) 1999-02-12 2001-03-27 Compaq Computer Corp. Computer chassis assembly with a single center pluggable midplane board
US6289376B1 (en) 1999-03-31 2001-09-11 Diva Systems Corp. Tightly-coupled disk-to-CPU storage server
US6297955B1 (en) 1999-03-31 2001-10-02 Western Digital Ventures, Inc. Host assembly for an integrated computer module
US6581125B1 (en) 1999-05-14 2003-06-17 Koninklijke Philips Electronics N.V. PCI bridge having latency inducing serial bus
US6900847B1 (en) * 1999-07-30 2005-05-31 Chyron Corporation Video hardware and software system
US6564274B1 (en) 1999-12-17 2003-05-13 Omnicluster Technologies, Inc. Modular architecture for small computer networks
US6188602B1 (en) 2000-01-25 2001-02-13 Dell Usa, L.P. Mechanism to commit data to a memory device with read-only access
US6578103B1 (en) 2000-02-03 2003-06-10 Motorola, Inc. Compact PCI backplane and method of data transfer across the compact PCI backplane
US6430000B1 (en) 2000-04-13 2002-08-06 General Dynamics Information Systems, Inc. Hermetically sealed plural disk drive housing
US6725317B1 (en) 2000-04-29 2004-04-20 Hewlett-Packard Development Company, L.P. System and method for managing a computer system having a plurality of partitions
US6452789B1 (en) 2000-04-29 2002-09-17 Hewlett-Packard Company Packaging architecture for 32 processor server
US6452809B1 (en) 2000-11-10 2002-09-17 Galactic Computing Corporation Scalable internet engine
US6411506B1 (en) 2000-07-20 2002-06-25 Rlx Technologies, Inc. High density web server chassis system and method
US6747878B1 (en) 2000-07-20 2004-06-08 Rlx Technologies, Inc. Data I/O management system and method
US6757748B1 (en) 2000-07-20 2004-06-29 Rlx Technologies, Inc. Modular network interface system and method
US6325636B1 (en) 2000-07-20 2001-12-04 Rlx Technologies, Inc. Passive midplane for coupling web server processing cards with a network interface(s)
US6985967B1 (en) 2000-07-20 2006-01-10 Rlx Technologies, Inc. Web server network system and method
US7123660B2 (en) 2001-02-27 2006-10-17 Jazio, Inc. Method and system for deskewing parallel bus channels to increase data transfer rates
US7339786B2 (en) 2001-03-05 2008-03-04 Intel Corporation Modular server architecture with Ethernet routed across a backplane utilizing an integrated Ethernet switch module
US8102843B2 (en) 2003-01-21 2012-01-24 Emulex Design And Manufacturing Corporation Switching apparatus and method for providing shared I/O within a load-store fabric
US7017001B2 (en) 2003-04-16 2006-03-21 Motorola, Inc. Compact PCI backplane and method of data transfer across the compact PCI backplane
US7266661B2 (en) 2004-05-27 2007-09-04 Silverbrook Research Pty Ltd Method of storing bit-pattern in plural devices
US7243173B2 (en) 2004-12-14 2007-07-10 Rockwell Automation Technologies, Inc. Low protocol, high speed serial transfer for intra-board or inter-board data communication
US7480303B1 (en) 2005-05-16 2009-01-20 Pericom Semiconductor Corp. Pseudo-ethernet switch without ethernet media-access-controllers (MAC's) that copies ethernet context registers between PCI-express ports
US8230145B2 (en) 2007-07-31 2012-07-24 Hewlett-Packard Development Company, L.P. Memory expansion blade for multiple architectures
US20090083811A1 (en) 2007-09-26 2009-03-26 Verivue, Inc. Unicast Delivery of Multimedia Content
US8090971B2 (en) 2007-12-04 2012-01-03 Synopsys, Inc. Data recovery architecture (CDR) for low-voltage differential signaling (LVDS) video transceiver applications
US20090157858A1 (en) 2007-12-15 2009-06-18 International Business Machines Corporation Managing Virtual Addresses Of Blade Servers In A Data Center
US7809869B2 (en) 2007-12-20 2010-10-05 International Business Machines Corporation Throttling a point-to-point, serial input/output expansion subsystem within a computing system
US7783818B1 (en) 2007-12-28 2010-08-24 Emc Corporation Modularized interconnect between root complexes and I/O modules
US7822895B1 (en) 2007-12-28 2010-10-26 Emc Corporation Scalable CPU (central processing unit) modules for enabling in-place upgrades of electronics systems
WO2009114018A1 (en) 2008-03-14 2009-09-17 Hewlett-Packard Development Company, L.P. Blade server for increased processing capacity
TWI439843B (en) 2008-04-23 2014-06-01 Ibm Printed circuit assembly with automatic selection of storage configuration based on installed paddle board
US20090292854A1 (en) 2008-05-22 2009-11-26 Khoo Ken Use of bond option to alternate between pci configuration space
US8739179B2 (en) 2008-06-30 2014-05-27 Oracle America Inc. Method and system for low-overhead data transfer
JP5272265B2 (en) 2008-09-29 2013-08-28 株式会社日立製作所 PCI device sharing method
US7762818B2 (en) 2008-12-29 2010-07-27 Virtium Technology, Inc. Multi-function module
US8276003B2 (en) 2009-12-11 2012-09-25 International Business Machines Corporation Reducing current draw of a plurality of solid state drives at computer startup
US8671153B1 (en) 2010-08-20 2014-03-11 Acqis Llc Low cost, high performance and high data throughput server blade
US8443126B2 (en) 2010-09-22 2013-05-14 Wilocity, Ltd. Hot plug process in a distributed interconnect bus
US8874955B2 (en) 2011-07-07 2014-10-28 International Business Machines Corporation Reducing impact of a switch failure in a switch fabric via switch cards
US9043526B2 (en) 2012-06-20 2015-05-26 International Business Machines Corporation Versatile lane configuration using a PCIe PIe-8 interface
US9280504B2 (en) 2012-08-24 2016-03-08 Intel Corporation Methods and apparatus for sharing a network interface controller
US9491050B2 (en) 2013-07-31 2016-11-08 Dell Products Lp Systems and methods for infrastructure template provisioning in modular chassis systems

Patent Citations (115)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4623964A (en) * 1981-12-23 1986-11-18 International Business Machines Corporation Homogeneous hierarchial computer business system
US4799258A (en) 1984-02-13 1989-01-17 National Research Development Corporation Apparatus and methods for granting access to computers
US5056141A (en) * 1986-06-18 1991-10-08 Dyke David W Method and apparatus for the identification of personnel
US4769764A (en) 1986-08-11 1988-09-06 Isaac Levanon Modular computer system with portable travel unit
US5319771A (en) 1989-05-10 1994-06-07 Seiko Epson Corporation CPU clock generator having a low frequency output during I/O operations and a high frequency output during memory operations
US5086499A (en) 1989-05-23 1992-02-04 Aeg Westinghouse Transportation Systems, Inc. Computer network for real time control with automatic fault identification and by-pass
US5103446A (en) 1990-11-09 1992-04-07 Moses Computers, Inc. Local area network adaptive throughput control for instantaneously matching data transfer rates between personal computer nodes
US5191581A (en) 1990-12-07 1993-03-02 Digital Equipment Corporation Method and apparatus for providing high performance interconnection between interface circuits coupled to information buses
US5198806A (en) * 1990-12-31 1993-03-30 Lord & Sebastian, Inc. Remote control and secure access for personal computers
WO1992018924A1 (en) 1991-04-16 1992-10-29 Boris Wallsten A computer comprising at least two easily interconnectable parts
WO1994000970A1 (en) 1992-06-29 1994-01-06 Oakleigh Systems, Inc. Modular notebook computer
US5689654A (en) 1992-06-29 1997-11-18 Elonex F.P. Holdings, Ltd. Digital assistant system including a host computer with a docking bay for the digital assistant wherein a heat sink is moved into contact with a docked digital assistant for cooling the digital assistant
US5640302A (en) 1992-06-29 1997-06-17 Elonex Ip Holdings Modular portable computer
US5539616A (en) 1992-06-29 1996-07-23 Elonex Technologies, Inc. Modular portable computer
US5638521A (en) 1992-10-12 1997-06-10 Leunig Gmbh Apparatus using a parallel interface for data transfer between a plurality of computers, as well as for transfer of data from computers to shared peripheral devices
US5463742A (en) 1993-03-05 1995-10-31 Hitachi Computer Products (America), Inc. Personal processor module and docking station for use therewith
US5519843A (en) 1993-03-15 1996-05-21 M-Systems Flash memory system providing both BIOS and user storage capability
JPH06289953A (en) 1993-03-31 1994-10-18 Hitachi Ltd Attachable/detachable information processor
WO1995013640A1 (en) 1993-11-12 1995-05-18 Oakleigh Systems, Inc. Cooling a large microprocessor in a small module
US6012145A (en) 1993-11-13 2000-01-04 Calluna Technology Limited Security system for hard disk drive
US5623637A (en) 1993-12-06 1997-04-22 Telequip Corporation Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
US5648762A (en) 1994-02-04 1997-07-15 Canon Kabushiki Kaisha Built-in electronic apparatus and device-detaching method therefor
US5572441A (en) 1994-04-04 1996-11-05 Lucent Technologies Inc. Data connector for portable devices
US5546463A (en) 1994-07-12 1996-08-13 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
US5550861A (en) 1994-09-27 1996-08-27 Novalink Technologies, Inc. Modular PCMCIA modem and pager
EP0722138A1 (en) 1995-01-04 1996-07-17 International Business Machines Corporation A cartridge-based design for portable and fixed computers
US5608608A (en) 1995-01-04 1997-03-04 International Business Machines Corporation Cartridge-based design for portable and fixed computers
US5751711A (en) 1995-03-27 1998-05-12 Kabushiki Kaisha Toshiba Digital information processing device
US5590377A (en) 1995-06-07 1996-12-31 Ast Research, Inc. Automatic control of distributed DMAs in a PCI bus system supporting dual ISA buses
US5764924A (en) 1995-08-24 1998-06-09 Ncr Corporation Method and apparatus for extending a local PCI bus to a remote I/O backplane
US5721842A (en) 1995-08-25 1998-02-24 Apex Pc Solutions, Inc. Interconnection system for viewing and controlling remotely connected computers with on-screen video overlay for controlling of the interconnection switch
US5933609A (en) 1996-04-08 1999-08-03 Vlsi Technology, Inc. Method and system for hot docking a portable computer to a docking station via the primary PCI bus
US6393561B1 (en) * 1996-04-11 2002-05-21 Hitachi, Ltd. Disk drive computer with programmable nonvolatile memory capable of rewriting a control program of the disk drive
US5751950A (en) * 1996-04-16 1998-05-12 Compaq Computer Corporation Secure power supply for protecting the shutdown of a computer system
US5941965A (en) 1996-05-16 1999-08-24 Electronics Accessory Specialists International, Inc. Universal docking station
US5815681A (en) 1996-05-21 1998-09-29 Elonex Plc Ltd. Integrated network switching hub and bus structure
US5774704A (en) 1996-07-29 1998-06-30 Silicon Graphics, Inc. Apparatus and method for dynamic central processing unit clock adjustment
US6069615A (en) 1996-08-19 2000-05-30 International Business Machines Corporation Single pointing device/keyboard for multiple computers
US6029183A (en) 1996-08-29 2000-02-22 Xybernaut Corporation Transferable core computer
US5978919A (en) 1996-09-18 1999-11-02 Kabushiki Kaisha Toshiba Mobile computer and a method for controlling in a mobile computer
US6038621A (en) 1996-11-04 2000-03-14 Hewlett-Packard Company Dynamic peripheral control of I/O buffers in peripherals with modular I/O
US5857085A (en) 1996-11-13 1999-01-05 Cypress Semiconductor Corporation Interface device for XT/AT system devices on high speed local bus
US5862381A (en) 1996-11-26 1999-01-19 International Business Machines Corporation Visualization tool for graphically displaying trace data
US5878211A (en) 1996-12-20 1999-03-02 N C R Corporation Multi-functional retail terminal and associated method
US5838932A (en) 1996-12-23 1998-11-17 Compaq Computer Corporation Transparent PCI to PCI bridge with dynamic memory and I/O map programming
US5884049A (en) 1996-12-31 1999-03-16 Compaq Computer Corporation Increased processor performance comparable to a desktop computer from a docked portable computer
US6366951B1 (en) 1997-02-03 2002-04-02 Curt A. Schmidt Distributed processing system where a management computer automatically connects remote reduced-capability workstations with centralized computing modules
US5935226A (en) 1997-03-20 1999-08-10 Micron Electronics, Inc. Method and apparatus for issuing transaction requests to a target device in accordance with the state of connection between the portable computer and the target device
US5909559A (en) 1997-04-04 1999-06-01 Texas Instruments Incorporated Bus bridge device including data bus of first width for a first processor, memory controller, arbiter circuit and second processor having a different second data width
US5907566A (en) 1997-05-29 1999-05-25 3Com Corporation Continuous byte-stream encoder/decoder using frequency increase and cyclic redundancy check
US6006243A (en) 1997-05-30 1999-12-21 International Business Machines Corporation Foldable personal computer with detachable cover section
US6157534A (en) 1997-06-30 2000-12-05 Emc Corporation Backplane having strip transmission line ethernet bus
US5974486A (en) 1997-08-12 1999-10-26 Atmel Corporation Universal serial bus device controller comprising a FIFO associated with a plurality of endpoints and a memory for storing an identifier of a current endpoint
US5999952A (en) 1997-08-15 1999-12-07 Xybernaut Corporation Core computer unit
US6304895B1 (en) 1997-08-22 2001-10-16 Apex Inc. Method and system for intelligently controlling a remotely located computer
US6104921A (en) 1997-10-14 2000-08-15 Marconi Communications Inc. Communications modular docking station
US5999476A (en) 1997-11-21 1999-12-07 Advanced Micro Devices, Inc. Bios memory and multimedia data storage combination
US6202169B1 (en) 1997-12-31 2001-03-13 Nortel Networks Corporation Transitioning between redundant computer systems on a network
US6161524A (en) 1998-02-10 2000-12-19 Deutz Ag Electronic control device
US6226700B1 (en) 1998-03-13 2001-05-01 Compaq Computer Corporation Computer system with bridge logic that includes an internal modular expansion bus and a common master interface for internal master devices
US5991833A (en) 1998-03-13 1999-11-23 Compaq Computer Corporation Computer system with bridge logic that reduces interference to CPU cycles during secondary bus transactions
US6199134B1 (en) 1998-03-13 2001-03-06 Compaq Computer Corporation Computer system with bridge logic that asserts a system management interrupt signal when an address is made to a trapped address and which also completes the cycle to the target address
US6025989A (en) 1998-04-21 2000-02-15 International Business Machines Corporation Modular node assembly for rack mounted multiprocessor computer
US20010011312A1 (en) 1998-05-01 2001-08-02 Acqis Technology, Inc. Communication channel and interface devices for bridging computer interface buses
US6216185B1 (en) 1998-05-01 2001-04-10 Acqis Technology, Inc. Personal computer peripheral console with attached computer module
US6345330B2 (en) 1998-05-01 2002-02-05 Acqis Technology, Inc. Communication channel and interface devices for bridging computer interface buses
US6301637B1 (en) 1998-06-08 2001-10-09 Storage Technology Corporation High performance data paths
US6332180B1 (en) 1998-06-10 2001-12-18 Compaq Information Technologies Group, L.P. Method and apparatus for communication in a multi-processor computer system
US6256689B1 (en) 1998-06-11 2001-07-03 Adaptec, Inc. Bus system expandable by connection of a bus bridge circuit
US6266539B1 (en) 1998-06-12 2001-07-24 Cisco Technology, Inc. Telephone docking station for personal digital assistant
US6070214A (en) 1998-08-06 2000-05-30 Mobility Electronics, Inc. Serially linked bus bridge for expanding access over a first bus to a second bus
US6046571A (en) 1998-08-21 2000-04-04 Digital Equip Corp Port replicator with secure integral battery charging cradle
US6378009B1 (en) 1998-08-25 2002-04-23 Avocent Corporation KVM (keyboard, video, and mouse) switch having a network interface circuit coupled to an external network and communicating in accordance with a standard network protocol
US6460106B1 (en) 1998-10-20 2002-10-01 Compaq Information Technologies Group, L.P. Bus bridge for hot docking in a portable computer system
US6161157A (en) 1998-10-27 2000-12-12 Intel Corporation Docking system
USRE42814E1 (en) 1998-10-30 2011-10-04 Acqis Technology, Inc. Password protected modular computer method and device
US6321335B1 (en) 1998-10-30 2001-11-20 Acqis Technology, Inc. Password protected modular computer method and device
USRE43119E1 (en) 1998-10-30 2012-01-17 Acqis Llc Password protected modular computer method and device
USRE41961E1 (en) 1998-10-30 2010-11-23 Acqis Technology, Inc. Password protected modular computer method and device
USRE41294E1 (en) 1998-10-30 2010-04-27 Acqis Techonology, Inc. Password protected modular computer method and device
USRE41076E1 (en) 1998-10-30 2010-01-12 Acqis Technology, Inc. Password protected modular computer method and device
US6311268B1 (en) 1998-11-06 2001-10-30 Acqis Technology, Inc. Computer module device and method for television use
US6496361B2 (en) * 1998-11-16 2002-12-17 Acer Incorporated Embedded CMOS camera in a laptop computer
US6324605B1 (en) 1998-12-10 2001-11-27 Network Technologies, Inc. Computer and peripheral switch with USB
US6401124B1 (en) 1998-12-16 2002-06-04 Mustek Systems Inc. Network peripheral sharing system
US6314522B1 (en) 1999-01-13 2001-11-06 Acqis Technology, Inc. Multi-voltage level CPU module
US6381602B1 (en) * 1999-01-26 2002-04-30 Microsoft Corporation Enforcing access control on resources at a location other than the source location
US6549966B1 (en) 1999-02-09 2003-04-15 Adder Technology Limited Data routing device and system
US6453344B1 (en) 1999-03-31 2002-09-17 Amdahl Corporation Multiprocessor servers with controlled numbered of CPUs
US7376779B2 (en) 1999-05-14 2008-05-20 Acqis Technology, Inc. Multiple module computer system and method
US20040177200A1 (en) 1999-05-14 2004-09-09 Acqis Technology, Inc. Multiple module computer system and method
US20050204083A1 (en) 1999-05-14 2005-09-15 Acqis Technology, Inc. Multiple module computer system and method
US20050246469A1 (en) 1999-05-14 2005-11-03 Acqis Technology, Inc. Multiple module computer system and method
US7099981B2 (en) 1999-05-14 2006-08-29 Acqis Technology, Inc. Multiple module computer system and method
USRE43171E1 (en) 1999-05-14 2012-02-07 Acqis Llc Data security method and device for computer modules
US7146446B2 (en) 1999-05-14 2006-12-05 Acqis Technology, Inc. Multiple module computer system and method
US7328297B2 (en) 1999-05-14 2008-02-05 Acqis Technology, Inc. Computer system utilizing multiple computer modules functioning independently
US7363416B2 (en) 1999-05-14 2008-04-22 Acqis Technology, Inc. Computer system utilizing multiple computer modules with password protection
US7363415B2 (en) 1999-05-14 2008-04-22 Acqis Technology, Inc. Computer system utilizing multiple computer modules with serial interface
US20050182882A1 (en) 1999-05-14 2005-08-18 Acqis Technology, Inc. Multiple module computer system and method
US20080244149A1 (en) 1999-05-14 2008-10-02 Acqis Technology, Inc. Multiple module computer system and method
US20090157939A1 (en) 1999-05-14 2009-06-18 Acqis Technology, Inc. Multiple module computer system and method
US6643777B1 (en) 1999-05-14 2003-11-04 Acquis Technology, Inc. Data security method and device for computer modules
USRE41092E1 (en) 1999-05-14 2010-01-26 Acqis Technology, Inc. Data security method and device for computer modules
US7676624B2 (en) 1999-05-14 2010-03-09 Acqis Llc Multiple module computer system and method including differential signal channel comprising undirectional serial bit channels
US20050174729A1 (en) 1999-05-14 2005-08-11 Acqis Technology, Inc. Multiple module computer system and method
US20100174844A1 (en) 1999-05-14 2010-07-08 Chu William W Y Multiple module computer system and method including differential signal channel comprising undirectional serial bit channels
US7818487B2 (en) 1999-05-14 2010-10-19 Acqis Llc Multiple module computer system and method using differential signal channel including unidirectional, serial bit channels
US20050195575A1 (en) 1999-05-14 2005-09-08 Acqis Technology, Inc. Multiple module computer system and method
US20110208893A1 (en) 1999-05-14 2011-08-25 Acqis Llc Multiple module computer system and method including differential signal channel comprising unidirectional serial bit channels
US6718415B1 (en) 1999-05-14 2004-04-06 Acqis Technology, Inc. Computer system and method including console housing multiple computer modules having independent processing units, mass storage devices, and graphics controllers
US8041873B2 (en) 1999-05-14 2011-10-18 Acqis Llc Multiple module computer system and method including differential signal channel comprising unidirectional serial bit channels to transmit encoded peripheral component interconnect bus transaction data
USRE42984E1 (en) 1999-05-14 2011-11-29 Acqis Technology, Inc. Data security method and device for computer modules
US6452790B1 (en) 1999-07-07 2002-09-17 Acquis Technology, Inc. Computer module device and method
US20060265361A1 (en) 2005-05-23 2006-11-23 Chu William W Intelligent search agent

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Boosten, "Transmission Overhead and Optimal Packet Size", Mar. 11, 1998, printed on Jan. 28, 2011, 2 pgs.

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE44933E1 (en) 1998-10-30 2014-06-03 Acqis Llc Password protected modular computer method and device
US9529768B2 (en) 1999-05-14 2016-12-27 Acqis Llc Computer system including CPU or peripheral bridge directly connected to a low voltage differential signal channel that communicates serial bits of a peripheral component interconnect bus transaction in opposite directions
US8977797B2 (en) 1999-05-14 2015-03-10 Acqis Llc Method of improving peripheral component interface communications utilizing a low voltage differential signal channel
US9529769B2 (en) 1999-05-14 2016-12-27 Acqis Llc Computer system including CPU or peripheral bridge directly connected to a low voltage differential signal channel that communicates serial bits of a peripheral component interconnect bus transaction in opposite directions
USRE45140E1 (en) 1999-05-14 2014-09-16 Acqis Llc Data security method and device for computer modules
US9703750B2 (en) 1999-05-14 2017-07-11 Acqis Llc Computer system including CPU or peripheral bridge directly connected to a low voltage differential signal channel that communicates serial bits of a peripheral component interconnect bus transaction in opposite directions
USRE46947E1 (en) * 1999-05-14 2018-07-10 Acqis Llc Data security method and device for computer modules
USRE48365E1 (en) 2006-12-19 2020-12-22 Mobile Motherboard Inc. Mobile motherboard
US20140281277A1 (en) * 2013-03-15 2014-09-18 Seagate Technology Llc Integrated system and storage media controlller
US10031864B2 (en) * 2013-03-15 2018-07-24 Seagate Technology Llc Integrated circuit
US20160371218A1 (en) * 2015-06-22 2016-12-22 Google Inc. Operating system card for multiple devices
US9858231B2 (en) * 2015-06-22 2018-01-02 Google Llc Operating system card for multiple devices
US10216684B2 (en) 2015-06-22 2019-02-26 Google Llc Operating system card for multiple devices

Also Published As

Publication number Publication date
US6643777B1 (en) 2003-11-04
USRE44468E1 (en) 2013-08-27
USRE44739E1 (en) 2014-01-28
USRE45140E1 (en) 2014-09-16
USRE46947E1 (en) 2018-07-10
USRE41092E1 (en) 2010-01-26
USRE44654E1 (en) 2013-12-17
USRE42984E1 (en) 2011-11-29
USRE43171E1 (en) 2012-02-07

Similar Documents

Publication Publication Date Title
USRE43602E1 (en) Data security method and device for computer modules
USRE44933E1 (en) Password protected modular computer method and device
US7328297B2 (en) Computer system utilizing multiple computer modules functioning independently
US5822547A (en) Method and apparatus for providing a portable computer with hot pluggable modular bays
EP1672492B1 (en) Method for overcoming a system administration blockage
WO1994022088A1 (en) Multiple computer system
KR19980073503A (en) Locks on personal computers

Legal Events

Date Code Title Description
AS Assignment

Owner name: ACQIS TECHNOLOGY, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CHU, WILLIAM W.Y.;REEL/FRAME:027786/0771

Effective date: 19990506

AS Assignment

Owner name: ACQIS LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ACQIS TECHNOLOGY, INC.;REEL/FRAME:028260/0975

Effective date: 20111101