Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method for securely controlling access to PC I/O devices

IP.com Disclosure Number: IPCOM000021319D
Original Publication Date: 2004-Jan-13
Included in the Prior Art Database: 2004-Jan-13
Document File: 1 page(s) / 54K

Publishing Venue

IBM

Abstract

A method is disclosed for securely controlling access to PC I/O devices

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 53% of the total text.

Page 1 of 1

Method for securely controlling access to PC I/O devices

    Modern computer owners (particularly owners who process sensitive information: financial, medical records, etc) are increasingly concerned about data security and controlling access to the systems. One area that must be controlled is access to certain devices within a system. For instance, the owner may wish to restrict access to the floppy disc or serial port. The desired restriction may be to completely disable the device or prevent writing data to the device. Traditionally, restriction of devices has been performed system configuration settings and password access. For example, if the owner wished to disable the floppy drive, BIOS setup would be used to indicate the floppy should be disabled. Then the owner would set an administrator password to prevent the user from changing the setting. While this accomplishes the task, it leads to cumbersome processes when the system requires service. Consider the case where it is necessary to boot a floppy diskette in order to service the system. In this case, the servicer must enter setup and reconfigure the system to allow access to the floppy drive. After service, the servicer must enter setup and reconfigure to system to disable the floppy (back to the original state). To help improve this process, a better method of temporarily changing the system configuration is required. This disclosure describes an infrastructure to allow the servicer to authenticate himself...