Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Security Feature for the Personal Computer Card Type Computer

IP.com Disclosure Number: IPCOM000117245D
Original Publication Date: 1996-Jan-01
Included in the Prior Art Database: 2005-Mar-31
Document File: 2 page(s) / 40K

Publishing Venue

IBM

Related People

Akai, T: AUTHOR [+2]

Abstract

Disclosed is a security feature, by which information assets can be secured and prevented from leaking to the outside, for the Personal Computer (PC) Card type computer, which has Central Processing Unit (CPU) Input/Output (I/O) Devices and Memory, etc. This feature erases data and program which are stored in the PC Card, and the feature destroys the PC Card itself, when the security feature detects the invalid access to the PC Card.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 99% of the total text.

Security Feature for the Personal Computer Card Type Computer

      Disclosed is a security feature, by which information assets
can be secured and prevented from leaking to the outside, for the
Personal Computer (PC) Card type computer, which has Central
Processing Unit (CPU) Input/Output (I/O) Devices and Memory, etc.
This feature erases data and program which are stored in the PC Card,
and the feature destroys the PC Card itself, when the security
feature detects the invalid access to the PC Card.

The Figure shows the example of this feature.
  1.  This PC Card type computer has standard computer components,
such
       as CPU (1), I/O devices (2) and Memory (3).  This PC Card has
the
       Invalid Access Detection Mechanism (4), such as the password
       checking with the keyboard, or finger print checking with the
       scanner.  This PC Card has the Security Program (5) and/or
       Security Hardware (6) to erase Data, Program and/or destroy
the
       PC Card.
  2.  The Invalid Access Detection Mechanism (4) reports the invalid
       access to the CPU (1) as soon as it detects the invalid access
to
       the PC Card through the I/O Device (2).
  3.  The CPU (1) executes the Security Program (5) in the Memory
(3).
  4.  The Security Program (5) erases all data and programs stored in
       the Memory (3).
  5.  The Security Program (5) destroys the PC Card with Security
       Hardware...