Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Simple method to restrict access to computer hardware resources.

IP.com Disclosure Number: IPCOM000126480D
Original Publication Date: 2005-Jul-20
Included in the Prior Art Database: 2005-Jul-20
Document File: 1 page(s) / 21K

Publishing Venue

IBM

Abstract

A technique is disclosed to disable certain computer hardware based on who is using the system.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 65% of the total text.

Page 1 of 1

Simple method to restrict access to computer hardware resources .

     There are situations where it would be desirable to restrict access to certain hardware resources in a personal computer for some users while allowing other users to use the hardware.

     An easy to understand example would be a system in a home environment that has a CDROM burner and is used by multiple members of the family. The parents may be concerned that the younger members of the household might be tempted to make music CD's using illegal copies of songs downloaded from the internet. It would be desirable for them to have the ability to disable the CDROM burner to discourage such activities.

     One way to disable hardware is by going into BIOS setup (which can be restricted to "administrator" level access) and disabling the hardware resource. This works, but in the situation described above, would be very inconvenient for the adult users when they wanted to use the hardware (power up, go into BIOS setup, enable the hardware, and when finished, go back to BIOS setup to disable it). Because of all the repeated manual intervention, this approach is unlikely to be used.

     Some operating systems have the concept of multiple user profiles. In the case of Microsoft operating systems, the multiple profiles seem to be focused on network access and the ability of users to add or modify programs. It is unclear (from looking at the documentation) whether hardware resources can be withheld from individual users....