摘要:
A cellular phone call management system using a microprocessor-controlled remote card reader interface for a cellular telephone system to record calls onto a card as they are placed or received. A microprocessor reads information from a card placed in the remote card reader and ensures the card is valid. The cellular telephone's transceiver logic bus is monitored to determine the transaction information of a call as it is placed or received. After the call is completed, the call transaction information is recorded on the card. When all calls are complete, the card is placed in a host card reader attached to a host computer where the call transaction information is read from the card, processed, and written to a host storage device. The call transactions may then be analyzed and reports may be generated and printed by host computer software.
摘要:
A secure computer controlling access to data storage devices via a card reader. A microprocessor-controlled card reader interface logically connected to the card reader and the central processing unit (CPU) of the computer reads and writes information from and to a card placed in the card reader and performs additional functions in response to commands received from the CPU. The card reader interface includes an encryption engine for encrypting data in a data storage device and a boot ROM containing verification program code executed during an initialization procedure. The verification program verifies that a valid user card has been placed in the card reader, reads one or more questions from the user card, asks the questions of the user and verifies the answers against the contents of the card. If authorization is verified, the card reader interface permits the user to access the encrypted data. Otherwise the user is denied access to the data by one or more of the following methods: freezing the system bus, and requiring the user to reset the computer and re-enter the verification program; logically destroying the data in the data storage devices; and physically destroying the data storage devices.
摘要:
An access control/crypto system having a smart card reader and an access control program for requesting information from a user to determine if the user is authorized to access the computer. The access control/crypto system uses encryption and smart card technology as a means for securing files stored on the system, telecommunicated globally, or archived to a chosen media. The system includes an access hierarchy, combined with the issuance of smart cards, to control the various levels of access provided by the system. Further, the present system provides secure file transfer by encrypting sensitive files at a first site, transferring the encrypted version to a second site, providing an authorized user at the second site with a secret password, and decrypting the file at the second site using the secret password under control of the authorized user.
摘要:
A secure computer controlling access to internal devices via an integrated card reader. A microprocessor-controlled card reader interface logically connected to the CPU of the computer reads and writes information from and to a card placed in the card reader and performs additional functions in response to commands received from the CPU. The boot ROM of the computer is programmed to start execution from a program logic device which runs a verification program to verify the authenticity of a user. Upon a valid user card being placed in the card reader, one or more questions are read from the card and displayed to the user. The user's responses are saved and compared to the correct answers stored on the card, and if the responses match the correct answers, a power control circuit is used by the CPU to turn on power to computer peripherals the user has been authorized to use.The system additionally provides for a method of initializing and authorizing a user card with a security administrator card. Upon a valid security administrator card being placed in the card reader, a security administrator initializes and authorizes one or more individual user cards by selecting from a list of menu options displayed to the security administrator. The security administrator inputs a list of questions and answers which are then stored on the user card for use during the verification procedure.The system further provides for the physical and logical destruction of data in response to unauthorized attempts by a user to violate the physical or logical integrity of the computer system. The physical and logical destruction of data may be disabled for maintenance or configuration purposes by the use of a maintenance card.
摘要:
In the field of mixed 16-bit and 32-bit code, a method and mechanism are provided to implement alterations in the dynamic portion of memory containing the data objects used by code in the 32-bit environment so that such data is accessible to code from the 16-bit environment. Once the data objects in the stack are accesible to the 16-bit code, a function in the 32-bit code can successfully call a function in 16-bit code.
摘要:
An automotive door glass assembly which in a preferred embodiment includes an extendable door glass extendable from a door cavity and having a first bore and an edge surface; a shoe supporting the door glass having an alignment surface and a generally oblong longitudinal slot intersecting the first bore; a U-shaped cradle positioned adjacent the glass around the edge of the glass having a bore generally aligned with the first bore, the cradle also having a ledge and a surface in contact with the shoe alignment surface; a cam plate fitted within the first bore and the bore of the cradle, the cam plate having a head retained by the ledge of the cradle; a fastener eccentrically mounted in the cam plate and engaged therewith for permanently affixing the position of the glass with respect to the shoe; and a sleeve surrounding the threaded fastener and torsionally associated with the cam plate at a first end and at a second end having a torque receiving head to allow for adjustment of the glass with respect to the shoe.
摘要:
In the field of mixed 16-bit and 32-bit code, a method and mechanism are provided to implement alterations in the dynamic portion of memory containing the data objects used by code in the 16-bit environment so that such data is accessible to code from the 32-bit environment. The code necessary to implement the method is generated automatically by an enhanced compiler on identifying 16-bit linkage in the 32-bit code. Once the data objects in the stack are accesible to the 32-bit code, a function in the 16-bit code can successfully call a function in 32-bit code.
摘要:
A secure computer controlling access to internal devices via an integrated card reader. A microprocessor-controlled card reader interface logically connected to the CPU of the computer reads and writes information from and to a card placed in the card reader and performs additional functions in response to commands received from the CPU. The boot ROM of the computer is programmed to start execution from a program logic device which runs a verification program to verify the authenticity of a user. Upon a valid user card being placed in the card reader, one or more questions are read from the card and displayed to the user. The user's responses are saved and compared to the correct answers stored on the card, and if the responses match the correct answers, a power control circuit is used by the CPU to turn on power to computer peripherals the user has been authorized to use.The system additionally provides for a method of initializing and authorizing a user card with a security administrator card. Upon a valid security administrator card being placed in the card reader, a security administrator initializes and authorizes one or more individual user cards by selecting from a list of menu options displayed to the security administrator. The security administrator inputs a list of questions and answers which are then stored on the user card for use during the verification procedure.The system further provides for the physical and logical destruction of data in response to unauthorized attempts by a user to violate the physical or logical integrity of the computer system. The physical and logical destruction of data may be disabled for maintenance or configuration purposes by the use of a maintenance card.