الثلاثاء، 11 يوليو 2017





My US patent has Hardware electronic chip , IC , which will be an anti-hacker anti-virus for mobile Phones, Laptops & office computers, with this breakthrough hardware ship it will be totally impossible for any software if it is a virus or warm or hacker to breakthrough it's defenses and steel information or plant a virus or a warm. 1
From now on every computer will be 100% safe if it is in an office or at home or in a factory or in government buildings or nuclear station or hospital or in any place on earth, it will be safe %100 for ever. 2
This chip takes orders from the keypad only and only this chip controls the memory, so no software if it is a virus or warm or hacker can manipulate with computer memory, since only this chip controls the read and write options on the memory of this computer. and since it receives orders from the keyboard only therefore no software can control the memory or steel data from memory or delete data from memory or encrypt memory since only this hardware electronic chip can control the memory and this chip gets its order only from hardware keyboard which only the user has access to. 3





it was not possible to animate the SSD read and write functions because it has no moving parts to animate,  therefore the animations I made was for the HDD read and write heads. so when you watch the animation for the HDD think the same will take place for the SSD and the protection will be %100 proof. 2 

US patent 7724458 anti virus anti Hacker HDD three platters 

after analyzing the points of vulnerability in computer systems I find two things
FIRST: all read and write options are open all the time for every thing and every body with no restrictions at all
SECOND: I found the RAM is dealt with as one unit were the OS and all programs and all internet data including attachments when opened it reside on this single RAM
Hackers and viruses and warms use both vulnerabilities to attack computer memories and to steal data from computers or to damage data either by encrypting data and ask for ransom or destroying data via attachments, when opened it will do the damages. since it can move from the RAM to the memory via the microprocessor

my 3 patents identified these two vulnerability  and made two different security methods to protect the computer data form hackers and viruses

first method is the IC controlling the memory read and write functions, were the IC is controlled by the keyboard, were the user controls the keyboard. so no software used in my invention, since every thing is hardware in this chain of commands.... 
user - keyboard - IC - SSD or HDD, 
therefore no software what so ever can breakthrough this hardware security system

second method the RAM is divided into two parts the first receives data only from the computer HDD or SSD, were the second part of the RAM receives data from dangerous parties like internet or flash memory , so when the user want to work on his confidential data he only press one or two keys on computer keyboard and the second RAM will be deleted totally with all its possible viruses and warms and opened attachments. while the first RAM which holding the operating system and other programs keeps all its data as they are, so the computer keeps functioning as if nothing has happened.

when a user browsing the internet opens a dangerous attachment this attachment will be regarded as a stranger so it will be opened in the second RAM, and when the microprocessor deals with it, it can not be moved to the protected partitions of the memory since their write heads are switched off, therefore no harm can be done to a computer using my invention by any virus warm or attachment. After opening the dangerous attachment the user can delete the second RAM where this open attachment will vanish

this invention when it deals with a memory having three partitions the read and write heads will be switched off and on as follows
I will put it here as simple as it can get

when browsing the internet we will have the heads off and on as follows
program partition write head off, 
confidential  partition read and write heads are off, 
internet partition read and write heads are on, 

when we want to deal with confidential files, we push some keys on the keyboard and we will have as follows
program partition write head off, 
confidential  partition read and write heads are on, 
internet partition read and write heads are off, 

but if you watch the videos and read the specification of the patent at the USPTO you will get full description of how my invention works.

on the keyboard of a desktop or laptop when a user press Ctrl + Alt + function, the  user can select any of these security features for the memory


Ctrl + Alt + F1.. OS partition read on write off,, confidential partition read/write off, internet partition read/write on
Ctrl + Alt + F2 .. OS partition read on write off,, confidential partition read/write on, internet partition read/write off
Ctrl + Alt + F3 ..OS partition read/write on, confidential partition read/write off, internet partition read/write off
Ctrl + Alt + F4 .. OS partition read/write on, confidential partition read/write on, internet partition read/write on

My three patents which Protect phones & computers from hackers & viruses are mother & child & grandchild.

Mother:  Patent No: 7724458 Hard disk drive with selectable reading and writing to/from different platter surfaces

Child:  Patent No: 8112601   Data storage device with security feature

Grandchild:   Appl. No.: 13/338091   SECURE DATA STORAGE DEVICE

The Mother (Patent No: 7724458) claims HDD. Using a hardware switch to perform the protection.
The Child (Patent No: 8112601)   claims storage device, any kind of storage device which include HDD & SSD. Using a hardware switch to perform the protection.

The  Grandchild:   (Appl. No.: 13/338091 )   claims storage device, any kind of storage device which include HDD & SSD. Using a hardware electronics chips to perform the protection. Where the user via the keyboard of a computer or laptop keyboard controls the storage device read & write via the electronics chips.
In mobile phones the user controls the storage device read & write via the keypads of the mobile phones via the electronic chip.

The animations below I have done them for the Mother (Patent No: 7724458) it explains it for the HDD.
But is useful to understand the idea fully. So when you read the Grandchild text you will understand it immediately since it is the same idea but with small variations.
So please watch first the three animations below then read the text of the Grandchild then you will understand it so easily.

Grandchild:   Appl. No.: 13/338091   SECURE DATA STORAGE DEVICE
US patent 8112601 anti virus anti Hacker mobile phone



US patent 7724458 anti virus anti Hacker HDD five platters 

US patent 7724458 anti virus anti Hacker HDD three platters 

Hard disk drive with selectable reading and writing to/from different platter surfaces 


Data storage device with security feature 


US patent 8112601 protects all phones, Android and other types from hackers & viruses.
These patents will protect small businesses and personal computers and giant corporations like Banks Data, governments data, police data, hospital data, US Defense computers & Pentagon & military systems & ministries & car factories all kinds of factories & TV stations radio stations & satellites & ship ports & airports

it is unpenetratable security system for every thing on this planet.

US patents 8112601 & 7724458 & 13/338091 protects phones & computers from hackers & viruses

This set of my Three Patents will make a new laptop which will stop any virus and any hacker, if it is made and advertised on face book and tweeter and else, it will land slide this world and sell more than any laptop, since all people will buy it so they are certain that their OS and software’s will never be hit by a virus or a worm either to stop them from functioning or to slow them down. Plus there data is secure from hackers.
Plus all companies will buy them (banks, governments, police, research lab, hospitals, ministries, manufactures, etcetera) since they are sure no Hacker will steal their data.
if some investors take this patent and make this new laptop they will make tens of millions of profit (if not hundreds of millions) since this new laptop and desk top computer will land slide the entire world.
Not to mention mobile phones where all manufacturers will come to license these patents for their phones to stop viruses, and now the phone viruses has increased tremendously.

Jasim Alazzawi


Mobile: 00971508668762
E-mail:    brysam2@yahoo.co.uk












after analyzing the points of vulnerability in computer systems I find two things
FIRST: all read and write options are open all the time for every thing and every body with no restrictions at all
SECOND: I found the RAM is dealt with as one unit were the OS and all programs and all internet data including attachments when opened it reside on this single RAM
Hackers and viruses and warms use both vulnerabilities to attack computer memories and to steal data from computers or to damage data either by encrypting data and ask for ransom or destroying data via attachments, when opened it will do the damages. since it can move from the RAM to the memory via the microprocessor

my 3 patents identified these two vulnerability  and made two different security methods to protect the computer data form hackers and viruses

first method is the IC controlling the memory read and write functions, were the IC is controlled by the keyboard, were the user controls the keyboard. so no software used in my invention, since every thing is hardware in this chain of commands,,,,   user - keyboard - IC - SSD or HDD, therefore no software what so ever can breakthrough this hardware security system

second method the RAM is divided into two parts the first receives data only from the computer HDD or SSD, were the second part of the RAM receives data from dangerous parties like internet or flash memory , so when the user want to work on his confidential data he only press one or two keys on computer keyboard and the second RAM will be deleted totally with all its possible viruses and warms and opened attachments. while the first RAM which holding the operating system and other programs keeps all its data as they are, so the computer keeps functioning as if nothing has happened.

when a user browsing the internet opens a dangerous attachment this attachment will be regarded as a stranger so it will be opened in the second RAM, and when the microprocessor deals with it, it can not be moved to the protected partitions of the memory since their write heads are switched off, therefore no harm can be done to a computer using my invention by any virus warm or attachment. After opening the dangerous attachment the user can delete the second RAM where this open attachment will vanish

this invention when it deals with a memory having three partitions the read and write heads will be switched off and on as follows
I will put it here as simple as it can get

when browsing the internet we will have the heads off and on as follows
program partition write head off, confidential  partition read and write heads are off
internet partition read and write heads are on

when we want to deal with confidential files, we push some keys on the keyboard and we will have as follows
program partition write head off, confidential  partition read and write heads are on
internet partition read and write heads are off

but if you watch the videos and read the specification of the patent at the USPTO you will get full description of how my invention works.




















































































1. A data storage device comprising: at least two partitions wherein none of said partitions includes the entire contents of any drive in said data storage device; and a set of manually operated switches; wherein said manually operated switches can be independently set for each partition into each of read/write, read only, and disabled modes; and wherein read/write and/or write operations for at least one of said partitions is disabled by a user when said data storage device is believed to be accessible by one or more potentially malicious processes. 

2. The data storage device of claim 1, further comprising separate partitions for (1) operating systems and trusted applications, (2) applications from non-trusted sources, (3) confidential data, (4) non-confidential data, and (5) all other data. 

3. The data storage device of claim 1, wherein the data storage device comprises a magnetic disk drive, wherein each of said partitions comprises at least one platter surface. 

4. The data storage device of claim 1, wherein said set of manually operated switches comprises at least one mechanical switch mounted such that it can be manually operated from outside the outer case of any computing machine using said data storage device. 

5. The data storage device of claim 4, wherein said set of manually operated switches further comprises separate switches for each read channel and each write channel for each partition. 

6. The data storage device of claim 4, wherein said set of manually operated switches further comprises a mode switch, wherein the positions of said mode switch enable and disable reading and writing separately for each of said partitions according to a predetermined set of rules. 

7. The data storage device of claim 1, further comprising an independent hardware circuit connected to said set of manually operated switches, wherein said set of manually operated switches are colocated with a computing machine user interface, and wherein said independent hardware circuit controls enabling and disabling of read and read/write operations for each of said partitions. 

8. The data storage device of claim 7, wherein said set of manually operated switches cannot be read by the processor of said computing machine when said independent hardware circuit is changing said enabling and disabling in response to changes in said set of manually operated switches. 

9. The data storage device of claim 7, wherein said computing machine user interface comprises a keyboard, keypad, touchpad or touchscreen. 

10. The data storage device of claim 7, wherein said independent hardware circuit is inactive unless explicitly enabled by a special signal from a user. 

11. The data storage device of claim 7, wherein said independent hardware circuit enables a user, but not the computing machine processor, to reprogram the specific enabling and disabling responses to said set of manually operated switches. 

12. The data storage device of claim 7, wherein said independent hardware circuit comprises two parts, wherein a first part detects and converts the key presses (or equivalent) associated with mode control into a special form and further transmits said special form to a second part, and wherein the second part controls the enabling and disabling of read and read/write operations for each of said partitions. 

13. A computing machine comprising a processor, system memory, and a data storage device; wherein said data storage device comprises at least two partitions, wherein none of said partitions includes the entire contents of any drive in said data storage device; and a set of manually operated switches; wherein said manually operated switches can be independently set for each partition into each of read/write, read only, and disabled modes; wherein read/write and/or write operations for at least one of said partitions is disabled by a user when said data storage device is believed to be accessible by one or more potentially malicious processes; and wherein said system memory comprises at least two memory partitions, and wherein one of said memory partitions is used for all data accessed by non-trusted applications and erased when all non-trusted applications are terminated or before said data storage device is configured to enable write access to trusted applications or data. 

14. The computing machine of claim 13, further comprising a user-accessible switch to manually erase at least one of said memory partitions. 

15. A method for protecting a data storage device from malicious data alteration, comprising: dividing said data storage device into at least two partitions, wherein none of said partitions includes the entire contents of any drive in said data storage device; using a set of manually operated switches to independently set each partition into each of read/write, read only, and disabled modes; and manually disabling read/write and/or write operations to at least one partition whenever said data storage device is believed to be accessible by one or more potentially malicious processes. 

16. The method of claim 15, further comprising disconnecting or disabling network connections to all processors capable of accessing said data storage device whenever said at least one partition is not disabled. 

17. The method of claim 15, wherein said dividing can only be performed when all network connections to all processors capable of accessing said data storage device are disconnected or disabled, any of said partitions containing runnable processes are disabled for reading, and any system memory that could have been accessed by one or more potentially malicious processes has been erased. 

18. The method of claim 15, wherein said dividing can only be performed when a manual switch is activated. 

19. The method of claim 18, wherein said manual switch is a momentary contact switch. 

20. The method of claim 18, wherein said manual switch automatically deactivates after a period of time somewhat longer than the minimum required for performing said dividing.

Description



CROSS REFERENCE TO RELATED APPLICATIONS 

[0001] This application is a Continuation-in-Part Application claiming priority from U.S. patent application Ser. No. 10/913,435, filed Aug. 9, 2004, now U.S. Pat. No. 7,724,458, and U.S. patent application Ser. No. 12/268,323, filed Nov. 10, 2008, now allowed. 

FIELD OF THE INVENTION 

[0002] The present invention generally relates to apparatuses and methods for protecting data on data storage devices from malicious alterations, additions, and deletions and from unauthorized access. 

BACKGROUND OF THE INVENTION 

[0003] A great deal of data and productivity is lost every day by users of computers and other devices with embedded processors and data storage due to a variety of malicious processes, typically running on a user machine without user knowledge or permission and accessing or altering user data in system memory or on attached data storage devices without user knowledge or permission. These malicious processes are collectively known as malware, and are given a variety of specific names according to the nature of their function: viruses, spybots, adware, phishing, and the like. Some forms of malware alter, add, or delete user data; others merely gain access to confidential user information or record user activity. Users are tricked into loading such malicious data and processes, and/or allowing malicious or unauthorized access to data by means of whatever communications paths are available including removable data storage media and network connections. The resulting financial losses can be measured in billions of dollars, and an entire industry has developed to combat the problem. 

[0004] Prior art systems provide limited means of segregating and protecting user data and processes from malicious access. Protection can be provided by completely isolating a system, allowing no data to be loaded from the outside after factory setup and providing no network connections of any sort. Alternatively, certain data storage devices are provided with software and/or hardware means to designate some or all of the storage space as "read-only." For example, many optical disks can be configured to forbid alteration or deletion of stored data once written. Floppy disks are provided with a hardware "switch" (a mechanical flag) which signals the disk drive that the stored data are read only. Some semiconductor memory devices can be put into a read-only state ("ROM" or "read-only memory"). These devices can be loaded with malware-free data in a secure environment, and the data thereafter can exist in a read-only state thereby preserving the integrity of the data. When applications are delivered on such devices, however, the application is often "installed" or copied from the secure device into read-write memory which is not safe from malicious attack. Users may perform such installations for reasons of access speed: read-write data storage devices typically have faster access times than read-only devices (for example magnetic disks compared to optical disks). Users of a given application may also need to store new data. For example, a word processing application is designed to edit and create new data which must be stored in a writeable data storage device. A cell phone must be able to store a contact list of names and phone numbers. A navigation system typically stores information about routes traveled. Most applications must also store user configuration data that customizes the behavior of the application for the user and the particular hardware and software environment and/or records use history. 

[0005] While read-write data storage is convenient to use for all these reasons, it is vulnerable to unauthorized alteration, deletion, and access. Operating systems typically provide a permission mechanism to control access, at least at the file system level. However, such systems remain vulnerable to determined malicious attack in that various means have been devised to circumvent these software file permission protection mechanisms. A common approach to protecting a system from malicious attack has been to install additional software: "antivirus" software as well as similar protection software to detect and remove adware and spybots and to protect from phishing attacks. Such software packages typically look for an identifiable signature of known malware entities and respond accordingly by removing or sequestering the offending memory or files. These software packages must be updated frequently as new malware entities are developed, and significant system resources are required both to download the updates and to regularly scan all vulnerable data storage for possible infection. Further, when a new malware entity appears, systems are vulnerable until an update to protection software can be developed, distributed, installed, and run. Considerable damage can be done during this time interval. 

SUMMARY OF THE INVENTION 

[0006] A data storage device is disclosed with at least two partitions and a set of switches to separately enable and disable read and write operations to each of the partitions, wherein read and/or write operations for at least one of the partitions is disabled when the data storage device is accessible by one or more potentially malicious processes. In one embodiment, there are five partitions for (1) operating systems and trusted applications, (2) applications from non-trusted sources, (3) confidential data, (4) non-confidential data, and (5) all other data. A mode switch can be used to enable and disable reading and writing for each of the partitions according to a predetermined set of rules that effectively prevent viruses and other malware from altering or accessing programs and data. 

BRIEF DESCRIPTION OF THE DRAWING 

[0007] FIG. 1 shows an example of a mode switch for use with an embodiment of the present invention. 

DETAILED DESCRIPTION OF THE INVENTION 

[0008] Before the present invention is described in detail, it is to be understood that unless otherwise indicated this invention is not limited to specific data storage devices. It is also to be understood that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the scope of the present invention. 

[0009] It must be noted that as used herein and in the claims, the singular forms "a," "and" and "the" include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to "a disk drive" includes two or more disk drives, and so forth. 

[0010] Where a range of values is provided, it is understood that each intervening value, to the tenth of the unit of the lower limit unless the context clearly dictates otherwise, between the upper and lower limit of that range, and any other stated or intervening value in that stated range, is encompassed within the invention. The upper and lower limits of these smaller ranges may independently be included in the smaller ranges, and are also encompassed within the invention, subject to any specifically excluded limit in the stated range. Where the stated range includes one or both of the limits, ranges excluding either or both of those included limits are also included in the invention. 

Definitions: 

[0011] As used herein, the term "data storage device" refers to any physical device capable of storing digital data such that it can be read, written, and erased by an attached computing machine. In certain embodiments, erase and/or write can be disabled. Exemplary embodiments of the present invention are described in terms of magnetic hard disk drive embodiments of a data storage device, but other embodiments can use other storage technologies including but not limited to optical disk drives such as compact discs (CDs) and digital versatile discs (also known as "digital video discs" or DVDs), and Blu-ray discs; floppy (magnetic) disk drives; magnetic tape drives; optical tape drives; semiconductor memory devices such as "flash drives," "memory sticks," "memory cards" and the like; Redundant Arrays of Independent Disks (RAID) used as single devices; etc. When used in the singular, a "data storage device" always refers to hardware or a virtual equivalent which is treated as a single device by any computing machine attached to the device. Two or more physical drives can never be considered an embodiment of a (singular) "data storage device" unless they are part of a RAID storage array. 

[0012] As used herein, the term "partition" refers to a subset of the memory in a data storage device less than the entire storage capacity of the data storage device. The term "partition" never refers to the entire contents of any one data storage device; if there are any partitions, then there must be at least two partitions defined within any one data storage device. The entire contents of any one data storage device can be referred to as a "drive," but it is never referred to as a "partition." Note, that in the special case of a RAID data storage device, a partition still cannot contain the entire contents of any disk drive within the array, because portions of a byte or word are distributed across more than one physical drive for redundancy and decreased access time. A partition of a RAID data storage device can contain subsets of multiple physical devices, but it cannot contain the entire contents of any one physical drive within the array. 

[0013] In accordance with one of more embodiments of the present invention it is useful to classify data stored on a data storage device into two or more categories with respect to security and risk of infection. For example and without limitation, five such categories can be used. Data for each of the five categories can be stored in separate "partitions" within a data storage device: [0014] 1. "Trusted partition": trusted applications (programs) and operating systems, typically factory-installed or installed from a trusted source such as a supplier's CD or DVD, [0015] 2. "Internet application partition": applications downloaded from the internet or other source of uncertain integrity, [0016] 3. "Confidential partition": confidential user-generated data, [0017] 4. "Non-confidential partition": non-confidential user-generated data plus data from trusted sources, [0018] 5. "Internet data partition": data downloaded from the internet or other source of uncertain integrity. ("Data" can include documents, drawings, photographs, music, movies, or any other information that can be stored as digital data.) 

[0019] Data storage can be divided into partitions of suitable size to store each of these five categories of data. For example and without limitation, a magnetic hard disk drive can be used to store the file system of a personal computer. A magnetic hard disk drive typically comprises a set of platters. For each platter, there are two arms, one for the upper surface and a second one for the lower surface, where each arm carries two heads, one for reading data from the platter surface and the other for writing new data and deleting data previously written. Each partition can comprise one or more platter surfaces according to the storage needs for each category of data. 

[0020] In accordance with one of more embodiments of the present invention, a set of hardware switches can be provided that enable and disable reading and/or writing/deleting functions for each partition separately. For example and without limitation, the switches can interrupt the electrical signal connections to the read and write heads of a magnetic disk or otherwise enable and disable the heads. Other types of data storage may require different hardware details to enable and disable read and write functions. Any means of enabling and disabling read and write functions to a selected data partition can be used. For example and without limitation, the data stream can be interrupted, power to a read or write head can be interrupted, or the read/write function can be disabled by other means such as placing a read/write head in a locked parking position, lifting a read or write head to a non-functional position, turning off a required clock signal, lowering the power to a read/write head below a functional threshold, etc. For devices other than magnetic hard disk drives, different mechanisms may be appropriate for enabling and disabling read and write/delete functions. For the purpose of this description, the word "channel" will be used to refer to a generic data path to or from a data storage device, and "enabling or disabling a read or write channel" is used to describe the generic version of the process of enabling or disabling read or write functionality for an arbitrary data storage device. 

[0021] In accordance with one or more embodiments of the present invention, the user controls the hardware and the data security level by physically moving mechanical switches mounted external to the case containing the data storage device. In certain embodiments, such mechanical switches can directly perform the enable/disable function. In other embodiments, the signal to be interrupted may be a high-bit-rate signal line that cannot readily be routed through a mechanical switch on the external case. In such embodiments, it may be necessary to read the switch position with digital logic, which, in turn, implements the actual enable/disable function indirectly via suitable high-speed logic circuitry. (When not otherwise identified, the term "switch" is use generically herein to refer to both mechanical and electronic switching mechanisms that can enable or disable read and write operations to a portion of data in a data storage device.) 

[0022] If indirect switching with digital logic is used, it is preferably implemented in a tamperproof configuration that cannot be controlled by any means other than the external mechanical switches. For example, it may not be desirable to use the processor of a host computing machine to implement the indirect switching logic. Such a configuration could be vulnerable to virus attack if a virus were designed to take control of the switching logic. Similarly, it may not be desirable to allow the host computer to control the data storage device partitioning function once a new device is partitioned. Again, a virus could, in principle, reallocate partitions and overcome the assigned security status of particular portions of memory by reassigning them to less secure partitions. However, such host computer control can be a convenience to system designers, administrators and users. It is possible to allow the host computer to manage at least the partitioning and repartitioning of a data storage device as long as such partitioning and repartitioning are performed under suitably secure conditions when no potentially risky external network connections exist, and no non-trusted data storage medium is loaded. For example and without limitation, a data storage device could have a separate mechanical "partition-lock" switch, which can be mounted in a location not accessible from outside the external case. In the locked position, no changes to partition configuration would be possible. Partitioning and repartitioning would be enabled only when the partition-lock switch was in the unlocked position. Further, in accordance with one or more embodiments of the present invention, the partition-lock switch can be a spring-loaded or momentary contact switch, so that a user must hold the switch in the unlocked position to enable partitioning and repartitioning. In other embodiments of present invention, the switch can include a timing feature such that it returns automatically to the locked state after a period of time somewhat longer than the minimum required for the partitioning or repartitioning. This time should be long enough to comfortably complete the partitioning or repartitioning, but no longer. 

[0023] In general, each read or write channel (for example, each head for each platter of a magnetic hard disk) can be independently enabled and disabled. In accordance with one or more embodiments of the present invention, when there are many such channels associated with a single partition, the mechanisms to enable/disable the individual channels can be grouped together in multi-pole switch configurations, which allows a user to be presented with fewer switches than read/write heads. For example and without limitation, a user could be presented with only one switch per partition, and the controls for all heads or channels assigned to each partition could be set up as poles on the corresponding switch. Such a set-up can be purely mechanical, or it can be implemented with the aid of secure switching logic whose configuration is protected with the aid of a partition-lock switch or similar security mechanism as described above. 

[0024] In accordance with one or more embodiments of the present invention, the switches provided for user control over data security can be further configured to provide a set of protection modes. In accordance with one such embodiment, each switch controls one or more pairs of channels for reading and writing a partition, and each switch has three positions. In the first position, both read and write functionality for the partition are enabled. In the second position, the write functionality is disabled, and the read functionality remains enabled. In the third position, both read and write functionality is disabled, and no data access is possible. 

[0025] In accordance with one or more additional embodiments of the present invention, a single multi-position switch is provided for user control of protection modes. For example, and without limitation, a mode switch for a computing machine can be provided with four positions, at least one of which can additionally require the release of security latches for access. The first position and mode can be called the "normal" position/mode, which would be used by typical users most of the time, and in particular, whenever they are connected to the internet. In this position the following read/write channels are enabled or disabled by partition: [0026] 1. "Trusted partition": read enabled, write/delete disabled (i.e., safe from viruses), [0027] 2. "Internet application partition": read enabled, write/delete disabled (i.e., safe from viruses), [0028] 3. "Confidential partition": read and write/delete disabled (i.e., safe from viruses and unauthorized access), [0029] 4. "Non-confidential partition": read enabled, write/delete disabled (i.e., safe from viruses), [0030] 5. "Internet data partition": read and write/delete enabled (all new data and documents are stored on this partition when connected to the internet). 

[0031] The second position and mode are used when the user is disconnected from the internet and wishes to edit, add, or delete data on Partitions 3 or 4. In this position, the following read/write channels are enabled or disabled by partition: [0032] 1. Trusted partition: read enabled, write/delete disabled (i.e., safe from viruses), [0033] 2. Internet application partition: read enabled, write/delete disabled (i.e., safe from viruses), [0034] 3. Confidential partition: read and write/delete enabled, [0035] 4. Non-confidential partition: read and write/delete enabled, [0036] 5. Internet data partition: read and write/delete disabled (i.e., any malware present on this partition cannot act or be copied to another partition). Users can choose to disconnect from the internet before switching to Mode 2 so that it is not possible for an unauthorized person or program to gain access to confidential data or documents. In accordance with one or more embodiments of the present invention, the connection to the internet can also be physically and automatically disabled or disconnected when the control switch is in the second position (for example, by adding an additional pole to the mode switch to disable the internet connection in Mode 2). For further security, and especially if the user knows that a suspicious site was accessed, the computing machine may be restarted just before moving the control switch to the second position. This will ensure that any virus or other malware hidden in system memory will be erased before making Partition 3 and 4 accessible for edit/write/delete operations. 

[0037] The third position and mode are used to download software from the internet or to install software from other sources of questionable integrity. If the computing machine is on, it can be turned off first to ensure that any virus or other malware hidden in system memory has been eliminated. A first safety latch can be provided which must be released to allow the control switch to be moved to the third position. In this position, the following read/write channels are enabled by partition: [0038] 1. Trusted partition: read enabled, write/delete disabled (i.e., safe from viruses), [0039] 2. Internet application partition: read and write/delete enabled, [0040] 3. Confidential partition: read and write/delete disabled, [0041] 4. Non-confidential partition: read enabled, write/delete disabled, [0042] 5. Internet data partition: read and write/delete disabled (i.e., any malware present on this partition cannot act or be copied to another partition). This mode is used only to load new applications from the internet or other unreliable source. Applications are loaded into Partition 2, the internet application partition. Before they are run, the control switch is returned to the first or second position. Viruses are unable to affect any applications on Partitions 1 or 2, because these partitions are in a read-only state whenever the applications are running. 

[0043] The fourth position and mode are used for formatting disks, assigning and reassigning partitions, and installing applications, data, and documents when the user is absolutely confident that no security hazards exist (no non-secure network connection is active, and all removable media to be used are trusted). All partitions are fully enabled for reading, writing, and deleting. In accordance with one or more embodiments of the present invention, a second safety latch can be provided that must be released to move the control switch from Position 3 to Position 4. Thus, two latches would need to be deliberately released to allow a user to move the control switch from Position 1 or 2 to Position 4. 

[0044] In accordance with one or more embodiments of the present invention, a third safety latch can also be provided. This third latch can lock the control switch in Position 1. This additional latch, which can be provided with a physical lock or protected by some sort of code, user ID, or password access limitation, if desired, can be used on computing machines where a system administrator does not trust general users to properly use the control switch in any but Position 1. Examples include computing machines for at least part-time public access in schools and libraries, computing machines shared by parents and young children, and the like. The computer remains in the most secure mode (Mode 1) unless the third latch is released and the Mode switch is moved by an authorized administrator. 

[0045] In accordance with one or more further embodiments of the present invention, Modes 2 and 3 can be further refined by dividing them into submodes. Various hardware implementations and user interfaces can be used. For example, and without limitation, as shown in FIG. 1, the main mode switch can be implemented as a slide switch 100 with four positions. A second "protection switch" 101 can be implemented, for example and without limitation, as a second slide switch, oriented adjacent to and perpendicular to the main mode switch, with positions marked "red," "blue," and "green" (or A, B, and C or any other convenient labels). This second switch can be ignored in Modes 1 and 4 (i.e., all positions of the protection switch provide the same mode when the main mode switch is in positions 1 or 4). 

[0046] In Mode 2 as previously defined, read/write access is provided for Partitions 3 and 4 (confidential and non-confidential data). There is a potential risk that applications downloaded from the internet (which can be run in Mode 2) could contain viruses that could damage data in Partitions 3 and 4. If the user is confident that this risk is very low, then the protection switch can be left in the "red" position, and the read and write channels are enabled or disabled as previously described. If the user is not sure, two alternate modes can be provided. With the protection switch in the "blue" position, the internet application partition (Partition 2) is disabled (no read or write). Trusted applications from Partition 1 can be run and allowed access to data on both Partitions 3 and 4. With the protection switch in the "green" position, write access is disabled for Partitions 3 and 4, and the internet application partition (Partition 2) is enabled for both read and write. This mode can be used to run possibly suspect applications from Partition 2 without risk of damage to data on Partitions 3 and 4. These data are still available to read but not to write, modify, or erase. Any new data are written instead to Partition 2, where such data can remain quarantined after the application is terminated and the protection switch is returned to the blue position. Note that these new data written on Partition 2 in Mode 2 are accessible (read only) in Mode 1. A user can, for example and without limitation, transmit documents or other data written in Mode 2 via e-mail (or FTP or other communications protocol) over the internet or an intranet after switching back to Mode 1. 

[0047] Mode 3 as previously defined, is used solely to install new applications from non-trusted sources. As such, only the internet application partition (Partition 2) is enabled for write operations. This mode is provided with the protection switch in the "blue" position. Users may also have a need to load accessories or updated for trusted applications as well. In the four modes as previously defined, such updates could only be made in Mode 4, where read and write is enabled for all partitions. To avoid any possible risks from malware installed on Partitions 2 or 5 (the internet application and data partitions), an alternate Mode 3 can be provided when the protection switch is in the "green" position. In this mode, read and write are enabled for Partition 1 (the trusted application partition), and access to all other partitions is fully disabled. Updates, accessories, and new applications can be installed on Partition 1 from trusted media such as vendor-supplied CDs or DVDs. 

[0048] A total of seven distinct protection modes are provided with the alternate versions of Modes 2 and 3. While these have been described in an exemplary manner with a user interface comprising a main mode switch and a secondary protection switch, any other suitable interface providing access to the same seven modes or obvious variations thereof are within the scope of the present invention. For example and without limitation, a single mode switch with seven positions can provide means of selecting among the seven modes. The four- and seven-mode configurations are summarized in Table 1: 

TABLE-US-00001 TABLE 1 Position(s) Partition 1 Partition 2 Partition 3 Partition 4 Partition 5 1 Read only Read only Disabled Read only Read/write 2 or 2-red Read only Read only Read/write Read/write Disabled 2-blue Read only Disabled Read/write Read/write Disabled 2-green Read only Read/write Read only Read only Disabled 3 or 3-red/ Read only Read/write Disabled Read only Disabled blue 3-green Read/write Disabled Disabled Disabled Disabled 4 Read/write Read/write Read/write Read/write Read/write 

[0049] In accordance with one or more further embodiments of the present invention, three partitions can be used instead of five. These embodiments are especially suitable for devices such as cell phones which have a limited number of data types and have no need to distinguish between confidential and non-confidential data. For example and without limitation, partitions can be created for (1) operating systems, and trusted applications; (2) trusted data such as telephone numbers, text files, music files, photos, and the like; (3) non-trusted data and applications, such as data or applications downloaded from the internet or provided by non-trusted sources. 

[0050] Similar switching configurations to those described above for the five-partition configuration can be implemented. For example and without limitation, a mode switch can be used to enable and disable reading and writing for each of the partitions according to a predetermined set of rules that effectively prevent viruses and other malware from altering or accessing programs and data. In accordance with one or more embodiments of the present invention, a three-position mode switch can be used, and the predetermined set of rules can be defined by Table 2: 

TABLE-US-00002 TABLE 2 Position Partition 1 Partition 2 Partition 3 1 Read only Read only Read/write 2 Read only Read/write Disabled 3 Read/write Disabled Disabled 

[0051] From the table above it can be readily seen that when the mode switch is in Position 1, the operating system, and trusted applications are safe from alteration but readable, and the device can save all internet data on the third partition, (non-trusted data partition). When the mode switch is in Position 2, operating systems and trusted applications (Partition 1) are safe from alteration, and non-trusted data (Partition 3) cannot act or be altered (no read or write). No virus can move from this partition to the other partitions. Trusted data (Partition 2) can be read and written, so new phone numbers, music, text files, or other trusted data can be added. For added security, the device can be manually or automatically disconnected from the internet while in Mode 2 to ensure that Partition 2 is not vulnerable to external unauthorized access while in Mode 2. Position 3 is used solely to add or update operating system and trusted applications on Partition 1. Partitions 2 and 3 are disabled. 

[0052] In accordance with one or more embodiments of the present invention, a device using a data storage device with three partitions can have an additional switch internal to the device and/or not accessible under normal use conditions. This switch can activate a fourth mode where read and write operations are enabled on all partitions. Such a mode would typically be used by the manufacturer or service personnel for system configuration and software installation or reinstallation. 

[0053] In accordance with one or more embodiments of the present invention, the mode control switching functions are provided via the keyboard interface of a computing machine. However, to ensure that no malicious software can simulate or tamper with the mode control, any keys or switches on the keyboard which provide mode control are not connected to the computing machine processor. Rather these special keys or switches are either provided as an alternate mounting location for the external mode control switch described above, or they have an independent hardware circuit which controls the enabling of read and write of the storage device partition in a way that cannot be affected by any process or instruction from the computing machine processor. Only the keyboard keys or switches dedicated to storage device mode control can be used to affect the actions of the independent hardware circuit. 

[0054] In certain embodiments of the present invention, the mode control keys can be shared with other keyboard functions; i.e., the keys can be readable by both the independent hardware circuit and the regular keyboard buffer. This allows the same keys to be used for other user interface functions in any running programs, and allows the computing machine processor to read and monitor (but not change) the status of the mode control keys. However, for maximum security, the computing machine processor should not be capable of even reading the mode state directly or indirectly, as there could then be a possibility for a malicious process to confuse a user by, for example, incorrectly displaying the mode status. To avoid such a possibility, the transmission of the state of any mode control keys to the normal keyboard buffer can be disabled whenever the independent hardware circuit is active. In this way, it is impossible for the computing machine to determine the current state of any mode control. 

[0055] In an exemplary embodiment of the present invention, the default state of the independent hardware circuit is inactive. In order to activate it, the user would have to provide a special signal such as pressing an unusual combination of keys, for example, a particular combination of three or four keys simultaneously. Then, once the independent hardware circuit is active, mode control changes can be made. For example, if the user pressed the Fl key, the independent hardware circuit could change the status of read and write enablement for each partition according to a table provided to the user (e.g., position 1 in Table 1 or Table 2). Similarly, the F2 key could provide the functionality of position 2 in the table, and so on. When finished changing mode, the user can disable mode switching by pressing the same or a similar combination of keys as was used to activate mode switching. The independent hardware circuit can also implement an automatic timeout to disable mode switching after a time interval even if the user fails to explicitly do so. 

[0056] In accordance with one or more further embodiments of the present invention, the particular table that is applied when a user presses mode control keys or switches can be selected and/or edited under control of the independent hardware circuit to allow the user to customize his security features according to his needs. As is the case for mode switching, any such table programming can be hidden from the computing machine by ensuring that any key presses associated with table selection or editing are never sent to the computing machine processor. 

[0057] In accordance with one or more further embodiments of the present invention, the independent hardware circuit can be designed to support other devices besides a keyboard to provide yet further design alternatives for the mounting location of the mode control interface. For example, an independent mechanical switch, keypad, touchpad, or touchscreen could be connected to the independent hardware circuit via a suitable dedicated connector such as a Universal Serial Bus (USB) connector. 

[0058] The independent hardware circuit can be implemented in a variety of specific hardware. It can be implemented in a single dedicated integrated circuit (IC) or a combination of ICs and/or discrete components. It can form part of a larger IC with other functions as long as the independent hardware circuit cannot be tampered with by any of the functions sharing the same IC. 

[0059] The computing machine is not limited to traditional computing devices such as laptops, desktops, servers, and the like. Tablet computers and mobile devices such as cellular telephones can also use the devices and methods described herein. For example, the input device for the independent hardware circuit can be a cellular telephone keypad or the touchscreen equivalent on a "smart phone" or tablet device. 

[0060] In some embodiments, the independent hardware circuit can be implemented in two parts. For example, one part can be physically located in or near the keyboard, keypad, or other input device, and the second part can be physically located in the computing machine enclosure, on the motherboard or some other convenient location. In such embodiments, security can be further enhanced whereby the first part of the independent hardware circuit detects and converts the key presses (or equivalent) associated with mode control into a special form, optionally encrypted, for transmission to the second part of the independent circuit. This can be done in a way that the computing machine keyboard buffer cannot recognize the mode control instructions as key presses at all. The second part of the independent circuit can decrypt the mode control instructions (if encrypted) and execute the changes in partition enablement according to the appropriate table in order to control the enabling and disabling of read and read/write operations for each partition. 

[0061] The transmission between the first part and the second part of the independent hardware circuit can be over the same connection as the regular key press data (for example, a USB serial link), or it can be over a separate dedicated connection for added security. For compact devices such as smart phones and tablet devices, a two-part independent hardware circuit can also be used, although all components would be physically located within a single enclosure. 

[0062] In accordance with one or more further embodiments of the present invention, the data storage device for a cellular telephone or other device can be configured with just two partitions, for example, by combining the functions of Partitions 1 and 2 in the three-partition configuration. For example and without limitation, partitions can be designated for (1) operating systems and trusted applications plus trusted data, such as telephone numbers, text files, music files, photographs, and the like; and (2) non-trusted data and applications, such as data or applications downloaded from the internet or provided by non-trusted sources. 

[0063] Similar switching configurations to those described above for the five- and three-partition configurations can be implemented. For example and without limitation, a mode switch can be used to enable and disable reading and writing for each of the partitions according to a predetermined set of rules that effectively prevent viruses and other malware from altering or accessing programs and data. In accordance with one or more embodiments of the present invention, a two-position mode switch can be used, and the predetermined set of rules can be defined by Table 3: 

TABLE-US-00003 TABLE 3 Position Partition 1 Partition 2 1 Read only Read/write 2 Read/write Disabled 

[0064] It can be seen in Table 3 that when the mode switch is in Position 1, operating systems and trusted data are safe from alteration but readable, and the device can save all internet data on the second partition, (non-trusted data partition). When the mode switch is in Position 2, Partition 2 is disabled for both read and write, but Partition 1 is fully enabled so that the user can add new programs or new phone numbers, music, text files, and other trusted applications or data to Partition 1. As with the three-partition configuration, an additional mode can be provided that can only be enabled by means of a switch that is internal to the device and/or not accessible under normal use conditions. This third mode enables read and write operations on all partitions. Such a mode would typically be used by the manufacturer or service personnel for system configuration and software installation or reinstallation. 

[0065] In accordance with one or more embodiments of the present invention, system memory (for example, the volatile semiconductor memory located on a computing machine motherboard where running programs and associated data reside) can also be divided into two partitions: "regular memory" and "internet memory." Typically, these partitions are physically located on separate chips, and internet memory can be powered on and off independently of regular memory. Other configurations and methods of enabling and disabling memory access are also within the scope of the present invention as long as there are means provided to completely erase the internet memory without affecting the regular memory, and it is possible to control which partition of memory can be written by applications resident on the trusted and internet application partitions or used to buffer data on the confidential, non-confidential and internet data partitions. 

[0066] When the control switch is in Mode 1 (or the system is otherwise configured to allow memory access by potentially untrustworthy applications and to permit potentially untrustworthy data to be loaded into memory), the regular memory is used only for and by the operating system and applications running from the trusted data storage device partition. The internet memory is used for all other purposes. In other words, non-trusted applications and any applications which may be handling data from non-trusted sources are only permitted to write to internet memory. In accordance with one or more embodiments of the present invention, when switching to Mode 2 (or the system is otherwise configured such that no access to potentially untrustworthy applications, documents, or data is possible), power is removed from the internet memory for at least one second so that any viruses or other malware hidden in the internet memory is erased. Other reliable means of erasing all of the internet memory may also be used, such as and without limitation, explicitly overwriting all data. Internet memory can also be automatically reset or erased when all non-trusted applications are terminated. Additionally, an external switch can be provided allowing a user to reset (erase all of) the internet memory whenever the user suspects exposure to suspicious applications or data. 

[0067] The partitioning of memory into regular and internet memory and the reset/erasure of the internet memory can be set up so as to be strictly under user control, or at least only under the control of trusted applications. Preferably, it is not physically possible to create a virus that can repartition memory or erase internet memory. 

[0068] A computing machine or other apparatus which has been configured with a data storage device and/or system memory which can be managed in accordance with one or more embodiments of the present invention can be used in various ways. For example and without limitation, a user who wants to disable all of the protection features of the present invention may do so by putting the four-position mode switch in Position 4. All read and write/delete channels would be enabled and the data storage device could be used as a conventional device either with no protection or with protection provided using antivirus software and the like. As another example and without limitation, a user may not have confidential data and could choose to allocate no space for the confidential partition or to configure the modes so that the confidential partition is treated identically to the non-confidential partition. 

[0069] In accordance with one or more embodiments of the present invention, the methods and devices disclosed herein can be used with any apparatus or system requiring data storage. For example and without limitation, such methods and devices can be used advantageously with any computing system which is subject to access via a network or which may be connected to a removable data storage medium of uncertain origin. Such computing systems include personal handhelds, laptops and desktop computers for home and business use, as well as servers and other computing machines configured to support business operations. Other handheld, portable, and fixed-location devices and appliances that incorporate data storage devices and have potential connections for unauthorized or malicious access can similarly benefit from the use of the methods and devices disclosed herein. Such devices and appliances include, for example and without limitation, personal communications devices such as cell phones, satellite phones, desk telephones, and answering machines; portable music players; portable and non-portable video devices; digital cameras; security systems; remote monitoring systems; industrial monitoring and control systems; dataloggers; etc. 

[0070] In accordance with one or more embodiments of the present invention, the methods and devices disclosed herein can prevent malware attacks on stored data in any data storage device associated with any of the above-mentioned computing machines and appliances without the use of separate protection software. The importance of such prevention may vary according to the function of particular computing machines and appliances and the nature of the specific attack. The value of protecting data from loss, unauthorized alteration or deletion, or even just unauthorized access can be very significant. In some cases, the value can be in avoiding unnecessary repetition of work and the nuisance of regenerating data or retrieving data from backup resources. In other cases, such as devices related to health and safety monitoring, control, or datalogging, lives can be saved by protecting the integrity of stored data. In still other cases, consumer privacy, or corporate or national security can be protected by the prevention of unauthorized access to sensitive data. By installing data storage devices incorporating the methods disclosed herein, computing devices and appliances can be built that are naturally immune to all types of malware attacks. No special security software need be installed; no periodic updates are required; and the protection is always up to date, because no new means of attack are possible. Users will require little or no education in the use of the methods. Most users may never need to move the mode and protection switches, or at most, will need to learn how and when to switch between a couple of regularly-used positions. After a few years, when most computing devices and appliances in use incorporate data storage devices practicing the methods of the present invention, there will no longer be any incentive for anyone to write malware processes, and software created to combat malware will become obsolete. 

[0071] It is to be understood that the claims are not limited to the specific embodiments described herein but can include any embodiment, variation, or application that a person of ordinary skill would recognize as being obvious in light of the teachings herein. 

ليست هناك تعليقات:

إرسال تعليق