US20090115606A1 - Method and Apparatus for Secure Mode Indication - Google Patents
Method and Apparatus for Secure Mode Indication Download PDFInfo
- Publication number
- US20090115606A1 US20090115606A1 US12/333,007 US33300708A US2009115606A1 US 20090115606 A1 US20090115606 A1 US 20090115606A1 US 33300708 A US33300708 A US 33300708A US 2009115606 A1 US2009115606 A1 US 2009115606A1
- Authority
- US
- United States
- Prior art keywords
- mode
- hand
- calculator
- press
- held device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title abstract description 57
- 238000012360 testing method Methods 0.000 claims abstract description 48
- 230000000007 visual effect Effects 0.000 claims abstract description 41
- 238000005286 illumination Methods 0.000 claims description 20
- 230000007704 transition Effects 0.000 description 27
- 238000010586 diagram Methods 0.000 description 15
- 230000002093 peripheral effect Effects 0.000 description 13
- 230000006870 function Effects 0.000 description 8
- 230000008859 change Effects 0.000 description 6
- 238000012795 verification Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Definitions
- Embodiments of the present invention generally relate to a method and apparatus relating to ensuring an authenticated device is tamper proof.
- Hand-held devices such as, calculators, are often used in the educational environment. As a result, these devices are typically used in a classroom environment or even a testing environment to take some of the standardized state-level tests.
- Students may use functionalities offered by such hand-held devices during exam in a way that jeopardizes the exam outcome. For example, students may utilize stored equations or communicate with other calculators in their network to retrieve restricted information. Hence, such functionalities may provide a tool for a student to cheat during an exam.
- hand-held devices may be set to press-to-test (PTT) mode.
- the press-to-test mode allows a teacher to restrict the functionalities are should not be used on an exam.
- the teacher is able to utilize such hand-held device without being concerned that the students are cheating by utilizing unauthorized functions of the device.
- the current devices do not provide a way for the teacher to easily and visually inspect multiple devices to ensure that the press-to-test mode was properly set and maintained.
- Embodiments disclosed herein generally relate to a method and apparatus relating to a hand-held device.
- the hand-held device comprising a visual indicator utilized to indicate at least one a normal mode or a press-to-test mode, and where in the setting of the visual indicator are tamper proof.
- FIG. 1 is an embodiment of a block diagram of a hand-held apparatus
- FIG. 2 is an embodiment of a flow diagram depicting mode transition method for a hand-held apparatus
- FIG. 3 is an embodiment of a flow diagram depicting normal mode to press-to-test mode method for a hand-held apparatus
- FIG. 4 is an embodiment of a flow diagram depicting press-to-test mode to normal mode method for a hand-held apparatus
- FIG. 5 is an embodiment of a flow diagram depicting transition to press-to-test mode method for a hand-held apparatus
- FIG. 6 is an embodiment of a flow diagram depicting transition to normal mode method for a hand-held apparatus
- FIG. 7 is an embodiment of setting chart for a light emitting diode (LED) utilized as a visual display indicating a mode relating to a hand-held apparatus;
- LED light emitting diode
- FIG. 8 is an embodiment of shift registers setting for a light emitting diode (LED) utilized to provide a desired illumination sequence
- FIG. 9 is an embodiment of a flow diagram depicting a reset or a reboot method for a hand-held apparatus
- FIG. 1 depicts an embodiment of a block diagram of a hand-held apparatus 100 , such as, a calculator.
- the apparatus 100 includes a processor 102 , support circuit 106 , security module 104 and memory 108 .
- the processor 102 may be any processor capable of executing computer instructions, such as, instructions stored in the memory 108 .
- the processor 102 may be specific to a hand-held device, calculator or the like, and may be capable of performing algebraic calculation, geometry functions and the like.
- the processor 102 may include normal and security peripherals that monitor and ensure that the apparatus 100 is tamper-proof, which may be monitored by the security module 104 .
- tamper proof means that unauthorized code or changes are not allowed, or that at least a portion of the memory or of the settings is protected from unauthorized access.
- the support circuit 106 are circuits that may include, but are not limited to, power supplies, clock circuits, cache memory and the like.
- the support circuit 106 assist in executing functions relating to the hand-held apparatus 100 .
- a computer readable medium is any medium in which computer data or instruction can be stored and/or accessed.
- the security module 104 ensures that an authorized user is capable of changing the mode of the apparatus, for example, by checking a password, a user login, preferences, settings, or the like.
- a teacher may set the calculator to restrictive mode.
- a restrictive mode is a mode that restricts certain functionalities. If a student attempts to alter the mode of the calculator, the security module 104 would restrict the student from changing the calculator mode. However, the security module 104 would allow a teacher to alter the calculator's mode to a non-restrictive mode.
- a restrictive mode is referred to a press-to-test (PTT) mode, whereas a non-restrictive mode is referred to as a normal mode.
- PTT press-to-test
- a non-restrictive mode is referred to as a normal mode.
- the modes that facilitate the transition from and/or to normal and press-to-test modes are transition modes.
- the security module 104 is a module that restricts the user from accessing secured area of memory and altering data, such as, user information, forcing calculator mode, resetting the calculator, etc. As a result, a teacher may set the calculator to a restrictive mode for an exam. Due to the security module 104 , the teacher would be confident that a student would not be able to utilize the functionalities that the teacher restricted by resetting the calculator, changing user preferences/settings, etc.
- the memory 108 may comprise random access memory, read only memory, removable disk memory, flash memory, and various combinations of these types of memory.
- the memory 108 may be referred to as main memory, cache memory, buffer memory and the like.
- the memory 108 may store an operating system (OS), database software, various forms of application software, such as, application programs 110 , mode routine 112 , and the like.
- the mode routine 112 allows the user to set the apparatus 100 to normal or press-to-test mode. An embodiment of the method performed by the mode routine is described in FIG. 2 .
- the hand-held device 100 may include a peripheral access module 114 .
- the peripheral access module 114 is a module that allows or restricts access to peripherals, such as, visual indicator 118 .
- the peripheral access module 114 may communicate with the security module 104 in order to allow or prohibit access to the memory portions that controls hardware, such as, visual indicator 118 .
- the visual indicator 118 may be set by certain registers or memory location, which may only be changed by an authorized user, a specific device, a predetermined sequence of instruction, a password, etc.
- the visual indictor is tamper-proof.
- a teacher may utilize a calculator during an exam.
- the teacher may allow the students to utilize the algebraic functionality and disallow the use of saved equations and graphing functions.
- the mode setting of the calculator determines the setting of the visual indicator.
- the visual indicator may display a visual aid that indicates that access to saved equations and graphing function is restricted on the calculator.
- the visual indicator may be a light emitting diode (LED) that emits a green light for 1 second followed by a red light for 2 seconds to indicate that the calculator restricts access to its saved equations and graphing function.
- the peripheral access module 114 protects access to the settings of the visual indicator 118 . Therefore, the visual indicator's settings may only be changed by an authorized user, a specific device, a password, etc. As a result, the visual indicator is tamper proof and a teacher may utilize such an indicator to easily monitor the settings of multiple calculators.
- An example of the visual display setting is presented in FIG. 4 .
- FIG. 2 is an embodiment of a flow diagram depicting mode transition method 200 for the apparatus 100 .
- the mode transition method 200 depicts the utilization of the security feature when transitioning from one mode to another.
- mode flow diagram 200 includes a normal mode 202 , transition to press-to-test (PTT) mode 204 , press-to-test mode 206 , and transition to normal mode 208 .
- PTT press-to-test
- 206 press-to-test mode
- transition to normal mode 208 transition to normal mode 208 .
- PTT press-to-test
- the hand-held device may default to a setup screen or to the normal mode 200 . However, in one embodiment, the hand-held device will default to the mode that it was in when it was shut down.
- the normal mode 200 is the mode in which a user is able to access most or all of the functionalities of an apparatus, such as, a calculator.
- a user in normal mode 202 , a student is not restricted from using calculator functionalities. Hence, a student would be able to store equations, retrieve equations, communicate with other users on a network, etc.
- a user may initiate a request to transition to press-to-test mode 206 .
- the devise when the devise is in normal mode 202 , a student would not be able to alter his or her own setting to function as a teacher, administrator, allow himself or herself to reset the calculator and the like.
- a visual display When the device is in the normal mode, a visual display may not be utilized or may default to a specific setting. However, even when in the normal mode, the visual display setting are tamper proof, for example, the settings are protected by the security module 104 and/or peripheral access module 114 (both described in FIG. 1 ).
- press-to-test mode 206 a user is restricted from accessing certain areas of memory or certain calculator functionalities.
- a student may be restricted from using calculator functionalities, such as, storing equations, retrieving equations, communicating with other users utilizing calculators on a calculator network, etc.
- a visual display is utilized to visually and easily display the functionality restricted on the device.
- the user may be restricted from initiating various communication or calculation functionalities.
- the visual display displays a visual aid indicating the restriction of such functionality or indicating the specific mode of the calculator.
- the setting of the visual indicator are tamper proof and are protected from tampering with, for example, protected by the peripheral security module 104 and/or access module 114 (both described in FIG. 1 ).
- such restriction and visual display setting may be broadcasted to a plurality of calculators or may be performed on each calculator separately.
- a calculator may change mode and visual indicator setting only if the change mode instruction is received from a specific user or calculator.
- a calculator may be setup to allow only a teacher to alter the mode, specify the type of functionality available when in press-to-test mode 206 , setup users, setup visual display, etc.
- press-to-test mode 206 While in press-to-test mode 206 , the hand-held device is tamper-proof.
- the student is restricted from changing his or her setting to act as an administrator, a teacher, allow himself or herself to reset the calculator, alter the visual display setting, and the like.
- the student is restricted from changing modes, resetting the calculator, changing functionality settings, etc.
- the calculator functionality is limited based on specified press-to-test mode 206 and/or functionality.
- the calculator is tamper-proof secured by utilizing security module 104 and/or peripheral access module 114 (both described in FIG. 1 ).
- security module 104 and/or peripheral access module 114 both described in FIG. 1 .
- a hand-held device such as a calculator
- the calculator When a hand-held device, such as a calculator, receives a request to transitioning from the normal mode 202 to the press-to-test mode 206 , the calculator then transitions to the transition to press-to-test mode 204 .
- the calculator In the transition to press-to-test mode 204 , the calculator may enter the tamper-proof verification and may indicate that press-to-test mode 206 has been properly and securely initiated.
- the mode transition method 200 may utilize the security module 104 and/or peripheral access module 114 (both described in FIG. 1 ).
- the peripheral access module 114 may set a visual indicator 118 ( FIG. 1 ) to indicate the functionalities enabled or disabled on the device.
- the hand-held device such as a calculator
- the calculator When the hand-held device, such as a calculator, receives a request to transition from the press-to-test mode 202 to the normal mode 206 , the calculator then transitions to the transition to normal mode 208 .
- the calculator performs tamper-proof verification and indication that normal mode 202 has been properly and securely initiated.
- the mode transition method 200 ensures that the device or user requesting the change is authorized to perform such a request. If the person is not authorized, the request is denied or ignored. If the person is authorized, the mode transition method 200 allows the device to return to its normal mode 202 , wherein all the functionalities are available to the user.
- the mode transition method 200 may utilize the security module 104 and/or peripheral access module 114 (both described in FIG. 1 ).
- the peripheral access module 114 may set a visual indicator 118 ( FIG. 1 ) to indicate the functionalities enabled or disabled on the device.
- FIG. 3 is an embodiment of a flow diagram depicting normal mode to press-to-test mode method 300 for a hand-held apparatus.
- the method 300 starts at step 302 and proceeds to step 304 .
- the hand-held device is in normal mode.
- the method 300 determines if a request to change to press-to-test mode is received. If there is a request, the method 300 proceeds to step 308 . Otherwise, the method 300 returns to step 304 .
- the hand-held device is set to transition to press-to-test mode, which may include resetting the device, clearing memory, determining if the request is from an authorized user or device, and the like.
- the method 300 sets the device in accordance with the request received and alters the setting of a visual indicator to indicate the functionalities or specific mode of the hand-held device.
- the device is set to press-to-test mode. The method 300 ends at step 314 .
- FIG. 4 is an embodiment of a flow diagram depicting press-to-test mode to normal mode method 400 for a hand-held apparatus.
- the method 400 starts at step 402 and proceeds to step 404 .
- the hand-held device is in press-to-test mode.
- the method 400 determines if a request to change to normal mode is received. If there is a request, the method 400 proceeds to step 408 . Otherwise, the method 400 returns to step 404 .
- the hand-held device is set to transition to normal mode, which may include resetting the device, clearing memory, determining if the request is from an authorized user or device, and the like.
- the method 400 sets the device in accordance with the request received and alters the setting of a visual indicator to indicate the functionalities or specific mode of the hand-held device.
- the device is set to normal mode. The method 400 ends at step 414 .
- FIG. 5 is an embodiment of a flow diagram depicting transition to press-to-test mode method 500 for a hand-held apparatus.
- the method 500 starts at step 502 and proceeds to step 504 .
- the method 500 clears the memory, for example, to remove any memory available to rogue applications, hack software, and the like.
- the method 500 authenticates the system, for example, by authenticating the hand-held device, applications, users, request and the like.
- the operating system (OS) is loaded into memory.
- the method 500 determines if the previous mode is a press-to-test (PTT) mode.
- PTT press-to-test
- step 512 the press-to-test mode configuration is set to the previous press-to-test configuration mode. Otherwise, the method 500 proceeds from step 510 to step 514 .
- step 514 the method 500 configures the press-to-test mode in accordance with the received request. From steps 512 and 514 , the method 500 proceeds to step 516 .
- step 516 the visual indicator is set according to the configuration. The method 500 ends at step 518 .
- FIG. 6 is an embodiment of a flow diagram depicting transition to normal mode method 600 for a hand-held apparatus.
- the method 600 starts at step 602 and proceeds to step 604 .
- the method 600 accesses the request, for example, determining authorization, requesting user or device, if the request is valid, and the like. If the assessment returns a negative outcome, the method 600 may ignore the request.
- the method 600 sets the device to normal configuration.
- the visual indicator is set according to configuration.
- the method 600 ends at step 610 .
- FIG. 7 is an embodiment of setting chart 700 for a light emitting diode (LED) utilized as a visual display indicating a mode relating to a hand-held apparatus.
- the columns represent time/time slots.
- the chart 800 illumination patterns of a light emitting diode function as a visual indicator as described herein.
- the red LED when entering a calculator boot up, the red LED is illuminated and another illumination is produced by either the green LED or a combination of the red and green LED. Hence, the result is a yellow illumination.
- the red LED is ON during both a time slot when the green LED is ON and during a time slot when the green LED is OFF.
- the color illumination indicates the functionality of the calculator. For example, a green illumination is used to indicate a more restrictive use of the device than a yellow illumination.
- the least restrictive mode may illuminate a specific color, for example, a yellow illumination, which may mean that the hand-held device is functioning in normal mode.
- the red LED is illuminated for intervals, such as, 0.25 second and at 0.5 seconds the green LED is illuminated.
- the result is a yellow illumination for 0.25 second followed by a green illumination for 0.25 second.
- the row marked “final” shows the illumination produced.
- the sequence may be repeated during the boot up process. After boot up, the red and green LED's are illuminated at, for example, 0.5 seconds, 1.5 seconds, and 2.5 seconds etc and is repeated after boot up.
- the LED may alternatively illuminate the red LED and green LED to indicate the more restrictive mode. After boot up, the green LED may be illuminated. In one embodiment, for any mode selected the red LED is illuminated during boot up; however, after boot up, no red illumination may be visible. Hence, a teacher may be able to identify a student rebooting his or her hand-held device.
- an LED color illumination may sequence to indicate that the device is exiting press-to-test mode or is in normal mode.
- the settings of the LED are archived in a protected area in memory, such that such setting a tamper proofed.
- a teacher may query the multiple hand-held devices and trust that the illumination is a valid indication of the device mode and functionality setting.
- FIG. 8 is an embodiment of shift registers setting 800 for a light emitting diode (LED) utilized to provide a desired illumination sequence.
- the illumination patterns correspond to those provided in FIG. 7 .
- values are contained in the registers.
- hardware may be used rather than software.
- Hardware may be used, for example, when a software controlled mechanism requires that the operating system have the ability to individually turn the LEDs OFF and/or ON.
- the chosen ON/OFF sequences of the LEDs are selected in such a way that an operating system may need to only turn an LED off or set very specific pre-defined sequencing patterns.
- the register settings are protected from unauthorized change and are tamper proof.
- FIG. 9 is an embodiment of a flow diagram depicting a reset or a reboot method 900 for a hand-held apparatus.
- the method 900 may also be utilized for system initialization.
- the method 900 starts at step 902 and proceeds to step 904 .
- the method 900 determines if there is a request to rest or reboot.
- the device memory is cleared, for example, to remove any memory available to rogue applications, hack software, and the like.
- the method 900 authenticates the system, for example, by authenticating the hand-held device, applications, users, request and the like.
- the operating system (OS) is loaded into memory.
- the method 500 determines if the last previous mode is known.
- the mode is set to normal mode in step 914 . If the previous mode is known, the method 900 sets the mode and the configuration to the last previous known mode and configuration in step 916 . From steps 914 and 916 , the method 900 proceeds to step 918 , wherein the visual indicator is set according to the determined configuration. The method 900 ends at step 920 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Stored Programmes (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
Abstract
A method and apparatus relating to a hand-held device. The hand-held device comprising a visual indicator utilized to indicate at least one a normal mode or a press-to-test mode, and where in the setting of the visual indicator are tamper proof.
Description
- This application claims benefit of U.S. patent application Ser. No. 12/201,852 filed on Aug. 29, 2008, which claims priority from U.S. provisional patent application Ser. No. 60/969,599, filed Aug. 31, 2007, which is herein incorporated by reference.
- 1. Field of the Invention
- Embodiments of the present invention generally relate to a method and apparatus relating to ensuring an authenticated device is tamper proof.
- 2. Description of the Related Art
- Hand-held devices, such as, calculators, are often used in the educational environment. As a result, these devices are typically used in a classroom environment or even a testing environment to take some of the standardized state-level tests.
- Students may use functionalities offered by such hand-held devices during exam in a way that jeopardizes the exam outcome. For example, students may utilize stored equations or communicate with other calculators in their network to retrieve restricted information. Hence, such functionalities may provide a tool for a student to cheat during an exam.
- As a result, hand-held devices may be set to press-to-test (PTT) mode. The press-to-test mode allows a teacher to restrict the functionalities are should not be used on an exam. Hence, the teacher is able to utilize such hand-held device without being concerned that the students are cheating by utilizing unauthorized functions of the device. However, the current devices do not provide a way for the teacher to easily and visually inspect multiple devices to ensure that the press-to-test mode was properly set and maintained.
- Therefore, there is a need for an improved hand-held device that offers a way to easily inspect multiple hand-held devices to ensure that the press-to-test mode was properly set and maintained.
- Embodiments disclosed herein generally relate to a method and apparatus relating to a hand-held device. The hand-held device comprising a visual indicator utilized to indicate at least one a normal mode or a press-to-test mode, and where in the setting of the visual indicator are tamper proof.
- So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
-
FIG. 1 is an embodiment of a block diagram of a hand-held apparatus; -
FIG. 2 is an embodiment of a flow diagram depicting mode transition method for a hand-held apparatus; -
FIG. 3 is an embodiment of a flow diagram depicting normal mode to press-to-test mode method for a hand-held apparatus; -
FIG. 4 is an embodiment of a flow diagram depicting press-to-test mode to normal mode method for a hand-held apparatus; -
FIG. 5 is an embodiment of a flow diagram depicting transition to press-to-test mode method for a hand-held apparatus; -
FIG. 6 is an embodiment of a flow diagram depicting transition to normal mode method for a hand-held apparatus; -
FIG. 7 is an embodiment of setting chart for a light emitting diode (LED) utilized as a visual display indicating a mode relating to a hand-held apparatus; -
FIG. 8 is an embodiment of shift registers setting for a light emitting diode (LED) utilized to provide a desired illumination sequence; and -
FIG. 9 is an embodiment of a flow diagram depicting a reset or a reboot method for a hand-held apparatus -
FIG. 1 depicts an embodiment of a block diagram of a hand-heldapparatus 100, such as, a calculator. Theapparatus 100 includes aprocessor 102,support circuit 106,security module 104 andmemory 108. - The
processor 102 may be any processor capable of executing computer instructions, such as, instructions stored in thememory 108. Theprocessor 102 may be specific to a hand-held device, calculator or the like, and may be capable of performing algebraic calculation, geometry functions and the like. Theprocessor 102 may include normal and security peripherals that monitor and ensure that theapparatus 100 is tamper-proof, which may be monitored by thesecurity module 104. Herein, tamper proof means that unauthorized code or changes are not allowed, or that at least a portion of the memory or of the settings is protected from unauthorized access. - The
support circuit 106 are circuits that may include, but are not limited to, power supplies, clock circuits, cache memory and the like. Thesupport circuit 106 assist in executing functions relating to the hand-heldapparatus 100. Herein, a computer readable medium is any medium in which computer data or instruction can be stored and/or accessed. - The
security module 104 ensures that an authorized user is capable of changing the mode of the apparatus, for example, by checking a password, a user login, preferences, settings, or the like. For example, if theapparatus 100 is a calculator, a teacher may set the calculator to restrictive mode. A restrictive mode is a mode that restricts certain functionalities. If a student attempts to alter the mode of the calculator, thesecurity module 104 would restrict the student from changing the calculator mode. However, thesecurity module 104 would allow a teacher to alter the calculator's mode to a non-restrictive mode. Herein, a restrictive mode is referred to a press-to-test (PTT) mode, whereas a non-restrictive mode is referred to as a normal mode. The modes that facilitate the transition from and/or to normal and press-to-test modes are transition modes. - The
security module 104 is a module that restricts the user from accessing secured area of memory and altering data, such as, user information, forcing calculator mode, resetting the calculator, etc. As a result, a teacher may set the calculator to a restrictive mode for an exam. Due to thesecurity module 104, the teacher would be confident that a student would not be able to utilize the functionalities that the teacher restricted by resetting the calculator, changing user preferences/settings, etc. - The
memory 108 may comprise random access memory, read only memory, removable disk memory, flash memory, and various combinations of these types of memory. Thememory 108 may be referred to as main memory, cache memory, buffer memory and the like. Thememory 108 may store an operating system (OS), database software, various forms of application software, such as,application programs 110,mode routine 112, and the like. Themode routine 112 allows the user to set theapparatus 100 to normal or press-to-test mode. An embodiment of the method performed by the mode routine is described inFIG. 2 . - The hand-held
device 100 may include aperipheral access module 114. Theperipheral access module 114 is a module that allows or restricts access to peripherals, such as,visual indicator 118. For example, theperipheral access module 114 may communicate with thesecurity module 104 in order to allow or prohibit access to the memory portions that controls hardware, such as,visual indicator 118. As such, thevisual indicator 118 may be set by certain registers or memory location, which may only be changed by an authorized user, a specific device, a predetermined sequence of instruction, a password, etc. Hence, the visual indictor is tamper-proof. - For example, a teacher may utilize a calculator during an exam. The teacher may allow the students to utilize the algebraic functionality and disallow the use of saved equations and graphing functions. The mode setting of the calculator determines the setting of the visual indicator. The visual indicator may display a visual aid that indicates that access to saved equations and graphing function is restricted on the calculator. For example, the visual indicator may be a light emitting diode (LED) that emits a green light for 1 second followed by a red light for 2 seconds to indicate that the calculator restricts access to its saved equations and graphing function. The
peripheral access module 114 protects access to the settings of thevisual indicator 118. Therefore, the visual indicator's settings may only be changed by an authorized user, a specific device, a password, etc. As a result, the visual indicator is tamper proof and a teacher may utilize such an indicator to easily monitor the settings of multiple calculators. An example of the visual display setting is presented inFIG. 4 . -
FIG. 2 is an embodiment of a flow diagram depictingmode transition method 200 for theapparatus 100. Themode transition method 200 depicts the utilization of the security feature when transitioning from one mode to another. For example, mode flow diagram 200 includes anormal mode 202, transition to press-to-test (PTT) mode 204, press-to-test mode 206, and transition tonormal mode 208. When first powered the hand-held device may default to a setup screen or to thenormal mode 200. However, in one embodiment, the hand-held device will default to the mode that it was in when it was shut down. - The
normal mode 200 is the mode in which a user is able to access most or all of the functionalities of an apparatus, such as, a calculator. For example, innormal mode 202, a student is not restricted from using calculator functionalities. Hence, a student would be able to store equations, retrieve equations, communicate with other users on a network, etc. In thenormal mode 202, a user may initiate a request to transition to press-to-test mode 206. In one embodiment, when the devise is innormal mode 202, a student would not be able to alter his or her own setting to function as a teacher, administrator, allow himself or herself to reset the calculator and the like. When the device is in the normal mode, a visual display may not be utilized or may default to a specific setting. However, even when in the normal mode, the visual display setting are tamper proof, for example, the settings are protected by thesecurity module 104 and/or peripheral access module 114 (both described inFIG. 1 ). - In press-to-
test mode 206, a user is restricted from accessing certain areas of memory or certain calculator functionalities. For example, in press-to-test mode 206 a student may be restricted from using calculator functionalities, such as, storing equations, retrieving equations, communicating with other users utilizing calculators on a calculator network, etc. While in press-to-test, a visual display is utilized to visually and easily display the functionality restricted on the device. For example, the user may be restricted from initiating various communication or calculation functionalities. Accordingly, the visual display displays a visual aid indicating the restriction of such functionality or indicating the specific mode of the calculator. The setting of the visual indicator are tamper proof and are protected from tampering with, for example, protected by theperipheral security module 104 and/or access module 114 (both described inFIG. 1 ). - In one embodiment, such restriction and visual display setting may be broadcasted to a plurality of calculators or may be performed on each calculator separately. In another embodiment, a calculator may change mode and visual indicator setting only if the change mode instruction is received from a specific user or calculator. For example, a calculator may be setup to allow only a teacher to alter the mode, specify the type of functionality available when in press-to-
test mode 206, setup users, setup visual display, etc. While in press-to-test mode 206, the hand-held device is tamper-proof. For example, the student is restricted from changing his or her setting to act as an administrator, a teacher, allow himself or herself to reset the calculator, alter the visual display setting, and the like. Moreover, the student is restricted from changing modes, resetting the calculator, changing functionality settings, etc. - Therefore, when in press-to-
test mode 206, the calculator functionality is limited based on specified press-to-test mode 206 and/or functionality. The calculator is tamper-proof secured by utilizingsecurity module 104 and/or peripheral access module 114 (both described inFIG. 1 ). Thus, a teacher would be confident that a calculator remains in press-to-test mode 206, for example, during an exam, and that a student is unable to alter the functionalities that she designated for the press-to-test mode 206. - When a hand-held device, such as a calculator, receives a request to transitioning from the
normal mode 202 to the press-to-test mode 206, the calculator then transitions to the transition to press-to-test mode 204. In the transition to press-to-test mode 204, the calculator may enter the tamper-proof verification and may indicate that press-to-test mode 206 has been properly and securely initiated. In the transition to press-to-test mode 206, themode transition method 200 may utilize thesecurity module 104 and/or peripheral access module 114 (both described inFIG. 1 ). For example, theperipheral access module 114 may set a visual indicator 118 (FIG. 1 ) to indicate the functionalities enabled or disabled on the device. - When the hand-held device, such as a calculator, receives a request to transition from the press-to-
test mode 202 to thenormal mode 206, the calculator then transitions to the transition tonormal mode 208. In the transition tonormal mode 208, the calculator performs tamper-proof verification and indication thatnormal mode 202 has been properly and securely initiated. Themode transition method 200 ensures that the device or user requesting the change is authorized to perform such a request. If the person is not authorized, the request is denied or ignored. If the person is authorized, themode transition method 200 allows the device to return to itsnormal mode 202, wherein all the functionalities are available to the user. In the transition tonormal mode 206, themode transition method 200 may utilize thesecurity module 104 and/or peripheral access module 114 (both described inFIG. 1 ). For example, theperipheral access module 114 may set a visual indicator 118 (FIG. 1 ) to indicate the functionalities enabled or disabled on the device. -
FIG. 3 is an embodiment of a flow diagram depicting normal mode to press-to-test mode method 300 for a hand-held apparatus. Themethod 300 starts atstep 302 and proceeds to step 304. Atstep 304, the hand-held device is in normal mode. Atstep 306, themethod 300 determines if a request to change to press-to-test mode is received. If there is a request, themethod 300 proceeds to step 308. Otherwise, themethod 300 returns to step 304. Atstep 310, the hand-held device is set to transition to press-to-test mode, which may include resetting the device, clearing memory, determining if the request is from an authorized user or device, and the like. Atstep 310, themethod 300 sets the device in accordance with the request received and alters the setting of a visual indicator to indicate the functionalities or specific mode of the hand-held device. Atstep 312, the device is set to press-to-test mode. Themethod 300 ends at step 314. -
FIG. 4 is an embodiment of a flow diagram depicting press-to-test mode tonormal mode method 400 for a hand-held apparatus. Themethod 400 starts atstep 402 and proceeds to step 404. Atstep 404, the hand-held device is in press-to-test mode. Atstep 406, themethod 400 determines if a request to change to normal mode is received. If there is a request, themethod 400 proceeds to step 408. Otherwise, themethod 400 returns to step 404. Atstep 410, the hand-held device is set to transition to normal mode, which may include resetting the device, clearing memory, determining if the request is from an authorized user or device, and the like. Atstep 410, themethod 400 sets the device in accordance with the request received and alters the setting of a visual indicator to indicate the functionalities or specific mode of the hand-held device. Atstep 412, the device is set to normal mode. Themethod 400 ends at step 414. -
FIG. 5 is an embodiment of a flow diagram depicting transition to press-to-test mode method 500 for a hand-held apparatus. Themethod 500 starts atstep 502 and proceeds to step 504. Atstep 504, themethod 500 clears the memory, for example, to remove any memory available to rogue applications, hack software, and the like. Atstep 506, themethod 500 authenticates the system, for example, by authenticating the hand-held device, applications, users, request and the like. Atstep 508, the operating system (OS) is loaded into memory. Atstep 510, themethod 500 determines if the previous mode is a press-to-test (PTT) mode. If the previous mode is not press-to-test mode, the method proceeds to step 512, where the press-to-test mode configuration is set to the previous press-to-test configuration mode. Otherwise, themethod 500 proceeds fromstep 510 to step 514. Instep 514, themethod 500 configures the press-to-test mode in accordance with the received request. Fromsteps method 500 proceeds to step 516. Atstep 516, the visual indicator is set according to the configuration. Themethod 500 ends atstep 518. -
FIG. 6 is an embodiment of a flow diagram depicting transition tonormal mode method 600 for a hand-held apparatus. Themethod 600 starts atstep 602 and proceeds to step 604. Atstep 604, themethod 600 accesses the request, for example, determining authorization, requesting user or device, if the request is valid, and the like. If the assessment returns a negative outcome, themethod 600 may ignore the request. Atstep 606, themethod 600 sets the device to normal configuration. Atstep 608, the visual indicator is set according to configuration. Themethod 600 ends atstep 610. -
FIG. 7 is an embodiment of settingchart 700 for a light emitting diode (LED) utilized as a visual display indicating a mode relating to a hand-held apparatus. The columns represent time/time slots. Thechart 800 illumination patterns of a light emitting diode function as a visual indicator as described herein. In this embodiment, when entering a calculator boot up, the red LED is illuminated and another illumination is produced by either the green LED or a combination of the red and green LED. Hence, the result is a yellow illumination. When a device displays both a red illumination and a yellow illumination, the red LED is ON during both a time slot when the green LED is ON and during a time slot when the green LED is OFF. The color illumination indicates the functionality of the calculator. For example, a green illumination is used to indicate a more restrictive use of the device than a yellow illumination. In another embodiment, the least restrictive mode may illuminate a specific color, for example, a yellow illumination, which may mean that the hand-held device is functioning in normal mode. - In another embodiment, the red LED is illuminated for intervals, such as, 0.25 second and at 0.5 seconds the green LED is illuminated. The result is a yellow illumination for 0.25 second followed by a green illumination for 0.25 second. In
FIG. 8 , the row marked “final” shows the illumination produced. The sequence may be repeated during the boot up process. After boot up, the red and green LED's are illuminated at, for example, 0.5 seconds, 1.5 seconds, and 2.5 seconds etc and is repeated after boot up. - In one embodiment, if a hand-held device boots up when in press-to-test mode, The LED may alternatively illuminate the red LED and green LED to indicate the more restrictive mode. After boot up, the green LED may be illuminated. In one embodiment, for any mode selected the red LED is illuminated during boot up; however, after boot up, no red illumination may be visible. Hence, a teacher may be able to identify a student rebooting his or her hand-held device. When transitioning from press-to-test mode to normal mode, an LED color illumination may sequence to indicate that the device is exiting press-to-test mode or is in normal mode.
- The settings of the LED are archived in a protected area in memory, such that such setting a tamper proofed. Hence, utilizing the illumination colors of the visual indicator, a teacher may query the multiple hand-held devices and trust that the illumination is a valid indication of the device mode and functionality setting.
-
FIG. 8 is an embodiment of shift registers setting 800 for a light emitting diode (LED) utilized to provide a desired illumination sequence. InFIG. 8 , the illumination patterns correspond to those provided inFIG. 7 . For example, during boot up, values are contained in the registers. Note that hardware may be used rather than software. Hardware may be used, for example, when a software controlled mechanism requires that the operating system have the ability to individually turn the LEDs OFF and/or ON. The chosen ON/OFF sequences of the LEDs are selected in such a way that an operating system may need to only turn an LED off or set very specific pre-defined sequencing patterns. The register settings are protected from unauthorized change and are tamper proof. -
FIG. 9 is an embodiment of a flow diagram depicting a reset or areboot method 900 for a hand-held apparatus. Themethod 900 may also be utilized for system initialization. Themethod 900 starts atstep 902 and proceeds to step 904. Atstep 904, themethod 900 determines if there is a request to rest or reboot. Atstep 906, the device memory is cleared, for example, to remove any memory available to rogue applications, hack software, and the like. Atstep 908, themethod 900 authenticates the system, for example, by authenticating the hand-held device, applications, users, request and the like. Atstep 910, the operating system (OS) is loaded into memory. Atstep 912, themethod 500 determines if the last previous mode is known. If the last previous mode is not known, the mode is set to normal mode instep 914. If the previous mode is known, themethod 900 sets the mode and the configuration to the last previous known mode and configuration instep 916. Fromsteps method 900 proceeds to step 918, wherein the visual indicator is set according to the determined configuration. Themethod 900 ends atstep 920. - While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.
Claims (8)
1. A hand-held device comprising a visual indicator utilized to indicate at least one a normal mode or a press-to-test mode, and where in the setting of the visual indicator are tamper proof.
2. The hand-held device of claim 1 , wherein the hand-held device is a calculator.
3. The hand-held device of claim 2 , wherein the calculator is coupled to a calculator network.
4. The hand-held device of claim 2 , wherein visual display represents at least one of availability or restriction of at least one of functionalities or hardware in the mode of the calculator.
5. The hand-held device of claim 1 , wherein the visual display is a light emitting diode.
6. The hand-held device of claim 5 , wherein the light emitting diode illuminates more than one color simultaneously.
7. The hand-held device of claim 6 , wherein the illumination time of one color is set to illuminate for a different time than another color.
8. A calculator comprising a light emitting diode, wherein the light emitting diode illuminates sequence of color for a time slot to indicate at least one of the mode of the calculator or the functionality of the calculator at least one of restricted or allowed, and wherein the settings of the light emitting diode are tamper proof.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/333,007 US20090115606A1 (en) | 2007-08-31 | 2008-12-11 | Method and Apparatus for Secure Mode Indication |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US96959907P | 2007-08-31 | 2007-08-31 | |
US20185208A | 2008-08-29 | 2008-08-29 | |
US12/333,007 US20090115606A1 (en) | 2007-08-31 | 2008-12-11 | Method and Apparatus for Secure Mode Indication |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US20185208A Continuation | 2007-08-31 | 2008-08-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090115606A1 true US20090115606A1 (en) | 2009-05-07 |
Family
ID=46332077
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/333,007 Abandoned US20090115606A1 (en) | 2007-08-31 | 2008-12-11 | Method and Apparatus for Secure Mode Indication |
US12/332,886 Active 2032-02-25 US9218504B2 (en) | 2007-08-31 | 2008-12-11 | Method and apparatus for secure mode indication |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/332,886 Active 2032-02-25 US9218504B2 (en) | 2007-08-31 | 2008-12-11 | Method and apparatus for secure mode indication |
Country Status (1)
Country | Link |
---|---|
US (2) | US20090115606A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120102550A1 (en) * | 2010-10-22 | 2012-04-26 | Newman David M | Wireless Device Network Association |
US8789197B1 (en) | 2010-09-17 | 2014-07-22 | Wolfram Alpha Llc | Method for using a multi-function computer for testing |
US9043376B2 (en) | 2012-08-31 | 2015-05-26 | Hewlett-Packard Development Company, L.P. | Custom configuration for a calculator based on a selected functionality |
EP3885943A1 (en) * | 2020-03-25 | 2021-09-29 | Casio Computer Co., Ltd. | Electronic device, and function limit cancel method and program |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120041993A1 (en) * | 2010-08-16 | 2012-02-16 | Texas Instruments Incorporated | Method and apparatus for configuring functionality of a calculator |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3755806A (en) * | 1972-05-24 | 1973-08-28 | Bowmar Ali Inc | Calculator display circuit |
US4117542A (en) * | 1977-07-07 | 1978-09-26 | Judah Klausner | Electronic pocket directory |
US20020067281A1 (en) * | 2000-05-11 | 2002-06-06 | Shih-Ping Yeh | Status indicating device of a portable computer |
US20020133680A1 (en) * | 2000-03-20 | 2002-09-19 | Rosenquist Russell M. | System and method for limited access to system memory |
US20060099965A1 (en) * | 2004-11-10 | 2006-05-11 | Aaron Jeffrey A | Methods, systems and computer program products for remotely controlling wireless terminals |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006338205A (en) * | 2005-05-31 | 2006-12-14 | Casio Comput Co Ltd | Electronic device and control program thereof |
US8499014B2 (en) * | 2005-06-01 | 2013-07-30 | Texas Instruments Incorporated | Functionality disable and re-enable for programmable calculators |
US20070226778A1 (en) * | 2006-03-22 | 2007-09-27 | Jorg Pietruszka | Bluetooth theft protection |
-
2008
- 2008-12-11 US US12/333,007 patent/US20090115606A1/en not_active Abandoned
- 2008-12-11 US US12/332,886 patent/US9218504B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3755806A (en) * | 1972-05-24 | 1973-08-28 | Bowmar Ali Inc | Calculator display circuit |
US4117542A (en) * | 1977-07-07 | 1978-09-26 | Judah Klausner | Electronic pocket directory |
US20020133680A1 (en) * | 2000-03-20 | 2002-09-19 | Rosenquist Russell M. | System and method for limited access to system memory |
US20020067281A1 (en) * | 2000-05-11 | 2002-06-06 | Shih-Ping Yeh | Status indicating device of a portable computer |
US20060099965A1 (en) * | 2004-11-10 | 2006-05-11 | Aaron Jeffrey A | Methods, systems and computer program products for remotely controlling wireless terminals |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8789197B1 (en) | 2010-09-17 | 2014-07-22 | Wolfram Alpha Llc | Method for using a multi-function computer for testing |
US9582648B2 (en) | 2010-09-17 | 2017-02-28 | Wolfram Alpha Llc | Method for using a multi-function computer for testing |
US20120102550A1 (en) * | 2010-10-22 | 2012-04-26 | Newman David M | Wireless Device Network Association |
US8533788B2 (en) * | 2010-10-22 | 2013-09-10 | Texas Instruments Incorporated | Wireless device network association |
US9043376B2 (en) | 2012-08-31 | 2015-05-26 | Hewlett-Packard Development Company, L.P. | Custom configuration for a calculator based on a selected functionality |
EP3885943A1 (en) * | 2020-03-25 | 2021-09-29 | Casio Computer Co., Ltd. | Electronic device, and function limit cancel method and program |
Also Published As
Publication number | Publication date |
---|---|
US9218504B2 (en) | 2015-12-22 |
US20090144838A1 (en) | 2009-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2021254670B2 (en) | Systems and methods for providing security via interactive media | |
US10157273B2 (en) | Eye movement based knowledge demonstration | |
US8301897B2 (en) | Challenge-based authentication protocol | |
US8661540B2 (en) | Method and apparatus for secure credential entry without physical entry | |
US20090115606A1 (en) | Method and Apparatus for Secure Mode Indication | |
US8042159B2 (en) | Website log in system with user friendly combination lock | |
US8489888B2 (en) | Processor apparatus having a security function | |
EP2557507A3 (en) | User verification method and user verification system | |
CN101334826B (en) | Method and computer system for using image selection as verification mechanism | |
Seitz et al. | PASDJO: quantifying password strength perceptions with an online game | |
US20070022299A1 (en) | Password authentication device, recording medium which records an authentication program, and authentication method | |
JP2009042802A (en) | Authentication system | |
CN105160274B (en) | A kind of guard method of user data and terminal | |
KR20150094178A (en) | Security device and controlling method for security device | |
US20100162385A1 (en) | Method of determining when a computer program password is under attack | |
US20080154997A1 (en) | Systems and methods for function control in a calculation device | |
US20050246512A1 (en) | Information-processing apparatus and method and program for starting the same | |
Reinitz et al. | Different confidence–accuracy relationships for feature-based and familiarity-based memories. | |
US20140280935A1 (en) | Systems and methods for controlling access to user content | |
US20070266152A1 (en) | Computer peripheral device with computer security control mechanism | |
JP2023077789A (en) | Information processing apparatus and control method | |
KR100586868B1 (en) | Computer Security System and Its Operation Method | |
JP2015150327A (en) | Managing device, game parlor system, and management method | |
JP2000019945A (en) | Education supporting system | |
JPH06259381A (en) | Password matching processor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TEXAS INSTRUMENTS INCORPORATED, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROSENQUIST, RUSSELL MELVIN;REEL/FRAME:036794/0420 Effective date: 20151006 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |