20240020395. METHODS, SYSTEMS, AND PROGRAM PRODUCTS FOR SECURELY BLOCKING ACCESS TO SYSTEM OPERATIONS AND DATA simplified abstract (Lenovo (Singapore) Pte. Ltd.)

From WikiPatents
Jump to navigation Jump to search

METHODS, SYSTEMS, AND PROGRAM PRODUCTS FOR SECURELY BLOCKING ACCESS TO SYSTEM OPERATIONS AND DATA

Organization Name

Lenovo (Singapore) Pte. Ltd.

Inventor(s)

Robert J. Kapinos of Durham NC (US)

Scott Li of Cary NC (US)

Robert James Norton, Jr. of Raleigh NC (US)

Russell Speight Vanblon of Raleigh NC (US)

METHODS, SYSTEMS, AND PROGRAM PRODUCTS FOR SECURELY BLOCKING ACCESS TO SYSTEM OPERATIONS AND DATA - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240020395 titled 'METHODS, SYSTEMS, AND PROGRAM PRODUCTS FOR SECURELY BLOCKING ACCESS TO SYSTEM OPERATIONS AND DATA

Simplified Explanation

The patent application discloses methods, systems, and program products for blocking input/output (I/O) access to a computing system. The method involves establishing a portion of the machine-readable instructions as the sole controller of the system, preventing unauthorized replacement of the machine-readable instructions, blocking user access to internal resources of the computing system, and preventing predefined I/O of the computing system.

  • The patent application aims to prevent unauthorized access to a computing system by blocking I/O access.
  • It establishes a portion of the machine-readable instructions as the sole controller of the system, ensuring that only authorized instructions can control the system.
  • Unauthorized replacement of the machine-readable instructions is prevented, ensuring the integrity and security of the system.
  • User access to internal resources of the computing system is blocked, preventing unauthorized manipulation or extraction of sensitive data.
  • Predefined I/O of the computing system is also prevented, ensuring that only authorized inputs and outputs are allowed.

Potential applications of this technology:

  • Enhancing the security of computing systems by preventing unauthorized access and manipulation.
  • Protecting sensitive data and resources from unauthorized users.
  • Preventing malicious software or code from taking control of a computing system.

Problems solved by this technology:

  • Unauthorized access to computing systems and sensitive data.
  • Manipulation or extraction of internal resources by unauthorized users.
  • Malicious software or code taking control of a computing system.

Benefits of this technology:

  • Improved security and protection of computing systems and sensitive data.
  • Prevention of unauthorized access and manipulation.
  • Enhanced control over inputs and outputs of a computing system.


Original Abstract Submitted

methods, systems, and program products are disclosed for blocking input/output (i/o) access to a computing system. a method includes establishing a portion of the machine-readable instructions as sole controller of the system responsive to the machine-readable instructions and preventing unauthorized replacement of the machine-readable instructions. the method also includes blocking user access to internal resources of the computing system and preventing predefined input/output (i/o) of the computing system.