Systems and methods for securing stored computer files from modification

ABSTRACT

A computer system for securing computer files from modification may include a processor; a first data storage area operatively coupled to the processor; a non-volatile second data storage area; and a control circuit. The second data storage area may be physically separate from the first data storage area. The second data storage area may store files that are executable by the processor, including executable files of an operating system configured to save temporary files on the at least a first data storage area. The control circuit may operatively couple the second data storage area to the processor, and may be operable in a first mode configured to block commands received from the processor and configured to modify the second data storage area from being communicated to the second data storage area. In a second mode, all commands may be allowed to the first and second data storage areas.

RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.14/799,524, filed Jul. 14, 2015, issuing on Jul. 2, 2019 as U.S. Pat.No. 10,339,328, which claims the benefit of U.S. Provisional ApplicationNo. 62/024,929, filed Jul. 15, 2014, which applications are incorporatedherein by reference in their entireties for all purposes.

FIELD

This disclosure relates to computer data storage systems. Morespecifically, the disclosed embodiments relate to systems and methodsfor protecting computer files stored on a data storage area of a datastorage system by securing the files from modification.

INTRODUCTION

Malware, short for malicious software, is software used to disruptcomputer operation, gather sensitive information, or gain access toprivate computer systems. Malware is defined by its malicious intent,acting against the requirements of the computer user. Other forms ofsoftware can also cause unintentional harm due to some deficiency. Theterm badware is sometimes used and applied to both true malware andunintentionally harmful software.

Malware may be stealthy, configured to steal information or spy oncomputer users for an extended period without their knowledge, or it maybe designed to cause harm, often as sabotage or to extort payment.“Malware” is thus an umbrella term used to refer to a variety of formsof hostile or intrusive software, including computer viruses, worms,trojan horses, ransomware, spyware, adware, scareware, and othermalicious programs. It can take the form of executable code, scripts,active content, and other software. Malware is often disguised as, orembedded in, non-malicious files.

Malware attacks occur by adding an executable file or routine in to anoperating system or computer program. When that operating system is“booted” or a program is launched, the malware becomes operational andwill perform whatever tasks it was designed to perform—normallysomething that is not desired by the user of the computer system. Leftunguarded, personal and networked computers can be at considerable riskagainst these threats.

SUMMARY

The present disclosure provides apparatus, systems, and methods forprotecting computer files from modification. In some embodiments, acontrol system for securing computer files from modification, mayinclude a control circuit configured to be placed operatively between acomputer-system processor and both a first internal data storage areaand a non-volatile second internal data storage area physically separatefrom the first data storage area. The control circuit may operativelycouple the processor to the first and second internal data storageareas, and may operate in a first mode to allow communication from theprocessor to the first internal data storage area of all commandsreceived from the processor, to block communication to the secondinternal data storage area of commands that are configured to modify thesecond internal data storage area, and to allow communication to thesecond internal data storage area of commands received from theprocessor that are configured not to modify the second internal datastorage area. The control circuit may be further configured to operatein a second mode to allow communication from the processor to the firstand second internal data storage areas of all commands received from theprocessor.

In some embodiments, a computer system for securing computer files frommodification may include a processor; at least a first data storage areaoperatively coupled to the processor; a non-volatile second data storagearea; and a control circuit. The non-volatile second data storage areamay be physically separate from the at least a first data storage area.The second data storage area may store files that are executable by theprocessor, including executable files of an operating system configuredto save temporary files on the at least a first data storage area. Thecontrol circuit may operatively couple the second data storage area tothe processor, and may be operable in at least a first mode in which thecontrol circuit is configured to block commands received from theprocessor and configured to modify the second data storage area frombeing communicated to the second data storage area.

In some embodiments, a method for securing computer files frommodification may include routing communications between a processor ofthe computer system and the first and second internal data storage areasthrough a control circuit operatively independent of the processor.Communication to the second internal data storage area of commandsreceived from the processor that are configured to modify the secondinternal data storage area may be blocked by the control circuit whenthe control circuit is operating in a first mode. Communication to thesecond internal data storage area of commands received from theprocessor that are configured not to modify the second internal datastorage area may be allowed when the control circuit is operating in thefirst mode. Communication to the first internal data storage area of allcommands received from the processor may be allowed when the controlcircuit is operating in the first mode. Additionally, communication tothe first and second internal data storage areas of all commandsreceived from the processor may be allowed when the control circuit isoperating in a second mode.

In some embodiments, a method for securing computer files frommodification may include routing communications between a processor ofthe computer system and a non-volatile second data storage area ofphysically distinct first and second data storage areas through acontrol circuit operatively independent of the processor. The controlcircuit may block all commands from the processor configured to modifythe second data storage area from being communicated to the second datastorage area when the control circuit is operating in a first mode. Insome embodiments, executable files of an operating system of a computersystem may be configured to save temporary files on at least a firstdata storage area. Executable files of the operating system may bestored on the second data storage area. During operation of the computersystem, the temporary files of the operating system may be stored on thefirst data storage area.

In some embodiments, a computer system may include at least one hostcomputer and a user-interface system. The at least one host computer mayhave a host processor configured to be operatively coupled to a networksystem, and a data storage system. The data storage system may includeat least a first data storage area and a control circuit. The controlcircuit may provide operative communication between the host processorand the first data storage area and may be configured to be operativelycoupled to the network system independent of the host processor. Thefirst data storage area may store executable files of a host-processoroperating system, the host-processor operating system being configuredto store temporary files of the operating system on at least a seconddata storage area in operative communication with the host processor.The user-interface system may include a user-interface device configuredto be operatively coupled to the network system for communication withthe control circuit. The user-interface device may be selectivelyoperable in response to an input received from a user to place thecontrol circuit into an operating mode in which the control circuitblocks commands sent by the host processor and configured to modify thefirst data storage area from being communicated to the first datastorage area.

Features, functions, and advantages may be achieved independently invarious embodiments of the present disclosure, or may be combined in yetother embodiments, further details of which can be seen with referenceto the following description and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an illustrative malware-resistant datastorage system.

FIG. 2 is a block diagram of an illustrative malware-resistant datastorage system, showing relationships between various components.

FIG. 3 is an isometric view showing one embodiment of an illustrativemalware-resistant data storage system.

FIG. 4 is an isometric view of the system of FIG. 3, with anillustrative hard drive installed.

FIG. 5 is an isometric view of the system of FIG. 4 showing details ofan illustrative interface circuit with a security key installed in acommunication port.

FIG. 6 is a flow chart illustrating various steps performed in anillustrative security-related process for interacting with a datastorage system.

FIG. 7 is a block diagram of an illustrative control circuit suitablefor use in a malware-resistant data storage system.

FIG. 8 is a schematic diagram of various components of an illustrativedata processing system.

FIG. 9 is a schematic representation of an illustrative network system.

FIG. 10 is a schematic diagram of an illustrative computer networksystem including computers having malware-resistant storage systems, anda malware-resistant storage system controller isolated from a mainnetwork to which the computers are connected.

FIG. 11 is a schematic diagram of an illustrative network systemincluding computers having malware-resistant storage systems, and amalware-resistant storage system controller sharing a network.

FIG. 12 is a generalized illustration of an example of an interfaceboard directly coupled to a control circuit for use in a network systemof FIG. 10 or FIG. 11.

FIG. 13 is a schematic diagram of a user-interface system for use in anetwork system of FIG. 10 or FIG. 11.

FIG. 14 is an example of a user-interface of a user-interface circuitfor use in the user-interface system of FIG. 13.

FIG. 15 is an example of an interactive display of a user-interfacecomputer for use in the user-interface system of FIG. 13.

DESCRIPTION

Overview

Various embodiments of computer systems or data storage systemsresistant to malware are described below and illustrated in theassociated drawings. Unless otherwise specified, such a computer systemor data storage system and/or its various components may, but are notrequired to, contain at least one of the structure, components,functionality, and/or variations described, illustrated, and/orincorporated herein. Furthermore, the structures, components,functionalities, and/or variations described, illustrated, and/orincorporated herein in connection with the present teachings may, butare not required to, be included in other data storage systems. Thefollowing description of various embodiments is merely exemplary innature and is in no way intended to limit the disclosure, itsapplication, or uses. Additionally, the advantages provided by theembodiments, as described below, are illustrative in nature and not allembodiments provide the same advantages or the same degree ofadvantages.

Computer methods, computer systems, or computer program productsdisclosed herein may take the form of an entirely hardware embodiment oran embodiment combining software (including firmware, resident software,micro-code, and the like) and hardware aspects, all of which maygenerally be referred to herein as a “circuit,” “module,” or “system.” Acomputer program product may be embodied in a computer-readable medium(or media) having computer readable program code/instructions embodiedthereon.

Any combination of computer-readable media may be utilized.Computer-readable media can be a computer-readable signal medium and/ora computer-readable storage medium. A computer-readable storage mediummay include an electronic, magnetic, optical, electromagnetic, infrared,and/or semiconductor system, apparatus, or device, or any suitablecombination of these. More specific examples of a computer-readablestorage medium may include the following: an electrical connectionhaving one or more wires, a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,a portable compact disc read-only memory (CD-ROM), an optical storagedevice, a magnetic storage device, and/or any suitable combination ofthese and/or the like. A computer-readable storage medium may includeany suitable tangible medium that can contain or store a program for useby or in connection with an instruction execution system, apparatus, ordevice.

A computer-readable signal medium may include a propagated data signalwith computer-readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, and/or any suitable combination thereof. Acomputer-readable signal medium may include any computer-readable mediumthat is not a computer-readable storage medium and that is capable ofcommunicating, propagating, or transporting a program for use by or inconnection with an instruction execution system, apparatus, or device.

Program code embodied on a computer-readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, and/or the like, and/or any suitablecombination of these.

Computer program code for carrying out operations for aspects of thepresent invention may be written in one or any combination ofprogramming languages, including an object-oriented programming languagesuch as Java, Smalltalk, C++, and/or the like, and conventionalprocedural programming languages, such as the C programming language.The program code may execute entirely on a user's computer, partly onthe user's computer, as a stand-alone software package, partly on theuser's computer and partly on a remote computer, or entirely on theremote computer or server. In the latter scenario, the remote computermay be connected to the user's computer through any type of network,including a local area network (LAN) or a wide area network (WAN),and/or the connection may be made to an external computer (for example,through the Internet using an Internet Service Provider).

Flowchart illustrations and/or block diagrams are described andillustrated for methods, apparatuses, systems, and/or computer programproducts. Each block and/or combination of blocks in a flowchart and/orblock diagram may be implemented by hardware and/or computer programinstructions. The computer program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

These computer program instructions can also be stored in acomputer-readable medium that can direct a computer, other programmabledata processing apparatus, and/or other device to function in aparticular manner, such that the instructions stored in thecomputer-readable medium produce an article of manufacture includinginstructions which implement the function/act specified in the flowchartand/or block diagram block or blocks.

The computer program instructions can also be loaded onto a computer,other programmable data processing apparatus, and/or other device tocause a series of operational steps to be performed on the device toproduce a computer-implemented process such that the instructions whichexecute on the computer or other programmable apparatus provideprocesses for implementing the functions/acts specified in the flowchartand/or block diagram block or blocks.

Any flowchart and/or block diagram in the drawings is intended toillustrate the architecture, functionality, and/or operation of possibleimplementations of systems, methods, and computer program products. Inthis regard, each block may represent a module, segment, or portion ofcode, which comprises one or more executable instructions forimplementing the specified logical function(s). In some implementations,the functions noted in the block may occur out of the order noted in thedrawings. For example, two blocks shown in succession may, in fact, beexecuted substantially concurrently, or the blocks may sometimes beexecuted in the reverse order, depending upon the functionalityinvolved. Each block and/or combination of blocks may be implemented byspecial purpose hardware-based systems (or combinations of specialpurpose hardware and computer instructions) that perform the specifiedfunctions or acts.

Examples, Components, and Alternatives

The following sections describe selected aspects of exemplary computerand data storage systems as well as related systems and/or methods. Theexamples in these sections are intended for illustration and should notbe interpreted as limiting the entire scope of the present disclosure.Each section may include one or more distinct inventions, and/orcontextual or related information, function, and/or structure.

Example 1

An example of a malware-resistant computer system is shown schematicallyin FIG. 1 and generally indicated at 20. System 20 may include a hostcomputer 22 having a resident processor (not shown), a data storagesystem 24 illustrated as a bridge circuit 26, and one or more datastorage areas 28, such as a drive 30 and a drive 32. Each of the datastorage areas may include any suitable physical or virtualcomputer-readable storage medium or portion of a storage mediumconfigured for storage and retrieval of digital information. Forexample, the drives may include a hard disk drive (HDD), a solid statedrive (SSD), a floppy drive, an optical disk drive, a network drive,memory, cache, or the like, or any combination of these. In thisexample, each of drives 30 and 32 includes a hard drive having a serialATA attachment (SATA) interface. However, other drive and/or interfacetypes may be used, e.g., parallel ATA (PATA). For example, a singlephysical drive may be used, with the physical drive having a twonon-overlapping partitions.

Data storage areas 28 are in operative communication with bridge circuit26, such as by way of a respective cable and/or connector. In someexamples, two SATA hard drives plug directly into compatible slots in aframe supporting bridge circuit 26. Bridge circuit 26 may include anysuitable electronic circuit(s) configured to interface with drives 30and 32, to provide various control features described below, and topresent an interface to the associated computer 22, such as to theresident processor or motherboard.

Bridge circuit 26 may be configured to selectively transfer commands andmessages associated with reading and writing of data between thecomputer 22 and the data storage areas 28. For example, read requestsfor either drive may be received by bridge circuit 26 and passed to thedata storage area 28 in question without modification or interference.In some examples, one of the two drives 30 and 32 may be designated bysystem 20 as a write-protected or read-only drive. For example drive 32may be designated as a protected drive. In this example, write requestsfor drive 30 (unprotected, read/write) will be received by the controlcircuit and passed along unchanged. However, any write request directedto drive 32, or other request that would modify drive 32, would beblocked or filtered by the control circuit and never reach drive 32.

The bridge circuit 26 may filter a drive-altering request if it isdirected to a write-protected drive. A processor of the host computer 22attempting to communicate with drive 32 for write access will expect aconfirmation message. If the confirmation message is not received, anerror may occur and/or write access may be repeatedly attempted.Accordingly, bridge circuit 26 may respond, in addition to blocking therequest, with a confirmation message indicating that the write attemptwas successful. This feature may be referred to as “spoofing,” in thatcomputer 22 is effectively “fooled” into believing that nothing has beenblocked or filtered. In some examples, other messages may alternativelyor additionally be provided by bridge circuit 26. For example, a messagemay be communicated indicating that writing activity has been attempted.In some examples, a visual or other human-perceptible indicator may beactivated when write access is blocked, such as a flashing LED light.

Bridge circuit 26 may include a security feature. For example,designation or overriding of protected status for drive 32 may require auser to enter into an administrative mode with respect to the bridgecircuit. This mode may be enabled, for example, by providing a passcodeto the system, such as through a numeric keypad or other user interface.In some examples, as described further below, a passcode may becommunicated to the system by causing a separate device to interfacewith data storage system 24, such as through bridge circuit 26, therebyplacing system bridge circuit 26 into administrative mode.

When drive 32 is taken out of protected mode or status, the drive willbe treated similarly to drive 30, and data may be written or recorded todrive 32 without any filtering or blocking. Drive 32 may subsequently beredesignated as a protected drive, and bridge circuit 26 will againfilter any write requests from host computer 22.

Accordingly, computer system 20, and specifically data storage system24, may be suitable for preventing successful malware attacks. Malicioussoftware, including viruses, trojans, spyware, rootkits, backdoors,worms, ransomware, and the like, generally requires access to theoperating system and/or other executable software on a given computer.Malware generally requires the ability to install executable code,either by modifying existing software or by installing a standaloneexecutable. System 20 facilitates the thwarting of such attacks byallowing a user to place all executable software, including theoperating system, onto one drive, then protect that drive. With thedrive protected, further modification is prevented, existing softwarefiles cannot be changed, and new executables cannot be created on theprotected drive. While it may be possible to save executable code ontounprotected drive 30, the operating system may be configured so that theexecutable code on the unprotected drive would not be executed Ifexecutable code on the unprotected drive were to be executed, theexecutable code would not result in any changes to the operating systemor other existing software on the protected drive 30. Accordingly, dataand executables on the protected drive remain protected.

In some examples, an executable blocking program may be launched fromdrive 32 and run in system memory. This blocking program may beconfigured to prevent execution of any file located on unprotected drive30. For example, the blocking program may communicate a heartbeat signalto drive 30 which continually resets a firmware timer associated withdrive 30 on bridge circuit 26. If the timer ever reaches a terminalstate (e.g., a countdown timer elapses fully), then the bridge circuitwill halt all input and output operations relating to drive 30. Thissecurity measure ensures that the blocking program is active, and thatit has not been halted or overwritten, for example, by malware.

Example 2

FIGS. 2-7 show an example of an illustrative malware-resistant computersystem 40. Computer system 40 may include a host computer 42, and a datastorage system 44 with data storage areas 46. In this example, it willbe seen that data storage system 44 may be configured to supportdual-drive data storage areas 46. The data storage system 44 mayincorporate a write-protected interface, to protect a computer operatingsystem configuration from malware attacks. In a preferred embodiment,two 2.5″ drives may be placed within a mechanical “chassis” that meetsthe standards for 3.5″ drives. As a result, this data storage system canbe used in any computer system that uses a 3.5″ hard drive for itssystem drive. A hard drive containing the operating system may begenerally write-protected, and a separate hard drive containingsupporting data may be allowed read/write access.

More specifically, and referring to FIGS. 2-7, in this example datastorage areas 46 includes a plurality of drives, including a read/writehard drive 48 and a protectable hard drive 50, each operativelyconnected to a drive interface circuit 52. A bridge circuit 54 includesa control circuit 56 operatively connected to the drive interfacecircuit 52, and a user-interface circuit 58. Control circuit 56 may havea data storage area, such as a cache or memory 57. The user-interfacecircuit 58 may be operatively connected to the control circuit, and maybe removable therefrom. In this example, some or all of the componentsof data storage system 44 may be housed, arranged, or structurallysupported by a frame or chassis 60. Circuits in this example may bereferred to interchangeably as “circuit boards” or “boards.”

An interface cable 62 having a data portion 64 and a power portion 66may be connectable to data storage system 44, such as through aconnection point or points on control circuit 56. Interface cable 62 mayprovide an interface between host computer 42 and data storage system44. For example, interface cable 62 may provide an electrical powerconnection between data storage system 44 and a power source 68 of thehost computer, and/or may provide a data connection with a data bus 70via an input/output unit 72 or similar structure, such that data storagesystem 44 is placed into operative communication with one or moreprocessors 74 and internal storage area 76, such as memory or cache, ofthe computer 42. Note that data processing systems are described ingreater detail below.

Each of drives 48 and 50 may include any suitable storage area, asdescribed above regarding drives 30 and 32. Additionally, each drive 48,50 may represent one or more similar drives, and/or one or more virtualpartitions therein. However, the data storage area represented by drive48 is physically distinct from the data storage area represented bydrive 50.

In this example, drives 48 and 50 are operatively connected to driveinterface circuit 52 at dedicated SATA slots (also termed connectors orports) 78. Drive interface circuit 52 may be fabricated on a driveinterface circuit board that may be a simple backplane supporting SATAslots 78. Drive interface circuit 52 may be operatively connected tocontrol circuit 56 by any suitable connector or connectors 80. Forexample, connectors 80 may include a pair of right angle headers such asthose shown in FIGS. 4-6. Note that circuit boards supporting driveinterface circuit 78 and control circuit 56 are oriented orthogonal toone another in this example. However, other orientations may bepossible, including fabricating the two circuits on a single circuitboard.

Control circuit 56 may include any suitable electronic and relatedcomponents configured to relay read/write requests between processor 74and drives 48 and 50, to handle transitions between an administrativemode and an operational mode, to filter any write requests directed toprotectable drive 50 if in operational mode, and to provide “writerequest successful” messages to the processor if appropriate. Controlcircuit 56 also includes one or more external slots or connectors 82, orother communication port, configured to provide a standard SATAinterface for interface cable(s) 62. Control circuit 56 may beconfigured to be transparent to processor 74. In other words, processor74 may be unaware of the existence of the circuit, such that controlcircuit 56 is configured to make it appear to processor 74 that drives48 and 50 are connected directly to the host computer 42. In someexamples, the two data storage areas may appear to be as separatepartitions on the same single physical drive.

An example of user interface circuit 58, also referred to as a displayboard or user-interface (UI) board, is shown in detail in FIG. 5. Userinterface circuit 58 may include any suitable electronic components andinterfaces configured to facilitate status indication and provide aninterface for the user to enable and disable administrative mode orother functions for data storage system 44. User interface circuit 58may be removably connected to control circuit 56, such as by a pluggableconnector. Accordingly, user interface circuit 58 may not be necessaryfor the normal operation of data storage system 44, but could be removedand reinstalled as needed for security reasons. An example of a wiringconfiguration for the board relative to the main circuit is provided inthe accompanying appendix.

User interface circuit 58 may include one or more status indicators 84such as LEDs of any suitable color. For example, LEDs may be used toindicate control circuit activity, or data transfer between the controlcircuit and read/write drive 48 or protected drive 50. User interfacecircuit 58 may include an interface for secure communication of apasscode, such as a receptacle 86. Receptacle 86 may include anysuitable receptacle or connector configured to receive a correspondingdevice containing the passcode for digital transmission. For example,receptacle 86 may include a female mini-USB connector configured to matewith a code storage device 88, such as mini-USB flash drive orauthentication key 90.

User interface circuit 58 may include a sacrificial circuit element 92or manual interface component, such as a user-actuatable element, suchas a switch or a pushbutton 94, configured to communicate confirmatoryinformation or to effect the communication of information from the user,such as to communicate an authentication key code from authenticationkey 90, to control circuit 56. For example, transfer of a passcode fromauthentication key 90 to control circuit 56 through user-interfacecircuit 58 may be indicated by pressing button 94.

Data storage system 44 may include a circuit board 96 on which userinterface circuit 58 is supported. Circuit board 96 may include asacrificial board element 98, such as a destructively removable portionor tab 100. As shown in FIG. 5, tab 100 may be formed by including slots102 and 104 delimiting the sides of tab 100 and a row of holes 106delimiting the bottom of tab 100. The slots and holes define and weakenthe attachment of the tab to circuit board 96. Button 94 may be includedon tab 100, as shown particularly in FIG. 5. Accordingly, breaking offtab 100 may provide added security by eliminating the ability to confirmor initiate loading of a different passcode. For example, afterinstalling the operating system and any additional software onto drive50, authentication key 90 could be removed by bending the tab 100 alongthe series of holes 106 far enough to break the tab off of the circuitboard 96. This would remove push button 94 from the user interfacecircuit 58 and prevent further modification of protected drive 50 by anauthentication key different from the authentication key last used,without installing a replacement board 96 that has the tab 100 andresident push button 94 intact.

Some or all of the aforementioned components of data storage system 44may be housed or supported by chassis 60, as shown in FIGS. 3-5. Chassis60 may include any suitable structure configured to support a pluralityof storage drives, circuit boards, and/or connection slots such as thosedescribed in this example. Chassis 60 may comprise an aluminum frame, orany other suitable material. Chassis 60 may include one or morefastening or mounting points for various components. Chassis 60 may beconfigured to fit into a standard bay of a personal computer. Forexample, chassis 60 may be configured to fit into a standard 3.5-inchhard drive bay. In this example, chassis 60 is configured to accept andsupport drives 48 and 50 as two 2.5-inch storage drives, on either sideof a partition, such as a common floor or wall 108. Accordingly, system100 may include two 2.5-inch drives in a single 3.5-inch chassisconfiguration.

Example 3

FIG. 6 depicts a flowchart illustrating steps performed in an exemplarymethod for securely enabling and disabling administrative mode orchanging an authentication key code in a malware-resistant data storagesystem such as has been described. Other examples may include differentsteps, or more or fewer steps. FIG. 9 depicts multiple steps of amethod, generally indicated at 120, which may be performed inconjunction with a malware-resistant data storage system. Althoughvarious steps of method 120 are described below and depicted in FIG. 6,the steps depicted need not necessarily all be performed, and in somecases may be performed in a different order than the order shown.

Method 120 is shown in FIG. 6 in terms of system functionality, and isdescribed in detail below. From a user perspective, however, method 120may proceed as follows. A user determines whether a passcode change isdesired or whether initial loading of a passcode is required. Initialloading or subsequent changing of the passcode may require the system tobe in administrative mode, or (for initial loading) in factory resetmode. If this operation is desired and the proper mode is enabled, theuser then inserts a new authentication key (such as USB authenticationkey 90 described above) or other code storage device 88 into keyreceptacle 86 on the data storage system 44. This receptacle may belocated on the user interface circuit 58.

Placing the key into the receptacle enables digital communicationbetween the authentication key 90 and the control circuit 56. Forexample, the contents of the authentication key 90 may become accessibleby the control circuit 56. However, in this example, for securityreasons, the authentication key triggers a transfer of its contents whenthere is an associated user action and the control circuit 56 retrievesthe authentication key code and stores it in memory 57. Memory 57 ispreferably not readable or otherwise accessible by a user or the hostcomputer or processor. Specifically, once the authentication key isinserted, the user presses the key load button 94 on the display circuitboard 96 containing the user interface circuit 58 to initiate loading ofthe passcode from the authentication key 90 into the control circuit 56.This passcode may be a randomly generated multi-bit number (e.g., 2,048bits), such as may be generated and loaded onto a USB authentication key90 by an AES key programmer device. The passcode may also be anencryption code, in which case the key storing it may be referred to asa security key, as described further with reference to FIG. 7.

Pressing the key load button 94 initiates a loading of theauthentication code into the control circuit 56. The authentication codemay be stored or a hash of the actual code may be stored. Forconvenience, the code and the hash of the code may each be referred toas the passcode. The passcode may be stored in the memory 57 of thecontrol circuit 56, allowing the display circuit board 96 to besubsequently removed if desired. Alternatively, the pushbutton 94 may bedisabled on the display circuit board 96, such as by physically removingthe portion of the board, tab 100 that includes the pushbutton 94, asdiscussed above.

The user may then power down the data storage system 44, such as byremoving power from the host computer 42. The user decides whetheradministrative mode is desired. If so, the authentication key isinserted into the receptacle 86 (or left there if present), and power isrestored. When the data storage system 24 boots up, the control circuit56 verifies that the inserted authentication key 90 contains the properpasscode, and the data storage system 44 will be operable inadministrative mode. This includes full read/write access to allattached data storage areas 46, and may be enabled by the user for taskssuch as software (including OS) installation, updating, orreconfiguring.

If the user powers the data storage system 44 down and then desires todisable administrative mode, the user removes the authentication key 90from the receptacle 86 and restores power. The authentication key 90should then be kept in a secure location to prevent unauthorized use.Upon restoration of power, the data storage system checks to see if anauthentication key with the proper passcode is in communication with thecontrol circuit. If no authentication key is present, or the wrongauthentication key is present, the data storage system 44 operates inwrite-protect mode (i.e., with administrative mode disabled). In otherwords, the protected drive 50 is protected from writing operations, andany attempts by the host processor 74 to write to the protected drive 50is blocked and spoofed.

Accordingly, referring now to method 120 illustrated FIG. 6, at power-on122 of the data storage system 44, the control circuit 56 checks at step124 to see if it is in factory reset mode. If so, this mode enablesloading of a new authentication code. Accordingly, at step 126, thecontrol circuit 56 enters a looping or waiting condition wherein itmonitors for an indication that an authentication key 90 is present. Inresponse to an authentication key 90 being present, the control circuit56 enters another looping or waiting condition at step 128, this timemonitoring for an indication that the “load key” pushbutton 94 has beenpressed or otherwise activated. Once the key-load pushbutton 94 has beenactivated, step 130 includes ingesting or otherwise loading the key codeinto memory 57 of the control circuit 56. This is done, for example,when loading an authentication key 90 into a new or reset data storagesystem 44.

If it is determined at step 124 that the control circuit 56 is not infactory reset mode, the control circuit checks at step 132 for thepresence of an authentication key 90. If an authentication key 90 ispresent, step 134 includes comparing the contents of the authenticationkey 90 with the stored authentication code value. The comparison may beaccomplished by comparing a hash of the authentication code with a hashof the stored value or by comparing the authentication code in theauthentication key 90 with the stored authentication code.

If the authentication codes do not match, or if it is determined in step132 that no authentication key 90 is present, then the control circuit56 enters the protected mode at step 136. If the authentication key 90is present and the authentication code matches the stored passcode(e.g., a hash of the authentication code on the authentication key 90matches the hash stored in memory 57), then the control circuit 56enters administrative mode at step 138.

In administrative mode, the control circuit 56 continues to monitor fora key load event at step 140. In other words, the system watches forload pushbutton 94 activation. If the pushbutton 94 is pressed, then thecontrol circuit 56 checks at step 142 for the presence of anauthentication key 90. If no authentication key 90 is present, then atstep 144, the control circuit 56 enters factory reset mode. This is oneway that the control circuit 56 would be in such a mode at power-updescribed with respect to steps 122 and 124. If instead anauthentication key 90 is present, then at step 146 the system would loador ingest the contents of the key to change the existing stored keycode.

When in administrative mode, the computer operating system, applicationprograms, other executable files, and any data files that are not to bemodified, may be loaded into a protected drive, such as protected drive32 of computer system 20 or protected drive 50 of computer system 40.The operating system can then be configured to store files that are tobe modified, such as temporary files, on an unprotected drive, such asread/write drive 30 of computer system 20 or read/write drive 48 ofcomputer system 40. This process is preferably performed when thecomputer system is not connected to the Internet or to another networkuntil fully configured and the bridge circuit is protecting theprotected drives in read-only or protected mode.

As an example, a Microsoft Windows® operating system may be configuredto write temporary data and files to the read/write data storage area byconfiguring advanced system settings. Paging for the C: drive isdeselected. A paging file size is then input for the drive that isdesignated as the read/write data storage area. Folders are then set upon the read/write data storage area titled “TEMP” and “TMP.”Environmental Variables are then selected, and the TEMP and TMP foldersare designated for both User and System. It further may be desirable todisable services, such as automatic updates, for the operating system orprograms stored on the protected drive. Since the protected drive storesthe operating system, it may also be preferable to set the power controlfor the protected drive so that it does not go into a sleep orhibernation mode.

Example 4

FIG. 7 shows an example of an illustrative data storage system 150 forsecuring computer files from modification. Data storage system 150includes a bridge circuit 152 for coupling a computer connector, such asa SATA connector 154, to one or more data storage areas 156. Bridgecircuit 152 may include a control circuit 158 and a user interfacecircuit 160 mounted on a display circuit board 162. Control circuit 158is an example of control circuit 56 described above. Control circuit 158includes a first drive interface bridge 164 operatively connectedbetween SATA connector 154, to which a host computer or processor isconnected during use, and a data storage area 156 in the form of a firstdata storage drive 166. First drive interface bridge 164 may include anysuitable processor configured to selectively operate in either of twomodes: (1) a first, protected mode in which the processor traps write orother storage-area-modifying commands from a host computer (e.g., via adirect memory access (DMA) controller communication), throws away thedata to be written in the case of a write command, and provides a statuscompletion message of “good” to the host; and (2) a second, unprotectedmode in which the processor essentially passes communications throughuninterrupted, including write or other modifying requests from the hostcomputer. In some examples, interface bridge 164 may include a memoryunit (e.g., flash chip) in communication with the resident processor,the memory unit containing instructions executed by the processor (e.g.,to carry out the functions just described). Drive interface bridge 164may include one or more registers configured to buffer data.

Control circuit 158 further includes an authentication manager circuit168 in communication with drive interface bridge 164. Authenticationmanager circuit 168 may include any suitable components configured tomanage authentication of the passcode entered through the user-interfacecircuit 160 via display board 162, such as described in Examples 1 and2. Selection of the first or second mode of drive interface bridge 164may be effected by authentication manager circuit 168. Drive interfacebridge 164 may remain in the first mode unless a matching passcode ispresented to authentication manager circuit 168, in which case an outputof authentication manager circuit 168 places drive interface bridge 164into the second mode (see Example 2 for a more detailed example).

Optionally, an encryption circuit 170 may be included such that datastored on drive 166 may be encrypted. For example, the passcode providedthrough authentication manager circuit 168 may be used as an encryptioncode for cryptographically encoding and decoding the stored information,or a separate encryption code may be stored, such as on the sameauthentication key, on a separate authentication or security key, or ina memory of the authentication manager circuit 168.

In some examples, a second drive interface bridge circuit 172substantially identical to first drive interface bridge circuit 164 isincluded between SATA connector 154 and a second data storage area 156in the form of a second data storage drive 174. Consistent with theexamples described above, interface bridge 172 may simply passcommunications between the host computer and data storage drive 174,making data storage drive 174 a readable/writeable drive. However,interface bridge 172 may include any of the same functions and modesdescribed regarding interface bridge 164. Accordingly, interface bridge172 may also be in communication with authentication manager 168.

In some examples, a user may select which of drives 166 and 174 is to bedesignated as the protected drive. In yet further examples, theread/write unprotected drive 174 may have some level of protectionprovided. For instance, interface bridge 172 under control ofauthentication manager 168 may block any executable programs from beingstored on drive 174, or may block execution of any executable programsstored on drive 174. In some embodiments, the operating system (OS) maybe forced to execute programs only if they are located on the protecteddrive 166. In these embodiments, even if an attack results in storage ofmalware on the unprotected drive, the OS would not authorize executionof the code. A further level of security may be provided by allowingcommunication with drive 174 only within a limited time period ofreceipt of a status signal from authentication manager 168. If thesignal is not received within the time limit, access may be denied. Thiswould then provide a level of assurance that the authentication managercircuit 168 has not been compromised.

In some examples, an additional or alternative encryption circuit 176may be included to encrypt and decrypt data on drive 174. Thisencryption circuit may be substantially identical to encryption circuit170 already described.

A dashed lines 178 and 180 shown in FIG. 10 connects authenticationmanager 168 to SATA connector 154 and SATA connector 154 touser-interface circuit 160. This line indicates that the user-interfacecircuit 160, in some examples, may be operatively connected to controlcircuit 158 through the SATA connector 154 rather than by a directconnection. This may be done, for example, to facilitate disposition ofthe display board 162 in a more accessible and/or visible locationremote from control circuit 158.

Furthermore, the connection of the user-interface circuit 160 toauthentication manager 168 may be provided via a connector on controlcircuit 158 and SATA connector 154. Display board 162 may plug into theconnector on the control circuit 158. Alternatively, the connection canbe made through the interface bridge 164 such that the device may bemated with other hardware (e.g., a removable drive enclosure). In someexamples, SATA connector 154 may be a SAS connector having two ports fordata connection—a primary port and a secondary failsafe port. The datastorage system may utilize these two ports to independently break outthe protected and unprotected drive interfaces. One or more of the powerand ground pins may then be used for interfacing with the authenticationmanager 168.

Another feature of the control circuit 158 is that the mode of theprotected data storage drive 166 cannot be altered by a host computer.The mode authentication manager circuit is independent of thehost-accessible HDD data and control interface. With no interconnectionbetween the HDD and the mode authentication manager, software (whether“authorized” or malware) is unable to place the control circuit 158 intoadministrative mode, which would make the protected drive 166 vulnerableto attack.

Example 5

This example describes a data processing system 200. In this example,system 200 is an illustrative data processing system suitable forinterfacing with and/or implementing one or more portions of a datastorage system described above. For example, data processing system 200may comprise a host computer, an interface bridge circuit, anauthentication manager circuit, a control circuit, or otherprocessor-based circuit; See FIG. 8. Actual implementations may havemore or fewer components as appropriate for the particular application.

In this illustrative example, data processing system 200 includescommunications framework 202. Communications framework 202 providescommunications between processor unit 204, memory 206, persistentstorage 208, communications unit 210, input/output (I/O) unit 212, anddisplay 214. Memory 206, persistent storage 208, communications unit210, input/output (I/O) unit 212, and display 214 are examples ofresources accessible by processor unit 204 via communications framework202.

Processor unit 204 serves to run instructions of software that may beloaded into memory 206. Processor unit 204 may be a number ofprocessors, a multi-processor core, or some other type of processor,depending on the particular implementation. Further, processor unit 204may be implemented using a number of heterogeneous processor systems inwhich a main processor is present with secondary processors on a singlechip. As another illustrative example, processor unit 204 may be asymmetric multi-processor system containing multiple processors of thesame type.

Memory 206 and persistent storage 208 are examples of storage areas 216.A data storage area is any piece of hardware, portion of a piece ofhardware, portion of a combination of pieces of hardware, a virtualpartition in one or more pieces of hardware, which pieces of hardwareare capable of storing information, such as, for example, withoutlimitation, data, program code in functional form, and other suitableinformation either on a temporary basis or a permanent basis.

Data storage areas 216 also may be referred to as computer readablestorage devices in these examples. Memory 206, in these examples, maybe, for example, a random access memory or any other suitable volatileor non-volatile storage device, or a combination of such devices.

Persistent storage 208 may take various forms, depending on theparticular implementation. For example, persistent storage 208 maycontain one or more components or devices. For example, persistentstorage 208 may be a hard drive, a flash memory, a rewritable opticaldisk, a rewritable magnetic tape, a virtual or logical drive, or somecombination of the above. The media used by persistent storage 208 alsomay be removable. For example, a removable hard drive may be used forpersistent storage 208.

Communications unit 210, in these examples, provides for communicationswith other data processing systems or devices. In these examples,communications unit 210 is a network interface card. Communications unit210 may provide communications through the use of either or both wiredand wireless communications links.

Input/output (I/O) unit 212 allows for input and output of data withother devices that may be connected to data processing system 200. Forexample, input/output (I/O) unit 212 may provide a connection for userinput through a keyboard, a mouse, and/or some other suitable inputdevice. Further, input/output (I/O) unit 212 may send output to aprinter. Display 214 provides a mechanism to display information to auser.

Instructions for the operating system, applications, and/or programs maybe located in data storage areas 216, which are in communication withprocessor unit 204 through communications framework 202. In theseillustrative examples, the instructions are in a functional form onpersistent storage 208. These instructions may be loaded into memory 206for execution by processor unit 204. The processes of the differentembodiments may be performed by processor unit 204 usingcomputer-implemented instructions, which may be located in a memory,such as memory 206.

These instructions are referred to as program instructions, programcode, computer usable program code, or computer readable program codethat may be read and executed by a processor in processor unit 204. Theprogram code in the different embodiments may be embodied on differentphysical or computer readable storage media, such as memory 206 orpersistent storage 208.

Program code 218 is located in a functional form on computer readablemedia 220 that is selectively removable and may be loaded onto ortransferred to data processing system 200 for execution by processorunit 204. Program code 218 and computer readable media 220 form computerprogram product 222 in these examples. In one example, computer readablemedia 220 may be non-transitory computer readable storage media 224 ortransitory computer readable signal media 226.

Computer readable storage media 224 may include, for example, an opticalor magnetic disk that is inserted or placed into a drive or other devicethat is part of persistent storage 208 for transfer onto a storagedevice, such as a hard drive, that is part of persistent storage 208.Computer readable storage media 224 also may take the form of apersistent storage, such as a hard drive, a thumb drive, or a flashmemory, that is connected to data processing system 200. In someinstances, computer readable storage media 224 may not be removable fromdata processing system 200.

In these examples, computer readable storage media 224 is a physical ortangible non-transitory storage device used to store program code 218rather than a medium that propagates or transmits program code 218.Computer readable storage media 224 is also referred to as a computerreadable tangible storage device or a computer readable physical storagedevice. In other words, computer readable storage media 224 is a mediathat can be touched by a person.

In some illustrative embodiments, program code 218 may be downloadedover a network to persistent storage 208 from another device or dataprocessing system through computer readable signal media 226 for usewithin data processing system 200. For instance, program code stored ina computer readable storage medium in a server data processing systemmay be downloaded over a network from the server to data processingsystem 200. The data processing system providing program code 218 may bea server computer, a client computer, or some other device capable ofstoring and transmitting program code 218.

The different components illustrated for data processing system 200 arenot meant to provide architectural limitations to the manner in whichdifferent embodiments may be implemented. The different illustrativeembodiments may be implemented in a data processing system includingcomponents in addition to and/or in place of those illustrated for dataprocessing system 200. Other components shown in FIG. 8 can be variedfrom the illustrative examples shown. The different embodiments may beimplemented using any hardware device or system capable of runningprogram code. As one example, data processing system 200 may includeorganic components integrated with inorganic components and/or may becomprised entirely of organic components excluding a human being. Forexample, a storage device may be comprised of an organic semiconductor.

In another illustrative example, processor unit 204 may take the form ofa hardware unit that has circuits that are manufactured or configuredfor a particular use. This type of hardware may perform operationswithout needing program code to be loaded into a memory from a storagedevice to be configured to perform the operations.

For example, when processor unit 204 takes the form of a hardware unit,processor unit 204 may be a circuit system, an application specificintegrated circuit (ASIC), a programmable logic device, or some othersuitable type of hardware configured to perform a number of operations.With a programmable logic device, the device is configured to performthe number of operations. The device may be reconfigured at a later timeor may be permanently configured to perform the number of operations.Examples of programmable logic devices include, for example, aprogrammable logic array, programmable array logic, a field programmablelogic array, a field programmable gate array, and other suitablehardware devices. With this type of implementation, program code 218 maybe omitted, because the processes for the different embodiments areimplemented in a hardware unit.

In still another illustrative example, processor unit 204 may beimplemented using a combination of processors found in computers andhardware units. Processor unit 204 may have a number of hardware unitsand a number of processors that are configured to run program code 218.With this depicted example, some of the processes may be implemented inthe number of hardware units, while other processes may be implementedin the number of processors.

In another example, a bus system may be used to implement communicationsframework 202 and may be comprised of one or more buses, such as asystem bus or an input/output bus. Of course, the bus system may beimplemented using any suitable type of architecture that provides for atransfer of data between different components or devices attached to thebus system.

Additionally, communications unit 210 may include a number of devicesthat transmit data, receive data, or both transmit and receive data.Communications unit 210 may be, for example, a modem or a networkadapter, two network adapters, or some combination thereof. Further, amemory may be, for example, memory 206, or a cache, such as that foundin an interface and memory controller hub that may be present incommunications framework 202.

The flowcharts and block diagrams described herein illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousillustrative embodiments. In this regard, each block in the flowchartsor block diagrams may represent a module, segment, or portion of code,which comprises one or more executable instructions for implementing thespecified logical function or functions. It should also be noted that,in some alternative implementations, the functions noted in a block mayoccur out of the order noted in the drawings. For example, the functionsof two blocks shown in succession may be executed substantiallyconcurrently, or the functions of the blocks may sometimes be executedin the reverse order, depending upon the functionality involved.

Example 6

This example describes a network data processing system 240 in whichillustrative embodiments may be implemented; see FIG. 9. It should beappreciated that FIG. 9 is provided as an illustration of oneimplementation and is not intended to imply any limitation with regardto environments in which different embodiments may be implemented. Manymodifications to the depicted environment may be made.

Network data processing system 240 is a network of computers in whichone or more illustrative embodiments of a malware resistant computersystem or data storage system may be implemented. Network dataprocessing system 240 may include network 242, which is a mediumconfigured to provide communications links between various devices andcomputers connected together within network data processing system 240.Network 242 may include connections such as wired or wirelesscommunication links, fiber optic cables, and/or any other suitablemedium for transmitting and/or communicating data between networkdevices, or any combination thereof.

In the depicted example, a first network device 244 and a second networkdevice 246 connect to network 242, as does an electronic storage device248. In the depicted example, devices 244 and 246 are shown as servercomputers. However, network devices may include, without limitation, oneor more routers, switches, voice gates, servers, electronic storagedevices, imaging devices, and/or other networked-enabled tools that mayperform a mechanical or other function. These network devices may beinterconnected through wired, wireless, optical, and other appropriatecommunication links.

In addition, client electronic devices 250, 252, and 254 connect tonetwork 252. Client electronic devices 250, 252, and 254 may include,for example, one or more personal computers, network computers, and/ormobile computing devices such as personal digital assistants (PDAs),smart phones, handheld gaming devices, wearable devices, and/or tabletcomputers, and the like. In the depicted example, server 244 providesinformation, such as boot files, operating system images, andapplications to one or more of client electronic devices 250, 252, and254. Client electronic devices 250, 252, and 254 may be referred to as“clients” with respect to a server such as server computer 244. Networkdata processing system 240 may include more or fewer servers andclients, as well as other devices not shown.

Program code located in system 240 may be stored in or on a computerrecordable storage medium and downloaded to a data processing system orother device for use. For example, program code may be stored on acomputer recordable storage medium on server computer 244 and downloadedto client 250 over network 242 for use on client 250.

Network data processing system 240 may be implemented as one or more ofa number of different types of networks. For example, system 240 mayinclude an intranet, a local area network (LAN), a wide area network(WAN), or a personal area network (PAN). In some examples, network dataprocessing system 140 includes the Internet, with network 142representing a worldwide collection of networks and gateways that usethe transmission control protocol/Internet protocol (TCP/IP) suite ofprotocols to communicate with one another. At the heart of the Internetis a backbone of high-speed data communication lines between major nodesor host computers. Thousands of commercial, governmental, educationaland other computer systems may be utilized to route data and messages.FIG. 9 is intended as an example, and not as an architectural limitationfor any illustrative embodiments.

Example 7

This example describes illustrative networks including one or moremalware-resistant data storage systems; see FIGS. 10-15.

FIG. 10 shows an illustrative computer network system 260, which is anexample of a network system 240 described in Example 6. Computer networksystem 260 may include a first network 262 in the form of a LANinterconnecting a plurality of client computers 264, a network attachedstorage device (NAS) 266, a network server 268, and a firewall 270interfacing the LAN network 262 with external networks. Each clientcomputer 264 includes a computer network interface controller (NIC) 272,and may include a malware-resistant data storage system similar to theembodiments described above. In these examples, the malware-resistantdata storage systems are network-enabled, and include adata-storage-system bridge NIC 274 located in a display board as isdescribed further below. Each bridge NIC 274 is connected via a secondbridge network 276, isolated from computer network 262, to a bridge modecontroller 278 of a user-interface system 280. Mode controller 278, alsoreferred to as a user-interface device, is controllable by one or moreuser-interface computers 282 on the isolated bridge LAN 276. Networksystem 260 may be restricted to have only one mode controller 278allowed on network 276.

FIG. 11 shows a computer network system 290 similar to the one shown inFIG. 10, except that a common network 292 is a combined network on whichclient computers 294, a NAS 296, a server 298, a firewall 300, and auser-interface device or bridge mode controller 302 of a user-interfacesystem 304 are all operatively connected in common. In this embodiment,the mode controller is controlled via a direct Ethernet connection to auser-interface computer 306.

In this example, each client computer 294 includes a host computernetwork interface controller (NIC) 307, and may include amalware-resistant data storage system similar to the embodimentsdescribed above. In these examples, the malware-resistant data storagesystems are network-enabled, and include a data-storage-system bridgeNIC 308 that also functions as a network switch 309. Each NIC 307 isconnected to network switch 309 rather than being directly connected tonetwork 292. Network switch 309 provides a network communicationinterface for both host computer NIC 307 and bridge NIC 308. Each clientcomputer 294 thus has a single connection to common network 292.

It will be appreciated that other network and mode controller interfacesmay be used. For example, mode controller 278 connected to isolatedbridge LAN 276 may be controlled by user-interface computer 282 directlyconnected to the mode controller 278. Also, mode controller 302,connected to common LAN 292, may be controlled by an user-interfacecomputer 306 also directly connected to the common LAN 292.

The bridge NIC 272 or 308 is part of a network display board 310 locatedat each client computer 264 or 294. The network display board 310,having a front display as shown in FIG. 12, forms part of user-interfacesystem 280 or 304. Display board 310, including an associated modifiedlocal user-interface circuit having a microprocessor, replaces displayboard 96 and user-interface circuit 58 of data storage system 44described with reference to FIGS. 2-5. The local user-interface circuitreceives the inputs from the network, inputs optionally from a user,power from the local host or client computer, outputs operationalindicators on the display board, sends network communications to thehost NIC 307, and communicates control signals received on the networkto the control circuit.

Display board 310 accordingly includes two network connectors 312, anauthentication key connector 314, and a power control connector 316. Thenetwork connector 312 is a communication port, such as a 10/100Ethernet, RJ45 connector. One network connector 312 attaches the networkdisplay board 310 to the network 276 or 292 and is used by the bridgemode controller 278 to communicate with the control circuit, such ascontrol circuit 56 of data storage system 44. This network port may beconfigured for client dynamic host configuration protocol (DHCP). Theother network connector 312 is connected to the host NIC 307.

Authentication key connector 314 may be, for example, a mini-USBconnector for receiving an authentication key 90 when local use of anauthentication key is selected by a user as is described further below.An enable signal may be provided to control whether or not the localauthentication key can be used. The default state is that the localauthentication key function is “disabled”.

Power control connector 316 may in the form of an ATX power controlconnector. The network display board 310 controls power to the hostcomputer system via a standard ATX power supply connector. The networkdisplay board 310 controls pin-16 (Power On) of the ATX power supplyconnector. The host computer system power switch is provided to thenetwork display board to allow the host system power switch to functionproperly.

System status indicators 318, such as a series of LEDs, are alsoprovided. Indicators may be provided to indicate aspects of varioussystem functions, such as the status of the protected system drive andthe read/write or data drive, drive activity, authentication key codeloading, status of the network connection, and an indication of pairingof the network display board with the bridge mode controller.

User-actuatable switches 320 may also be provided. For example, a pushswitch 322 may be used to initiate the pairing function for attachingthis specific network display board to the network bridge modecontroller. Further, a push switch 324 may be used that allows a user toswitch the function of network display board 310 to that of displayboard 96 and user-interface circuit 58 of data storage system 44. Thebridge mode controller 278 or 302 may be used to enable or disable thislocal-mode function.

FIG. 13 illustrates an example of a bridge mode controller circuit 330that may be used as a bridge mode controller 278 or 302. As shown, modecontroller circuit 330 may include a main mode controller processor 332,a network port 334, an administration port 336, data storage areas 338including a persistent flash memory 340 and a random access memory (RAM)342, a display circuit board 344, and a power supply 346.

Network port 334 may be a suitable network interface, such as an RJ45Ethernet connector. The network port 334 may be used to attach the modecontroller circuit 330 to the network 276 or 292. The mode controllercircuit 330 may function as the server in providing DHCP services to allattached network display boards 310 where a dedicated separate network276 is used. Mode controller circuit 330 also functions as a DHCP clientwhere a combined network 292 is used, and requests an IP Address fromthe network 292. If the network has a static IP configuration, itreceives and uses a configured IP address. The network port 334 may alsobe used to allow or block access to a mode controller circuit webserver. In the following discussion, it is intended that reference tocommunication between the mode controller circuit 330 and a networkdisplay board 310 also means communication with the control circuit 158as discussed with reference to data storage system 150.

Administration port 336 may also be an RJ45 connector, which ispositioned to be easily assessable by the administrator for connectionof a laptop or desktop computer. This port will be used by theadministrator to gain access to the mode controller circuit web servercontrol pages discussed further below. Using the administration port336, the mode controller circuit 330 may function in a server mode toprovide DHCP services to an attached computer 282 or 306. Modecontroller circuit 330 may also function in a client mode to request anIP Address from the network it is attached to. In a static IPconfiguration, it uses a configured IP address.

An example of a display panel 348 of a display circuit board 344 isillustrated in FIG. 14. Display panel 348 may include a display 350, aninput device 352 for manipulating the display and providing associatedinputs to mode controller circuit 330, visual indicators 354,communication ports 356 and 357, and a user-actuatable switch 358.

Display 350 may be an LCD, LED, or other suitable display. Input device352 may be any suitable input device, such as a cruciform switch 360shown in FIG. 14. Cruciform switch 360 may include an “up” button 362for advancing a cursor or position indicator upwardly on the display, a“down” button 364 for moving the cursor or position indicator downwardlyon the display, a “back” button 366 for returning to a prior displaycontent, and an “enter” button 368 for selecting a content associatedwith a cursor or position indicator. The display 350 and cruciformswitch 360 may allow a user to display and modify an IP address andother system settings.

Communication port 356 may be any suitable receptacle such as a USBconnector and may be configured to receive a connector such as a commonaccess card (CAC) reader when two-factor authentication is used.Communication port 357 may be an authentication-key receptacle likereceptacle 86 of display circuit board 96 or key connector 314 ofnetwork display board 310, such as a mini-USB connector. Communicationport 356 is configured to receive an authentication key, such asauthentication key 90. Authentication key codes may only be stored ineither the mode controller circuit 330 or the network display board 310until there is a mode change. In some examples, the authentication keycode is only stored in the network display board 310 (i.e., the controlcircuit).

As discussed above, to change the mode of a control circuit 56 or groupof control circuits 56 associated with each of a plurality of hostcomputers 264 or 294 from a write-lock (or read-only) protected mode toadministration (read/write) mode, a network administrator or otherauthorized user places the authentication key into communication port357 if the modes of a group of data storage systems are to be changed,or authentication key connector 314 of a network display board 310 ifthe mode of only the associated local data storage system is to bechanged. The mode controller circuit 330 then sends that authenticationcode to each targeted network display board 310 for communication withthe associated control circuit 56. Each targeted control circuit 56 thatrecognizes the received authentication code as being the same as thestored code then and only then changes the operating mode to theadministration (read/write) mode. Once the mode controller circuit 330is returned to the protected mode, the authentication key is removedfrom communication port in the mode controller circuit 330 or theindividual network display board. When the authentication code is storedon a flash memory in the mode controller circuit 330, the flash memorymay be overwritten.

Visual indicators 354 may include a first LED 370 indicating the statusof the power supplied to the mode controller circuit 330. A second LED372 may indicate the status of the mode controller circuit 330. Forexample, LED 372 may be green when all of the control circuits 56 on thenetwork are in the protected mode, and yellow if any control circuit 56is the administration (read/write) mode.

Switch 358 may be a slide switch that the administrator or other useruses to control power to the mode controller circuit 330, such as foruse in changing modes on the mode controller circuit as has beendescribed above.

As mentioned, user-interface computers 282 or 306 provide an interactivedisplay to control and monitor the status of the network display boards310 on the respective network 276 or 292. An example of such a computerscreen display 380 is illustrated in FIG. 15. An administrator isrequired to log into the system and provide a user name and password togain access to mode controller circuit 330 functioning as a modecontroller web server. Display 380 shows the status of all networkdisplay boards 310 attached to the mode controller circuit 330 via thenetwork 276 or 292. The display allows the administrator to change modesof each of the attached network display boards 310.

As shown in FIG. 15, the network display boards 310 and associated datastorage system are listed individually in rows 382, with features ofeach network display board shown by a series of columns 384. In thisexample, each row 382 includes the following items. In the following,the network display board is referenced as the communication portal tothe associated control circuit 56 and data storage system 44.

-   -   1. An identifier of the network display board 310, such as an        assigned name like “East-1” or other name as desired by the        user.    -   2. A pull down “Group Assignment” selection menu. The default        assignment may be “None.” Groups may have assigned names as        appropriate, such as “East” or the mode controller circuit 330        may provide predetermined names, such as a letter of the        alphabet. Group assignments may be made when all of the network        display boards 310 that are to be put in a common group are in        the administration mode and this condition may be made a        requirement for assigning a plurality of network display boards        to a group. Once the group is assigned, control of all network        display boards in a specific group may be provided by        controlling any one network display board in that group. Device        and group names may also be provided by a network grouping        protocol of the network system, such as the proprietary Active        Directory for Windows® Protocol.    -   3. A virtual “slide switch” 386 having the heading “Mode” may be        used setting the mode in the specific network display board 310        or group that the specific network display board belongs to.        Other visual forms may be used for selecting the mode, such as a        drop-down menu associated with a variable field. The slide for        mode select may allow selection between “Lock” for protected        mode and “Admin” for Administration or read/write mode. Any        network display board that is currently in Administration mode        may be displayed in a distinctive visual manner, such as        highlighting it in a representative color, such as “yellow”.    -   4. A user-writable field for the appropriate system name, such        as a name of the host system, the user name, an assigned asset        tag, etc., that is associated with the network display board 310        may be provided.    -   5. A user-actuatable virtual button 388 may be used to reset the        network display board to factory values. Actuation of the        button, such as by “double-clicking” on the button may force the        network display board to reset. This function may only be        allowed when the network display board is in administration        mode. The button may be grayed out when the network display        board is not in administration mode.    -   6. A user-actuatable virtual button 388 may also be used to load        an authentication code from an authentication key 90 is in        communication port 356 of the mode controller circuit 330. The        key load button may function like the key load push-button 94 on        the display board 96.    -   7. A column may also indicate whether the network display board        310 has been paired with the mode controller circuit 330.    -   8. A user-actuatable virtual button 388 may also be used to        remove the associated network display board 310 from the data        base of the mode controller circuit 330, preferably with one        verification prompt.    -   9. A column may indicate whether or not the local authentication        key function has been enabled on the network display board 310.    -   10. A column may provide the currently assigned IP address of        the network display board.    -   11. A column may provide the MAC address of the network display        board.    -   12. A column may provide a timestamp of the last time this        network display board 310 was placed in to administration mode.        Additionally, the display may be modified to indicate whether        the mode controller circuit 330 or the local administration port        was used to change the mode.    -   13. A column may also provide a timestamp of the last time this        network display board was placed in to protected mode by the        mode controller circuit 330. A visual indication, not shown, may        be used to indicate if the mode controller circuit or a power        cycle at the network-display-board host caused the change in        mode.

Generally, all fields on the display may be greyed out if the currentuser does not have permission to use the function.

The mode controller circuit 330 may further generate a log of modecontrol activity. The log may include a timestamp of any logins,network-display-board mode changes, and/or configuration changes made tothe mode controller circuit. The log may be exported as a HTML file. Thelogs may be deleted based on a specific date—all entries prior to thespecific date will be deleted. A log entry will be made anytime logs aredeleted.

An emergency “WRITE LOCK ALL” button 390 may also be provided on display380 separate from the matrix of rows 382 and columns 384 for theindividual network display boards 310. When activated by a user anadditional prompt may be proved that requests confirmation that the useris sure he or she wants to set the modes of all of the network displayboards into protected mode. If selected, all network display boards onthe system will be sent a message to place the network display boardsinto protected mode.

The mode controller circuit 330 may further be configured to provideconfiguration of network port 334 and the administration port 336 portsusing a display on the user-interface computers 282 or 306. Userconfiguration may also be provided. For example, the mode controllercircuit 330 may allow two default users—an administrator and a userlimited to functions available on the computer display 380 (the “frontpanel). Other users may be added as desired. The administrator may beable to set the permissions for each user. The mode controller circuitmay be configured to o allow the administrator to add users and modifypermissions. Permissions may include the following:

1. Network Configuration

2. Log Maintenance and Reporting

3. Group Select Enable

4. Key Load Enable

5. Pairing and Remove Enable

6. Local Authentication Key EnableFollowing is an example of how thepairing of network display boards 310 on a network 276 or 292 to a modecontroller circuit 330 may be provided. A network display board mayberequired to be “paired” to a specific mode controller circuit foroperation. During the pairing function, the network display board maycommunicate with the mode controller circuit, providing the modecontroller circuit its MAC address and other configuration data. Oncepaired, all communication between the network display board and the modecontroller circuit may be encrypted, such as by using a public/privatekey. The public key may be based on the MAC address of the networkdisplay board. Hence, each network display board on the network will usea different encryption encoding for communication.

To pair a network display board:

-   -   Attached the network display board to a data storage system 150        having the standard display board 162 removed.    -   Power the network display board on.    -   Connect the network display board to the network 276 or 292. At        this point, the Paring LED is off and the Network connection LED        has turned green.    -   Hold down the Pairing push button switch 322 until the Pairing        LED blinks green.    -   On the mode controller circuit display 380, a new network        display board device is shown. Click “Pairing Accepted” to        complete pairing. The “Pairing Accepted” button turns green when        a pairing request is received and is “greyed” out when the        pairing is completed.    -   Once the unit has paired, the LED on the network display board        is solid green.    -   If pairing failed, the LED is solid red. In this case the power        is cycled off and on and the steps to establish pairing are        repeated.

Mode control with a network system 260 or 290 is similar to mode controlof a single data storage system 44. Once the network display board 310is paired and an authentication code has been loaded in to the datastorage system, the control circuit 56 is able to control theoperational mode of data storage system. The mode controller circuitprovides control to the data storage system via network based messagesas the display board 96 and user-interface circuit 58 discussed above.For example, to change modes of a networked connected network displayboard/data storage system:

-   -   The administrator logs in to the mode controller circuit web        page display 380.    -   The administrator inserts the appropriate authentication key 90        in to the mode controller circuit mini-USB port.    -   From the computer display 380, the administrator “slides” the        mode switch from write-locked to administration mode for the        specific data storage system or the “group” of data storage        systems that have been selected.    -   The mode controller circuit then sends the authentication code,        preferably as an encrypted message, to each network display        board that has been selected. Each network display board then        sets an internal “key present” control code to “yes”.    -   Once the authentication code has been accepted by the network        display board, the network display board power cycles the host        computer system via the power control connector 316.    -   When the host system powers back on, the network display board        reports to the mode controller circuit that status of the        protected storage drive 50. If the authentication code is the        correct one, the data storage system is put into        administration/read-write mode. If the authentication code is        not the correct one, the data storage system remains in        write-locked mode. The mode controller circuit then updates the        data storage system status on the computer display 380.    -   With the data storage system now in administration mode, the        administrator pushes out the desired updates or new programs for        storage on the otherwise protected storage drive 50.    -   Once the updates are complete, the administrator “slides” the        mode switch from administration mode to write-locked mode for        the specific data storage system or the “group” of data storage        systems that had been selected.    -   The mode controller circuit then sends a message to the control        circuit connected to the network display board to delete the        authentication code. The control circuit then changes the “code        present” indicator to “no” and power cycles the host computer        system using the power control connector.    -   When the host system powers back on, the network display board        reports to the mode controller circuit that the status of the        protected drive is write-locked. The mode controller circuit        then updates the status of the data storage system on the        computer display 380. Any data storage system that did not        return to write-locked mode is highlighted.

Example 8

This section describes additional aspects and features of amalware-resistant computer system, presented without limitation as aseries of paragraphs, some or all of which may be alphanumericallydesignated for clarity and efficiency. Each of these paragraphs can becombined with one or more other paragraphs, and/or with disclosure fromelsewhere in this application, including the materials incorporated byreference in the cross-references, in any suitable manner. Some of theparagraphs below expressly refer to and further limit other paragraphs,providing without limitation examples of some of the suitablecombinations.

A computer storage system may protect a computer system fromunauthorized access by malicious software. The system may be designed toprotect a computer system against malicious software that wouldotherwise exploit a computer, or the data it contains, without consent.

A malware-resistant data storage system may shield an operating systemand other programs from being unknowingly altered. Such a system maycomprise two storage areas or devices that are designed to store filesin two categories—ones that can change and ones that cannot—separatingthe operating system and other programs between files in those twocategories. The protected storage device, for files that cannot change,is created using write-blocking technology so that once the files areloaded, they are locked in place and cannot change without userintervention. The other storage device, for files that can or need to beupdated (such as logs and temporary files), can be either a secondphysical hard drive connected to the system or a network storage device.

A data storage system may include an enclosure that meets the 3.5″ SATAdrive standard into which two 2.5″ SATA drives are mounted. One drivebecomes the protected, read-only drive, and the other data drive is onewhich can be written to as required. This system can then be mountedinto any standard computer chassis that supports 3.5″ drives.

A data storage system may also support an authentication protocol thatallows the computer to be booted into a maintenance read/write mode inwhich the protected drive can be written to so that system updates andnew programs can be loaded. Once the maintenance is completed, thesystem is re-booted into the operational, protected, read-only mode.

A data storage system may protect not only the operating system, butalso executable software (programs) or data files used by the computer.

A data storage system may be hardware-based, and is operating systemagnostic in that it is not a file overlay or other software approachthat is designed for use by a specific operating system. The datastorage system may be used to protect any operating system. Filesrequired to be updatable for the operating system or other software tofunction may be stored on the data, i.e., read/write, storage device.

A1. A control system for securing computer files from modification,comprising a control circuit is configured to be placed operativelybetween a computer-system processor and both a first internal datastorage area and a non-volatile second internal data storage areaphysically separate from the first data storage area, to operativelycouple the processor to the first and second internal data storageareas, to operate in a first mode to allow communication from theprocessor to the first internal data storage area of all commandsreceived from the processor, to block communication to the secondinternal data storage area of commands that are configured to modify thesecond internal data storage area, and to allow communication to thesecond internal data storage area of commands received from theprocessor that are configured not to modify the second internal datastorage area, and to operate in a second mode to allow communicationfrom the processor to the first and second internal data storage areasof all commands received from the processor.

A2. The system of paragraph A1, further comprising a user-interfacecircuit operatively coupled to the control circuit and a first flashdrive, the user-interface circuit including a communication port andconfigured to receive a digital user code stored on the first flashdrive, which user code is selectively input by a user by attaching thefirst flash drive to the communication port, the user-interface circuitbeing configured to communicate the input user code to the controlcircuit, the control circuit, in response to receipt of the user code,operating in a predetermined one of the first mode and the second mode.

A3. The system of paragraph A2, wherein the control circuit receivesoperating energy from an energy source access to which is switched onand off selectively by the user, the control circuit being furtherconfigured to operate in the second mode if the first flash drive isconnected to the communication port when access to the energy source isturned on from a state of being turned off.

A4. The system of paragraph A3, wherein the control circuit includes amemory and the control circuit is configured to store the user codereceived from the first flash drive on the memory.

A5. The system of paragraph A4, wherein the control circuit isconfigured to replace a previously stored user code with a replacementuser code only in response to the insertion of a second flash drivecontaining the replacement user code in the communication port while thecontrol circuit is operating in the second mode.

A6. The system of paragraph A2, further comprising a frame configured tosupport at least the second internal data storage area, the controlcircuit, and the user-interface circuit, the user-interface circuitincluding a sacrificial circuit element necessary for communicating theuser code to the control circuit, the sacrificial circuit element beingmounted relative to the frame in a position accessible to the user andbeing configured to be manually destructively removed from the frame bythe user, the removal of the sacrificial circuit element preventingsubsequent replacement of the user code stored by the control circuit.

A7. The system of paragraph A6, wherein the sacrificial circuit elementmust be actuated by the user while the first flash drive is inserted inthe communication port in order to communicate the user code stored onthe inserted first flash drive to the control circuit.

A8. The system of paragraph A2, wherein the control circuit isconfigured to operate in the second mode only if the user code receivedfrom the code-storage device during energy turn on to the controlcircuit matches the stored user code.

A9. The system of paragraph A2, wherein the control circuit isconfigured to store the user code input by the user.

A10. The system of paragraph A9, further comprising a frame configuredto support at least the second internal data storage area, the controlcircuit, and a circuit board containing at least a portion of theuser-interface circuit, the circuit board being mounted to the frame bymanually non-destructively removable fasteners directly accessible fromexternally of the frame, the control circuit being operable in the firstmode when the user code is stored and the circuit board has been removedfrom the frame.

A11. The system of paragraph A9, wherein the control circuit isconfigured to block all commands sent by the processor from beingcommunicated to the second internal data storage area until the code isstored.

A12. The system of paragraph A2, wherein the user-interface circuit isconfigured to send the received user code to the control circuit over alocal-area network independently of the processor, and the controlcircuit is configured to receive over the local-area network the usercode sent by the user-interface circuit.

A13. The system of paragraph A1, further comprising a user-interfacecircuit operatively coupled to the control circuit, the user-interfacecircuit having a communication-port receptacle; and an electronic datastorage device physically separate from the control circuit and theuser-interface circuit, the electronic data storage device storingelectronically the user code and having a storage-device receptacleconfigured to be manually operatively mated with the communication-portreceptacle and manually separated from the communication-portreceptacle; wherein the user-interface circuit is configured to receiveelectronically the digital user code from the data storage device whenthe storage-device receptacle is operatively mated with thecommunication-port receptacle and communicate the received digital usercode to the control circuit, and the control circuit operates in thefirst mode when the storage-device receptacle is received in thecommunication-port receptacle and operates in the second mode when thestorage-device receptacle is not received in the communication-portreceptacle.

A14. The system of paragraph A1, wherein the control circuit isoperatively independent of the processor.

B1. A method for securing computer files from modification, the methodcomprising routing communications between a processor of the computersystem and the first and second internal data storage areas through acontrol circuit operatively independent of the processor; blockingcommunication to the second internal data storage area by the controlcircuit of commands received from the processor that are configured tomodify the second internal data storage area when the control circuit isoperating in a first mode; allowing communication to the second internaldata storage area of commands received from the processor that areconfigured not to modify the second internal data storage area when thecontrol circuit is operating in the first mode; allowing communicationto the first internal data storage area of all commands received fromthe processor when the control circuit is operating in the first mode;and allowing communication to the first and second internal data storageareas of all commands received from the processor when the controlcircuit is operating in a second mode.

B2. The method of paragraph B1, further comprising receiving by auser-interface circuit having a communication port a digital user codeinput by a user from a first flash drive storing the digital user codewhen the first flash drive is connected to the communication port,communicating the received user code to the control circuit, andchanging the operating mode of the control circuit from the first modeto the second mode upon receipt of the user code.

B3. The method of paragraph B2, further comprising receiving operatingenergy by the control circuit, detecting whether the first flash driveis connected to the communication port, and operating the controlcircuit in the second mode if the first flash drive is connected to thecommunication port when the control circuit first receives operatingenergy after a period when the control circuit does not receiveoperating energy.

B4. The method of paragraph B3, further comprising storing by thecontrol circuit the user code received from the first flash drive.

B5. The method of paragraph B4, wherein operating the control circuitincludes operating the control circuit in the first mode if the flashdrive is not connected to the communication port when the controlcircuit first receives operating energy after a period when the controlcircuit does not receive operating energy.

B6. The method of paragraph B5, wherein operating the control circuitincludes operating the control circuit in the first mode when a secondflash drive is connected to the communication port when the controlcircuit first receives operating energy after a period when the controlcircuit does not receive operating energy and the user code receivedfrom the second flash drive connected to the communication port does notmatch the user code stored by the control circuit.

B7. The method of paragraph B6, wherein operating the control circuitincludes operating the control circuit in the second mode when the firstflash drive is connected to the communication port when the controlcircuit first receives operating energy after a period when the controlcircuit does not receive operating energy and the user code receivedfrom the first flash drive connected to the communication port matchesthe user code stored by the control circuit.

B8. The method of paragraph B7, further comprising replacing by thecontrol circuit a previously stored user code with a replacement usercode only when the second flash drive containing the replacement usercode is inserted in the communication port while the control circuit isoperating in the second mode.

B9. The method of paragraph B8, further comprising receiving by thecontrol circuit an input from the user indicating that a replacementuser code stored on the second flash drive inserted in the communicationport while the control circuit is operating in the second mode is to bestored, and wherein replacing a previously stored user code includesreplacing the previously stored user code when the control circuitreceives the input from the user.

B10. The method of paragraph B2, wherein operating the control circuitin the second mode includes operating the control circuit in the secondmode only if the user code received from the first flash drive matchesthe stored user code.

B11. The method of paragraph B2, further comprising storing by thecontrol circuit the user code received from the first flash drive.

B12. The method of paragraph B11, further comprising blocking by thecontrol circuit all commands sent by the processor from beingcommunicated to the second internal data storage area until the usercode is stored.

B13. The method of paragraph B2, further comprising sending by theuser-interface circuit the received user code to the control circuitover a local-area network independently of the processor, and receivingover the local-area network by the control circuit the user code sent bythe user-interface circuit.

B14. The method of paragraph B2, further comprising receivingelectronically by a user-interface circuit having a communication-portreceptacle a digital user code from a data storage device having storingelectronically the user code and having a storage-device receptacleconfigured to be manually operatively mated with the communication-portreceptacle and manually separated from the communication-portreceptacle, the user-interface circuit receiving the digital user codewhen the storage-device receptacle is operatively mated with thecommunication-port receptacle; communicating by the user-interfacecircuit the received digital user code to the control circuit; operatingby the control circuit in the first mode when the storage-devicereceptacle is received in the communication-port receptacle; andoperating by the control circuit in the second mode when thestorage-device receptacle is not received in the communication-portreceptacle.

C1. A computer system comprising at least one host computer having ahost processor configured to be operatively coupled to a network system,and a data storage system, the data storage system including at least afirst data storage area and a control circuit, the control circuitproviding operative communication between the host processor and thefirst data storage area and being configured to be operatively coupledto the network system independent of the host processor, the first datastorage area storing executable files of a host-processor operatingsystem, the host-processor operating system being configured to storetemporary files of the operating system on at least a second datastorage area in operative communication with the host processor; and auser-interface system including a user-interface device configured to beoperatively coupled to the network system for communication with thecontrol circuit, the user-interface device being selectively operable inresponse to an input received from a user to place the control circuitinto an operating mode in which the control circuit blocks commands sentby the host processor and configured to modify the first data storagearea from being communicated to the first data storage area.

C2. The computer system of paragraph C1, wherein the user-interfacesystem includes a user-interface computer configured to communicate withthe user-interface device, the user-interface computer including aninteractive display for receiving a control-circuit mode selection fromthe user.

C3. The computer system of paragraph C2, wherein the user-interfacecomputer is configured to communicate directly with the user-interfacedevice independent of the network system.

C4. The computer system of paragraph C1, wherein the user-interfacedevice includes a communication port configured to receive a digitaluser code stored on a code-storage device connectable by the user to thecommunication port, the user code being selectively usable by the userfor controlling the operating mode of the control circuit.

C5. The computer system of paragraph C1, wherein the control circuit isconfigured to change the operating mode when the control circuit ispowered on, the user-interface system being configured to receive aninput from the user requesting that the power to the control circuit becycled off and then on, and to output on the network system apower-control signal directing the control circuit to cycle thecontrol-circuit power off and then on, the control circuit beingresponsive to the power-control signal received from the user-interfacesystem to cycle the power to the control circuit off and then on.

C6. The computer system of paragraph C1, wherein the host processor isconfigured to be operatively coupled to a first network and theuser-interface system and control circuit are configured to beoperatively coupled to a second network isolated from the first network.

C7. The computer system of paragraph C1, further comprising a pluralityof the host computers, and wherein the user-interface system isconfigured to control the operating mode of each respective controlcircuit individually and to control the operating mode of a plurality ofthe respective control circuits concurrently.

C8. The computer system of paragraph C1, wherein the user-interfacesystem includes an interface circuit directly connected to the controlcircuit independent of the network system, operatively coupled to thenetwork system for communication with the user-interface device, andconfigured to receive an input directly from the user for controllingthe operating mode of the control circuit, the user-interface systembeing configured to be responsive to a control signal directing theinterface circuit to operate in a selected one of a first state in whichthe interface circuit is responsive to the input received directly fromthe user and a second state in which the interface circuit is notresponsive to the input received directly from the user.

CONCLUSION

The disclosure set forth above may encompass multiple distinctinventions with independent utility. Although each of these inventionshas been disclosed in its preferred form(s), the specific embodimentsthereof as disclosed and illustrated herein are not to be considered ina limiting sense, because numerous variations are possible. To theextent that section headings are used within this disclosure, suchheadings are for organizational purposes only, and do not constitute acharacterization of any claimed invention. The subject matter of theinvention(s) includes all novel and nonobvious combinations andsubcombinations of the various elements, features, functions, and/orproperties disclosed herein. The following claims particularly point outcertain combinations and subcombinations regarded as novel andnonobvious. Invention(s) embodied in other combinations andsubcombinations of features, functions, elements, and/or properties maybe claimed in applications claiming priority from this or a relatedapplication. Such claims, whether directed to a different invention orto the same invention, and whether broader, narrower, equal, ordifferent in scope to the original claims, also are regarded as includedwithin the subject matter of the invention(s) of the present disclosure.

Where “a” or “a first” element or the equivalent thereof is recited,such usage includes one or more such elements, neither requiring norexcluding two or more such elements. Further, ordinal indicators, suchas first, second, or third, for identified elements are used todistinguish between the elements in the order in which they areintroduced, and do not indicate a required or limited number of suchelements, and do not indicate a particular position or order of suchelements unless otherwise specifically indicated. Accordingly, theordinal indicator used for a particular element may vary in differentcontexts.

The invention claimed is:
 1. A control system for securing computerfiles from modification, comprising a control circuit configured to beplaced operatively between a computer-system processor and both a firstinternal data storage area and a non-volatile second internal datastorage area physically separate from the first data storage area, tooperatively couple the processor to the first and second internal datastorage areas, to operate in a first mode to allow communication fromthe processor to the first internal data storage area of all commandsreceived from the processor, to block communication to the secondinternal data storage area of commands that are configured to modify thesecond internal data storage area, and to allow communication to thesecond internal data storage area of commands received from theprocessor that are configured not to modify the second internal datastorage area, and to operate in a second mode to allow communicationfrom the processor to the first and second internal data storage areasof all commands received from the processor.
 2. The system of claim 1,further comprising a user-interface circuit operatively coupled to thecontrol circuit and a first flash drive, the user-interface circuitincluding a communication port and configured to receive a digital usercode stored on the first flash drive, which user code is selectivelyinput by a user by attaching the first flash drive to the communicationport, the user-interface circuit being configured to communicate theinput user code to the control circuit, the control circuit, in responseto receipt of the user code, operating in a predetermined one of thefirst mode and the second mode.
 3. The system of claim 2, wherein thecontrol circuit receives operating energy from an energy source accessto which is switched on and off selectively by the user, the controlcircuit being further configured to operate in the second mode if thefirst flash drive is connected to the communication port when access tothe energy source is turned on from a state of being turned off.
 4. Thesystem of claim 3, wherein the control circuit includes a memory and thecontrol circuit is configured to store the user code received from thefirst flash drive on the memory.
 5. The system of claim 4, wherein thecontrol circuit is configured to replace a previously stored user codewith a replacement user code only in response to the insertion of asecond flash drive containing the replacement user code in thecommunication port while the control circuit is operating in the secondmode.
 6. The system of claim 2, further comprising a frame configured tosupport at least the second internal data storage area, the controlcircuit, and the user-interface circuit, the user-interface circuitincluding a sacrificial circuit element necessary for communicating theuser code to the control circuit, the sacrificial circuit element beingmounted relative to the frame in a position accessible to the user andbeing configured to be manually destructively removed from the frame bythe user, the removal of the sacrificial circuit element preventingsubsequent replacement of the user code stored by the control circuit.7. The system of claim 6, wherein the sacrificial circuit element mustbe actuated by the user while the first flash drive is inserted in thecommunication port in order to communicate the user code stored on theinserted first flash drive to the control circuit.
 8. The system ofclaim 2, wherein the control circuit is configured to operate in thesecond mode only if the user code received from the code-storage deviceduring energy turn on to the control circuit matches the stored usercode.
 9. The system of claim 2, wherein the control circuit isconfigured to store the user code input by the user.
 10. The system ofclaim 9, further comprising a frame configured to support at least thesecond internal data storage area, the control circuit, and a circuitboard containing at least a portion of the user-interface circuit, thecircuit board being mounted to the frame by manually non-destructivelyremovable fasteners directly accessible from externally of the frame,the control circuit being operable in the first mode when the user codeis stored and the circuit board has been removed from the frame.
 11. Thesystem of claim 9, wherein the control circuit is configured to blockall commands sent by the processor from being communicated to the secondinternal data storage area until the code is stored.
 12. The system ofclaim 2, wherein the user-interface circuit is configured to send thereceived user code to the control circuit over a local-area networkindependently of the processor, and the control circuit is configured toreceive over the local-area network the user code sent by theuser-interface circuit.
 13. The system of claim 1, further comprising: auser-interface circuit operatively coupled to the control circuit, theuser-interface circuit having a communication-port receptacle; and anelectronic data storage device physically separate from the controlcircuit and the user-interface circuit, the electronic data storagedevice storing electronically the user code and having a storage-devicereceptacle configured to be manually operatively mated with thecommunication-port receptacle and manually separated from thecommunication-port receptacle; wherein the user-interface circuit isconfigured to receive electronically the digital user code from the datastorage device when the storage-device receptacle is operatively matedwith the communication-port receptacle and communicate the receiveddigital user code to the control circuit, and the control circuitoperates in the first mode when the storage-device receptacle isreceived in the communication-port receptacle and operates in the secondmode when the storage-device receptacle is not received in thecommunication-port receptacle.
 14. The system of claim 1, wherein thecontrol circuit is operatively independent of the processor.
 15. Amethod for securing computer files from modification, the methodcomprising: routing communications between a processor of the computersystem and first and second internal data storage areas through acontrol circuit operatively independent of the processor; blockingcommunication to the second internal data storage area by the controlcircuit of commands received from the processor that are configured tomodify the second internal data storage area when the control circuit isoperating in a first mode; allowing communication to the second internaldata storage area of commands received from the processor that areconfigured not to modify the second internal data storage area when thecontrol circuit is operating in the first mode; allowing communicationto the first internal data storage area of all commands received fromthe processor when the control circuit is operating in the first mode;and allowing communication to the first and second internal data storageareas of all commands received from the processor when the controlcircuit is operating in a second mode.
 16. The method of claim 15,further comprising receiving by a user-interface circuit having acommunication port a digital user code input by a user from a firstflash drive storing the digital user code when the first flash drive isconnected to the communication port, communicating the received usercode to the control circuit, and changing the operating mode of thecontrol circuit from the first mode to the second mode upon receipt ofthe user code.
 17. The method of claim 16, further comprising receivingoperating energy by the control circuit, detecting whether the firstflash drive is connected to the communication port, and operating thecontrol circuit in the second mode if the first flash drive is connectedto the communication port when the control circuit first receivesoperating energy after a period when the control circuit does notreceive operating energy.
 18. The method of claim 17, further comprisingstoring by the control circuit the user code received from the firstflash drive.
 19. The method of claim 18, wherein operating the controlcircuit includes operating the control circuit in the first mode if theflash drive is not connected to the communication port when the controlcircuit first receives operating energy after a period when the controlcircuit does not receive operating energy.
 20. The method of claim 19,wherein operating the control circuit includes operating the controlcircuit in the first mode when a second flash drive is connected to thecommunication port when the control circuit first receives operatingenergy after a period when the control circuit does not receiveoperating energy and the user code received from the second flash driveconnected to the communication port does not match the user code storedby the control circuit.
 21. The method of claim 20, wherein operatingthe control circuit includes operating the control circuit in the secondmode when the first flash drive is connected to the communication portwhen the control circuit first receives operating energy after a periodwhen the control circuit does not receive operating energy and the usercode received from the first flash drive connected to the communicationport matches the user code stored by the control circuit.
 22. The methodof claim 21, further comprising replacing by the control circuit apreviously stored user code with a replacement user code only when thesecond flash drive containing the replacement user code is inserted inthe communication port while the control circuit is operating in thesecond mode.
 23. The method of claim 22, further comprising receiving bythe control circuit an input from the user indicating that a replacementuser code stored on the second flash drive inserted in the communicationport while the control circuit is operating in the second mode is to bestored, and wherein replacing a previously stored user code includesreplacing the previously stored user code when the control circuitreceives the input from the user.
 24. The method of claim 16, whereinoperating the control circuit in the second mode includes operating thecontrol circuit in the second mode only if the user code received fromthe first flash drive matches the stored user code.
 25. The method ofclaim 16, further comprising storing by the control circuit the usercode received from the first flash drive.
 26. The method of claim 25,further comprising blocking by the control circuit all commands sent bythe processor from being communicated to the second internal datastorage area until the user code is stored.
 27. The method of claim 16,further comprising sending by the user-interface circuit the receiveduser code to the control circuit over a local-area network independentlyof the processor, and receiving over the local-area network by thecontrol circuit the user code sent by the user-interface circuit. 28.The method of claim 16, further comprising: receiving electronically bya user-interface circuit having a communication-port receptacle adigital user code from a data storage device having storingelectronically the user code and having a storage-device receptacleconfigured to be manually operatively mated with the communication-portreceptacle and manually separated from the communication-portreceptacle, the user-interface circuit receiving the digital user codewhen the storage-device receptacle is operatively mated with thecommunication-port receptacle; communicating by the user-interfacecircuit the received digital user code to the control circuit; operatingby the control circuit in the first mode when the storage-devicereceptacle is received in the communication-port receptacle; andoperating by the control circuit in the second mode when thestorage-device receptacle is not received in the communication-portreceptacle.