Method of using a secure private network to actively configure the hardware of a computer or microchip

ABSTRACT

A computer or microchip including a network connection for connection to a public network of computers including the Internet, the network connection being located in a public unit; and an additional and separate network connection for connection to a separate, private network of computers, the additional network connection being located in a protected private unit. An inner hardware-based access barrier or firewall is located between and communicatively connects the protected private unit and the public unit; and the private and public units and the two separate network connections are separated by the inner barrier or firewall. The protected private unit includes at least a first microprocessor and a system BIOS located in flash memory. The public unit includes at least a second or many microprocessors separate from the inner barrier or firewall. The inner barrier or firewall comprises a bus with an on/off switch controlling communication input and output.

This application is a continuation of U.S. patent application Ser. No.13/398,403 filed on Feb. 16, 2012 which claims priority to U.S.Provisional Patent Application 61/457,184, filed Feb. 15, 2011; U.S.Provisional Patent Application No. 61/457,297, filed Feb. 18, 2011; U.S.Provisional Patent Application No. 61/457,976, filed Jul. 26, 2011; U.S.Provisional Patent Application No. 61/457,983, filed Jul. 28, 2011; U.S.Provisional Patent Application No. 61/573,006, filed Aug. 2, 2011; andU.S. Provisional Patent Application No. 61/573,007, filed Aug. 3, 2011.

This application is also a continuation-in-part of U.S. application Ser.No. 13/014,201, filed Jan. 26, 2011. U.S. application Ser. No.13/014,201 claims benefit to U.S. Provisional Patent Application No.61/282,337 filed Jan. 26, 2010; U.S. Provisional Patent Application No.61/282,378, filed Jan. 29, 2010; U.S. Provisional Patent Application No.61/282,478, filed Feb. 17, 2010; U.S. Provisional Patent Application No.61/282,503, filed Feb. 22, 2010; U.S. Provisional Patent Application No.61/282,861, filed Apr. 12, 2010; U.S. Provisional Patent Application No.61/344,018, filed May 7, 2010; and U.S. Provisional Patent ApplicationNo. 61/457,184, filed Jan. 24, 2011.

This application is also a continuation-in-part of U.S. application Ser.No. 13/016,527 filed Jan. 28, 2011. U.S. application Ser. No. 13/016,527claims benefit to U.S. Provisional Patent Application No. 61/282,378,filed Jan. 29, 2010; U.S. Provisional Patent Application No. 61/282,478,filed Feb. 17, 2010; U.S. Provisional Patent Application No. 61/282,503,filed Feb. 22, 2010; U.S. Provisional Patent Application No. 61/282,861,filed Apr. 12, 2010; U.S. Provisional Patent Application No. 61/344,018,filed May 7, 2010; and U.S. Provisional Patent Application No.61/457,184, filed Jan. 24, 2011.

This application is also a continuation-in-part of PCT Application No.PCT/US011/023028, filed Jan. 28, 2011. PCT Application No.PCT/US011/023028 claims benefit to U.S. Provisional Patent ApplicationNo. 61/282,378, filed Jan. 29, 2010; U.S. Provisional Patent ApplicationNo. 61/282,478, filed Feb. 17, 2010; U.S. Provisional Patent ApplicationNo. 61/282,503, filed Feb. 22, 2010; U.S. Provisional Patent ApplicationNo. 61/282,861, filed Apr. 12, 2010; U.S. Provisional Patent ApplicationNo. 61/344,018, filed May 7, 2010; and U.S. Provisional PatentApplication No. 61/457,184, filed Jan. 24, 2011. PCT Application No.PCT/US011/023028 also claims benefit to U.S. application Ser. No.13/014,201, filed Jan. 26, 2011.

This application is also a continuation-in-part of PCT Application No.PCT/US011/025257, filed Feb. 17, 2011. PCT Application No.PCT/US011/025257 claims the right to priority based on U.S. ProvisionalPatent Application No. 61/282,478, filed Feb. 17, 2010; U.S. ProvisionalPatent Application No. 61/282,503, filed Feb. 22, 2010; U.S. ProvisionalPatent Application No. 61/282,861, filed Apr. 12, 2010; U.S. ProvisionalPatent Application No. 61/344,018, filed May 7, 2010; and U.S.Provisional Patent Application No. 61/457,184, filed Jan. 24, 2011. PCTApplication No. PCT/US011/025257 also claims the right to priority basedon U.S. Nonprovisional patent application Ser. No. 13/014,201, filedJan. 26, 2011, and U.S. Nonprovisional patent application Ser. No.13/016,527, filed Jan. 28, 2011.

The contents of all of these provisional and nonprovisional patentapplications are hereby incorporated by reference in their entirety.

BACKGROUND

This invention relates to any computer of any form, such as a personalcomputer and/or microchip, that has an inner hardware-based accessbarrier or firewall that establishes a private unit that is disconnectedfrom a public unit, the public unit being configured for a connection toa public network of computers including the Internet. In addition, thecomputer's private unit is configured for a separate connection to atleast one non-Internet-connected private network for administration,management, and/or control of the computer and/or microchip, locally orremotely, by either a personal user or a business or corporate entity.

More particularly, this invention relates to a computer and/or microchipwith an inner hardware-based access barrier or firewall separating theprivate unit that is not connected to the Internet from a public unitconnected to the Internet, the private and public units being connectedonly by a hardware-based access barrier or firewall in the form of asecure, out-only bus or equivalent wireless connection. Even moreparticularly, this invention relates to the private and public unitsalso being connected by an in-only bus (or equivalent wirelessconnection) that includes a hardware input on/off switch or equivalentsignal interruption mechanism, including an equivalent circuit on amicrochip or nanochip (or equivalent wireless connection). Still moreparticularly, this invention relates to the private and public unitsbeing connected by an output on/off switch or microcircuit ornanocircuit equivalent on the secure, out-only bus (or equivalentwireless connection).

In addition, this invention relates to a computer and/or microchip thatis connected to a another computer and/or microchip, the connectionbetween computers being made with the same hardware-based accessbarriers or firewalls including potentially any of the buses and on/offswitches described in the preceding paragraph.

Finally, this invention relates to a computer and/or microchip withhardware-based access barriers or firewalls used successively between anouter private unit, an intermediate more private unit, an inner mostprivate unit, and the public unit (or units), with each private unitpotentially being configured for a connection to a separate privatenetwork. Also, Faraday Cage protection from external electromagneticpulses for part or all of the computer and/or microchip can be provided.

By way of background, connecting computers to the Internet has immenseand well known benefits today, but also has created overwhelmingsecurity problems that were not imagined when the basic architecture ofmodern electronic computers was developed in 1945, which was abouttwenty years before networks came into use. Even then, those firstnetworks involved a very limited number of connected computers, had lowtransmission speeds between them, and the network users were generallyknown to each other, since most networks were relatively small andlocal.

In contrast, the number of computers connected to the Internet today isgreater by a factor of many millions, broadband connection speeds arefaster by a similar magnitude, the network connections stretch worldwideand connect to hundreds of thousands of bad actors whose identity is noteasily or quickly known, if ever. Indeed, the Internet of today allowsthe most capable criminal hackers direct access to any computerconnected to the Internet. This inescapable reality of the Internet hascreated a huge and growing threat to military and economic securityworldwide. At the same time, connection to the Internet has become thecommunication foundation upon which both the global economy andindividual users depend every day.

In summary, then, computer connection to the Internet is mandatory intoday's world, so disconnection is not a feasible option, given theexisting global dependence on the Internet. But those unavoidableconnections have created a seemingly inherent and therefore unsolvablesecurity problem so serious that it literally threatens the world. SoInternet connection today is both unavoidable and unavoidably unsafe.

Past efforts to provide Internet security have been based primarily onconventional firewalls that are positioned externally, physically and/orfunctionally, between the computer and an external network like theInternet. Such conventional firewalls provide a screening or filteringfunction that attempts to identify and block incoming network malware.But because of their functionally external position, conventionalfirewalls must allow entry to a significant amount of incoming traffic,so either they perform their screening function perfectly, which is animpossibility, or at least some malware unavoidably gets into thecomputer and just a single instance of malware can cause a crash orworse. Once the malware is in, the von Neumann architecture of currentcomputers provides only software protection, which is inherentlyvulnerable to malware attack, so existing computers are essentiallyindefensible from successful attack from the Internet, which hasprovided an easy, inexpensive, anonymous, and effective means for theworst of all hackers worldwide to access any computer connected to it.

SUMMARY

Therefore, computers cannot be successful defended without innerhardware or firmware-based access barriers or firewalls that, because oftheir internal position, can be designed much more simply to function asa access barrier or blockers rather than as general filters. This is adistinct difference. An Internet filter has to screen any networktraffic originating from anywhere in the entire Internet, which iswithout measure in practical terms and is constantly, rapidly changing,an incredibly difficult if not impossible screening task. In contrast,an access barrier or blocker to an inner protected area of a computercan strictly limit access to only an exception basis. So, in simpleterms, a conventional firewall generally grants access to all Internettraffic unless it can be identified as being on the most current hugelist of ever changing malware; in contrast, an inner access barrier orblocker can simply deny access to all network traffic, with the onlyexception being a carefully selected and very short and conditioned listof approved and authenticated sources or types of traffic to whichaccess is not denied.

Such a massively simpler and achievable access blocking functionallowing for a much simpler and efficient mechanism for providingreliable security. Whereas a conventional but imperfect firewallrequires extremely complicated hardware with millions of switches and/orfirmware and/or software with millions of bits of code, thehardware-based access barriers described in this application require aslittle as a single simple one-way bus and/or another simple one-way buswith just a single switch and/or both simple buses, each with just asingle switch. This extraordinarily tiny amount of hardware is at theabsolute theoretical limit and cannot be less.

With this new and unique access denial approach, a computer and/ormicrochip can be simply and effectively defended from Internet malwareattack with one or more hardware-based private, protected units (orzones or compartments) inside the computer. Similar to Java Sandboxes interms of overall function, but far more effective becausehardware-based. Any or all of these private units can be administrated,managed, and/or controlled by a personal or corporate computer userthrough the use of one or more separate and more secure non-Internetprivate networks. By thus avoiding any connection whatsoever to thegenerally insecure public Internet, connection of the computer's privateunit to the secure private network allows for all the well known speed,efficiency and cost effectiveness of network connection while stillcompletely avoiding the incalculable risk of Internet connection.

Volatile memory like Flash that is read/write can function asinexpensive read-only memory (ROM) when located in the Private Unit(s)because can be protected by an access barrier or firewall againstwriting. Furthermore, it can even be protected against unauthorizedreading, unlike ROM. Finally, it can be written to when authorized bythe central controller to update an operating system or download an app,for example, again unlike ROM.

In addition, field programmable gate arrays can be used in the privateand public units, as well as in the access barriers or firewalls, andcan be securely controlled by the computer or microchip centralcontroller through the secure control bus to actively change securityand other configurations, thus providing for the first time a dynamicand proactive hardware defense against Internet malware attacks.

This application hereby expressly incorporates by reference in itsentirety U.S. patent application Ser. No. 10/684,657 filed Oct. 15, 2003and published as Pub. No. US 2005/0180095 A1 on Aug. 18, 2005 and U.S.patent application Ser. No. 12/292,769 filed Nov. 25, 2008 and publishedas Pub. No. US 2009/0200661 A1 on Aug. 13, 2009.

Also, this application hereby expressly incorporates by reference in itsentirety U.S. patent application Ser. No. 10/802,049 filed Mar. 17, 2004and published as Pub. No. US 2004/0215931 A1 on Oct. 28, 2004; U.S.patent application Ser. No. 12/292,553 filed Nov. 20, 2008 and publishedas Pub. No. US 2009/0168329 A1 on Jul. 2, 2009; and U.S. patentapplication Ser. No. 12/292,769 filed Nov. 25, 2008 and published asPub. No. US 2009/0200661 A1 on Aug. 13, 2009.

Finally, this application hereby expressly incorporates by reference inits entirety U.S. Pat. No. 6,167,428 issued 26 Dec. 2000, U.S. Pat. No.6,725,250 issued 20 Apr. 2004, U.S. Pat. No. 6,732,141 issued 4 May2004, U.S. Pat. No. 7,024,449 issued 4 Apr. 2006, U.S. Pat. No.7,035,906 issued 25 Apr. 2006, U.S. Pat. No. 7,047,275 issued 16 May2006, U.S. Pat. No. 7,506,020 issued 17 Mar. 2009, U.S. Pat. No.7,606,854 issued 20 Oct. 2009, U.S. Pat. No. 7,634,529 issued 15 Dec.2009, U.S. Pat. No. 7,805,756 issued 28 Sep. 2010, and U.S. Pat. No.7,814,233 issued 12 Oct. 2010.

Definitions and reference numerals are the same in this application asin the above incorporated '657, '769, '049 and '553 U.S. applications,as well as in the above incorporated '428, '250, '141, '449, '906, '275,'020, '854, '529, '756, and '233 U.S. patents.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows any computer of any type or size or design, such as apersonal computer 1 and/or microchip 90 (and/or 501) or nanochip with aninner hardware-based access barrier or firewall 50 establishing aPrivate Unit (or zone or compartment) 53 of the computer or microchipthat is disconnected from a Public Unit (or zone or compartment) 54 thatis connected to the generally insecure public Internet 3 (and/oranother, intermediate network 2 that is connected to the Internet 3).FIG. 1 also shows an example embodiment of the Private Unit 53 having atleast one separate connection to at least one separate, more securenon-Internet-connected private network 52 for personal or localadministration of a computer such as the personal computer 1 and/ormicrochip 90 (and/or 501) and/or silicon wafer 1500 (or portion 1501,1502, and/or 1503), or graphene equivalent. The number and placement ofthe non-Internet-connected networks 52 and the use of activeconfiguration of the connection is optional.

FIG. 2 shows an example embodiment similar to that shown in FIG. 1,including a personal computer 1 and/or microchip 90 (and/or 501) with aninner hardware-based access barrier or firewall 50 separating a PrivateUnit 53 disconnected from the Internet 3 and a Public Unit 54 connectedto the Internet 3, but with the Private Unit 53 and Public Unit 54connected only by a hardware-based access barrier or firewall 50 a, forexample in the form of a secure, out-only bus (or wire) or channel 55(or in an alternate embodiment, a wireless connection, including radioor optical).

FIG. 3 is an example embodiment similar to that shown in FIG. 2, butwith the Private Unit 53 and Public Unit 54 connected by ahardware-based access barrier or firewall 50 b example that alsoincludes an in-only bus or channel 56 that includes a hardware inputon/off switch 57 or equivalent function signal interruption mechanism,including an equivalent functioning circuit on a microchip or nanochip.

FIG. 4 is a similar example embodiment to that shown in FIGS. 2 and 3,but with Private Unit 53 and Public Unit 54 connected by ahardware-based access barrier or firewall 50 c example that alsoincludes an output on/off switch 58 or microcircuit equivalent on thesecure, out-only bus or channel 55.

FIG. 5 shows an example embodiment of any computer such as a firstpersonal computer 1 and/or microchip 90 (and/or 501) that is connectedto a second computer such as a personal computer 1 and/or microchip 90(and/or 501), the connection between computers made with the samehardware-based access barrier or firewall 50 c example that includes thesame buses or channels with on/off switches or equivalents as FIG. 4.

FIG. 6 shows an example embodiment of a personal computer 1 and/ormicrochip 90 (and/or 501) similar to FIGS. 23A and 23B of the '657application, which showed multiple access barriers or firewalls 50 withprogressively greater protection, but with hardware-based accessbarriers or firewalls 50 c, 50 b, and 50 a used successively from ainner private unit 53, to an intermediate more private unit 53 ¹, and toan inner most private unit 53 ², respectively; each Private Unit 53, 53¹, and 53 ² has at least one separate connection to at least oneseparate private or limited-access network.

FIG. 7 shows a schematic illustration of a classic Von Neumann computerhardware architecture.

FIGS. 8-14 are additional architectural schematic embodiment examples of48 the use of hardware-based access barriers or firewalls 50 a, 50 b,and 50 c to create multiple compartments, as well as secure controlbuses and Faraday Cages.

FIGS. 15 and 16 show a lock mechanism 51 in access barrier/firewall 50that enables a highly controlled method of transferring data or codebetween computer or microchip units separated by 50, such as between aPrivate Unit 53 and a Public Unit 54.

FIG. 17A shows a buffer zone 350 without circuitry in any process layerin the zone, which functions to prevent hidden backdoor connectionsbetween microchip (or computer) units separated by an accessbarrier/firewall 50, such as between a Private Unit 53 and a Public Unit54; FIG. 17B shows a cross section of the FIG. 17A embodiment.

FIG. 18 is like FIG. 6, but shows an embodiment with the centralcontroller (C) positioned in Private Unit 53 ¹ and a secondarycontroller (S) 32 in Private Unit 53 ².

FIGS. 19 and 20 illustrate methods in accordance with the presentdisclosure.

DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS

FIGS. 1-4, 6, 8-14 all show useful architectural example embodiments ofany computer or microchip, including a personal computer 1 and/ormicrochip 90 (and/or 501) or silicon wafer (or graphene equivalent) 1500(wafer or wafer portion 1501, 1502, and/or 1503, as described in FIGS.19-26 and associated text of the '553 application, which areincorporated by reference herein); tablets, smartphones, servers(including blades) and cloud or supercomputer arrays are other wellknown examples of computers. The computer shown has an innerhardware-based access barrier or firewall 50 establishing a securePrivate Unit (or zone or compartment) 53 that is directly controlled bya user 49 (local in this example) and disconnected by hardware-basedaccess barrier or firewall 50 from a Public Unit (or zone orcompartment) 54 that is connected to the open, public and generallyinsecure Internet 3 and/or another, intermediate network 2; theconnection of the computer 1 (and/or 90 and/or 501 and/or 1500 or 1501,1502, or 1503) to the network 2 and/or Internet 3 can be wired 99 orwireless 100.

Hardware-based access barrier or firewall 50 (or 50 a, 50 b, or 50 c) asused in this application refers to an access barrier that includes oneor more access barrier or firewall-specific hardware and/or firmwarecomponents. This hardware and/or firmware configuration is in contrastto, for example, a computer firewall common in the art that includesonly software and general purpose hardware, such as an example limitedto firewall-specific software running on the single general purposemicroprocessor or CPU of a computer.

The Internet-disconnected Private Unit 53 includes a master controllingdevice (M or CC) 30 for the computer PC1 (and/or a master controllerunit 93 for the microchip 90 and/or 501) that can include amicroprocessor or processing unit and thereby take the form of a generalpurpose microprocessor or CPU, for one useful example, or alternativelyonly control the computer as a master controller 31 or master controllerunit 93′ (with relatively little or no general purpose processing powercompared to the processing units or cores of the computer or microchipbeing controlled). The user 49 controls the master controlling device 30(or 31 or 93 or 93′) located in the Private Unit 53 and controls boththe Private Unit 53 at all times and any part or all of the Public Unit54 selectively, but can peremptorily control any and all parts of thePublic Unit 54 at the discretion of the user 49 through activeintervention or selection from a range of settings, or based on standardcontrol settings by default, using for example a secure control bus 48(to be discussed later). The Public Unit 54 typically can include one ormore cores or general purpose microprocessors 40 or 94 and/orgraphics-based microprocessors 68 or 82 that are designed for moregeneral operations and not limited to graphics-related operations,including very large numbers of either or both types of microprocessors,and potentially including one or more secondary controllers 32, as wellas any number of specialized or single-function microprocessors.

The inner hardware-based access barrier or firewall has the capabilityof denying access to said protected portion of the computer 1 ormicrochip 90 by a generally insecure public network including theInternet, while permitting access by any other computer in the publicnetwork including the Internet to said one or more of the processingunits included in the unprotected portion of the computer 1 or microchip90 for an operation with said any other computer in the public networkincluding the Internet when the computer is connected to the publicnetwork including the Internet. The operation can be any computeroperation whatsoever involving some interaction between two computersincluding simply sending and/or receiving data and also including, butnot limited to, specific examples such as searching, browsing,downloading, streaming, parallel processing, emailing, messaging, filetransferring or sharing, telephoning or conferencing.

More particularly, FIG. 1 shows a useful example of an optional (one ormore) private network 52, which is more secure by being, for example,closed and disconnected from the Internet 3 (permanently or temporarily)and/or by having controlled access, to be used for administration and/ormanagement and/or control of the Private Unit 53, including for exampleby a business enterprise. Wired 99 connection directly to the PrivateUnit 53 offers superior security generally for the closed and secureprivate network 52, but wireless 100 connection is a option, especiallyif used with a sufficiently high level of encryption and/or othersecurity measures, including low power radio signals of high frequencyand short range and/or directional, as well as frequency shifting andother known wireless security measures. Access from the privatenon-Internet-connected network 52 can be limited to only a part of thePrivate Unit 53 or to multiple parts or to all of the Private Unit 53.

FIG. 1 shows a computer 1 and/or microchip 90 (and/or 501 and/or 1500,1501, 1502, or 1503) with the at least one Public Unit 54 and the atleast one Private Unit 53. The at least one Public Unit 54 is configuredfor connection to the Internet 3, either directly or through at leastone intermediate network 2. The at least one Private Unit 53 isdisconnected from the networks 2 and 3 by the access barrier/firewall 50and is connected to only a private network 52 from a network connectionlocation in the Private Unit 53. The Public Unit 54 is connected tonetwork 2 and/or 3 from a separate network connection location in thePublic Unit 54. Separate and distinct network connection components 98for separate wired 99 and/or wireless 100 network connections are shownat the at least two separate and distinct network connection locations,one location in the Private Unit (or units) 53 and the other location inPublic Unit 54 indicated in FIG. 1 and FIGS. 2-11, 12-14 and 18.

Such a one or more private non-Internet-connected network 52 (notconnected to the open and insecure public Internet 3 either directly orindirectly, such as through another, intermediate network like anIntranet 2) can allow specifically for use as a highly secure and closedprivate network for providing administrative or management or controlfunctions like testing, maintenance, trouble-shooting, synchronizingfiles, modifying security, or operating or application system updates tothe Private Units 53 of any computers (PC1 or microchip 90 or 501) withone or more Public Units 54 that are connected to a less secure localnetwork 2, such as a business or home network, that is connected to thepublic Internet 3.

A particularly useful business example would be administering largenumbers of local employee personal computers or network servers, andalso including large arrays (especially blades) for cloud applicationsor supercomputer arrays with a vast multitude of microprocessors orlocal clusters; in the latter examples, it is possible for a centralizedoperator to use the private network 52 to control, securely anddirectly, the master controlling devices 30 or 31 or master controllerunit 93 or 93′ and associated memory or other devices in the PrivateUnits 53 of a multitude of servers, blades, or large arrays or clustersof computers that are connected to the Internet 3. A personal useexample would be to use a private network 52 to connect the private unit53 of a personal user's smartphone to the private unit 53 of the user'scomputer laptop in order to update and/or synchronize data or codebetween the two private units 53. To maximize security, some or allnetwork 52 traffic can be encrypted and/or authenticated, especially ifwireless 100, including with a very high level of encryption.

In addition, in another useful example, a computer (PC1 and/or 90 and/or501) can be configured so that the private non-Internet-connectednetwork 52 can have the capability to allow for direct operationalcontrol of the Private Unit 53, and thus the entire computer, from anylocation (including a remote one), which can be useful for example forbusinesses operating an array of servers like blades to host cloudoperations or supercomputers with large numbers of microprocessors orcores.

One or more access barriers or firewalls 50 a, 50 b, or 50 c can belocated between the secure private non-Internet-connected network 52 andthe Private Unit 53, providing a useful example of increased securitythat can be controlled using the private network 52.

In yet another useful example, a personal user 49 can dock hissmartphone (PC1 and/or 90 and/or 501 and/or 1500, 1501, 1502, or 1503)linking through wire or wirelessly to his laptop or desktop computer(PC1 and/or 90 and/or 501 and/or 1500, 1501, 1502, or 1503) in a network52 connection to synchronize the Private Units 53 of those two (or more)personal computers or perform other shared operations between thePrivate Units 53. In addition, the Public Units 54 of the user'smultiple personal computers can be synchronized simultaneously duringthe same tethering process, or perform other shared operations betweenthe Public Units 54. Other shared operations can be performed by the twoor more linked computers of the user 49 utilizing, for example, two orthree or more Private Units 53, each unit with one or more privatenon-Internet connected networks 52, while two or more Public Units 54can perform shared operations using one or more other networks 2,including the open and insecure Internet 3, as shown later in FIG. 6.

Also shown in FIG. 1 for personal computer PC1 embodiments is anoptional removable memory 47 located in the Private Unit 53; theremovable memory 47 can be of any form or type or number using any formof one or more direct connections to the Private Unit 53; a thumbdriveor SD card are typical examples, connected to USB, Firewire, SD, orother ports located in the Private Unit 53 (or other ports or card slotsof any form), which can also be used for the physical connection to theprivate network 52. FIG. 1 shows as well an optional one or moreremovable keys 46, of which an access key, an ID authentication key, oran encryption and/or decryption key are examples, also connected to thePrivate Unit 53 using any form of connection, including the aboveexamples; both 46 and 47 can potentially be isolated from other parts ofthe Private Unit 53 by access barrier(s) or firewall(s) 50, 50 a, 50 b,and/or 50 c, which can use active configuration such as fieldprogrammable gate array(s) 59.

For microchip 90 (and/or 501) embodiments, wireless connection is afeasible option to enable one or more removable memories 47 or one ormore removable keys 46 (or combination of both), particularly for IDauthentication and/or access control, utilizing the same ports describedabove. In addition, all or part of the Private Unit 53 of a computer PC1and/or microchip 90 and/or 501 (or wafer 1500, 1501, 1502, or 1501) canbe removable from the remaining portion of the same computer PC1 and/ormicrochip 90 and/or 501, including the Public Unit 54; the accesscontrol barrier or firewall 50 (or 50 a and/or 50 b and/or 50 c) can beremovable with the Private Unit 53 or remain with Public Unit 54.

Finally, FIG. 1 shows schematically within the dashed lines indicatedthe potential use anywhere in (and in any hardware component of)computer 1 and/or microchip 90 (and/or 501 and/or 1500, 1501, 1502, or1503) of a field programmable gate array or arrays (FPGA) 59 (or othermeans of active hardware configuration), including in the Private Unit53, the Public Unit 54, or the access barriers or firewalls 50, 50 a, 50b, and/or 50 c that are shown in FIGS. 2-6 and later figures, andincluding any such barriers or firewalls located between the PrivateUnit 53 and either the secure private network 52 as shown in FIG. 1 ornetworks 52, 52 ¹′, or 52 ² as shown in FIG. 6, for example. The fieldprogrammable gate array(s) 59 can be controlled by the mastercontrolling device 30 or 93 or 31 or 93* using a secure control bus 48,as discussed and shown later in this application. By using FPGA 59 thuscontrolled securely by the central controller, the access barrier(s) orfirewall(s) can be changed at any time, such as from 50 a to 50 b or 50c or any other change (these new access barriers or firewalls will bediscussed in later figures), for example. In addition, FPGA 59 can alsochange, for example, any of the circuitry in the Private Unit 53 ofcomputer 1 or microchip 90 or 501 (or any other part) while keeping anynew such hardware configuration from view or control of any networkintruders that may have gained access to the Public Unit 54. Similarly,the FPGA 59 in the Public Unit 54 can be controlled to show one hardwareconfiguration for a while and then securely change it to any otherhardware configuration (such as altering access to ports or networkconnections, for example), either randomly or proactively or in responseto a malware attack, by rebooting the new hardware configuration undercontrol of the secure central controlling device in the Private Unit 53of the microchip or computer and using the secure control bus 48. Inthis way, a secure dynamic and proactive hardware defense for computersand microchips is possible for the first time. Other useful examples ofthe potential for use anywhere in computers 1 and/or microchips 90(and/or 501 and/or 1500, 1501, 1502, or 1503) of a field programmablegate array or arrays (FPGA) 59 (or other means of active hardwareconfiguration) is shown schematically in FIGS. 6, 9, and 11-17 and canbe used in a similar way in FIGS. 2-6 as well.

FIG. 2 shows an example embodiment that, in terms of communicationbetween the two Units, the Private Unit 53 and Public Unit 54 areconnected only by an inner hardware-based access barrier or firewall 50a in the form of a secure, out-only bus (or wire) or channel 55 thattransmits data or code that is output from the Private Unit 53 to beinput to the Public Unit 54. The user 49 controls the Private Unit53-located master controlling device 30 (or 31 or 93 or 93′), whichcontrols all traffic on the secure out-only bus or channel 55.Connections between the user 49 and the master controlling device 30 (or31 or 93 or 93′), as well as between the master controlling device 30(or 31 or 93 or 93′) and any component controlled by it, can be forexample hardwired on a motherboard (and/or executed in silicon on amicrochip 90 and/or 501) to provide the highest level of security.

In the example shown in FIG. 2, there is no corresponding in-only bus orchannel 56 transmitting data or code that is output from the Public Unit54 to be input to the Private Unit 53. By this absence of any bus orchannel into the Private Unit 53, all access from the Internet 3 orintervening network 2 to the Private Unit 53 is completely blocked on apermanent basis. Another example is an equivalent wireless connectionbetween the two Units would require a wireless transmitter (and noreceiver) in the Private Unit 53 and a receiver (and no transmitter) inthe Public Unit 54, so the Private Unit 53 can only transmit data orcode to the Public Unit 54 and the Public Unit 54 can only receive dataor code from the Private Unit 53 (all exclusive of external wirelesstransmitters or receivers of the PC1 and/or microchip 90 and/or 501).

The Private Unit 53 can include any non-volatile memory, of whichread-only memory and read/write memory of which flash memory (and harddrives and optical drives) are examples, and any volatile memory, ofwhich DRAM (dynamic random access memory) is one common example.

An equivalent connection, such as a wireless (including radio and/oroptical) connection, to the out-only bus or channel 55 between the twoUnits 53 and 54 would require at least one wireless transmitter in thePrivate Unit 53 and at least one receiver in the Public Unit 54, so thePrivate Unit 53 can transmit data or code to the Public Unit 54 only(all exclusive of external wireless transmitters or receivers of the PC1and/or microchip 90 and/or 501).

An architecture for any computer or microchip (or nanochip) can have anynumber of inner hardware-based access barriers or firewalls 50 aarranged in any configuration.

FIG. 2 also shows an example embodiment of a firewall 50 located on theperiphery of the computer 1 and/or microchip 90 (and/or 501) controllingthe connection between the computer and the network 2 and Internet 3;the firewall 50 can be hardwire-controlled directly by the mastercontrolling device 30 (or 31 or 93 or 93′), for example.

FIG. 3 is a similar useful architectural example embodiment to thatshown in FIG. 2, but with the Private Unit 53 and Public Unit 54connected in terms of communication of data or code by an innerhardware-based access barrier or firewall 50 b example that includes asecure, out-only bus or channel 55. The connection between units alsoincludes an in-only bus or channel 56 that is capable of transmittingdata or code that is output from the Public Unit 54 to be input into thePrivate Unit 53, strictly controlled by the master controller 30 (and/or31 and/or 93 and/or 93′) in the Private Unit 53. The in-only bus orchannel 56 includes an input on/off switch (and/or microchip or nanochipcircuit equivalent) 57 that can break the bus 56 Public to Privateconnection between Units, the switch 57 being controlled by the PrivateUnit 53-located master controlling device 30 (or 31 or 93 or 93′), whichalso controls all traffic on the in-only bus or channel 56; the controlcan be hardwired.

For one example, the master controller 30 (or 31 or 93 or 93′) can bydefault use the on/off switch and/or micro-circuit (or nano-circuit)equivalent 57 to break the connection provided by the in-only bus orchannel 56 to the Private Unit 53 from the Public Unit 54 whenever thePublic Unit 54 is connected to the Internet 3 (or intermediate network2). In an alternate example, the master controller 30 (or 31 or 93 or93′) can use the on/off switch and/or micro or nano-circuit equivalent57 to make the connection provided by the in-only bus or channel 56 tothe Private Unit 53 only when very selective criteria or conditions havebeen met first, an example of which would be exclusion of all inputexcept when encrypted and from one of only a few authorized (andcarefully authenticated) sources, so that Public Unit 54 input to thePrivate Unit 53 is extremely limited and tightly controlled from thePrivate Unit 53.

Another example is an equivalent connection, such as a wireless(including radio and/or optical) connection, to the in-only bus orchannel 56 with an input on/off switch 57 between the two Units 53 and54 would require at least one wireless receiver in the Private Unit 53and at least one transmitter in the Public Unit 54, so the Private Unit53 can receive data or code from the Public Unit 54 while controllingthat reception of data or code by controlling its receiver, switching iteither “on” when the Public Unit 54 is disconnected from externalnetworks 2 and/or 3, for example, or “off” when the Public Unit 54 isconnected to external networks 2 and/or 3 (all exclusive of externalwireless transmitters or receivers of the PC1 and/or microchip 90 and/or501).

An architecture for any computer and/or microchip (or nanochip) can haveany number of inner hardware-based access barriers or firewalls 50 barranged in any configuration.

FIG. 4 is a similar useful architectural example embodiment to thatshown in FIGS. 2 and 3, but with Private Unit 53 and Public Unit 54connected in terms of communication of data or code by an innerhardware-based access barrier or firewall 50 c example that alsoincludes an output on/off switch and/or microcircuit equivalent 58 onthe secure out-only bus or channel 55, in addition to the input on/offswitch and/or microcircuit (or nano-circuit) equivalent 57 on thein-only bus or channel 56.

The output switch or microcircuit equivalent 58 is capable ofdisconnecting the Public Unit 54 from the Private Unit 53 when thePublic Unit 54 is being permitted by the master controller 30 (or 31 or93 or 93′) to perform a private operation controlled (completely or inpart) by an authorized third party user from the Internet 3, asdiscussed previously by the applicant relative to FIG. 17D andassociated textual specification of the '657 application incorporatedabove. The user 49 using the master controller 30 (or 31 or 93 or 93′)always remains in preemptive control on the Public Unit 54 and can atany time for any reason interrupt or terminate any such thirdparty-controlled operation. The master controller 30 (or 31 or 93 or93′) controls both on/off switches 57 and 58 and traffic (data and code)on both buses or channels 55 and 56 and the control can be hardwired.

Another example is an equivalent connection, such as a wirelessconnection, to the in-only bus or channel 56 and out-only bus or channel55, each with an on/off switch 57 and 58 between the two Units 53 and54, would require at least one wireless transmitter and at least onereceiver in the Private Unit 53, as well as at least one transmitter andat least one receiver in the Public Unit 54, so the Private Unit 53 cansend or receive data or code to or from the Public Unit 54 by directlycontrolling the “on” or “off” state of its transmitter and receiver,controlling that flow of data or code depending, for example on thestate of external network 2 or Internet 3 connection of the Public Unit54 (again, all exclusive of external wireless transmitters or receiversof the PC1 and/or microchip 90 and/or 501).

The buses 55 and/or 56 can be configured to transport control and/ordata and/or code between the Units (or any components thereof) of acomputer and/or microchip; and there can be separate buses 55 and/or 56for each of control and/or data and/or code, or for a combination of twoof control or data or code.

An architecture for any computer and/or microchip (or nanochip) can haveany number of inner hardware-based access barriers or firewalls 50 carranged in any configuration.

FIG. 5 shows an architectural example embodiment of a first computer(personal computer 1 and/or microchip 90 and/or 501 or wafer 1500, or1501, 1502, or 1503) functioning as a Private Unit 53′ that is connectedto at least a second computer (or to a multitude of computers, includingpersonal computers 1 and/or microchips 90 and/or 501 or 1500, 1501,1502, or 1503) functioning as a Public Unit or Units 54′. The connectionbetween the private computer 53′ and the public computer or computers54′ is made including the same inner hardware-based access barrier orfirewall 50 c architecture that includes the same buses and channels 55and 56 with the same on/off switches 57 and 58 as previously describedabove in the FIG. 4 example above and can use the same hardwire control.Alternatively, inner hardware-based access barriers or firewalls 50 a or50 b can be used. In addition, inner hardware-based access barriers orfirewalls 50 a, 50 b, and 50 c can be used within the first and/orsecond computers.

The connection between the first and second computer can be anyconnection, including a wired network connection like the Ethernet, forexample, or a wireless network connection, similar to the examplesdescribed above in previous FIGS. 2-4. In the Ethernet example, eitheron/off switch 57 or 58 can be functionally replaced like in a wirelessconnection by control of an output transmitter or an input receiver oneither bus or channel 55 or 56; the transmitter or receiver being turnedon or off, which of course amounts functionally to mere locating theon/off switches 55 or 56 in the proper position on the bus or channel 55or 56 to control the appropriate transmitter or receiver, as is true forthe examples in previous figures.

FIG. 6 shows a useful architectural example embodiment of any computer(a personal computer 1 and/or microchip 90 and/or 501 or wafer 1500,1501, 1502, or 1503) similar to FIGS. 23A and 23B of the '657application incorporated by reference above, which showed multiple innerfirewalls 50 with progressively greater protection. FIG. 6 shows anexample of an internal array of inner hardware-based access barriers orfirewalls 50 c, 50 b, and 50 a (described in previous FIGS. 2-4 above)used in a specific sequence between a public unit 54 and a first privateunit 53, between the first private unit 53 and a more private secondunit 53 ¹, and between the more private second unit 53 ¹ and a mostprivate third unit 53 ², respectively.

In addition, FIG. 6 shows a useful architectural example embodiment ofone or more master controllers C (30 or 93) or master controllers-only(31 or 93′) located in the most private unit 53 ², with one or moremicroprocessors or processing units or “cores” S (40 or 94) (and/or 68or 82) located in the more private unit 53 ¹, in the private unit 53,and in the public unit 54. Each of the microprocessors or processingunits or cores S can have at least one secondary controller 32 withwhich it can be integrated, for example.

The microprocessors S (or processing units or cores) can be located inany of the computer units, but the majority in a many core architecturecan be in the public unit to maximize sharing and Internet use.Alternatively, for computers that are designed for moresecurity-oriented applications, a majority of the microprocessors S (orprocessing units or cores) can be located in the private units; anyallocation between the public and private units is possible. Any otherhardware, software, or firmware component or components can be locatedin the same manner as are microprocessors S (or master controllers-onlyC) described above.

The one or more master controlling device (M) 30 or master controllerunit 93 (or 31 or 93′), sometimes called the central controller (CC) orcentral processing unit (CPU), can be usefully located in any PrivateUnit 53, including for example as shown in FIG. 6 in Private Unit 53 ²,or in Private Units 53 ¹ or 53, such as utilizing one of the secondarycontrollers (S) 32 (40 or 94) as the master controller (M or CC), eitheron a permanent or temporary basis. Particularly on a temporary basis,the master controller (M or CC) can move from one location to another,such as moving from a less private unit 53 to a more private Unit 53 ¹or to a most private Unit 53 ² in response for example to an increasedlevel in the threat environment or to a direct malware attack,respectively. Such movement can be effected simply by designation orassignment by a user 49 or through the Private Network 52, for example.It is even possible to locate the master controller (M or CC) in atleast part of the Public Unit 54, including for example when it has itsown access barrier or firewall 50 (including 50 a, 50 b, and/or 50 c),as shown in FIG. 13, and/or when booted in a controlled manner from aPrivate Unit 53, on a temporary or permanent basis, such as for examplewhen used in a particularly secure environment. Such movement of M or CCnoted above can also be effected by field programmable gate array orarrays (FPGA) or another form of active hardware configuration. Theexisting increasing use of multiple or many microprocessors in computersfrom smartphones to huge server arrays and supercomputers, in the formof multiple or many processor (CPU) microchips and/or in the form ofmultiple or many “cores” on a processor microchip, facilitates the easymovement of the master or central controller (M or CC) within a computer1 and/or microchip 90 (and/or 501 and/or 1500, 1501, 1502, or 1503),since the M or CC can easily be moved from one general purpose processormicrochip to another and/or from one general purpose core to another(and/or potentially between hybrid graphics microchips or cores). FIG.18 is like FIG. 6, but shows an example embodiment with the centralcontroller (C) positioned in Private Unit 53 ¹ and a secondarycontroller (S) 32 in Private Unit 53 ², temporarily or permanently.

An architecture for any computer and/or microchip or nanochip can haveany number of inner hardware-based access barriers or firewalls 50 aand/or 50 b and/or 50 c arranged in any combination or configuration.

As shown in FIG. 6, the private non-Internet network 52, which wasdiscussed previously relative to FIG. 1, can consist in an exampleembodiment of more than one network, with each additional non-Internetnetwork 52 being used to connect Private Units 53 ², 53 ¹, and 53 of onecomputer and/or microchip to separate non-Internet networks 52 ², 52 ¹and 52, respectively, and that are connected to Private Units 53 ², 53¹, and 53, respectively, of other computers and/or microchips. That is,each computer and/or microchip Private Unit 53 ², 53 ¹, and 53 can haveits own separate, non-Internet network 52 ², 52 ¹, and 52, respectively,and so that any Private Unit can be connected to other computer PC1and/or microchip 90 (and/or 501) units of the same level of security;any Private Unit can also be subdivided into subunits of the same levelof security. This is a useful embodiment example for making relativelylocal connections from business or home networks and scales up to largebusiness servers, cloud, or supercomputers applications. The connectionscan be wired or wireless and local or non-local.

Similarly, a computer PC1 and/or microchip 90 or 501 Public Unit 54 canbe subdivided into a number of different levels of security, forexample, and each subdivided Public Unit 54 can have a separate,non-Internet connected network 52; and a subdivided Public Unit 54 canbe further subdivided with the same level of security. In addition, anyhardware component (like a hard drive or Flash memory device (andassociated software or firmware), within a private (or public) unit of agiven level of security can be connected by a separate non-Internetnetwork 52 to similar components within a private (or public) unit ofthe same level of security.

Any configuration of access barriers or firewalls 50 a and/or 50 band/or 50 c can be located between any of the privatenon-Internet-connected networks 52 ², 52 ¹, and 52, and the PrivateUnits 53 ², 53 ¹, and 53, respectively, providing a useful example ofincreased security control as shown in FIG. 6.

Also shown in the example embodiment of FIG. 6, each Private Unit 53 ²,53 ¹, and 53 can have one or more ports (or connections to one or moreports), like for a USB connection to allow for the use of one or moreoptional removable access and/or encryption or other keys 46, and/or oneor more optional removable memory (such as a USB Flash memorythumbdrive) or other device 47, both of which as discussed previously inthe text of FIG. 1, which example can also have one or more ports foreither 46 and/or 47 and/or other device. The Public Unit 54 can alsohave one or more of any such removable devices, or ports like a USB portto allow for them.

Any data or code or system state, for example, for any Public or PrivateUnit 54 or 53 can be displayed to the personal user 49 and can be shownin its own distinctive color or shading or border (or any other visualor audible distinctive characteristic, like the use of flashing text).FIG. 6 shows an example embodiment of different colors indicated foreach of the Units.

For embodiments requiring a higher level of security, it may bepreferable to eliminate permanently or temporarily block (by default orby user choice, for example) the non-Internet network 52 ² and all portsor port connections in the most private unit 53 ².

The public unit 54 can be subdivided into an encrypted area (and caninclude encryption/decryption hardware) and an open, unencrypted area,as can any of the private units 53; in both cases the master centralcontroller 30, 31, 93, or 93′ can control the transfer of any or allcode or data between an encrypted area and an unencrypted areaconsidering factors such authentication.

Finally, FIG. 6 shows the potential use anywhere in computers 1 and/ormicrochips 90 (and/or 501 and/or 1500, 1501, 1502, or 1503) of a fieldprogrammable gate array or arrays (FPGA or other means of activehardware configuration) 59, as described under FIG. 1.

The invention example structural and functional embodiments shown in theabove described FIGS. 1-6, as well as the following FIGS. 7-16 and theassociated textual specification of this application all most directlyrelate to the example structural and functional embodiments of the innerfirewall 50 described in FIGS. 10A-10D, 10J-10Q, 17A-17D, 23A-23E, 24,25A-25D and 27A-27G, and associated textual specification, of the above'657 application incorporated by reference.

FIG. 7 shows the fundamental security problem caused by the Internetconnection to the classic Von Neumann computer hardware architecturethat was created in 1945. At that time there were no other computers andtherefore no networks of even the simplest kind, so network security wasnot a consideration in its fundamental design, which is unsafe for usewhen connected to an open insecure public network of enormous scale,such as the Internet.

FIGS. 8-14 are useful architectural example embodiments of the innerhardware-based access barriers or firewalls 50 a, 50 b, and 50 c.

FIG. 8 shows a useful example embodiment of the applicant's basicarchitectural solution to the fundamental security problem caused by theInternet, the solution being to protect the central controller of thecomputer with an inner firewall 50 controlling access by the Internet,as discussed in detail in FIGS. 10A-10D and 10J-10Q, and associatedtextual specification of the '657 application, those specific drawingand text portions of which are incorporated by reference in thisapplication; they were discussed as well as earlier in this application.FIG. 8 and subsequent figures describe example embodiments of a numberof specific forms of an inner hardware-based access barrier or firewall50, such as access barriers or firewalls 50 a and/or 50 b and/or 50 c asdescribed previously in this application; the number and potentialconfigurations of access barriers or firewalls 50 a and/or 50 b and/or50 c within any computer, such as computer PC 1 and/or microchip 90(and/or 501) is without any particular limit.

FIG. 9 is a similar embodiment to FIG. 8, but also showing a usefularchitectural example of a central controller integrated with amicroprocessor to form a conventional general purpose microprocessor orCPU (like an Intel x86 microprocessor, for example). FIG. 8 also shows acomputer PC1 and/or microchip 90 and/or 501 with many microprocessors orcores.

Finally, FIG. 9 shows the potential use anywhere in computers 1 and/ormicrochips 90 (and/or 501 and/or 1500, 1501, 1502, or 1503) of a fieldprogrammable gate array or arrays (FPGA) 59 (or other means of activehardware configuration), as described under FIG. 1.

FIG. 10 is the same embodiment as FIG. 9, but also shows a majorfunctional benefit of the applicant's access barrier or firewall 50 a,50 b, and 50 c invention, which is to enable a function to flush awayInternet malware by limiting the memory access of malware to DRAM 66(dynamic random access memory) in the Public Unit 54, which is a usefulexample of a volatile memory that can be easily and quickly erased bypower interruption. The flushing function use of a firewall 50 wasdiscussed earlier in detail in FIGS. 25A-25D and associated textualspecification of the '657 application and those specific drawing andtext portions of the '657 application are incorporated by referenceherein. After being flushed, the Public Unit 54 can be rebooted from thePrivate Unit 53 by the central controller using the secure control bus48 to be discussed and shown later.

FIG. 11 is a useful example embodiment similar to FIG. 6 and shows thatany computer or microchip can be partitioned into many different layersof public units 54 and private units 53 using an architecturalconfiguration of access barriers or firewalls 50 a, 50 b, and 50 c; thenumber and arrangement of potential configurations is without anyparticular limit; and the number of microprocessors 40 or 94 and/or 68or 82 in the public unit 53 can be potentially any number, including 1or 2 or 3 or at least 4 or 8 or 16 or 32 or 64 or 128 or 256 or 512 or1024 or many more, as could potentially be the case in prior orsubsequent figures. The partition architecture provided by firewalls 50was discussed earlier in detail in FIGS. 23A-23B and associated textualspecification of the '657 application and those specific drawing andtext portions are incorporated by reference herein.

Finally, FIG. 11 shows the potential use anywhere in computers 1 and/ormicrochips 90 (and/or 501 and/or 1500, 1501, 1502, or 1503) of a fieldprogrammable gate array or arrays (FPGA) 59 (or other means of activehardware configuration), as described under FIG. 1.

FIG. 12 is another useful architectural example embodiment of thelayered use of access barriers or firewalls 50, 50 c, 50 b, and 50 cbased on a kernel or onion structure; the number of potentialconfigurations including relative to layers or types of access barriersor firewalls is without any particular limit. This structure wasdiscussed in detail relative to firewalls 50 in FIGS. 23D-23E andassociated textual specification of the '657 application and thosespecific drawing and text portions are incorporated by reference herein.

FIG. 12 also shows the potential use anywhere in computers 1 and/ormicrochips 90 (and/or 501 and/or 1500, 1501, 1502, or 1503) of a fieldprogrammable gate array or arrays (FPGA) 59 (or other means of activehardware configuration), as described under FIG. 1.

FIG. 13 is a useful architectural example embodiment showing thepresence of many FIG. 12 example embodiments with layered accessbarriers or firewalls 50 a, 50 b, and 50 c structures on all of the manyhardware, software, and/or firmware components of a computer; the numberof FIG. 12 embodiments or their potential configurations includingrelative to layers or types of access barriers or firewalls is withoutany particular limit in either the private unit 53 or the public unit 54of any computer or microchip. The many layered kernels structure wasdiscussed in more detail in FIG. 23C and associated textualspecification of the '657 application and those specific drawing andtext portions are incorporated by reference earlier. Note that anysubcomponent or kernel of the FIG. 12 example embodiment can beprotected by a hardware-based access barrier 50 a (or 50 b or 50 c or50), a secure, out-only bus or channel 55, and therefore can for examplebe effectively disconnected from any input from any network, includingeither the secure private network 52 and the insecure public networkincluding the Internet 3.

FIG. 13 shows the potential use anywhere in computers 1 and/ormicrochips 90 (and/or 501 and/or 1500, 1501, 1502, or 1503) of a fieldprogrammable gate array or arrays (FPGA) 59 (or other means of activehardware configuration), as described under FIG. 1.

FIG. 14 is a useful architectural example embodiment similar to FIG. 13,but also showing the computer PC1 and/or microchip 90 and/or 501surrounded by a Faraday Cage 300; the number of potential similarconfigurations is without any particular limit. This use of FaradayCages 300 was discussed in detail in FIGS. 27A-27G and associatedtextual specification of the '657 application and those specific drawingand text portions are incorporated by reference herein.

FIG. 14 shows a useful example embodiment of a Faraday Cage 300surrounding completely a computer PC1 and/or microchip 90 and/or 501.The Faraday Cage 300 can be subdivided by an example partition 301 toprotect and separate the Private Unit 53 from the Public Unit 54, sothat the Private Unit 53 is completely surrounded by Faraday Cage 300 ¹and Public Unit 54 is completely surrounded by Faraday Cage 300 ², inthe example embodiment shown. Each unit can alternatively have adiscrete Faraday Cage 300 of its own, instead of partitioning a largerFaraday Cage 300 and the surrounding of a Unit can be complete orpartial. Any number or configuration of Faraday Cages can be used in themanner shown generally in FIG. 14, including a separate Faraday Cage forany hardware component of the computer or microchip. The Faraday Cagescan provide protection against an external electromagnetic pulse,including massive ones, and against external surveillance or internalsurveillance including between private and public portions of a computerand/or microchip or nanochip.

Finally, FIG. 14 shows the potential use anywhere in computers 1 and/ormicrochips 90 and/or 1500, 1501, 1502, or 1503 of a field programmablegate array or arrays (FPGA) 59 (or other means of active hardwareconfiguration), as described under FIG. 1.

The example embodiments shown in FIGS. 1-4, 6-11, and 13-19 are acomputer of any sort, including a personal computer PC1; or a microchip90 or 501, including a microprocessor or a system on a chip (SoC) suchas a personal computer on a microchip 90; or a combination of both, suchas a computer with the architecture shown in FIGS. 1-4, 6-11, and 13-19,the computer also including one or more microchips also with thearchitecture shown in FIGS. 1-4, 6-11, and 13-19.

The Public Unit 54 shown in FIGS. 1-6, 8-11, and 13-17 can be used in auseful embodiment example to run all or a part of any application (or“apps”) downloaded from the Internet or Web, such as the example of anyof the many thousands of apps for the Apple iPhone that are downloadedfrom the Apple Apps Store, or to run applications that are streamed fromthe Internet or Web. Similarly, all or part of a video or audio filelike a movie or music that would otherwise be protected by digitalmanagement rights can be downloaded or streamed from the Web and playedin the Public Unit 54 for viewing and/or listening be the computer user49, while at the same time that user 49 has no control over the PublicUnit 54 to copy the protected files since he can be denied access tothose functions during the download or streaming.

Some or all personal data pertaining to a user 49 can be keptexclusively on the user's computer PC1 and/or microchip 90 and/or 501for any cloud application or app to protect the privacy of the user 49(or kept non-exclusively as a back-up), unlike conventional cloud apps,where the data of a personal user 49 is kept in the cloud. In existingcloud architectures, user data is separated and protected only bysoftware, not hardware, and there can be potentially sharedintentionally or carelessly compromised without authorization by orknowledge of the personal user 49. In effect, the Public Unit 54 canfunction as a safe and private local cloud, with personal files can beoperated on there using cloud apps downloaded from a cloud web site andthose personal files can be retained in the Private Unit 53 after theoperation is completed. All or part of an app can also potentially bedownloaded or streamed to one or more Private Units, including 53 ², 53¹, and 53, and retained or used for local operations either in thePrivate Unit or in a Public Unit, in the manner that apps are currently.

Privacy in conventional clouds can also be significantly enhanced usingthe inner hardware-based access barriers or firewalls 50 a and/or 50 band/or 50 c described in this application, since each individual orcorporate user of the cloud can be assured that their data is safebecause it can be physically separated and segregated by hardware,instead of by software alone, as is the case currently.

Similarly, the example embodiment of FIG. 6 shows a computer and/ormicrochip Public Unit 54 and Private Units 53, 53 ¹, and 53 ², each witha separate Faraday Cage. 300 ⁴, 300 ³, 300 ², and 300 ¹, respectively,that are create using partitions 301 ^(c), 301 ^(b), and 301 ^(a),respectively. Any Public Unit 54 or Private Unit 53 can be protected byits own Faraday Cage 300. The Faraday Cage 300 can completely orpartially surround the any Unit in two or three dimensions.

FIGS. 8-11 and 13-14 also show example embodiments of a secure controlbus (or wire or channel) 48 that connects the master controlling device30 (or 31) or master control unit 93 (or 93′) or central controller (asshown) with the components of the computer PC1 and/or microchip 90and/or 501, including those in the Public Unit 54. The secure controlbus 48 provides hardwired control of the Public Unit 54 by the centralcontroller in the Private Unit 53. The secure control bus 48 can beisolated from any input from the Internet 3 and/or an intervening othernetwork 2 and/or from any input or monitoring from any or all parts ofthe Public Unit 54. The secure control bus 48 can provide and ensuredirect preemptive control by the central controller over any or all thecomponents of the computer, including the Public Unit 54 components. Thesecure control bus 48 can, partially or completely, coincide or beintegrated with the bus 55, for example. The secure control bus 48 isconfigured in a manner such that it cannot be affected, interfered with,altered, read or written to, or superseded by any part of the PublicUnit 54 or any input from the Internet 3 or network 2, for example. Awireless connection can also provide the function of the secure controlbus 48 a manner similar to that describing wireless connections above inFIGS. 2-6 describing buses 55 and 56.

The secure control bus 48 can also provide connection for the centralcontroller to control a conventional firewall or for example accessbarrier or firewall 50 c located on the periphery of the computer ormicrochip to control the connection of the computer PC1 and/or microchip90 and/or 501 to the Internet 3 and/or intervening other network 2.

The secure control bus 48 can also be used by the master centralcontroller 30, 31, 93, or 93′ to control one or more secondarycontrollers 32 located on the bus 48 or anywhere in the computer PC1and/or microchip 90 and/or 501, including in the Public Unit 54 that areused, for example, to control microprocessors or processing units orcores S (40 or 94) located in the Public Unit 54. The one or moresecondary controllers 32 can be independent or integrated with themicroprocessors or processing units or cores S (40 or 94) shown in FIGS.9 and 11 above, for example; such integrated microprocessors can be aspecial purpose design or a common general purpose microprocessors likean Intel x86 microprocessor, for example.

FIG. 15 is an enlargement of the upper central portion of FIG. 1 showinga computer 1 and/or microchip 90 (and/or 501 and/or 1500, 1501, 1502, or1503) and also shows a lock mechanism 51 in at least one hardware-basedaccess barrier/firewall 50 for the transfer of data or code betweenunits separated by access barrier/firewall 50, such as between thePrivate Unit 53 and the Public Unit 54.

FIG. 15 shows at least one random access memory RAM 66, which includesany volatile RAM, of which DRAM is a common example; volatile RAM isparticularly useful because of its speed and ease of erase, such as bypower interruption. The at least one RAM 66 component is located in theaccess barrier/firewall 50 and is connected to both units like thePublic and Private Units 54 and 53 separated by the accessbarrier/firewall 50; the connection can be made, for example, by a bus,which can be unidirectional like 55 and 56 discussed in previousfigures, or bidirectional like 55/56 shown in FIG. 15.

As shown, the access barrier/firewall lock mechanism 51 includes atleast one switch 58 that is located between the RAM 66 component and thePublic Unit 54 and is shown in the open position so that transmission ofdata and/or code is interrupted or blocked between RAM 66 and PublicUnit 54. In addition, the lock mechanism 51 includes at least one switch57 that is located between the RAM 66 component and the Private Unit 53and is shown in the closed position so that the transmission of dataand/or code is enabled between RAM 66 and Private Unit 53.

FIG. 15 shows the first state of what is an either/or condition of theaccess barrier/firewall lock mechanism 51. In the first state shown,data and/or code can be transmitted between the at least one RAM 66component and the Private Unit 53 in either or both directions, but isblocked in both directions between the RAM 66 component and the PublicUnit 54.

Finally, FIG. 15 shows the potential use anywhere in computers 1 and/ormicrochips 90 and/or 1500, 1501, 1502, or 1503 of a field programmablegate array or arrays (FPGA) 59 (or other means of active hardwareconfiguration), as described under FIG. 1.

FIG. 16 is like FIG. 15 and shows the at least one accessbarrier/firewall lock mechanism 51, but shows the opposite condition ofboth switches 57 and 58 from that shown in FIG. 15. Switch 57 is shownin the open position so that the transmission of data and/or code isinterrupted or blocked between RAM 66 and the Private Unit 53. Switch 58is shown in the closed position so that the transmission of data and/orcode is enabled between RAM 66 and the Public Unit 54.

FIG. 16 thus shows the second state of the either/or condition of theaccess barrier/firewall lock mechanism 51. In the second state shown,data and/or code can be transmitted between the RAM 66 component and thePublic Unit 54 in either or both directions, but is blocked in eitherdirection between the RAM 66 component and the Private Unit 53.

The access barrier/firewall lock mechanism 51 can include any number ofthe RAM 66 components, buses 55, 56, or 55/56, and switches 57 and 58 inany useful configuration in any of the access barriers/firewalls 50shown in other figures of this application or in the applicant'sprevious related applications and patents that have been incorporated byreference. Any other components of the computer or microchip can also beincorporated temporarily or permanently in any lock mechanism 51 toprovide additional useful functions. Any or all of the components of thelock mechanism can be controlled through the secure control bus 48.

In a general way, the lock mechanism 51 example shown in FIGS. 15 and 16functions like a canal lock, which enable canal boats to avoid naturalriver rapids and instead be safely raised or lowered to different canalwater levels by opening a first canal gate to allow a boat to enter at,for example, a lower water level and then shutting that first gate.Water is then allowed to enter the canal lock from the second gate,which holds back a higher level of water on the other side of the canallock and which was shut when the boat first entered the canal lock. Whena sufficient amount of water has entered the lock so that the waterlevel is as high as that outside the second gate, the second gate can beopened to allow the boat to continue at the higher water level.

So in a manner like the canal lock allowing a boat to safely movebetween different water levels of a canal, the access barrier/firewalllock mechanism 51 allows data and/or code to move in a safely controlledfashion between different hardware-based security levels in a microchipor computer. The lock mechanism 51 allows data and/or code to betransmitted between different levels of microchip 90 (or computer 1hardware) security, such as between a Public Unit 54 and a Private Unit53, in a manner of transmission that can be controlled by the mastercontrolling mechanism of the computer 1 and/or microchip 90 (and/or 501,and/or 1500, 1501, 1502, or 1503) using the secure control bus 48, forexample.

The at least one lock mechanism 51 can provide other advantageousembodiments besides the either/or state described above, but theeither/or state embodiment of the lock mechanism 51 described in FIGS.15 and 16 does provide the definite benefit of allowing one and only oneof either the Public Unit 54 or the Private Unit 53 to read and/or writeto the RAM 66 component of the access barrier/firewall 50 at any giventime, thus provide a high degree of secure control. No simultaneousaccess by both Units 53 and 54 would be possible with the lockingmechanism 51 operating on the either/or state example shown.

The one or more access barrier/firewall lock mechanism 51 can includeother computer or microchip components besides the one or more RAM 66component shown that are useful to fulfill the lock mechanism's generalfunction, as well as to provide other security functions between unitssuch as screening or testing data and/or code to be transmitted betweenunits.

The RAM 66 component of the lock mechanism 51 shown in FIGS. 15 and 16can be controlled using the secure control bus 48, including through thememory controller of the RAM 66 component.

Finally, FIG. 16 shows the potential use anywhere in computers 1 and/ormicrochips 90 and/or 1500, 1501, 1502, or 1503 of a field programmablegate array or arrays (FPGA) 59 (or other means of active hardwareconfiguration), as described under FIG. 1.

FIG. 17A is similar to FIGS. 15 and 16 and shows one or more bufferzones 350 that functions like a DMZ (demilitarized zone) or moat betweena Public Unit 54 and an access barrier/firewall 50; it is a physicalbarrier forming a boundary or zone without circuitry between Public andPrivate Units 54 and 53 so that any potential backdoor connectionscannot be disguised in within a highly complex pattern of circuitry on amicrochip (or motherboard of a computer, such as a smart phone, tabletcomputer, or personal computer); except for interruptions for authorizedconnections like the at least one secure control bus 48 (or buses 55, 56or 55/56), an otherwise continuous boundary completely separating twounits, such as the Units 54 and 53, provides the highest level ofsecurity. FIG. 17B shows a cross section of the FIG. 17A embodiment.

The at least one buffer zone 350 can be used, for example, with benefitin either or both of the floorplan or integrated circuit layout of amicrochip 90 (and/or 501 and/or 1500, 1501, 1502, or 1503), but thebuffer zone 350 provides a particularly significant security enhancementparticularly when used in the physical design of a microchip 90 (and/or501 and/or 1500, 1501, 1502, or 1503). One or more buffer zones 350 canbe configured to provide a sufficient vacant space between theintegrated circuits of the Public Unit 54 and the accessbarrier/firewall 50 (including the 50 a, 50 b, or 50 c examples) toensure that no “backdoor” connections exist between any portions of thePublic Unit 54 and the Private Unit 53, or between any two portions ofthe microchip 90 (and/or 501 and/or 1500, 1501, 1502, or 1503) that areseparated by an access barrier/firewall 50). The one or more bufferzones 350 can also be used in the same or similar manner in themotherboard of a computer.

Besides the absence of integrated circuitry, the one or more bufferzones 350 can usefully be configured in three dimensions so that,somewhat like a moat or an indentation, it can interrupt multiple layersof the microchip process used in making the microchip 90 (and/or 501and/or 1500, 1501, 1502, or 1503), including 3D designs, so that thereare no backdoor connections between the Public Unit 54 and the accessbarrier/firewall 50 (or any other units separated by an accessbarrier/firewall 50); a continuous boundary completely separating allmicrochip process layers between two units, such as the Units 54 and 53,provides the highest level of security.

The one or more buffer zones 350 can be of any number or configured inany size or shape or space necessary or useful to facilitate theirfunction or that provides a security benefit. One or more of the bufferzones 350 can be usefully located at or near the same location as a partor all of one or more Faraday Cages 300 or Faraday Cage partitions 301,including for example fitting part or all of a boundary edge of aFaraday Cage 300 or partition 301 into a three dimensional moat-like orindented structure of the one or more buffer zones 350.

The one or more buffer zones 350 can also be configured to protect apart or all of one or more secure control buses 48, such as in thePublic Unit 54 as shown in the FIG. 17A example embodiment.

The one or more buffer zones 350 can be particularly useful prior tomicrochip packaging (or computer assembly), so that it can be visuallyinspected, including by microscopic scanning or other device for manualor automated (including digital) comparison to an approved template,physical or digitized, including by xray or any other usefulelectromagnetic wavelength. The one or more buffer zones 350 can also beconfigured to include, for example, a non-conductive marker material inthe form of a layer that outlines the boundary of the buffer zone, forexample, to enhance the accuracy and speed of a scanning validationprocess to ensure compliance with an approved template and to mark themicrochip for ease of alignment with the template.

The width of the buffer zone 350 can be configured to be any usefulwidth, including to provide electromagnetic radiation buffering againstinterference or surveillance where a Faraday Cage 300 or partition 301are not used; the width can be, for example, at least the size ofprocess used in making the microchip 90 (and/or 501 and/or 1500, 1501,1502, or 1503), such as current examples like 180, 130, 90, 65, 32, or22 nanometer processes, or multiples of any of those processes, such asat least 360 nm, 480 nm, or 720 nm, for example.

The buffer zone 350 can also be positioned between, for example, theaccess barrier/firewall 50 and the Private Unit 53, and it can beincorporated into the access barrier/firewall 50.

More than one buffer zone 350 can be used between any two units in anyconfiguration, as shown in the FIG. 17 example, which shows also oneaccess barrier/firewall 50 with an integrated buffer zone 350 in itscentral portion.

The one or more buffer zones 350 can be configured to allow plannedand/or authorized buses such as 55, 56, and/or 55/56, and/or one or moresecure control buses 48, for example.

Finally, FIG. 17 shows the potential use anywhere in computers 1 and/ormicrochips 90 and/or 1500, 1501, 1502, or 1503 of a field programmablegate array or arrays (FPGA) 59 or (other means of active hardwareconfiguration), as described under FIG. 1.

FIG. 18 is like FIG. 6, but shows an example embodiment with the centralcontroller (C) positioned in Private Unit 53 ¹ and a secondarycontroller (S) 32 in Private Unit 53 ², temporarily or permanently.

In accordance with the present disclosure, a method of protecting acomputer is disclosed in FIG. 19. The computer includes a mastercontrolling device that is configured using hardware and firmware; atleast two general purpose microprocessors; a protected portion of thecomputer; an unprotected portion of the computer; and an innerhardware-based access barrier or firewall that is located between theprotected portion of the computer and the unprotected portion of thecomputer, the protected portion including at least the mastercontrolling device and at least one of the microprocessors, and theunprotected portion including at least one of the microprocessors, theat least one microprocessor of the unprotected portion being separatefrom and located outside of the inner hardware-based access barrier orfirewall. As shown in FIG. 19, the method includes allowing a user ofthe computer to control the microprocessors (150); connecting theprotected portion of the computer through a first connection to at leasta private network of computers (152); connecting the unprotected portionof the computer through a second connection to a public network ofcomputers including the Internet (154); denying access by thehardware-based access barrier or firewall to the protected portion ofthe computer by the public network when the personal computer isconnected to the public network (156); and permitting access by anyother computer in the public network to the one or more of theprocessing units included in the unprotected portion of the computer foran operation with the any other computer in the public network when thepersonal computer is connected to the public network (158).

In accordance with the present disclosure, a method of protecting acomputer disclosed in FIG. 20. The computer includes a mastercontrolling device that is configured using hardware and firmware; atleast two general purpose microprocessors; a protected portion of thecomputer; an unprotected portion of the computer; and an innerhardware-based access barrier or firewall that is located between theprotected portion of the computer and the unprotected portion of thecomputer, the protected portion including at least the mastercontrolling device and at least one of the microprocessors, and theunprotected portion including at least one of the microprocessors, theat least one microprocessor of the unprotected portion being separatefrom and located outside of the inner hardware-based access barrier orfirewall. As shown in FIG. 20, the method includes connecting theprotected portion of the computer through at least a first connection toat least a private network of computers (160); connecting theunprotected portion of the computer through a second connection to anpublic network of computers including the Internet (162); controllingthe computer from the protected portion through the private network(164); and performing operations in the unprotected portion using thepublic network (166).

Any one or more features or components of FIGS. 1-20 of this applicationcan be usefully combined with one or more features or components ofFIGS. 1-31 of the above '657 U.S. application or FIGS. 1-27 of the above'769 U.S. application. Each of the above '657 and '769 applications andtheir associated U.S. publications are expressly incorporated byreference in its entirety for completeness of disclosure of theapplicant's combination of one or more features or components of eitherof those above two prior applications of this applicant with one or morefeatures or components of this application. All such useful possiblecombinations are hereby expressly intended by this applicant.

Furthermore, any one or more features or components of FIGS. 1-20 ofthis application can be usefully combined with one or more features orcomponents of the figures of the above '049 and '553 U.S. applications,as well as in the above '428, '250, '141, '449, '906, '275, '020, '854,'529, '756, and '233 U.S. patents. Each of the above '049 and '553applications and their associated U.S. publications, as well as theabove '428, '250, '141, '449, '906, '275, '020, '854, '529, '756, and'233 U.S. patents are expressly incorporated by reference in itsentirety for completeness of disclosure of the applicant's combinationof one or more features or components of either of those above two priorapplications of this applicant with one or more features or componentsof this application. All such useful possible combinations are herebyexpressly intended by this applicant.

In addition, one or more features or components of any one of FIGS. 1-20or associated textual specification of this application can be usefullycombined with one or more features or components of any one or moreother of FIGS. 1-20 or associated textual specification of thisapplication. And any such combination derived from the figures orassociated text of this application can also be combined with anyfeature or component of the figures or associated text of any of theabove incorporated by reference U.S. applications '657, '769, '049, and'553, as well as U.S. Pat. Nos. '428, '250, '141, '449, '906, '275,'020, '854, '529, '756, and '233.

1-22. (canceled)
 23. A computer or microchip comprising: at least one network connection for connection to at least a public network of computers, said at least one network connection being located in at least one public unit of said computer or microchip, at least one additional and separate network connection for connection to at least a separate, private network of computers, said at least one additional and separate network connection being located in at least one protected private unit of said computer or microchip, and at least one inner hardware-based access barrier or inner hardware-based firewall that is located between and communicatively connects said at least one protected private unit of said computer or microchip and said at least one public unit of said computer; or microchip wherein said private and public units and said two separate network connections are separated by said at least one inner hardware-based access barrier or inner hardware-based firewall; and said at least one protected private unit of the computer or microchip includes at least a first microprocessor and a system BIOS of the computer or microchip located in flash memory; said at least one public unit of the computer or microchip includes at least a second microprocessor, and said second microprocessor is separate from said at least one inner hardware-based access barrier or inner hardware-based firewall.
 24. The computer or microchip of claim 23, wherein the at least one inner hardware-based access barrier or firewall comprises at least one bus with an on/off switch controlling communication input and output.
 25. The computer or microchip of claim 23, wherein said at least one protected private unit of the computer or microchip includes a central controller of the computer or microchip, including a master controlling device or a master control unit.
 26. The computer or microchip of claim 23, wherein said at least one protected private unit of the computer or microchip is not configured to connect to the Internet.
 27. The computer or microchip of claim 23, wherein the computer or microchip is included in one of a personal computer, a smartphone, a tablet computer, a server, a cloud server array, a blade, a cluster, a supercomputer, a supercomputer array, and a game machine.
 28. The computer or microchip of claim 23, wherein the at least one public unit of the computer or microchip includes at least 2 or 4 or 8 or 16 or 32 or 64 or 128 or 256 or 512 or 1024 microprocessors or processing units or cores.
 29. The computer or microchip of claim 23, wherein said at least one additional and separate network connection is at least one wired connection to said at least one separate, private network of computers.
 30. The computer or microchip of claim 23, wherein said at least one additional and separate network connection is at least one wireless connection to said at least one separate, private network of computers.
 31. The computer or microchip of claim 23, wherein the computer or microchip is surrounded by a Faraday Cage.
 32. The computer or microchip of claim 23, wherein the at least one inner hardware-based access barrier or inner hardware-based firewall comprises a bus with an on/off switch controlling communication input and output.
 33. The computer or microchip of claim 23, wherein the at least one public unit of the computer or microchip includes at least a second microprocessor configured to operate as a general purpose microprocessor.
 34. The computer or microchip of claim 23, wherein the computer or microchip is configured to operate as a general purpose computer or microchip.
 35. A computer or microchip configured to be securely controlled through a private network, said computer or microchip comprising: at least a secure private unit of said computer or microchip that is protected by at least one inner hardware-based access barrier or firewall; an unprotected public unit of said computer or microchip, said unprotected public unit including at least one network connection for a network of computers; at least a separate private network connection for at least said private network of computers, at least said separate private network connection being located in at least said secure private unit of said computer or microchip; at least one microprocessor, core or processing unit configured for general purposes is located in said unprotected public unit, wherein said at least one microprocessor, core or processing unit is separate from said second inner hardware-based access barrier or firewall; at least a central controller of the computer or microchip, including a master controlling device or a master control unit and being located in said secure private unit; a system BIOS of the computer or microchip located in flash memory which is located in said secure private unit; and a secure control bus configured to connect at least said master controlling device with at least said microprocessor, core or processing unit located in said unprotected public unit, said secure control bus being isolated from input from said network and input from components of said unprotected public unit; and said master controlling device being configured for securely controlling at least one operation executed by at least one said microprocessor, core or processing unit in said unprotected public unit, said secure control being provided by said master controlling device in said secure private unit through said separate private network to said additional and separate private network connection in said secure private unit and via said secure control bus.
 36. The computer or microchip of claim 35, wherein the inner hardware-based access barrier or firewall comprises at least one bus with an on/off switch controlling communication input and output.
 37. The computer or microchip of claim 35, wherein said master controlling device comprises a microprocessor, core or processing unit configured for general purposes.
 38. The computer or microchip of claim 37, wherein said master controlling device comprises a non-volatile memory.
 39. The computer or microchip of claim 36, wherein said secure control bus provides and ensures direct preemptive control by said master controlling device over said unprotected public unit.
 40. The computer or microchip of claim 35, wherein said secure control bus is configured such that it cannot be affected, interfered with, altered, read from or written to, or superseded by any part of said unprotected public unit or by input from said network.
 41. The computer or microchip of claim 35, wherein said secure control bus is configured such that it can be used by said master controlling device to control one or more secondary controllers located on said secure control bus.
 42. The computer or microchip of claim 41, wherein said one or more secondary controllers are located in the unprotected public unit.
 43. The computer or microchip of claim 40, wherein said one or more secondary controllers are used to control one or more of said at least one microprocessor, core or processing unit located in said unprotected public unit.
 44. The computer or microchip of claim 43, wherein said one or more secondary controllers are integrated with one or more of said at least one microprocessor, core or processing unit located in said unprotected public unit.
 45. The computer or microchip of claim 35, wherein said secure control bus is wired, wireless or a channel.
 46. The computer or microchip of claim 35, wherein said secure control bus is configured to provide a connection to control at least a second firewall located on the periphery of said computer or microchip.
 47. The computer or microchip of claim 35, wherein the inner hardware-based access barrier or inner hardware-based firewall comprises a bus with an on/off switch controlling communication input and output.
 48. A computer or microchip configured to be securely controlled, said computer or microchip comprising: at least one microprocessor, core or processing unit being configured for general purposes and having a connection for a network of computers; at least a master controlling device for the computer or microchip; and a system BIOS of the computer or microchip located in flash memory which is located in a portion of the computer or microchip protected by an inner hardware-based access barrier or firewall; and a secure control bus configured to connect at least said master controlling device with at least said at least one microprocessor, core or processing unit, and said secure control bus being isolated from input from said network and input from components of said computer or microchip other than said master controlling device; and said master controlling device being configured for securely controlling at least one operation executed by at least one said microprocessor, core or processing unit, said secure control being provided by said master controlling device via said secure control bus.
 49. The computer or microchip of claim 48, wherein the inner hardware-based access barrier or firewall comprises a bus with an on/off switch controlling communication input and output.
 50. The computer or microchip of claim 48, wherein said master controlling device comprises a microprocessor, core or processing unit configured for general purposes.
 51. The computer or microchip of claim 48, wherein said master controlling device comprises a non-volatile memory.
 52. The computer or microchip of claim 48, wherein said secure control bus provides and ensures direct preemptive control by said master controlling device over said at least one microprocessor, core or processing unit.
 53. The computer or microchip of claim 48, wherein said secure control bus is configured such that it cannot be affected, interfered with, altered, read from or written to, or superseded by any part of said unprotected public unit or by input from said network.
 54. The computer or microchip of claim 48, wherein said secure control bus is configured such that it can be used by said master controlling device to control one or more secondary controllers located on said secure control bus.
 55. The computer or microchip of claim 48, wherein said secure control bus is wired, wireless or a channel.
 56. The computer or microchip of claim 48, wherein said secure control bus provides a connection to control a firewall located on the periphery of said computer or microchip.
 57. The computer or microchip of claim 23, wherein said master controlling device comprises a microprocessor, core or processing unit configured for general purposes. 