Combined RSM State-Change Initiation Sequence

ABSTRACT

A user&#39;s intention to perform a computer operation is confirmed in order to safeguard against accidental performance of the operation. The operation is initiated only after a user&#39;s intention to perform the operation is confirmed. The user&#39;s intention is confirmed by changing, within the computer configuration, the state of the combined presence of a first removable storage medium and a second removable storage medium. The user&#39;s intention is confirmed without requiring the use of a user-input device of a computer.

CROSS REFERENCE TO RELATED APPLICATIONS

[0001] This patent application is a continuation application claimingpriority in the United States under 35 U.S.C. § 120 to the benefit ofthe filing date of international patent application serial No.PCT/US02/40106, filed designating the United States on Dec. 16, 2002,and titled “Initiation Sequences For Performing Protected ComputerOperations” (and to be published in English), which international patentapplication is incorporated herein by reference. This application alsorelates to the same field of invention as the current assignee's U.S.patent application Ser. No. 10/248,424, filed Jan. 18, 2003, which isthe nonprovisional of provisional U.S. patent application serial No.60/350,434, filed Jan. 22, 2002, both of which are incorporated hereinby reference.

BACKGROUND OF INVENTION

[0002] It is desirable when a certain operation is to be performed on acomputer to require user confirmation for such operation beforeinitiation thereof. By way of example and not limitation, suchoperations include, for example, operations that are potentiallydamaging or result in irreversible changes to the computer, such as alow-level disk formatting of the computer's hard drive; restoring thecomputer to a previous, known state; reinstallation of the operatingsystem of the computer; or performing emergency repair operations on thecomputer. Additional operations, for example, are set forth anddiscussed in the “Exemplary Commercial Utilizations” section below.

[0003] By confirming an intention of a user to perform an operation onthe computer, the operation is “protected” from accidentally beingperformed. User confirmation is determined by: (1) communicating by thecomputer a warning to the user through a user-output device associatedwith the computer; and (2) in response thereto, communicating by theuser a signal to the computer through a traditional user-input deviceassociated with the computer. A user-output device includes, forexample, a video display monitor, a light, or a speaker and the like. Atraditional user-input device includes, for example, a keyboard, a touchscreen, a mouse, or a microphone and the like.

[0004] Unfortunately, there are circumstances in which a user'sintention to perform an operation cannot be confirmed beforehand and,thus, the operation is unprotected from accidental performance. Forexample, a user's intention to perform an operation cannot be confirmedwhen there are no traditional user-input and/or user-output devices. Auser's intention to perform an operation also cannot be confirmed whenuser-input and/or user-output devices associated with a computermalfunction or otherwise are disabled. A user's intention to perform anoperation also cannot be confirmed when the operation itself must besuccessfully performed on the computer before the associated user-inputand/or user-output devices may even be initialized. Under thesecircumstances, allowing an operation to be performed on the computerwithout user confirmation is undesirable but, nevertheless, necessary.

[0005] The disadvantages of not being able to confirm a user'sintentions to perform an operation are particularly apparent when anoperation is to be performed on a “headless server” using a “bootstrapprogram.” In this regard, a “headless server” is a computer that hasneither monitor, keyboard, nor mouse and that functions as a server in acomputer network. Headless servers are found in common computernetworks. A bootstrap program is a program that automatically executesupon booting of a computer.

[0006] When an operation is to be performed on a headless server using abootstrap program, the headless server is booted from auto-runningbootstrap media, such as a floppy disk or CD having the bootstrapprogram, by placing the floppy disk or CD in a drive of the headlessserver and rebooting it. Using such auto-running bootstrap media, aheadless server can be initialized with a base operating system (“O/S”)or otherwise restored to an operational condition. Once running, theserver then can be configured, for example, by way of a networkconnected terminal. The headless server then might run unattended formonths or years. Unfortunately, if the bootstrap media is inadvertentlyleft in the drive of the headless server (which frequently happens),then, upon reboot months or years later, the operation performed by theauto-running bootstrap program on the headless server automaticallyrestarts contrary to the actual intention of the user. Such anaccidental restarting of the bootstrap program (which does not seek toconfirm a user's intention to perform again the operation) oftenindicates deletion of or damage to data and security information on theheadless server.

[0007] A solution to the “forgotten media” problem is to require areboot after execution of the operation in order for the headless serverto resume normal operations. Leaving the bootstrap media in the drivethen will place the computer in an endless loop of repeatedly rebootingand running the protected program until the bootstrap media is removedor otherwise disabled. While certainly not as costly as destroyingmonths or years of data, the requirement of a reboot nonetheless proveswasteful and frustrating when the bootstrap media is inadvertently leftin the drive.

[0008] In view of the foregoing, a need exists for a system and methodfor confirming a user's intention to perform a computer operation whenthere are no traditional user-input and/or user-output devices connectedto a computer. A need further exists for a system and method forconfirming a user's intention to perform a computer operation whenuser-input and/or user-output devices associated with a computermalfunction, and/or when user-input and/or user-output devicesassociated with a computer are disabled. A need also exists for a systemand method for confirming a user's intention to perform a computeroperation when the operation itself must be successfully performed on acomputer before the associated user-input and/or user-output devices mayeven be initialized.

[0009] Additionally, a particular need exists for a system and methodfor confirming a user's intention to perform an operation on a headlesscomputer, especially one that functions as a server in a computernetwork.

[0010] One or more of these needs are met by one or more embodiments ofthe present invention.

SUMMARY OF INVENTION

[0011] The field of the present invention generally relates toperformance of computer operations and, in particular, to a system andmethod for initiating a computer operation only after a user's intentionto perform such operation is confirmed.

[0012] First Aspect of the Present Invention. RSM-Resident Program PairInitiation Sequence

[0013] Briefly described, the present invention broadly relates to asystem and method in which a user's intention to perform a computeroperation is confirmed. Thus, the present invention guards against acomputer operation being inadvertently performed.

[0014] In accordance with a first aspect of the present invention, amethod for protecting against an unintentional computer operation beingperformed includes the step of initiating the operation only after auser's intention to perform the operation is confirmed. The user'sintention is confirmed: (a) by replacing within a computer configurationa first removable storage medium (“RSM”) after a first program thereonhas been read with a second removable storage medium including thereon asecond program, the first program including computer-executableinstructions resulting in the reading and running of the second program,and the second program including computer-executable instructionsresulting in the initiating of the operation; and (b) without requiringthe use of a user-input device of a computer.

[0015] In further accordance with this aspect of the present invention,a method for confirming without requiring use of a user-input device auser's intention to perform a computer operation includes the steps of:reading and running a first program stored on a first removable storagemedium within a computer configuration; in accordance with the firstprogram, reading and running a second program stored on a secondremovable storage medium substituted within the computer configurationfor the first removable storage medium; and in accordance with thesecond program, initiating the operation. This method utilizescomputer-readable media having computer-executable instructions forperforming the steps of this method.

[0016] Also in accordance with this aspect of the present invention, ina computer configuration including hardware capable of accessing aparticular type of removable storage media only singly, a method forconfirming without requiring use of a user-input device of a computer auser's intention to perform a computer operation includes reading andrunning a first program stored on a first removable storage medium ofsaid type within the computer configuration using the hardware.Furthermore, the method includes reading and running, in accordance withthe first program, a second program on a second removable storage mediumof said type using the hardware. The method also includes, in turn,initiating the operation in accordance with the second program. Thecomputer configuration also may further include computer-readable mediahaving computer-executable instructions for performing the steps of thismethod.

[0017] A combination in accordance with this aspect of the presentinvention includes first and second removable storage media, eachreadable by a computer and collectively having computer-executableinstructions for performing a method for initiating a computer operationonly after a user's intention to perform the operation is confirmedwithout requiring use of a user-input device of the computer. The firstremovable storage medium has computer-executable instructions forreading and running a program on the second removable storage medium,and the second removable storage medium has computer-executableinstructions for initiating the operation. Moreover, thecomputer-executable instructions on the second removable storage mediumforms part of the program that is read and run in accordance with thecomputer-executable instructions on the first removable storage medium.The first removable storage medium may be a bootstrap medium, with thecomputer-executable instructions forming part of a bootstrap program.

[0018] Second Aspect of the Present Invention: RSM-Resident ProgramInitiation Sequence

[0019] In accordance with a second aspect of the present invention, amethod for protecting against an unintentional computer operation beingperformed includes the step of initiating the operation only after auser's intention to perform the operation is confirmed. The user'sintention is confirmed by replacing within a computer configuration afirst removable storage medium with a second removable storage medium.The first removable storage medium is replaced with the second removablestorage medium after a program on the first removable storage medium hasbeen read. The program includes computer-executable instructions fordetermining the presence (i.e., the presence or absence) within thecomputer configuration of the second removable storage medium in placeof the first removable storage medium. The user's intention is confirmedwithout requiring the use of a user-input device of a computer.

[0020] In further accordance with this second aspect of the presentinvention, a method for confirming without requiring use of a user-inputdevice a user's intention to perform an operation includes the steps of:reading and running a program stored on a first removable storage mediumwithin a computer configuration; in accordance with the program,determining in a check the presence within the computer configuration ofa second removable storage medium in place of the first removablestorage medium; and initiating the operation only after the checkindicates the presence of the second removable storage medium in placeof the first removable storage medium. This aspect of the invention alsoincludes computer-readable media having computer-executable instructionsfor performing the steps of this method.

[0021] Also in accordance with this second aspect of the presentinvention, in a computer configuration including hardware capable ofaccessing a particular type of removable storage media only singly, amethod for confirming without requiring use of a user-input device auser's intention to perform an operation includes: reading and running aprogram stored on a first removable storage medium of the type within acomputer configuration using the hardware; in accordance with theprogram, accessing a second removable storage medium of the type usingthe hardware; and initiating the operation only after the secondremovable storage medium is successfully accessed using the hardware inaccordance with the first program. The computer configuration also mayfurther include computer-readable media having computer-executableinstructions for performing the steps of this method.

[0022] In yet further accordance with this second aspect of the presentinvention, a first removable storage medium that is readable by acomputer has computer-executable instructions for performing a methodfor initiating an operation only after a user's intention to perform theoperation on the computer is confirmed without requiring use of auser-input device of a computer. The method includes the steps of:determining in a check the presence within the computer configuration ofa second removable storage medium that has been substituted for thefirst removable storage medium; and initiating the operation only afterthe check indicates the presence of the second removable storage mediumin place of the first removable storage medium. The first removablestorage medium may be a bootstrap medium, with the computer-executableinstructions forming part of a bootstrap program.

[0023] Third Aspect of the Present Invention. Sequential RSM PresenceInitiation Sequence

[0024] In accordance with a third aspect of the present invention, amethod for protecting against an unintentional computer operation beingperformed includes the step of initiating the operation only after auser's intention to perform the operation is confirmed. The user'sintention is confirmed by replacing within a computer configuration afirst removable storage medium with a second removable storage medium.Additionally, the user's intention is confirmed without requiring theuse of a user-input device of a computer.

[0025] In further accordance with this fourth aspect of the presentinvention, a method for confirming without requiring use of a user-inputdevice a user's intention to perform an operation includes the steps of:determining in a first check the presence within a computerconfiguration of a first removable storage medium; determining in asecond check the presence within the computer configuration of a secondremovable storage medium in place of the first removable storage medium;and initiating the operation only after the first check indicates thepresence of the first removable storage medium within the computerconfiguration and the second check indicates the presence of the secondremovable storage medium within the computer configuration in place ofthe first removable storage medium. This aspect of the invention alsoincludes computer-readable media having computer-executable instructionsfor performing the steps of this method.

[0026] Also in accordance with this third aspect of the presentinvention, in a computer configuration including hardware capable ofaccessing a particular type of removable storage media only singly, amethod for confirming without requiring use of a user-input device auser's intention to perform an operation includes accessing the firstremovable storage medium using the hardware; accessing the secondremovable storage medium using the hardware; and initiating theoperation on the computer only after the first removable storage mediumis successfully accessed and the second removable storage medium issuccessfully accessed. The computer configuration also may furtherinclude computer-readable media having computer-executable instructionsfor performing the steps of this method.

[0027] In yet further accordance with this third aspect of the presentinvention, a first removable storage medium readable by a computer andhas computer-executable instructions for performing a method forinitiating an operation only after a user's intention to perform theoperation is confirmed. Additionally, the user's intention is confirmedwithout requiring use of a user-input device of a computer. The methodfurther includes the steps of determining in a first check the presencewithin the computer configuration of the first removable storage medium;determining in a second check the presence of a second removable storagemedium in place of the first removable storage medium within thecomputer configuration; and initiating the operation only after thefirst check indicates the presence of the first removable storage mediumwithin the computer configuration and the second check indicates thepresence of the second removable storage medium in place of the firstremovable storage medium within the computer configuration. The firstremovable storage medium may be a bootstrap medium, with thecomputer-executable instructions forming part of a bootstrap program.

[0028] Fourth Aspect of the Present Invention: Bootstrap RSM RemovalInitiation Sequence

[0029] In accordance with a fourth aspect of the present invention, amethod for protecting against an unintentional computer operation frombeing performed includes the step of removing from the computerconfiguration a removable storage medium (i) after a program on theremovable storage medium has been read and (ii) before a check for thecontinued presence of the removable storage medium within the computerconfiguration is performed in accordance with the program. Moreover, theuser's intention to perform the operation is confirmed without requiringthe use of a user-input device of the computer.

[0030] In further accordance with this fourth aspect of the presentinvention, a computerized method for confirming, without requiring useof a user-input device, a user's intention to perform an operationincludes the steps of: reading and running a program stored on aremovable storage medium within a computer configuration; and inaccordance with the first program, (i) determining in a check thecontinued presence within the computer configuration of the removablestorage medium; and (ii) initiating the operation only after the checkindicates the absence of the removable storage medium within thecomputer configuration. This aspect of the invention also includescomputer-readable media having computer-executable instructions forperforming the steps of this computerized method.

[0031] Also in accordance with this fourth aspect of the presentinvention, in a computer configuration including hardware, acomputerized method for confirming, without requiring use of auser-input device, a user's intention to perform an operation includes:reading and running a program on a removable storage medium using thehardware in a first step; and in accordance with the first program, (i)accessing the removable storage medium using the hardware in a secondstep, and (ii) initiating the operation only after unsuccessful accessto the removable storage medium using the hardware in the second step.The computer configuration also may further include computer-readablemedia having computer-executable instructions for performing the stepsof this computerized method.

[0032] In yet further accordance with this fourth aspect of the presentinvention, a removable storage medium readable by a computer hascomputer-executable instructions for performing a method for initiatingan operation only after a user's intention to perform the operation isconfirmed without requiring use of a user-input device. The methodincludes the steps of: determining in a check the continued presencewithin the computer configuration of the removable storage medium withinthe computer configuration; and initiating the operation only after thecheck indicates the absence of the removable storage medium within thecomputer configuration. The first removable storage medium may be abootstrap medium, with the computer-executable instructions forming partof a bootstrap program.

[0033] Fifth Aspect of the Present Invention: RSM Removal InitiationSequence

[0034] In accordance with a fifth aspect of the present invention, amethod for protecting against an unintentional operation being performedincludes the step of initiating the operation only after a user'sintention to perform the operation is confirmed. The user's intention isconfirmed by removing from the computer configuration a removablestorage medium (i) after a check for the presence of the removablestorage medium within the computer configuration is performed and (ii)before a check for the continued presence of the removable storagemedium within the computer configuration is performed. The user'sintention is confirmed without requiring the use of a user-input deviceof a computer.

[0035] In further accordance with this fifth aspect of the presentinvention, a computerized method for confirming, without requiring useof a user-input device, a user's intention to perform an operationincludes the steps of: determining in a first check the presence withina computer configuration of a removable storage medium; determining in asecond check the continued presence within the computer configuration ofthe removable storage medium; and initiating the operation only afterthe first check indicates the presence of the removable storage mediumwithin the computer configuration and the second check indicates theabsence of the removable storage medium within the computerconfiguration. This aspect of the invention also includescomputer-readable media having computer-executable instructions forperforming the steps of this computerized method.

[0036] Also in accordance with this fifth aspect of the presentinvention, in a computer configuration including a computer and hardwarecapable of accessing removable storage media, a computerized method forconfirming without requiring use of a user-input device a user'sintention to perform an operation includes: accessing a removablestorage medium using the hardware in a first step; subsequentlyaccessing the removable storage medium using the hardware in a secondstep; and initiating the operation only after the removable storagemedium is successfully accessed in the first step but is unsuccessfullyaccessed in the second step. The computer configuration also may furtherinclude computer-readable media having computer-executable instructionsfor performing the steps of this computerized method.

[0037] In yet further accordance with this fifth aspect of the presentinvention, a removable storage medium readable by a computer hascomputer-executable instructions for performing a method for initiatingan operation only after a user's intention to perform the operation onthe computer is confirmed without requiring use of a user-input device.The method includes the steps of: determining in a first check thepresence within the computer configuration of the removable storagemedium; determining in a second check the continued presence within thecomputer configuration of the removable storage medium; and initiatingthe operation only after the first check indicates the presence of thefirst removable storage medium within the computer configuration and thesecond check indicates the absence of the first removable storage mediumwithin the computer configuration. In this aspect of the presentinvention, the first removable storage medium may be a bootstrap medium,with the computer-executable instructions forming part of a bootstrapprogram.

[0038] Sixth Aspect of the Present Invention: Combined RSM State-ChangeInitiation Sequence

[0039] In accordance with a sixth aspect of the present invention, amethod for protecting against an unintentional computer operation beingperformed includes the step of initiating the operation only after auser's intention to perform the operation is confirmed. The user'sintention is confirmed by changing within the computer configuration thecombined presence of a first removable storage medium and a secondremovable storage medium. The user's intention is confirmed withoutrequiring the use of a user-input device of a computer.

[0040] In further accordance with this sixth aspect of the presentinvention, a computerized method for confirming, without requiring useof a user-input device, a user's intention to perform an operationincludes the steps of: determining in a first check the state of thecombined presence within a computer configuration of first and secondremovable storage media; determining in a second check the state of thecombined presence within the computer configuration of the first andsecond removable storage media; and initiating the operation only afterthe first and second checks result in a state change. The step ofinitiating the operation is performed when the first check indicates thecombined presence of the removable storage media within the computerconfiguration and the second check indicates the absence of one of orboth removable storage media or, alternatively, the step of initiatingthe operation is performed when the first check indicates the absence ofone of or both removable storage media within the computer configurationand the second check indicates the combined presence of both removablestorage media. This aspect of the invention also includescomputer-readable media having computer-executable instructions forperforming the steps of this computerized method.

[0041] Also in accordance with this sixth aspect of the presentinvention, in a computer configuration including hardware capable ofaccessing in parallel first and second removable storage media, acomputerized method for confirming, without requiring use of a userinput device, a user's intention to perform a computer operationincludes: accessing in a first step both the first and second removablestorage medium using the hardware; accessing in a second step both thefirst and second removable storage medium using the hardware; andinitiating the operation on the computer only after accessing both mediain one of the first and second steps is successful and accessing bothmedia in the other of the first and second steps is unsuccessful. Thecomputer configuration also may further include computer-readable mediahaving computer-executable instructions for performing the steps of thiscomputerized method.

[0042] In yet further accordance with this sixth aspect of the presentinvention, a first removable storage medium readable by a computer hascomputer-executable instructions for performing a method for initiatinga computer operation only after a user's intention to perform theoperation is confirmed without requiring use of a user-input device of acomputer. The method includes the steps of: determining in a first checkthe combined presence within the computer configuration of both thefirst and second removable storage media; determining in a second checkthe combined presence within the computer configuration of both thefirst and second removable storage media; and initiating the operationonly after the first and second checks indicate a state change. The stepof initiating the operation is performed when the first check indicatesthe combined presence of the removable storage media within the computerconfiguration and the second check indicates the absence of one of orboth removable storage media or, alternatively, the step of initiatingthe operation is performed when the first check indicates the absence ofone of or both removable storage media within the computer configurationand the second check indicates the combined presence of both removablestorage media. In this aspect of the present invention, the firstremovable storage medium may be a bootstrap medium, with thecomputer-executable instructions forming part of a bootstrap program.

[0043] These aspects and features and other aspects and features of thepresent invention will be more readily understood and apparent uponconsideration of the attached drawings and of the following detaileddescription of those drawings and the presently preferred embodiments ofthe invention.

BRIEF DESCRIPTION OF DRAWINGS

[0044] Further features and benefits of the present invention will beapparent from a detailed description of preferred embodiments thereoftaken in conjunction with the following drawings, wherein similarelements are referred to with similar reference numbers, and wherein,

[0045]FIG. 1 illustrates a first preferred embodiment of a digitalcomputer configuration of the invention;

[0046]FIG. 2 illustrates a second preferred embodiment of a digitalcomputer configuration of the invention;

[0047]FIG. 3 illustrates a third preferred embodiment of a digitalcomputer configuration of the invention;

[0048]FIG. 4 illustrates a fourth preferred embodiment of a digitalcomputer configuration of the invention;

[0049]FIG. 5 illustrates a flow diagram of steps of a first preferredembodiment of a method of the invention;

[0050]FIG. 6 illustrates a flow diagram of steps of a second preferredembodiment of a method of the invention;

[0051]FIG. 7 illustrates a flow diagram of steps of a third preferredembodiment of a method of the invention;

[0052]FIG. 8 illustrates a flow diagram of steps of a fourth preferredembodiment of a method of the invention;

[0053]FIG. 9 illustrates a flow diagram of steps of a fifth preferredembodiment of a method of the invention;

[0054]FIG. 10 illustrates a flow diagram of steps of a sixth preferredembodiment of a method of the invention; and

[0055]FIG. 11 illustrates a flow diagram of additional steps of thesixth preferred embodiment.

DETAILED DESCRIPTION

[0056] As a preliminary matter, it will readily be understood by thosepersons skilled in the art that the present invention is susceptible ofbroad utility and application in view of the following detaileddescription of preferred embodiments of the present invention. Manydevices, methods, embodiments, and adaptations of the present inventionother than those herein described, as well as many variations,modifications, and equivalent arrangements thereof, will be apparentfrom or reasonably suggested by the present invention and the followingdetailed description thereof, without departing from the substance orscope of the present invention. Accordingly, while the present inventionis described herein in detail in relation to preferred embodiments, itis to be understood that this disclosure is illustrative and exemplaryand is made merely for purposes of providing a full and enablingdisclosure of preferred embodiments of the invention. The disclosureherein is not intended nor is to be construed to limit the presentinvention or otherwise to exclude any such other embodiments,adaptations, variations, modifications and equivalent arrangements, thepresent invention being limited only by the claims appended hereto andthe equivalents thereof.

[0057] A First Preferred Computer Configuration

[0058] Referring to FIG. 1, a first preferred computer configuration 100is shown in accordance with the present invention. The computerconfiguration 100 includes a digital computer 102 illustrated as alaptop computer and hardware 104 comprising a DVD drive. Removablestorage media 106,108 are illustrated as first and second DVD or CD-ROMdisks. These disks are insertable into the DVD drive of the computerconfiguration 100 for reading thereof by the computer 102.

[0059] The computer configuration 100 includes computer-executableinstructions for performing at least one of the preferred methods of thepresent invention, which are described in detail below. In accordancewith one or more of the preferred methods described below, thecomputer-executable instructions are included on one or morecomputer-readable medium, such as a DVD or CD-ROM disk. Furthermore, inaccordance with one or more of the preferred methods described below, atleast one of the removable storage media includes a bootstrap programfor booting of the laptop computer.

[0060] A Second Preferred Computer Configuration

[0061] A second preferred computer configuration 200 is shown in FIG. 2in accordance with the present invention. Similar to the computerconfiguration 100 of FIG. 1, the computer configuration 200 of FIG. 2includes a digital computer 202 having hardware 204 in which first andsecond removable media 206,208 are insertable for reading by thecomputer 202. Unlike the computer configuration 100 of FIG. 1, thecomputer 202 is illustrated as a headless server, as the computerconfiguration 200 includes no user-input or output devices; the hardware204 comprises a floppy drive; and the removable storage media 206,208comprise floppy disks.

[0062] The computer configuration 200 includes computer-executableinstructions for performing at least one of the preferred methods of thepresent invention, which are described in detail below. In accordancewith one or more of the preferred methods described below, thecomputer-executable instructions are included on one or morecomputer-readable medium, such as a floppy disk. Furthermore, inaccordance with one or more of the preferred methods described below, atleast one of the removable storage media includes a bootstrap programfor booting of the headless server.

[0063] A Third Preferred Computer Configuration

[0064] A third preferred computer configuration 300 is shown in FIG. 3in accordance with the present invention. Similar to the aforementionedcomputer configuration 100,200, the computer configuration 300 includesa digital computer 302 having hardware 304 in which first and secondremovable media 306,308 are insertable for reading by the computer 302.Further like the computer configuration 200, the computer configuration300 also includes a headless server as the digital computer 302, as thecomputer configuration 300 includes no user-input or output devices. Theremovable storage media 306,308 also comprise floppy disks. However,unlike the computer configurations 200 illustrated in FIG. 2, thehardware 304 includes two floppy drives each capable of reading theremovable storage media 306,308.

[0065] The computer configuration 300 includes computer-executableinstructions for performing at least one of the preferred methods of thepresent invention, which are described in detail below. In accordancewith one or more of the preferred methods described below, thecomputer-executable instructions are included on one or morecomputer-readable medium, such as a floppy disk. Furthermore, inaccordance with one or more of the preferred methods described below, atleast one of the removable storage media includes a bootstrap programfor booting of the headless server.

[0066] A Fourth Preferred Computer Configuration

[0067] A fourth preferred computer configuration 400 is shown in FIG. 4in accordance with the present invention and includes a computer network412. The computer configuration 200 of FIG. 2 forms part of the computerconfiguration 400 illustrated in FIG. 4, as the computer configuration200 represents a node 410 of the computer network 412. The computerconfiguration 200 includes the digital computer 202 and hardware 204 inwhich first and second removable storage media 406,408 are insertablefor reading by the computer 202. Another node 414 of the computernetwork 412 includes a second digital computer 416 having hardware 418for reading of the removable storage media 406,408. The computer network412 also may include a network attached device (NAD) 420 from which acomputer program may be centrally executed for selective performance ofan operation on digital computers 202,416.

[0068] The computer configuration 400 includes computer-executableinstructions for performing at least one of the preferred methods of thepresent invention, which are described in detail below. In accordancewith one or more of the preferred methods described below, thecomputer-executable instructions are included on one or morecomputer-readable medium, such as a floppy disk or a hard disk. Forexample, in accordance with one or more of the preferred methodsdescribed below, a hard disk of a NAD may include computer-executableinstructions for performing a preferred method.

[0069] A First Preferred Method

[0070] Referring now to FIG. 5, steps of a first preferred method 500 inaccordance with the present invention are illustrated. The preferredmethod 500 begins (Step 502) with a cold boot or reboot of a digitalcomputer, such as, for example, any of the digital computers 102,202 ofFIGS. 1-2. During boot-up, the computer generally boots by readingbootstrap storage medium specified in its BIOS settings, which mayinclude, for example, reading from a hard drive, a floppy drive, aCD-ROM or DVD drive, a ZIP drive, or any sequence thereof.

[0071] In accordance with the first preferred method 500, a “first”removable storage medium (“RSM”) is included in the computerconfiguration, such as, for example, any of removable storage media106,206, and the first RSM includes a “first” program that is run (Step504) during boot-up. Preferably the BIOS settings of the computer causesthe computer to attempt to boot first from-hardware; the first RSM is abootstrap storage medium inserted into such hardware; and the firstprogram itself comprises the bootstrap program from which the computerboots. Thus, for example, in the computer configuration 100 of FIG. 1,the first program preferably comprises a bootstrap program on the firstDVD or CD-ROM disk from which the laptop computer boots, and in thecomputer configuration 200 of FIG. 2, the first program preferablycomprises a bootstrap program on the first floppy disk from which theheadless server boots. Alternatively, if the first program is not abootstrap program, then in this case the bootstrap program-whetherresiding on the first RSM or elsewhere-preferably instructs the computerto run the first program residing on the first RSM.

[0072] In either case, when run the first program instructs the computerto run (Step 506) a “second” program that is found on a “second” RSM,such as, for example, any of removable storage media 108,208. If thecomputer is unable to read from the second RSM at the appropriate timein order to run the second program (for example, either because thesecond disk is not in the drive or because the disk is not the seconddisk and does not actually include the second program), then the secondprogram is not successfully run.

[0073] On the other hand, if the computer is able to read the secondprogram on the second RSM, then the second program is successfully run.Successful running of the second program initiates the operation on thecomputer and, in accordance with this preferred method of the presentinvention, the second program must be successfully run in order toinitiate the operation.

[0074] In order to enable a user to replace the first RSM with thesecond RSM after the first program is read from the first RSM (readingof the first program from the first RSM being required in order to runthe first program), a sufficient period of time exists between thereading of the first program from the first RSM and the running of thesecond program on the second RSM. In this respect, the first programpreferably instructs the computer to wait (Step 508) for a period thatbegins after the first program is read from the first RSM and endsbefore an attempt is made to run the second program. Accordingly, a userobserving the reading of the first RSM followed by the cessation ofactivity then will have sufficient time in which to switch out the firstRSM for the second RSM before an attempt is made to run the secondprogram on the second RSM.

[0075] In accordance with the first preferred method, withoutsuccessfully running the second program on the second RSM, the operationon the computer will not be initiated. Running of the second programthat is located on the second RSM is a prerequisite to initiation of theoperation on the computer in accordance with this preferred embodimentof the present invention.

[0076] Following the attempt to run the second program, whethersuccessful or not, the preferred method then ends (Step 510).

[0077] In a variation of the first preferred method as shown in dashedlines in FIG. 5, additional attempts to run the second program may alsobe made in accordance with the present invention. In this regard, thecomputer may repeat, for a predetermined number of times and/or for apredetermined time period of time, additional attempts to runsuccessfully the second program on the second RSM before timing out.Under this optional scenario, a determination is made (Step 512) whetherthe attempt to run the second program on the second RSM was successful.If unsuccessful, then a determination is made whether the predeterminednumber of attempts has been reached and/or whether the predeterminedperiod of time has expired. If the predetermined number of attempts hasnot been reached and/or the predetermined period of time has notexpired, then the computer again waits (Step 508) and then runs (Step506) the second program on the second RSM. If the predetermined numberof attempts has been reached and/or the predetermined period of time hasexpired, then the preferred method ends (Step 510) with no furtherattempts to run the second program on the second RSM.

[0078] In view of the foregoing detailed disclosure, it will be apparentthat the first preferred method 500 of the present invention representsan initiation sequence that must be successfully performed beforeinitiation of an operation on the computer. The operation is therebyprotected from accidental initiation because a user's intention toperform the operation is confirmed by the physical exchange of theremovable storage media within the computer configuration.

[0079] It will further be apparent that in accordance with thispreferred method 500, a user's intention to perform the operation isconfirmed without requiring the use of user-input and user-outputdevices. No keyboard, mouse, monitor, microphone, speaker, touch screen,or the like is required in order to perform the initiation sequence ofthe operation. Nor is an on-screen user prompt required in order toconfirm the user's intention to perform the operation on the computer.The physical substitution of the second RSM for the first RSM in thecomputer configuration is a physical act that necessarily must beperformed by a user at that time and represents confirmation of theuser's intentions to initiate and perform the operation on the computerat that time.

[0080] A Second Preferred Method

[0081] Referring now to FIG. 6, steps of a second preferred method 600in accordance with the present invention are illustrated. The preferredmethod 600 begins (Step 602) with a cold boot or reboot of a digitalcomputer, such as, for example, any of the digital computers 102,202 ofFIGS. 1-2. During boot-up, the computer generally boots by readingbootstrap storage medium specified in its BIOS settings, which mayinclude, for example, reading from a hard drive, a floppy drive, aCD-ROM or DVD drive, a ZIP drive, or any sequence thereof.

[0082] In accordance with the second preferred method 600, a “first” RSMis included in the computer configuration, such as, for example, any ofremovable storage media 106,206, and the first RSM includes a “first”program that is run (Step 604) by the computer during boot-up.Preferably the BIOS settings of the computer causes the computer toattempt to boot first from, for example, hardware; the first RSM is abootstrap storage medium inserted into such hardware; and the firstprogram itself comprises the bootstrap program from which the computerboots. Thus, for example, in the computer configuration 100 of FIG. 1,the first program preferably comprises a bootstrap program on the firstDVD or CD-ROM disk from which the laptop computer boots, and in thecomputer configuration 200 of FIG. 2, the first program preferablycomprises a bootstrap program on the first floppy disk from which theheadless server boots. Alternatively, if the first program is not abootstrap program, then in this case the bootstrap program-whetherresiding on the first RSM or elsewhere-preferably instructs the computerto run the first program on the first RSM.

[0083] In either case, the first program instructs the computer todetermine (Step 616) whether a “second” RSM, such as, for example, anyof removable storage media 108,208, is present within the computerconfiguration. Thus, for example, in the computer configuration 100 ofFIG. 1, the computer determines whether the second DVD or CD-ROM disk ispresent in the DVD drive. In the computer configuration 200 of FIG. 2,the computer determines whether the second floppy disk is present in thefloppy drive.

[0084] Generally, the presence of the second RSM is determined byattempting to access a directory or file known to exist on the secondRSM. Such access includes reading from the second RSM and/or writing tothe second RSM, including the running of a program on the second RSM. Ifaccess is successful, then the second RSM is determined to be present.Thus, for example, the presence of the second DVD or CD-ROM diskpreferably is determined in the computer configuration 100 of FIG. 1,for example, by checking the drive for a known identifier of the seconddisk, such as a disk serial number. The presence of the second floppydisk preferably is determined in the computer configuration 200 of FIG.2, for example, by checking the floppy drive for a known identifier ofthe second floppy disk, such as a disk serial number.

[0085] If the second RSM is determined not to be present within thecomputer configuration, then the operation on the computer is notinitiated and this preferred method ends (Step 610). Preferably, thispreferred method 600 will have to be started again in order to initiatethe operation on the computer. If the second RSM is determined to bepresent within the computer configuration, then the operation on thecomputer is initiated (Step 618) and this preferred method ends (Step610).

[0086] In order to enable a user to replace the first RSM with thesecond RSM after the first program is read from the first RSM, asufficient period of time exists between the reading of the firstprogram from the first RSM and the check for the presence of the secondRSM. In this respect, the first program preferably instructs thecomputer to wait (Step 608) for a period that begins after the firstprogram is read from the first RSM and ends before a check is made forthe second RSM. Accordingly, a user observing the reading of the firstRSM followed by the cessation of activity then will have sufficient timein which to substitute the second RSM for the first RSM before the checkis made for the presence of the second RSM within the computerconfiguration.

[0087] In accordance with the second preferred method, withoutsuccessfully determining the presence of the second RSM within thecomputer configuration in Step 616, the operation on the computer willnot be initiated. The presence of the second RSM is a prerequisite toinitiation of the operation on the computer in accordance with thispreferred embodiment of the present invention.

[0088] In a variation of the second preferred method 600 as shown indashed lines in FIG. 6, additional attempts to check for the presence ofthe second RSM also may be made in accordance with the presentinvention. In this regard, the computer may repeat, for a predeterminednumber of times and/or for a predetermined period of time, additionalattempts to determine the presence of the second RSM within the computerconfiguration. Under this optional scenario, a determination is made(Step 614) whether the predetermined number of attempts to determine thepresence of the second RSM has been reached and/or whether thepredetermined time period has expired. If the predetermined number ofattempts has not been reached and/or the predetermined time period hasnot expired, then the computer again waits (Step 608) and thendetermines (Step 616) the presence of the second RSM within the computerconfiguration. If the predetermined number of attempts has been reachedand/or the predetermined time period has expired, then the preferredmethod ends (Step 610) with no further attempts to determine in Step 616the presence of the second RSM and without initiation of the operationin Step 618.

[0089] In view of the foregoing detailed disclosure, it will be apparentthat the second preferred method 600 of the present invention representsan initiation sequence that must be successfully performed beforeinitiation of an operation on the computer. The operation is therebyprotected from accidental initiation because a user's intention toperform the operation is confirmed by the physical exchange of theremovable storage media within the computer configuration.

[0090] It will further be apparent that in accordance with thispreferred method 600, a user's intention to perform the operation isconfirmed without requiring the use of user-input and user-outputdevices. No keyboard, mouse, monitor, microphone, speaker, touch screen,or the like is required in order to perform the initiation sequence ofthe operation. Nor is an on-screen user prompt required in order toconfirm the user's intention to perform the operation on the computer.The physical substitution of the second RSM for the first RSM in thecomputer configuration is a physical act that necessarily must beperformed by a user at that time and represents confirmation of theuser's intentions to initiate and perform the operation on the computerat that time.

[0091] A Third Preferred Method

[0092] Referring now to FIG. 7, steps of a third preferred method 700 inaccordance with the present invention are illustrated. It should benoted that for the third preferred method 700, only a single RSM isrequired.

[0093] The third preferred method 700 begins (Step 702) with a cold bootor reboot of a digital computer, such as, for example, any of thedigital computers 102,202 of FIGS. 1-2. During boot-up, the computergenerally boots by reading storage medium specified in its BIOSsettings, which may include, for example, reading from a hard drive, afloppy drive, a CD-ROM or DVD drive, a ZIP drive, or any sequencethereof.

[0094] In accordance with the third preferred method 700, a RSM isincluded in the computer configuration, such as, for example, any ofremovable storage media 106,206, and this RSM comprises a bootstrapmedium including a bootstrap program from which the computer boots. A“first” program is run (Step 704) by the computer during boot-up and,preferably, the bootstrap program itself comprises the first program.

[0095] Accordingly, the BIOS settings of the computer causes thecomputer to attempt to boot first from hardware containing the RSM.Thus, for example, in the computer configuration 100 of FIG. 1, thefirst program preferably comprises a bootstrap program on the DVD orCD-ROM disk from which the laptop computer boots, and in the computerconfiguration 200 of FIG. 2, the first program preferably comprises abootstrap program on the floppy disk from which the headless serverboots. Alternatively, if the first program is not the bootstrap program,then the bootstrap program (which resides on the RSM in accordance withthis preferred method) instructs the computer to run the first program,which also resides on the RSM.

[0096] When run, the first program instructs the computer to determine(Step 716) whether the RSM continues to be present within the computerconfiguration. For example, in the computer configuration 100 of FIG. 1,the computer determines whether the DVD or CD-ROM disk remains in theDVD drive following boot-up. In the computer configuration 200 of FIG.2, the computer determines whether the floppy disk remains in the floppydrive following boot-up.

[0097] Generally, the continued presence of the RSM is determined byattempting to access a directory or file known to exist on the RSM. Suchaccess includes reading from the RSM and/or writing to the RSM,including the running of a program on the RSM. If access is successful,then the RSM is determined to remain present. Thus, for example, thecontinued presence of the DVD or CD-ROM disk preferably is determined inthe computer configuration 100 of FIG. 1, for example, by checking thedrive for a known identifier of the disk. The continued presence of thefloppy disk preferably is determined in the computer configuration 200of FIG. 2, for example, by checking the floppy drive for a knownidentifier of the floppy disk.

[0098] If the RSM is determined to remain within the computerconfiguration following boot-up, then the operation on the computer isnot initiated and this preferred method ends (Step 710). Preferably, ifthe preferred method 700 ends at Step 710, then the preferred method 700will have to be started again in order to initiate the operation on thecomputer. On the other hand, if the RSM is determined no longer to bepresent within the computer configuration following boot-up, then theoperation on the computer is initiated (Step 718) and this preferredmethod then ends (Step 710).

[0099] In order to enable a user to remove the RSM after the firstprogram is read from the RSM, a sufficient period of time exists betweenthe reading of the first program from the RSM and the check for thecontinued presence of the RSM. In this respect, the first programpreferably instructs the computer to wait (Step 708) for a period thatbegins after the first program runs and ends before a check is made forthe continued presence of the RSM. Accordingly, a user observing thereading of the RSM followed by the cessation of activity then will havesufficient time in which to remove the RSM before the check is made forthe continued presence of the RSM within the computer configuration.

[0100] In accordance with the third preferred method 700, withoutsuccessfully determining the absence of the RSM within the computerconfiguration following boot-up (for which the RSM must have beenpresent within the computer configuration), the operation on thecomputer will not be initiated. The absence of the RSM is a prerequisiteto initiation of the operation on the computer. If the preferred methodends at Step 710, then the preferred method will have to be startedagain in order to initiate the operation on the computer in accordancewith this preferred embodiment of the present invention.

[0101] In a variation of the third preferred method 700 as shown indashed lines in FIG. 7, additional attempts to check for the continuedpresence of the RSM may also be made in accordance with the presentinvention. In this regard, the computer may repeat, for a predeterminednumber of times and/or for a predetermined period of time, additionalattempts to determine the continued presence of the RSM within thecomputer configuration. Under this optional scenario, a determination ismade (Step 714) whether the predetermined number of attempts todetermine the continued presence of the RSM has been reached and/orwhether the predetermined time period has expired. If the predeterminednumber of attempts has not been reached and/or the predetermined periodof time has not expired, then the computer again waits (Step 708) andthen determines (Step 716) the continued presence of the RSM within thecomputer configuration. If the predetermined number of attempts has beenreached and/or the predetermined time period has expired, then thepreferred method ends (Step 710) with no further attempts to determinethe continued presence of the RSM within the computer configuration.

[0102] In view of the foregoing detailed disclosure, it will be apparentthat the third preferred method 700 of the present invention representsan initiation sequence that must be successfully performed beforeinitiation of an operation on the computer. The operation is therebyprotected from accidental initiation because a user's intention toperform the operation is confirmed by the physical removal by the userof the RSM, which must necessarily have been present.

[0103] It will further be apparent that in accordance with thispreferred method 700, a user's intention to perform the operation isconfirmed without requiring the use of user-input and user-outputdevices. No keyboard, mouse, monitor, microphone, speaker, touch screen,or the like is required in order to perform the initiation sequence ofthe operation. Nor is an on-screen user prompt required in order toconfirm the user's intention to perform the operation on the computer.The physical removal of the RSM following its required presence withinthe computer configuration for booting of the computer is an act thatnecessarily must be performed by a user at that time and representsconfirmation of the user's intentions to initiate and perform theoperation on the computer at that time.

[0104] A Fourth Preferred Method

[0105] Referring now to FIG. 8, steps of a fourth preferred method 800in accordance with the present invention are illustrated. In accordancewith the fourth preferred method 800, only a single RSM is required,such as, for example, any of removable storage media 106,206. Thepreferred method 800 begins at Step 802 when a program (whether or notRSM-resident and whether or not a bootstrap program) instructs thecomputer to determine (Step 820) whether a particular RSM is presentwithin the computer configuration. Thus, for example, in the computerconfiguration 100 of FIG. 1, the computer determines whether aparticular DVD or CD-ROM disk is present in the DVD drive. In thecomputer configuration 200 of FIG. 2, the computer determines whether aparticular floppy disk is present in the floppy drive.

[0106] Generally, the presence of the RSM is determined by attempting toaccess a directory or file known to exist on the RSM. Such accessincludes reading from the RSM and/or writing to the RSM, including therunning of a program on the RSM. If access is successful, then the RSMis determined to be present. Thus, for example, the presence of the DVDor CD-ROM disk preferably is determined in the computer configuration100 of FIG. 1, for example, by checking the drive for a known identifierof the disk. The presence of the floppy disk preferably is determined inthe computer configuration 200 of FIG. 2, for example, by checking thefloppy drive for a known identifier of the floppy disk.

[0107] If the RSM is determined not to be present within the computerconfiguration at Step 820, then the operation on the computer is notinitiated and this preferred method ends (Step 810). Preferably, thispreferred method 800 then will have to be started again in order toinitiate the operation on the computer. In a variation as shown indashed lines in FIG. 8, additional attempts to check for the presence ofthe RSM also may be made in accordance with the present invention. Inthis regard, the computer may repeat, for a predetermined number oftimes and/or for a predetermined period of time, additional attempts todetermine the presence of the RSM within the computer configuration.Under this optional scenario, a determination is made (Step 822) whetherthe predetermined number of attempts to determine the presence of theRSM has been reached and/or whether the predetermined time period hasexpired. If the predetermined number of attempts has not been reachedand/or the predetermined time period has not expired, then the computerwaits (Step 824) and then again determines (Step 820) the presence ofthe RSM within the computer configuration. If the predetermined numberof attempts has been reached and/or the predetermined time period hasexpired, then the preferred method ends (Step 810) with no furtherattempts to determine in Step 820 the presence of the RSM and withoutinitiation of the operation in Step 818.

[0108] If the RSM is determined to be present within the computerconfiguration at Step 820, then the computer determines (Step 826)whether the RSM continues to remain present within the computerconfiguration. Moreover, in order to enable a user to remove the RSMfrom the computer configuration after the presence of the RSM isdetected, a sufficient period exists between the detection of thepresence of the RSM and the check for the continued presence of the RSMwithin the computer configuration. In this respect, the programpreferably instructs the computer to wait (Step 808) for a period thatbegins after the presence of the RSM is detected and ends before thecheck for the continued presence of the RSM within the computerconfiguration is made. Accordingly, a user observing the reading of theRSM followed by the cessation of activity then will have sufficient timein which to remove the RSM before the check is made for the continuedpresence of the RSM within the computer configuration.

[0109] Thus, for example, in the computer configuration 100 of FIG. 1,the computer determines whether the DVD or CD-ROM disk is still presentin the DVD drive. In the computer configuration 200 of FIG. 2, thecomputer determines whether the floppy disk is still present in thefloppy drive.

[0110] Again, the presence of the RSM is determined by attempting toaccess a directory or file known to exist on the RSM. Such accessincludes reading from the RSM and/or writing to the RSM, including therunning of a program on the RSM. If access is successful, then the RSMis determined to be present. Thus, for example, the presence of the DVDor CD-ROM disk preferably is determined in the computer configuration100 of FIG. 1, for example, by checking the drive for a known identifierof the disk. The presence of the floppy disk preferably is determined inthe computer configuration 200 of FIG. 2, for example, by checking thefloppy drive for a known identifier of the floppy disk.

[0111] If the continued presence of the RSM within the computerconfiguration is determined at Step 826, then the operation on thecomputer is not initiated and this preferred method ends (Step 810).Preferably, this preferred method 800 then will have to be started againin order to initiate the operation on the computer. In a variation asshown in dashed lines in FIG. 8, additional attempts to check for thecontinued presence of the RSM also may be made in accordance with thepresent invention. In this regard, the computer may repeat, for apredetermined number of times and/or for a predetermined period of time,additional attempts to determine the presence of the RSM within thecomputer configuration. Under this optional scenario, a determination ismade (Step 828) whether the predetermined number of attempts todetermine the continued presence of the RSM has been reached and/orwhether the predetermined time period has expired. If the predeterminednumber of attempts has not been reached and/or the predetermined timeperiod has not expired, then the computer waits (Step 808) and thenagain checks (Step 826) for the continued presence of the RSM within thecomputer configuration. If the predetermined number of attempts has beenreached and/or the predetermined time period has expired, then thepreferred method ends (Step 810) with no further attempts to determinein Step 826 the continued presence of the RSM and without initiation ofthe operation in Step 818.

[0112] If the first is determined not to be present within the computerconfiguration at Step 826, then the operation on the computer isinitiated (Step 818) and this preferred method ends (Step 810).

[0113] In accordance with the fourth preferred method, withoutsuccessfully determining the presence and then absence of the RSM withinthe computer configuration in Steps 820,826, the operation on thecomputer will not be initiated. The change in presence of the RSM withinthe computer configuration is a prerequisite to initiation of theoperation on the computer.

[0114] In view of the foregoing detailed disclosure, it will be apparentthat the fourth preferred method 800 of the present invention representsan initiation sequence that must be successfully performed beforeinitiation of an operation on the computer. The operation is therebyprotected from accidental initiation because a user's intention toperform the operation is confirmed by the physical removal of the RSMwithin the computer configuration.

[0115] It will further be apparent that in accordance with thispreferred method 800, a user's intention to perform the operation isconfirmed without requiring the use of user-input and user-outputdevices. No keyboard, mouse, monitor, microphone, speaker, touch screen,or the like is required in order to perform the initiation sequence ofthe operation. Nor is an on-screen user prompt required in order toconfirm the user's intention to perform the operation on the computer.The physical removal of the RSM from the computer configuration is aphysical act that necessarily must be performed by a user at that timeand represents confirmation of the user's intentions to initiate andperform the operation on the computer at that time.

[0116] A Fifth Preferred Method

[0117] Referring now to FIG. 9, steps of a fifth preferred method 900 inaccordance with the present invention are illustrated. In accordancewith the fifth preferred method 900, a “first” RSM is included in thecomputer configuration, such as, for example, any of removable storagemedia 106,206, and a “second” RSM is included in the computerconfiguration, such as, for example, any of removable storage media108,208.

[0118] The preferred method 900 begins at Step 902 when a program(whether or not RSM-resident and whether or not a bootstrap program)instructs the computer to determine (Step 920) whether the first RSM ispresent within the computer configuration. Thus, for example, in thecomputer configuration 100 of FIG. 1, the computer determines whether afirst DVD or CD-ROM disk is present in the DVD drive. In the computerconfiguration 200 of FIG. 2, the computer determines whether a firstfloppy disk is present in the floppy drive.

[0119] Generally, the presence of the first RSM is determined byattempting to access a directory or file known to exist on the firstRSM. Such access includes reading from the first RSM and/or writing tothe first RSM, including the running of a program on the first RSM. Ifaccess is successful, then the first RSM is determined to be present.Thus, for example, the presence of the first DVD or CD-ROM diskpreferably is determined in the computer configuration 100 of FIG. 1,for example, by checking the drive for a known identifier of the firstdisk. The presence of the first floppy disk preferably is determined inthe computer configuration 200 of FIG. 2, for example, by checking thefloppy drive for a known identifier of the first floppy disk.

[0120] If the first RSM is determined not to be present within thecomputer configuration at Step 920, then the operation on the computeris not initiated and this preferred method ends (Step 910). Preferably,this preferred method 900 then will have to be started again in order toinitiate the operation on the computer. In a variation as shown indashed lines in FIG. 9, additional attempts to check for the presence ofthe first RSM also may be made in accordance with the present invention.In this regard, the computer may repeat, for a predetermined number oftimes and/or for a predetermined period of time, additional attempts todetermine the presence of the first RSM within the computerconfiguration. Under this optional scenario, a determination is made(Step 922) whether the predetermined number of attempts to determine thepresence of the first RSM has been reached and/or whether thepredetermined time period has expired. If the predetermined number ofattempts has not been reached and/or the predetermined time period hasnot expired, then the computer waits (Step 924) and then againdetermines (Step 920) the presence of the first RSM within the computerconfiguration. If the predetermined number of attempts has been reachedand/or the predetermined time period has expired, then the preferredmethod ends (Step 910) with no further attempts to determine in Step 920the presence of the first RSM and without initiation of the operation inStep 918.

[0121] If the first RSM is determined to be present within the computerconfiguration at Step 920, then the computer determines (Step 916)whether the second RSM is present within the computer configuration.Thus, for example, in the computer configuration 100 of FIG. 1, thecomputer determines whether the second DVD or CD-ROM disk is present inthe DVD drive. In the computer configuration 200 of FIG. 2, the computerdetermines whether the second floppy disk is present in the floppydrive.

[0122] The presence of the second RSM is determined by attempting toaccess a directory or file known to exist on the second RSM. Such accessincludes reading from the second RSM and/or writing to the second RSM,including the running of a program on the second RSM. If access issuccessful, then the second RSM is determined to be present. Thus, forexample, the presence of the second DVD or CD-ROM disk preferably isdetermined in the computer configuration 100 of FIG. 1, for example, bychecking the drive for a known identifier of the second disk. Thepresence of the second floppy disk preferably is determined in thecomputer configuration 200 of FIG. 2, for example, by checking thefloppy drive for a known identifier of the second floppy disk.

[0123] If the second RSM is determined not to be present within thecomputer configuration, then the operation on the computer is notinitiated and this preferred method ends (Step 910). Preferably, thispreferred method 900 will have to be started again in order to initiatethe operation on the computer. If the second RSM is determined to bepresent within the computer configuration, then the operation on thecomputer is initiated (Step 918) and this preferred method ends (Step910).

[0124] In order to enable a user to replace the first RSM with thesecond RSM after the presence of the first program is determined in Step920, a sufficient period exists between the determination (Step 920) ofthe presence of the first RSM and the check (Step 916) for the presenceof the second RSM within the computer configuration. In this respect,the program preferably instructs the computer to wait (Step 908) for aperiod that begins after the first program is read from the first RSMand ends before a check is made for the second RSM. Accordingly, a userobserving the reading of the first RSM followed by the cessation ofactivity then will have sufficient time in which to substitute thesecond RSM for the first RSM before the check is made for the presenceof the second RSM within the computer configuration.

[0125] In a variation as shown in dashed lines in FIG. 9, additionalattempts to check for the presence of the second RSM also may be made inaccordance with the present invention. In this regard, the computer mayrepeat, for a predetermined number of times and/or for a predeterminedperiod of time, additional attempts to determine the presence of thesecond RSM within the computer configuration. Under this optionalscenario, a determination is made (Step 914) whether the predeterminednumber of attempts to determine the presence of the second RSM has beenreached and/or whether the predetermined time period has expired. If thepredetermined number of attempts has not been reached and/or thepredetermined time period has not expired, then the computer waits (Step908) and then again checks (Step 916) for the presence of the second RSMwithin the computer configuration. If the predetermined number ofattempts has been reached and/or the predetermined time period hasexpired, then the preferred method ends (Step 910) with no furtherattempts to determine in Step 916 the presence of the second RSM andwithout initiation of the operation in Step 918.

[0126] In accordance with the fifth preferred method, withoutsuccessfully determining the presence of the second RSM within thecomputer configuration in Step 916, the operation on the computer willnot be initiated. The presence of the second RSM (prior to the detectionof the presence of the first RSM within the computer configuration) is aprerequisite to initiation of the operation on the computer.

[0127] In view of the foregoing detailed disclosure, it will be apparentthat the fifth preferred method 900 of the present invention representsan initiation sequence that must be successfully performed beforeinitiation of an operation on the computer. The operation is therebyprotected from accidental initiation because a user's intention toperform the operation is confirmed by the physical exchange of theremovable storage media within the computer configuration.

[0128] It will further be apparent that in accordance with thispreferred method 900, a user's intention to perform the operation isconfirmed without requiring the use of user-input and user-outputdevices. No keyboard, mouse, monitor, microphone, speaker, touch screen,or the like is required in order to perform the initiation sequence ofthe operation. Nor is an on-screen user prompt required in order toconfirm the user's intention to perform the operation on the computer.The physical substitution of the second RSM for the first RSM within thecomputer configuration is a physical act that necessarily must beperformed by a user at that time and represents confirmation of theuser's intentions to initiate and perform the operation on the computerat that time.

[0129] A Sixth Preferred Method

[0130] Referring now to FIGS. 10-11, steps of a sixth preferred method1000 in accordance with the present invention are illustrated. Inaccordance with the sixth preferred method 1000, a “first” RSM isincluded in the computer configuration, such as, for example, any ofremovable storage media 306,406, and a “second” RSM is included in thecomputer configuration, such as, for example, any of removable storagemedia 308,408.

[0131] The preferred method 1000 begins (Step 1002) when a program(whether or not RSM-resident and whether or not a bootstrap program)instructs the computer to determine (Step 1030) whether the first RSMand the second RSM are present together within the computerconfiguration. Thus, for example, in the computer configuration 300 ofFIG. 3, the computer determines whether the first and second DVD orCD-ROM disks are present in the DVD drives (hardware 304). In thecomputer configuration 400 of FIG. 4, a determination is made whetherthe first and second floppy disks are present in the floppy drives ofthe computers 202,416.

[0132] Generally, the presence of each of the first RSM and the secondRSM is determined by attempting to access a directory or file known toexist on the first RSM and a directory or file known to exist on thesecond RSM. Such access includes reading from each RSM and/or writing toeach RSM, including the running of a program thereon. If access issuccessful, then the RSM is determined to be present. The check for bothmedia may be performed in sequence or in parallel.

[0133] If both the first RSM and the second RSM are determined in Step1030 to be present together within the computer configuration, then thecomputer determines (Step 1034) whether the first RSM and the second RSMcontinued to remain present together within the computer configuration.Moreover, in order to enable a user to remove the first RSM and/or thesecond RSM from the computer configuration after the presence of bothare detected, a sufficient period exists between the detection of thepresence of both and the check for the continued presence of both withinthe computer configuration. In this respect, the program preferablyinstructs the computer to wait (Step 1032) for a period that beginsafter the presence of both is detected and ends before the check in Step1034 is made. Accordingly, a user observing the reading of the first RSMand the second RSM followed by the cessation of activity then will havesufficient time in which to remove the first RSM and/or the second RSMbefore the check is made for the continued presence of both within thecomputer configuration.

[0134] Thus, for example, in the computer configuration 300 of FIG. 3,the computer determines whether the first and second DVD or CD-ROM disksremain present in the DVD drives (hardware 304). In the computerconfiguration 400 of FIG. 4, the computer determines whether the firstand second floppy disks remain present in the floppy drives of thecomputers 202,416. The check for both media may be performed in sequenceor in parallel.

[0135] If the continued presence within the computer configuration ofthe first RSM and the second RSM is detected in the determination atStep 1034, then the operation on the computer is not initiated and thispreferred method ends (Step 1010). Preferably, the preferred method 1000will have to be started again in order to initiate the operation on thecomputer. If the continued presence within the computer configuration ofthe first RSM and the second RSM is not detected in the determination(Step 1034), then the operation on the computer is initiated (Step1018), and then this preferred method ends (Step 1010).

[0136] In a variation of the sixth preferred method 1000 as shown indashed lines in FIG. 10, additional attempts to check for the presenceof both the first RSM and the second RSM also may be made in accordancewith the present invention. In this regard, the computer may repeat, fora predetermined number of times and/or for a predetermined period oftime, additional attempts to determine the continued presence of bothwithin the computer configuration. Under this optional scenario, adetermination is made (Step 1036) whether the predetermined number ofattempts to determine the continued presence of both has been reachedand/or whether the predetermined time period has expired. If thepredetermined number of attempts has not been reached and/or thepredetermined time period has not expired, then the computer again waits(Step 1032) and then determines (Step 1034) the continued presence ofboth within the computer configuration. If the predetermined number ofattempts has been reached and/or the predetermined time period hasexpired, then the preferred method ends (Step 1010) with no furtherattempts to determine in Step 1034 the continued presence of both andwithout initiation of the operation in Step 1018.

[0137] If one or more of the first RSM and the second RSM are determinedin Step 1030 to be absent from the computer configuration, then thecomputer determines (Step 1140) whether the first RSM and the second RSMare present together within the computer configuration. Moreover, inorder to enable a user to insert the first RSM and/or the second RSMwithin the computer configuration, a sufficient period exists betweenthe detection of the absence of both in Step 1030 and the check in Step1140 for the presence of both within the computer configuration. In thisrespect, the program preferably instructs the computer to wait (Step1138) for a period that begins after the check in Step 1030 is made andbefore the check in Step 1140 is made. Accordingly, a user observing theattempted reading of the first RSM and the second RSM followed by thecessation of activity then will have sufficient time in which to includethe first RSM and/or the second RSM within the computer configurationbefore the check in Step 1140 is made for the presence of both withinthe computer configuration.

[0138] If the continued absence within the computer configuration of thecombination of the first RSM and the second RSM is detected in Step1140, then the operation on the computer is not initiated and thispreferred method 1000 ends (Step 1110). Preferably, the preferred method1000 will have to be started again in order to initiate the operation onthe computer. If the continued absence within the computer configurationof the combination of the first RSM and the second RSM is not detectedin Step 1140, then the operation on the computer is initiated (Step1118), and then this preferred method 1000 ends (Step 1110).

[0139] In a variation of the sixth preferred method 1000 as shown indashed lines in FIG. 11, additional attempts to check for the combinedpresence of both the first RSM and the second RSM also may be made inaccordance with the present invention. In this regard, the computer mayrepeat, for a predetermined number of times and/or for a predeterminedperiod of time, additional attempts to determine the combined presenceof the first RSM and the second RSM within the computer configuration.Under this optional scenario, a determination is made (Step 1142)whether the predetermined number of attempts to determine the combinedpresence of both has been reached and/or whether the predetermined timeperiod has expired. If the predetermined number of attempts has not beenreached and/or the predetermined time period has not expired, then thecomputer again waits (Step 1138) and then determines (Step 1140) thecombined presence of both within the computer configuration. If thepredetermined number of attempts has been reached and/or thepredetermined time period has expired, then the preferred method 1000ends (Step 1110) with no further attempts to determine in Step 1140 thecombined presence of both and without initiation of the operation inStep 1118.

[0140] In view of the foregoing detailed disclosure, it will be apparentthat the sixth preferred method 1000 of the present invention representsan initiation sequence that must be successfully performed beforeinitiation of an operation on the computer. The operation is therebyprotected from accidental initiation because a user's intention toperform the operation is confirmed by the physical state-change of thecombined presence of the removable storage media within the computerconfiguration.

[0141] It will further be apparent that in accordance with thispreferred method 1000, a user's intention to perform the operation isconfirmed without requiring the use of user-input and user-outputdevices. No keyboard, mouse, monitor, microphone, speaker, touch screen,or the like is required in order to perform the initiation sequence ofthe operation. Nor is an on-screen user prompt required in order toconfirm the user's intention to perform the operation on the computer.The state-change in the combined, physical presence of the combinationof the first RSM and the second RSM within the computer configurationrepresents a physical act that necessarily must be performed by a userat that time and represents confirmation of the user's intentions toinitiate and perform the operation on the computer at that time.

[0142] Exemplary Commercial Utilizations of the Present Invention

[0143] The following represent examples of contemplated commercialutilizations of the present invention.

[0144] Keystroke Emulation Program

FIRST PREFERRED METHOD EXAMPLE

[0145] In certain circumstances, it is desirable to emulate keystrokes,especially when a keyboard or keypad is absent, malfunctioning, orotherwise unavailable. For instance, one may desire to create a backupof one's hard drive on a laptop computer using a backup program on thehard drive. This may be impossible, or at least very difficult, withoutthe use of a keyboard.

[0146] Utilizing the first preferred method of the present invention, afirst RSM comprising a bootstrap disk is inserted into a drive of thelaptop and the laptop is then started. During booting of the laptop, thelaptop boots from the bootstrap disk. In accordance with the firstpreferred method, the bootstrap disk includes a program that is executedby the laptop that causes the computer to run from the drive aparticular program that is stored on another, second disk. The laptopruns this particular program after a period of cessation of driveactivity during booting of the laptop.

[0147] Upon this cessation of drive activity, a user monitoring thedrive activity substitutes the second disk having this particularprogram for the bootstrap first disk in the laptop drive. Accordingly,when the laptop runs the specified program from the drive, this diskhaving the program is within the drive and the laptop runs the programsuccessfully.

[0148] The program on the second disk emulates keystrokes of a user. Inthis regard, the sequence of keystrokes is predetermined and indicatesthe execution of the backup program on the laptop's hard drive.Moreover, the sequence of keystrokes preferably identifies a backuplocation external to the laptop, such as, for example, a network storagedevice or a USB hard drive attached directly to a USB port of thelaptop.

[0149] The program emulating the predetermined sequence of keystrokespreferably is not a bootstrap program. Rather, the first, bootstrapdisk, which causes the computer to execute the keystroke emulationprogram, preferably is a prerequisite to initiation of the keystrokeemulation program. Consequently, inadvertently booting the laptop witheither the first disk or the second disk does not result in theunintended performance of the backup operation.

[0150] Partitioning and Formatting

SECOND PREFERRED METHOD EXAMPLE, FOURTH PREFERRED METHOD EXAMPLE

[0151] Preparing a hard drive for installation of an MS-DOS operatingsystem requires execution of “FDISK,” a program that creates and managespartitions on a hard drive, and subsequent execution of “FORMAT,” aprogram that readies a partition for installation of the operatingsystem. Partitioning and formatting of a hard drive, however, is adrastic action, as any data on the hard drive is lost by such operation.

[0152] The second preferred method of the present invention is useful insafeguarding against unintended partitioning and formatting. Inparticular, a first RSM comprising a bootstrap disk having a bootstrapprogram that is executed by a computer upon boot up is inserted into adrive of the computer. Upon boot up, the bootstrap program includesexecution of the FDISK program, but only upon the determination that asecond disk having the FORMAT program is within the drive. In thisregard, the first, bootstrap disk does not include the FORMAT program.The FDISK is not run if the particular disk having the FORMAT program isnot found within the drive. Furthermore, it should be noted that theFORMAT program is not run prior to the execution of the FDISK program;rather, just its presence within the drive is determined.

[0153] This determination is made after a period of cessation of driveactivity during booting of the computer. Upon cessation of driveactivity, a user monitoring the drive activity substitutes the seconddisk having the FORMAT program for the bootstrap first disk.Accordingly, when the computer checks for the presence of the FORMATprogram in the drive, the FORMAT program is found and the FDISK programis executed successfully.

[0154] The presence of the second disk having the FORMAT programpreferably is a prerequisite to successful execution of the FDISKprogram. Consequently, inadvertently booting the computer from thefirst, bootstrap disk does not result in the unintended performance ofthe partitioning operation.

[0155] Following successful execution of the FDISK program, the computermust be rebooted in order to successfully format the new partition. Inthis regard, the second disk preferably is a bootstrap disk having abootstrap program that executes the FORMAT program. The fourth preferredmethod of the present invention safeguards against accidental running ofthe bootstrap program on this second disk.

[0156] Specifically, the bootstrap program on the second disk runs theFORMAT program only after the determination is made that the second diskno longer resides within the computer drive (of course, this program andthe FORMAT program is read from the second disk before its removal fromthe drive). This determination is made after a period of cessation ofdrive activity during rebooting of the computer. Upon cessation of driveactivity, a user monitoring the drive activity removes the second diskhaving the FORMAT program from the drive. Accordingly, when the computerchecks for the absence of the disk from the drive (such as by checkingfor the continued presence of the FORMAT program), the absence of thedisk is confirmed and the FORMAT program is executed successfully.

[0157] The absence from the drive of the second disk having the FORMATprogram preferably is a prerequisite to successful execution of theFORMAT program. Consequently, inadvertently booting the computer fromthe second, bootstrap disk does not result in the unintended performanceof the formatting operation.

[0158] Headless Server Restore and Backup

SECOND PREFERRED METHOD EXAMPLE

[0159] Another example of a commercial utilization of the secondpreferred method of the present invention includes backup and restoreoperations on a headless server. In this context, inadvertent orunauthorized restoration of a backup image on a headless or blind servercan destroy valuable data. In accordance with the second preferredmethod of the present invention, the restore program is stored on afirst bootstrap RSM such as a disk. Upon booting from this bootstrapdisk, a bootstrap program thereon checks after a period of cessation ofdrive activity for the presence of a second RSM, such as another disk,within the drive prior to performing the restore operation. Preferably,this second disk is not a bootstrap disk.

[0160] Accordingly, this sequence of physical exchange of the first diskfor the second disk ensures that it is impossible to inadvertentlyperform a restore operation by leaving the first disk in the drive andlater rebooting the headless server. In addition, the insertion of thesecond disk ensures that, even if the second disk is inadvertently leftin the computer, the restore operation nevertheless will not be executedupon the later reboot, as the second disk does not contain the restoreprogram.

[0161] Advantageously, if the checking for the presence of the seconddisk within the drive includes reading of a file known to exist on thesecond disk, then the actual content of the file can be used to indicatea specific location of the backup data and other associated parametersof the restore operation, including a unique server identification.

[0162] Furthermore, each server has a unique identification in a serverfarm. In this context, when the second disk is checked, the content ofthe file on the second disk can further include a unique serveridentification corresponding to the identified location of the backupdata and the associated parameters for one of the servers in the farm.In this manner, the correct backup data for a particular server can beidentified, and the restoration of one server's backup data to anotherserver can be avoided.

[0163] Correspondingly, an inadvertent or unauthorized saving of abackup image from a headless or blind server can likewise destroypreviously saved backup files. As in the restore operation, the secondpreferred method of the present invention can safeguard against thisdisaster. In this case, the backup operation to successfully executefrom a first RSM will require, as a prerequisite, the insertion of a thesecond RSM, which can be additionally used to load backup parameters andsave operation results.

[0164] An additional benefit to utilization of the second preferredmethod in these restore and backup examples is the ability to separatelydistribute the first RSM and the second RSM to different people, therebypreventing backup or restore operations by a single individual.

[0165] Remote Network Install on Local Machine

THIRD PREFERRED METHOD EXAMPLE

[0166] In certain arrangements it may be desirable to install a programon a local machine that is connected to a network, wherein theinstallation program itself is centrally located on a network attacheddevice (NAD). The installation, however, may destroy important data onthe local machine if inadvertently performed, or if inadvertentlyperformed remotely on the wrong local machine (hundreds or eventhousands of local machines can exist on a network). In order to ensureinstallation to the proper machine, and to limit unintentionalinstallations, the third preferred method of the present invention isutilized.

[0167] In accordance with the third preferred method of the presentinvention, when an installation is to be performed at a local machine, atechnician physically disposed at the local machine inserts a first RSMcomprising a first disk into a drive associated with the local machine.The computer reads an identifier from the drive that is unique to, andthereby identifies to the local computer, the program to be installed onthe local machine from the central network location. Upon reading of thefirst identifier, the technician removes the first disk and inserts asecond disk into the same drive, and after a predetermined period, thecomputer reads a second, known identifier from the second disk. Thesecond identifier is known because the computer retrieves the secondidentifier from a central database of the network where the secondidentifier is maintained in association with the first identifier readfrom the drive. Upon the successful reading of the second identifierfrom the drive, the computer initiates the installation program forinstallation to the local machine from the central network location. Ifthe second identifier is not successfully read from the drive, eitherbecause the second disk was not placed within the drive or because thewrong disk was placed within the drive, then the known, secondidentifier is not successfully read from the drive and the installationoperation is not initiated.

[0168] The determination of whether the second disk is within the driveby reading of the known second identifier therefrom is made after apredetermined period of cessation of drive activity following thereading of the first identifier. Thus, the technician has adequate timefor withdrawal of the first disk following reading thereof and insertionof the second disk. Accordingly, when the computer checks for thepresence of the second disk following this predetermined period, theknown second identifier will be successfully read, the second disk willbe determined to be present, and the installation operation will beinitiated.

[0169] In accordance with the third preferred method, the physicalreplacement of the first disk with the second disk is a prerequisite tothe installation from the remote network location. Consequently, atechnician must be physically present at the local machine at the timeof installation. Accordingly, the chances of the program being installedto the wrong local machine are eliminated.

[0170] Dangerous Program Isolation

FOURTH PREFERRED METHOD EXAMPLES

[0171] Execution of programs that, if inadvertently or maliciouslyexecuted would cause severe damage, may be contained in accordance withthe fourth preferred method of the present invention. In this regard,such a program is stored on a RSM such as a disk and not, for example,on a hard drive of a computer. This physical isolation of the programsafeguards against malicious execution of the program by someone merelygaining access to the computer and its nonremovable storage media.

[0172] In accordance with the fourth preferred method, to execute theprogram, the disk is inserted into a drive of the computer. Uponrunning, the program first checks to determine whether the disk remainsin the drive following a cessation of drive activity. If the diskremains in the drive, then the program ends without successfullyexecuting. If it is determined that the disk is absent from the drive,then the program successfully executes.

[0173] In this example, the program may or may not comprise a bootstrapprogram and/or may or may not reside upon a bootstrap disk. However, ifthe program does comprise a bootstrap program, or resides on a bootstrapdisk and is called by the bootstrap program, then the required removalof the disk ensures that the dangerous program cannot be inadvertentlyexecuted upon a reboot of the computer merely by leaving the disk withinthe drive. In addition to ensuring that the protected operation isintentional, the requirement that the disk be removed makes it lesslikely for a technician to misplace a disk containing a dangerousprogram by leaving it behind in a drive.

[0174] Protected Access to Computer-Resident File

FOURTH PREFERRED METHOD EXAMPLE, FIFTH PREFERRED METHOD EXAMPLE

[0175] It may be desirable to limit access to a file that exists onnonremovable storage media of a computer. In accordance with either thefourth or fifth preferred methods of the present invention, such accessmay be limited to a user possessing a particular RSM, such as a disk.

[0176] In this regard, such a file is stored on the nonremovable mediain an encrypted form. In accordance with the fourth preferred method, aprogram resides on the RSM that enables decryption of the file when run.The program may or may not comprise a bootstrap program, and the RSM mayor may not comprise a bootstrap medium. When run, the program firstchecks for the removal of the RSM from the computer configuration beforeactually decrypting the file. Accordingly, the user must remove the RSMfrom the computer configuration prior to decryption of the file and,therefore, the user is less likely to leave the RSM within the computerconfiguration, thereby compromising the protected access to the file.

[0177] Alternatively, in accordance with the fifth preferred method, akey resides on the RSM that enables decryption of the file when anencryption/decryption program residing on the nonremovable storage mediais run. When run, the program first checks, after reading of the keyfrom the RSM, for the removal of the RSM from the computer configurationbefore actually decrypting the file. Accordingly, the user must removethe RSM from the computer configuration prior to decryption of the fileand, therefore, the user is less likely to leave the RSM within thecomputer configuration, thereby compromising the protected access to thefile.

[0178] Headless Server Backup and Restore

FOURTH PREFERRED METHOD EXAMPLE

[0179] In yet another example of the fourth preferred method of thepresent invention, inadvertent or unauthorized restoration of a backupimage on a headless or blind server can destroy valuable data. Therestore program is placed on a bootstrap RSM. The method loads a restoreprogram to computer memory, and then confirms timely removal of the RSMfrom the computer configuration. The restore program is then executed.This initiation sequence ensures that it is difficult to inadvertentlyperform a restore operation. In addition, the removal of the RSM ensuresthat, even if the computer should reboot with the RSM present within thecomputer configuration, the computer will not again execute the restoreprogram. An inadvertent or unauthorized saving of a backup image from aheadless or blind server can likewise destroy previously saved backupfiles. As in the restore operation, the backup operation will requirethe timely removal of the bootstrap RSM before the backup operation isinitiated.

[0180] Vending and Gaming Machine Maintenance

FIFTH PREFERRED METHOD EXAMPLE

[0181] Casino gaming machines and vending machines can be equipped withcard readers that read a card when inserted therein. The card couldcomprise a magnetic stripe card. Indeed, such card readers are common incasinos for recording gamblers' betting habits, and vending machines areequipped with magnetic card readers, which allow processing of creditcards.

[0182] Furthermore, it should be noted that, in examples of commercialutilizations of the present invention that follow, such magnetic cardreaders require the card to be inserted therein for reading and are notswipe readers, wherein the card holder retains possession of the cardand merely passes the magnetic stripe by the card reader. In theseparticular readers, possession of the card is passed from the cardholder to the card reader.

[0183] In an example of a commercial utilization of the fifth preferredmethod, when a casino gaming machine or vending machine is to be placedin a maintenance mode, a RSM comprising a card is placed in the cardreader. A computer reads the card utilizing the card reader and checksthat the card contains stored thereon a predetermined security coderequired for placing the machine in maintenance mode. Upon reading ofthe card, the computer again utilizes the card reader to determine ifthe card has been removed therefrom. If the card has been removed fromthe reader and the predetermine security code was read, then thecomputer initiates the required program for placing the machine intomaintenance mode, which may include releasing a mechanical lock orotherwise enabling maintenance to be performed on the machine.

[0184] The determination of whether the card has been removed from thecard reader is made after a predetermined period of time following thefirst reading of the card, such as fifteen seconds. Thus, upon insertionof the card, a card holder then has adequate time for withdrawal of thecard following reading thereof. Accordingly, when the computer checksfor the presence of the card following this predetermined time period,the card will not be found and the machine will be placed intomaintenance mode (assuming that the appropriate security code was read).

[0185] The removal of the card having the security code is aprerequisite to successful placement of the machine into maintenancemode. Consequently, inadvertently leaving the card within the readerwill not place the machine into maintenance mode, even if the cardcontains the appropriate security code. Moreover, the chances of thecard holder leaving the card in the card reader following maintenanceare eliminated, as the card must be withdrawn from the card reader toplace the machine into the maintenance mode.

[0186] Automated Teller Machine Key

FIFTH PREFERRED METHOD EXAMPLE

[0187] Automated teller machines (ATMs) have become very popular. Thecomputer systems associated with ATMs use a magnetic stripe card toidentify a card holder and a keyboard entry code to authenticate thecard holder. A common problem that occurs with ATMs is the “drive-away”or “walk-away,” wherein the authenticated card holder forgets to takeback the card from the ATM card reader following a completed transactionand leaves without terminating the authenticated session. During thisperiod, before the ATM machine times out, someone else may approach theATM machine and conduct additional transactions during the authenticatedsession.

[0188] In a further example of commercial utilization of the fifthpreferred method, when a transaction is to be performed via an ATM, aRSM comprising a card is placed in the card reader. The computer of theATM reads an identifier from the card utilizing the card reader. Uponreading of the card, the computer again utilizes the card reader todetermine if the card has been removed from the card reader. If the cardhas been removed from the reader, and the PIN entered at the ATM matchesthe PIN associated with the account identified by the identifier readfrom the card, then the computer initiates the required program forperforming a requested transaction at the ATM.

[0189] The determination of whether the card has been removed from thecard reader is made after a predetermined period of time following thefirst reading of the card, such as fifteen seconds. Thus, upon insertionof the card, a card holder then has adequate time for taking the cardback following reading thereof. Accordingly, when the computer checksfor the presence of the card following this predetermined time period,the card will not be found and the required program for performing arequested transaction at the ATM will be initiated (assuming that theappropriate PIN was input).

[0190] The removal of the card is a prerequisite to successfullyperforming a transaction at the ATM. Consequently, inadvertently leavingthe card within the reader will preclude the performance of a successfultransaction, even if the correct PIN has been entered. Accordingly, thechances of the card holder leaving the card in the card reader followingan authentic transaction during an authenticated session are eliminated,as the card must be withdrawn from the card reader to perform theauthentic transaction.

[0191] Moreover, in order to perform additional transactions during theauthenticated session, the card must be placed within the card reader,the appropriate identifier read, removed from the card reader, and theabsence of the card detected in order to perform each additionaltransaction. During the performance of these additional transactions,the PIN need not be reentered, but the card must be inserted, read,withdrawn, and its absence detected for each such transaction.

[0192] Accounting Machine (Cash Register) Reset

FIFTH PREFERRED METHOD EXAMPLE

[0193] An embedded computer system used in accounting machines, such ascash registers, can be provided with features that traditionally requiremechanical key locks. For instance, accounting machines often maintainmultiple sets of value accumulation registers. During normal operation,when the accumulators are printed or otherwise transmitted, i.e.,“dumped,” the accumulator values are not modified. When a special modeis enabled, however, the accumulators are reset after printing ortransmission.

[0194] In yet another example of commercial utilization of the fifthpreferred method of the present invention, when an accumulator is to bereset after printing or transmission, a RSM comprising a card is placedin the card reader. The computer of the accounting machine reads anidentifier from the card utilizing the card reader. Upon reading of thecard, the computer again utilizes the card reader to determine if thecard has been removed from the card reader. If the card has been removedfrom the reader, and the identifier read from the card matches apredetermined identifier, then the computer initiates the requiredprogram for resetting the accumulator following transmission orprinting.

[0195] The determination of whether the card has been removed from thecard reader is made after a predetermined period of time following thefirst reading of the card, such as fifteen seconds. Thus, upon insertionof the card, a card holder then has adequate time for withdrawal of thecard following reading thereof. Accordingly, when the computer checksfor the presence of the card following this predetermined time period,the card will not be found and the required command for resetting theaccumulator will be given, thereby initiating the resetting operation,assuming of course that the appropriate identifier has been read fromthe card.

[0196] In accordance with the fifth preferred method, the removal of thecard is a prerequisite to the successful resetting of the accumulator.Consequently, inadvertently leaving the card within the reader willpreclude a successful resetting of the accumulator. Accordingly, thechances of the card holder leaving the card in the card reader followingthe resetting of the accumulator are eliminated, as the card must bewithdrawn from the card reader in order to perform the resettingoperation.

[0197] Safety Deposit Box Access

SIXTH PREFERRED METHOD EXAMPLE

[0198] Safety deposit boxes are used in banks, hotels, and other areasto allow secure storage of valuables. These boxes can only be openedwhen two mechanical keys are engaged at the same time. Typically, onekey is held by an authority, such as a banker or hotel manager. Thesecond key is held by the box holder. Safety deposit boxes are moresecure than single lock boxes because the loss of a single key does notcompromise access to the box. Furthermore, an authority can identify theuser and record box access. On the other hand, physical keys aredifficult to replace and usually require a lock smith to drill the lockif a key is lost by the box holder. This drawback to safety depositboxes is overcome with the six preferred method of the presentinvention.

[0199] In this regard, the box authority has a first RSM such as, forexample, a key card, that identifies the authority to the computercontrolling access to the box, and the box holder posses a second RSMsuch as, for example, a key card, that identifies the box holder to thecomputer controlling access to the box. Two card readers are provided incommunication with the computer, and the combined presence of both thekey card of the authority and the key card of the box holder within thecomputer configuration by placement thereof into the card readersindicates initiation of the program granting access to the box.

[0200] When the key card is lost by the box holder, the lost key cardmust be replaced with a new key card. The replacement of the key card isaccomplished in accordance with the sixth preferred method of thepresent invention by first inserting the key card of the authority intoone of the card readers. The computer detects the presence of the keycard of the authority and the absence of a key card of the box holder.Following a predetermined period, a key card having a new identifier ofthe box holder is inserted into the other card reader and the combinedpresence of both key cards are detected within-the computerconfiguration. However, because the computer detects the presence of akey card having an identifier different from the active identifierstored in its database for the box holder, and because the computerfirst detected the presence of the key card of the authority without thepresence of the key card of the box holder, the computer initiates aprogram that activates the new identifier of the box holder in thedatabase and deactivates the old identifier.

[0201] Confirmation of this change is also performed in accordance withthe sixth preferred method of the present invention. In this regard, toconfirm this change recorded by the computer, the key card of theauthority is withdrawn from the card reader following the detectedpresence of both key cards within the computer configuration. Followinga predetermined period, the computer determines the continuing presenceof the key card of the box holder and the absence of the key card of theauthority. This change in the combined presence of the two key cardswithin the computer configuration indicates the initiation of a programthat confirms the change in key cards of the box holder. The new keycard of the box holder is then removed and, thereafter, insertion ofboth the key card of the authority and the new key card of the boxholder into the card readers then indicates access to the box.

[0202] In this example, the possible key cards of the box holder areprovided to the box holder when the box is established for the boxholder, with only one of the key cards actually being activated at thattime by the aforementioned process. The other key cards are simplyretained by the box holder for later activation upon the loss of theinitial key card. By possessing the possible key cards for access to thebox, the box holder is assured that the account authority cannot gainaccess to the contents of the box without the active key card of the boxholder.

[0203] Scope of the Present Invention

[0204] In view of the foregoing detailed description of preferredembodiments of the present invention, it readily will be understood bythose persons skilled in the art that the present invention in all itsaspects is susceptible of broad utility and application. While variousembodiments of the present invention have been described herein incertain contexts, the embodiments may be useful in other contexts aswell. Many embodiments and adaptations thereof other than those hereindescribed, as well as many variations, modifications, and equivalentarrangements, will be apparent from or reasonably suggested by thepresent invention and the foregoing description thereof, withoutdeparting from the substance or scope of the present invention.Furthermore, any sequence(s) and/or temporal order of steps of variousprocesses described and claimed herein are those considered to be thebest mode contemplated for one or more preferred embodiments of thepresent invention. It should also be understood that, although steps ofvarious processes may be shown and described as being in a preferredsequence or temporal order, the steps of any such processes are notlimited to being carried out in any particular sequence or order, absenta specific indication of such. In many cases, the steps of suchprocesses may be able to be carried out in various different sequencesand orders, while still falling within the scope of the presentinvention. Accordingly, while the present invention has been describedherein in detail in relation to preferred embodiments, it is to beunderstood that this disclosure is only illustrative and exemplary ofthe present invention and is made merely for purposes of providing afull and enabling disclosure of the invention. The foregoing disclosureis not intended nor is to be construed to limit the present invention orotherwise to exclude any such other embodiments, adaptations,variations, modifications and equivalent arrangements thereof, thepresent invention being limited only by the claims appended hereto andthe equivalents thereof.

[0205] Thus, the use of “program” herein may refer not only to astandalone set of code, but also to a snippet of code or a moduleforming part of a larger program. Furthermore, for example, a laptopcomputer 102 is shown in FIG. 1 only for purposes of illustrating adigital computer. The laptop computer 102 further represents, forexample, a desktop, a tower computer, and a headless server, as well asan embedded computer such as those computers found in ATMs, cashregisters, vending machines, gaming machines, autos, appliances, etc.Similarly, the headless server 202 of FIG. 2 equally could be the laptopcomputer 102 as shown in FIG. 1, etc. The DVD or CD-ROM disks 106,108,and the floppy disks 206,208, are shown only for purposes ofillustrating different types of removable storage media. The disksfurther represent, for example, optical disks, floppy disks, Zip disks,and the like, with the DVD drive 104 and disk drive 204 eachrepresenting the appropriate type of hardware of the computerconfiguration for reading thereof by the computer. In general, the disks106,108 represent any type of removable storage media that can be readby the computer 102, such as USB hard disk drives, USB memory devices,and the like.

[0206] Thus, for example, when the removable storage media include USBdevices, the computer configuration includes a USB port as the hardwarefor reading of the USB devices; when the removable storage media includeserial devices, the computer configuration includes a serial port as thehardware for reading the serial devices; when the removable storagemedia include parallel devices, the computer configuration includes aparallel port as the hardware for reading the parallel devices; when theremovable storage media include a SCSI device, the computerconfiguration includes a SCSI connection as the hardware for reading theSCSI devices; and when the removable storage media include infrareddevices, the computer configuration includes an infrared port as thehardware for reading the infrared devices, etc.

[0207] In accordance with the present invention, the RSM also couldfurther comprise a card, such as a card having a magnetic strip and/or a“smart card” having a chip carried thereon. In such instance, thecomputer configuration includes a card reader as the hardware in whichthe card must be inserted to be read. Alternatively, if the card iscapable of wireless communications by transmitting a signal, then thecard need only be brought within the communication range of the hardwareto be read. Removal of the card from this communication range then wouldconstitute removal of the card from the computer configuration.

[0208] The preferred methods have also been described as including thebooting of the computer from a removable bootstrap storage medium. Avariation of the present invention further includes these preferredmethods absent the actual booting of the computer from such removablestorage media. Instead, it is contemplated within the scope of theinvention that the computer be booted from other storage media such as ahard disk of the computer configuration, a remote server in a networkedcomputer configuration, etc., while otherwise still performing the othersteps of the preferred methods described in detail herein. Booting froma removable storage medium clearly is not a necessary element of theinvention in its broadest scope.

[0209] Moreover, it will be recognized that preferred methods andpreferred configurations of the present invention overlap to variousextents and, accordingly, are not mutually exclusive. Thus, forinstance, examples of the first preferred method of the presentinvention may represent and/or incorporate therein, as well, examples ofsecond, third, and sixth preferred methods of the present invention.

1. A method for protecting against a computer operation from beingperformed, comprising the step of initiating the operation only after auser's intention to perform the operation is confirmed, the user'sintention being confirmed by: (a) changing within a computerconfiguration the combined presence of a first removable storage mediumand a second removable storage medium; and (b) without requiring the useof a user-input device of a computer.
 2. A computerized method forconfirming, without requiring use of a user-input device of a computer,a user's intention to perform an operation on a computer, comprising thesteps of: (a) determining in a first check the state of the combinedpresence within a computer configuration of first and second removablestorage media; (b) determining in a second check the state of thecombined presence within the computer configuration of the first andsecond removable storage media; and (c) initiating the operation onlyafter the first and second checks indicate different states.
 3. Thecomputerized method of claim 2, wherein said step of initiating theoperation is performed when the first check indicates the combinedpresence of the removable storage media within the computerconfiguration and the second check indicates the absence of one of orboth removable storage media.
 4. The computerized method of claim 2,wherein said step of initiating the operation is performed when thefirst check indicates the absence of one of or both removable storagemedia within the computer configuration and the second check indicatesthe combined presence of both removable storage media.
 5. Acomputer-readable medium having computer-executable instructions forperforming the steps of the method of claim
 2. 6. In a computerconfiguration including hardware capable of accessing in parallel firstand second removable storage media, a computerized method forconfirming, without requiring use of a user-input device of a computer,a user's intention to perform a computer operation, comprising the stepsof: (a) accessing in a first step both the first and second removablestorage media using the hardware; (b) accessing in a second step boththe first and second removable storage media using the hardware; and (c)initiating the operation on the computer only after accessing both mediain one of the first and second steps is successful and accessing bothmedia in the other of the first and second steps is unsuccessful.
 7. Themethod of claim 6, wherein the computer configuration further includescomputer-readable media having computer-executable instructions forperforming steps of the method.
 8. The method of claims 1, 2, or 6,wherein the first removable storage medium is a bootstrap medium.
 9. Themethod of claims 1, 2, or 6, wherein the operation is performed on acomputer.
 10. The method of claims 1, 2, or 6, wherein the first andsecond removable storage media comprise one of the type of floppy disks,ZIP disks, optical disks, CD-ROM disks, DVD disks, USB-devices, serialdevices, parallel devices, SCSI devices, infrared capable devices,wireless devices, short-range radio frequency (RF) enabled devices,smart cards, and magnetic stripe cards.
 11. The method of claims 1 or 2,wherein the computer configuration includes hardware for accessing thefirst and second removable storage media.
 12. The method of claim 11,wherein the hardware is capable of accessing only singly a particulartype of removable storage media, the first removable storage mediumcomprising said type and the second removable storage medium comprisingother than said type.
 13. The method of claim 11, wherein the hardwareis capable of accessing concurrently the first and second removablestorage media.
 14. The method of claims 1, 2, or 6, wherein the computerconfiguration includes a computer that has no user-input devicesconnected thereto.
 15. The method of claims 1, 2, or 6, wherein thecomputer configuration includes a computer that has a user-input devicethat is disabled or malfunctioning.
 16. The method of claims 1, 2, or 6,wherein the computer configuration includes a computer comprising alaptop computer.
 17. The method of claims 1, 2, or 6, wherein thecomputer configuration includes a computer that has no user-outputdevices connected thereto.
 18. The method of claims 1, 2, or 6, whereinthe computer configuration includes a computer comprising a headlessserver.
 19. The method of claims 1, 2, or 6, wherein the computerconfiguration comprises a first node of a computer network and includinga computer on which the operation is performed.
 20. The method of claim19, wherein the first removable storage medium is replaced with thesecond removable storage medium at a second, different node of thecomputer network.
 21. The method of claim 19, wherein acomputer-readable medium having computer-executable instructions forperforming the operation is located at a second, different node of thecomputer network.
 22. The method of claim 19, wherein the second nodecomprises a network attached storage device.
 23. The method of claim 2,further comprising the step of repeating said step of determining in asecond check the state of the combined presence within the computerconfiguration of the first and second removable storage media until saidstep indicates a state change or until either (i) a predetermined numberof attempts has occurred and/or (ii) a predetermined time period hasexpired.
 24. The method of claims 6, further comprising waiting apredetermined period prior to said second step.
 25. A first removablestorage medium readable by a computer and having computer-executableinstructions for performing a method for initiating a computer operationonly after a user's intention to perform the operation is confirmedwithout requiring use of a user-input device of a computer, the methodcomprising the steps of: (a) determining in a first check the state ofthe combined presence within the computer configuration of both thefirst and second removable storage media; (b) determining in a secondcheck the state of the combined presence within the computerconfiguration of both the first and second removable storage media; and(c) initiating the operation only after the first and second checksindicates different states.
 26. The first removable storage medium ofclaim 25, wherein said step of initiating the operation is performedwhen the first check indicates the combined presence of the removablestorage media within the computer configuration and the second checkindicates the absence of one of or both removable storage media.
 27. Thefirst removable storage medium of claim 25, wherein said step ofinitiating the operation is performed when the first check indicates theabsence of one of or both removable storage media within the computerconfiguration and the second check indicates the combined presence ofboth removable storage media.
 28. The combination of claim 25, whereinthe first removable storage medium is a bootstrap medium.
 29. Thecombination of claim 28, wherein the computer-executable instructionsare part of a bootstrap program.
 30. The combination of claim 28,wherein the computer-executable instructions are part of a program whichthe bootstrap program instructs the computer to run.
 31. The combinationof claim 25, further comprising computer-executable instructions forwaiting a predetermined period prior to said second check.
 32. Thecombination of claim 25, further comprising computer-executableinstructions for repeating said step of determining in a second checkthe state of the combined presence within the computer configuration ofthe first and second removable storage media until said step indicates astate change or until either (i) a predetermined number of attempts hasoccurred and/or (ii) a predetermined time period has expired.