US20090115606A1 - Method and Apparatus for Secure Mode Indication - Google Patents

Method and Apparatus for Secure Mode Indication Download PDF

Info

Publication number
US20090115606A1
US20090115606A1 US12/333,007 US33300708A US2009115606A1 US 20090115606 A1 US20090115606 A1 US 20090115606A1 US 33300708 A US33300708 A US 33300708A US 2009115606 A1 US2009115606 A1 US 2009115606A1
Authority
US
United States
Prior art keywords
mode
hand
calculator
press
held device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/333,007
Inventor
Russell Melvin Rosenquist
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Texas Instruments Inc
Original Assignee
Texas Instruments Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Texas Instruments Inc filed Critical Texas Instruments Inc
Priority to US12/333,007 priority Critical patent/US20090115606A1/en
Publication of US20090115606A1 publication Critical patent/US20090115606A1/en
Assigned to TEXAS INSTRUMENTS INCORPORATED reassignment TEXAS INSTRUMENTS INCORPORATED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ROSENQUIST, RUSSELL MELVIN
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Definitions

  • Embodiments of the present invention generally relate to a method and apparatus relating to ensuring an authenticated device is tamper proof.
  • Hand-held devices such as, calculators, are often used in the educational environment. As a result, these devices are typically used in a classroom environment or even a testing environment to take some of the standardized state-level tests.
  • Students may use functionalities offered by such hand-held devices during exam in a way that jeopardizes the exam outcome. For example, students may utilize stored equations or communicate with other calculators in their network to retrieve restricted information. Hence, such functionalities may provide a tool for a student to cheat during an exam.
  • hand-held devices may be set to press-to-test (PTT) mode.
  • the press-to-test mode allows a teacher to restrict the functionalities are should not be used on an exam.
  • the teacher is able to utilize such hand-held device without being concerned that the students are cheating by utilizing unauthorized functions of the device.
  • the current devices do not provide a way for the teacher to easily and visually inspect multiple devices to ensure that the press-to-test mode was properly set and maintained.
  • Embodiments disclosed herein generally relate to a method and apparatus relating to a hand-held device.
  • the hand-held device comprising a visual indicator utilized to indicate at least one a normal mode or a press-to-test mode, and where in the setting of the visual indicator are tamper proof.
  • FIG. 1 is an embodiment of a block diagram of a hand-held apparatus
  • FIG. 2 is an embodiment of a flow diagram depicting mode transition method for a hand-held apparatus
  • FIG. 3 is an embodiment of a flow diagram depicting normal mode to press-to-test mode method for a hand-held apparatus
  • FIG. 4 is an embodiment of a flow diagram depicting press-to-test mode to normal mode method for a hand-held apparatus
  • FIG. 5 is an embodiment of a flow diagram depicting transition to press-to-test mode method for a hand-held apparatus
  • FIG. 6 is an embodiment of a flow diagram depicting transition to normal mode method for a hand-held apparatus
  • FIG. 7 is an embodiment of setting chart for a light emitting diode (LED) utilized as a visual display indicating a mode relating to a hand-held apparatus;
  • LED light emitting diode
  • FIG. 8 is an embodiment of shift registers setting for a light emitting diode (LED) utilized to provide a desired illumination sequence
  • FIG. 9 is an embodiment of a flow diagram depicting a reset or a reboot method for a hand-held apparatus
  • FIG. 1 depicts an embodiment of a block diagram of a hand-held apparatus 100 , such as, a calculator.
  • the apparatus 100 includes a processor 102 , support circuit 106 , security module 104 and memory 108 .
  • the processor 102 may be any processor capable of executing computer instructions, such as, instructions stored in the memory 108 .
  • the processor 102 may be specific to a hand-held device, calculator or the like, and may be capable of performing algebraic calculation, geometry functions and the like.
  • the processor 102 may include normal and security peripherals that monitor and ensure that the apparatus 100 is tamper-proof, which may be monitored by the security module 104 .
  • tamper proof means that unauthorized code or changes are not allowed, or that at least a portion of the memory or of the settings is protected from unauthorized access.
  • the support circuit 106 are circuits that may include, but are not limited to, power supplies, clock circuits, cache memory and the like.
  • the support circuit 106 assist in executing functions relating to the hand-held apparatus 100 .
  • a computer readable medium is any medium in which computer data or instruction can be stored and/or accessed.
  • the security module 104 ensures that an authorized user is capable of changing the mode of the apparatus, for example, by checking a password, a user login, preferences, settings, or the like.
  • a teacher may set the calculator to restrictive mode.
  • a restrictive mode is a mode that restricts certain functionalities. If a student attempts to alter the mode of the calculator, the security module 104 would restrict the student from changing the calculator mode. However, the security module 104 would allow a teacher to alter the calculator's mode to a non-restrictive mode.
  • a restrictive mode is referred to a press-to-test (PTT) mode, whereas a non-restrictive mode is referred to as a normal mode.
  • PTT press-to-test
  • a non-restrictive mode is referred to as a normal mode.
  • the modes that facilitate the transition from and/or to normal and press-to-test modes are transition modes.
  • the security module 104 is a module that restricts the user from accessing secured area of memory and altering data, such as, user information, forcing calculator mode, resetting the calculator, etc. As a result, a teacher may set the calculator to a restrictive mode for an exam. Due to the security module 104 , the teacher would be confident that a student would not be able to utilize the functionalities that the teacher restricted by resetting the calculator, changing user preferences/settings, etc.
  • the memory 108 may comprise random access memory, read only memory, removable disk memory, flash memory, and various combinations of these types of memory.
  • the memory 108 may be referred to as main memory, cache memory, buffer memory and the like.
  • the memory 108 may store an operating system (OS), database software, various forms of application software, such as, application programs 110 , mode routine 112 , and the like.
  • the mode routine 112 allows the user to set the apparatus 100 to normal or press-to-test mode. An embodiment of the method performed by the mode routine is described in FIG. 2 .
  • the hand-held device 100 may include a peripheral access module 114 .
  • the peripheral access module 114 is a module that allows or restricts access to peripherals, such as, visual indicator 118 .
  • the peripheral access module 114 may communicate with the security module 104 in order to allow or prohibit access to the memory portions that controls hardware, such as, visual indicator 118 .
  • the visual indicator 118 may be set by certain registers or memory location, which may only be changed by an authorized user, a specific device, a predetermined sequence of instruction, a password, etc.
  • the visual indictor is tamper-proof.
  • a teacher may utilize a calculator during an exam.
  • the teacher may allow the students to utilize the algebraic functionality and disallow the use of saved equations and graphing functions.
  • the mode setting of the calculator determines the setting of the visual indicator.
  • the visual indicator may display a visual aid that indicates that access to saved equations and graphing function is restricted on the calculator.
  • the visual indicator may be a light emitting diode (LED) that emits a green light for 1 second followed by a red light for 2 seconds to indicate that the calculator restricts access to its saved equations and graphing function.
  • the peripheral access module 114 protects access to the settings of the visual indicator 118 . Therefore, the visual indicator's settings may only be changed by an authorized user, a specific device, a password, etc. As a result, the visual indicator is tamper proof and a teacher may utilize such an indicator to easily monitor the settings of multiple calculators.
  • An example of the visual display setting is presented in FIG. 4 .
  • FIG. 2 is an embodiment of a flow diagram depicting mode transition method 200 for the apparatus 100 .
  • the mode transition method 200 depicts the utilization of the security feature when transitioning from one mode to another.
  • mode flow diagram 200 includes a normal mode 202 , transition to press-to-test (PTT) mode 204 , press-to-test mode 206 , and transition to normal mode 208 .
  • PTT press-to-test
  • 206 press-to-test mode
  • transition to normal mode 208 transition to normal mode 208 .
  • PTT press-to-test
  • the hand-held device may default to a setup screen or to the normal mode 200 . However, in one embodiment, the hand-held device will default to the mode that it was in when it was shut down.
  • the normal mode 200 is the mode in which a user is able to access most or all of the functionalities of an apparatus, such as, a calculator.
  • a user in normal mode 202 , a student is not restricted from using calculator functionalities. Hence, a student would be able to store equations, retrieve equations, communicate with other users on a network, etc.
  • a user may initiate a request to transition to press-to-test mode 206 .
  • the devise when the devise is in normal mode 202 , a student would not be able to alter his or her own setting to function as a teacher, administrator, allow himself or herself to reset the calculator and the like.
  • a visual display When the device is in the normal mode, a visual display may not be utilized or may default to a specific setting. However, even when in the normal mode, the visual display setting are tamper proof, for example, the settings are protected by the security module 104 and/or peripheral access module 114 (both described in FIG. 1 ).
  • press-to-test mode 206 a user is restricted from accessing certain areas of memory or certain calculator functionalities.
  • a student may be restricted from using calculator functionalities, such as, storing equations, retrieving equations, communicating with other users utilizing calculators on a calculator network, etc.
  • a visual display is utilized to visually and easily display the functionality restricted on the device.
  • the user may be restricted from initiating various communication or calculation functionalities.
  • the visual display displays a visual aid indicating the restriction of such functionality or indicating the specific mode of the calculator.
  • the setting of the visual indicator are tamper proof and are protected from tampering with, for example, protected by the peripheral security module 104 and/or access module 114 (both described in FIG. 1 ).
  • such restriction and visual display setting may be broadcasted to a plurality of calculators or may be performed on each calculator separately.
  • a calculator may change mode and visual indicator setting only if the change mode instruction is received from a specific user or calculator.
  • a calculator may be setup to allow only a teacher to alter the mode, specify the type of functionality available when in press-to-test mode 206 , setup users, setup visual display, etc.
  • press-to-test mode 206 While in press-to-test mode 206 , the hand-held device is tamper-proof.
  • the student is restricted from changing his or her setting to act as an administrator, a teacher, allow himself or herself to reset the calculator, alter the visual display setting, and the like.
  • the student is restricted from changing modes, resetting the calculator, changing functionality settings, etc.
  • the calculator functionality is limited based on specified press-to-test mode 206 and/or functionality.
  • the calculator is tamper-proof secured by utilizing security module 104 and/or peripheral access module 114 (both described in FIG. 1 ).
  • security module 104 and/or peripheral access module 114 both described in FIG. 1 .
  • a hand-held device such as a calculator
  • the calculator When a hand-held device, such as a calculator, receives a request to transitioning from the normal mode 202 to the press-to-test mode 206 , the calculator then transitions to the transition to press-to-test mode 204 .
  • the calculator In the transition to press-to-test mode 204 , the calculator may enter the tamper-proof verification and may indicate that press-to-test mode 206 has been properly and securely initiated.
  • the mode transition method 200 may utilize the security module 104 and/or peripheral access module 114 (both described in FIG. 1 ).
  • the peripheral access module 114 may set a visual indicator 118 ( FIG. 1 ) to indicate the functionalities enabled or disabled on the device.
  • the hand-held device such as a calculator
  • the calculator When the hand-held device, such as a calculator, receives a request to transition from the press-to-test mode 202 to the normal mode 206 , the calculator then transitions to the transition to normal mode 208 .
  • the calculator performs tamper-proof verification and indication that normal mode 202 has been properly and securely initiated.
  • the mode transition method 200 ensures that the device or user requesting the change is authorized to perform such a request. If the person is not authorized, the request is denied or ignored. If the person is authorized, the mode transition method 200 allows the device to return to its normal mode 202 , wherein all the functionalities are available to the user.
  • the mode transition method 200 may utilize the security module 104 and/or peripheral access module 114 (both described in FIG. 1 ).
  • the peripheral access module 114 may set a visual indicator 118 ( FIG. 1 ) to indicate the functionalities enabled or disabled on the device.
  • FIG. 3 is an embodiment of a flow diagram depicting normal mode to press-to-test mode method 300 for a hand-held apparatus.
  • the method 300 starts at step 302 and proceeds to step 304 .
  • the hand-held device is in normal mode.
  • the method 300 determines if a request to change to press-to-test mode is received. If there is a request, the method 300 proceeds to step 308 . Otherwise, the method 300 returns to step 304 .
  • the hand-held device is set to transition to press-to-test mode, which may include resetting the device, clearing memory, determining if the request is from an authorized user or device, and the like.
  • the method 300 sets the device in accordance with the request received and alters the setting of a visual indicator to indicate the functionalities or specific mode of the hand-held device.
  • the device is set to press-to-test mode. The method 300 ends at step 314 .
  • FIG. 4 is an embodiment of a flow diagram depicting press-to-test mode to normal mode method 400 for a hand-held apparatus.
  • the method 400 starts at step 402 and proceeds to step 404 .
  • the hand-held device is in press-to-test mode.
  • the method 400 determines if a request to change to normal mode is received. If there is a request, the method 400 proceeds to step 408 . Otherwise, the method 400 returns to step 404 .
  • the hand-held device is set to transition to normal mode, which may include resetting the device, clearing memory, determining if the request is from an authorized user or device, and the like.
  • the method 400 sets the device in accordance with the request received and alters the setting of a visual indicator to indicate the functionalities or specific mode of the hand-held device.
  • the device is set to normal mode. The method 400 ends at step 414 .
  • FIG. 5 is an embodiment of a flow diagram depicting transition to press-to-test mode method 500 for a hand-held apparatus.
  • the method 500 starts at step 502 and proceeds to step 504 .
  • the method 500 clears the memory, for example, to remove any memory available to rogue applications, hack software, and the like.
  • the method 500 authenticates the system, for example, by authenticating the hand-held device, applications, users, request and the like.
  • the operating system (OS) is loaded into memory.
  • the method 500 determines if the previous mode is a press-to-test (PTT) mode.
  • PTT press-to-test
  • step 512 the press-to-test mode configuration is set to the previous press-to-test configuration mode. Otherwise, the method 500 proceeds from step 510 to step 514 .
  • step 514 the method 500 configures the press-to-test mode in accordance with the received request. From steps 512 and 514 , the method 500 proceeds to step 516 .
  • step 516 the visual indicator is set according to the configuration. The method 500 ends at step 518 .
  • FIG. 6 is an embodiment of a flow diagram depicting transition to normal mode method 600 for a hand-held apparatus.
  • the method 600 starts at step 602 and proceeds to step 604 .
  • the method 600 accesses the request, for example, determining authorization, requesting user or device, if the request is valid, and the like. If the assessment returns a negative outcome, the method 600 may ignore the request.
  • the method 600 sets the device to normal configuration.
  • the visual indicator is set according to configuration.
  • the method 600 ends at step 610 .
  • FIG. 7 is an embodiment of setting chart 700 for a light emitting diode (LED) utilized as a visual display indicating a mode relating to a hand-held apparatus.
  • the columns represent time/time slots.
  • the chart 800 illumination patterns of a light emitting diode function as a visual indicator as described herein.
  • the red LED when entering a calculator boot up, the red LED is illuminated and another illumination is produced by either the green LED or a combination of the red and green LED. Hence, the result is a yellow illumination.
  • the red LED is ON during both a time slot when the green LED is ON and during a time slot when the green LED is OFF.
  • the color illumination indicates the functionality of the calculator. For example, a green illumination is used to indicate a more restrictive use of the device than a yellow illumination.
  • the least restrictive mode may illuminate a specific color, for example, a yellow illumination, which may mean that the hand-held device is functioning in normal mode.
  • the red LED is illuminated for intervals, such as, 0.25 second and at 0.5 seconds the green LED is illuminated.
  • the result is a yellow illumination for 0.25 second followed by a green illumination for 0.25 second.
  • the row marked “final” shows the illumination produced.
  • the sequence may be repeated during the boot up process. After boot up, the red and green LED's are illuminated at, for example, 0.5 seconds, 1.5 seconds, and 2.5 seconds etc and is repeated after boot up.
  • the LED may alternatively illuminate the red LED and green LED to indicate the more restrictive mode. After boot up, the green LED may be illuminated. In one embodiment, for any mode selected the red LED is illuminated during boot up; however, after boot up, no red illumination may be visible. Hence, a teacher may be able to identify a student rebooting his or her hand-held device.
  • an LED color illumination may sequence to indicate that the device is exiting press-to-test mode or is in normal mode.
  • the settings of the LED are archived in a protected area in memory, such that such setting a tamper proofed.
  • a teacher may query the multiple hand-held devices and trust that the illumination is a valid indication of the device mode and functionality setting.
  • FIG. 8 is an embodiment of shift registers setting 800 for a light emitting diode (LED) utilized to provide a desired illumination sequence.
  • the illumination patterns correspond to those provided in FIG. 7 .
  • values are contained in the registers.
  • hardware may be used rather than software.
  • Hardware may be used, for example, when a software controlled mechanism requires that the operating system have the ability to individually turn the LEDs OFF and/or ON.
  • the chosen ON/OFF sequences of the LEDs are selected in such a way that an operating system may need to only turn an LED off or set very specific pre-defined sequencing patterns.
  • the register settings are protected from unauthorized change and are tamper proof.
  • FIG. 9 is an embodiment of a flow diagram depicting a reset or a reboot method 900 for a hand-held apparatus.
  • the method 900 may also be utilized for system initialization.
  • the method 900 starts at step 902 and proceeds to step 904 .
  • the method 900 determines if there is a request to rest or reboot.
  • the device memory is cleared, for example, to remove any memory available to rogue applications, hack software, and the like.
  • the method 900 authenticates the system, for example, by authenticating the hand-held device, applications, users, request and the like.
  • the operating system (OS) is loaded into memory.
  • the method 500 determines if the last previous mode is known.
  • the mode is set to normal mode in step 914 . If the previous mode is known, the method 900 sets the mode and the configuration to the last previous known mode and configuration in step 916 . From steps 914 and 916 , the method 900 proceeds to step 918 , wherein the visual indicator is set according to the determined configuration. The method 900 ends at step 920 .

Abstract

A method and apparatus relating to a hand-held device. The hand-held device comprising a visual indicator utilized to indicate at least one a normal mode or a press-to-test mode, and where in the setting of the visual indicator are tamper proof.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims benefit of U.S. patent application Ser. No. 12/201,852 filed on Aug. 29, 2008, which claims priority from U.S. provisional patent application Ser. No. 60/969,599, filed Aug. 31, 2007, which is herein incorporated by reference.
  • BACKGROUND
  • 1. Field of the Invention
  • Embodiments of the present invention generally relate to a method and apparatus relating to ensuring an authenticated device is tamper proof.
  • 2. Description of the Related Art
  • Hand-held devices, such as, calculators, are often used in the educational environment. As a result, these devices are typically used in a classroom environment or even a testing environment to take some of the standardized state-level tests.
  • Students may use functionalities offered by such hand-held devices during exam in a way that jeopardizes the exam outcome. For example, students may utilize stored equations or communicate with other calculators in their network to retrieve restricted information. Hence, such functionalities may provide a tool for a student to cheat during an exam.
  • As a result, hand-held devices may be set to press-to-test (PTT) mode. The press-to-test mode allows a teacher to restrict the functionalities are should not be used on an exam. Hence, the teacher is able to utilize such hand-held device without being concerned that the students are cheating by utilizing unauthorized functions of the device. However, the current devices do not provide a way for the teacher to easily and visually inspect multiple devices to ensure that the press-to-test mode was properly set and maintained.
  • Therefore, there is a need for an improved hand-held device that offers a way to easily inspect multiple hand-held devices to ensure that the press-to-test mode was properly set and maintained.
  • SUMMARY
  • Embodiments disclosed herein generally relate to a method and apparatus relating to a hand-held device. The hand-held device comprising a visual indicator utilized to indicate at least one a normal mode or a press-to-test mode, and where in the setting of the visual indicator are tamper proof.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
  • FIG. 1 is an embodiment of a block diagram of a hand-held apparatus;
  • FIG. 2 is an embodiment of a flow diagram depicting mode transition method for a hand-held apparatus;
  • FIG. 3 is an embodiment of a flow diagram depicting normal mode to press-to-test mode method for a hand-held apparatus;
  • FIG. 4 is an embodiment of a flow diagram depicting press-to-test mode to normal mode method for a hand-held apparatus;
  • FIG. 5 is an embodiment of a flow diagram depicting transition to press-to-test mode method for a hand-held apparatus;
  • FIG. 6 is an embodiment of a flow diagram depicting transition to normal mode method for a hand-held apparatus;
  • FIG. 7 is an embodiment of setting chart for a light emitting diode (LED) utilized as a visual display indicating a mode relating to a hand-held apparatus;
  • FIG. 8 is an embodiment of shift registers setting for a light emitting diode (LED) utilized to provide a desired illumination sequence; and
  • FIG. 9 is an embodiment of a flow diagram depicting a reset or a reboot method for a hand-held apparatus
  • DETAILED DESCRIPTION
  • FIG. 1 depicts an embodiment of a block diagram of a hand-held apparatus 100, such as, a calculator. The apparatus 100 includes a processor 102, support circuit 106, security module 104 and memory 108.
  • The processor 102 may be any processor capable of executing computer instructions, such as, instructions stored in the memory 108. The processor 102 may be specific to a hand-held device, calculator or the like, and may be capable of performing algebraic calculation, geometry functions and the like. The processor 102 may include normal and security peripherals that monitor and ensure that the apparatus 100 is tamper-proof, which may be monitored by the security module 104. Herein, tamper proof means that unauthorized code or changes are not allowed, or that at least a portion of the memory or of the settings is protected from unauthorized access.
  • The support circuit 106 are circuits that may include, but are not limited to, power supplies, clock circuits, cache memory and the like. The support circuit 106 assist in executing functions relating to the hand-held apparatus 100. Herein, a computer readable medium is any medium in which computer data or instruction can be stored and/or accessed.
  • The security module 104 ensures that an authorized user is capable of changing the mode of the apparatus, for example, by checking a password, a user login, preferences, settings, or the like. For example, if the apparatus 100 is a calculator, a teacher may set the calculator to restrictive mode. A restrictive mode is a mode that restricts certain functionalities. If a student attempts to alter the mode of the calculator, the security module 104 would restrict the student from changing the calculator mode. However, the security module 104 would allow a teacher to alter the calculator's mode to a non-restrictive mode. Herein, a restrictive mode is referred to a press-to-test (PTT) mode, whereas a non-restrictive mode is referred to as a normal mode. The modes that facilitate the transition from and/or to normal and press-to-test modes are transition modes.
  • The security module 104 is a module that restricts the user from accessing secured area of memory and altering data, such as, user information, forcing calculator mode, resetting the calculator, etc. As a result, a teacher may set the calculator to a restrictive mode for an exam. Due to the security module 104, the teacher would be confident that a student would not be able to utilize the functionalities that the teacher restricted by resetting the calculator, changing user preferences/settings, etc.
  • The memory 108 may comprise random access memory, read only memory, removable disk memory, flash memory, and various combinations of these types of memory. The memory 108 may be referred to as main memory, cache memory, buffer memory and the like. The memory 108 may store an operating system (OS), database software, various forms of application software, such as, application programs 110, mode routine 112, and the like. The mode routine 112 allows the user to set the apparatus 100 to normal or press-to-test mode. An embodiment of the method performed by the mode routine is described in FIG. 2.
  • The hand-held device 100 may include a peripheral access module 114. The peripheral access module 114 is a module that allows or restricts access to peripherals, such as, visual indicator 118. For example, the peripheral access module 114 may communicate with the security module 104 in order to allow or prohibit access to the memory portions that controls hardware, such as, visual indicator 118. As such, the visual indicator 118 may be set by certain registers or memory location, which may only be changed by an authorized user, a specific device, a predetermined sequence of instruction, a password, etc. Hence, the visual indictor is tamper-proof.
  • For example, a teacher may utilize a calculator during an exam. The teacher may allow the students to utilize the algebraic functionality and disallow the use of saved equations and graphing functions. The mode setting of the calculator determines the setting of the visual indicator. The visual indicator may display a visual aid that indicates that access to saved equations and graphing function is restricted on the calculator. For example, the visual indicator may be a light emitting diode (LED) that emits a green light for 1 second followed by a red light for 2 seconds to indicate that the calculator restricts access to its saved equations and graphing function. The peripheral access module 114 protects access to the settings of the visual indicator 118. Therefore, the visual indicator's settings may only be changed by an authorized user, a specific device, a password, etc. As a result, the visual indicator is tamper proof and a teacher may utilize such an indicator to easily monitor the settings of multiple calculators. An example of the visual display setting is presented in FIG. 4.
  • FIG. 2 is an embodiment of a flow diagram depicting mode transition method 200 for the apparatus 100. The mode transition method 200 depicts the utilization of the security feature when transitioning from one mode to another. For example, mode flow diagram 200 includes a normal mode 202, transition to press-to-test (PTT) mode 204, press-to-test mode 206, and transition to normal mode 208. When first powered the hand-held device may default to a setup screen or to the normal mode 200. However, in one embodiment, the hand-held device will default to the mode that it was in when it was shut down.
  • The normal mode 200 is the mode in which a user is able to access most or all of the functionalities of an apparatus, such as, a calculator. For example, in normal mode 202, a student is not restricted from using calculator functionalities. Hence, a student would be able to store equations, retrieve equations, communicate with other users on a network, etc. In the normal mode 202, a user may initiate a request to transition to press-to-test mode 206. In one embodiment, when the devise is in normal mode 202, a student would not be able to alter his or her own setting to function as a teacher, administrator, allow himself or herself to reset the calculator and the like. When the device is in the normal mode, a visual display may not be utilized or may default to a specific setting. However, even when in the normal mode, the visual display setting are tamper proof, for example, the settings are protected by the security module 104 and/or peripheral access module 114 (both described in FIG. 1).
  • In press-to-test mode 206, a user is restricted from accessing certain areas of memory or certain calculator functionalities. For example, in press-to-test mode 206 a student may be restricted from using calculator functionalities, such as, storing equations, retrieving equations, communicating with other users utilizing calculators on a calculator network, etc. While in press-to-test, a visual display is utilized to visually and easily display the functionality restricted on the device. For example, the user may be restricted from initiating various communication or calculation functionalities. Accordingly, the visual display displays a visual aid indicating the restriction of such functionality or indicating the specific mode of the calculator. The setting of the visual indicator are tamper proof and are protected from tampering with, for example, protected by the peripheral security module 104 and/or access module 114 (both described in FIG. 1).
  • In one embodiment, such restriction and visual display setting may be broadcasted to a plurality of calculators or may be performed on each calculator separately. In another embodiment, a calculator may change mode and visual indicator setting only if the change mode instruction is received from a specific user or calculator. For example, a calculator may be setup to allow only a teacher to alter the mode, specify the type of functionality available when in press-to-test mode 206, setup users, setup visual display, etc. While in press-to-test mode 206, the hand-held device is tamper-proof. For example, the student is restricted from changing his or her setting to act as an administrator, a teacher, allow himself or herself to reset the calculator, alter the visual display setting, and the like. Moreover, the student is restricted from changing modes, resetting the calculator, changing functionality settings, etc.
  • Therefore, when in press-to-test mode 206, the calculator functionality is limited based on specified press-to-test mode 206 and/or functionality. The calculator is tamper-proof secured by utilizing security module 104 and/or peripheral access module 114 (both described in FIG. 1). Thus, a teacher would be confident that a calculator remains in press-to-test mode 206, for example, during an exam, and that a student is unable to alter the functionalities that she designated for the press-to-test mode 206.
  • When a hand-held device, such as a calculator, receives a request to transitioning from the normal mode 202 to the press-to-test mode 206, the calculator then transitions to the transition to press-to-test mode 204. In the transition to press-to-test mode 204, the calculator may enter the tamper-proof verification and may indicate that press-to-test mode 206 has been properly and securely initiated. In the transition to press-to-test mode 206, the mode transition method 200 may utilize the security module 104 and/or peripheral access module 114 (both described in FIG. 1). For example, the peripheral access module 114 may set a visual indicator 118 (FIG. 1) to indicate the functionalities enabled or disabled on the device.
  • When the hand-held device, such as a calculator, receives a request to transition from the press-to-test mode 202 to the normal mode 206, the calculator then transitions to the transition to normal mode 208. In the transition to normal mode 208, the calculator performs tamper-proof verification and indication that normal mode 202 has been properly and securely initiated. The mode transition method 200 ensures that the device or user requesting the change is authorized to perform such a request. If the person is not authorized, the request is denied or ignored. If the person is authorized, the mode transition method 200 allows the device to return to its normal mode 202, wherein all the functionalities are available to the user. In the transition to normal mode 206, the mode transition method 200 may utilize the security module 104 and/or peripheral access module 114 (both described in FIG. 1). For example, the peripheral access module 114 may set a visual indicator 118 (FIG. 1) to indicate the functionalities enabled or disabled on the device.
  • FIG. 3 is an embodiment of a flow diagram depicting normal mode to press-to-test mode method 300 for a hand-held apparatus. The method 300 starts at step 302 and proceeds to step 304. At step 304, the hand-held device is in normal mode. At step 306, the method 300 determines if a request to change to press-to-test mode is received. If there is a request, the method 300 proceeds to step 308. Otherwise, the method 300 returns to step 304. At step 310, the hand-held device is set to transition to press-to-test mode, which may include resetting the device, clearing memory, determining if the request is from an authorized user or device, and the like. At step 310, the method 300 sets the device in accordance with the request received and alters the setting of a visual indicator to indicate the functionalities or specific mode of the hand-held device. At step 312, the device is set to press-to-test mode. The method 300 ends at step 314.
  • FIG. 4 is an embodiment of a flow diagram depicting press-to-test mode to normal mode method 400 for a hand-held apparatus. The method 400 starts at step 402 and proceeds to step 404. At step 404, the hand-held device is in press-to-test mode. At step 406, the method 400 determines if a request to change to normal mode is received. If there is a request, the method 400 proceeds to step 408. Otherwise, the method 400 returns to step 404. At step 410, the hand-held device is set to transition to normal mode, which may include resetting the device, clearing memory, determining if the request is from an authorized user or device, and the like. At step 410, the method 400 sets the device in accordance with the request received and alters the setting of a visual indicator to indicate the functionalities or specific mode of the hand-held device. At step 412, the device is set to normal mode. The method 400 ends at step 414.
  • FIG. 5 is an embodiment of a flow diagram depicting transition to press-to-test mode method 500 for a hand-held apparatus. The method 500 starts at step 502 and proceeds to step 504. At step 504, the method 500 clears the memory, for example, to remove any memory available to rogue applications, hack software, and the like. At step 506, the method 500 authenticates the system, for example, by authenticating the hand-held device, applications, users, request and the like. At step 508, the operating system (OS) is loaded into memory. At step 510, the method 500 determines if the previous mode is a press-to-test (PTT) mode. If the previous mode is not press-to-test mode, the method proceeds to step 512, where the press-to-test mode configuration is set to the previous press-to-test configuration mode. Otherwise, the method 500 proceeds from step 510 to step 514. In step 514, the method 500 configures the press-to-test mode in accordance with the received request. From steps 512 and 514, the method 500 proceeds to step 516. At step 516, the visual indicator is set according to the configuration. The method 500 ends at step 518.
  • FIG. 6 is an embodiment of a flow diagram depicting transition to normal mode method 600 for a hand-held apparatus. The method 600 starts at step 602 and proceeds to step 604. At step 604, the method 600 accesses the request, for example, determining authorization, requesting user or device, if the request is valid, and the like. If the assessment returns a negative outcome, the method 600 may ignore the request. At step 606, the method 600 sets the device to normal configuration. At step 608, the visual indicator is set according to configuration. The method 600 ends at step 610.
  • FIG. 7 is an embodiment of setting chart 700 for a light emitting diode (LED) utilized as a visual display indicating a mode relating to a hand-held apparatus. The columns represent time/time slots. The chart 800 illumination patterns of a light emitting diode function as a visual indicator as described herein. In this embodiment, when entering a calculator boot up, the red LED is illuminated and another illumination is produced by either the green LED or a combination of the red and green LED. Hence, the result is a yellow illumination. When a device displays both a red illumination and a yellow illumination, the red LED is ON during both a time slot when the green LED is ON and during a time slot when the green LED is OFF. The color illumination indicates the functionality of the calculator. For example, a green illumination is used to indicate a more restrictive use of the device than a yellow illumination. In another embodiment, the least restrictive mode may illuminate a specific color, for example, a yellow illumination, which may mean that the hand-held device is functioning in normal mode.
  • In another embodiment, the red LED is illuminated for intervals, such as, 0.25 second and at 0.5 seconds the green LED is illuminated. The result is a yellow illumination for 0.25 second followed by a green illumination for 0.25 second. In FIG. 8, the row marked “final” shows the illumination produced. The sequence may be repeated during the boot up process. After boot up, the red and green LED's are illuminated at, for example, 0.5 seconds, 1.5 seconds, and 2.5 seconds etc and is repeated after boot up.
  • In one embodiment, if a hand-held device boots up when in press-to-test mode, The LED may alternatively illuminate the red LED and green LED to indicate the more restrictive mode. After boot up, the green LED may be illuminated. In one embodiment, for any mode selected the red LED is illuminated during boot up; however, after boot up, no red illumination may be visible. Hence, a teacher may be able to identify a student rebooting his or her hand-held device. When transitioning from press-to-test mode to normal mode, an LED color illumination may sequence to indicate that the device is exiting press-to-test mode or is in normal mode.
  • The settings of the LED are archived in a protected area in memory, such that such setting a tamper proofed. Hence, utilizing the illumination colors of the visual indicator, a teacher may query the multiple hand-held devices and trust that the illumination is a valid indication of the device mode and functionality setting.
  • FIG. 8 is an embodiment of shift registers setting 800 for a light emitting diode (LED) utilized to provide a desired illumination sequence. In FIG. 8, the illumination patterns correspond to those provided in FIG. 7. For example, during boot up, values are contained in the registers. Note that hardware may be used rather than software. Hardware may be used, for example, when a software controlled mechanism requires that the operating system have the ability to individually turn the LEDs OFF and/or ON. The chosen ON/OFF sequences of the LEDs are selected in such a way that an operating system may need to only turn an LED off or set very specific pre-defined sequencing patterns. The register settings are protected from unauthorized change and are tamper proof.
  • FIG. 9 is an embodiment of a flow diagram depicting a reset or a reboot method 900 for a hand-held apparatus. The method 900 may also be utilized for system initialization. The method 900 starts at step 902 and proceeds to step 904. At step 904, the method 900 determines if there is a request to rest or reboot. At step 906, the device memory is cleared, for example, to remove any memory available to rogue applications, hack software, and the like. At step 908, the method 900 authenticates the system, for example, by authenticating the hand-held device, applications, users, request and the like. At step 910, the operating system (OS) is loaded into memory. At step 912, the method 500 determines if the last previous mode is known. If the last previous mode is not known, the mode is set to normal mode in step 914. If the previous mode is known, the method 900 sets the mode and the configuration to the last previous known mode and configuration in step 916. From steps 914 and 916, the method 900 proceeds to step 918, wherein the visual indicator is set according to the determined configuration. The method 900 ends at step 920.
  • While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.

Claims (8)

1. A hand-held device comprising a visual indicator utilized to indicate at least one a normal mode or a press-to-test mode, and where in the setting of the visual indicator are tamper proof.
2. The hand-held device of claim 1, wherein the hand-held device is a calculator.
3. The hand-held device of claim 2, wherein the calculator is coupled to a calculator network.
4. The hand-held device of claim 2, wherein visual display represents at least one of availability or restriction of at least one of functionalities or hardware in the mode of the calculator.
5. The hand-held device of claim 1, wherein the visual display is a light emitting diode.
6. The hand-held device of claim 5, wherein the light emitting diode illuminates more than one color simultaneously.
7. The hand-held device of claim 6, wherein the illumination time of one color is set to illuminate for a different time than another color.
8. A calculator comprising a light emitting diode, wherein the light emitting diode illuminates sequence of color for a time slot to indicate at least one of the mode of the calculator or the functionality of the calculator at least one of restricted or allowed, and wherein the settings of the light emitting diode are tamper proof.
US12/333,007 2007-08-31 2008-12-11 Method and Apparatus for Secure Mode Indication Abandoned US20090115606A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/333,007 US20090115606A1 (en) 2007-08-31 2008-12-11 Method and Apparatus for Secure Mode Indication

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US96959907P 2007-08-31 2007-08-31
US20185208A 2008-08-29 2008-08-29
US12/333,007 US20090115606A1 (en) 2007-08-31 2008-12-11 Method and Apparatus for Secure Mode Indication

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US20185208A Continuation 2007-08-31 2008-08-29

Publications (1)

Publication Number Publication Date
US20090115606A1 true US20090115606A1 (en) 2009-05-07

Family

ID=46332077

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/332,886 Active 2032-02-25 US9218504B2 (en) 2007-08-31 2008-12-11 Method and apparatus for secure mode indication
US12/333,007 Abandoned US20090115606A1 (en) 2007-08-31 2008-12-11 Method and Apparatus for Secure Mode Indication

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/332,886 Active 2032-02-25 US9218504B2 (en) 2007-08-31 2008-12-11 Method and apparatus for secure mode indication

Country Status (1)

Country Link
US (2) US9218504B2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120102550A1 (en) * 2010-10-22 2012-04-26 Newman David M Wireless Device Network Association
US8789197B1 (en) 2010-09-17 2014-07-22 Wolfram Alpha Llc Method for using a multi-function computer for testing
US9043376B2 (en) 2012-08-31 2015-05-26 Hewlett-Packard Development Company, L.P. Custom configuration for a calculator based on a selected functionality
EP3885943A1 (en) * 2020-03-25 2021-09-29 Casio Computer Co., Ltd. Electronic device, and function limit cancel method and program

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120041993A1 (en) * 2010-08-16 2012-02-16 Texas Instruments Incorporated Method and apparatus for configuring functionality of a calculator

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3755806A (en) * 1972-05-24 1973-08-28 Bowmar Ali Inc Calculator display circuit
US4117542A (en) * 1977-07-07 1978-09-26 Judah Klausner Electronic pocket directory
US20020067281A1 (en) * 2000-05-11 2002-06-06 Shih-Ping Yeh Status indicating device of a portable computer
US20020133680A1 (en) * 2000-03-20 2002-09-19 Rosenquist Russell M. System and method for limited access to system memory
US20060099965A1 (en) * 2004-11-10 2006-05-11 Aaron Jeffrey A Methods, systems and computer program products for remotely controlling wireless terminals

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006338205A (en) * 2005-05-31 2006-12-14 Casio Comput Co Ltd Electronic equipment and control program thereof
US8499014B2 (en) * 2005-06-01 2013-07-30 Texas Instruments Incorporated Functionality disable and re-enable for programmable calculators
US20070226778A1 (en) * 2006-03-22 2007-09-27 Jorg Pietruszka Bluetooth theft protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3755806A (en) * 1972-05-24 1973-08-28 Bowmar Ali Inc Calculator display circuit
US4117542A (en) * 1977-07-07 1978-09-26 Judah Klausner Electronic pocket directory
US20020133680A1 (en) * 2000-03-20 2002-09-19 Rosenquist Russell M. System and method for limited access to system memory
US20020067281A1 (en) * 2000-05-11 2002-06-06 Shih-Ping Yeh Status indicating device of a portable computer
US20060099965A1 (en) * 2004-11-10 2006-05-11 Aaron Jeffrey A Methods, systems and computer program products for remotely controlling wireless terminals

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8789197B1 (en) 2010-09-17 2014-07-22 Wolfram Alpha Llc Method for using a multi-function computer for testing
US9582648B2 (en) 2010-09-17 2017-02-28 Wolfram Alpha Llc Method for using a multi-function computer for testing
US20120102550A1 (en) * 2010-10-22 2012-04-26 Newman David M Wireless Device Network Association
US8533788B2 (en) * 2010-10-22 2013-09-10 Texas Instruments Incorporated Wireless device network association
US9043376B2 (en) 2012-08-31 2015-05-26 Hewlett-Packard Development Company, L.P. Custom configuration for a calculator based on a selected functionality
EP3885943A1 (en) * 2020-03-25 2021-09-29 Casio Computer Co., Ltd. Electronic device, and function limit cancel method and program

Also Published As

Publication number Publication date
US20090144838A1 (en) 2009-06-04
US9218504B2 (en) 2015-12-22

Similar Documents

Publication Publication Date Title
AU2020200650B2 (en) Systems and methods for providing security via interactive media
US9519768B2 (en) Eye movement based knowledge demonstration
US8301897B2 (en) Challenge-based authentication protocol
US20090115606A1 (en) Method and Apparatus for Secure Mode Indication
US8549317B2 (en) Authentication method, authentication apparatus and authentication program storage medium
US8661540B2 (en) Method and apparatus for secure credential entry without physical entry
US20070022299A1 (en) Password authentication device, recording medium which records an authentication program, and authentication method
US20050246512A1 (en) Information-processing apparatus and method and program for starting the same
US20150046993A1 (en) Password authentication method and system
US20050071665A1 (en) Methods and apparatus to associate boot objects with trust credentials
KR20150094178A (en) Security device and controlling method for security device
US20080154997A1 (en) Systems and methods for function control in a calculation device
Reinitz et al. Different confidence–accuracy relationships for feature-based and familiarity-based memories.
US20140280935A1 (en) Systems and methods for controlling access to user content
García‐Pérez Denoising forced‐choice detection data
JP2007058392A (en) Authentication system, authentication method, data controller, and its program
JP6330166B2 (en) Management apparatus and management method
JP7176084B1 (en) Information processing device and control method
KR100586868B1 (en) Computer security system and operating method thereof
CN116150708A (en) Display control method, device and medium of terminal device
WO2017149779A1 (en) Device monitoring system, device monitoring method, and program
US20090047651A1 (en) Method and apparatus for presenting queries and rewarding correct answers
KR20040029205A (en) computer system and method for booting control thereof

Legal Events

Date Code Title Description
AS Assignment

Owner name: TEXAS INSTRUMENTS INCORPORATED, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROSENQUIST, RUSSELL MELVIN;REEL/FRAME:036794/0420

Effective date: 20151006

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION