Claims
- 1. A method for protecting against a computer operation from being performed, comprising the step of initiating the operation only after a user's intention to perform the operation is confirmed, the user's intention being confirmed by:
(a) removing from a computer configuration a removable storage medium after a program on the removable storage medium has been read by the computer and before a check for the continued presence of the removable storage medium within the computer configuration is performed in accordance with the program; and (b) without requiring the use of a user-input device of a computer.
- 2. A computerized method for confirming, without requiring use of a user-input device of a computer, a user's intention to perform a computer operation, comprising the steps of:
(a) reading and running a program stored on a removable storage medium within a computer configuration; and (b) in accordance with the program,
(i) determining in a check the continued presence within the computer configuration of the removable storage medium; and (ii) initiating the operation only after the check indicates the absence of the removable storage medium within the computer configuration.
- 3. A computer-readable medium having computer-executable instructions for performing steps of the method of claim 2.
- 4. In a computer configuration including hardware, a computerized method for confirming, without requiring use of a user-input device of a computer, a user's intention to perform a computer operation, comprising the steps of:
(a) reading and running a program on a removable storage medium using the hardware in a first step; and (b) in accordance with the program,
(i) accessing the removable storage medium using the hardware in second step; and (ii) initiating the operation on the computer only after unsuccessful access to the removable storage medium using the hardware in the second step.
- 5. The method of claims 1, 2, or 4, wherein the removable storage medium is a bootstrap medium.
- 6. The method of claims 1, 2, or 4, wherein the operation is performed on a computer.
- 7. The method of claims 1, 2, or 4, wherein the removable storage medium includes a bootstrap program.
- 8. The method of claim 7, wherein the bootstrap program instructs the computer to run the program stored on the removable storage medium.
- 9. The method of claim 7, wherein the program comprises the bootstrap program.
- 10. The method of claims 1, 2, or 4, wherein the removable storage medium comprises one of the type of floppy disks, ZIP disks, optical disks, CD-ROM disks, DVD disks, USB-devices, serial devices, parallel devices, SCSI devices, infrared capable devices, wireless devices, short-range radio frequency (RF) enabled devices, smart cards, and magnetic stripe cards.
- 11. The method of claims 1, 2, or 4, wherein the computer configuration includes a computer that has no user-input devices connected thereto.
- 12. The method of claims 1, 2, or 4, wherein the computer configuration includes a computer that has a user-input device that is disabled or malfunctioning.
- 13. The method of claims 1, 2, or 4, wherein the computer configuration includes a computer comprising a laptop computer.
- 14. The method of claims 1, 2, or 4, wherein the computer configuration includes a computer that has no user-output devices connected thereto.
- 15. The method of claims 1, 2, or 4, wherein the computer configuration includes a computer comprising a headless server.
- 16. The method of claims 1, 2, or 4, wherein the computer configuration comprises a first node of a computer network and including a computer on which the operation is performed.
- 17. The method of claim 16, wherein the removable storage medium is removed from the computer configuration at a second, different node of the computer network.
- 18. The method of claim 16, wherein a computer-readable medium having computer-executable instructions for performing the operation is located at a second, different node of the computer network.
- 19. The method of claim 18, wherein the second node comprises a network attached storage device.
- 20. The method of claims 2 or 4, further comprising waiting a predetermined period prior to said second step.
- 21. The method of claim 2, further comprising repeating said step of determining in a check the continued presence within the computer configuration of the removable storage medium until said step indicates the absence of the removable storage medium from the computer configuration or until either (i) a predetermined number of attempts has occurred and/or (ii) a predetermined time period has expired.
- 22. The method of claim 4, further comprising repeating said step of accessing the removable storage medium using the hardware until the removable storage medium is unsuccessfully accessed or until either (i) a predetermined number of attempts has occurred and/or (ii) a predetermined time period has expired.
- 23. A removable storage medium readable by a computer and having computer-executable instructions for performing a method for initiating a computer operation only after a user's intention to perform the operation is confirmed without requiring use of a user-input device of a computer, the method comprising the steps of:
(a) determining in a check the continued presence within a computer configuration of the removable storage medium within the computer configuration; and (b) initiating the operation only after the check indicates the absence of the removable storage medium within the computer configuration.
- 24. The combination of claim 23, wherein the removable storage medium is a bootstrap medium.
- 25. The combination of claim 24, wherein the computer-executable instructions are part of a bootstrap program.
- 26. The combination of claim 24, wherein the computer-executable instructions are part of a program which the bootstrap program instructs the computer to run.
- 27. The combination of claim 23, further comprising computer-executable instructions on the removable storage medium for waiting a predetermined period of time prior to said second step.
- 28. The combination of claim 23, further comprising computer-executable instructions on the removable storage medium for repeating said step of determining in a check the continued presence within the computer configuration of the removable storage medium until said step indicates the absence of the removable storage medium from the computer configuration or until either (i) a predetermined number of attempts has occurred and/or (ii) a predetermined time period has expired.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This patent application is a continuation application claiming priority in the United States under 35 U.S.C. § 120 to the benefit of the filing date of international patent application serial no. PCT/U.S.02/40106, filed designating the United States on Dec. 16, 2002, and titled “Initiation Sequences For Performing Protected Computer Operations” (and to be published in English), which international patent application is incorporated herein by reference. This application also relates to the same field of invention as the current assignee's U.S. patent application Ser. No. 10/248,424, filed Jan. 18, 2003, which is the nonprovisional of provisional U.S. patent application serial No. 60/350,434, filed Jan. 22, 2002, both of which are incorporated herein by reference.
Continuations (1)
|
Number |
Date |
Country |
Parent |
PCT/US02/40106 |
Dec 2002 |
US |
Child |
10248428 |
Jan 2003 |
US |