CA2317889A1 - Anti-theft device for computers - Google Patents

Anti-theft device for computers Download PDF

Info

Publication number
CA2317889A1
CA2317889A1 CA 2317889 CA2317889A CA2317889A1 CA 2317889 A1 CA2317889 A1 CA 2317889A1 CA 2317889 CA2317889 CA 2317889 CA 2317889 A CA2317889 A CA 2317889A CA 2317889 A1 CA2317889 A1 CA 2317889A1
Authority
CA
Canada
Prior art keywords
power
circuit
board
computer
switch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2317889
Other languages
French (fr)
Inventor
Gordon Boerke
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2317889A1 publication Critical patent/CA2317889A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Abstract

A computer plug-in card provides the anti-theft function. Power to the hard-drive is routed through the plug-in card. If programmable security conditions are not met, the power to the hard-drive is cut, and an alarm sounds. Conventional security features, such as a motion-detector, pull-out-cord, etc, can also be included. A battery is provided on the plug-in card, and the security features remain available even when the computer is switched off.

Description

1 Title: ANTI-THEFT DEVICE FOR COMPUTERS
2 This invention relates to deterring thieves from stealing
3 computers, and from stealing information stored on computers.
4 BACKGROUND TO THE INVENTION
The invention is particularly aimed at preventing theft of s information by a person who has perhaps legitimate, or at least unnoticeable, access to the place where the computer is located, a but does not have a password to the computer itself. Such pseudo-s authorised persons include co-employees from other departments, office visitors, customers, suppliers, cleaners, janitors, etc.
11 Theft of personal computers is a fast-growing commercial crime.
i2 The term personal computers encompasses personal digital assistants, laptop computers, desktop computers and networked or is interconnected computers. The owner of computer hardware can is replace the stolen hardware within a few days but replacement of 1s information often requires more time and financial costs. Since i7 theft of information can be accomplished simply by accessing the is computer file and copying the file to a diskette this type of theft is may go unnoticed by the owner. Information theft of this type can 2o result in financial losses if the information is used by a 21 competitor. Security systems in office buildings are often not 22 enough to protect computers.
23 One common way of ensuring security of computer files and hard-2a drives is by the use of the conventional password security system, 2s which prevents a file being opened unless the correct password is 2s entered. Of course, there are many password systems in use, from the simple to the highly sophisticated. In. computer systems, 2 generally, the title of the data-file appears on the directory of 3 the hard-drive, and the data-file is opened by selecting its title 4 from the hard-drive directory. Usually, in a password security system, the password is interposed between the title of the file s and the actual data stored in the file. When a person does not know the password, the reason the person cannot access the data is s that, because of the absence of the password, no link can be made s between the title and the data.
io However, even though the link is not available between the title 1~ and the data, of course the data still exists on the hard-drive.
12 One problem with conventional password systems is that utility 13 programs are available which can scan a hard-drive, sector by 1a sector, and record all the data present thereon. By the use of such utilities, it is often possible to access all the data on the 18 hard-drive, whether it is password-protected or not. The password protected data would not be accessible under its original file ~s names, but it would be accessible. The utility program gives new ~s names to the batches of data it finds on the hard-drive. Although 2o these made-up files of data might be incomplete, or might include 21 more than one of the password-protected files, generally, by the 22 use of such utility programs, it is all too possible for a thief to 2s read most of the data on the hard-drive, without the use of the 2a passwords. All the thief needs is access to the computer for what is, unfortunately, all too short a period of time.
2s Computer users who store sensitive information in hard-drives are 2~ conscious of the shortcomings of the conventional password security 2a facilities, and desire a system which is less easy for the thief to 2s beat. One type of security system that might suggest itself to the so user is an encryption system, in which the data is encrypted, or 3~ scrambled, as it is written to the hard-drive. Now, if a thief 1 performs a sector by sector utility scan, he cannot read the 2 encrypted data because it remains scrambled. Therefore, encryption 3 can provide excellent security; however, its major disadvantage is a that encryption and decryption take time, during loading and s unloading of the files, and the delay to the user, every time data s is loaded or unloaded, can be tiresome. The general rule is that conventional software solutions to the security problem, such as a encryption, have undesirable side effects, such as imposing a time s delay on data access. The invention is aimed at providing security ~o without resorting to encryption and the problems associated 11 therewith.
12 Another approach that might suggest itself to the user looking to 13 make a computer system more secure is to provide a physical or ~a mechanical anti-theft system. No sophistication is needed to chain is and padlock a computer to another object; but such purely-physical is measures are ineffective against the information thief. At a much 1~ more sophisticated level, a system designer might prefer to provide is a special hard-drive, which contains a password-operated switch, is embedded in the hard-drive, for switching on the power supply to 2o the hard-drive, or the data connection between the computer and the 21 hard-drive. While a system like that can indeed be secure, 22 providing a special hard-drive is very expensive.
2s One aim of the present invention is to provide an inexpensive 2a security system, which disables the hard-drive, and prevents the 25 hard drive from being powered up if the correct password is not 2s entered, but which can be installed in an ordinary computer having 27 an ordinary conventional hard-drive.

1 The invention deters theft of information by disabling the hard-2 drive (or other repository of sensitive data) on the computer. The s invention provides a security apparatus, preferably in the form of a a plug-in card, which is inserted into the computer. In the use of s the invention, preferably, the power cord that runs from the s computer's power supply to the hard-drive is re-routed through box the plug-in card. Suitable power leads, supplementary plugs, s sockets, etc, as required re-route the power supply to the to hard s drive through the card, are included in the apparatus.

~o A major function of the invention is to disable the hard-drive by 11 cutting the power supply to the hard drive, if the correct password 12 is not entered. But since it is a security apparatus, preferably 13 the apparatus of the invention also includes other security t4 facilities, to prevent theft of the computer itself, such as 15 provision for a security cable, a siren alarm if the computer is is moved or the system mis-used, and other anti-theft functions as 17 described herein.
18 In the invention, the security apparatus is embedded within the ~s computer itself, to deter unauthorized use of and theft of the 2o computer and its stored information. The apparatus is aimed at 2i addressing several computer security problems and solutions 22 including disabling the main hard drive, generating an alarm, 2s tracking computer usage, sensing motion and controlling access 2a through passwords. The security apparatus preferably can perform 2s its various functions while the computer is on or off. The 2s security functions can be disabled by an authorized user to allow 27 the movement or maintenance of the computer.
2s Preferably, a security system should be invisible, or at least 2s unobtrusive, during normal operation by an authorised user. When so an employer takes blatant precautions to stop the employees 1 cheating and stealing, honest employees often resent the employer's 2 implied message that they are not to be trusted. Attaching s security chains and padlocks to the computer hardware and a peripherals falls into that category, for instance.
s The sensitive employer prefers a system that is unobtrusive to the s ordinary employee, but at the same time indicates unequivocally to the employee that this or that action is across the line, and s moreover makes it clear that performing the action will leave a s trail. .The security systems as described herein are aimed at ~o providing the function whereby password-authorised users will 11 perceive, during normal use of a computer equipped with the 12 security apparatus, that a record is being made of the date and 13 time of access under their specific password, whether they made ~a copies, entered data changes, etc, and whether and when the alarm ~s conditions were activated, and with what result.
~s Preferably, the system provides that the employer or owner of the 17 data be given an owner-only password, whereby only the owner may 1a make changes to the parameters for setting up the manner of is recording activities. As well, the usual hierarchy of passwords 2o may be provided, i.e passwords for read-only access, passwords for 2~ read-plus-change access, etc. Preferably also, an overriding 22 password, which enables the whole system, but is unique to the one 2s purchased apparatus, would be available upon application to the 2a system manufacturer, or the overriding password might be supplied 25 with the system, and be stored in a safe-deposit box or the like.
26 It is an aim of the invention to provide a security system that is 2~ easy to install. The systems as described herein can be assembled 2a just by plugging-in the various components. In a conventional 2s computer, the power supply to the hard-drive (5v and 12v) is so derived from a four-wire supply, which, in a conventional computer, 1 is simply plugged into the socket provided on the back of the hard-2 drive. The apparatus of the invention preferably includes a card, s which is installed in a bus-connector (PCI, ISA, etc) slot in the 4 computer. Then, the existing power plug is simply removed from the s hard-drive and plugged into a socket on the card. A four-wire s supply provided on the apparatus is plugged into the back of the hard-drive. Thus, the power supply to the hard-drive now runs a through, and can be controlled by, the apparatus of the invention, s and yet no wires have been broken or cut, no soldering is required, io and nothing is done that would interfere with the operations of the ~1 computer. This ease of installation is important in a computer i2 accessory.
13 Often, the decision to make a hard-drive secure is not made until is after many data-files have accumulated on the hard-drive. It is an is aim of the invention to provide a system which will be effective to is protect the data-files already present on an existing hard-drive.
17 An encryption system, by contrast, does not protect data-files that is were placed on the disc before the system was installed.
It is an aim of the invention to disable the power supply to the 2o drive, but at the same time to leave the alarm on. If an 2i unauthorized person sits down at the computer, when the hard drive 22 is disabled, and attempts to access the hard-drive, the system 2s enters an alarm-ready mode, and a warning that it has done so is 2a given to the person. If the person then leaves, the alarm does not 2s sound, although the fact that the activity has taken place, with 2s date and time etc, is recorded on the log. If the unauthorized 2z person carries on and makes attempts to use the hard-drive, or to 2a hack a password, or to move the computer, etc, the alarm then goes 2s o f f .
so It is an aim of the invention that the apparatus should access the 1 computer's information bus, whereby the designer of the system can 2 arrange for the parameters that will be under the control of a s person to be monitored and adjusted on-keyboard, on-screen. Also, a by being connected to the bus, the apparatus can keep track of the s computers operations, which provides a measure of protection s against mis-use by authorised users. It is an aim that some z computer operations will be recorded (and it will be seen to be s recorded) in the event that the authorised user (that is to say, s the password of the authorised user) has been used to take copies, io operate out of hours, etc. On the other hand, it is an aim of the 11 invention that the operations of the computer should not be 12 affected by the security apparatus of the invention. The security ~s apparatus contains a switch, which simply switches the power supply is to the hard-drive on or off; the apparatus is passive as far as is computer operation is concerned, and does not affect the manner in ~s which the computer itself accesses the hard-drive.
i7 It is an aim of the invention to provide a security system that is is unobtrusive to the ordinary user, once the password has been is entered, i.e in which the authorised user can access the computer 2o in the normal way, after entering a valid password.
2i It is an aim of the invention to provide a security apparatus that 22 will properly detect attempted theft without false alarms, and 2s which will continue to function and monitor the computer whether 2a the computer is powered on or off.

2s By way of further explanation of the invention, exemplary 2~ embodiments of the invention will now be described with reference 2s to the accompanying drawings, in which:

1 Fig 1 is pictorial view of apparatus that embodies the a an 2 invention.

s Fig 2 shows some of the components and functions present on the a apparatus f Fig 1.
o Fig 3 is block diagram of architecture of the apparatus.
a the s Fig 4 is flow-diagram showingthe operational logic of the a apparatus.

a Fig 5 shows a selection of menuscreens produced by the apparatus.

s The apparatuses shown in the accompanying drawings and described to below are examples which embody the invention. It should be noted 11 that the scope of the invention is defined by the accompanying 12 claims, and not necessarily by specific features of exemplary is embodiments.
is The apparatus as shown in Fig 1 is intended for fitment into a iscomputer of IBM(tm) type. The apparatus includes a card 20, the iswhich is fittedinto one of the bus-connector slots in the computer. (For installation, the computer's cover is removed, and i8of course there must be an available bus-connector slot on the iscomputer to receive the card 20.) 2o The computer has a hard-drive 23. Conventionally, the 21 configuration of the computer is that the power supply for the 22 hard-drive comprises 5-volt and 12-volt supplies. These 2s (regulated) voltages are supplied from the computer's power supply 2a box (not shown), and are fed to the hard-drive 23 (and to several 2s other items in the computer) via a four-wire plug-and-socket 2s arrangement. The hard-drive 23 has a built-in receptacle 24, which 2~ normally receives one of the several four-wire plugs 25. The plug 2a 25 is wired directly to the power supply box.
2s The four-pin plug and socket connectors in common use on computers 1 are of plastic, and are manufactured under the product name, Mate-2 N-Lok (tm) by AMP (tm). The plug component is designated Mate-N-s Lok 1-480426-0, and the socket component is designated Mate-N-Lok a 1-480424-0. The invention makes use of these standard components.
s In the present instance, the plug 25, direct from the computer's s power supply box, has been removed from the receptacle 24 in the hard-drive 23. Now, the plug 25 is engaged into corresponding a a receptacle 26 connected to the card 20. A plug from the card 27, s 20, now runs from the card 20 to receptacle on the hard-the 24 1odrive. Thus, the card 20 is interpo sed into between the power ~1supply box and the hard-drive. The leads 28,29 connected are 12respectively to connectors 2,3.

~sFig 2 shows some of items includes on the card 20. In addition the ~ato the power-in leads and socket 26, and the power-out leads 1sand plug 27, the card cludes a rechargeable battery 14, a siren in is19, a trembler or motionsensor 15, and an external alarm hook-up 1716 for a pull-out sensorfor a security cable, and the like.

is One of the main functions of the card 20 is, as described, to ~s provide an operable power switch 1, which connects the power-in 20 leads 28 to the power-out leads 29 if all is well, but disables 21 that connection if one of the security parameters is triggered.
22 Fig 3 illustrates in block-diagram form the architecture of the 2s security apparatus. The operable power switch is indicated at 1.
24 Upon installation, the apparatus is connected to the computer bus 25 8. User settings and parameters of the apparatus are communicated 2s between the computer and a controller 4 via a bus interface 9.
2~ Alternatively, a remote control 11 may be provided.
2s The controller 4 can be a micro-controller, microprocessor or other 1 main processing circuit; either programmable, pre-programmed or an 2 application specific semi-conductor or discrete circuit to control 3 the state of the power switch 1. While the computer power is on, a the card is powered from the power supply connections on the bus 8.
When the computer power is off, the card derives the power it needs s to process the security parameters from the battery 14. A battery charger 13 is included, which can be activated automatically or by s the user.
s Fig 4 shows the operation of the security apparatus. Upon powering up the computer, an initialization operation 101 is activated.
11 During initialisation, the power supply to the hard-drive 23 inside 12 the computer is temporarily enabled. That is to say, the power switch 1 is turned on, for a pre-set period of time. One function to of the security apparatus is to turn the power switch 1 off if the correct password is not supplied (via the computer keyboard) within is the set time. The time period should be long enough to allow the 17 computer's boot-up procedure to be completed, whereupon the ie computer can respond to input (including passwords) from the is keyboard. The card 20 includes power-on 5 and reset 6 sensing lines, for signalling the start of initialisation.
2~ A timing circuit 7 provides the time delay before the power switch 22 1 supplying power to the hard-drive is turned off. The length of 2s the delay is configurable by the (authorised) user, via the 2a computer keyboard. The timing circuit 7 also controls the parameters for delaying sounding the siren, and the duration of the 2s siren. The timer 7 includes facilities for allowing date and time 2~ data to be maintained.
2s If the password is not supplied during the time delay period, the 2s apparatus initiates the siren and drive-disable features. The time so delay is initiated by sensing a power-up condition (via the lines 5 1 or 6), and also, the time delay (which can be for a different 2 number seconds or minutes) is initiated by the trembler or of s motion nsor or pull-out sensor 16, or by such other security se 15, 4 features as may provided in a particular case.
be Once the apparatusis initialized, either from battery power or s from the computer's power, the apparatus is ready, as at 102, for a password from user. The apparatus receives the password and the s checks the password validity against one or more stored passwords, s as at 103. If the password is invalid the apparatus checks if too io many invalid passwords were entered, as at 104, indicating password tt hacking, and if so it will generate the alarm condition, as at 105.
i2 If the password is valid, the apparatus next determines, as at 106, is whether the user has access at the present time. If the present is time monitor allows access, the siren 19, if sounding, is stopped and the power switch 1 connects the power-in leads 28 to the power-is out leads 29 leading to the hard-drive 23 (or other device being 17 controlled) to enable the use thereof, as at 107. Otherwise, the power switch 1 is set, as at 109, so the hard-drive is disabled.
is Sometimes, the user might wish to deliberately disable the hard-2o drive (if he wishes to walk away from the computer for a time, for 2~ instance) and the apparatus can provide that facility. The 22 apparatus waits for a valid password to be entered again, as at 23 102, to re-enable the hard-drive, as at 107. Once the hard-drive 2a has been enabled (by the entry of a valid password) the apparatus waits for a new command, as at 110.
2s All parameters arid functions of the security system are 2~ configurable, by an authorised user who has entered the correct 2a password, as at 111. The configuration data is stored and 2s controlled by the controller 4. Lower level passwords may be so restricted to certain commands only. The configurable settings, as 1 presented to the authorised user, as at 112, may include, for 2 example: drive or device disable ready, time delay to drive or s device disable, motion alarm sensor ready, external alarm sensor 4 ready, time delay before motion or externally triggered alarm s begins, motion or external warning alarm ready, time duration of s warning alarm, siren ready, time delay before siren begins, option to stop motion or externally activated alarm by turning the s computer on, option to stop siren by turning the computer off, s computer access lock out times for lower level passwords, minimum io password lengths, limit of consecutive invalid password entries and 11 a subsequent warning or alarm if limit exceeded, user restricted 12 access to some or all of the. security apparatus parameters for 13 lower level passwords, date and time setting, battery maintenance, to activity log retrieval, etc, etc.
15 While waiting for a new command, as at 110, the apparatus checks whether the computer was turned off, as at 113, or reset, as at t7 114. Computer power-off is also checked before a valid password is 1a entered, as at 115. If the computer power is off the option to ~s turn off a motion activated alarm 116 can be done at this time, as 2o at 117. The apparatus can now be put into a reduced power mode 118 2i from which it will occasionally check if the computer is turned on, 22 as at 119.
23 At start-up, i.e when the computer is turned on, or reset, the 2a apparatus determines whether a time delay to an alarm should be 2s initiated, as at 120,121, and whether and when the time delay to 2s disable the hard-drive should be initiated, as at 122,123.
2~ The various components illustrated in Fig 3 may be summarised as 2s follows.
2s The power switch 1 may be e.g an electronic, optoelectronic or 3o electromechanical switch to control power to a device such as 1 a drive (hard-drive, diskette drive, CD ROM drive, etc) inside 2 the computer.
3 The power-in connection 2 is for connecting the apparatus to the a computer power supply. This is the power to be controlled by s the power switch 1.

s The power-out connection 3 is for connection to the device to be powered, such as a hard-drive 23, inside the computer.

s The controller 4 is a microcontroller, microprocessor or other main s processing circuit either programmable, pre-programmed or an 1o application-specific semi-conductor or discrete circuit, to 11 control the state of the power switch 1.

i2 The power sense line 5 allows the controller to determine if the t3 computer is on or off.

is The reset sense line 6 allows the controller to determine if the 15 computer has been reset.

is The timing circuit 7 allows for timing delays and time of occurrences to be observed and recorded.

1a The bus connection 8 is a connection to the computer circuits for is logic, data, address, etc.

2o The bus interface 9 is a logic, data, and address decoding circuit, 2i which allows the controller 4 and computer to communicate.

22 The interface lines 10 are logic, data and address lines from and 2s to the computer and controller.

2a The remote control 11 is a remote interface to a transmitting 2s device, which may be provided to communicate with the 2s controller.

27 The remote control lines 12 are the logic, data and address lines 2a between the remote control and the controller.

2s The battery charge circuit 13 allows for battery charging and 3o conditioning.

s1 The battery 14 is of the nickel-cadmium rechargeable type, which is 32 used to maintain memory of controller configuration or 33 programming .

1 The motion sensor 15 includes a mercury switch, or two mercury 2 switches placed at right angles, to detect when the computer s is being moved. Insofar as the use of (toxic) mercury is a contra-indicated, motion detectors based on the rolling-ball s principle, for example, may be provided instead.
6 The external sensor 16 receives a security cable. The sensor detects when the cable has been pulled out. The security a cable is an option that, when used, physically restrains the s computer to some immovable object.
1o The siren 19 makes use of a DC-to-DC step-up converter 17 and a 11 siren driver 18.
12 Fig 5 shows some of the menu screens that are available (to the 13 authorised user) for changing and setting the parameters of the 1a security system. For example, the set-up menu 40 enables the time-15 delay settings, and some basic mode-of-operation settings, to be 1s entered. The password set-up menu 42 enables password limitations 1~ to be entered. The battery menu 43 allows the user to tailor the 1a battery to the particular computer and the desired mode-of-1s operation. The log 45 enables the user to set the parameters by 2o which the security system logs the various activities that the 21 computer undergoes; for example, the apparatus can be set to log 22 whether and when the computer was switched on and off, and by whom 23 (i.e by the use of which password). Other activities, such as 2a attempts at password hacking, can at least be logged as to when the 2s system entered the alarm-ready (or alarm-on) state, the drive-2s disable states, etc, with time and date. The idea is that the fact 27 that this activity is logged, and is seen to be logged, provides a 2a deterrent to the pseudo-authorised person.
2s Other menus may be provided, to enable the authorised person to set 3o periods when the hard-drive cannot be accessed at all, even by a 31 password-authorised person. Generally, it has been very difficult 1 to provide protection against a person who, though properly 2 password-authorised, in fact wishes to steal or otherwise mis-use 3 information stored on the computer. The idea here is that such a a person will shrink from mis-using the data during office hours,
5 when others are around to monitor what he is doing; therefore, s configuring the system so that the secure hard-drive is only operable during office hours provides some measure of protection a even against people who do have passwords.
s The configurable parameters of the security system as described may 1o be listed as follows 1i The power switch is used to turn the power to the hard-drive 23 or 12 other devices) On or Off, thereby enabling or disabling the 1s device .

is The controller can be programmed or configured, via the bus 15 connection, bus interface and interface lines, by the is authorised user to control the power switch.

17 The programmed features can be stored in non-volatile memory within is or separate from the controller. If stored in volatile is memory, the battery will be required to maintain power for 2o memory while the computer is powered off.

21 The power-in connection used to power the drivels) originates from 22 the computer power supply via a standard computer power cable 2s and plug-in connector. Being the live side of the power 2a switch, the power-in connection can also provide the power to charge the battery .

2s The power-out connection is used to power the hard-drive (and other 2~ devices(s) if desired) via a computer power cable.

2s The power sense line allows the controller to know when the 2s computer is powered on or off. When the computer is powered off, the power switch position or state is irrelevant. When 31 the computer is powered on, the power switch is on to allow s2 the drive to operate, and if necessary to boot the computer 1 system. A time delay can be configured, after which the power 2 switch turns off thereby disabling the drive.
s The reset sense line reboots the computer. This action sets the a power switch on to allow the drive to operate, and if s necessary to boot the computer system. A time delay can be s observed after which the power switch turns off thereby disabling the drive.
s The power switch can be turned on or off with a password entered by s the computer user or by remote control.
io The time and date the power switch is turned on and off can be ~1 recorded by the controller in a log. Other activities can be i2 recorded, including power on and off, reset, motion alarm ~s activation, unauthorized use alarm activation and password is entry .
~5 When the computer is turned on and the power switch delay time 16 begins, an alarm delay time can also be programmed to begin.
1~ If a password is not entered by the computer user within the is delay time, the power switch will turn off and the alarm will sound.
2o If a computer hard-drive is connected and the power switch is on 21 the hard-drive will be powered and functioning. Since 22 computer hard drives are sensitive to being jolted, they 2s should not be moved while turned on. A motion sensor is used 2a to sound an alarm when the computer is moved or jostled.
2s Likewise, an external alarm connection to a security cable can 2s also notify the circuit if the computer system is moved from 2~ its location, in that, if moved, the cable connection would be 2s severed and sensed by the controller.
2s The apparatus as described can be programmed to cut power to the 3o hard-drive, and to sound the alarm, in response to certain s~ programmable security conditions not being met. For example, it s2 can be programmed such that if the hard-drive is not used for a 1 period of time (say five minutes),it is required that a password 2 be entered the next time the hard-drive is accessed. Thus, the 3 device permits the authorised userto leave the computer (and hard-y drive) switchedon when going away from the computer. If a pseudo-s authorised person sits down at computer, and attempts to access the s the hard-drive,the hard-drive remains disabled, and the alarm will 7 sound.

s Many companies wish to partition the hard-drives on their s computers, whereby anyone can freely access drive C, but only ~o password holders can access partitioned secure drive D, on the same 1~ hard-drive. This has been a difficult security problem in prior 12 art devices, which did nothing to deny access time to a thief; as is mentioned, a determined thief can reckon to gain access to 1a password-protected data files, if given time. The apparatus as ~s described herein provides protection to the partitioned hard-drive;
~s if an attempt is made to access the secure drive, the security 17 apparatus calls for a valid password, and if such is not ie forthcoming, the alarm will sound, and the power to the whole hard-1s drive (i.e C plus D together) will be cut.
2o The designer of the system should bear in mind that if the battery 21 voltage drops too low, the software configuration of the 22 microcontroller in the apparatus will be lost, and will need to be 2s re-programmed. The apparatus will also fail to function in the 2a motion-sensing mode. Also, the apparatus might fail to reset 2s properly when the computer is turned on, requiring the battery to 2s be removed and re-installed. The battery can be configured to re-27 charge automatically when the computer is turned on; or a warning 2s indicator can be used to inform the user when charging is required.
2s If the protected hard-drive is the bootable hard-drive of the so computer (which it usually will be) a problem might occur if the 1 user selects too short a time period for entry of the password.
2 The hard-drive should be enabled for a long enough period, on s start-up, to enable the computer to fully boot-up, since only when a boot-up has been completed can the user start to enter the valid s password. Because the user might set too short a time s inadvertently, the computer can be booted from a diskette drive, and the security apparatus run from the diskette. Then, the time 8 period before the drive is disabled can be increased, or the s disabling mode can be switched off temporarily; after that, the ~o system can then complete the boot-up sequence.
11 In an alternative version, the system may include outlets from the 12 computers voltage-regulated power supply. These may be connected 13 to outside powered accessories, such as a zip-drive, modem, etc, as to an alternative to the usual arrangement where these items have 15 their own individual separate power supplies. The power to these is outside items would then be switched, like the power to the main 17 hard-drive. The power to the different outlets may be switched on 18 and off by actions at the computer keyboard.
1s It is recognised that the switch in the anti-theft device 2o preferably should be a simple on/off snap-action switch.
21 Generally, a gradual power-down during switch-off is not an 22 advantage, although that could be incorporated if desired. There 23 is normally no benefit to routing the power elsewhere upon switch-2a off, via a double-throw switch arrangement, although, again, that 2s facility could be incorporated if desired.
2s It is recognised that only the power supply to the powered-2~ component should be switched. It would be disadvantageous to put 2s the switch, or another switch, in the data connection between the 2s computer and the powered-component. Only the power connection goes 3o through the anti-theft circuit. The data cable connecting the 1 computer with the powered-component remains undisturbed.
2 Preferably, the designer should arrange for the power-switch to be s normally ON. This allows the computer to boot-up if the battery in a the device is dead. Once powered up, the power from the now-switched-on computer can be harnessed to operate the switch. The s designer should arrange that, if there is power to the board, the power-switch goes to OFF unless the password signal holds it ON.
s Of course, there are a number of electro-mechanical arrangements of s the switch that can be used, at the designer's discretion. The to designer should select an arrangement that leaves the system secure, and yet useable, under the failure conditions that are 12 likely to be encountered.

Claims (30)

    Claims
  1. Claim 1. Anti-theft apparatus, in combination with a computer, wherein:
    the computer includes a powered-component;
    the powered-component is operational only when supplied with electrical power;
    the computer includes a power-supply-unit;
    the anti-theft apparatus includes a circuit-board;
    the circuit-board carries an operable power-switch, and carries a power-switch-operator for operating the power-switch between an ON condition and an OFF condition;
    the computer includes an electrical power-conveying-means, which is arranged in the computer for supplying electrical operating power from the power-supply-unit to the powered-component;
    the power-switch lies electrically interposed in the electrical power-conveying means, between the power-supply-unit and the powered-component;
    the arrangement of the apparatus in the computer is such that electrical power is not supplied to the powered-component unless the power-switch carried by the circuit-board is ON;
    the apparatus includes a security-sensor, for detecting and signalling a security-breach;
    and the power-switch-operator is effective, in response to receiving the security-breach signal from the security-sensor, to operate the power-switch to the OFF condition.
  2. Claim 2. Apparatus of claim 1, wherein the security-sensor is effective to detect the security-breach as a departure from a predetermined electro-mechanical status of the circuit-board.
  3. Claim 3. Apparatus of claim 2, wherein the security-sensor comprises a pull-out sensor, carried on the circuit-board.
  4. Claim 4. Apparatus of claim 2, wherein:
    the security-sensor comprises a motion-sensor, carried on the circuit-board;
    the motion-sensor is effective to detect the security-breach as motion of the sensor beyond a predetermined threshold of motion.
  5. Claim 5. Apparatus of claim 1, wherein:
    the computer includes a data-bus, which carries volatile data during operation of the computer;
    and the security-sensor is effective to detect the security-breach as a departure from a predetermined status of the volatile data on the data-bus of the computer.
  6. Claim 6. Apparatus of claim 1, wherein the computer includes an enclosed casing, and the circuit-board is housed inside the enclosed casing.
  7. Claim 7. Apparatus of claim 6, wherein the power-supply-unit and the powered-component lie inside the casing, physically separated from each other and from the circuit-board;
    the power-conveying-means includes a first portion thereof, connecting the power-supply-unit with the circuit-board, and includes a second portion thereof, connecting the circuit-board with the powered-component.
  8. Claim 8. Apparatus of claim 1, wherein the powered-component is an internal hard-drive.
  9. Claim 9. Apparatus of claim 1, wherein the arrangement of the combination is such that no power goes to the said powered-component, other than through the circuit board.
  10. Claim 10. Apparatus of claim 1, wherein the computer includes other components, which can receive power from the power-supply-unit, even when the power-switch is OFF.
  11. Claim 11. Apparatus of claim 1, wherein:
    the electrical power-conveying means includes a powered-component power-socket;
    the electrical power-conveying means includes a power-supply-unit power-plug;
    the power-supply-unit power-plug is complementary to, and can be plugged into, the powered-component power-socket, and the structure of the computer is such that, when the power-supply-unit power-plug is plugged into the powered-component power-socket, the powered-component is thereby supplied with electrical power;
    the circuit-board carries a circuit-board power-socket, which is complementary to the power-supply-unit power-plug;
    the power-supply-unit power-plug is not plugged into the powered-component power-socket, but is plugged into the circuit-board power-socket;
    the electrical power-conveying means includes a circuit-board power-plug, which is complementary to the powered-component power-socket;
    and the circuit-board power-plug is plugged into the powered-component power-socket.
  12. Claim 12. Apparatus of claim 11, wherein:
    the power-conveying means includes a first length of flexible cable between the power-supply-unit and the power-supply-unit power-plug, and includes a second length of flexible cable between the circuit-board and the circuit-board power-plug;
    the powered-component power-socket is mechanically fixed into the powered-component, and the circuit-board power-socket is mechanically fixed into the circuit-board.
  13. Claim 13. Apparatus of claim 11, wherein the power-sockets have male pins, and the power-plugs have corresponding female sleeves.
  14. Claim 14. Apparatus of claim 13, wherein the complementary power-sockets and power-plugs are moulded in plastic, and are configured to conform to AMP Mate-n-Lock (tm) power sockets and plugs.
  15. Claim 15. Apparatus of claim 1, wherein the power-switch is bi-stable, in that the structure of the switch is such that no other operating condition of the switch is possible, other than the said ON and OFF conditions.
  16. Claim 16. Apparatus of claim 1, wherein the power-switch is a simple switch, in that, when the power-switch is ON, the electrical power to the powered-component is not affected, as to its voltage and current, by passing through the power-switch.
  17. Claim 17. Apparatus of claim 1, wherein the computer includes a bus-cable for transferring data from the powered-component to the computer, and the arrangement of the computer and of the anti-theft apparatus is such that the anti-theft apparatus does not interpose a switch into the bus-cable, and is such that operation of the power-switch between the ON and OFF
    conditions is not effective to cause switching of the bus-cable.
  18. Claim 18. Apparatus of claim 1, wherein the power-switch is normally-closed, in that, if the circuit-board power-socket is not receiving electrical power, the power-switch is in the ON
    condition.
  19. Claim 19. Apparatus of claim 1, wherein the circuit-board includes an audible alarm, and the power-switch-operator is effective also to sound the alarm in response to the security-sensor detecting the security-breach.
  20. Claim 20. Apparatus of claim 11, wherein the circuit-board carries a battery, whereby the circuit-board can function, at least partially, even if no power is supplied to the circuit-board power-socket.
  21. Claim 21. Apparatus of claim 20, wherein the circuit-board carries a battery-charger, which is operable by power supplied to the circuit-board power-socket.
  22. Claim 22. Apparatus of claim 5, wherein:
    the circuit-board includes a security-processor, carried on the circuit-board, for processing signals received, and for controlling the power-switch-operator;
    the circuit-board includes a bus-connector-means, carried on the circuit-board, for connecting the circuit-board to the data-bus, and for sending data from the data-bus to the security-processor.
  23. Claim 23. Apparatus of claim 22, wherein the bus-connector-means is a PCI connector.
  24. Claim 24. Apparatus of claim 22, wherein:
    the computer includes a video screen and a manual data-entry means;
    the security-processor is configurable, via the video screen and the manual data-entry means, as to the pre-determined conditions, the exceeding of which the security-sensor is to detect as the security breach.
  25. Claim 25. Apparatus of claim 22, wherein:
    the security-processor is effective, upon start-up of the computer, to maintain the power-switch in the ON condition for a period of time, termed the boot-up-period, which is long enough to allow complete boot-up of the computer;
    the security-processor includes means for enabling a user of the powered-component to enter a password, during a further period of time, termed the password-period;
    the security-processor includes a means for determining whether that password is acceptable;
    the security-processor includes a means responsive to the password being acceptable, to set and maintain the power-switch in the ON condition;
    the security-processor is so arranged that, if no acceptable password has been entered during the password-period, the security-processor is effective then to set the power-switch to the OFF condition.
  26. Claim 26. Apparatus of claim 22, wherein the security-processor is effective to maintain the power-switch in the OFF condition so long as electrical power is supplied to the circuit-board power-socket.
  27. Claim 27. Apparatus of claim 22, wherein the means for enabling a user of the powered-component to enter a password includes an invitation displayed on the video screen, and includes means for displaying the invitation automatically, to the user, upon completion of the boot-up.
  28. CLAIM 28. Anti-theft apparatus for a computer, which includes a powered-component that is operational only when supplied with electrical power, and that carries a powered-component power-socket;
    the computer including also a power-supply-unit, which supplies power to a power-supply-plug;
    the power-supply-plug of the computer being complementary to the powered-component power-socket, wherein:
    the anti-theft apparatus includes a circuit-board;
    the circuit-board carries a circuit-board power-socket;
    the circuit board carries a circuit-board power-plug;
    the circuit-board power-plug is complementary to the circuit-board power-socket;
    the circuit-board power-plug and the circuit-board power-socket are so structured as to be suitable for connection, respectively, to the powered-component power-socket and the power-supply-plug of the computer;
    the circuit-board carries a power-switch, and carries a power-switch operator for operating the power-switch between an ON
    condition and an OFF condition;
    the structure of the circuit-board is such that, when the power-switch is in the ON condition, power supplied to the circuit-board power-socket is conducted through to the circuit-board power-plug, and when the power-switch is in the OFF condition, the circuit-board power-plug lies electrically disconnected from the circuit-board power-socket;
    the apparatus includes a security-sensor for detecting and signalling a security-breach;
    and the power-switch-operator is effective, in response to receiving the security-breach signal from the security-sensor, to operate the power-switch to the OFF condition.
  29. Claim 29. Apparatus of claim 28, wherein the circuit-board includes a bus-connector-means, for connecting the controller into the computer.
  30. Claim 30. Apparatus of claim 28, wherein the complementary power-sockets and power-plugs are moulded in plastic, and are configured to conform to AMP Mate-n-Lock (tm) power sockets and plugs.
CA 2317889 1999-09-17 2000-09-08 Anti-theft device for computers Abandoned CA2317889A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9922001.4 1999-09-17
GB9922001A GB9922001D0 (en) 1999-09-17 1999-09-17 Anti-theft device for computers

Publications (1)

Publication Number Publication Date
CA2317889A1 true CA2317889A1 (en) 2001-03-17

Family

ID=10861101

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2317889 Abandoned CA2317889A1 (en) 1999-09-17 2000-09-08 Anti-theft device for computers

Country Status (2)

Country Link
CA (1) CA2317889A1 (en)
GB (2) GB9922001D0 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008122130A1 (en) * 2007-04-05 2008-10-16 Absolute Software Corporation Distribution channel loss protection for electronic devices
CN106157490A (en) * 2016-08-22 2016-11-23 常州市武进华瑞电子有限公司 The siren of band hook
CN106157492A (en) * 2016-08-22 2016-11-23 常州市武进华瑞电子有限公司 Easily hang siren
CN106157491A (en) * 2016-08-22 2016-11-23 常州市武进华瑞电子有限公司 Siren with touch screen

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9619671B2 (en) 2011-12-22 2017-04-11 Intel Corporation Always-available embedded theft reaction subsystem
US9734359B2 (en) 2011-12-22 2017-08-15 Intel Corporation Always-available embedded theft reaction subsystem
US9507965B2 (en) 2011-12-22 2016-11-29 Intel Corporation Always-available embedded theft reaction subsystem
EP2795512A4 (en) 2011-12-22 2016-01-06 Intel Corp Always-available embedded theft reaction subsystem
EP2795516A4 (en) 2011-12-22 2015-09-02 Intel Corp Always-available embedded theft reaction subsystem
US9552500B2 (en) 2011-12-22 2017-01-24 Intel Corporation Always-available embedded theft reaction subsystem
US9507918B2 (en) 2011-12-22 2016-11-29 Intel Corporation Always-available embedded theft reaction subsystem
US9454678B2 (en) 2011-12-22 2016-09-27 Intel Corporation Always-available embedded theft reaction subsystem
US9520048B2 (en) 2011-12-22 2016-12-13 Intel Corporation Always-available embedded theft reaction subsystem

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4002956A (en) * 1975-06-06 1977-01-11 Minor Ross D Automatic electronic lock off system for an appliance
AU2455984A (en) * 1983-02-28 1984-09-06 Development Finance Corporation Of New Zealand, The Lock for control system
US4818986A (en) * 1987-01-27 1989-04-04 Bauman Robert M Apparatus for controlling access to data storage devices
JP3159128B2 (en) * 1997-06-23 2001-04-23 日本電気株式会社 Personal computer
GB2345178A (en) * 1998-12-21 2000-06-28 Alexis Chatila A computer system with a user-proximity operated display

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008122130A1 (en) * 2007-04-05 2008-10-16 Absolute Software Corporation Distribution channel loss protection for electronic devices
US8062380B2 (en) 2007-04-05 2011-11-22 Absolute Software Corporation Distribution channel loss protection for electronic devices
US8241369B2 (en) 2007-04-05 2012-08-14 Absolute Software Corporation Distribution channel loss protection for electronic devices
CN106157490A (en) * 2016-08-22 2016-11-23 常州市武进华瑞电子有限公司 The siren of band hook
CN106157492A (en) * 2016-08-22 2016-11-23 常州市武进华瑞电子有限公司 Easily hang siren
CN106157491A (en) * 2016-08-22 2016-11-23 常州市武进华瑞电子有限公司 Siren with touch screen

Also Published As

Publication number Publication date
GB9922001D0 (en) 1999-11-17
GB0022221D0 (en) 2000-10-25
GB2356477A (en) 2001-05-23

Similar Documents

Publication Publication Date Title
US4908608A (en) Alarmcard
US5748083A (en) Computer asset protection apparatus and method
US5760690A (en) Portable computer with integrated alarm system
US6026492A (en) Computer system and method to disable same when network cable is removed
JP3862566B2 (en) Power cord for theft prevention
US5945915A (en) Computer system for sending an alert signal over a network when a cover of said system has been opened
EP0892334B1 (en) Cabinet security state detection
US6002427A (en) Security system with proximity sensing for an electronic device
CA2317889A1 (en) Anti-theft device for computers
US5767771A (en) Electronic equipment theft deterrent system
US6072393A (en) Anti-theft alarm for portable electrically operated devices
US5838225A (en) Anti-theft alarm for electrically operated devices
US5675321A (en) Personal computer security system
CA2099026C (en) Trusted personal computer system with identification
US5859968A (en) Data security device for controlling access to external data drives
US20080250510A1 (en) Distribution channel loss protection for electronic devices
US5525965A (en) Appliance theft prevention alarm
JPS60138645A (en) Safety device and method for disabling microprocessor control type electronic equipment after occurrence of use forbidding event
US6014746A (en) Workstation lock and alarm system
US5838793A (en) Controlling movement of owned parts
US7046144B2 (en) Theft deterrent device for appliances
US6191503B1 (en) Computer with a chassis intrusion detector
US6489890B1 (en) Security device
US20060005264A1 (en) Computer security system
EP0127258A2 (en) Security control system for electrical equipment

Legal Events

Date Code Title Description
FZDE Dead