GB2356477A - Anti-theft device for computers - Google Patents

Anti-theft device for computers Download PDF

Info

Publication number
GB2356477A
GB2356477A GB0022221A GB0022221A GB2356477A GB 2356477 A GB2356477 A GB 2356477A GB 0022221 A GB0022221 A GB 0022221A GB 0022221 A GB0022221 A GB 0022221A GB 2356477 A GB2356477 A GB 2356477A
Authority
GB
United Kingdom
Prior art keywords
power
circuit
board
computer
switch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0022221A
Other versions
GB0022221D0 (en
Inventor
Gordon Boerke
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of GB0022221D0 publication Critical patent/GB0022221D0/en
Publication of GB2356477A publication Critical patent/GB2356477A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A computer plug-in card 20 provides an anti-theft function. Power to the hard-drive 23 is routed through the plug-in card. If programmable security conditions are not met, the power to the hard-drive is cut, and an alarm sounds. Conventional security features, such as a motion-detector, pull-out-cord, etc, can also be included. A battery is provided on the plug-in card, and the security features remain available even when the computer is switched off.

Description

2356477 1 Title: ANTI-THEFT DEVICE FOR COMPUTERS 2 This invention relates
to deterring thieves from stealing 3 computers, and from stealing information stored on computers.
4 BACKGROUND TO THE INVENTION
The invention is particularly aimed at preventing theft of 6 information by a person who has perhaps legitimate, or at least 7 unnoticeable, access to the place where the computer is located, 8 but does not have a password to the computer itself. Such pseudo 9 authorised persons include co-employees from other departments, office visitors, customers, suppliers, cleaners, janitors, etc.
11 Theft of personal computers is a fast-.growing commercial crime.
12 The term personal computers encompasses personal digital 13 assistants, laptop computers, desktop computers and networked or 14 interconnected computers. The owner of computer hardware can replace the stolen hardware within a few days but replacement of 16 information often requires more time and financial costs. Since 17 theft of information can be accomplished simply by accessing the 18 computer file and copying the file to a diskette this type of theft 19 may go unnoticed by the owner. Information theft of this type can result in financial losses if the information is used by a 21 competitor. Security systems in office buildings are often not 22 enough to protect computers.
23 One common way of ensuring security of computer files and hard 24 drives is by the use of the conventional password security system, which prevents a file being opened unless the correct password is 26 entered. Of course, there are many password systems in use, from 2 1 the simple to the highly sophisticated. In computer systems, 2 generally, the title of the data-file appears on the directory of
3 the hard-drive, and the data-file is opened by selecting its title 4 from the hard-drive directory. Usually, in a password security system, the password is interposed between the title of the file
6 and the actual data stored in the file. When a person does not 7 know the password, the reason the person cannot access the data is 8 that, because of the absence of the password, no link can be made 9 between the title and the data.
However, even though the link is not available between the title 11 and the data, of course the data still exists on the hard-drive.
12 One problem with conventional password systems is that utility 13 programs are available which can scan a hard-drive, sector by 14 sector, and record all the data present thereon. By the use of such utilities, it is often possible to access all the data on the 16 hard-drive, whether it is password-protected or not. The password 17 protected data would not be accessible under its original file 18 names, but it would be accessible. The utility program gives new 19 names to the batches of data it finds on the hard-drive. Although these made-up files of data might be incomplete, or might include 21 more than one of the password-protected files, generally, by the 22 use of such utility programs, it is all too possible for a thief to 23 read most of the data on the hard-drive, without the use of the 24 passwords. All the thief needs is access to the computer for what is, unfortunately, all too short a period of time.
26 Computer users who store sensitive information in hard-drives are 27 conscious of the shortcomings of the conventional password security 28 facilities, and desire a system which is less easy for the thief to 29 beat. One type of security system that might suggest itself to the user is an encryption system, in which the data is encrypted, or 31 scrambled, as it is written to the hard-drive. Now, if a thief 3 1 performs a sector by sector utility scan, he cannot read the 2 encrypted data because it remains scrambled. Therefore, encryption 3 can provide excellent security; however, its major disadvantage is 4 that encryption and decryption take time, during loading and unloading of the files, and the delay to the user, every time data 6 is loaded or unloaded, can be tiresome. The general rule is that 7 conventional software solutions to the security problem, such as 8 encryption, have undesirable side effects, such as imposing a time 9 delay on data access. The invention is aimed at providing security without resorting to encryption and the problems associated 11 therewith.
12 Another approach that might suggest itself to the user looking to 13 make a computer system more secure is to provide a physical or 14 mechanical anti-theft system. No sophistication is needed to chain and padlock a computer to another object; but such purely-physical 16 measures are ineffective against the information thief. At a much 17 more sophisticated level, a system designer might prefer to provide 18 a special hard-drive, which contains a password-operated switch, 19 embedded in the hard-drive, for switching on the power supply to the hard-drive, or the data connection between the computer and the 21 hard-drive. While a system like that can indeed be secure, 22 providing a special hard-drive is very expensive.
23 one aim of the present invention is to provide an inexpensive 24 security system, which disables the hard-drive, and prevents the hard drive from being powered up if the correct password is not 26 entered, but which can be installed in an ordinary computer having 27 an ordinary conventional hard-drive.
28 GENERAL FEATURES OF THE INVENTION 4 1 The invention deters theft of information by disabling the hard 2 drive (or other repository of sensitive data) on the computer. The 3 invention provides a security apparatus, preferably in the form of 4 a plug-in card, which is inserted into the computer. In the use of the invention, preferably, the power cord that runs from the 6 computer's power supply box to the hard-drive is re-routed through 7 the plug-in card. Suitable power leads, supplementary plugs, 8 sockets, etc, as required to re-route the power supply to the hard 9 drive through the card, are included in the apparatus.
A major function of the invention is to disable the hard-drive by 11 cutting the power supply to the hard drive, if the correct password 12 is not entered. But since it is a security apparatus, preferably 13 the apparatus of the invention also includes other security 14 facilities, to prevent theft of the computer itself, such as provision for a security cable, a siren alarm if the computer is 16 moved or the system mis-used, and other anti-theft functions as 17 described herein.
18 In the invention, the security apparatus is embedded within the 19 computer itself, to deter unauthorized use of and theft of the computer and its stored information. The apparatusis aimed at 21 addressing several computer security problems and solutions 22 including disabling the main hard drive, generating an alarm, 23 tracking computer usage, sensing motion and controlling access 24 through passwords. The security apparatus preferably can perform its various functions while the computer is on or off. The 26 security functions can be disabled by an authorized user to allow 27 the movement or maintenance of the computer.
28 Preferably, a security system should be invisible, or at least 29 unobtrusive, during normal operation by an authorised user. When 30 an employer takes blatant precautions to stop the employees 1 cheating and stealing, honest employees often resent the employer's 2 implied message that they are not to be trusted. Attaching 3 security chains and padlocks to the computer hardware and 4 peripherals falls into that category, for instance.
The sensitive employer prefers a system that is unobtrusive to the 6 ordinary employee, but at the same time indicates unequivocally to 7 the employee that this or that action is across the line, and 8 moreover makes it clear that performing the action will leave a 9 trail. The security systems as described herein are aimed at providing the function whereby password-authorised user.s will 11 perceive, during normal use of a computer equipped with the 12 security apparatus, that a record is being made of the date and 13 time of access under their specific password, whether they made 14 copies, entered data changes, etc, and whether and when the alarm conditions were activated, and with what result.
16 Preferably, the system provides that the employer or owner of the 17 data be given an owner-only password, whereby only the owner may 18 make changes to the parameters for setting up the manner of 19 recording activities. As well, the usual hierarchy of passwords may be provided, i.e passwords for read-only access, passwords for 21 read-plus-change access, etc. Preferably also, an overriding 22 password, which enables the whole system, but is unique to the one 23 purchased apparatus, would be available upon application to the 24 system manufacturer, or the overriding password might be supplied with the system, and be stored in a safe-deposit box or the like.
26 It is an aim of the invention to provide a security system that is 27 easy to install. The systems as described herein can be assembled 28 just by plugging-in the various components. In a conventional 29 computer, the power supply to the hard-drive (5v and 12v) is derived from a four-wire supply, which, in a conventional computer, 6 1 is simply plugged into the socket provided on the back of the hard 2 drive. The apparatus of the invention preferably includes a card, 3 which is installed in a bus-connector (PCI, ISA, etc) slot in the 4 computer. Then, the existing power plug is simply removed from the hard-drive and plugged into a socket on the card. A four-wire 6 supply provided on the apparatus is plugged into the back of the 7 hard-drive. Thus, the power supply to the hard-drive now runs 8 through, and can be controlled by, the apparatus of the invention, 9 and yet no wires have been broken or cut, no soldering is required, and nothing is done that would interfere with the operations of the 11 computer. This ease of installation is important in a computer 12 accessory.
13 Often, the decision to make a hard-drive secure is not made until 14 after many data-files have accumulated on the hard-drive. It is an aim of the invention to provide a system which will be effective to 16 protect the data-files already present on an existing hard-drive.
17 An encrypti on system, by contrast, does not protect data-files that 18 were placed on the disc before the system was installed.
19 it is an aim of the invention to disable the power supply to the drive, but at the same time to leave the alarm on. If an 21 unauthorized person sits down at the computer, when the hard drive 22 is disabled, and attempts to access the hard-drive, the system 23 enters an alarm-ready mode, and a warning that it has done so is 24 given to the person. If the person then leaves, the alarm does not sound, although the fact that the activity has taken place, with 26 date and time etc, is recorded on the log. If the unauthorized 27 person carries on and makes attempts to use the hard-drive, or to 28 hack a password, or to move the computer, etc, the alarm then goes 29 off.
It is an aim of the invention that the apparatus should access the C-) 7 1 computer's information bus, whereby the designer of the system can 2 arrange for the parameters that will be under the control of a 3 person to be monitored and adjusted on-keyboard, on-screen. Also, 4 by being connected to the bus, the apparatus can keep track of the computers operations, which provides a measure of protection 6 against mis-use by authorised users. It is an aim that some 7 computer operations will be recorded (and it will be seen to be 8 recorded) in the event that the authorised user (that is to say, 9 the password of the authorised user) has been used to take copies, operate out of hours, etc. On the other hand, it is an aim of the 11 invention that the operations of the computer should not be 12 affected by the security apparatus of the invention. The security 13 apparatus contains a switch, which simply switches the power supply 14 to the hard-drive on or off; the apparatus is passive as far as computer operation is concerned, and does not affect the manner in 16 which the computer itself accesses the hard-drive.
17 It is an aim of the invention to provide a security system that is 18 unobtrusive to the ordinary user, once the password has been 19 entered, i.e in which the authorized user can access the computer 20 in the normal way, after entering a valid password.
21 It is an aim of the invention to provide a security apparatus that 22 will properly detect attempted theft without false alarms, and 23 which will continue to function and monitor the computer whether 24 the computer is powered on or off.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
26 By way of further explanation of the invention, exemplary 27 embodiments of the invention will now be described with reference 28 to the accompanying drawings, in which:
8 1 Fig 1 is a pictorial view of an apparatus that embodies the 2 invention.
3 Fig 2 shows some of the components and functions present on the 4 apparatus of Fig 1.
Fig 3 is a block diagram of the architecture of the apparatus.
6 Fig 4 is a flow-diagram showing the operational logic of the 7 apparatus.
8 Fig 5 shows a selection of menu screens produced by the apparatus.
9 The apparatuses shown in the accompanying drawings and described below are examples which embody the invention. It should be noted 11 that the scope of the invention is defined by the accompanying 12 claims, and not necessarily by specific features of exemplary 13 embodiments.
14 The apparatus as shown in Fig 1 is intended for fitment into a computer of the IBM(tm) type. The apparatus includes a card 20, 16 which is fitted into one of the bus-connector slots in the 17 computer. (For installation, the computer's cover is removed, and 18 of course there must be an available bus-connector slot on the 19 computer to receive the card 20.) The computer has a hard-drive 23. Conventionally, the 21 configuration of the computer is that the power supply for the 22 hard-drive comprises 5-volt and 12-volt supplies. These 23 (regulated) voltages are supplied from the computer's power supply 24 box (not shown), and are fed to the hard-drive 23 (and to several other items in the computer) via a four-wire plug-and-socket 26 arrangement. The hard-drive 23 has a built-in receptacle 24, which 27 normally receives one of the several four-wire plugs 25. The plug 28 25 is wired directly to the power supply box.
29 The four-pin plug and socket connectors in common use on computers 9 1 are of plastic, and are manufactured under the product name, Mate 2 N-Lok (tm) by AMP (tm). The plug component is designated Mate-N 3 Lok 1-480426-0, and the socket component is designated Mate-N-Lok 4 1-480424-0. The invention makes use of these standard components.
In the present instance, the plug 25, direct from the computer's 6 power supply box, has been removed from the receptacle 24 in the 7 hard-drive 23. Now, the plug 25 is engaged into a corresponding 8 receptacle 26 connected to the card 20. A plug 27, from the card 9 20, now runs from the card 20 to the receptacle 24 on the hard drive. Thus, the card 20 is interposed into between the power 11 supply box and the hard-drive. The leads 28,29 are connected 12 respectively to connectors 2,3.
13 Fig 2 shows some of the items includes on the card 20. In addition 14 to the power-in leads 28 and socket 26, and the power-out leads 29 and plug 27, the card includes a rechargeable battery 14, a siren 16 19, a trembler or motion sensor 15, and an external alarm hook-up 17 16 for a pull-out sensor for a security cable, and the like.
18 One of the main functions of the card 20 is, as described, to 19 provide an operable power switch 1, which connects the power-in leads 28 to the power-out leads 29 if all is well, but disables 21 that connection if one of the security parameters is triggered.
22 Fig 3 illustrates in block-diagram form the architecture of the 23 security apparatus. The operable power switch is indicated at 1.
24 Upon installation, the apparatus is connected to the computer bus 8. User settings and parameters of the apparatus are communicated 26 between the computer and a controller 4 via a bus interface 9.
27 Alternatively, a remote control 11 may be provided.
28 The controller 4 can be a micro-controller, microprocessor or other 1 main processing circuit; either programmable, pre-programmed or an 2 application specific semi-conductor or discrete circuit to control 3 the state of the power switch 1. While the computer power is on, 4 the card is powered from the power supply connections on the bus 8. -5 When the computer power is off, the card derives the power it needs 6 to process the security parameters from the battery 14. A battery 7 charger 13 is included, which can be activated automatically or by 8 the user.
9 Fig 4 shows the operation of the security apparatus. Upon powering 10 up the computer, an initialization operation 101 is activated.
11 During initialisation, the power supply to the hard-drive 23 inside 12 the computer is temporarily enabled. That is to say, the power 13 switch I is turned on, for a pre-set period of time. One function 14 of the security apparatus is to turn the power switch 1 off if the correct password is not supplied (via the computer keyboard) within 16 the set time. The time period should be long enough to allow the 17 computer's boot-up procedure to be completed, whereupon the 18 computer can respond to input (including passwords) from the 19 keyboard. The card 20 includes power-on 5 and reset 6 sensing 20 lines, for signalling the start of initialisation.
21 A timing circuit 7 provides the time delay before the power switch 22 1 supplying power to the hard-drive is turned off. The length of 23 the delay is configurable by the (authorised) user, via the 24 computer keyboard. The timing circuit 7 also controls the parameters for delaying sounding the siren, and the duration of the 26 siren. The timer 7 includes facilities for allowing date and time 27 data to be maintained.
28 If the password is not supplied during the time delay period, the 29 apparatus initiates the siren and drive-disable features. The time 30 delay is initiated by sensing a power-up condition (via the lines 5 1 or 6), and also, the time delay (which can be for a different 2 number of seconds or minutes) is initiated by the trembler or 3 motion sensor 15, or pull-out sensor 16, or by such other security 4 features as may be provided in a particular case.
Once the apparatus is initialized, either from battery power or 6 from the computer's power, the apparatus is ready, as at 102, for a 7 password from the user. The apparatus receives the password and 8 checks the password validity against one or more stored passwords, 9 as at 103. If the password is invalid the apparatus checks if too many invalid passwords were entered, as at 104, indicating password 11 hacking, and if so it will generate the alarm condition, as at 105.
12 If the password is valid, the apparatus next determines, as at 106, 13 whether the user has access at the present time. If the present 14 time monitor allows access, the siren 19, if sounding, is stopped and the power switch 1 connects the power-in leads 28 to the power 16 out leads 29 leading to the hard-drive 23 (or other device being 17 controlled) to enable the use thereof,'as at 107. Otherwise, the 18 power switch 1 is set, as at 109, so the hard-drive is disabled.
19 Sometimes, the user might wish to deliberately disable the hard drive (if he wishes to walk away from the computer for a time, for 21 instance) and the apparatus can provide that facility. The 22 apparatus waits for a valid password to be entered again, as at 23 102, to re-enable the hard-drive, as at 107. Once the hard-drive 24 has been enabled (by the entry of a valid password) the apparatus waits for a new command, as at 110.
26 All parameters and functions of the security system are 27 configurable, by an authorised user who has entered the correct 28 password, as at 111. The configuration data is stored and 29 controlled by the controller 4. Lower level passwords may be restricted to certain commands only. The configurable settings, as 12 1 presented to the authorised user, as at 112, may include, for 2 example: drive or device disable ready, time delay to drive or 3 device disable, motion alarm sensor ready, external alarm sensor 4 ready, time delay before motion or externally triggered alarm begins, motion or external warning alarm ready, time duration of 6 warning alarm, siren ready, time delay before siren begins, option 7 to stop motion or externally activated alarm by turning the 8 computer on, option to stop siren by turning the computer off, 9 computer access lock out times for lower level passwords, minimum password lengths, limit of consecutive invalid password entries and 11 a subsequent warning or alarm if limit exceeded, user restricted 12 access to some or all of the security apparatus parameters for 13 lower level passwords, date and time setting, battery maintenance, 14 activity log retrieval, etc, etc.
While waiting for a new command, as at 110, the apparatus checks 16 whether the computer was turned off, as at 113, or reset, as at 17 114. Computer power-off is also checked before a valid password is 18 entered, as at 115. If the computer power is off the option to 19 turn off a motion activated alarm 116 can be done at this time, as at 117. The apparatus can now be put into a reduced power mode 118 21 from which it will occasionally check if the computer is turned on, 22 as at 119.
23 At start-up, i.e when the computer is turned on, or reset, the 24 apparatus determines whether a time delay to an alarm should be initiated, as at 120,121, and whether and when the time delay to 26 disable the hard-drive should be initiated, as at 122,123.
27 The various components illustrated in Fig 3 may be summarised as 28 follows. 29 The power switch 1 may be e.g an electronic, optoelectronic or electromechanical switch to control power to a device such as 13 1 a drive (hard-drive, diskette drive, CD ROM drive, etc) inside 2 the computer.
3 The power-in connection 2 is for connecting the apparatus to the 4 computer power supply. This is the power to be controlled by the power switch 1.
6 The power-out connection 3 is for connection to the device to be 7 powered, such as a hard-drive 23, inside the computer.
a The control ler 4 is a microcontroller, microprocessor or other main 9 processing circuit either programmable, pre-programmed or an application-specific semi-conductor or discrete circuit, to 11 control the state of the power switch 1.
12 The power sense line 5 allows the controller to determine if the 13 computer is on or off.
14 The reset sense line 6 allows the controller to determine if the computer has been reset.
16 The timing circuit 7 allows for timing delays and time of 17 occurrences to be observed and recorded.
18 The bus connection 8 is a connection to the computer circuits for 19 logic, data, address, etc.
The bus interface 9 is a logic, data, and address decoding circuit, 21 which allows the controller 4 and computer to communicate.
22 The interface lines 10 are logic, data and address lines from and 23 to the computer and controller.
24 The remote control 11 is a remote interface to a transmitting device, which may be provided to communicate with the 26 controller.
27 The remote control lines 12 are the logic, data and address lines 28. between the remote control and the controller.
29 The battery charge circuit 13 allows for battery charging and conditioning.
31 The battery 14 is of the nickel-cadmium rechargeable type, which is 32 used to maintain memory of controller configuration or 33 programming.
14 1 The motion sensor 15 includes a mercury switch, or two mercury 2 switches placed at right angles, to detect when the computer 3 is being moved. Insofar as the use of (toxic) mercury is 4 contra-indicated, motion detectors based on the rolling-ball principle, for example, may be provided instead.
6 The external sensor 16 receives a security cable. The sensor 7 detects when the cable has been pulled out. The security 8 cable is an option that, when used, physically restrains the 9 computer to some immovable object.
The siren 19 makes use of a DC-to-DC step-up converter 17 and a 11 siren driver 18.
12 Fig 5 shows some of the menu screens that are available (to the 13 authorised user) for changing and setting the parameters of the 14 security system. For example, the set-up menu 40 enables the time delay settings, and some basic mode-of-operation settings, to be 16 entered. The password set-up menu 42 enables password limitations 17 to be entered. The battery menu 43 allows the user to tailor the 18 battery to the particular computer and the desired mode-of 19 operation. The log 45 enables the user to set the parameters by which the security system logs the various activities that the 21 computer undergoes; for example, the apparatus can be set to log 22 whether and when the computer was switched on and off, and by whom 23 (i.e by the use of which password). Other activities, such as 24 attempts at password hacking, can at least be logged as to when the system entered the alarm-ready (or alarm-on) state, the drive 26 disable states, etc, with time and date. The idea is that the fact 27 that this activity is logged, and is seen to be logged, provides a 28 deterrent to the pseudo-authorised person.
29 Other menus may be provided, to enable the authorised person to set 30 periods when the hard-drive cannot be accessed at all, even by a 31 password-authorised person. Generally, it has been very difficult 0 16 1 to provide protection against a person who, though properly 2 password-authorised, in fact wishes to steal or otherwise mis-use 3 information stored on the computer. The idea here is that such a 4 person will shrink from mis-using the data during office hours, when others are around to monitor what he is doing; therefore, 6 configuring the system so that the secure hard-drive is only 7 operable during office hours provides some measure of protection 8 even against people who do have passwords.
9 The configurable parameters of the security system as described may be listed as follows 11 The power switch is used to turn the power to the hard-drive 23 or 12 other device(s) On or Off, thereby enabling or disabling the 13 device.
14 The controller can be programmed or configured, via the bus connection, bus interface and interface lines, by the 16 authorised user to control the. power switch.
17 The programmed features can be stored in non-volatile memory within 18 or separate from the controller. If stored in volatile 19 memory, the battery will be required to maintain power for memory while the computer is powered off.
21 The power-in connection used to power the drive(s) originates from 22 the computer power supply via a standard computer power cable 23 and plug-in connector. Being the live side of the power 24 switch, the power-in connection can also provide the power to charge the battery.
26 The power-out connection is used to power the hard-drive (and other 27 devices(s) if desired) via a computer power cable.
28 The power sense line allows the controller to know when the 29 computer is powered on or off. When the computer is powered off, the power switch position or state is irrelevant. when 31 the computer is powered on, the power switch is on to allow 32 the drive to operate, and if necessary to boot the computer 16 1 system. A time delay can be configured, after which the power 2 switch turns off thereby disabling the drive.
3 The reset sense line reboots the computer. This action sets the 4 power switch on to allow the drive to operate, and if necessary to boot the computer system. A time delay can be 6 observed after which the power switch turns off thereby 7 disabling the drive. 8 The power switch can be turned on or off with a password entered by 9
the computer user or by remote control.
The time and date the power switch is turned on and off can be 11 recorded by the controller in a log. Other activities can be 12 recorded, including power on and off, reset, motion alarm 13 activation, unauthorized use alarm activation and password 14 entry.
When the computer is turned on and the power switch delay time 16 begins, an alarm delay time can also be programmed to begin.
17 If a password is not entered by the computer user within the 18 delay time, the power switch will turn off and the alarm will 19 sound.
If a computer hard-drive is connected and the power switch is on 21 the hard-drive will be powered and functioning. Since 22 computer hard drives are sensitive to being jolted, they 23 should not be moved while turned on. A motion sensor is used 24 to sound an alarm when the computer is moved or jostled.
Likewise, an external alarm connection to a security cable can 26 also notify the circuit if the computer system is moved from 27 its location, in that, if moved, the cable connection would be 28 severed and sensed by the controller.
29 The apparatus as described can be programmed to cut power to the hard-drive, and to sound the alarm, in response to certain 31 programmable security conditions not being met. For example, it 32 can be programmed such that if the hard-drive is not used for a 17 I period of time (say five minutes), it is required that a password 2 be entered the next time the hard-drive is accessed. Thus, the 3 device permits the authorised user to leave the computer (and hard 4 drive) switched on when going away from the computer. If a pseudo authorised person sits down at the computer, and attempts to access 6 the hard-drive, the hard-drive remains disabled, and the alarm will 7 sound.
8 Many companies wish to partition the hard-drives on their 9 computers, whereby anyone can freely access drive C, but only password holders can access partitioned secure drive D, on the same 11 hard-drive. This has been a difficult security problem in prior 12 art devices, which did nothing to deny access time to a thief; as 13 mentioned, a determined thief can reckon to gain access to 14 password-protected data files, if given time. The apparatus as described herein provides protection to the partitioned hard-drive; 16 if an attempt is made to access the secure drive, the security 17 apparatus calls for a valid password, and if such is not 18 forthcoming, the alarm will sound, and the power to the whole hard 19 drive (i.e C plus D together) will be cut.
The designer of the system should bear in mind that if the battery 21 voltage drops too low, the software configuration of the 22 microcontroller in the apparatus will be lost, and will need to be 23 re-programmed. The apparatus will also fail to function in the 24 motion-sensing mode. Also, the apparatus might fail to reset properly when the computer is turned on, requiring the battery to 26 be removed and re-installed. The battery can be configured to re 27 charge automatically when the computer is turned on; or a warning 28 indicator can be used to inform the user when charging is required.
29 If the protected hard-drive is the bootable hard-drive of the 30 computer (which it usually will be) a problem might occur if the 18 1 user selects too short a time period for entry of the password.
2 The hard-drive should be enabled for a long enough period, on 3 start-up, to enable the computer to fully boot-up, since only when 4 boot-up has been completed can the user start to enter the valid password. Because the user might set too short a time 6 inadvertently, the computer can be booted from a diskette drive, 7 and the security apparatus run from the diskette. Then, the time 8 period before the drive is disabled can be increased, or the 9 disabling mode can be switched off temporarily; after that, the system can then complete the boot-up sequence.
11 In an alternative version, the system may include outlets from the 12 computers voltage-regulated power supply. These may be connected 13 to outside powered accessories, such as a zip-drive, modem, etc, as 14 an alternative to the usual arrangement where these items have their own individual separate power supplies. The power to these 16 outside items would then be switched, like the power to the main 17 hard-drive. The power to the different outlets may be switched on 18 and off by actions at the computer keyboard.
19 It is recognised that the switch in the anti-theft device preferably should be a simple on/off snap-action switch.
21 Generally, a gradual power-down during switch-off is not an 22 advantage, although that could be incorporated if desired. There 23 is normally no benefit to routing the power elsewhere upon switch 24 off, via a double-throw switch arrangement, although, again, that facility could be incorporated if desired.
26 It is recognised that only the power supply to the powered 27 component should be switched. It would be disadvantageous to put 28 the switch, or another switch, in the data connection between the 29 computer and the powered-component. Only the power connection goes through the anti-theft circuit. The data cable connecting the I'D 19 1 computer with the powered-component remains undisturbed.
2 Preferably, the designer should arrange for the power-switch to be 3 normally ON. This allows the computer to boot-up if the battery in 4 the device is dead. Once powered up, the power from the now switched-on computer can be harnessed to operate the switch. The 6 designer should arrange that, if there is power to the board, the 7 power-switch goes to OFF unless the password signal holds it ON.
8 Of course, there are a number of electro-mechanical arrangements of 9 the switch that can be used, at the designer's discretion. The designer should select an arrangement that leaves the system 11 secure, and yet useable, under the failure conditions that are 12 likely to be encountered.

Claims (30)

Claims
1 Claim 1. Anti-theft apparatus, in combination with a computer, 2 wherein:
3 the computer includes a powered-component; 4 the powered-component is operational only when supplied with electrical power; 6 the computer includes a power-supply-unit; 7 the anti-theft apparatus includes a circuit-board; 8 the circuit-board carries an operable power-switch, and carries a 9 power-switch-operator for operating the power-switch between an ON condition and an OFF condition; 11 the computer includes an electrical power-conveying-means, which is 12 arranged in the computer for supplying electrical operating 13 power from the power-supply-unit to the powered-component; 14 the power-switch lies electrically interposed in the electrical power-conveying means, between the power-supply-unit and the 16 powered-component;
17 the arrangement of the apparatus in the computer is such that 18 electrical power is not supplied to the powered-component 19 unless the power-switch carried by the circuit-board is ON; the apparatus includes a security-sensor, for detecting and 21 signalling a security-breach; 22 and the power-switch-operator is effective, in response to 23 receiving the security-breach signal from the security-sensor, 24 to operate the power-switch to the OFF condition.
Claim 2. Apparatus.of claim 1, wherein the security-sensor is effective to detect the security-breach as a departure from a predetermined electromechanical status of the circuit-board.
Claim 3. Apparatus of claim 2, wherein the security-sensor comprises a pull-out sensor, carried on the circuit-board.
21 Claim
4. Apparatus of claim 2, wherein: the security-sensor comprises a motion-sensor, carried on the circuit-board; the motion-sensor is effective to detect the security-breach as motion of the sensor beyond a predetermined threshold of motion.
Claim 5. Apparatus of claim 1, wherein: the computer includes a data-bus, which carries volatile data during operation of the computer; and the security-sensor is effective to detect the security-breach as a departure from a predetermined status of the volatile data on the data-bus of the computer.
Claim 6. Apparatus of claim 1, wherein the computer includes an enclosed casing, and the circuit-board is housed inside the enclosed casing.
Claim 7. Apparatus of claim 6, wherein the power-supply-unit and the powered-component lie inside the casing, physically separated from each other and from the circuit-board; the power-conveying-means includes a first portion thereof, connecting the power-supply-unit with the circuitboard, and includes a second portion thereof, connecting the circuitboard with the powered-component.
Claim 8. Apparatus of claim 1, wherein the powered-component is an internal hard-drive.
Claim 9. Apparatus of claim 1, wherein the arrangement of the combination is such that no power goes to the said poweredcomponent, other than through the circuit board.
22 Claim
10. Apparatus of claim 1, wherein the computer includes other components, which can receive power from the powersupply-unit, even when the power-switch is OFF.
1 Claim
11. Apparatus of claim 1, wherein:
2 the electrical power-conveying means includes a powered-component 3 power-socket; 4 the electrical power-conveying means includes a power-supply-unit power-plug; 6 the power-supply-unit power-plug is complementary to, and can be 7 plugged into, the powered-component power-socket, and the 8 structure of the computer is such that, when the power-supply 9 unit power-plug is plugged into the powered-component power socket, the powered-component is thereby supplied with 11 electrical power; 12 the circuit-board carries a circuit-board power-socket, which is 13 complementary to the power-supply-unit power-plug; 14 the power-supply-unit power-plug is not plugged into the powered component power-socket, but is plugged into the circuit-board 16 power-socket;
17 the electrical power-conveying means includes a circuit-board 18 power-plug, which is complementary to the powered-component 19 power-socket; and the circuit-board power-plug is plugged into the powered- 21 component power-socket.
Claim 12. Apparatus of claim 11, wherein: the power-conveying means includes a first length of flexible cable between the power-supply-unit and the power-supply-unit powerplug, and includes a second length of flexible cable between the circuit-board and the circuit-board power-plug; the powered-component power-socket is mechanically fixed into the powered-component, and the circuit-board power-socket is 23 mechanically fixed into the circuit-board.
Claim 13. Apparatus of claim 11, wherein the power-sockets have male pins, and the power-plugs have corresponding female sleeves.
Claim 14. Apparatus of claim 13, wherein the complementary powersockets and power-plugs are moulded in plastic, and are configured to conform to AMP Mate-n-Lock (tm) power sockets and plugs.
Claim 15. Apparatus of claim 1, wherein the power-switch is bistable, in that the structure of the switch is such that no other operating condition of the switch is possible, other than the said ON and OFF conditions.
Claim 16. Apparatus of claim 1, wherein the power-switch is a simple switch, in that, when the power-switch is ON, the electrical power to the powered-component is not affected, as to its voltage and current, by passing through the powerswitch.
Claim 17. Apparatus of claim 1, wherein the computer includes a bus-cable for transferring data from the powered-component to the computer, and the arrangement of the computer and of the anti-theft apparatus is such that the anti-theft apparatus does not interpose a switch into the bus-cable, and is such that operation of the power-switch between the ON and OFF conditions is not effective to cause switching of the buscable.
Claim 18. Apparatus of claim 1, wherein the power-switch is normallyclosed, in that, if the circuit-board power-socket is 24 not receiving electrical power, the power-switch is in the ON condition.
Claim 19. Apparatus of claim 1, wherein the circuit-board includes an audible alarm, and the power-switch-operator is effective also to sound the alarm in response to the security-sensor detecting the securitybreach.
Claim 20. Apparatus of claim 11, wherein the circuit-board carries a battery, whereby the circuit-board can function, at least partially, even if no power is supplied to the circuit-board power-socket.
Claim 21. Apparatus of claim 20, wherein the circuit-board carries a battery-charger, which is operable by power supplied to the circuit-board power-socket.
Claim 22. Apparatus of claim 5, wherein: the circuit-board includes a security-processor, carried on the circuit-board, for processing signals received, and for controlling the power-switch-operator; the circuit-board includes a bus-connector-means, carried on the circuit- board, for connecting the circuit-board to the databus, and for sending data from the data-bus to the securityprocessor.
Claim 23. Apparatus of claim 22, wherein the bus-connector-means is a PCI connector.
Claim 24. Apparatus of claim 22, wherein: the computer includes a video screen and a manual data-entry means; the security-processor is configurable, via the video screen and the manual data-entry means, as to the pre-determined conditions, the exceeding of which the security-sensor is to detect as the security breach.
I Claim
25. Apparatus of claim 22, wherein:
2 the security-processor is effective, upon start-up of the computer, 3 to maintain the power-switch in the ON condition for a period 4 of time, termed the boot-up-period, which is long enough to allow complete boot-up of the computer; 6 the security-processor includes means for enabling a user of the 7 powered-component to enter a password, during a further period a of time, termed the password-period; 9 the security-processor includes a means for determining whether that password is acceptable; 11 the security-processor includes a means responsive to the password 12 being acceptable, to set and maintain the power-switch in the 13 ON condition; 14 the security-processor is so arranged that, if no acceptable password has been entered during the password-period, the 16 securityprocessor is effective then to set the power-switch 17 to the OFF condition.
Claim 26. Apparatus of claim 22, wherein the security-processor is effective to maintain the power-switch in the OFF condition so long as electrical power is supplied to the circuit-board power-socket.
Claim 27. Apparatus of claim 22, wherein the means for enabling a user of the powered-component to enter a password includes an invitation displayed on the video screen, and includes means for displaying the invitation automatically, to the user, upon completion of the boot-up.
1 CLAIM
28. Anti-theft apparatus for a computer, which includes a 26 2 powered-component that is operational only when supplied with 3 electrical power, and that carries a powered-component power 4 socket; the computer including also a power-supply-unit, which supplies 6 power to a power-supply-plug; 7 the power-supply-plug of the computer being complementary to the 8 powered-component power-socket, wherein:
9 the anti-theft apparatus includes a circuit-board; the circuit-board carries a circuit-board power-socket; 11 the circuit board carries a circuit-board power-plug; 12 the circuit-board power-plug is complementary to the circuit-board 13 power-socket; 14 the circuit-board power-plug and the circuit-board power-socket are so structured as to be suitable for connection, respectively, 16 to the powered-component power-socket and the power-supply 17 plug of the computer; 18 the circuit-board carries a power-switch, and carries a power 19 switch operator for operating the power-switch between an ON condition and an OFF condition;
21 the structure of the circuit-board is such that, when the power- 22 switch is in the ON condition, power supplied to the circuit 23 board power-socket is conducted through to the circuit-board 24 power-plug, and when the power-switch is in the OFF condition, the circuit-board power-plug lies electrically disconnected 26 from the circuit-board power-socket; 27 the apparatus includes a security-sensor for detecting and 28 signalling a security-breach; 29 and the power-switch-operator is effective, in response to receiving the security-breach signal from the security-sensor, 31 to operate the power-switch to the OFF condition.
Claim 29. Apparatus of claim 28, wherein the circuit-board includes a busconnector-means, for connecting the controller J 27 into the computer.
Claim 30. Apparatus of claim 28, wherein the complementary powersockets and power-plugs are moulded in plastic, and are configured to conform to AMP Mate-n-Lock (tm) power sockets and plugs.
GB0022221A 1999-09-17 2000-09-11 Anti-theft device for computers Withdrawn GB2356477A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9922001A GB9922001D0 (en) 1999-09-17 1999-09-17 Anti-theft device for computers

Publications (2)

Publication Number Publication Date
GB0022221D0 GB0022221D0 (en) 2000-10-25
GB2356477A true GB2356477A (en) 2001-05-23

Family

ID=10861101

Family Applications (2)

Application Number Title Priority Date Filing Date
GB9922001A Ceased GB9922001D0 (en) 1999-09-17 1999-09-17 Anti-theft device for computers
GB0022221A Withdrawn GB2356477A (en) 1999-09-17 2000-09-11 Anti-theft device for computers

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GB9922001A Ceased GB9922001D0 (en) 1999-09-17 1999-09-17 Anti-theft device for computers

Country Status (2)

Country Link
CA (1) CA2317889A1 (en)
GB (2) GB9922001D0 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE20206664U1 (en) 2002-04-25 2002-08-29 TETT AG, 51465 Bergisch Gladbach Access device for a PC
EP2795507A4 (en) * 2011-12-22 2015-08-12 Intel Corp Always-available embedded theft reaction subsystem
US9454678B2 (en) 2011-12-22 2016-09-27 Intel Corporation Always-available embedded theft reaction subsystem
US9507965B2 (en) 2011-12-22 2016-11-29 Intel Corporation Always-available embedded theft reaction subsystem
US9507918B2 (en) 2011-12-22 2016-11-29 Intel Corporation Always-available embedded theft reaction subsystem
US9552500B2 (en) 2011-12-22 2017-01-24 Intel Corporation Always-available embedded theft reaction subsystem
US9558378B2 (en) 2011-12-22 2017-01-31 Intel Corporation Always-available embedded theft reaction subsystem
US9569642B2 (en) 2011-12-22 2017-02-14 Intel Corporation Always-available embedded theft reaction subsystem
US9619671B2 (en) 2011-12-22 2017-04-11 Intel Corporation Always-available embedded theft reaction subsystem
US9734359B2 (en) 2011-12-22 2017-08-15 Intel Corporation Always-available embedded theft reaction subsystem

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2682879C (en) * 2007-04-05 2017-05-23 Absolute Software Corporation Distribution channel loss protection for electronic devices
CN106157491A (en) * 2016-08-22 2016-11-23 常州市武进华瑞电子有限公司 Siren with touch screen
CN106157490A (en) * 2016-08-22 2016-11-23 常州市武进华瑞电子有限公司 The siren of band hook
CN106157492A (en) * 2016-08-22 2016-11-23 常州市武进华瑞电子有限公司 Easily hang siren

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4002956A (en) * 1975-06-06 1977-01-11 Minor Ross D Automatic electronic lock off system for an appliance
EP0127258A2 (en) * 1983-02-28 1984-12-05 Development Finance Corporation Of New Zealand Security control system for electrical equipment
US4818986A (en) * 1987-01-27 1989-04-04 Bauman Robert M Apparatus for controlling access to data storage devices
JPH1115562A (en) * 1997-06-23 1999-01-22 Nec Corp Personal computer
GB2345178A (en) * 1998-12-21 2000-06-28 Alexis Chatila A computer system with a user-proximity operated display

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4002956A (en) * 1975-06-06 1977-01-11 Minor Ross D Automatic electronic lock off system for an appliance
EP0127258A2 (en) * 1983-02-28 1984-12-05 Development Finance Corporation Of New Zealand Security control system for electrical equipment
US4818986A (en) * 1987-01-27 1989-04-04 Bauman Robert M Apparatus for controlling access to data storage devices
JPH1115562A (en) * 1997-06-23 1999-01-22 Nec Corp Personal computer
GB2345178A (en) * 1998-12-21 2000-06-28 Alexis Chatila A computer system with a user-proximity operated display

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE20206664U1 (en) 2002-04-25 2002-08-29 TETT AG, 51465 Bergisch Gladbach Access device for a PC
EP2795507A4 (en) * 2011-12-22 2015-08-12 Intel Corp Always-available embedded theft reaction subsystem
US9454678B2 (en) 2011-12-22 2016-09-27 Intel Corporation Always-available embedded theft reaction subsystem
US9507965B2 (en) 2011-12-22 2016-11-29 Intel Corporation Always-available embedded theft reaction subsystem
US9507918B2 (en) 2011-12-22 2016-11-29 Intel Corporation Always-available embedded theft reaction subsystem
US9520048B2 (en) 2011-12-22 2016-12-13 Intel Corporation Always-available embedded theft reaction subsystem
US9552500B2 (en) 2011-12-22 2017-01-24 Intel Corporation Always-available embedded theft reaction subsystem
US9558378B2 (en) 2011-12-22 2017-01-31 Intel Corporation Always-available embedded theft reaction subsystem
US9569642B2 (en) 2011-12-22 2017-02-14 Intel Corporation Always-available embedded theft reaction subsystem
US9619671B2 (en) 2011-12-22 2017-04-11 Intel Corporation Always-available embedded theft reaction subsystem
US9734359B2 (en) 2011-12-22 2017-08-15 Intel Corporation Always-available embedded theft reaction subsystem

Also Published As

Publication number Publication date
CA2317889A1 (en) 2001-03-17
GB0022221D0 (en) 2000-10-25
GB9922001D0 (en) 1999-11-17

Similar Documents

Publication Publication Date Title
US4908608A (en) Alarmcard
US5760690A (en) Portable computer with integrated alarm system
US5748083A (en) Computer asset protection apparatus and method
US6026492A (en) Computer system and method to disable same when network cable is removed
GB2356477A (en) Anti-theft device for computers
US5945915A (en) Computer system for sending an alert signal over a network when a cover of said system has been opened
US4494114A (en) Security arrangement for and method of rendering microprocessor-controlled electronic equipment inoperative after occurrence of disabling event
EP0892334B1 (en) Cabinet security state detection
JP3862566B2 (en) Power cord for theft prevention
US6002427A (en) Security system with proximity sensing for an electronic device
US5767771A (en) Electronic equipment theft deterrent system
US6072393A (en) Anti-theft alarm for portable electrically operated devices
US5859968A (en) Data security device for controlling access to external data drives
US5542044A (en) Security device for a computer, and methods of constructing and utilizing same
CA2099026C (en) Trusted personal computer system with identification
US20080250510A1 (en) Distribution channel loss protection for electronic devices
US6014746A (en) Workstation lock and alarm system
CA2183013A1 (en) Anti-theft alarm for electrically operated devices
US5838793A (en) Controlling movement of owned parts
US20060005264A1 (en) Computer security system
US6489890B1 (en) Security device
EP0127258A2 (en) Security control system for electrical equipment
GB2348051A (en) Deactivation of a portable device
GB2285703A (en) Computer apparatus with anti-theft deterrent provision
US7383444B2 (en) Information processing system, information processing apparatus, method of controlling the information processing apparatus, disk array device, method of controlling the disk array device, method of controlling display of the disk array device, and control programs for implementing the methods

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)