WO1997003397A1 - A method and an arrangement relating to theft-deterrents - Google Patents

A method and an arrangement relating to theft-deterrents Download PDF

Info

Publication number
WO1997003397A1
WO1997003397A1 PCT/EP1996/002999 EP9602999W WO9703397A1 WO 1997003397 A1 WO1997003397 A1 WO 1997003397A1 EP 9602999 W EP9602999 W EP 9602999W WO 9703397 A1 WO9703397 A1 WO 9703397A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
sensors
components
shock signal
signal
Prior art date
Application number
PCT/EP1996/002999
Other languages
French (fr)
Inventor
Bengt Andersson
William W. Gillispie
Original Assignee
Benkta Consulting Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Benkta Consulting Ab filed Critical Benkta Consulting Ab
Publication of WO1997003397A1 publication Critical patent/WO1997003397A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

In a method and an arrangement for deterring the theft of computers or vital computer components, an internal logic unit (7) is used to trigger a shock signal when the computer is subjected to improper manipulation. The logic unit (7) is connected electrically to external sensors (6) which include thin electric circuits (15) and movement detectors (16) such as to sense/detect improper manipulation of computer components or the computer itself. The arrangement can be controlled and monitored by a code panel (11). The code panel (11) includes a keyboard (17), a loudspeaker (18) and light-emitting diodes (19). The shock signal is directed to one or more vital components of the computer, these components being destroyed by the shock signal when triggered.

Description

A METHOD AND AN ARRANGEMENT RELATING TO THEFT-DETERRENTS
TECHNICAL FIELD
The present invention relates to a method and to a security arrangement for deterring the theft of computers or parts thereof. The security arrangement includes a protective device having one or more external sensors.
DESCRIPTION OF THE BACKGROUND ART
Many different solutions and concepts have been proposed with respect to protection against theft of computers, and then particularly personal computers, which have become a theft attractive item and are often easy to steal from work places and schools. These proposed solutions have included the use of simple mechanical devices, such as screwing the computer to the computer table for instance. Attempts have also been made to prevent manipulation of computers with the aid of different key and code arrangements with the intention of preventing the computer from being started-up and operated. Means for guarding against the improper or unauthorized use of software are also known to the art .
However, none of the hitherto proposed solutions and concepts directed towards protecting theft-attractive computers has been found effective. Present-day thieves do not often steal the entire computer, but solely the vital or expensive components therefrom. There is no effective means against such theft.
SUMMARY OF THE INVENTION
The present invention alleviates this situation by providing a safety or security arrangement which is characterized in that the external sensor or sensors included in the protective device is/are activated by improper actuation of the computer and each of which is connected to a generator means. Upon receipt of a signal from at least one of the sensors, the generator means functions to direct a shock signal to one or more of the vital or expensive computer components so as to partially or completely destroy said components. Because the computer components (at least those considered valuable to a thief) are destroyed, the theft of or the misappropriation of the computer will no longer be attractive to a thief.
The shock signal is preferably comprised of a series of high- voltage electrostatic or electromagnetic pulses or spikes which are triggered as a result of activating at least one of the sensors. A sensor can be triggered in result of unwarranted or improper movement of the computer, inactiva¬ tion of the computer voltage supply and/or improper opening of the computer casing.
Because the security arrangement shall be active even when the computer is inactive, the protective device includes a separate chargeable power unit which is intended to be charged when the computer is switched on and which enables the shock signal to be generated even when the computer is switched off, without the computer memory or processing facility being used. The power unit is connected to voltage converting and shock-signal generating circuits which are also connected to an internal logic unit and to an interface for the external sensors and a code panel .
In order to avoid triggering of the shock signal in the event of proper or qualified actuation of a sensor, for instance when servicing the computer, the security arrangement function can be disconnected by means of a code signal. This is preferably effected through the medium of a code panel having a keyboard or keypad through which the code signal can be entered. DESCRIPTION OF PREFERRED EMBODIMENTS
The inventive security arrangement will now be described in more detail with reference to a preferred embodiment thereof and also with reference to the accompanying drawing.
The drawing illustrates the principle features of a preferred embodiment of the inventive security arrangement in the form of an internal circuit board 1 which is connected to a series of electrical circuit board contacts 2 provided in the computer (not shown) to be protected against theft . The circuit board contacts 2 are connected electrically to the expansion bus of the computer mother board. When the computer operates normally, electric current is supplied to the circuit board 1 through current supply contacts 3.
The circuit board 1 has mounted thereon an appropriate number of chargeable power units 4 (batteries, capacitors or the like) which are supplied form the supply contacts 3 when the computer is in normal operation. The power units 4 are connected electrically to voltage converting and generator means 5 (VC/SDC) for generating a shock voltage signal when a triggering signal is obtained from one or more of the external sensors 6 described below. The shock signal is generated as a controlled series of pulses being conducted directly to the target components through a shock signal cable 20. The signal is returned through the expansion bus on the computer mother card back to an internal logic unit 7 via the circuit contacts 2 and the return line(s) of the computer bus on the mother card. The computer components, such as the mother card, the processor and/or the main memory, to be destroyed as a whole or partly are connected to the shock signal cable 20 by jumping gaps (not shown) transferring only the shock signal comprising a series of high-voltage electromagnetic pulses or spikes.
The shock signal cable 20 may be one single line branched off for each one of the computer components selected to be destroyed. Another embodiment may comprise separate shock signal cable lines connected between the circuit board l and the computer components selected to be destroyde.
The circuit board 1 is connected to a series of external contacts 8 on the outside of the computer via an interface included in the internal logic unit 7. The series of contacts 8 are fastened in a conventional manner with the aid of locking screws 9 through the medium of an attachment plate 10. The contacts 8 are used partly to connect one or more external sensors 6 and partly to connect a code panel 11. Connection of the sensors 6 and the code panel 11 is illus¬ trated by electric conductors 12 and 13 respectively. The conductors 12, 13, or cables, are electrically screened and strengthened with regard to mechanical strength.
Each sensor 6 includes a plate 14 having an adhesive film coating on at least one side thereof. The film incorporates a thin electrically conductive circuit 15. The plate 14 also carries a movement detector 16.
A sensor 6 can be used in a number of different ways. For instance, it may comprise a wall anchor plate, i.e. can be securely mounted on a wall of the room in which the computer is used and is situated close to the computer. The film containing circuit 15 is fastened to the wall and if a thief cuts the wire or cable 12 leading to the computer so as to free the computer from the wall anchor, this will be sensed by the internal logic unit 7 and a shock signal will be triggered as a result. Even though the sensor 6 should be removed carefully from the wall while leaving the wire or cable 12 undisturbed, this will nevertheless be sensed by the internal logic unit 7, by virtue of the fact that the circuit 15 incorporated in the film will be torn to pieces when the adhesive film is released, and also by virtue of actuation of the movement detector 16. Should the thief simply rip the entire wall anchor from the wall, this will be detected by the movement detector 16 and the logic unit 7 will thereby be activated to trigger the shock signal.
Correspondingly, the sensor 6 can be disposed as an insert between the underside of the computer and the table surface on which the computer stands. Lifting of the computer will actuate the movement detector 16 of the sensor 6 with the aforesaid result . Cutting of the wire or cable 12 will also cause the shock signal to be triggered.
The sensor 6 may also be applied to the outside or the inside of the computer casing, so as to activate the internal logic unit 7 should an attempt be made to remove the casing from the computer in order to reach significant or expensive components in the computer.
An attempt to release the internal circuit board 1 from its contacts 2, 3 will also activate the internal logic unit 7 so as to trigger the shock signal. The same applies with regard to an attempt to release the external lock plate 10 from the computer. In this case, the internal logic unit 7 will detect the breakage of the wires 12 to the external sensors 6, for instance by sending electric interrogation pulses from the internal logic unit 7 to the sensors 6.
As before indicated, the security arrangement is activated and deactivated by means of the code panel 11. This panel includes a device in the form of a remote control box provided with a keyboard 17 for keying code signals into the internal logic unit 7 of the security arrangement. Thus, the security arrangement can be activated and deactivated through the keyboard 17. It is also possible to interrupt accidental triggering of the shock signal, by entering a set code through the keyboard 17, when the shock signal is not triggered in real terms until a predetermined time period has lapsed after activation of the internal logic unit by a sensor 6. A loudspeaker 18 and/or light-emitting diodes (LED) 19 arranged on the code panel 11 function to issue acoustic and/or light warning signals to the effect that the internal logic unit 7 has been activated and that a shock signal that will destroy vital parts of the computer will be triggered after said predetermined time period.
In the event of the circuit (cable 13) extending between the internal logic unit 7 and the code panel 11 being broken, so as to make it impossible to reset/deactivate a triggered shock signal with the aid of the code panel 11, the invention provides the convenient following alternative. The imminent but time-delayed triggering of the shock signal (caused for instance by breaking the aforesaid circuit) can be nullified by manipulating the mains voltage supply switch in a prede¬ termined off/on or on/off sequence. This predetermined "failsafe" sequence is incorporated in the logic unit 7 and is unique for each security arrangement supplied. For instance, the sequence can be based on the selection of a given number of off/on (or on/off) switch manipulations per unit of time. For instance, the sequence may necessitate maneuvering the mains switch off/on six times during a period of three minutes with the following sequence of intermediate periods :
Intermediate period I (on 1 off 2) 20 seconds Intermediate period II (off 2 on 3) 30 seconds Intermediate period III (on 3 off 4) 40 seconds Intermediate period IV (off 4 on 5) 40 seconds Intermediate period V (on 5 - off 6) 50 seconds
The total intermediate time period = one time unit = 180 sec, i.e. 3 min. Naturally, the number of times the switch is switched on/off or off/on is optional, as is also the duration of the total time unit and the duration of respec¬ tive intermediate periods. The loudspeaker 18, the light-emitting diodes 19 and the keyboard 17 on the code panel 11 can also be used for other messages from and to the internal logic unit 7. For instance, the diodes 19 may continuously show the status of the security arrangement.
It will be evident from the aforegoing that a computer equipped with an inventive security arrangement will make a computer useless in response to improper interference with the computer or parts thereof, by triggering a shock signal when the computer casing is improperly open and/or when the computer is improperly, or unlawfully, removed from its normal working position. The shock signal will destroy valuable components of the computer and also generate an alarm. Improper attempts to inactivate and/or circumvent the security arrangement will result in permanent destruction of the vital electronic components of the computer (for instance its memory, the central processor unit (CPU) , the mother card and the like) . This destruction is thus achieved by a series, preferably a controlled series, of high-voltage electrostatic or electromagnetic pulses delivered via the data circuits and electrical supply circuits of the computer.
Although the invention has been described and illustrated with reference to a preferred exemplifying embodiment thereof, the person skilled in this art will realize that different modifications and further developments are conceiv¬ able without departing from the inventive concept. E.g. jumping gaps may be replaced with appropriate electronic components like capacitors. The invention is therefore not restricted to the aforedescribed and illustrated embodiments, and is solely restricted by the scope of the following Claims.

Claims

1. A method of deterring the theft of computers and the like by detecting improper or unlawful interference of a computer with the aid of one or more sensors (6) , said method being characterized in that when activated said one or more sensors (6) cause a generator means (5) to trigger a shock signal that is directed towards one or more vital or expensive target computer components such as to partially or completely destroy said components.
2. A method according to Claim 1, characterized by periodic interrogation of the sensors (6) with the aid of electric pulses delivered from an internal logic unit (7) .
3. A method according to Claim 1 or 2, characterized in that said shock signals are a controled series of pulses directed to said vital or expensive target computer components.
4. A method according to Claim 1 or 3, characterized in that said vital or expensive target computer components are one or more of the mother card, the processor and main memory or parts thereof included in the computer.
5. A method according to any one of the preceding Claims, characterized by triggering the shock signal first after a predetermined time period has lapsed after actuation of the generator means (5) .
6. A security arrangement for deterring the thef of computers and the like and comprising a protective device having one or more external sensors (6) , said security arrangement being characterized in that said sensors (6) are activatable by improper manipulation of the computer, and in that each one of said sensors (6) is connected to a generator means (5) which, in response to receiving a signal from at least one of the sensors (6) , functions to produce a shock signal which is directed to one or more vital or expensive target computer components so as to partially or completely destroy said components.
7. A security arrangement according to Claim 6, character¬ ized in that the shock signal comprises a series of high- voltage electrostatic or electromagnetic pulses.
8. A security arrangement according to Claim 6 or Claim 7, characterized in that respective sensors (6) are activatable in response to improper movement of the computer, inactiva¬ tion of the computer voltage supply and/or improper opening of the computer casing.
9. An arrangement according to any one of Claims 6-8, characterized in that the protective device includes a separate chargeable power unit (4) which is intended to be charged when the computer is switched-on and which also enables the generation of said chock signal when the computer is switched-off without the computer memory or processing capacity of the computer being used.
10. An arrangement according to Claim 9, characterized in that the power unit (4) is connected to voltage conversion and shock-signal generator circuits (5) which are also connected to an internal logic unit (7) and to interfaces for the external sensors (6) and a code panel (11) .
11. An arrangement according to any one of the Claims 6-10, characterized in that the shock signal is generated as a controlled series of pulses conducted directly to the target computer components through a shock signal cable (20) connected to the target computer components by one or more jumping gaps, the return circuitry being set up by the ordinary computer bus (via 2) of the computer mother card.
12. An arrangement according to Claim 8 and Claim 10, characterized in that each of the external sensors (6) comprises a plate-like means (14) whose at least one surface has applied thereon an adhesive film which incorporates a thin electrically conductive circuit (15) and a movement detector (16) , wherein the sensor (6) when mounted on a wall or on the outside of the computer, preferably on the under¬ side thereof, or against the inside of the computer lid, is activated to deliver a signal to the generator means (5) when the sensor (6) is removed from the wall, separated from the computer by lifting the computer, separated from the lid as the lid is opened and/or when the sensor (6) is moved together with the computer.
13. An arrangement according to Claim 10, characterized in that the code panel (11) has the form of a remote control unit provided with keys (17) , wherein the security arrange¬ ment can be activated and inactivated preferably by keying-in predetermined codes through the keys (17) .
14. An arrangement according to Claim 13, characterized in that the code panel (11) includes a series of light-emitting diodes (19) for displaying the operational status of the computer and/or a loudspeaker (18) for generating a series of high-frequency acoustic signals to draw attention to a malfunction and/or a theft attempt.
15. An arrangement according to any one of Claims 9-11, characterized in that the power unit (4) , the voltage conversion and shock signal generating circuits (5) , and the internal logic unit (7) are arranged on a circuit board (1) which can be connected via internal circuit board contacts (2, 3) to the computer expansion bus on the computer mother card, and which are connected to an external lock plate (10) having sensor contacts (8) for the external sensors (6) , wherewith a breakage between the circuit board (1) and the circuit board contacts (2, 3) or the sensor contacts (8) results in a shock signal from the generator means (5) fed through the shock signal cable (20) to said selected target computer components.
PCT/EP1996/002999 1995-07-10 1996-07-09 A method and an arrangement relating to theft-deterrents WO1997003397A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE9502537A SE513662C2 (en) 1995-07-10 1995-07-10 Procedure and apparatus for theft prevention
SE9502537-5 1995-07-10

Publications (1)

Publication Number Publication Date
WO1997003397A1 true WO1997003397A1 (en) 1997-01-30

Family

ID=20398934

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1996/002999 WO1997003397A1 (en) 1995-07-10 1996-07-09 A method and an arrangement relating to theft-deterrents

Country Status (2)

Country Link
SE (1) SE513662C2 (en)
WO (1) WO1997003397A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998049656A1 (en) * 1997-04-25 1998-11-05 C-Cure Ab Method of making a computer theft-proof
GB2332707A (en) * 1997-12-10 1999-06-30 Gore Lyons Samantha Jane A security device for electrical equipment
WO2001003100A1 (en) * 1999-07-01 2001-01-11 Iuc Sjuharad Ab Apparatus and method for safeguarding electronic equipment from theft
US6275151B1 (en) * 2000-01-11 2001-08-14 Lucent Technologies Inc. Cognitive intelligence carrying case
WO2002097755A1 (en) * 2001-05-31 2002-12-05 Leif Arne Albinsson An arrangement for reducing the disposition towards theft
ES2288340A1 (en) * 2005-01-21 2008-01-01 Universidade De Vigo Device for protection of industrial espionage from information theft attempt situations in data processing system, circuit controller, which drives effecter circuit by activator element
US9935847B2 (en) 2014-08-20 2018-04-03 Jamf Software, Llc Dynamic grouping of managed devices
US9998914B2 (en) 2014-04-16 2018-06-12 Jamf Software, Llc Using a mobile device to restrict focus and perform operations at another mobile device
US11392716B2 (en) 2017-05-12 2022-07-19 Jamf Software, Llc Mobile device management at a healthcare facility

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218763A (en) * 1978-08-04 1980-08-19 Brailsford Lawrence J Electronic alarm signaling system
GB2182467A (en) * 1985-10-30 1987-05-13 Ncr Co Security device for stored sensitive data
US4783801A (en) * 1983-12-29 1988-11-08 Gao Gesellschaft Fur Automation Und Organisation Mbh Apparatus for protecting secret information
WO1991005306A1 (en) * 1989-10-03 1991-04-18 University Of Technology, Sydney Electro-active cradle circuits for the detection of access or penetration
US5406261A (en) * 1993-01-11 1995-04-11 Glenn; James T. Computer security apparatus and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218763A (en) * 1978-08-04 1980-08-19 Brailsford Lawrence J Electronic alarm signaling system
US4783801A (en) * 1983-12-29 1988-11-08 Gao Gesellschaft Fur Automation Und Organisation Mbh Apparatus for protecting secret information
GB2182467A (en) * 1985-10-30 1987-05-13 Ncr Co Security device for stored sensitive data
WO1991005306A1 (en) * 1989-10-03 1991-04-18 University Of Technology, Sydney Electro-active cradle circuits for the detection of access or penetration
US5406261A (en) * 1993-01-11 1995-04-11 Glenn; James T. Computer security apparatus and method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998049656A1 (en) * 1997-04-25 1998-11-05 C-Cure Ab Method of making a computer theft-proof
GB2332707A (en) * 1997-12-10 1999-06-30 Gore Lyons Samantha Jane A security device for electrical equipment
WO2001003100A1 (en) * 1999-07-01 2001-01-11 Iuc Sjuharad Ab Apparatus and method for safeguarding electronic equipment from theft
US6275151B1 (en) * 2000-01-11 2001-08-14 Lucent Technologies Inc. Cognitive intelligence carrying case
WO2002097755A1 (en) * 2001-05-31 2002-12-05 Leif Arne Albinsson An arrangement for reducing the disposition towards theft
ES2288340A1 (en) * 2005-01-21 2008-01-01 Universidade De Vigo Device for protection of industrial espionage from information theft attempt situations in data processing system, circuit controller, which drives effecter circuit by activator element
US9998914B2 (en) 2014-04-16 2018-06-12 Jamf Software, Llc Using a mobile device to restrict focus and perform operations at another mobile device
US10313874B2 (en) 2014-04-16 2019-06-04 Jamf Software, Llc Device management based on wireless beacons
US10484867B2 (en) 2014-04-16 2019-11-19 Jamf Software, Llc Device management based on wireless beacons
US9935847B2 (en) 2014-08-20 2018-04-03 Jamf Software, Llc Dynamic grouping of managed devices
US11392716B2 (en) 2017-05-12 2022-07-19 Jamf Software, Llc Mobile device management at a healthcare facility

Also Published As

Publication number Publication date
SE513662C2 (en) 2000-10-16
SE9502537L (en) 1997-01-11
SE9502537D0 (en) 1995-07-10

Similar Documents

Publication Publication Date Title
US5317304A (en) Programmable microprocessor based motion-sensitive alarm
US6072393A (en) Anti-theft alarm for portable electrically operated devices
EP1204955B1 (en) Anti-theft electrical power cord
US5767771A (en) Electronic equipment theft deterrent system
JP3831858B2 (en) System for protecting goods from theft
US5341124A (en) Mountable product sensor and display stand
US4092641A (en) Security interlock switch system for smoke detectors and the like
US5406261A (en) Computer security apparatus and method
US5838225A (en) Anti-theft alarm for electrically operated devices
US4797663A (en) Portable security monitor and time recording
US4686514A (en) Alarm system for computers and the like
WO1997003397A1 (en) A method and an arrangement relating to theft-deterrents
KR100238408B1 (en) Anti-theft system for computer
US7126474B2 (en) Vending machine with remote control alarm
SE513662C3 (en) Procedure and device for the prevention of theft
GB2303173A (en) Computer Security Module
GB2300508A (en) Security alarm device for a computer
GB2292629A (en) Security system for computer
GB2285703A (en) Computer apparatus with anti-theft deterrent provision
WO1995027958A1 (en) Alarms incorporating plug for electric appliances
GB2274532A (en) Method and apparatus for securing mains powered electrical equipment
GB2400453A (en) A remote protection system for disabling electrical equipment.
KR200172622Y1 (en) Alarm circuit for safe
GB2298727A (en) Theft alarm device
GB2336225A (en) An in-line keyswitch for disabling computer keyboards or monitors

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): BR CA CN JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA