WO1998049656A1 - Method of making a computer theft-proof - Google Patents
Method of making a computer theft-proof Download PDFInfo
- Publication number
- WO1998049656A1 WO1998049656A1 PCT/SE1998/000748 SE9800748W WO9849656A1 WO 1998049656 A1 WO1998049656 A1 WO 1998049656A1 SE 9800748 W SE9800748 W SE 9800748W WO 9849656 A1 WO9849656 A1 WO 9849656A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- storage device
- theft
- identity designation
- identity
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1409—Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
Definitions
- the present invention relates to a method of making a computer theft-proof, the computer comprising a plurality of components, including a special storage device.
- Methods which include permanent registration of a computer identity designation in the special storage device as well as registration of this computer identity designation with information about the owner of the computer in a theft-prevention record.
- a registration of the computer identity designation is made on the computer itself, e.g. by marking the cover of the computer in a way that is difficult to destruct, e.g. by etching.
- the deterrent effect on theft obtained by the exterior marking of the computer can be enhanced by using the computer identity designation registered in the special storage device by means of suitable software to ex- plicitly indicate, when an attempt is made to start the computer on the associated screen, that the identity of the computer is stored in the special storage device as well as in a theft-prevention record with information about the owner.
- the entire computer nor the special storage device is particularly liable to be stolen since they can normally always be identified separately on some future occasion.
- the object of the present invention is therefore to enhance the theft prevention of the computer as well as main components therein, e.g. hard disk, other storage devices and motherboard. According to the invention, this object is achieved by also registrating an identity designation of at least one of the components of the computer in the theft- prevention record associated with the computer identity designation, the component containing a permanent registration of its identity designation.
- Such a permanent registration is often made by the manufacturer in the form a unique serial number and is stored in a storage device which is permanently connected to the component and which usually is only readable since it is directly or indirectly connected to a bus in the computer system. The reading normally also requires access to a special code.
- this storage device being permanently connected to the component and often being impossible to distinguish in respect of its physical place on the component for anyone except the manufacturer, it is in practice impossible for anyone except the manufacturer to eliminate the identity of this component from the actual component, which thus is always possible to identify.
- the component identity designation can be read from the storage device permanently connected to the component when the computer identity designation is being registered in the storage device of the computer.
- the component identity designation is stored on a storage medium which is separable from the computer and which also contains the computer identity designation permanently registered in the storage device of the computer.
- the inventive method of making a computer theft- proof is advantageously part of a system, which also comprises exterior marking of the computer, e.g. in the form of a tape with an identity designation unique to the com- puter and thus to its owner. Corresponding marking can be performed on selected components contained in the computer also by means of a tape or in a practically concealed way by means of minimal marking e.g. under a drop of adhesive.
- the same unique identity designation can be etched in the cover of the computer.
- the tape mentioned above can be used in a shape suitable for this purpose.
- the identity designation of the computer can advantageously also be stored on the hard disk of the computer in the normally accessible sections thereof as well as outside these sections.
- a special program can be stored on the hard disk, which program, when the computer is started on the screen of the computer, shows a warning text, which can state that both the computer and the hard disk are marked and that corresponding registrations are also available in a theft-prevention record.
- a separate program is used according to the invention, which is stored on a diskette or on some other storage medium separable from the computer.
- This diskette can advantageously also be used for storing the information to be transmitted to the theft- prevention record for central storage.
- the owner of the computer is also keeping a copy of this diskette in a safe place, said diskette being preferably used for all the computers of the owner in common.
- a computer and component manufacturer usually provides different main components of computers with storage devices, in which e.g. a unique serial number is stored as an identification of the individual unit of the component in question.
- This storage device can consist of a semiconductor chip, which is a read only memory and whose information thus cannot be altered.
- it can be located, e.g. be a part of a storage device intended for another purpose, such that it is difficult for anyone except the manufacturer to discover it.
- the storage device is directly or indirectly connected to some kind of a bus in the system and the information in the storage device is accessible by means of a special code .
- a diskette is entered into a diskette reader in the computer to be made theft-proof, the diskette containing on the one hand at least one unique computer identity designation and, on the other, a first program for processing the computer identity designation and a second program for processing the component identity designations of interest.
- the first program is started, it is first checked whether the hard disk is already marked, i.e. contains a computer identity designation. If this is not the case, such a designation is read from the diskette and stored in a predetermined way on the hard disk.
- information is entered on the hard disk showing a warning text on the screen of the computer when started, stating that the computer, as well as its components, is provided with an anti-theft marking.
- the second program is started, which reads the unique identity designations of the data component/components of interest, as stored in the storage device, specially provided for this purpose, of each com- ponent .
- the second program stores this or these identity designations on the diskette which are connected to the computer identity designation. Additional information, such as the date of the execution and information about the computer owner, is also stored in association with the computer identity designation.
- the storage preferably has the form of a text file.
- the diskette with the thus-compiled information from one or more computers, belonging to one and the same owner, can be kept by the owner and entered into a database which functions as a theft-prevention record and which can be accessible to the police and customs officers .
- the method according to the invention offers a very high degree of theft prevention since it is possible to identify the computer in an adequate manner, and at least those components in the computer which are provided with the described storage device cannot in practice lose their unique identification, which can always be associated with the rightful owner via the theft-prevention record.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Burglar Alarm Systems (AREA)
Abstract
A computer comprises a plurality of components, including a special storage device. A method of making such a computer and main components thereof theft-proof comprises permanent registration of a computer identity designation in the special storage device as well as in a theft-prevention record with information about the owner of the computer. An identity designation of at least one of the components of the computer is also registered in the theft-prevention record associated with the computer identity designation, the component containing a permanent registration of its identity designation.
Description
METHOD OF MAKING A COMPUTER THEFT-PROOF
The present invention relates to a method of making a computer theft-proof, the computer comprising a plurality of components, including a special storage device. Methods are known which include permanent registration of a computer identity designation in the special storage device as well as registration of this computer identity designation with information about the owner of the computer in a theft-prevention record. In addition to the registration of the computer identity designation in the special storage device, e.g. on the hard disk, a registration of the computer identity designation is made on the computer itself, e.g. by marking the cover of the computer in a way that is difficult to destruct, e.g. by etching.
The deterrent effect on theft obtained by the exterior marking of the computer can be enhanced by using the computer identity designation registered in the special storage device by means of suitable software to ex- plicitly indicate, when an attempt is made to start the computer on the associated screen, that the identity of the computer is stored in the special storage device as well as in a theft-prevention record with information about the owner. Thus, neither the entire computer nor the special storage device is particularly liable to be stolen since they can normally always be identified separately on some future occasion.
Even if existing anti-theft systems thus are essentially satisfactory, there is a need for further improve- ments.
The object of the present invention is therefore to enhance the theft prevention of the computer as well as main components therein, e.g. hard disk, other storage devices and motherboard.
According to the invention, this object is achieved by also registrating an identity designation of at least one of the components of the computer in the theft- prevention record associated with the computer identity designation, the component containing a permanent registration of its identity designation.
Such a permanent registration is often made by the manufacturer in the form a unique serial number and is stored in a storage device which is permanently connected to the component and which usually is only readable since it is directly or indirectly connected to a bus in the computer system. The reading normally also requires access to a special code. By this storage device being permanently connected to the component and often being impossible to distinguish in respect of its physical place on the component for anyone except the manufacturer, it is in practice impossible for anyone except the manufacturer to eliminate the identity of this component from the actual component, which thus is always possible to identify.
More specifically, the component identity designation can be read from the storage device permanently connected to the component when the computer identity designation is being registered in the storage device of the computer.
For the transmission of information to the theft- prevention record, the component identity designation is stored on a storage medium which is separable from the computer and which also contains the computer identity designation permanently registered in the storage device of the computer.
The invention will now be described in more detail with reference to a preferred embodiment.
The inventive method of making a computer theft- proof is advantageously part of a system, which also comprises exterior marking of the computer, e.g. in the form of a tape with an identity designation unique to the com-
puter and thus to its owner. Corresponding marking can be performed on selected components contained in the computer also by means of a tape or in a practically concealed way by means of minimal marking e.g. under a drop of adhesive.
As an additional part of the anti-theft system the same unique identity designation can be etched in the cover of the computer. In this connection, the tape mentioned above can be used in a shape suitable for this purpose.
The identity designation of the computer can advantageously also be stored on the hard disk of the computer in the normally accessible sections thereof as well as outside these sections. To attract the attention of a supposed thief to the extension of the anti-theft system, a special program can be stored on the hard disk, which program, when the computer is started on the screen of the computer, shows a warning text, which can state that both the computer and the hard disk are marked and that corresponding registrations are also available in a theft-prevention record.
For the registration of the unique computer identity designation on the hard disk, a separate program is used according to the invention, which is stored on a diskette or on some other storage medium separable from the computer. This diskette can advantageously also be used for storing the information to be transmitted to the theft- prevention record for central storage. The owner of the computer is also keeping a copy of this diskette in a safe place, said diskette being preferably used for all the computers of the owner in common.
According to the invention use is made of the fact that a computer and component manufacturer usually provides different main components of computers with storage devices, in which e.g. a unique serial number is stored as an identification of the individual unit of the component in question. This storage device can consist of a
semiconductor chip, which is a read only memory and whose information thus cannot be altered. In addition, it can be located, e.g. be a part of a storage device intended for another purpose, such that it is difficult for anyone except the manufacturer to discover it. Normally, the storage device is directly or indirectly connected to some kind of a bus in the system and the information in the storage device is accessible by means of a special code . Since the components of the computer, which are especially liable to be stolen, besides the computer itself, thus in many cases have a unique identity designation, which in addition is very difficult to eliminate, the anti-theft protection of these components can be en- hanced by the method according to the invention.
The use of the inventive method will now be described with reference to an example.
A diskette is entered into a diskette reader in the computer to be made theft-proof, the diskette containing on the one hand at least one unique computer identity designation and, on the other, a first program for processing the computer identity designation and a second program for processing the component identity designations of interest. When the first program is started, it is first checked whether the hard disk is already marked, i.e. contains a computer identity designation. If this is not the case, such a designation is read from the diskette and stored in a predetermined way on the hard disk. In addition, information is entered on the hard disk showing a warning text on the screen of the computer when started, stating that the computer, as well as its components, is provided with an anti-theft marking.
Subsequently, the second program is started, which reads the unique identity designations of the data component/components of interest, as stored in the storage device, specially provided for this purpose, of each com-
ponent . The second program stores this or these identity designations on the diskette which are connected to the computer identity designation. Additional information, such as the date of the execution and information about the computer owner, is also stored in association with the computer identity designation. The storage preferably has the form of a text file.
The diskette with the thus-compiled information from one or more computers, belonging to one and the same owner, can be kept by the owner and entered into a database which functions as a theft-prevention record and which can be accessible to the police and customs officers .
It is apparent that the method according to the invention offers a very high degree of theft prevention since it is possible to identify the computer in an adequate manner, and at least those components in the computer which are provided with the described storage device cannot in practice lose their unique identification, which can always be associated with the rightful owner via the theft-prevention record.
The invention can, of course, be modified in several ways within the scope of the invention as stated in the appended claims.
Claims
1. A method of making a computer theft-proof, said computer comprising a plurality of components including a special storage device, which method comprises permanent registration of a computer identity designation in the special storage device as well as in a theft-prevention record with information about the owner of the computer, c h a r a c t e r i s e d in that an identity designation of at least one of the computer components is also registered in the theft-prevention record associated with the computer identity designation, which component contains a permanent registration of its identity designation.
2. A method according to claim 1, c h a r a c t e r i s e d in that the component identity designation is read from a storage device permanently connected to the component .
3. A method according to claim 2, c h a r a c - t e r i s e d in that the component identity designation is read from the storage device permanently connected to the component when the computer identity designation is being registered in the storage device of the computer.
4. A method according to claim 3, c h a r a c - t e r i s e d in that the component identity designation is stored on a storage medium which is separable from the computer and which contains the computer identity designation permanently registered in the storage device of the computer.
5. A method according to claim 4, c h a r a c t e r i s e d in that the computer identity designation is read from the separable storage medium for the permanent registration of the same in the special storage device in the computer.
6. A method according to claim 5, c h a r a c t e r i s e d in that the separable storage medium is used for storing a program for the reading of the com- puter identity designation and for the permanent registration of the same in the special storage device in the computer.
7. A method according to claim 5 or 6, c h a r - a c t e r i s e d in that the separable storage medium is used for storing a program for reading the identity designation of the computer component of interest and storing of the same on the separable storage medium.
8. A method according to any of claims 4-7, c h a r a c t e r i s e d in that the separable storage medium is used as a medium for transmitting the identity designations to the theft-prevention record.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9701579-6 | 1997-04-25 | ||
SE9701579A SE9701579L (en) | 1997-04-25 | 1997-04-25 | Ways to steal a computer |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998049656A1 true WO1998049656A1 (en) | 1998-11-05 |
Family
ID=20406737
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SE1998/000748 WO1998049656A1 (en) | 1997-04-25 | 1998-04-24 | Method of making a computer theft-proof |
Country Status (2)
Country | Link |
---|---|
SE (1) | SE9701579L (en) |
WO (1) | WO1998049656A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4262337A (en) * | 1974-09-03 | 1981-04-14 | General Motors Corporation | Portable calculator incorporating an anti-theft feature |
GB2182207A (en) * | 1985-10-29 | 1987-05-07 | Marconi Instruments Ltd | Electrical circuit identification |
WO1993020459A1 (en) * | 1992-04-03 | 1993-10-14 | Tommy Olsson | A method and a device for anti-theft marking of office equipment, especially computers |
WO1997003397A1 (en) * | 1995-07-10 | 1997-01-30 | Benkta Consulting Ab | A method and an arrangement relating to theft-deterrents |
WO1997023122A1 (en) * | 1995-12-15 | 1997-06-26 | Memory Card Technology A/S | Print board with identification marking |
-
1997
- 1997-04-25 SE SE9701579A patent/SE9701579L/en not_active IP Right Cessation
-
1998
- 1998-04-24 WO PCT/SE1998/000748 patent/WO1998049656A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4262337A (en) * | 1974-09-03 | 1981-04-14 | General Motors Corporation | Portable calculator incorporating an anti-theft feature |
GB2182207A (en) * | 1985-10-29 | 1987-05-07 | Marconi Instruments Ltd | Electrical circuit identification |
WO1993020459A1 (en) * | 1992-04-03 | 1993-10-14 | Tommy Olsson | A method and a device for anti-theft marking of office equipment, especially computers |
WO1997003397A1 (en) * | 1995-07-10 | 1997-01-30 | Benkta Consulting Ab | A method and an arrangement relating to theft-deterrents |
WO1997023122A1 (en) * | 1995-12-15 | 1997-06-26 | Memory Card Technology A/S | Print board with identification marking |
Also Published As
Publication number | Publication date |
---|---|
SE9701579D0 (en) | 1997-04-25 |
SE507329C2 (en) | 1998-05-11 |
SE9701579L (en) | 1998-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100514280C (en) | Attachable/detachable device and programs start method | |
NL1014830C2 (en) | A method of tracking devices used for loading, reading and writing removable storage media. | |
CA2472195A1 (en) | System and method of reading a security clearance card | |
US6827256B2 (en) | System for storage and output of objects | |
CN1831838B (en) | Authentication tag for software media | |
CN1504968A (en) | RFID tags which are physically activated and/or deactivated | |
RU98123599A (en) | Theft Prevention Device | |
US20060006982A1 (en) | Method And Apparatus For Using RFID's In The Investigation Of Motor Vehicle Accidents | |
PT2430624E (en) | An electronic system and a method for the automatic identification of a vehicle | |
US7263190B1 (en) | System for securing the confidentiality of electronically stored data in the event of the physical theft thereof | |
JP4713379B2 (en) | Apparatus and method for ownership verification | |
WO1998049656A1 (en) | Method of making a computer theft-proof | |
WO1993013966A1 (en) | Motor vehicle start-up control | |
McDonald | Book detection systems | |
US11131123B2 (en) | Method and apparatus for upgrading ink stain antitheft tags with RFID communications function | |
WO1995011501A1 (en) | System for nationally and internationally identifying motor vehicles | |
US7025263B2 (en) | Systems and methods for tracking alcoholic containers | |
JP2007200244A (en) | Information management system and information management method | |
JPH0672085A (en) | Information recording medium | |
US20080136407A1 (en) | System and method for magnetic field exposure indication | |
AU724348B2 (en) | Secured access checking system enabling the automatic disabling of stolen or lost electronic keys and/or the transfer of entitlement to produce keys | |
US7299327B2 (en) | Content-on-demand memory key with positive access evidence feature | |
WO1998053384A1 (en) | Method and apparatus for activating programs/features in a computer | |
EP0703126A2 (en) | Modular protection and control system | |
TWI390547B (en) | Management apparatus, system, and method for protecting a memory storage card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): DK DK FI FI NO |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |