WO2001001362A1 - Dispositif de securite - Google Patents
Dispositif de securite Download PDFInfo
- Publication number
- WO2001001362A1 WO2001001362A1 PCT/GB2000/002490 GB0002490W WO0101362A1 WO 2001001362 A1 WO2001001362 A1 WO 2001001362A1 GB 0002490 W GB0002490 W GB 0002490W WO 0101362 A1 WO0101362 A1 WO 0101362A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- security
- equipment
- signal
- detector
- Prior art date
Links
- 230000004044 response Effects 0.000 claims abstract description 9
- 238000000034 method Methods 0.000 claims description 47
- 238000012544 monitoring process Methods 0.000 claims description 12
- 230000005540 biological transmission Effects 0.000 claims description 10
- 238000004519 manufacturing process Methods 0.000 claims description 7
- 230000004913 activation Effects 0.000 claims description 6
- 230000009849 deactivation Effects 0.000 claims description 3
- 238000001514 detection method Methods 0.000 claims description 3
- 230000001960 triggered effect Effects 0.000 claims description 2
- 238000004891 communication Methods 0.000 description 11
- 238000012423 maintenance Methods 0.000 description 7
- 230000001413 cellular effect Effects 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 238000013461 design Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000011664 signaling Effects 0.000 description 5
- 230000004048 modification Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000005259 measurement Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012806 monitoring device Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 206010034960 Photophobia Diseases 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 239000000919 ceramic Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001427 coherent effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000030279 gene silencing Effects 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 208000013469 light sensitivity Diseases 0.000 description 1
- 206010025482 malaise Diseases 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1427—Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0216—Alarm cancellation after generation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0269—System arrangements wherein the object is to detect the exact location of child or item using a navigation satellite system, e.g. GPS
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0272—System arrangements wherein the object is to detect exact location of child or item using triangulation other than GPS
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/028—Communication between parent and child units via remote transmission means, e.g. satellite network
- G08B21/0283—Communication between parent and child units via remote transmission means, e.g. satellite network via a telephone network, e.g. cellular GSM
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0286—Tampering or removal detection of the child unit from child or article
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0294—Display details on parent unit
Definitions
- the invention relates to a security device for equipment.
- Embodiments of the invention described herein relate to determining the location of the equipment, and in preferred embodiments tracking the equipment.
- the invention therefore seeks to provide a security system which takes the initiative on behalf of owners of items of equipment.
- a security device for equipment comprising a detector for detecting a security breach and a signal generator for transmitting a signal in response to a signal from the detector.
- the security device can be used for all types of equipment but finds particular application in relation to equipment including electronic components, in particular computer components.
- the equipment is not restricted, however, to computers per se. Any article can include the security device.
- the device is used in equipment including an electronic device, and in particular in electronic equipment.
- the use of the security device in electronic equipment is preferred because in preferred embodiments, the security device itself includes various electronic components which can be more easily "hidden” in electronic equipment.
- Such equipment may include computers, devices or other electronic components in cars, computers, domestic appliances such as microwave ovens, televisions, stereo systems and others.
- the security devices can be disguised as part of other electronic components in the equipment.
- the security device can be a part of a sound card or network card.
- the security device can be arranged to interact with equipment in any other way.
- the security device further includes a control device for controlling the signal generator.
- the control device is embodied in software, in which case the control device may comprise a suitably programmed processor.
- Other types of control device are envisaged, which may be embodied in hardware.
- the control device includes a password protection device which is arranged to control the activation and deactivation of the device.
- the password device may comprise any user input security device.
- the security device may only be activated and, more importantly, deactivated by authorised personnel. Deactivation of the device may be required where it is necessary to move or dismantle the equipment for, for example, maintenance.
- the security device is arranged to be active at all times unless specifically operator deactivated for maintenance.
- the password protection of the control device is such that if more than a predetermined number of wrong attempts are made to input the password, the signal generator is activated and the alarm signal sent.
- the control device is written directly onto a chip, for example embedded into a chip. Thus tampering with the control device is hindered.
- the security device is installed in equipment running computer software, the control device is in communication with the software of the equipment.
- the security device is automatically activated on activation or starting up the equipment. For example, where the equipment comprises a computer, preferably the security device is automatically activated when the computer is switched on.
- the detector may comprise any device which may detect a security breach.
- the detector may comprise a hardware or software device. The choice of detector will depend on the equipment to be protected. Examples of detectors which might be used are described below.
- the detector comprises means for detecting the input of an incorrect password.
- the detector can be arranged to send a signal to the control device on input of an incorrect password. Once the control device has detected that a threshold number of incorrect passwords have been input (the threshold may be one or more), a signal may be sent to the signal generator to transmit the security alarm signal.
- the control device is adapted to control the starting of electronic equipment, the control device being adapted to prevent the equipment starting unless a correct password is input.
- the equipment comprises a computer
- the password is a ROM and/or BIOS password so that the computer does not boot up if the correct password is not input.
- the equipment is, for example, a car
- starting of the car can be prevented if the correct password is not input.
- the detector includes a power fluctuation detector.
- power in the security device and/or in the equipment can be monitored and a signal generated if the power changes or is removed, as would occur, for example, if someone disconnected the equipment from the mains supply.
- the detector may monitor power coming onto a circuit board.
- the detector may be connected across the power supply of the equipment.
- the detector may monitor the voltage on a bus or internal part of the equipment.
- the device further includes a power supply.
- a power supply By having its own power supply, the device is able to transmit the signal even when power has been cut from the equipment.
- the equipment has its own power supply, for example the mains electricity, preferably the power supply of the device is arranged to be recharged by the equipment. In that way the power supply requires less maintenance and can have a longer life.
- the power supply may comprise a rechargeable battery.
- the detector includes a power supply tamper detector.
- the alarm signal will be generated.
- the detector includes a tamper detector.
- the tamper detector may be adapted to detect any attempt to open or modify the equipment.
- the tamper detector may comprise a light sensor, which may include a photoelectric cell.
- the tamper detector may comprise a micro contact switch. This would be arranged between two parts of the equipment.
- Such devices may be used for security devices for computers (opening of the casing to expose the circuit boards would be alerted), cars (opening of the bonnet, boot, or petrol cap, for example would be alerted), safe (the door of the safe opening or light entering the safe could be alerted); hi-fi equipment, wine cellars or bags of security papers could all be protected in this way.
- the signal generator is adapted to transmit a wireless transmission.
- the security device does not rely on its operation to being connected to a landline.
- the signal generator includes a GSM transmitter.
- Other signals could be used for the alarm signal, for example GPS signals, digital or audible signals.
- the signal may comprise a signal on a landline, for example telephone line.
- the transmitter may be adapted to send the signal to a location measurement unit.
- the device is adapted to transmit a code identifier of the device.
- the code identifier may comprise an ERN security identity code number.
- the device is adapted to transmit a code identifier of the detected security breach.
- the recipient of the signal is aware what type of security breach has occurred and take the necessary action.
- the security device described herein could be used to notify various other incidents.
- the detector may detect that a part of the equipment has broken, and the signal sent would notify the recipient of the fault.
- the invention relates to the notification of information regarding any aspect of the equipment.
- control device includes means for disabling an audio device in the equipment.
- the audio device may comprise a sound card or loudspeaker. This might alert the intruder to the presence of the security device. By silencing the loudspeaker, for example, the signal can be sent silently.
- the signal generator is adapted to transmit a signal to enable the location of the device to be determined.
- the device is adapted for use with the CURSOR radio navigation and tracking system.
- the device further includes means for changing default settings of the security device.
- the device includes several different detectors, one or more of those detectors can preferably be disabled by the user, for example if maintenance is to be carried out.
- Other features may be adjusted, for example passwords, and the number of incorrect passwords tolerated before, for example, the alarm signal is sent.
- features of the device are embodied in software, preferably the device further includes software for effecting changes to the default settings.
- the device may include further software, for example for accessing a website which controls the security device.
- the device is integrated into a circuit board of the equipment. In this way, the device is harder to tamper with or remove.
- the device may be provided separately and the invention further provides a bus- or expansion card comprising a device as described herein. In this way, it is easier to install the device into a computer.
- the first aspect of the invention also provides a computer including a security device as described herein.
- control device for a security device as described herein.
- the control device may be sold separately from the signal generator and detectors.
- the invention further provides a computer read only memory for directing a security operation on the computer, said memory including means for receiving a signal from a detector indicating a security breach has occurred and means for transmitting a signal to a signal generator to generate an alarm signal indicating that the security breach has occurred.
- the first aspect of the invention also provides a method of notifying a security breach of equipment, the method comprising the steps of detecting the security breach, and transmitting a signal in response to the detection of the security breach.
- the method further includes transmitting a GSM signal.
- the method further includes transmitting an identifier code of the equipment and/or a code identifier of the detected security breach.
- a security monitoring system comprising: means for receiving a notification from the equipment indicating a security breach of equipment has occurred; and means for sending a notification that the breach has occurred.
- the notification may be sent by any communication method, for example SMS, email, telephone or other.
- the notification may be sent to the user, to a security company or to the police, for example.
- the security monitoring system is computer implemented, and is provided on a computer network, for example the Internet. Users may log into the website, to find out information on the whereabouts of their equipment.
- the system includes means for determining details of the owner of the equipment. In this way, the owner may be contacted to be told of the security breach. Preferably, this information is provided by the user registering his security device with the monitoring device.
- each security device has an identifier code, and the monitoring device holds user contact details for each code.
- the equipment transmits this code when the security alarm is activated, so that the user of the equipment may be determined and contacted.
- the system includes means for determining the location of the equipment. If the equipment has been stolen, it is therefore more likely to be recovered.
- the device further includes means for determining the type of security breach which has occurred. This may also be identified to the user.
- the invention further provides a method of monitoring a security device in equipment, the method comprising, receiving a notification from the equipment indicating that a security breach has occurred, and sending a notification that the breach has occurred.
- the method further includes the step of determining contact details for the equipment and sending a notification, the notification including an indication of at least one of the security breach which has occurred, and the location of the equipment.
- the step of determining the contact details preferably includes looking up in a database the user details for the equipment.
- the invention further provides a computer memory product having stored thereon a digital data file, said memory product comprising a computer readable memory a data file including contact details and a digital data portion comprising a program for receiving a notification from equipment indicating that a security breach has occurred, determining the contact details for the equipment and sending a notification regarding the security breach.
- the first aspect of the present invention is concerned with security devices and systems which enable the unauthorised removal of, and/or access to, various items of equipment to be prevented or at least monitored.
- the invention is concerned with providing a signal, when an unauthorised event, such as theft of an item of equipment, has occurred, which can be used not only to indicate that occurrence but also to provide a means of tracking the item.
- a further aspect of the invention provides a method of determining the location of a computer, the method including the steps of receiving a notification from the computer of its location; receiving an identifying code from the computer and determining details of the computer from the identifying code.
- the method further includes sending information to the computer on the basis of its location.
- the user may be sent information about where he is.
- the equipment may be sent instructions, for example regarding how often the alarm signals should be sent. Fewer could be sent if the equipment is stationary, thus conserving battery power, where appropriate.
- the method further comprises determining when the computer enters a new location, and sending information on the basis of the new location.
- the frequency of signals emitted can be changed depending on whether the equipment is in a built up area or on open ground.
- the method further includes sending information to a third party regarding the location of the computer.
- the user's location may be sent to emergency services.
- a map showing the user's location may be set to the third party.
- the request for spare parts may be sent to the relevant company together with an indication of the location of the user.
- this feature may only activated by an authorised user of the computer.
- the invention also provides a method substantially as described herein with reference to the accompanying drawings, and apparatus substantially as described herein with reference to and as illustrated in the accompanying drawings.
- the invention also provides a computer program and a computer program product for carrying out any of the methods described herein, and a computer readable medium having stored thereon a program for carrying out any of the methods described herein.
- the invention also provides a signal embodying a computer program for carrying out any of the methods described herein, a method of transmitting such a signal, and a computer product having an operating system which supports a computer program for carrying out any of the methods described herein.
- a further aspect of the invention provides a self setting, set self configuring security device for a computer comprising tampering, power disruption or disconnection and unauthorised access detecting means control (by way of computer software written to a computers BIOS and/or the device's ROM chip) means coupled to the detecting means (by way of contact switches and or photoelectric cell, power fluctuation module, software password authentication) a power unit (by way of a rechargeable and replaceable battery unit and directly from the computers DC power supply) a triggered signal generator and digital code identification (by way of a GSM transmission chipset) which is coupled to the detecting means and which transmits a GSM digital coded security alert signal and a digital identification code under the control of the control means and in response to a signal from the detecting means.
- the detecting means comprises a power fluctuation module, which detects when power to a computer is removed.
- control means comprises ROM and/or BIOS based password protection software and is configured, activated and deactivated by means of a password or other form of identification input to the computer. Designed to activate the device if an incorrect password is entered consecutively a predetermined number of times.
- the device is incorporated in the manufacture of a computers motherboard or on a bus or expansion card and is adapted to be connected to a computer by means of an edge connector of the card.
- the power unit comprises a) a rechargeable and replaceable battery module adapted to be charged from the power supply of a computer, b) a live connection into the DC power source of the computer's motherboard/power system.
- the detecting means comprises a detector, which is adapted to detect (either from light intrusion or the make/breaking of a contact switch) when the casing of a computer is opened or tampered with.
- the invention also provides a computer having a security device as described above.
- the present invention is concerned with security devices and systems which enable the unauthorised removal of, and/or access to, various items of equipment to be prevented or at least monitored.
- the invention provides a deterrent against unauthorised removal of an item of computer equipment by signalling over the GSM (Global System for Mobile Communication) network to a control centre which, because of the cellular nature of the network, can track the whereabouts of the item.
- GSM Global System for Mobile Communication
- the security system of the present invention can use the GPS (Global Positioning System) to track the item.
- GPS Global Positioning System
- Other means of communication are also contemplated by the invention.
- Figure 1 shows a notebook computer in a typical cellular network
- Figure 2 shows a circuit card for incorporation in a computer
- Figure 3 shows a log-on/registration screen
- Figure 4 is a flow diagram for the operation of the security system.
- GSM communication system with which the security system of the present invention is particularly suited, is that known under the trade mark CURSOR.
- CURSOR Cambridge Positioning Systems Limited
- the CURSOR radio navigation and tracking system is described in European Patent No EP-B-0 303 371.
- the system uses spatial coherence of the signals from several transmitters to determine the position of a roving receiver.
- the phase difference between signals received directly from the roving receiver and those received from a fixed base station whose location is known is utilised to determine the difference in range of the base and roving receiver from each transmitter.
- Three such measurements are needed from three separate transmitters to enable navigation and tracking in two dimensions so as to fix the position of the roving receiver relative to the base station and the transmitters.
- the unknown quantities calculated for each new position are the orthogonal spatial co-ordinates in two dimensions together with the phase offset between the local oscillators in the equipment making up the receivers.
- EP-B-0 303 371 also extends to the use of the time difference, as opposed to phase difference, between the signals received at the base station and transmitters. This is a direct result of the use of wide band signals from modulated transmissions. In this case, the position of the peak in the cross- correlation of the received signals can be used to estimate the time difference between the two received signals and hence the difference in distance from the base and roving stations. Three measurements made on widely-spaced transmitters are enough to calculate the spatial co-ordinates of the roving station together with the time offset between the oscillators in the two receiving stations.
- CURSOR does not need any additional costly infrastructure of coherent radio transmitters; it is capable of using the signals from any independent radio transmitters set up for any purpose.
- CURSOR is implemented by a software modification during the production of mobile telephone handsets and can be implemented within a mobile telephone network using a minimum overlay of ancillary equipment.
- An additional feature of the CPS system which makes it particularly attractive for use in the context of the present invention is that packets of data from the last three cells passed by the roving receiver are transmitted to the network, thereby providing a recent movement history and simultaneously ensuring that the mobile receiver is constantly logged on to the system.
- the application relates to a security device and, more particularly (but not exclusively) to a device for protecting the security of a Computer Network, Network server, Computer terminal, Notebook/Laptop Personal Computer or Power PC.
- "computer” will be used as a generic term for devices having a processing capability including, but not restricted to PC's, workstations, Network servers, Networks, Power PC, Macintosh, Unix, notebook or laptop, PDA, mobile telephone, for example a WAP phone, terminals, desktop computer, mainframe/midframe computer, and the like.
- the computer may be part of another article, for example a car or other vehicle.
- Computers, their components and software, are valuable items and are prone to theft. This is more so because, computer casings/chassis are easily opened and the internal components are designed/specified to be easily removed by hand and without damage to these components. There is, therefore, a need for an effective security and tracking device for protecting Computers from theft or tampering.
- the device has been devised to be built into new Computers during the manufacturing process, being integrated within the motherboard as part of the overall design and operating system. Furthermore, the device has been devised to be manufactured as an additional appliance to fit into pre manufactured Computers, this being as an accessory, fitted via an expansion appliance designed/specified to fit into the standard ISA or PCI, PDS and PCMCIA expansion slots/or similar that are an integral design feature of computer motherboards and chassis (see Figure 2).
- the device provides a security device for a computer comprising detecting means, control means coupled to the detecting means, a power unit and a signal generator which is coupled to the control means and which transmits a GSM Cellphone security alert signal under the control of the control means and in response to a signal from the detecting means.
- the device is designed/specified to be active at all times unless temporarily and specifically operator deactivated for maintenance or similar.
- the control means comprise ROM and BIOS based password protection software and the device is activated and deactivated by means of a password. In this way hardware, software and hardware components or other information can be security protected.
- This device mechanism software will allow the operator to designate a security code into the computer operating system for the device de-activation and software default settings, this being designed/ specified to be protected by a pre set number of attempts to enter the security code correctly. Failure to disable after the pre set security code attempts (software defaults) have expired will activate the GSM signal generator.
- the device software default is designed/specified to automatically activate the device once connected.
- the device can via password authentication, be, de-activated temporarily for maintenance etc, but upon re-connection to a electricity supply and the re-starting of the computer the device will automatically be reconfigured to an active state.
- the device contains a power fluctuation module, which detects when power to a computer is removed. The removal of the main power source will activate the alert signal unless being operator disabled prior to power disconnection.
- the device incorporates a rechargeable internal battery to activate the GSM alert signal independently from the computer power source.
- the power unit comprises, a replaceable battery module adapted to be charged from a power supply of a computer.
- the device has its own power supply in the form of the battery and can, therefore, emit the GSM alert signal for an extended period of time.
- the GSM alert signal is delivered via an integrated chipset within the device. This chipset design is to be specified/supplied from an existing external Cellphone GSM service supplier to comply with the selected monitoring/cell GSM system applications and device monitoring contracts that are agreed at the time of manufacture of the device (see below).
- G. The alert signal is delivered via the Cellphone GSM chipset by a continual signal emitting a digital coded identity of the device.
- the signal and chipset are designed/specified to log into the world-wide Cellphone GSM system, which has localised individual cells that will identify the emitted signal location.
- the emitted GSM signal code will be identified from a database, which will be built to hold the exclusive ERN security identity code numbers of each device. It is this code that is emitted from an activated device.
- the purchaser of each device will be required to file an application form to register the device and the host computer identity/type and serial no etc on this database, thus giving the required information that is needed for the devices code tracking and devices host computer ownership for any recovery.
- the device contains a photoelectric, light sensitive cell/and or a contact switch, which detects when there is light intrusion within the casings/chassis or when internal contact switches are activated from the case of a computer being opened.
- the device will need to be de-activated via the software system prior to opening such computer casings. Failure to de-activate prior to opening will cause the photoelectric, light sensitive cell/and or a Contact switch to activate the GSM alarm signal.
- the device is designed/ specified so that an integrated device can be incorporated within the manufacture processes of a computer motherboard design and layout.
- the device is designed/specified so that the application and functionality can be manufactured on a bus o expansion-card (whether ISA or PCI, PDS and PCMCIA expansion slots/or similar that are an integral design feature of computer motherboards and chassis), and is adapted to be connected to a computer by means of an edge connector of the card. This being manufactured as a computer accessory.
- a bus o expansion-card whether ISA or PCI, PDS and PCMCIA expansion slots/or similar that are an integral design feature of computer motherboards and chassis
- the embodiment of the device shown in Figure 2 is in the form of an expansion card for a Computer and can be slotted into the expansion ports inside the casing by means of the edge connector.
- the components on the card are, inter alia: i. Edge connector, ii. Power fluctuation module, iii. ROM software chip, (see below) iv. Battery power unit, v. A GSM signal generator, (see below) vi. Contact switch vii. Photoelectric cell viii GSM aerial (cellular telephone system aerial)
- the power fluctuation module (ii) receives DC power from the power supply of a computer and distributes power to the ROM software chip (iii) and also to the battery unit (iv) so as to maintain the battery in a charged state.
- the battery unit (iv) provides energy for the signal generator (v) and any other components of the security device, which are required to be operational when power is withdrawn from the computer.
- the power fluctuation module (and such related software) (ii) whereupon the control software stored on the ROM software chip (iii) operates the battery unit (iv) to supply power to the signal generator (v) an alert signal is emitted.
- the GSM signal generator (v) emits a GSM radio signal to one of the cellular networks.
- the alert signal typically comprising an digital identification number is transmitted to the local cell site and the cell operator will then digitally notify a central monitoring station which will in turn notify the police/authorities as to the location of that particular computer which incorporates/houses the device. If the computer is then moved, its position can be traced by means of the cellular system.
- an operator configures the system entering a personal password. This password will be entered prior/during the bios checking sequence on start up/boot and prior to any operating system or hard disc start-up.
- the supervisor password is only configured once. Up to 2 user passwords containing differing and configurable access/configuring changing rights.
- a user may enter a password to log on to a network or his personal computer and the same password may be recognised by the device's password protection software stored in the software chip (iii), which authenticates the user to the device so that the operator may use the computer without disruption.
- the computer can be switched off, if left running, the device is still active for power fluctuation, and tampering of any casings or chassis. If the computer is switched off, upon restarting, the software will again request the password authentication prior to the start up of any computer boot-up sequences
- An example of this possible software interface is demonstrated in Figure 3.
- the password protection software (whilst the computer is intact) can be used to protect any information stored on the hard disc (as referred above) of a computer or information accessible from that computer. If an incorrect password is entered, or if an incorrect password is entered consecutively a predetermined number of times, the password protection software is configured to stop the computer from completing its start up sequence and operate the signal generator (v) to emit the GSM alert signal.
- the battery module is designed to (A) recharge itself after total discharge and reconnection to a power source. (B) The device is furthermore designed to re-emit its GSM signal once discharged and reconnected to a power source.
- the battery is designed to be periodically replaced with a specifically designed re-pluggable unit. This battery unit if disconnected without prior supervisor password de-activation will automatically, by default activate the GSM signal once power is fed into the computer.
- the use of the expansion board allows the device to be sold as an add-on accessory for existing computers.
- the device is not limited to such; however, as the device can easily be built into new Computers by suitably modifying the production of the motherboard.
- the device may use any convenient alert signal generator, (possibly audible, possibly digital).
- additional detectors may be used to provide security to the hardware and software. Specifically a detector, such as a micro Contact switch, may be provided to activate the device if any attempt is made to open the casing of the computer.
- ancillary hardware accessories attached to the computer system, (via the computer operation system software having the capability of recognising any accessory disconnection or infra red transmission on some computer systems).
- the device will be configured to request an operator password input, upon such disconnection to enable the de-activation of any GSM alarm signal being associated with the removal of such hardware.
- a security device for a computer capable of detecting when the computer is tampered with, unauthorised access or removed from its power source and which transmits a GSM security alert signal in the event of an attempt to steal or tamper or gain unauthorised access the computer.
- the device is typically incorporated on a motherboard or bus/expansion card which is fitted to a computer by means of an edge connector (i).
- the device comprises detecting means (ii)(iii)(vi)(vii), control means (iii), a power unit (iv) and a GSM signal generator (v) which transmits a security GSM digital identity and alert signal under the control of the control means and in response to a signal from the detecting means.
- the GSM telephony and signalling will be (typically) delivered by a typical chipset for GSM telephone signalling.
- the ADSP-2178 ASP is an application-specific variant of Analog Devices' standard ADSP-2171 DSP. It has been optimised to meet the cost, size and power consumption requirements of GSM. All necessary memory to run GSM-specific programs resides on-chip, so there is no need for external memory.
- the ADSP-2178 implements full-rate speech transcoding according to GSM specifications, including discontinuous transmission (DTX) and comfort noise insertion (CNI).
- DTX discontinuous transmission
- CNI comfort noise insertion
- the ASP contains an embedded high-performance software-based soft-decision Viterbi equaliser. The device is delivered fully ROM-coded and therefore requires no user-generated programming.
- a typical chipset for ROM to house embedded software would include:
- CMOS Organisation 65536 words x8-bit, access time 120ns max, Program voltage 12.75V. 28 pin dil ceramic package.
- BUS Bus interface is the data path integrated into a computer's main logic board
- FIG. 1 illustrates schematically a notebook computer 10 fitted with a security device as part of a security/tracking system within the framework of the present invention.
- the computer 10 has software and/or hardware designed to initiate a signalling sequence which is transmitted 14 to a local transmit/receive centre 16 of a GSM network cell, indicated generally at 18.
- the centre 16 is in communication 20 with other centres 22,24 of adjacent cells 26,28 and so on.
- receipt of a signal at centre 16 initiates a procedure, which will be described in more detail later, by which the system as a whole can be made aware of the theft of, for example, unauthorised access to, or tampering with, the notebook 10.
- the computer If any one or more of these events should occur, the computer emits an initial signal identifying itself to the nearest centre in the relevant cell. An interchange of information between that centre and the computer will authenticate the identity of the computer and confirm its presence in the corresponding cell 18.
- a navigation system such as CURSOR would then begin to process the signals received from the cellular network. Within moments, the system will have pinpointed the location of the notebook to within 5m to 50m, depending on the accuracy of the system employed.
- the present invention can employ any other suitable position determining and/or navigation system, such as a suitable global positioning system (GPS) which is capable of locating a terrestrial object to the desired accuracy.
- GPS global positioning system
- the management of the network would then be able to alert the relevant authority, for example the police, that a certain item of equipment, in a specific location, belonging to an identified subscriber had emitted an alarm for a specific reason, for example tamper, theft, unauthorised access. It may be preferable, before the alert is given, that the system management carries out one or more confirmatory checks. For example, there could be interrogation of the notebook in order to ensure that the alarm signal was intentional. There could alternatively or additionally be a need for the owner to be contacted to ensure that removal of the notebook from its determined location was indeed unauthorised.
- the notebook itself may be sent a message inviting the current "user” to confirm a password, PIN number or other ID, in case the alarm signal had been initiated by an unintentional action on behalf of the owner which he or she would then be able to cancel before a full alert was actioned.
- Initiation of the alarm signal can be effected in a variety of ways. Perhaps the simplest is a mechanical switch that detects the opening of the notebook. However, because of its simplicity it may be relatively easily defeated. It is preferable then to use more discreet sensors which may not be expected by the would-be thief. For example, a light sensor may be built into the casing of the notebook so that, when exposed to higher ambient illumination upon opening the case, the alarm signal is initiated. Circuitry may additionally or alternatively be included which monitors the power being delivered to the notebook. Once the authorised user has logged off the notebook and the system has been "primed", any unauthorised powering up of the notebook would be detected by the circuitry and the alarm signal initiated.
- the sound card and/or the loudspeaker(s) may be muted so that the next time the notebook is powered-up, the unauthorised user would be unaware that the notebook was making a connection to the network for the purpose of initiating an alert.
- the keying in of a PIN code, password or other ID is an essential prerequisite for being able to power-up or bootup the laptop.
- the notebook would need to be constructed or the operating software so designed that the user must go through this routine before the boot sequence is enabled.
- movement and/or acceleration detector(s) could be employed to detect and signal unauthorised movement.
- one or more simple mechamcal switches for example located on the underside of the casing, to be operated by lifting the casing from the position it occupied when the system was primed.
- Figure 2 shows a circuit card that can be installed in otherwise conventional computer equipment. It comprises a circuit board 30 having an edge connector 32 enabling the card to be plugged into an expansion slot in a computer.
- the board 30 also carries circuit elements, components and integrated circuit (IC) chips performing various functions as will become apparent.
- the board carries an aerial 34 which, in the preferred embodiment, is of the kind compatible with a GSM network, such as in the CURSOR system.
- circuit modules including a rechargeable battery unit 36, a software chip 38, a photoelectric cell 40, a power fluctuation module 42, a GSM signal generator 44 and a contact switch 46.
- the modules are interconnected by traces such as 50 printed or otherwise created on the board 30 in conventional manner.
- the rechargeable battery unit, or power supply module 36 receives power from connections within the computer to maintain the battery topped-up.
- the security device is thus always capable of responding to an unauthorised event.
- the power module 36 supplies voltage and current to the other modules etc on the board.
- the software chip 38 is pre-loaded with the software necessary for the security device to operate.
- the chip is preferably a write once ROM device with the program data burnt in, in the usual manner.
- the data will provide the interface between the computer and the GSM network.
- a back-up battery (not shown) may be included in the chip to guard against total power failure or unauthorised removal of the battery pack.
- any or all of the modules making up the circuit card could be "hidden” among modules, components or elements of circuit cards designed to perform other functions within the computer.
- any one or more of a selection of detectors may be employed in the computer.
- a photoelectric cell module 40 acts as the light-sensitive detector
- the power fluctuation module 42 detects unauthorised power variations within the computer
- a contact switch 46 is operative to detect unauthorised removal of the card from the computer in which it is installed.
- the power monitoring feature may be implemented by detecting the voltage level either of the nominal 12v supply or of the computer bus.
- GSM generator 44 Centrally located on the card 30 is a GSM generator 44 whose function is to enable signals produced by the various detectors on the card or connected to the card but forming part of the computer, to be modulated onto a carrier for transmission to any of the centres in network cells forming part of the GSM system.
- the generator will clearly be connected, for example over traces such as 50, to the aerial 34 for the transmission of appropriate alarm-related signals (caller ID, password codes etc) and reception of signals (interrogation, confirmation etc) from the network itself.
- an initial "welcome" screen may be presented to the user and/or the network Supervisor the first time the subscriber logs onto the security system.
- the requirements for passwords and repetition of those passwords is self-evident from the Figure itself and follows standard, accepted procedure for registering a subscriber to a system. It is worth noting the box in the bottom right hand corner of the screen, marked “Temporarily Disable”. This is a facility built into the system to allow the computer to be "disconnected" from the system for maintenance or other measures, for example replacing a rechargeable battery module.
- the use of the subscriber password is a valuable additional feature of the invention since it only allows the person registered to use the particular computer to boot up and gain access to the information and/or the network via that computer.
- the user password may be burnt into the ROM on board the circuit card and any additional software necessary to complete the registration process can be downloaded via the subscriber's Internet access.
- Installed in the computer is a chipset using GSM Technology. This is registered with a central station via software supplied and set up on the computer both on the hard disk and ROM based (software that is embedded onto the chip).
- the software has three different levels of password protection
- Passwords are to enable or disable the device and/or to be able to turn some features on or of as listed in the table below. These features can be enhanced or added to.
- the software comprises three main parts.
- the first part sets up the supervisor, manager and user passwords.
- the second part sets up the features of the unit, for example whether it should monitor for light sensitivity or not, whether it should monitor for power fluctuation or not, whether there is an audible sound when activated or a silent alarm, and whether the 5user would like a voice message to his telephone or an SMS (small message service) text message to his mobile if there is a detected security breach.
- the third part of the software links into an Internet connection and connects the user to a dedicated website. He will then be asked to fill out a form on line to license, register and lOenable the tracking system via the GSM device.
- the software will link all the components for monitoring on the computer or external to a central program that will check that all aspects are working correctly. All aspects of the security device switch on or off. When the system is armed, all the parts of the switch are in the on position. When the user logs on to the computer using his password he switches off the monitoring components. If one
- the passwords will be saved on the product. The checking of the password is built into the start-up sequence of the system. Before the user boots to an operating system, he will be asked to enter his password or login. The computer will not boot unless the correct password is entered. If the user fails to type the correct password three times, after the third attempt the security device will send its signal to its monitoring station. 5
- the software is preferably flash-upgradable.
- the input to the flow diagram represents a decision by the user to power-up the computer.
- the first line of the security system requires the user to enter at step 400 a code, password, PIN code or the like to enable a pre-boot subroutine 402 to be completed before the computer is permitted to boot-up 404.
- the software in the computer for example as part of that included in the add-on circuit card previously described, could permit certain keys of the computer keyboard to be allocated to this function.
- the user is given a set number 5 of tries within which to enter the correct code. This is counted at 406. If entry is unsuccessful, the counter times out for a preset time period, for example one hour, before allowing the user a further attempt. It could then be arranged that after a second round of attempts the system includes a facility 408 to initiate the alarm sequence.
- the system described so far prevents an unauthorised user from booting-up the computer and thereby lOgaining access to information saved on the hard disk.
- the computer 410 is operational and can be used as normal.
- the computer may establish a connection with the GSM network 414 by means of a conventional handshake protocol as shown at 412. This involves 15the network and the computer establishing the identity of the subscriber and/or the computer and confirming that the user is an authorised subscriber, entitled to the service offered by the provider. It is also possible that the system could be configured to carry out a position determination step 430 as part of the handshake.
- the computer is equipped with event detection means as previously mentioned. Sensors or detectors 418, 420, 422 and so on, for example a photocell, mechanical switch(es), or movement (locally or geographically), are coupled into an event detector 416 which initiates activation of the GSM generator module 424 such as provided on the circuit card described in Figure 2.
- the signal thus generated is carried to the aerial 426 for transmission to a 5network cell centre such as 428 which will relay the signal to the GSM network management 414.
- the system may activate a further checking routine back over the same path in order to interrogate the computer and/or the user in an attempt to verify whether the signalled alarm status was genuine and was not a false alarm.
- the network management will then, automatically or manually, issue a signal to alert the authorities and/or the genuine owner that the detected event is, as far as can be verified, genuine.
- the computer and the network will remain in a continual state of communication from then on as the network continues to determine the position of the computer. In this way, the path of the computer can be "tracked" in its unauthorised route, regardless of how many cells it passes through. Assuming the different Network Service Providers are willing to cooperate, it is also possible for communication to be established cross-network. This can be 5particularly valuable where, for instance, coverage by one NSP is more comprehensive in one geographical are than another. If so, the networks and/or the software built into the circuit card, can be augmented by additional software which will enable the computer to select which NSP to signal to and/or will monitor GSM signal strength and automatically switch to a different NSP if the GSM signal falls below a preselected or adaptive threshold.
- lOThe system could also shut down some of the services offered to the user/computer so as to deny the unauthorised user access to any information that the genuine user may have associated with the computer and/or the GSM network, such as personal or account details, or may signal the alarm if access is sought to areas of the computer protected by the password.
- the position determining process may be iterative so as to improve resolution with successive sweeps.
- resolution can be narrowed down from 500m to 5m in a minimal number of iterations.
- the invention has been described primarily in connection with the GSM network, the principles of its operation are equally appropriate for the GPS system or any other Global navigation, position-finding or like system. Further, the protection/deterrent aspects of the invention have a wider applicability than simply protection of computers and computer-like equipment. There can be particular sensitivity in a whole host of other types 0of personal belongings or domestic or other apparatus. Car theft is a multi-million pound "business".
- the present invention can be applied to vehicles or other modes of transport, including road, rail, sea and air transport. Successful operation of the security system is not reliant on the device-to-be-protected being a computer per se.
- the preferable requirements are that the item in question should be capable of being associated with a means of transmitting identification signals over a communications network in such a manner that the identity of the item and its position can be determined.
- each item could incorporate a unit unique to that item which is designed to transmit signals along the power cord so as to couple into the local or national power system. Suitable receiving stations would then need to be connected to the power network in such a way as to be able to pick up and decode the alarm signals.
- the unit associated with the item could continue to signal over a communication system that was not tied to land.
- the items in question could be coupled to a single unit in the premises which could signal over the GSM and/or GPS systems.
- the system would not be capable of tracking a stolen item but could still guard against tampering of the items and/or unauthorised access to the items or to premises in which the items are located. It is also possible for the system to alert the authorities to a fire, flood or other peril.
- Features which relate to the storage of information may be implemented by suitable memory locations or stores.
- Features which relate to the processing of information may be implemented by a suitable processor or control means, either in software or in hardware or lOin a combination of the two.
- the invention may be embodied in any, some or all of the following forms: it may be embodied in a method of operating a computer system; it may be embodied in the computer system itself; it may be embodied in a computer system 15 when programmed with or adapted or arranged to execute the method of operating that system; and/or it may be embodied in a computer-readable storage medium having a program recorded thereon which is adapted to operate according to the method of operating the system.
- computer system may be interchanged for "computer”, “system”, “equipment”, “apparatus”, “machine” and like terms.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Alarm Systems (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU55559/00A AU5555900A (en) | 1999-06-25 | 2000-06-23 | Security device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB9914798.5A GB9914798D0 (en) | 1999-06-25 | 1999-06-25 | Ensure |
GB9914798.5 | 1999-06-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001001362A1 true WO2001001362A1 (fr) | 2001-01-04 |
Family
ID=10855996
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2000/002490 WO2001001362A1 (fr) | 1999-06-25 | 2000-06-23 | Dispositif de securite |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU5555900A (fr) |
GB (1) | GB9914798D0 (fr) |
WO (1) | WO2001001362A1 (fr) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1239358A2 (fr) * | 2001-02-15 | 2002-09-11 | International Business Machines Corporation | Système de sécurité pour empêcher le vol et l'utilisation d'un ordinateur personnel de la part d'une personne non autorisée |
WO2003071546A1 (fr) * | 2002-02-19 | 2003-08-28 | Oded Melinek | Computer alarm |
US7228430B2 (en) | 2001-01-11 | 2007-06-05 | Lenovo Singapore Pte. Ltd | Security system for preventing a personal computer from being used by an unauthorized people |
US7367063B1 (en) * | 2002-09-17 | 2008-04-29 | Cisco Technology, Inc. | Methods and apparatus for providing security to a computerized device |
WO2008148220A1 (fr) * | 2007-06-08 | 2008-12-11 | Guard Rfid Solutions Inc. | Procédé et système pour déterminer l'altération d'une étiquette rfid |
CN102663307A (zh) * | 2012-05-04 | 2012-09-12 | 崔华 | 设置有防偷拍、防窃听装置的电脑及办公设备 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1996003728A1 (fr) * | 1994-07-21 | 1996-02-08 | Baljit Singh Kang | Protection renforcee destinee a des appareils electriques |
GB2303173A (en) * | 1995-07-11 | 1997-02-12 | Clive Robert Homewood | Computer Security Module |
US5675321A (en) * | 1995-11-29 | 1997-10-07 | Mcbride; Randall C. | Personal computer security system |
US5748084A (en) * | 1996-11-18 | 1998-05-05 | Isikoff; Jeremy M. | Device security system |
-
1999
- 1999-06-25 GB GBGB9914798.5A patent/GB9914798D0/en not_active Ceased
-
2000
- 2000-06-23 WO PCT/GB2000/002490 patent/WO2001001362A1/fr active Application Filing
- 2000-06-23 AU AU55559/00A patent/AU5555900A/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1996003728A1 (fr) * | 1994-07-21 | 1996-02-08 | Baljit Singh Kang | Protection renforcee destinee a des appareils electriques |
GB2303173A (en) * | 1995-07-11 | 1997-02-12 | Clive Robert Homewood | Computer Security Module |
US5675321A (en) * | 1995-11-29 | 1997-10-07 | Mcbride; Randall C. | Personal computer security system |
US5748084A (en) * | 1996-11-18 | 1998-05-05 | Isikoff; Jeremy M. | Device security system |
Non-Patent Citations (1)
Title |
---|
READE L: "KEEPING TRACK OF YOUR LAPTOP. PCS AND LAPTOPS ARE VERY EASY TO STEAL. BUT AN ANTI THEFT DEVICE, BASED ON A RADIO PAGER, MAY CHANGE ALL THAT", NEW ELECTRONICS,GB,INTERNATIONAL THOMSON PUBLISHING, LONDON, vol. 29, no. 17, 8 October 1996 (1996-10-08), pages 91, XP000631399, ISSN: 0047-9624 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7228430B2 (en) | 2001-01-11 | 2007-06-05 | Lenovo Singapore Pte. Ltd | Security system for preventing a personal computer from being used by an unauthorized people |
EP1239358A2 (fr) * | 2001-02-15 | 2002-09-11 | International Business Machines Corporation | Système de sécurité pour empêcher le vol et l'utilisation d'un ordinateur personnel de la part d'une personne non autorisée |
EP1239358A3 (fr) * | 2001-02-15 | 2003-06-11 | International Business Machines Corporation | Système de sécurité pour empêcher le vol et l'utilisation d'un ordinateur personnel de la part d'une personne non autorisée |
WO2003071546A1 (fr) * | 2002-02-19 | 2003-08-28 | Oded Melinek | Computer alarm |
US7367063B1 (en) * | 2002-09-17 | 2008-04-29 | Cisco Technology, Inc. | Methods and apparatus for providing security to a computerized device |
WO2008148220A1 (fr) * | 2007-06-08 | 2008-12-11 | Guard Rfid Solutions Inc. | Procédé et système pour déterminer l'altération d'une étiquette rfid |
GB2462964A (en) * | 2007-06-08 | 2010-03-03 | Guard Rfid Solutions Inc | Method and system for determining RFID tag tampering |
GB2462964B (en) * | 2007-06-08 | 2012-09-05 | Guard Rfid Solutions Inc | Method and system for determining RFID tag tampering |
CN102663307A (zh) * | 2012-05-04 | 2012-09-12 | 崔华 | 设置有防偷拍、防窃听装置的电脑及办公设备 |
Also Published As
Publication number | Publication date |
---|---|
GB9914798D0 (en) | 1999-08-25 |
AU5555900A (en) | 2001-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10134265B2 (en) | Portable alarm system with self-monitoring sensor | |
US9821767B2 (en) | Key module | |
CN102089764B (zh) | 具有与主代理配合的辅助代理的安全模块 | |
US5748084A (en) | Device security system | |
US7355506B2 (en) | Systems and methods for deterring theft of electronic devices | |
US8902066B2 (en) | Alert for real-time risk of theft or loss | |
RU2516706C2 (ru) | Cистема слежения за трекерами, способ наблюдения и охраны подвижных объектов и устройств контроля местонахождения объекта | |
JP5001380B2 (ja) | ワイヤレス通信デバイスをロケーティングし、追跡し、および/または回復する装置および方法 | |
US20100273452A1 (en) | Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device | |
US20050149752A1 (en) | System and method for tracking laptop computers | |
KR101764650B1 (ko) | 스마트 기기의 도난 방지 장치 | |
US20070018843A1 (en) | Anti-theft system and apparatus and method for selectively disabling/enabling electrical apparatus | |
US20080256648A1 (en) | Secure portable computer and security method | |
CN101510323A (zh) | 运用无线射频识别的门禁系统及其方法 | |
EP1554703B1 (fr) | Balise de securite sans fil pour equipement client | |
WO2001001362A1 (fr) | Dispositif de securite | |
CN102438263A (zh) | 一种带具有语音报警功能的无线路由器 | |
CN1404703A (zh) | 根据位置保护移动电子装置的方法和装置 | |
CN103945325A (zh) | 基于J2EE及Android平台的手机防盗与跟踪系统 | |
JP2007528039A (ja) | 電子装置保護方法 | |
WO2017111962A1 (fr) | Système et procédé pour sécuriser un dispositif électronique en cas de faible puissance et après changement de matériel | |
US7135969B2 (en) | Theft deterrent for home appliances | |
GB2584803A (en) | Key module | |
JP2003304580A (ja) | 通信端末 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |