US20020188866A1 - Method and apparatus for protecting a device connected to a newtwork - Google Patents
Method and apparatus for protecting a device connected to a newtwork Download PDFInfo
- Publication number
- US20020188866A1 US20020188866A1 US09/876,568 US87656801A US2002188866A1 US 20020188866 A1 US20020188866 A1 US 20020188866A1 US 87656801 A US87656801 A US 87656801A US 2002188866 A1 US2002188866 A1 US 2002188866A1
- Authority
- US
- United States
- Prior art keywords
- network connection
- network
- alarm
- processor
- disconnected
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000012544 monitoring process Methods 0.000 claims description 12
- 230000015654 memory Effects 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 8
- 238000004519 manufacturing process Methods 0.000 claims description 2
- 230000008569 process Effects 0.000 abstract description 24
- 230000007246 mechanism Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1409—Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
- G08B13/1418—Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0811—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
Definitions
- the present invention relates generally to computer security techniques, and more particularly, to methods and apparatus for preventing the removal of a portable computer connected to a network.
- a number of mechanical techniques have been proposed to prevent the theft of such devices. For example, a number of physical locks are commercially available that allow a user to secure a laptop or another device. Such hardware solutions, however, require the user to carry around additional hardware and increase the size and weight of the portable device. A need therefore exists for a mechanism to prevent the theft of a portable device that does not require the user to carry around additional hardware. A further need exists for a software-based mechanism to prevent theft of a portable device. Yet another need exists for a method and apparatus for preventing theft of a portable device that does not increase the size or weight of the portable device.
- a method and apparatus for detecting the removal of a device connected to a network.
- the present invention generates an alarm on a protected device when an unauthorized user disconnects the device from a network connection.
- a theft protection utility process monitors the network connection and generates an alarm if the protected device is disconnected from the network connection without proper notification to the theft protection utility process.
- the present invention optionally incorporates a number of fail-safe features that ensure that the theft protection aspects of the present invention cannot be bypassed.
- the theft protection utility process of the present invention can employ speaker, volume and/or power control features to ensure that the alarms generated by the present invention, or the theft protection feature itself, cannot be bypassed.
- FIG. 1 illustrates an exemplary network environment in which the present invention can operate
- FIG. 2 is a sample table from the authorized user database maintained by the central theft protection server of FIG. 1;
- FIG. 3 is a flow chart describing an exemplary theft protection utility process incorporating features of the present invention and implemented by the user computer device of FIG. 1.
- FIG. 1 illustrates a network environment 100 in which the present invention can operate.
- a user computing device 110 is connected over a network 100 to one or more servers 120 .
- an alarm on the user computing device 110 is automatically triggered when the device is disconnected from a network connection by an unauthorized user.
- the user computing device 110 is only one example of a device that may be protected using the present invention.
- the present invention may be employed to prevent the unauthorized removal of any device having a connection to a network, as would be apparent to a person of ordinary skill in the art based on the disclosure herein.
- the user computing device 110 may be embodied, for example, as any device that can be connected to a network 100 , such as a portable computer, workstation or personal digital assistant (PDA).
- the network 100 may be embodied as any wired or wireless local or wide area network (LAN or WAN, respectively), including the Public Switched Telephone Network (PSTN), a corporate intranet or the Internet (World Wide Web), or any combination of the foregoing.
- PSTN Public Switched Telephone Network
- the network 100 may be embodied as a cable network, an optical network or a digital satellite service (DSS) network for distributing media content.
- DSS digital satellite service
- the user computing device 110 may be embodied, for example, as a set-top terminal, cable-enabled media player (e.g., a television) or another decryption device.
- the user computing device 110 communicates with a special-purpose central theft protection server 120 over the network 100 .
- the functions performed by the central theft protection server 120 in accordance with the present invention can be performed by any server or computer connected to a network, as would be apparent to a person of ordinary skill in the art based on the disclosure herein.
- the memory of the central theft protection server 120 includes an authorized user database 200 , discussed below in conjunction with FIG. 2.
- the authorized user database 200 identifies each authorized user of the network 100 and provides a corresponding password that may be utilized in various embodiments of the present invention to prevent theft of the user computing device 110 .
- the memory of the user computing device 110 includes a theft protection utility process 300 , discussed below in conjunction with FIG. 3.
- the user computing device 110 employs the theft protection utility process 300 to monitor the network connection and generate an alarm if the user computing device 110 is disconnected from the network connection without proper notification to the theft protection utility process 300 .
- FIG. 2 is a sample table from the authorized user database 200 maintained by the central theft protection server 120 of FIG. 1.
- the authorized user database 200 identifies each authorized user of the network 100 and provides a corresponding password that may be utilized in various embodiments of the present invention to prevent theft of the user computing device 110 .
- the authorized user database 200 includes a plurality of records 205 - 220 , each associated with a different authorized user.
- the authorized user database 200 indicates the user's password in field 255 . In this manner, when the user attempts to remove the user computing device 110 from the network connection, the user can optionally be prompted by the central theft protection server 120 to enter a password.
- FIG. 3 is a flow chart describing an exemplary theft protection utility process 300 incorporating features of the present invention.
- the user computing device 110 employs the theft protection utility process 300 to monitor the network connection and generate an alarm if the user computing device 110 is disconnected from the network connection without proper notification to the theft protection utility process 300 .
- the theft protection utility process 300 initially performs a test during step 310 to determine if a command is received to activate the theft monitoring protection feature provided by the utility process 300 .
- a command to activate the theft protection utility process 300 may be automatically generated when power is applied to the user computing device 110 or whenever a network connection is present.
- the activation may be passive or active, as would be apparent to a person of ordinary skill in the art, and may optionally be combined with password protection to activate and deactivate the theft protection utility process 300 .
- the user can manually invoke the utility before leaving the device 110 .
- the theft protection utility process 300 can be automatically activated, for example, if the user computing device 110 is inactive for a period of time, such as when a screensaver is activated.
- step 310 If it is determined during step 310 that such a command is not received to activate the theft monitoring protection feature, then program control returns to step 310 , which will be periodically reexecuted to determine if the process is activated. If, however, it is determined during step 310 that a command is received to activate the theft monitoring protection feature, then fail-safe features of the present invention are optionally activated during step 320 .
- the theft protection utility process 300 optionally incorporates a number of fail-safe features that ensure that the theft protection aspects of the present invention cannot be bypassed. For example, the theft protection utility process 300 can employ:
- a power control feature that ensures that an unauthorized user cannot turn off the power of the device and bypass the theft protection utility (e.g., disable the power/reset switch automatically while the theft protection utility process 300 is active); or
- the theft protection utility process 300 will send a message to the central theft protection server 120 during step 330 that will initiate a response. In this manner, the theft protection utility process 300 polls the server 120 to ensure that a network connection is present. In further variations, the theft protection utility process 300 can poll one or more network ports on the user computing device 110 to see if they are connected or listen for a “heartbeat” message from a remote device, such as a server.
- a test is performed during step 350 to determine if a response was received from the central theft protection server 120 . If it is determined during step 350 that a response was received from the central theft protection server 120 , then the network connection is still present (and the user computing device 110 is still connected to the network 100 ). The polling process should be performed at periodic or intermittent time intervals, so a wait command is performed during step 355 before program control returns to step 330 .
- step 350 If, however, it is determined during step 350 that a response was not received from the central theft protection server 120 , then the network connection is no longer present (and the user computing device 110 is no longer connected to the network 100 ). Thus, an audible alarm on the user computing device 110 is activated during step 370 or a notification is sent to the user or a monitor, for example, using a cellular connection. Program control then terminates.
- the methods and apparatus discussed herein may be distributed as an article of manufacture that itself comprises a computer readable medium having computer readable code means embodied thereon.
- the computer readable program code means is operable, in conjunction with a computer system, to carry out all or some of the steps to perform the methods or create the apparatuses discussed herein.
- the computer readable medium may be a recordable medium (e.g., floppy disks, hard drives, compact disks, or memory cards) or may be a transmission medium (e.g., a network comprising fiber-optics, the world-wide web, cables, or a wireless channel using time-division multiple access, code-division multiple access, or other radio-frequency channel). Any medium known or developed that can store information suitable for use with a computer system may be used.
- the computer-readable code means is any mechanism for allowing a computer to read instructions and data, such as magnetic variations on a magnetic media or height variations on the surface of a compact disk.
- the memories shown in FIG. 1 will configure the processors to implement the methods, steps, and functions disclosed herein.
- the memory could be distributed or local and the processor could be distributed or singular.
- the memory could be implemented as an electrical, magnetic or optical memory, or any combination of these or other types of storage devices.
- the term “memory” should be construed broadly enough to encompass any information able to be read from or written to an address in the addressable space accessed by processor.
- the present invention can be implemented using an application specific integrated circuit (ASIC), as would be apparent to a person of ordinary skill in the art.
- ASIC application specific integrated circuit
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Environmental & Geological Engineering (AREA)
- Burglar Alarm Systems (AREA)
Abstract
A method and apparatus are disclosed for detecting the removal of a device connected to a network. The present invention generates an alarm on a protected device when an unauthorized user disconnects the device from a network connection. The network connection is monitored and an alarm is generated if the protected device is disconnected from the network connection without proper notification to the theft protection utility. A number of fail-safe features can optionally be employed to ensure that the theft protection aspects of the present invention are not bypassed. For example, the theft protection utility process can employ speaker, volume and/or power control features to ensure that the alarms generated by the present invention, or the theft protection feature itself, cannot be bypassed.
Description
- The present invention relates generally to computer security techniques, and more particularly, to methods and apparatus for preventing the removal of a portable computer connected to a network.
- It is an unfortunate fact of modern life that laptop computers and other portable devices are often stolen. The financial loss to the owner of the device must be measured in terms of the fair market value of the stolen item, as well as the value of any data or other information that was stored on the stolen device. Thus, the actual costs of such a loss can often be significant, especially when the data or information stored on the stolen device includes proprietary or non-recoverable information. Significantly, the trend in the consumer marketplace is towards ever smaller and lighter electronic devices, thereby making such devices even easier to conceal and steal.
- A number of mechanical techniques have been proposed to prevent the theft of such devices. For example, a number of physical locks are commercially available that allow a user to secure a laptop or another device. Such hardware solutions, however, require the user to carry around additional hardware and increase the size and weight of the portable device. A need therefore exists for a mechanism to prevent the theft of a portable device that does not require the user to carry around additional hardware. A further need exists for a software-based mechanism to prevent theft of a portable device. Yet another need exists for a method and apparatus for preventing theft of a portable device that does not increase the size or weight of the portable device.
- Generally, a method and apparatus are disclosed for detecting the removal of a device connected to a network. The present invention generates an alarm on a protected device when an unauthorized user disconnects the device from a network connection. A theft protection utility process monitors the network connection and generates an alarm if the protected device is disconnected from the network connection without proper notification to the theft protection utility process.
- The present invention optionally incorporates a number of fail-safe features that ensure that the theft protection aspects of the present invention cannot be bypassed. For example, the theft protection utility process of the present invention can employ speaker, volume and/or power control features to ensure that the alarms generated by the present invention, or the theft protection feature itself, cannot be bypassed.
- A more complete understanding of the present invention, as well as further features and advantages of the present invention, will be obtained by reference to the following detailed description and drawings.
- FIG. 1 illustrates an exemplary network environment in which the present invention can operate;
- FIG. 2 is a sample table from the authorized user database maintained by the central theft protection server of FIG. 1; and
- FIG. 3 is a flow chart describing an exemplary theft protection utility process incorporating features of the present invention and implemented by the user computer device of FIG. 1.
- FIG. 1 illustrates a
network environment 100 in which the present invention can operate. As shown in FIG. 1, auser computing device 110 is connected over anetwork 100 to one ormore servers 120. According to one aspect of the present invention, an alarm on theuser computing device 110 is automatically triggered when the device is disconnected from a network connection by an unauthorized user. It is noted that theuser computing device 110 is only one example of a device that may be protected using the present invention. The present invention may be employed to prevent the unauthorized removal of any device having a connection to a network, as would be apparent to a person of ordinary skill in the art based on the disclosure herein. - Thus, the
user computing device 110 may be embodied, for example, as any device that can be connected to anetwork 100, such as a portable computer, workstation or personal digital assistant (PDA). Thenetwork 100 may be embodied as any wired or wireless local or wide area network (LAN or WAN, respectively), including the Public Switched Telephone Network (PSTN), a corporate intranet or the Internet (World Wide Web), or any combination of the foregoing. In another variation, thenetwork 100 may be embodied as a cable network, an optical network or a digital satellite service (DSS) network for distributing media content. In such as media distribution network environment, theuser computing device 110 may be embodied, for example, as a set-top terminal, cable-enabled media player (e.g., a television) or another decryption device. In the exemplary embodiment of the present invention, theuser computing device 110 communicates with a special-purpose centraltheft protection server 120 over thenetwork 100. However, the functions performed by the centraltheft protection server 120 in accordance with the present invention can be performed by any server or computer connected to a network, as would be apparent to a person of ordinary skill in the art based on the disclosure herein. - As shown in FIG. 1, the memory of the central
theft protection server 120 includes an authorizeduser database 200, discussed below in conjunction with FIG. 2. Generally, the authorizeduser database 200 identifies each authorized user of thenetwork 100 and provides a corresponding password that may be utilized in various embodiments of the present invention to prevent theft of theuser computing device 110. In addition, the memory of theuser computing device 110 includes a theftprotection utility process 300, discussed below in conjunction with FIG. 3. In the exemplary embodiment, theuser computing device 110 employs the theftprotection utility process 300 to monitor the network connection and generate an alarm if theuser computing device 110 is disconnected from the network connection without proper notification to the theftprotection utility process 300. - FIG. 2 is a sample table from the authorized
user database 200 maintained by the centraltheft protection server 120 of FIG. 1. Generally, the authorizeduser database 200 identifies each authorized user of thenetwork 100 and provides a corresponding password that may be utilized in various embodiments of the present invention to prevent theft of theuser computing device 110. Thus, as shown in FIG. 2, the authorizeduser database 200 includes a plurality of records 205-220, each associated with a different authorized user. For each user identified infield 240, the authorizeduser database 200 indicates the user's password in field 255. In this manner, when the user attempts to remove theuser computing device 110 from the network connection, the user can optionally be prompted by the centraltheft protection server 120 to enter a password. - FIG. 3 is a flow chart describing an exemplary theft
protection utility process 300 incorporating features of the present invention. Generally, theuser computing device 110 employs the theftprotection utility process 300 to monitor the network connection and generate an alarm if theuser computing device 110 is disconnected from the network connection without proper notification to the theftprotection utility process 300. - As shown in FIG. 3, the theft
protection utility process 300 initially performs a test duringstep 310 to determine if a command is received to activate the theft monitoring protection feature provided by theutility process 300. For example, a command to activate the theftprotection utility process 300 may be automatically generated when power is applied to theuser computing device 110 or whenever a network connection is present. In addition, the activation may be passive or active, as would be apparent to a person of ordinary skill in the art, and may optionally be combined with password protection to activate and deactivate the theftprotection utility process 300. In an active embodiment, the user can manually invoke the utility before leaving thedevice 110. In a passive embodiment, the theftprotection utility process 300 can be automatically activated, for example, if theuser computing device 110 is inactive for a period of time, such as when a screensaver is activated. - If it is determined during
step 310 that such a command is not received to activate the theft monitoring protection feature, then program control returns tostep 310, which will be periodically reexecuted to determine if the process is activated. If, however, it is determined duringstep 310 that a command is received to activate the theft monitoring protection feature, then fail-safe features of the present invention are optionally activated duringstep 320. The theftprotection utility process 300 optionally incorporates a number of fail-safe features that ensure that the theft protection aspects of the present invention cannot be bypassed. For example, the theftprotection utility process 300 can employ: - (i) a speaker control feature that ensures that a speaker associated with the
user computing device 110 cannot be disconnected, to thereby prevent an alarm from being heard; - (ii) a volume control feature that ensures that the volume of the speaker cannot be turned down or muted;
- (iii) a power control feature that ensures that an unauthorized user cannot turn off the power of the device and bypass the theft protection utility (e.g., disable the power/reset switch automatically while the theft
protection utility process 300 is active); or - (iv) a combination of the foregoing.
- Thereafter, the theft
protection utility process 300 will send a message to the centraltheft protection server 120 duringstep 330 that will initiate a response. In this manner, the theftprotection utility process 300 polls theserver 120 to ensure that a network connection is present. In further variations, the theftprotection utility process 300 can poll one or more network ports on theuser computing device 110 to see if they are connected or listen for a “heartbeat” message from a remote device, such as a server. - A test is performed during
step 350 to determine if a response was received from the centraltheft protection server 120. If it is determined duringstep 350 that a response was received from the centraltheft protection server 120, then the network connection is still present (and theuser computing device 110 is still connected to the network 100). The polling process should be performed at periodic or intermittent time intervals, so a wait command is performed duringstep 355 before program control returns to step 330. - If, however, it is determined during
step 350 that a response was not received from the centraltheft protection server 120, then the network connection is no longer present (and theuser computing device 110 is no longer connected to the network 100). Thus, an audible alarm on theuser computing device 110 is activated duringstep 370 or a notification is sent to the user or a monitor, for example, using a cellular connection. Program control then terminates. - As is known in the art, the methods and apparatus discussed herein may be distributed as an article of manufacture that itself comprises a computer readable medium having computer readable code means embodied thereon. The computer readable program code means is operable, in conjunction with a computer system, to carry out all or some of the steps to perform the methods or create the apparatuses discussed herein. The computer readable medium may be a recordable medium (e.g., floppy disks, hard drives, compact disks, or memory cards) or may be a transmission medium (e.g., a network comprising fiber-optics, the world-wide web, cables, or a wireless channel using time-division multiple access, code-division multiple access, or other radio-frequency channel). Any medium known or developed that can store information suitable for use with a computer system may be used. The computer-readable code means is any mechanism for allowing a computer to read instructions and data, such as magnetic variations on a magnetic media or height variations on the surface of a compact disk.
- The memories shown in FIG. 1 will configure the processors to implement the methods, steps, and functions disclosed herein. The memory could be distributed or local and the processor could be distributed or singular. The memory could be implemented as an electrical, magnetic or optical memory, or any combination of these or other types of storage devices. Moreover, the term “memory” should be construed broadly enough to encompass any information able to be read from or written to an address in the addressable space accessed by processor. In an alternate implementation, the present invention can be implemented using an application specific integrated circuit (ASIC), as would be apparent to a person of ordinary skill in the art.
- It is to be understood that the embodiments and variations shown and described herein are merely illustrative of the principles of this invention and that various modifications may be implemented by those skilled in the art without departing from the scope and spirit of the invention.
Claims (32)
1. A method for detecting removal of a device connected to a network by a network connection, comprising:
monitoring said network connection; and
generating an alarm if said network connection is disconnected.
2. The method of claim 1 , further comprising the step of preventing a volume of said device from being reduced below a predefined minimum level.
3. The method of claim 1 , further comprising the step of preventing said device from being turned off.
4. The method of claim 1 , wherein said monitoring step is automatically activated in a passive manner.
5. The method of claim 1 , wherein said monitoring step is manually activated by a user.
6. The method of claim 1 , wherein said generating step can be prevented by entering a password.
7. The method of claim 1 , wherein said monitoring step further comprises the step of sending a message to a remote device and awaiting a response.
8. The method of claim 1 , wherein said monitoring step further comprises the step of receiving a message from a remote device.
9. The method of claim 1 , wherein said monitoring step further comprises the step of receiving a signal from a remote device.
10. The method of claim 1 , wherein said monitoring step further comprises the step of polling one or more local network ports on said device.
11. The method of claim 1 , wherein said generating step is performed only if said network connection is disconnected by an unauthorized user.
12. A method for detecting removal of a device connected to a network by a network connection, comprising:
sending a message to a second device connected to said network that will initiate a response; and
generating an alarm if said response is not received within a predefined time interval.
13. The method of claim 12 , further comprising the step of preventing a volume of said device from being reduced below a predefined minimum level.
14. The method of claim 12 , further comprising the step of preventing said device from being turned off.
15. The method of claim 12 , wherein said generating step can be prevented by entering a password.
16. The method of claim 12 , wherein said generating step is performed only if said network connection is disconnected by an unauthorized user.
17. A method for detecting removal of a device connected to a network by a network connection, comprising:
monitoring a signal received on said network connection from a remote device over said network connection; and
generating an alarm if said signal is no longer received.
18. The method of claim 17 , further comprising the step of preventing a volume of said device from being reduced below a predefined minimum level.
19. The method of claim 17 , further comprising the step of preventing said device from being turned off.
20. The method of claim 17 , wherein said generating step can be prevented by entering a password.
21. The method of claim 17 , wherein said generating step is performed only if said network connection is disconnected by an unauthorized user.
22. A system for detecting removal of a device connected to a network by a network connection, comprising:
a memory that stores computer-readable code; and
a processor operatively coupled to said memory, said processor configured to implement said computer-readable code, said computer-readable code configured to:
monitor said network connection; and
generate an alarm if said network connection is disconnected.
23. The system of claim 22 , wherein said processor is further configured to prevent a volume of said device from being reduced below a predefined minimum level.
24. The system of claim 22 , wherein said processor is further configured to prevent said device from being turned off.
25. The system of claim 22 , wherein said processor is further configured to prevent said alarm by entering a password.
26. The system of claim 22 , wherein said processor is further configured to send a message to a remote device and await a response.
27. The system of claim 22 , wherein said processor is further configured to receive a message from a remote device.
28. The system of claim 22 , wherein said processor is further configured to receive a signal from a remote device.
29. The system of claim 22 , wherein said processor is further configured to poll one or more local network ports on said device.
30. The system of claim 22 , wherein said processor is further configured to generate said alarm only if said network connection is disconnected by an unauthorized user.
31. An article of manufacture for detecting removal of a device connected to a network by a network connection, comprising:
a computer readable medium having computer readable code means embodied thereon, said computer readable program code means comprising:
a step to monitor said network connection; and
a step to generate an alarm if said network connection is disconnected.
32. A system for detecting removal of a device connected to a network by a network connection, comprising:
means for monitoring said network connection; and
means for generating an alarm if said network connection is disconnected.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/876,568 US20020188866A1 (en) | 2001-06-07 | 2001-06-07 | Method and apparatus for protecting a device connected to a newtwork |
US12/467,505 US8906114B2 (en) | 2001-06-07 | 2009-05-18 | Method and apparatus for protecting a device connected to a network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/876,568 US20020188866A1 (en) | 2001-06-07 | 2001-06-07 | Method and apparatus for protecting a device connected to a newtwork |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/467,505 Continuation US8906114B2 (en) | 2001-06-07 | 2009-05-18 | Method and apparatus for protecting a device connected to a network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20020188866A1 true US20020188866A1 (en) | 2002-12-12 |
Family
ID=25368033
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/876,568 Abandoned US20020188866A1 (en) | 2001-06-07 | 2001-06-07 | Method and apparatus for protecting a device connected to a newtwork |
US12/467,505 Expired - Fee Related US8906114B2 (en) | 2001-06-07 | 2009-05-18 | Method and apparatus for protecting a device connected to a network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/467,505 Expired - Fee Related US8906114B2 (en) | 2001-06-07 | 2009-05-18 | Method and apparatus for protecting a device connected to a network |
Country Status (1)
Country | Link |
---|---|
US (2) | US20020188866A1 (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1510989A2 (en) * | 2003-08-26 | 2005-03-02 | Mitel Networks Corporation | Security monitor for PDA attached telephone |
US20050251868A1 (en) * | 2004-05-05 | 2005-11-10 | Portrait Displays, Inc. | Theft deterrence method and system |
WO2005119613A1 (en) * | 2004-05-31 | 2005-12-15 | Jason Andrew Roper | Computer network security |
US20050289359A1 (en) * | 2004-05-31 | 2005-12-29 | Lenovo (Singapore) Pte. Ltd. | Preventing the removal of removable devices |
US20060288428A1 (en) * | 2005-06-16 | 2006-12-21 | Intel Corporation | Security power control |
US20070118560A1 (en) * | 2005-11-21 | 2007-05-24 | Christof Bornhoevd | Service-to-device re-mapping for smart items |
US20070118496A1 (en) * | 2005-11-21 | 2007-05-24 | Christof Bornhoevd | Service-to-device mapping for smart items |
US20070118549A1 (en) * | 2005-11-21 | 2007-05-24 | Christof Bornhoevd | Hierarchical, multi-tiered mapping and monitoring architecture for smart items |
US20070130208A1 (en) * | 2005-11-21 | 2007-06-07 | Christof Bornhoevd | Hierarchical, multi-tiered mapping and monitoring architecture for service-to-device re-mapping for smart items |
US20070233881A1 (en) * | 2006-03-31 | 2007-10-04 | Zoltan Nochta | Active intervention in service-to-device mapping for smart items |
US20070283002A1 (en) * | 2006-05-31 | 2007-12-06 | Christof Bornhoevd | Modular monitor service for smart item monitoring |
US20070283001A1 (en) * | 2006-05-31 | 2007-12-06 | Patrik Spiess | System monitor for networks of nodes |
US20070282988A1 (en) * | 2006-05-31 | 2007-12-06 | Christof Bornhoevd | Device registration in a hierarchical monitor service |
US20080033785A1 (en) * | 2006-07-31 | 2008-02-07 | Juergen Anke | Cost-based deployment of components in smart item environments |
EP1983461A2 (en) | 2007-04-18 | 2008-10-22 | Hitachi, Ltd. | External storage apparatus and method of preventing information leakage |
US20090089887A1 (en) * | 2007-09-28 | 2009-04-02 | Intel Corporation | Theft-deterrence method and apparatus for processor based devices |
US20090097397A1 (en) * | 2007-10-12 | 2009-04-16 | Sap Ag | Fault tolerance framework for networks of nodes |
CN103812996A (en) * | 2012-11-08 | 2014-05-21 | 腾讯科技(深圳)有限公司 | Information prompting method and apparatus, and terminal |
US20140191870A1 (en) * | 2012-08-21 | 2014-07-10 | Southern Imperial, Inc. | Theft Detection Device and Method for Controlling Same |
CN103929674A (en) * | 2014-04-25 | 2014-07-16 | 深圳市九洲电器有限公司 | Set top box authorization method and set top box |
US10885753B2 (en) | 2018-03-21 | 2021-01-05 | Fasteners For Retail, Inc. | Anti-theft device with remote alarm feature |
US11087601B1 (en) | 2020-04-02 | 2021-08-10 | Fasteners For Retail, Inc | Anti-theft device with cable attachment |
WO2021229524A1 (en) | 2020-05-14 | 2021-11-18 | The Sentry Devices Ltd | A tamper alert system |
USD1019444S1 (en) | 2020-04-16 | 2024-03-26 | Fasteners For Retail, Inc. | Security tag holder |
US12137819B2 (en) | 2019-04-05 | 2024-11-12 | Fasteners For Retail, Inc. | Anti-theft pusher with incremental distance detection |
USD1051753S1 (en) | 2022-12-21 | 2024-11-19 | Fasteners For Retail, Inc. | Security tag housing |
US12144438B2 (en) | 2018-03-21 | 2024-11-19 | Fasteners For Retail, Inc. | Anti-theft retail merchandise pusher with remote alarm feature |
US12150564B2 (en) | 2019-09-30 | 2024-11-26 | Fasteners For Retail, Inc. | Anti-sweeping hook with integrated loss prevention functionality |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2795512A4 (en) | 2011-12-22 | 2016-01-06 | Intel Corp | Always-available embedded theft reaction subsystem |
EP2795518A4 (en) | 2011-12-22 | 2015-09-02 | Intel Corp | Always-available embedded theft reaction subsystem |
WO2013095594A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
EP2795507A4 (en) | 2011-12-22 | 2015-08-12 | Intel Corp | Always-available embedded theft reaction subsystem |
WO2013095583A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
WO2013095589A1 (en) * | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
US9734359B2 (en) | 2011-12-22 | 2017-08-15 | Intel Corporation | Always-available embedded theft reaction subsystem |
WO2013095591A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
WO2013095586A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5231375A (en) * | 1991-06-07 | 1993-07-27 | Rolm Company | Apparatus and method for detecting theft of electronic equipment |
US5630058A (en) * | 1994-10-13 | 1997-05-13 | International Business Machines Corporation | Network connected device protection |
US5805880A (en) * | 1996-01-26 | 1998-09-08 | Dell Usa, Lp | Operating system independent method for avoiding operating system security for operations performed by essential utilities |
US6021493A (en) * | 1997-11-06 | 2000-02-01 | International Business Machines Corporation | System and method for detecting when a computer system is removed from a network |
US6140923A (en) * | 1999-05-11 | 2000-10-31 | Lam; Tai Peter | Purse alarm |
US6308272B1 (en) * | 1998-12-21 | 2001-10-23 | International Business Machines Corporation | Security system using existing network and personal computers |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05185665A (en) | 1992-01-07 | 1993-07-27 | Brother Ind Ltd | Typewriter with check printing function |
JPH0822403A (en) | 1994-07-11 | 1996-01-23 | Fujitsu Ltd | Computer system monitoring equipment |
JP2000259274A (en) * | 1999-03-08 | 2000-09-22 | Nec Corp | Theft prevention system for terminal device |
US6294995B1 (en) * | 1999-03-15 | 2001-09-25 | Jennifer Patterson | Anti-theft alarm for portable computer |
US6970095B1 (en) * | 1999-05-17 | 2005-11-29 | Caveo Technology, Llc | Theft detection system and method |
US6389853B1 (en) * | 2000-01-13 | 2002-05-21 | Dell Usa, L.P. | Apparatus and method for deterring the theft of a computer |
WO2002089081A1 (en) * | 2001-04-26 | 2002-11-07 | Caveo Technology, Llc | Pc card security system |
WO2002095580A1 (en) * | 2001-05-23 | 2002-11-28 | Tekelec | Methods and systems for automatically configuring network monitoring system |
US20030101251A1 (en) | 2001-11-27 | 2003-05-29 | Varros Telecom | Customizable element management system and method using element modeling and protocol adapters |
-
2001
- 2001-06-07 US US09/876,568 patent/US20020188866A1/en not_active Abandoned
-
2009
- 2009-05-18 US US12/467,505 patent/US8906114B2/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5231375A (en) * | 1991-06-07 | 1993-07-27 | Rolm Company | Apparatus and method for detecting theft of electronic equipment |
US5630058A (en) * | 1994-10-13 | 1997-05-13 | International Business Machines Corporation | Network connected device protection |
US5805880A (en) * | 1996-01-26 | 1998-09-08 | Dell Usa, Lp | Operating system independent method for avoiding operating system security for operations performed by essential utilities |
US6021493A (en) * | 1997-11-06 | 2000-02-01 | International Business Machines Corporation | System and method for detecting when a computer system is removed from a network |
US6308272B1 (en) * | 1998-12-21 | 2001-10-23 | International Business Machines Corporation | Security system using existing network and personal computers |
US6140923A (en) * | 1999-05-11 | 2000-10-31 | Lam; Tai Peter | Purse alarm |
Cited By (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1510989A3 (en) * | 2003-08-26 | 2007-08-15 | Mitel Networks Corporation | Security monitor for PDA attached telephone |
US20050081060A1 (en) * | 2003-08-26 | 2005-04-14 | Gancarcik Edward Peter | Security monitor for PDA attached telephone |
US7356835B2 (en) | 2003-08-26 | 2008-04-08 | Mitel Networks Corporation | Security monitor for PDA attached telephone |
EP1510989A2 (en) * | 2003-08-26 | 2005-03-02 | Mitel Networks Corporation | Security monitor for PDA attached telephone |
US20050251868A1 (en) * | 2004-05-05 | 2005-11-10 | Portrait Displays, Inc. | Theft deterrence method and system |
WO2005119613A1 (en) * | 2004-05-31 | 2005-12-15 | Jason Andrew Roper | Computer network security |
US20050289359A1 (en) * | 2004-05-31 | 2005-12-29 | Lenovo (Singapore) Pte. Ltd. | Preventing the removal of removable devices |
US20080316309A1 (en) * | 2004-05-31 | 2008-12-25 | Jason Andrew Roper | Computer Network Security |
US20060288428A1 (en) * | 2005-06-16 | 2006-12-21 | Intel Corporation | Security power control |
US7806938B2 (en) * | 2005-06-16 | 2010-10-05 | Intel Corporation | Security power control |
US20070118549A1 (en) * | 2005-11-21 | 2007-05-24 | Christof Bornhoevd | Hierarchical, multi-tiered mapping and monitoring architecture for smart items |
US8156208B2 (en) | 2005-11-21 | 2012-04-10 | Sap Ag | Hierarchical, multi-tiered mapping and monitoring architecture for service-to-device re-mapping for smart items |
US20070130208A1 (en) * | 2005-11-21 | 2007-06-07 | Christof Bornhoevd | Hierarchical, multi-tiered mapping and monitoring architecture for service-to-device re-mapping for smart items |
US8005879B2 (en) | 2005-11-21 | 2011-08-23 | Sap Ag | Service-to-device re-mapping for smart items |
US20070118496A1 (en) * | 2005-11-21 | 2007-05-24 | Christof Bornhoevd | Service-to-device mapping for smart items |
US7860968B2 (en) | 2005-11-21 | 2010-12-28 | Sap Ag | Hierarchical, multi-tiered mapping and monitoring architecture for smart items |
US20070118560A1 (en) * | 2005-11-21 | 2007-05-24 | Christof Bornhoevd | Service-to-device re-mapping for smart items |
US20070233881A1 (en) * | 2006-03-31 | 2007-10-04 | Zoltan Nochta | Active intervention in service-to-device mapping for smart items |
US8522341B2 (en) | 2006-03-31 | 2013-08-27 | Sap Ag | Active intervention in service-to-device mapping for smart items |
US8065411B2 (en) | 2006-05-31 | 2011-11-22 | Sap Ag | System monitor for networks of nodes |
US8751644B2 (en) | 2006-05-31 | 2014-06-10 | Sap Ag | Modular monitor service for smart item monitoring |
US20070283002A1 (en) * | 2006-05-31 | 2007-12-06 | Christof Bornhoevd | Modular monitor service for smart item monitoring |
US8296413B2 (en) | 2006-05-31 | 2012-10-23 | Sap Ag | Device registration in a hierarchical monitor service |
US20070283001A1 (en) * | 2006-05-31 | 2007-12-06 | Patrik Spiess | System monitor for networks of nodes |
US8131838B2 (en) * | 2006-05-31 | 2012-03-06 | Sap Ag | Modular monitor service for smart item monitoring |
US20070282988A1 (en) * | 2006-05-31 | 2007-12-06 | Christof Bornhoevd | Device registration in a hierarchical monitor service |
US20080033785A1 (en) * | 2006-07-31 | 2008-02-07 | Juergen Anke | Cost-based deployment of components in smart item environments |
US8396788B2 (en) | 2006-07-31 | 2013-03-12 | Sap Ag | Cost-based deployment of components in smart item environments |
EP1983461A3 (en) * | 2007-04-18 | 2008-11-19 | Hitachi, Ltd. | External storage apparatus and method of preventing information leakage |
EP1983461A2 (en) | 2007-04-18 | 2008-10-22 | Hitachi, Ltd. | External storage apparatus and method of preventing information leakage |
US20090271619A1 (en) * | 2007-04-18 | 2009-10-29 | Hitachi, Ltd. | External storage apparatus and method of preventing information leakage |
US8065523B2 (en) | 2007-04-18 | 2011-11-22 | Hitachi, Ltd. | External storage apparatus and method of preventing information leakage |
US8298295B2 (en) * | 2007-09-28 | 2012-10-30 | Intel Corporation | Theft-deterrence method and apparatus for processor based devices |
US20090089887A1 (en) * | 2007-09-28 | 2009-04-02 | Intel Corporation | Theft-deterrence method and apparatus for processor based devices |
US20090097397A1 (en) * | 2007-10-12 | 2009-04-16 | Sap Ag | Fault tolerance framework for networks of nodes |
US8527622B2 (en) | 2007-10-12 | 2013-09-03 | Sap Ag | Fault tolerance framework for networks of nodes |
US20140191870A1 (en) * | 2012-08-21 | 2014-07-10 | Southern Imperial, Inc. | Theft Detection Device and Method for Controlling Same |
US9324220B2 (en) * | 2012-08-21 | 2016-04-26 | Southern Imperial, Inc. | Theft detection device and method for controlling same |
CN103812996A (en) * | 2012-11-08 | 2014-05-21 | 腾讯科技(深圳)有限公司 | Information prompting method and apparatus, and terminal |
CN103929674A (en) * | 2014-04-25 | 2014-07-16 | 深圳市九洲电器有限公司 | Set top box authorization method and set top box |
US10885753B2 (en) | 2018-03-21 | 2021-01-05 | Fasteners For Retail, Inc. | Anti-theft device with remote alarm feature |
US11605276B2 (en) | 2018-03-21 | 2023-03-14 | Fasteners For Retail, Inc. | Anti-theft device with remote alarm feature |
US12144438B2 (en) | 2018-03-21 | 2024-11-19 | Fasteners For Retail, Inc. | Anti-theft retail merchandise pusher with remote alarm feature |
US12137819B2 (en) | 2019-04-05 | 2024-11-12 | Fasteners For Retail, Inc. | Anti-theft pusher with incremental distance detection |
US12150564B2 (en) | 2019-09-30 | 2024-11-26 | Fasteners For Retail, Inc. | Anti-sweeping hook with integrated loss prevention functionality |
US12148275B2 (en) | 2020-04-02 | 2024-11-19 | Fasteners For Retail, Inc. | Anti-theft device with cable attachment |
US11087601B1 (en) | 2020-04-02 | 2021-08-10 | Fasteners For Retail, Inc | Anti-theft device with cable attachment |
US11727773B2 (en) | 2020-04-02 | 2023-08-15 | Fasteners For Retail, Inc. | Anti-theft device with cable attachment |
USD1019445S1 (en) | 2020-04-16 | 2024-03-26 | Fasteners For Retail, Inc. | Security tag holder |
USD1019446S1 (en) | 2020-04-16 | 2024-03-26 | Fasteners For Retail, Inc. | Security tag holder |
USD1019444S1 (en) | 2020-04-16 | 2024-03-26 | Fasteners For Retail, Inc. | Security tag holder |
US12148274B2 (en) | 2020-05-14 | 2024-11-19 | The Sentry Devices Ltd | Tamper alert system |
WO2021229524A1 (en) | 2020-05-14 | 2021-11-18 | The Sentry Devices Ltd | A tamper alert system |
USD1051753S1 (en) | 2022-12-21 | 2024-11-19 | Fasteners For Retail, Inc. | Security tag housing |
Also Published As
Publication number | Publication date |
---|---|
US20090228992A1 (en) | 2009-09-10 |
US8906114B2 (en) | 2014-12-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8906114B2 (en) | Method and apparatus for protecting a device connected to a network | |
US8010631B2 (en) | Method and system for providing image, video and audio data to remote users | |
US8378821B2 (en) | Pluggable security device | |
US7356835B2 (en) | Security monitor for PDA attached telephone | |
US9786141B2 (en) | Package delivery notification and protection device, system and method | |
US8206460B2 (en) | Security system | |
US20080120716A1 (en) | System and method for enhancing security of an electronic device | |
US20090089565A1 (en) | Method and Apparatus for Configuring a Device Based on Proximity to Another Device | |
US20100107241A1 (en) | Secure caching of server credentials | |
US20080186162A1 (en) | Apparatus and Methods for Locating, Tracking and/or Recovering a Wireless Communication Device | |
US9485655B1 (en) | Providing power control to an electronic device using authentication | |
EP0850441B1 (en) | Method of monitoring a computer system | |
US20080238608A1 (en) | Anti-theft system and method | |
WO2003100559A3 (en) | System and method for making managing wireless network activity | |
US20140134987A1 (en) | Provision Of Private information To Voice Telephone Call Parties | |
US7510580B2 (en) | Method and apparatus to eliminate theft of electronic equipment using existing telephone jack | |
JP2002091917A5 (en) | Network security device and connection management method | |
US20080191872A1 (en) | Method and apparatus for securing an electronic device | |
CN107087233A (en) | Play management-control method, device and electric terminal | |
JP3756880B2 (en) | Electronic device and data processing method | |
CN110781504A (en) | Data protection method and related equipment | |
JP2002312860A (en) | Abnormal state confirming device | |
JP2007053658A (en) | Inquiry answering system, terminal, server, and program | |
JPH05176374A (en) | Personal computer monitoring system | |
MXPA99006016A (en) | System for detecting forced attempted cases and capturing the moment of the event |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AGERE SYSTEMS GUARDIAN CORP., FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CA, JALALUDEEN;GN, NANDAKUMAR;REEL/FRAME:012174/0670 Effective date: 20010730 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |
|
AS | Assignment |
Owner name: AGERE SYSTEMS LLC, PENNSYLVANIA Free format text: CERTIFICATE OF CONVERSION;ASSIGNOR:AGERE SYSTEMS INC.;REEL/FRAME:033459/0892 Effective date: 20120730 |