WO1998049656A1 - Method of making a computer theft-proof - Google Patents

Method of making a computer theft-proof Download PDF

Info

Publication number
WO1998049656A1
WO1998049656A1 PCT/SE1998/000748 SE9800748W WO9849656A1 WO 1998049656 A1 WO1998049656 A1 WO 1998049656A1 SE 9800748 W SE9800748 W SE 9800748W WO 9849656 A1 WO9849656 A1 WO 9849656A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
storage device
theft
identity designation
identity
Prior art date
Application number
PCT/SE1998/000748
Other languages
French (fr)
Swedish (sv)
Inventor
Tomas BJÖRK
Per Mattsson
Original Assignee
C-Cure Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by C-Cure Ab filed Critical C-Cure Ab
Publication of WO1998049656A1 publication Critical patent/WO1998049656A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks

Definitions

  • the present invention relates to a method of making a computer theft-proof, the computer comprising a plurality of components, including a special storage device.
  • Methods which include permanent registration of a computer identity designation in the special storage device as well as registration of this computer identity designation with information about the owner of the computer in a theft-prevention record.
  • a registration of the computer identity designation is made on the computer itself, e.g. by marking the cover of the computer in a way that is difficult to destruct, e.g. by etching.
  • the deterrent effect on theft obtained by the exterior marking of the computer can be enhanced by using the computer identity designation registered in the special storage device by means of suitable software to ex- plicitly indicate, when an attempt is made to start the computer on the associated screen, that the identity of the computer is stored in the special storage device as well as in a theft-prevention record with information about the owner.
  • the entire computer nor the special storage device is particularly liable to be stolen since they can normally always be identified separately on some future occasion.
  • the object of the present invention is therefore to enhance the theft prevention of the computer as well as main components therein, e.g. hard disk, other storage devices and motherboard. According to the invention, this object is achieved by also registrating an identity designation of at least one of the components of the computer in the theft- prevention record associated with the computer identity designation, the component containing a permanent registration of its identity designation.
  • Such a permanent registration is often made by the manufacturer in the form a unique serial number and is stored in a storage device which is permanently connected to the component and which usually is only readable since it is directly or indirectly connected to a bus in the computer system. The reading normally also requires access to a special code.
  • this storage device being permanently connected to the component and often being impossible to distinguish in respect of its physical place on the component for anyone except the manufacturer, it is in practice impossible for anyone except the manufacturer to eliminate the identity of this component from the actual component, which thus is always possible to identify.
  • the component identity designation can be read from the storage device permanently connected to the component when the computer identity designation is being registered in the storage device of the computer.
  • the component identity designation is stored on a storage medium which is separable from the computer and which also contains the computer identity designation permanently registered in the storage device of the computer.
  • the inventive method of making a computer theft- proof is advantageously part of a system, which also comprises exterior marking of the computer, e.g. in the form of a tape with an identity designation unique to the com- puter and thus to its owner. Corresponding marking can be performed on selected components contained in the computer also by means of a tape or in a practically concealed way by means of minimal marking e.g. under a drop of adhesive.
  • the same unique identity designation can be etched in the cover of the computer.
  • the tape mentioned above can be used in a shape suitable for this purpose.
  • the identity designation of the computer can advantageously also be stored on the hard disk of the computer in the normally accessible sections thereof as well as outside these sections.
  • a special program can be stored on the hard disk, which program, when the computer is started on the screen of the computer, shows a warning text, which can state that both the computer and the hard disk are marked and that corresponding registrations are also available in a theft-prevention record.
  • a separate program is used according to the invention, which is stored on a diskette or on some other storage medium separable from the computer.
  • This diskette can advantageously also be used for storing the information to be transmitted to the theft- prevention record for central storage.
  • the owner of the computer is also keeping a copy of this diskette in a safe place, said diskette being preferably used for all the computers of the owner in common.
  • a computer and component manufacturer usually provides different main components of computers with storage devices, in which e.g. a unique serial number is stored as an identification of the individual unit of the component in question.
  • This storage device can consist of a semiconductor chip, which is a read only memory and whose information thus cannot be altered.
  • it can be located, e.g. be a part of a storage device intended for another purpose, such that it is difficult for anyone except the manufacturer to discover it.
  • the storage device is directly or indirectly connected to some kind of a bus in the system and the information in the storage device is accessible by means of a special code .
  • a diskette is entered into a diskette reader in the computer to be made theft-proof, the diskette containing on the one hand at least one unique computer identity designation and, on the other, a first program for processing the computer identity designation and a second program for processing the component identity designations of interest.
  • the first program is started, it is first checked whether the hard disk is already marked, i.e. contains a computer identity designation. If this is not the case, such a designation is read from the diskette and stored in a predetermined way on the hard disk.
  • information is entered on the hard disk showing a warning text on the screen of the computer when started, stating that the computer, as well as its components, is provided with an anti-theft marking.
  • the second program is started, which reads the unique identity designations of the data component/components of interest, as stored in the storage device, specially provided for this purpose, of each com- ponent .
  • the second program stores this or these identity designations on the diskette which are connected to the computer identity designation. Additional information, such as the date of the execution and information about the computer owner, is also stored in association with the computer identity designation.
  • the storage preferably has the form of a text file.
  • the diskette with the thus-compiled information from one or more computers, belonging to one and the same owner, can be kept by the owner and entered into a database which functions as a theft-prevention record and which can be accessible to the police and customs officers .
  • the method according to the invention offers a very high degree of theft prevention since it is possible to identify the computer in an adequate manner, and at least those components in the computer which are provided with the described storage device cannot in practice lose their unique identification, which can always be associated with the rightful owner via the theft-prevention record.

Abstract

A computer comprises a plurality of components, including a special storage device. A method of making such a computer and main components thereof theft-proof comprises permanent registration of a computer identity designation in the special storage device as well as in a theft-prevention record with information about the owner of the computer. An identity designation of at least one of the components of the computer is also registered in the theft-prevention record associated with the computer identity designation, the component containing a permanent registration of its identity designation.

Description

METHOD OF MAKING A COMPUTER THEFT-PROOF
The present invention relates to a method of making a computer theft-proof, the computer comprising a plurality of components, including a special storage device. Methods are known which include permanent registration of a computer identity designation in the special storage device as well as registration of this computer identity designation with information about the owner of the computer in a theft-prevention record. In addition to the registration of the computer identity designation in the special storage device, e.g. on the hard disk, a registration of the computer identity designation is made on the computer itself, e.g. by marking the cover of the computer in a way that is difficult to destruct, e.g. by etching.
The deterrent effect on theft obtained by the exterior marking of the computer can be enhanced by using the computer identity designation registered in the special storage device by means of suitable software to ex- plicitly indicate, when an attempt is made to start the computer on the associated screen, that the identity of the computer is stored in the special storage device as well as in a theft-prevention record with information about the owner. Thus, neither the entire computer nor the special storage device is particularly liable to be stolen since they can normally always be identified separately on some future occasion.
Even if existing anti-theft systems thus are essentially satisfactory, there is a need for further improve- ments.
The object of the present invention is therefore to enhance the theft prevention of the computer as well as main components therein, e.g. hard disk, other storage devices and motherboard. According to the invention, this object is achieved by also registrating an identity designation of at least one of the components of the computer in the theft- prevention record associated with the computer identity designation, the component containing a permanent registration of its identity designation.
Such a permanent registration is often made by the manufacturer in the form a unique serial number and is stored in a storage device which is permanently connected to the component and which usually is only readable since it is directly or indirectly connected to a bus in the computer system. The reading normally also requires access to a special code. By this storage device being permanently connected to the component and often being impossible to distinguish in respect of its physical place on the component for anyone except the manufacturer, it is in practice impossible for anyone except the manufacturer to eliminate the identity of this component from the actual component, which thus is always possible to identify.
More specifically, the component identity designation can be read from the storage device permanently connected to the component when the computer identity designation is being registered in the storage device of the computer.
For the transmission of information to the theft- prevention record, the component identity designation is stored on a storage medium which is separable from the computer and which also contains the computer identity designation permanently registered in the storage device of the computer.
The invention will now be described in more detail with reference to a preferred embodiment.
The inventive method of making a computer theft- proof is advantageously part of a system, which also comprises exterior marking of the computer, e.g. in the form of a tape with an identity designation unique to the com- puter and thus to its owner. Corresponding marking can be performed on selected components contained in the computer also by means of a tape or in a practically concealed way by means of minimal marking e.g. under a drop of adhesive.
As an additional part of the anti-theft system the same unique identity designation can be etched in the cover of the computer. In this connection, the tape mentioned above can be used in a shape suitable for this purpose.
The identity designation of the computer can advantageously also be stored on the hard disk of the computer in the normally accessible sections thereof as well as outside these sections. To attract the attention of a supposed thief to the extension of the anti-theft system, a special program can be stored on the hard disk, which program, when the computer is started on the screen of the computer, shows a warning text, which can state that both the computer and the hard disk are marked and that corresponding registrations are also available in a theft-prevention record.
For the registration of the unique computer identity designation on the hard disk, a separate program is used according to the invention, which is stored on a diskette or on some other storage medium separable from the computer. This diskette can advantageously also be used for storing the information to be transmitted to the theft- prevention record for central storage. The owner of the computer is also keeping a copy of this diskette in a safe place, said diskette being preferably used for all the computers of the owner in common.
According to the invention use is made of the fact that a computer and component manufacturer usually provides different main components of computers with storage devices, in which e.g. a unique serial number is stored as an identification of the individual unit of the component in question. This storage device can consist of a semiconductor chip, which is a read only memory and whose information thus cannot be altered. In addition, it can be located, e.g. be a part of a storage device intended for another purpose, such that it is difficult for anyone except the manufacturer to discover it. Normally, the storage device is directly or indirectly connected to some kind of a bus in the system and the information in the storage device is accessible by means of a special code . Since the components of the computer, which are especially liable to be stolen, besides the computer itself, thus in many cases have a unique identity designation, which in addition is very difficult to eliminate, the anti-theft protection of these components can be en- hanced by the method according to the invention.
The use of the inventive method will now be described with reference to an example.
A diskette is entered into a diskette reader in the computer to be made theft-proof, the diskette containing on the one hand at least one unique computer identity designation and, on the other, a first program for processing the computer identity designation and a second program for processing the component identity designations of interest. When the first program is started, it is first checked whether the hard disk is already marked, i.e. contains a computer identity designation. If this is not the case, such a designation is read from the diskette and stored in a predetermined way on the hard disk. In addition, information is entered on the hard disk showing a warning text on the screen of the computer when started, stating that the computer, as well as its components, is provided with an anti-theft marking.
Subsequently, the second program is started, which reads the unique identity designations of the data component/components of interest, as stored in the storage device, specially provided for this purpose, of each com- ponent . The second program stores this or these identity designations on the diskette which are connected to the computer identity designation. Additional information, such as the date of the execution and information about the computer owner, is also stored in association with the computer identity designation. The storage preferably has the form of a text file.
The diskette with the thus-compiled information from one or more computers, belonging to one and the same owner, can be kept by the owner and entered into a database which functions as a theft-prevention record and which can be accessible to the police and customs officers .
It is apparent that the method according to the invention offers a very high degree of theft prevention since it is possible to identify the computer in an adequate manner, and at least those components in the computer which are provided with the described storage device cannot in practice lose their unique identification, which can always be associated with the rightful owner via the theft-prevention record.
The invention can, of course, be modified in several ways within the scope of the invention as stated in the appended claims.

Claims

1. A method of making a computer theft-proof, said computer comprising a plurality of components including a special storage device, which method comprises permanent registration of a computer identity designation in the special storage device as well as in a theft-prevention record with information about the owner of the computer, c h a r a c t e r i s e d in that an identity designation of at least one of the computer components is also registered in the theft-prevention record associated with the computer identity designation, which component contains a permanent registration of its identity designation.
2. A method according to claim 1, c h a r a c t e r i s e d in that the component identity designation is read from a storage device permanently connected to the component .
3. A method according to claim 2, c h a r a c - t e r i s e d in that the component identity designation is read from the storage device permanently connected to the component when the computer identity designation is being registered in the storage device of the computer.
4. A method according to claim 3, c h a r a c - t e r i s e d in that the component identity designation is stored on a storage medium which is separable from the computer and which contains the computer identity designation permanently registered in the storage device of the computer.
5. A method according to claim 4, c h a r a c t e r i s e d in that the computer identity designation is read from the separable storage medium for the permanent registration of the same in the special storage device in the computer.
6. A method according to claim 5, c h a r a c t e r i s e d in that the separable storage medium is used for storing a program for the reading of the com- puter identity designation and for the permanent registration of the same in the special storage device in the computer.
7. A method according to claim 5 or 6, c h a r - a c t e r i s e d in that the separable storage medium is used for storing a program for reading the identity designation of the computer component of interest and storing of the same on the separable storage medium.
8. A method according to any of claims 4-7, c h a r a c t e r i s e d in that the separable storage medium is used as a medium for transmitting the identity designations to the theft-prevention record.
PCT/SE1998/000748 1997-04-25 1998-04-24 Method of making a computer theft-proof WO1998049656A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE9701579-6 1997-04-25
SE9701579A SE9701579L (en) 1997-04-25 1997-04-25 Ways to steal a computer

Publications (1)

Publication Number Publication Date
WO1998049656A1 true WO1998049656A1 (en) 1998-11-05

Family

ID=20406737

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE1998/000748 WO1998049656A1 (en) 1997-04-25 1998-04-24 Method of making a computer theft-proof

Country Status (2)

Country Link
SE (1) SE9701579L (en)
WO (1) WO1998049656A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4262337A (en) * 1974-09-03 1981-04-14 General Motors Corporation Portable calculator incorporating an anti-theft feature
GB2182207A (en) * 1985-10-29 1987-05-07 Marconi Instruments Ltd Electrical circuit identification
WO1993020459A1 (en) * 1992-04-03 1993-10-14 Tommy Olsson A method and a device for anti-theft marking of office equipment, especially computers
WO1997003397A1 (en) * 1995-07-10 1997-01-30 Benkta Consulting Ab A method and an arrangement relating to theft-deterrents
WO1997023122A1 (en) * 1995-12-15 1997-06-26 Memory Card Technology A/S Print board with identification marking

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4262337A (en) * 1974-09-03 1981-04-14 General Motors Corporation Portable calculator incorporating an anti-theft feature
GB2182207A (en) * 1985-10-29 1987-05-07 Marconi Instruments Ltd Electrical circuit identification
WO1993020459A1 (en) * 1992-04-03 1993-10-14 Tommy Olsson A method and a device for anti-theft marking of office equipment, especially computers
WO1997003397A1 (en) * 1995-07-10 1997-01-30 Benkta Consulting Ab A method and an arrangement relating to theft-deterrents
WO1997023122A1 (en) * 1995-12-15 1997-06-26 Memory Card Technology A/S Print board with identification marking

Also Published As

Publication number Publication date
SE9701579D0 (en) 1997-04-25
SE507329C2 (en) 1998-05-11
SE9701579L (en) 1998-05-11

Similar Documents

Publication Publication Date Title
CN100514280C (en) Attachable/detachable device and programs start method
US5287407A (en) Computer software protection
NL1014830C2 (en) A method of tracking devices used for loading, reading and writing removable storage media.
US6087937A (en) Security device
CA2472195A1 (en) System and method of reading a security clearance card
US6827256B2 (en) System for storage and output of objects
CN1831838B (en) Authentication tag for software media
CN1504968A (en) RFID tags which are physically activated and/or deactivated
JP2005514720A5 (en)
US20040070507A1 (en) Inventory management system
RU98123599A (en) Theft Prevention Device
US20060006982A1 (en) Method And Apparatus For Using RFID's In The Investigation Of Motor Vehicle Accidents
US7263190B1 (en) System for securing the confidentiality of electronically stored data in the event of the physical theft thereof
WO1998049656A1 (en) Method of making a computer theft-proof
WO1993013966A1 (en) Motor vehicle start-up control
US11131123B2 (en) Method and apparatus for upgrading ink stain antitheft tags with RFID communications function
WO1995011501A1 (en) System for nationally and internationally identifying motor vehicles
US7025263B2 (en) Systems and methods for tracking alcoholic containers
JP2007200244A (en) Information management system and information management method
JPH0672085A (en) Information recording medium
US20080136407A1 (en) System and method for magnetic field exposure indication
JP2006268859A (en) Device and method for ownership verification
US7299327B2 (en) Content-on-demand memory key with positive access evidence feature
US20070278297A1 (en) Systems and methods for the self-checkout of secured items from a lending establishment
WO1998053384A1 (en) Method and apparatus for activating programs/features in a computer

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): DK DK FI FI NO

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase