The present invention relates generally to the field of asset management; and, more specifically, to a technique for remotely managing computer systems.
Typically, mobile systems such as lap top computer systems are used because they are thin, light and thus easily transportable. Due to many factors including battery life and heat generation, the mobile systems generally tend to be not as powerful as their desktop counterparts. However, with advanced developments in power management and thermal management, the mobile systems today are capable of performing as well as the traditional desktop systems.
The traditional desktop systems tend to be bulky and heavy, thus not easily transportable. They, however, may still be susceptible to theft or unauthorized move. To prevent this from happening, a desktop system may be attached to a security device to secure it to, for example, a desk. A user of the desktop system may be provided a key to lock or to unlock the security device. Because of the advantages of the mobile systems, companies are increasingly using the mobile systems as both desktop systems and traveling systems. It is possible that when the mobile systems are used as the desktop systems, the users of these mobile systems may leave them on their desks until when it is necessary to move them. Because the mobile systems are light and thin, they may be even more susceptible to theft or unauthorized movement than the traditional desktop systems. The same security techniques used to protect the traditional desktop systems may be used to protect the mobile systems. In certain situations, these techniques may not be efficient and improved techniques may be necessary.
The present invention is illustrated by way of example and not limitation in the accompanying figures in which like references indicate similar elements and in which:
In some embodiments, a computer system may include security logic that is capable of sending signals to control operation of a security device including causing the security device to lock or to unlock. The security logic may be controlled remotely via a communication line.
In the following description, for purposes of explanation, numerous specific details are set forth to provide a thorough understanding of the present invention. It will be evident, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well known structures, processes, and devices are shown in block diagram form or are referred to in a summary manner in order to provide an explanation without undue detail.
Computer System
The chipset 107 may also include an input/output control hub (ICH) 140. The ICH 140 is coupled with the MCH 110 via a hub interface. The ICH 140 provides an interface to input/output (I/O) devices within the computer system 100. The ICH 140 may be coupled to a peripheral bus (e.g., Peripheral Component Interconnect (PCI) bus) 142. The ICH 140 may include a PCI bridge 146 that provides an interface to the PCI bus 142. The PCI bridge 146 may provide a data path between the CPU 102 and peripheral devices. The ICH 140 may be connected to a network interface controller (NIC) 158 via the PCI bus 142. A communication device 160 may be connected to the PCI bus 142. The PCI bus 142 may also be connected to various I/O devices such as, for example, audio device 150, storage device 155, etc. The computer system 100 may be connected to another computer system using the communication device 160.
The user 205 may also be provided with a security device 215 and a key (not shown). The computer system 210 is illustrated in this example as being secured to desk 200 using the security device 215. Typically, the security device 215 is a mechanical device and may include a key lock and a security cable connected to the computer system 210 via a security slot. For example, the security device 215 may be one that is manufactured by Kensington Technology Group of ACCO Brands, Inc. of Lincolnshire, Ill. It is not uncommon for the user 205 to misplace or lose the key. When this occurs, the computer system 210 may not be transported until a duplicate key can be delivered or until the security cable can be cut. There may be a delay associated with this approach because the user 205 may have to wait for a support personnel to arrive. Furthermore, there may be situations when the computer system 210 may need to be transported into the IT department for, for example, periodic upgrades. Such authorized transport may not be possible when the computer system 210 is located at the work desk and the user 205 is not present to provide the key.
After the security device is disabled or unlocked by the technician, the computer system 200 may be brought to the IT department to do the repair/updates, etc. (as shown in block 325). Subsequently, the computer system 200 (or its replacement) may be returned to the user 205 and re-secured using the security device 215, as shown in block 330. It may be noted that the time waiting for the technician to arrive may be avoided if the security device 215 can be unlocked on behalf of the user 205 remotely. It may also be noted the disablement of the security device 215 may be unauthorized (i.e., theft), and confidential data stored in the computer system 200 may be at risk. In these situations, it may be necessary to disable the computer system 200 to deter theft and to protect the confidential data.
The signal 515 may be examined by logic 522 to determine whether it is for the security device 520A, 525A or both. The logic 522 may be a super input/output (I/O) chip. For one embodiment, the signal 515 may be generated to control the security device 520A or the security device 525A or both. This may be applicable when the display 555 and the computer system 500 are two separate units. It may be possible that there is only one security device (e.g., device 509) when the computer system 500 includes an integrated display (e.g., a lap top with a clam shell form factor or the like). In the current example, the security devices 520A and 525A are coupled to the ICH 525. For one embodiment, the security devices 520A and 525A may be considered to be output devices, and the signal 515 is sent from the ICH 535 as an output signal to be processed by the security devices 520A, 525A or both. Some levels of authorization verification may need to be performed before the signal 515 is sent. The security devices 520A and 525A may be integrated into the computer system 500. For one embodiment, a security device may store information about its current status. For example, upon receiving a status request signal, the security device may respond with a positive signal (operational, locked) or negative signal (not operational, disabled, and unlocked).
It may be noted that the security devices 520A and 525A may be unlocked locally though the use of a mechanical or electronic key. The electronic key may be entered using a keypad (not shown) on the security device 520A or 525A. Alternatively, the electronic key may be activated when an unlock signal is sent from the computer system 590.
For one embodiment, the computer system 500 may include an out-of-band controller (not shown). The OOB controller may be coupled to a power source enabling it to remain active even when the computer system 500 is powered off. This power source may be the same power source as used by the computer system 500. Alternatively, this may be a separate power source. The power source used by the OOB controller may be a direct current (DC) power source. The OOB controller may be part of the communication controller 530, or it may be part of a chipset (e.g., ICH 535 and MCH 540). The OOB controller may serve to receive in-coming lock and unlock signals from the computer system 590. As will be described, the OOB controller may also serve to send warning signals to the computer system 590. Having the OOB controller may be advantageous because it enables an independent communication channel between the computer system 590 and the security devices 520A and 525A.
For one embodiment, a security device may include logic to enable it to send signals. For example, the security device 520B and 525B may be viewed as input devices and signals sent by them may be received by the ICH 535. For one embodiment, a security device may send warning signals when it senses a break in the cable/connector. A sensor may be integrated onto the security device to sense the presence or the cut of the cable. The sensor may be a capacitance sensor to detect the change of the capacitance of the cable. A cut or the removal of the cable may change the capacitance detected and a warning signal may be generated to indicate such tempering event. For example, when someone cuts off the cable 509, security sensor 523B in the security device 525B may send a warning signal to the logic 522. Security sensor 523A may also send warning signals to the logic 522 in similar situation. The logic 522 may then cause a warning signal in the form of an interrupt to be generated. Upon receiving the interrupt, the processor 545 may cause a warning signal to be sent to the computer system 590 via the communication controller 530. Upon receiving the warning signal from the computer system 700, the IT department may verify with the owner of the computer system 700 to determine if the warning is legitimate and the break in the cable is unauthorized. For one embodiment, when the warning signal is legitimate, the IT department may be send signal to disable operation of the computer system 700. For example, using wireless communications, the IT department may cause the computer system 700 to fail to start during power on reset.
In some embodiments, it is to be understood that they may be implemented as one or more software programs stored within a machine readable medium. A machine readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine readable medium includes read only memory (ROM), random access memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), etc.
In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention as set forth in the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.