Electronic devices of all types are subject to theft. Protecting electronic devices is essential due to the expense associated with replacing them. Equally important, if not more important, is the need to protect any confidential information stored on the electronic device. Due to their portability, portable electronic devices are particularly susceptible to theft. Various anti-theft devices have been proposed to prevent the theft of electronic devices, such as portable personal computers. For example, a locking mechanism may be used to attach an anchored cable to a portable computer to deter theft. However, such security measures may be circumvented by physically cutting the cable.
For a more complete understanding of the present application, the objects and advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
Security apparatus 100 includes a retaining member 104 having a locking mechanism 106, an anchor member 108, and a coupling connector 110. Locking mechanism 106 may be removably attached to an enclosure 112 of electronic device 102. Anchor member 108 may be attached to a substantially immovable object such as a desk or wall to deter unauthorized transport of electronic device 102. Coupling connector 110 may be coupled to a data port 114 of electronic device 102.
In the embodiment illustrated in
In some embodiments, security apparatus 100 may include an embedded electrical wire 116 extending at least partially from the coupling connector 110 to anchor member 108. Embedded electrical wire 116 may transmit an electrical signal through coupling connector 110. The electrical signal is generated using power provided by electronic device 102. During a time when electronic device 102 is powered off, the signal may still be generated using power supplied by a keyboard controller or other internal components of electronic device 102. A portion of the keyboard controller may be awake for handling input received from the computer keyboard.
Data port 114 may be configured with a general purpose input/output (GPIO) controller communicatively coupled to a component of electronic device 102 such as a basic input/output system (BIOS), to monitor for the presence of the electrical signal transmitted along embedded electrical wire 116. Electronic device 102 may be configured to perform a predetermined security measure in response to detecting the absence of the electrical signal such as, but not limited to, when security apparatus 100 is severed. Data port 114 may also be configured to monitor for the presence of coupling connector 110 and to perform a set of predetermined security measures in response to detecting the absence of coupling connector 110.
The predetermined security measures may include, but are not limited to, an alarm, a system lock-out, and a remote notification procedure. The alarm may be an audible alarm played through the speakers of electronic device 102. The system lock-out may include, but is not limited to, a password lock, a data encryption process, and/or disabling powering-on of electronic device 102. In addition, the remote notification procedure may include notifying security personnel, information technology personnel, and/or the owner of electronic device 102.
In some embodiments, coupling connector 110 may also include more advanced electronic characteristics. For example, coupling connector 110 may have resistors to create specific signals to the BIOS in order for the BIOS to detect “open” or “short” conditions. Coupling connector 110 may also contain electronic cryptographic keys such as, but not limited to, those used by smart card systems. Electronic device 102 may use the cryptographic keys to enable hard drive operation and/or to authenticate the security system. Without the cryptographic keys, electronic device 102 may be rendered useless by, but not limited to, preventing booting, locking drive operation, and/or disabling drive encryption.
Further, in some embodiments, locking mechanism 106 may be configured to enable or disable the security features provided by security apparatus 100 upon proper locking and unlocking of locking mechanism 106. For example, this feature may be performed via simple voltage or current detection by the BIOS through a general purpose input/output (GPIO) controller.
In some embodiments, properly unlocking locking mechanism 106 disables the predetermined security measures. This may be performed via a mechanism within locking mechanism 106 that sends a simple voltage or current that is detected by the BIOS through a general purpose input/output (GPIO) controller. Upon receiving the voltage or current the BIOS disables the predetermined security measures.
In some embodiments, wireless data transmission device 408 is a radio-frequency identification (RFID) tag. In some embodiments, RFID tag 409 communicates with a RFID tag reader 411 associated with electronic device 102. In some embodiments, RFID tag reader 411 may be configured with a general purpose input/output (GPIO) controller communicatively coupled to a component of electronic device 102, such as the BIOS, to monitor for the presence of an electrical signal transmitted by RFID tag 409. Similar to previous embodiments, electronic device 102 may be configured to perform a predetermined security measure in response to detecting the absence of the electrical signal such as, but not limited to, if security apparatus 400 is severed and electronic device 102 is moved out of the range of the electrical signal transmitted by RFID tag 409. In other embodiments, wireless data transmission device 408 may be a near field communication (NFC) device or other types of wireless communication devices.
Still referring to
The process begins by monitoring for a proper locking signal to initiate the security features of security apparatus 100 at block 600. The process determines if a locking signal is received at block 602. If a proper locking signal has not been received, the process returns to block 600 to continue monitoring for a proper locking signal. If a proper locking signal is received, the process initiates the monitoring function of security apparatus 100 at block 604. At block 606, the process determines if coupling connector 110 of security apparatus 100 is detected. At block 608, the process determines if an electrical signal, as described above, is detected. If the process detects both coupling connector 110 and the electrical signal, the process will wait a predetermined amount of time before re-pinging for the presence of coupling connector 110 and the electrical signal.
However, if at either block 606 or 608, coupling connector 110 or the electrical signal is not detected, the process determines if a proper disconnect signal has been received at block 612. Responsive to receiving a proper disconnect signal, at block 612, the process disables the security features of security apparatus 100. The process then returns to block 600 to continue monitoring for a proper locking signal.
However, if at block 612, the process has not received a proper disconnect signal, the process performs a set of predetermined security measures. The predetermined security measures may include, but are not limited to, an alarm, a system lock-out, and a remote notification procedure. A similar process may be initiated for detecting the presence of an RFID signal or an NFC signal in accordance with other illustrative embodiments. It should also be understood that the illustrative embodiments may combine, omit, and/or add additional blocks to
Accordingly, the illustrating embodiments provide a security apparatus 100 that provides both a physical protection mechanism and an extra level of security provided through a coupling connector 110 attached to an electronic device 102. Security apparatus 100 is configured to enable a set of predetermined security measures to be performed by electronic device 102 in response to detecting the removal or severance of security apparatus 100. In addition to deterring the theft of electronic device 102, the illustrative embodiments provide additional security for the data stored on electronic device 102 through means of, but not limited to, encrypting the data, password lock-out, and/or initiating a system lockout.