1. Technical Field
The present invention is related generally to anti-theft devices for computer equipment. Specifically, the present invention is directed to a cable lock system that may be unlocked by a computer.
2. Description of the Related Art
As computer equipment has become smaller and increasingly portable, the problem of equipment theft has become a greater concern. A number of security devices exist in the art for preventing the theft of computer equipment. One particular type of device that is frequently used is a cable lock apparatus. U.S. Patent Grant MURRAY et al. (U.S. Pat. No. 5,502,989) 1996-4-2 provides examples of typical cable lock devices as exist in the art.
One common configuration for a cable lock device, as known in the art, is presented in
Another cable lock device that is commonly employed in conjunction with notebook computers and other highly portable devices is shown in
Returning now to
While the devices shown in
In practice, this regular reliance on a physical key tends to lead to security compromises. Specifically, the need to use a key on a frequent basis requires that the user not lose or misplace the key, or else the cable lock cannot be unlocked and the equipment may not be removed when necessary. Rather than keeping up with a separate key, then, some users may, for the sake of convenience, leave the key in the keyhole of the cable lock or otherwise attach the key to the cable lock itself. In particular, a corporate user with a company-issued notebook computer may be required to utilize a cable lock at work, as company policy, but may be more motivated by convenience than by preventing theft of company-owned equipment. This practice of leaving the key in the lock, however, essentially defeats the purpose of the cable lock in the first place, and is an unacceptable security risk.
Thus, what is needed is a cable lock apparatus which prevents security compromises by user practices such as leaving the key in the lock. The present invention provides a solution to this and other problems, and offers other advantages over previous solutions.
Accordingly, a preferred embodiment of the present invention is directed to a cable lock apparatus that is operated by the computer equipment that the apparatus is intended to protect, rather than by a key. According to this preferred embodiment, the cable lock is equipped with a hot-swappable computer interface, such as a Universal Serial Bus (USB) interface, for connecting to the computer. The user of the computer unlocks the cable lock by providing a password or other form of authentication to the computer. The computer transmits this authentication information, via the USB interface, to circuitry within the cable lock device, which validates the authentication information. If the authentication information validates properly, the cable lock device circuitry activates a motor or solenoid to mechanically release the cable lock.
The foregoing is a summary and thus contains, by necessity, simplifications, generalizations, and omissions of detail; consequently, those skilled in the art will appreciate that the summary is illustrative only and is not intended to be in any way limiting. Other aspects, inventive features, and advantages of the present invention, as defined solely by the claims, will become apparent in the non-limiting detailed description set forth below.
The present invention may be better understood, and its numerous objects, features, and advantages made apparent to those skilled in the art by referencing the accompanying drawings, wherein
The following is intended to provide a detailed description of an example of the invention and should not be taken to be limiting of the invention itself. Rather, any number of variations may fall within the scope of the invention, which is defined in the claims following the description.
Cable lock device 600 has an attached USB (Universal Serial Bus) cable 606, which may be used to connect cable lock device 600 to an available USB port on a host computer system. The USB interface standard is particularly suited for use in an embodiment of the present invention, because USB devices are “hot swappable.” This means that a USB device may be connected to or disconnected from a host computer system without disrupting the operation of the host. In general, computer systems that utilize hot swappable interfaces such as USB are capable of detecting when a device has been connected. In a preferred embodiment of the present invention, the act of connecting USB cable 606 to a USB port on a running computer system is detected by the operating system of the host computer system. The operating system then causes software (such as a device driver) to execute to prompt the user to enter a password to either lock or unlock device 600 (by manipulating plug 604). Once cable lock device 600 is either locked or unlocked, as desired, USB cable 606 may be unplugged from the host computer's USB port.
In an alternative mode of operation, USB cable 606 may be left plugged into the host computer. In this alternative mode, the software that prompts the user to enter a password is executed in response to either the user's issuing a command to the host computer to execute the software or the user's actuating lock/unlock request switch 608, which is mounted on cable lock device 600. Cable lock device 600 also includes its own USB port 610. This allows cable lock device 600 to be continuously plugged into the host computer, but without sacrificing an additional USB port. USB port 610 takes the place of the USB port that is occupied by USB cable 606.
One of ordinary skill in the art will also recognize that an embodiment of the present invention may take other forms. For example, the computer-controlled, password-protected unlocking employed by cable lock device 600 may be integrated into a padlock-style cable lock device, such as that depicted in
One of ordinary skill in the art will recognize that embodiments of the present invention are not limited to the use of a USB interface, but may employ any of a number of computer-to-device interfaces without departing from the scope and spirit of the present invention. For example, the IEEE-1374 standard (commonly referred to in the industry as “FireWire”) is another hot-swappable interface standard that may be used instead of USB. In addition, one of ordinary skill in the art will recognize that it is also possible to construct an embodiment of the present invention using a non-hot-swappable interface. Moreover, other non-electrical interfaces, such as optical or wireless interfaces may be used in an embodiment of the present invention, without departing from the scope and spirit of the present invention. For example, some computer systems employ short-range wireless interfaces, such as the BLUETOOTH industry standard or one of the various IEEE (Institute of Electrical and Electronics Engineers) 802.11 standards for ad hoc wireless networking, for connecting a host computer to peripheral devices.
A software component 706 resides on host computer 700 and is used to obtain authenticating information from a user. In a preferred embodiment, this authenticating information is a password, although other sources of authenticating information, such as a code stored on a smart card, may be employed as well.
In this preferred embodiment, software component 706 is invoked in response to a determination that USB peripheral 702 has been connected to host computer 700 (e.g., via USB connection 704). For example, software component 706 may be contained within device driver code that is invoked by an operating system residing on host computer 700 in response to USB peripheral 702's first being physically connected to host computer 700. Component 706, once invoked, may display a message or prompt such as dialog box 800 in
Whatever authenticating information is received by component 706 is transmitted over USB connection 704 to USB peripheral 702, where a validation circuitry 708 validates the authenticating information received based upon additional information stored in non-volatile memory of USB peripheral 702. In this preferred embodiment, a received password is compared to a stored password 710, however, other forms of authentication/validation are well known and available to those skilled in the art and may be employed within an embodiment of the present invention without limitation and without departing from the scope and spirit thereof. The reader is directed to Chapter 10 (pp. 385-424) of MENEZES et al. Handbook of Applied Cryptography. Boca Raton, Fla.: CRC Press, 1997, ISBN 0-8493-8523-7 for a discussion of various authentication schemes known and available to those skilled in the art.
Should the authenticating information provided to USB peripheral 702 pass the validation performed by validation component 708, a lock activation software component 712 is then executed. Lock activation component 712 contains program code for activating the mechanical mechanism for unlocking the cable lock.
In a preferred embodiment, a software component 716 may be used to program USB peripheral 702 with a new password. Software component 716 may comprise a part of the operating system of host computer 700 or it may exist as a separate executable application. A user directs host computer 700 to execute software component 716, which, after authenticating the user (using existing password 710), allows the user to enter a new password to be transmitted to USB peripheral 702 over USB connection 704.
USB client interface feeds into a USB adapter/hub component 1002, which is preferably implemented either as a portion of a monolithic integrated circuit or as a separate integrated circuit (IC) itself. A number of USB adapter ICs are available from various vendors. USB adapter/hub 1002 translates the USB interface signals from client interface 1000 into signals that are compatible with embedded processor/microcontroller 1006. USB adapter/hub 1002 may also provide an additional USB host interface 1004 to allow additional USB peripherals (such as a mouse, for example) to be connected to USB adapter/hub 1002. In the manner, the cable lock device described in
Embedded processor/microcontroller 1006 is an embedded computer system that executes software for validating authentication information and initiating the mechanical unlock procedure. The process described in
Embedded processor/microcontroller 1006 is configured to activate and/or control motor/solenoid control/interface circuitry 1008. Motor/solenoid control/interface circuitry 1008 is the electrical/electronic circuitry used to activate a solenoid 1010, motor 1012, or other electromechanical device. (depending on the particular embodiment) used to mechanically unlock the cable lock itself. A solenoid, such as solenoid 1010 consists of a coiled wire within which a rod or pin constructed of a ferromagnetic material positioned. When electrical current is applied to solenoid 1010, the rod or pin is caused to retract, thus releasing the lock (this mechanism may be used in a padlock-type cable lock device, such as is depicted in
PCI bus 1114 provides an interface for a variety of devices that are shared by host processor(s) 1100 and Service Processor 1116 including, for example, flash memory 1118. PCI-to-ISA bridge 1135 provides bus control to handle transfers between PCI bus 1114 and ISA bus 1140, universal serial bus (USB) functionality 1145, power management functionality 1155, and can include other functional elements not shown, such as a real-time clock (RTC), DMA control, interrupt support, and system management bus support. Nonvolatile RAM 1120 is attached to ISA Bus 1140. Service Processor 1116 includes JTAG and I2C buses 1122 for communication with processor(s) 1100 during initialization steps. JTAG/I2C buses 1122 are also coupled to L2 cache 1104, Host-to-PCI bridge 1106, and main memory 1108 providing a communications path between the processor, the Service Processor, the L2 cache, the Host-to-PCI bridge, and the main memory. Service Processor 1116 also has access to system power resources for powering down information handling device 1101.
Peripheral devices and input/output (I/O) devices can be attached to various interfaces (e.g., parallel interface 1162, serial interface 1164, keyboard interface 1168, and mouse interface 1170 coupled to ISA bus 1140. Alternatively, many I/O devices can be accommodated by a super I/O controller (not shown) attached to ISA bus 1140.
In order to attach computer system 1101 to another computer system to copy files over a network, LAN card 1130 is coupled to PCI bus 1110. Similarly, to connect computer system 1101 to an ISP to connect to the Internet using a telephone line connection, modem 1175 is connected to serial port 1164 and PCI-to-ISA Bridge 1135.
While the computer system described in
One of the preferred implementations of the invention is a client application, namely, a set of instructions (program code) or other functional descriptive material in a code module that may, for example, be resident in the random access memory of the computer. Until required by the computer, the set of instructions may be stored in another computer memory, for example, in a hard disk drive, or in a removable memory such as an optical disk (for eventual use in a CD ROM) or floppy disk (for eventual use in a floppy disk drive), or downloaded via the Internet or other computer network. Thus, the present invention may be implemented as a computer program product for use in a computer. In addition, although the various methods described are conveniently implemented in a general purpose computer selectively activated or reconfigured by software, one of ordinary skill in the art would also recognize that such methods may be carried out in hardware, in firmware, or in more specialized apparatus constructed to perform the required method steps. Functional descriptive material is information that imparts functionality to a machine. Functional descriptive material includes, but is not limited to, computer programs, instructions, rules, facts, definitions of computable functions, objects, and data structures.
While particular embodiments of the present invention have been shown and described, it will be obvious to those skilled in the art that, based upon the teachings herein, changes and modifications may be made without departing from this invention and its broader aspects. Therefore, the appended claims are to encompass within their scope all such changes and modifications as are within the true spirit and scope of this invention. Furthermore, it is to be understood that the invention is solely defined by the appended claims. It will be understood by those with skill in the art that if a specific number of an introduced claim element is intended, such intent will be explicitly recited in the claim, and in the absence of such recitation no such limitation is present. For non-limiting example, as an aid to understanding, the following appended claims contain usage of the introductory phrases “at least one” and “one or more” to introduce claim elements. However, the use of such phrases should not be construed to imply that the introduction of a claim element by the indefinite articles “a” or “an” limits any particular claim containing such introduced claim element to inventions containing only one such element, even when the same claim includes the introductory phrases “one or more” or “at least one” and indefinite articles such as “a” or “an;” the same holds true for the use in the claims of definite articles.