The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further purposes and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying figures, wherein:
Referring now to the figures, and in particular, referring to
As illustrated, exemplary network 100 includes a collection of laptops 102a-e, which is coupled by wireless connections 104a-e. In a preferred embodiment of the present invention, wireless connection 104a-e are implemented by infrared transmitters and receivers. Those with skill in the art will appreciate that wireless connections 104a-e may be implemented by any type of wireless connection including, but not limited to IEEE 802.11x, Ethernet, etc.
In a preferred embodiment of the present invention, network adapter may be implemented by any type of wireless communication adapter, such as an Ethernet or IEEE 802.11x adapter. Infrared adapter 216 maintains wireless connections 104a-e between laptops 102a-e, controlled by security manager 220, which is stored within system memory 206. The interaction between security manager 220, infrared adapter 216, network adapter 214, and security manager 220 will be discussed herein in more detail in conjunction with
After the desired network topology has been established, the process continues to step 304, which depicts security manager 220 entering a lock down mode, which detects any variations or disruptions in the network configuration that differs from the earlier-established topology. The process proceeds to step 306, which illustrates security manager 220 determining if a disruption has been detected.
If a disruption has not been detected, the process continues to step 308, which depicts security manager 220 determining if a command to unlock network 100 has been received from a user. If an unlock command has not been received, the process returns to step 306 and proceeds in an iterative fashion. Returning to step 308, if an unlock command has been received, the process continues to step 311, which illustrates security manager 220 unlocking network 100. The process then ends, as depicted at step 312.
Returning to step 306, if a disruption to the established topology is detected, the process proceeds to step 310, which illustrates security manager 220 issuing an alarm and forwarding a disruption notice to other laptops 102a-e in network 100. In a preferred embodiment of the present invention, the alarm may include: all laptops in the arrangement issuing audible alarms, instant messages and/or email messages are immediately forwarded to a third party, if network connections via network adapter 214 are available, a shutdown of laptops 102a-e, locking the desktops of laptops 102a-e, and/or scrambling the contents of the hard disk drive. The process then ends, as illustrated in step 312.
As discussed, the present invention includes a method, system, and computer-usable medium for laptop security. In a preferred embodiment of the present invention, a security manager establishes a desired network topology with a collection of laptops, wherein each of the collection of laptops communicates with other laptops within the collection of laptops utilizing a wireless connection. In response to establishing the desired network topology, the security manager causes the plurality of laptops to enter a lock down state. In response to detecting that a disruption in communication has occurred, the security manager issues an alarm.
It should be understood that at least some aspects of the present invention may alternatively be implemented in a computer-usable medium that contains a program product. Programs defining functions in the present invention can be delivered to a data storage system or a computer system via a variety of signal-bearing media, which include, without limitation, non-writable storage media (e.g., CD-ROM), writable storage media (e.g., hard disk drive, read/write CD-ROM, optical media), system memory, such as, but not limited to Random Access Memory (RAM), and communication media, such as computer and telephone networks including Ethernet, the Internet, wireless networks, and like network systems. It should be understood, therefore, that such signal-bearing media, when carrying or encoding computer-readable instructions that direct method functions in the present invention, represent alternative embodiments of the present invention. Further, it is understood that the present invention may be implemented by a system having means in the form of hardware, software, or a combination of software and hardware as described herein or their equivalent.
While the present invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention. Furthermore, as utilized in the specification and the appended claims, the term “computer” or “system” or “computer system” or “computing device” includes any data processing system including, but not limited to, personal computers, servers, workstations, network computers, mainframe computers, routers, switches, personal digital assistants (PDAs), telephones, and any other system capable of processing, transmitting, receiving, capturing, and/or storing data.