[go: up one dir, main page]

GB2310750A - Security system for networked computers - Google Patents

Security system for networked computers Download PDF

Info

Publication number
GB2310750A
GB2310750A GB9604217A GB9604217A GB2310750A GB 2310750 A GB2310750 A GB 2310750A GB 9604217 A GB9604217 A GB 9604217A GB 9604217 A GB9604217 A GB 9604217A GB 2310750 A GB2310750 A GB 2310750A
Authority
GB
United Kingdom
Prior art keywords
computers
network
scheme
security
status
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9604217A
Other versions
GB9604217D0 (en
Inventor
Christopher John Purchase
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB9604217A priority Critical patent/GB2310750A/en
Publication of GB9604217D0 publication Critical patent/GB9604217D0/en
Publication of GB2310750A publication Critical patent/GB2310750A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Alarm Systems (AREA)

Abstract

A scheme to effect the security of computers that are connected together to form a network wherein, the appropriate items of hardware having initially been placed in an operational state rather than being switched off, the status of selected computers that are connected to the network are monitored. Various messages relating to the status of the selected computers are passed via the network. One or more actions, such as summoning human assistance, may be taken automatically when conditions occur that may indicate that one or more of the computers, or their components, are subject to theft, unauthorised modification, or both. The constituent parts of the security scheme may be implemented on different computers in the network. Similarly, the constituent parts of the security scheme may be duplicated on different computers in the network.

Description

SECURITY SCHEME FOR NETWORKED COMPUTERS This invention relates to a scheme to effect the security of computers that are connected together in a network.
Computers are increasingly becoming the target of thieves. Both complete computers and their component parts are regularly stolen. Often, computers are specifically designed to make addition and removal of their component parts easy. Once component parts have been stolen, even if they are subsequently recovered, return to the righfful owner is difficult because some component parts bear no serial number.
Furthermore, even if the component parts are seriaWnumbered, those serial numbers are seldom recorded by the owner. Therefore it is preferable to guard against theft.
Another increasing threat to computers is the making, often by legitimate users, of unauthorised modifications. Such modifications may include the removal or addition of component parts; this may be indicative of undesirable events, including the installation of unauthorised software. Therefore, particularly in a commercial environment, the person who is ultimately responsible for the computer will wish to know of such modifications.
Current measures to secure computers and their component parts against theft and unauthorised modification concentrate on two main areas. Firstly, various steps may be taken to protect the location containing the computers, such as: locks; alarm systerns; TV surveillance; and human guards. Secondly, the computers and their component parts may be protected in various ways, such as: physically attaching the computer to an item of furniture, or the fabric of the building; impeding access to the intemal components of the computer; or fitting an alarm to the computer.
According to the present invention there is provided a scheme to effect the security of computers that are connected together to form a network. Prerequisite to the operation of the scheme is that appropriate items of hardware are initially placed in an operational state, rather than being switched off. The scheme then operates by: monitoring regularly the status of selected computers that are connected to the network; passing, via the network, various messages relating to the status of those computers; and taking automatic action when particular conditions occur.
The essential features of the present invention are that a network of computers monitor each other and initiate actions when one or more of them are under threat.
A specific embodiment of the invention will now be described by way of example.
For this example there is a preexisting computer network, comprising hardware and software. The hardware includes: the computers to be protected; the network interface in each computer; and the communications that connect those network interfaces together. These communications may include cables, optical fibres, radio links, and telecommunications links. The software includes a protocol and one or more network operating systems, which together allow the invention to pass messages between its component parts.
In this embodiment the invention is described in four parts: the Look-out, the Monitor, the Filter and the Alarm. The parts pass various messages to each other. Each part runs on a computer that is connected to the network. The four parts may each run on a separate computer, or two or more parts may run on the same computer. When any two parts that need to communicate via messages run on different computers, those messages are passed between them via the network.
The Look-out is a program which runs on each computer that has been selected for protection. The Look-out determines various information about the hardware of the computer on which it is running, such as: quantity of memory installed; number and type of peripherals present; type and speed of prooessor. The Look-out periodically sends a Monitor Message containing status information to the Monitor.
The Monitor receives Monitor Messages from each Look-out, and sends Filter Messages to the Filter. The first time a Monitor Message is received from a particular Look-out, the Monitor records the contents and sends a Filter Message to the Filter.
Each time a subsequent Monitor Message is received from a particular Look-out, the Monitor compares it with the corresponding preceding message. Provided there has been no change in status, the Monitor notes the arrival of the message but takes no further action. However, if the message represents a change in status, the Monitor again records the message contents and passes a Filter Message to the Filter.
In respect of each Look-out from which it has received a Monitor Message, the Monitor periodically checks for receipt of a subsequent message and, if no such message has been received, a Filter Message is sent to the Filter.
The Filter receives Filter Messages from the Monitor and, according to pre-set and adjustable rules, sends Alarm Messages to the Alarm. Conditions under which an Alarm Message would be sent could include some or all of: a Look-out detected a change in the quantity of memory installed in a computer; a Look-out detected a change to a computer's peripheral hardware; a Monitor reported no message received from a previously active Look-out.
The Alarm receives Alarm Messages from the Filter. According to pre-set and adjustable rules, and depending on the hardware installed in the computer on which it is running, the Alarm takes actions that could include some or all of writing messages to a log-file; printing information; sounding an alarm; making a telephone call to one or more pre-determined numbers, and delivering an appropriate message.
Optionally, and for additional security, the functions of the Monitor, the Filter and the Alarm may be duplicated on one or more computers in the network. Optionally, and for additional security, any computer that is fulfilling the function of Monitor, Filter or Alarm may also function as a Look-out. Optionally, and for additional security, receipt of some or all of the Monitor, Filter and Alarm messages may be acknowledged.

Claims (4)

1. A scheme to effect the security of computers that are connected together to form a network wherein, the appropriate items of hardware having initially been placed in an operational state rather than being switched off, the status of selected computers that are connected to the network are regularly monitored. The passing, via the network, of various messages relating to the status of the selected computers. The automatic taking of one or more actions when conditions occur that may indicate that one or more of the computers are subject to theft, unauthorised modification, or both. The automatic taking of one or more actions when conditions occur that may indicate that one or more component parts of one or more of the computers are subject to theft, unauthorised modification, or both.
2. A scheme as claimed in Claim 1 wherein one or more parts of the security scheme are implemented on different computers in the network.
3. A scheme as claimed in Claim 1 and Claim 2 wherein one or more parts of the security scheme are duplicated on different computers in the network.
4. A scheme to effect the security of computers substantially as described herein.
GB9604217A 1996-02-28 1996-02-28 Security system for networked computers Withdrawn GB2310750A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9604217A GB2310750A (en) 1996-02-28 1996-02-28 Security system for networked computers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9604217A GB2310750A (en) 1996-02-28 1996-02-28 Security system for networked computers

Publications (2)

Publication Number Publication Date
GB9604217D0 GB9604217D0 (en) 1996-05-01
GB2310750A true GB2310750A (en) 1997-09-03

Family

ID=10789553

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9604217A Withdrawn GB2310750A (en) 1996-02-28 1996-02-28 Security system for networked computers

Country Status (1)

Country Link
GB (1) GB2310750A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004090828A1 (en) * 2003-04-08 2004-10-21 Farnway Limited Remote protection system
US7356835B2 (en) 2003-08-26 2008-04-08 Mitel Networks Corporation Security monitor for PDA attached telephone

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5406260A (en) * 1992-12-18 1995-04-11 Chrimar Systems, Inc. Network security system for detecting removal of electronic equipment
US5432715A (en) * 1992-06-29 1995-07-11 Hitachi, Ltd. Computer system and monitoring method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5432715A (en) * 1992-06-29 1995-07-11 Hitachi, Ltd. Computer system and monitoring method
US5406260A (en) * 1992-12-18 1995-04-11 Chrimar Systems, Inc. Network security system for detecting removal of electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004090828A1 (en) * 2003-04-08 2004-10-21 Farnway Limited Remote protection system
US7356835B2 (en) 2003-08-26 2008-04-08 Mitel Networks Corporation Security monitor for PDA attached telephone

Also Published As

Publication number Publication date
GB9604217D0 (en) 1996-05-01

Similar Documents

Publication Publication Date Title
US11688274B2 (en) System and method for alarm signaling during alarm system destruction
US6353385B1 (en) Method and system for interfacing an intrusion detection system to a central alarm system
US6087937A (en) Security device
US7531007B2 (en) Security apparatus using a telecommunication device
US20030128115A1 (en) Method and apparatus for improving premises-line call availability in an alarm system
US6111505A (en) Security system
Barrus et al. A distributed autonomous-agent network-intrusion detection and response system
US20020095490A1 (en) System and method for providing configurable security monitoring utilizing an integrated information portal
US6014746A (en) Workstation lock and alarm system
JPH0325820B2 (en)
JPH08235453A (en) System for protecting goods from theft
CN102622818A (en) All-directional intelligent monitoring method for bank ATMs
EP0850441B1 (en) Method of monitoring a computer system
CN112231781A (en) An edge computing server anti-theft method and server
GB2310750A (en) Security system for networked computers
CN101848117A (en) Illegal external connection monitoring method and system thereof
JP2002109229A (en) Security insurance supporting system
KR101042368B1 (en) Security system and control method
RU2267814C1 (en) Alarm signaling system for protection of real estate objects
RU2269818C1 (en) Burglar alarm system for real estate objects
Barrus Intrusion Detection in Real Time in a Multi-Mode, Multi-Host Environment.
KR20070008804A (en) Host based security system and security service provision method using same
CN110930109A (en) Information safety system based on social surface monitoring
Ingram Autonomous agents for distributed intrusion detection in a multi-host environment
JPH10116391A (en) Master/slave security system

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)