GB2310750A - Security system for networked computers - Google Patents
Security system for networked computers Download PDFInfo
- Publication number
- GB2310750A GB2310750A GB9604217A GB9604217A GB2310750A GB 2310750 A GB2310750 A GB 2310750A GB 9604217 A GB9604217 A GB 9604217A GB 9604217 A GB9604217 A GB 9604217A GB 2310750 A GB2310750 A GB 2310750A
- Authority
- GB
- United Kingdom
- Prior art keywords
- computers
- network
- scheme
- security
- status
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Alarm Systems (AREA)
Abstract
A scheme to effect the security of computers that are connected together to form a network wherein, the appropriate items of hardware having initially been placed in an operational state rather than being switched off, the status of selected computers that are connected to the network are monitored. Various messages relating to the status of the selected computers are passed via the network. One or more actions, such as summoning human assistance, may be taken automatically when conditions occur that may indicate that one or more of the computers, or their components, are subject to theft, unauthorised modification, or both. The constituent parts of the security scheme may be implemented on different computers in the network. Similarly, the constituent parts of the security scheme may be duplicated on different computers in the network.
Description
SECURITY SCHEME FOR NETWORKED COMPUTERS
This invention relates to a scheme to effect the security of computers that are connected together in a network.
Computers are increasingly becoming the target of thieves. Both complete computers and their component parts are regularly stolen. Often, computers are specifically designed to make addition and removal of their component parts easy. Once component parts have been stolen, even if they are subsequently recovered, return to the righfful owner is difficult because some component parts bear no serial number.
Furthermore, even if the component parts are seriaWnumbered, those serial numbers are seldom recorded by the owner. Therefore it is preferable to guard against theft.
Another increasing threat to computers is the making, often by legitimate users, of unauthorised modifications. Such modifications may include the removal or addition of component parts; this may be indicative of undesirable events, including the installation of unauthorised software. Therefore, particularly in a commercial environment, the person who is ultimately responsible for the computer will wish to know of such modifications.
Current measures to secure computers and their component parts against theft and unauthorised modification concentrate on two main areas. Firstly, various steps may be taken to protect the location containing the computers, such as: locks; alarm systerns; TV surveillance; and human guards. Secondly, the computers and their component parts may be protected in various ways, such as: physically attaching the computer to an item of furniture, or the fabric of the building; impeding access to the intemal components of the computer; or fitting an alarm to the computer.
According to the present invention there is provided a scheme to effect the security of computers that are connected together to form a network. Prerequisite to the operation of the scheme is that appropriate items of hardware are initially placed in an operational state, rather than being switched off. The scheme then operates by: monitoring regularly the status of selected computers that are connected to the network; passing, via the network, various messages relating to the status of those computers; and taking automatic action when particular conditions occur.
The essential features of the present invention are that a network of computers monitor each other and initiate actions when one or more of them are under threat.
A specific embodiment of the invention will now be described by way of example.
For this example there is a preexisting computer network, comprising hardware and software. The hardware includes: the computers to be protected; the network interface in each computer; and the communications that connect those network interfaces together. These communications may include cables, optical fibres, radio links, and telecommunications links. The software includes a protocol and one or more network operating systems, which together allow the invention to pass messages between its component parts.
In this embodiment the invention is described in four parts: the Look-out, the Monitor, the Filter and the Alarm. The parts pass various messages to each other. Each part runs on a computer that is connected to the network. The four parts may each run on a separate computer, or two or more parts may run on the same computer. When any two parts that need to communicate via messages run on different computers, those messages are passed between them via the network.
The Look-out is a program which runs on each computer that has been selected for protection. The Look-out determines various information about the hardware of the computer on which it is running, such as: quantity of memory installed; number and type of peripherals present; type and speed of prooessor. The Look-out periodically sends a Monitor Message containing status information to the Monitor.
The Monitor receives Monitor Messages from each Look-out, and sends Filter
Messages to the Filter. The first time a Monitor Message is received from a particular
Look-out, the Monitor records the contents and sends a Filter Message to the Filter.
Each time a subsequent Monitor Message is received from a particular Look-out, the
Monitor compares it with the corresponding preceding message. Provided there has been no change in status, the Monitor notes the arrival of the message but takes no further action. However, if the message represents a change in status, the Monitor again records the message contents and passes a Filter Message to the Filter.
In respect of each Look-out from which it has received a Monitor Message, the
Monitor periodically checks for receipt of a subsequent message and, if no such message has been received, a Filter Message is sent to the Filter.
The Filter receives Filter Messages from the Monitor and, according to pre-set and adjustable rules, sends Alarm Messages to the Alarm. Conditions under which an
Alarm Message would be sent could include some or all of: a Look-out detected a change in the quantity of memory installed in a computer; a Look-out detected a change to a computer's peripheral hardware; a Monitor reported no message received from a previously active Look-out.
The Alarm receives Alarm Messages from the Filter. According to pre-set and adjustable rules, and depending on the hardware installed in the computer on which it is running, the Alarm takes actions that could include some or all of writing messages to a log-file; printing information; sounding an alarm; making a telephone call to one or more pre-determined numbers, and delivering an appropriate message.
Optionally, and for additional security, the functions of the Monitor, the Filter and the
Alarm may be duplicated on one or more computers in the network. Optionally, and for additional security, any computer that is fulfilling the function of Monitor, Filter or
Alarm may also function as a Look-out. Optionally, and for additional security, receipt of some or all of the Monitor, Filter and Alarm messages may be acknowledged.
Claims (4)
1. A scheme to effect the security of computers that are connected together to form a
network wherein, the appropriate items of hardware having initially been placed in
an operational state rather than being switched off, the status of selected
computers that are connected to the network are regularly monitored. The passing,
via the network, of various messages relating to the status of the selected
computers. The automatic taking of one or more actions when conditions occur that
may indicate that one or more of the computers are subject to theft, unauthorised
modification, or both. The automatic taking of one or more actions when conditions
occur that may indicate that one or more component parts of one or more of the
computers are subject to theft, unauthorised modification, or both.
2. A scheme as claimed in Claim 1 wherein one or more parts of the security scheme
are implemented on different computers in the network.
3. A scheme as claimed in Claim 1 and Claim 2 wherein one or more parts of the
security scheme are duplicated on different computers in the network.
4. A scheme to effect the security of computers substantially as described herein.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB9604217A GB2310750A (en) | 1996-02-28 | 1996-02-28 | Security system for networked computers |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB9604217A GB2310750A (en) | 1996-02-28 | 1996-02-28 | Security system for networked computers |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB9604217D0 GB9604217D0 (en) | 1996-05-01 |
| GB2310750A true GB2310750A (en) | 1997-09-03 |
Family
ID=10789553
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB9604217A Withdrawn GB2310750A (en) | 1996-02-28 | 1996-02-28 | Security system for networked computers |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2310750A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004090828A1 (en) * | 2003-04-08 | 2004-10-21 | Farnway Limited | Remote protection system |
| US7356835B2 (en) | 2003-08-26 | 2008-04-08 | Mitel Networks Corporation | Security monitor for PDA attached telephone |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5406260A (en) * | 1992-12-18 | 1995-04-11 | Chrimar Systems, Inc. | Network security system for detecting removal of electronic equipment |
| US5432715A (en) * | 1992-06-29 | 1995-07-11 | Hitachi, Ltd. | Computer system and monitoring method |
-
1996
- 1996-02-28 GB GB9604217A patent/GB2310750A/en not_active Withdrawn
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5432715A (en) * | 1992-06-29 | 1995-07-11 | Hitachi, Ltd. | Computer system and monitoring method |
| US5406260A (en) * | 1992-12-18 | 1995-04-11 | Chrimar Systems, Inc. | Network security system for detecting removal of electronic equipment |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004090828A1 (en) * | 2003-04-08 | 2004-10-21 | Farnway Limited | Remote protection system |
| US7356835B2 (en) | 2003-08-26 | 2008-04-08 | Mitel Networks Corporation | Security monitor for PDA attached telephone |
Also Published As
| Publication number | Publication date |
|---|---|
| GB9604217D0 (en) | 1996-05-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11688274B2 (en) | System and method for alarm signaling during alarm system destruction | |
| US6353385B1 (en) | Method and system for interfacing an intrusion detection system to a central alarm system | |
| US6087937A (en) | Security device | |
| US7531007B2 (en) | Security apparatus using a telecommunication device | |
| US20030128115A1 (en) | Method and apparatus for improving premises-line call availability in an alarm system | |
| US6111505A (en) | Security system | |
| Barrus et al. | A distributed autonomous-agent network-intrusion detection and response system | |
| US20020095490A1 (en) | System and method for providing configurable security monitoring utilizing an integrated information portal | |
| US6014746A (en) | Workstation lock and alarm system | |
| JPH0325820B2 (en) | ||
| JPH08235453A (en) | System for protecting goods from theft | |
| CN102622818A (en) | All-directional intelligent monitoring method for bank ATMs | |
| EP0850441B1 (en) | Method of monitoring a computer system | |
| CN112231781A (en) | An edge computing server anti-theft method and server | |
| GB2310750A (en) | Security system for networked computers | |
| CN101848117A (en) | Illegal external connection monitoring method and system thereof | |
| JP2002109229A (en) | Security insurance supporting system | |
| KR101042368B1 (en) | Security system and control method | |
| RU2267814C1 (en) | Alarm signaling system for protection of real estate objects | |
| RU2269818C1 (en) | Burglar alarm system for real estate objects | |
| Barrus | Intrusion Detection in Real Time in a Multi-Mode, Multi-Host Environment. | |
| KR20070008804A (en) | Host based security system and security service provision method using same | |
| CN110930109A (en) | Information safety system based on social surface monitoring | |
| Ingram | Autonomous agents for distributed intrusion detection in a multi-host environment | |
| JPH10116391A (en) | Master/slave security system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |