WO2003071546A1 - Computer alarm - Google Patents

Computer alarm Download PDF

Info

Publication number
WO2003071546A1
WO2003071546A1 PCT/IL2003/000104 IL0300104W WO03071546A1 WO 2003071546 A1 WO2003071546 A1 WO 2003071546A1 IL 0300104 W IL0300104 W IL 0300104W WO 03071546 A1 WO03071546 A1 WO 03071546A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm device
alarm
computer
previous
alert
Prior art date
Application number
PCT/IL2003/000104
Other languages
French (fr)
Inventor
Oded Melinek
Original Assignee
Oded Melinek
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oded Melinek filed Critical Oded Melinek
Priority to AU2003206113A priority Critical patent/AU2003206113A1/en
Publication of WO2003071546A1 publication Critical patent/WO2003071546A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • G08B13/1418Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B33/00Constructional parts, details or accessories not provided for in the other groups of this subclass
    • G11B33/005Means for locking the disc or cassette receiving slot, e.g. dummy cassettes locked in the slot

Definitions

  • the present invention relates generally to alarm systems and specifically to alarm systems to protect computers. BACKGROUND OF THE INVENTION
  • Devices comprising conventional cable locks securing a computer to a larger body for example a table or floor, are commonly used. Also metal cages for computers are commonly used. Once a thief overcomes, these devices for example by cutting the cable or breaking the lock they lose their effectiveness. These devices further commonly require installation by a craftsman and are an annoyance for cleaners and repair technicians.
  • U.S patent 5,983,679 describes a portable anti-theft locking anchor to secure computer equipment.
  • U.S. patent 5,673,573 describes an anti tamper device for use with apparatus of the type having a slot for receiving a component needed in use, for example a car radio-cassette player.
  • U.S. patent 5,258,746 describes a personal alarm that can be manually actuated to produce a high intensity sonic alarm signal.
  • An aspect of some embodiments of the invention relates to an alarm device that is at least partially inside a computer housing.
  • the alarm device is inserted via a standard opening of the housing, which is common to many computers, for example, a diskette drive slot, a card slot or a fan grille.
  • the alarm when the alarm is triggered it sounds an audible alarm to call attention to it and/or otherwise notify the owner that the computer is being tampered with.
  • the alarm device is configured so that while it is activated it cannot be removed without breaking the computer or taking it apart.
  • the degree of force required to remove the device is expected to require a considerable time to apply (which many thieves do not have) or is expected to cause considerable damage to the computer.
  • an activated alarm device is triggered by motion of the computer and/or by a change in its physical location and/or by a person getting to close to it.
  • the alarm device is controlled by a program in the computer in which it is installed.
  • the alarm device is controlled by a physical interface.
  • the alarm device is controlled by a device external to the computer in which it is installed.
  • the alarm device is comprised of a working part and an interface part.
  • the interface part is accessible from the computer exterior.
  • the working part is optionally unseen from the computer exterior and the alarm is triggered if the working part is forcefully disconnected from the user interface part.
  • an alarm device for installing in a computer including: an alarm unit that fits into a standard opening of a computer housing and is operative to generate an alert, once triggered; a sensor that generates a triggering signal for the alarm; and an input interface coupled to the alarm unit and operative to allow at least one of activation and deactivation of the alarm device.
  • an alarm device for installing in a computer including: an alarm unit adapted to be installed inside a computer housing and is operative to generate an alert, once triggered; a sensor that generates a triggering signal for the alarm; and an input interface coupled to the alarm unit and operative to allow at least one of activation and deactivation of the alarm device.
  • the alarm device is inserted into a floppy drive of a computer.
  • the alarm device is inserted into a pcmcia slot of a computer.
  • the alarm device is inserted into a ventilation opening of a computer.
  • the alarm device is inserted into an I/O port opening of a computer.
  • the alarm device is inserted into a slot on a motherboard of a computer.
  • the alarm device is glued to a panel inside the computer housing.
  • the alarm device is inserted inside the computer housing without being attached.
  • the alarm device includes an anchor which prevents the removal of the device without force when the device is activated.
  • the alert comprises sounding a loud sound.
  • the alert comprises soi ding an irritating sound.
  • the alert comprises sounding a verbal message.
  • the alert comprises emitting a bad odor.
  • the alert is performed continuously.
  • the alert is performed intermittently.
  • the alert is performed for a set amount of time from when it is triggered.
  • the alarm device is activated by the input interface.
  • the alarm device is activated by a computer in which it is installed.
  • the alarm device is activated from an external device.
  • the alarm device keeps a record of alarm triggering.
  • the sensor is motion sensitive.
  • the senor is position sensitive.
  • the alert comprises transmitting a signal.
  • the signal is wireless.
  • the signal is transmitted locally.
  • the signal includes notification of the device's location.
  • the signal is wired.
  • the alarm device includes a separate unit adapted to activate a plurality of alarm devices.
  • the alarm device includes a separate unit adapted to deactivate a plurality of alarm devices.
  • activation of the alarm device is performed with a delay.
  • the alarm device allows a grace period before triggering the alarm.
  • the alert is performed at least by a device external to the computer.
  • the alarm device is activated by a remote user via a telephone connection.
  • the alarm device is triggered by a different alarm device.
  • the interface and the unit are coupled by a weakened link, such that when the link is broken the alarm unit remains inside the housing.
  • the alarm device includes a power link to the computer.
  • the alarm device includes a data link to the computer.
  • the alarm device includes a cable that couples the alarm device to the housing.
  • the alarm device senses an on/off state of the computer.
  • the alarm device generates an alert responsive to the sensed on/off state of the computer and an activation state of the alarm.
  • FIG. 1A-1C illustrate different views of an exemplary alarm device, in accordance with an exemplary embodiment of the invention
  • FIGS. 2A-2B illustrate different views of an exemplary alarm device, in accordance with an exemplary embodiment of the invention
  • Fig. 3 is an illustration of an exemplary alarm device, in accordance with an exemplary embodiment of the invention
  • FIG. 4A-4C illustrate the deployment of different alarm devices, in accordance with an exemplary embodiment of the invention
  • FIG. 5 is an illustration of a group of computers using alarm devices, in accordance with an exemplary embodiment of the invention.
  • Fig. 6 is a flowchart of the use of an exemplary alarm device according to some embodiments of the invention.
  • Fig. 7 is an illustration of an exemplary implementation of an alarm device, in accordance with an exemplary embodiment of the invention.
  • Fig. 8 is an illustration of an exemplary implementation of an alarm device, in accordance with an exemplary embodiment of the invention.
  • FIG. 1A-1C illustrate different views of an exemplary alarm device 10, in accordance with some embodiments of the present invention.
  • Fig. 1A shows a top view of alarm device 10 illustrating functional elements which are deployed into a computer.
  • Fig. IB shows a top view of alarm device 10 illustrating functional elements when it is deployed in a computer.
  • Fig. 1C shows a front view of alarm device 10 as seen from the front of a computer when alarm device 10 is deployed.
  • alarm device 10 comprises a working part and an interface part.
  • the working part comprises a base 25 shaped like a standard floppy diskette, which is insertable into a standard floppy drive.
  • the interface part is comprised of a user interface 20 and attached to base 25.
  • user interface 20 accepts commands from a user and gives indication of the status of the alarm.
  • User interface 20 is attached to base 25 in such a way that it does not interfere with the insertion of base 25 and is accessible to a user, even when the device is inserted in a computer.
  • user interface 20 is attached to base 25 in such a way that it does not interfere with the insertion of base 25 and
  • user interface 20 is as small as a diskette topface or is omitted. In some embodiments of the invention, user interface 20 is big, for example at least half the size of base 25. Alternatively or additionally user interface 20 is comprised of a functionless plate to cover the diskette entrance and inhibit removal of alarm device 10 by force.
  • alarm device 10 is created from materials similar to those used for 3.5" floppy diskettes for example plastic.
  • Fig 4A illustrates the deployment of alarm device 10 in an exemplary embodiment of the invention.
  • alarm device 10 is inserted into a floppy drive 130 or another opening of a computer 100 and optionally, activated by a user via user interface 20.
  • alarm device 10 comprises a sensor 65, which can detect some types of attempts to tamper with or steal computer 100.
  • sensor 65 is vibration sensitive or motion sensitive, many designs of which are known in the art. A perpetrator that attempts to move an activated computer 100, will trigger alarm device 10.
  • sensor 65 is position sensitive and is triggered if computer 100 is moved more than a small distance for example 1 meter.
  • a position signal base station is provided in a different computer or elsewhere in the room, to provide a relative position for distance sensors that compare a signal or interrogate a remote unit to estimate movement and or location.
  • sensor 65 is a heat detector or uses an RF signal to detect the presence of people near computer 100.
  • alarm device 10 allows a grace period before activating an alarm in order to permit a legal user to deactivate the alarm. For example alarm device 10 may permit one minute to deactivate the alarm from the moment it detects a perpetrator.
  • alarm device 10 sounds a loud siren when triggered, which may serve to call attention to computer 100 and a bearer.
  • alarm device 10 speaks a loud verbal message, for example notifying bystanders that computer 100 is being illegally moved.
  • alarm device 10 sounds an irritating sound, which may interfere with an attempt to illegally handle computer 100.
  • alarm device 10 emits a bad odor from a cache on alarm device 10 when triggered, which may keep people away from the computer (for example in Fig. 1A instead of speaker 45).
  • Some of these alert methods may also serve to temporarily or semipermanently mark a vehicle used in transporting a stolen computer during or after the theft.
  • the action performed by alarm device 10 is performed continuously until alarm device 10 is turned off or its power runs out.
  • the action is performed intermittently for example every 3 minutes for 30 seconds. This may serve, for example, to save power with a longer lasting action and/or to meet various laws regarding alarms.
  • the action is performed intermittently with a random time pattern so that for a group of computers that were triggered some will sound an alarm while others wait. This may serve, for example to save energy and/or confuse a thief.
  • alarm device 10 stops the alarm after a set time, for example after 5 minutes, if the cause that triggered the alarm is not repeated.
  • alarm device 10 comprises one or more anchor legs 30.
  • anchor legs 30 are positioned under a diskette tab 15, in such a way that they will not damage the reading head of a diskette drive 130.
  • Anchor legs 30 are positioned on the upper or lower side of alarm device 10, or on both sides. Alternatively or additionally, one or more anchor legs may be provided at the edges of device 10.
  • a diskette release lever 135 When a diskette release lever 135 is pushed anchor legs 30 slip back under tab 15 and base 25 is ejected without resistance.
  • a lock 180 (shown in Fig. IB) prevents anchor leg 30 from returning to its original position so that base 25 cannot be removed from diskette drive 130 without first deactivating alarm device 10.
  • lock 180 may be an electro-mechanical lock or a mechanical lock and/or anchor legs 30 may be moved using a solenoid and/or during activation, rather than mechanically, during insertion.
  • a circuit 170 (shown in Fig. IB) is broken and an activated alarm device 10 will be triggered.
  • alarm device 10 is designed with a deliberate weakening 190 which is prone to break when force is exerted on alarm device 10, so that the active part of the alarm remains in the computer and is both operable and more difficult to remove.
  • Weakening 190 may be in various shapes and positions, for example in the middle of base 25 or in user interface 20.
  • the breaking if the user interface is broken off, the alarm falls silent for a while, in order to fool a thief. Alternatively, such breaking triggers the alarm.
  • the breaking may be detected, for example, by it breaking a circuit in device 10.
  • alarm device 10 comprises a power source for example a battery 60, and a sound generating device for example a speaker 45.
  • battery 60 supplies power for alarm device 10 and speaker 45 sounds an alarm.
  • user interface 20 is forcefully broken off, battery 60 and speaker 45 remain on the broken half of alarm device 10 inside computer 100 in order to sound an alarm wherever computer 100 goes.
  • a container comprising a powder or gas (not shown) is installed in alarm device 10 and a siren sound is created for example by a chemical reaction of the powder which releases a gas or by releasing a gas.
  • a sensor for example sensor 65 of alarm device 10 detects if the computer is on or off for example by detecting electromagnetic waves of a specific wavelength or vibrations or heat.
  • electronic circuits generate electromagnetic waves of different wavelengths
  • a sensor in alarm device 10 for example sensor 65 or a different sensor is trained by a user to differentiate between the on and off state of a computer 100 in which alarm device 10 is installed.
  • pressing a button or a code on user interface 20 in the on and off states of computer 100 teaches alarm device 10 to differentiate between both states by indicating what the current state is and allowing the sensor to formulate a base line for that state.
  • alarm device 10 is connected directly to computer 100 and can query computer 100 regarding the status of computer 100.
  • computer 100 stays on and the alarm may be activated, for example, by detection that for a given period of time no input has been received or based on the hour of the day.
  • alarm device 10 comprises an I/O port 90 that is connected by an I/O cable 95 inside or outside of computer 100, to an I/O port of computer 100.
  • I/O cable 95 can be connected to a USB port, parallel port, serial port or keyboard port.
  • cable 95 is connected to a dongle that is connected to an I/O port and allows use of the port for other devices in addition to alarm device 10.
  • the I/O port of computer 100 supplies power to alarm device 10 instead of battery 60 or in addition to battery 60.
  • power from an I/O port is used to recharge battery 60.
  • a connection between alarm device 10 and computer 100 support the implementation of various features, for example controlling alarm device 10 and configuring it, as will be described infra.
  • alarm device 10 interferes with the use of computer 100 and is deployed in a computer only when it is off, for example alarm device 10 may interfere with a rotational motor (not shown) of floppy drive 130 if the computer is on when alarm device 10 is deployed.
  • alarm device 10 when alarm device 10 is inserted into floppy drive 130 and computer 100 is off, the alarm is automatically activated thus simplifying activation of the device.
  • a user is required to activate the alarm so that he may choose the appropriate time for activating.
  • the computer may sense the insertion and perform an automatic power down of the computer.
  • alarm device 10 when alarm device 10 is inserted into floppy drive 130 and computer 100 is off, alarm device 10 gives an alert sound for example a beep or a periodic beep to notify or remind a user that alarm device 10 is ready to be activated.
  • an alert sound for example a beep or a periodic beep to notify or remind a user that alarm device 10 is ready to be activated.
  • alarm device 10 gives an alert sound if computer 100 is off and the alarm was not activated, possibly even if the alarm is not yet inserted into the computer.
  • user interface 20 comprises an input device 35 (Fig 1C), which is optionally used to activate and deactivate alarm device 10.
  • Input device 35 comprises a device optionally, for activating the alarm and deactivating it, for example a keypad, a mechamcal key, an electromagnetic key (such as used with automotive immobilizers), a magnetic card a contact or contactless smart card or memory card and/or a wireless receiver.
  • input device 35 is used additionally for activating and deactivating lock 180 and/or configuring parameters of alarm device 10, for example choosing alarm options such as the volume of the alarm or other options as described infra.
  • alarm device 10 is activated and/or deactivated in a method matching input device 35, for example using a mechamcal key or electromagnetic key and/or keying in a key code.
  • alarm device 10 is activated, triggered and/or deactivated by a wireless transmission for example using an electromagnetic signal or an acoustic signal sent from a different alarm device 10 or some other device such as a whistle or remote control.
  • alarm device 10 is activated and or deactivated by software. For example by turning on computer 100 and running a software program.
  • alarm device 10 is configured, controlled and/or monitored by software on computer 100, for example setting a password, setting the alarm volume or checking the battery status.
  • alarm device 10 can be activated and/or deactivated by a command given by a remote user that accesses computer 100 (for example by a dial up connection or via an Internet connection).
  • I/O cable 95 of alarm device 10 is connected (optionally temporarily) to an I/O port of a different computer than the one in which it is installed. For example to a laptop with software installed to control an alarm device 10, thus allowing a user to go from one computer to another and set parameters or activate the alarm device 10.
  • user interface 20 comprises a visual and/or audio display 40 in order to give feedback to a user, for example a level indicator of battery 60 as mentioned above, and/or an indication if alarm device 10 is activated or not.
  • display 40 comprises one or more LEDs and/or a speaker.
  • user interface 20 utilizes speaker 45 of alarm device 10.
  • display 40 is comprised of a diverse display for example series of.LED's or an LCD display.
  • alarm device 10 comprises a non- volatile memory 70 and optionally a clock 75, in order to keep a log of events for example of activation, deactivation, alarm triggering and/or alarm ceasing.
  • alarm device 10 is functional in the aperture in which it is inserted, for example a readable and writeable floppy diskette (not shown) in base 25.
  • alarm device 10 uses the floppy diskette as a hard copy device to back up memory 70. For example in an alarm that is activated and/or deactivated by software running on the same computer 100, before activation or after deactivation the contents of memory 70 are written to the floppy diskette.
  • clock 75 is set and/or synchronized with the internal clock of computer 100. Alternatively or additionally clock 75 is set by a user through input device 35 on user interface 20.
  • alarm device 10 comprises a power input connector 50 through which power is supplied to recharge battery 60.
  • battery 60 is replaced when it runs low for example after the alarm is used.
  • alarm device 10 needs to be replaced after a set amount of time, for example one year, because battery 60 (or other type of power source) or other consumable parts (for example a powder to sound an alarm as mentioned above) are used up.
  • the alarm forces its replacement, for example, by stopping to work or forcefully discharging its battery.
  • alarm device 10 is attached to computer 100 by a cable 85 ending with an adhesive pad 80 which is attached to a heavy or non moveable object near the computer (or the computer itself) in order to keep alarm device 10 near when not in use.
  • pad 80 sticks for example with a magnet or velcro to a pad 105 and pad 105 is attached with a strong attachment to computer 100 (for example with glue) as shown in Fig. 4A.
  • alarm device 10 is attached with a permanent attachment (for example screws) with cable 85 and pad 80 to a heavy or non moveable object for example a table or floor (like with a standard security cable).
  • Computer 100 can only be moved if alarm device 10 is released from computer 100 or if cable 85 is torn.
  • cable 85 comprises a closed circuit and triggers alarm device 10 if it is torn or cut when alarm device 10 is activated as is known in the art for example as described in U.S. patent 5,387,899 to DiLauro et al, of which the disclosure is incorporated herein by reference.
  • alarm device 10 is programmed to activate itself automatically according to its internal clock, for example alarm device 10 can be set to be activated between certain hours for example after work hours of an office.
  • alarm device 10 is programmed to be activated with a set or controllable time delay from the moment it is given a command to activate itself.
  • the time delay allows a user to reposition computer 100, move away from computer 100 or remove any hindrance that could trigger the alarm.
  • Another example is to allow putting a laptop computer in a safe after activating the alarm.
  • alarm device 10 is programmed with a grace period from triggering the alarm until alarm device 10 takes action, in order to allow deactivation of the alarm or repositioning of computer 100 in order to access alarm device 10 and deactivate it.
  • alarm device 10 comprises a wireless transmitter 150, for example a cellular telephone, a radio transmitter or a pager, to notify a user or a security company if alarm device 10 is triggered.
  • alarm device 10 notifies a user or security company silently without giving off a human audible sound so that a thief will not be aware that an alarm had been triggered.
  • alarm device 10 notifies a local alarm or a local box at a guard compound.
  • device 10 notifies other computers or alarms in the local area, in response to which the other alarms may be triggered and/or perform other actions, such as change their sensitivity and/or logic of response to triggering.
  • Device 10 may include circuitry for applying such logic, which may include, for example, a microprocessor, analog electronic circuitry and/or a memory.
  • an alarm action is performed (for example, an alarm is sounded or a user is notified) only when more than one alarm is triggered. This may serve to reduce false alarms.
  • a remote alarm is sounded only if a central alarm for the room is triggered in addition to alarm device 10 or if the alarms from two computers are triggered.
  • alarm device 10 works in collaboration with an alarm control program which is run on computer 100 and follows the status of alarm device 10 via a communication port as described above.
  • alarm device 10 sends a message via the Internet at a set time interval notifying a server for example at a security company that all is well.
  • a guard can be sent to check if the messages fail to come.
  • wireless transmitter 150 is used to send status notifications or alarm notifications.
  • a wireless or wired data link such as transmitter 150 or other methods described herein are used to download updated software to alarm device 10 or perform local or remote maintenance on it.
  • the uploading and/or downloading require certain passwords or a smart card authentication.
  • alarm device 10 may be electrically or datawise separated from computer 100 so that it cannot be subverted via software.
  • Fig. 5 illustrates an exemplary embodiment of the invention in which a local alarm box 160 sends and receives transmissions from one or more wireless transmitters 150 of alarm devices 10.
  • local alarm box 160 is used to activate or deactivate one or more of alarm devices 10 together or at different times. For example a room full of computers can be activated or deactivated together.
  • one computer can activate or deactivate other computers, for example by sending signals from one to another with wireless transmitter 150, or using a LAN that interconnects the host computers, for example if the computers stay on while the alarm is activated.
  • one computer 100 when one computer 100 is triggered, it notifies other computers 100 nearby that belong , to an optionally pre-selected group and the whole group triggers their alarms.
  • one computer 100 if one computer 100 is damaged or destroyed other computers 100 can act in its place. For example to notify a user or sound an alarm.
  • local alarm box 160 differentiates between different audio alarm signals of different alarm devices 10.
  • local alarm device 160 notifies different users according to the alarm that was triggered.
  • local alarm box 160 is controlled by a computer 100, for example to initiate a command to activate or deactivate a computer 100 and/or to create a list of computers to activate.
  • local alarm box 160 is connected to a standard telephone line, in order to notify in case of alarm.
  • local alarm box 160 is connected by wires to some or all of computers 100.
  • local alarm box 160 is connected on a local area network with computers 100.
  • an alarm function or functions are performed by a device external to computer 100 for example a local alarm which sounds a siren or dials a security company in response to a request by alarm device 10 in a computer 100.
  • the external alarm function is performed in addition to the functions performed by computer 100 or alarm device 10.
  • alarm device 10 comprises a GPS (global positioning system) for example in sensor 65, so that when an alarm is triggered, wireless transmitter 150 transmits the position of computer 100 or gives off a signal which can be tracked by a pursuer, for example the police, using a tracking device having for example an effective radius of up to 10 kilometers.
  • alarm device 10 may generate a beacon to be used for tracking the computer.
  • Fig. 6 is a flowchart 200 of the use of an exemplary alarm device 10 according to some embodiments of the invention.
  • alarm device 10 is inserted into a floppy drive 130, of a computer 100 (202).
  • a user keys in an activation code or turns the key on keypad or lock 35.
  • display 40 shows that alarm device 10 is activated.
  • alarm device 10 Once alarm device 10 is activated it enters a wait state (206) in which it either actively checks if the alarm was triggered (208) or if the alarm was deactivated (210).
  • alarm device 10 is automatically released from its wait state (206).
  • alarm device 10 takes actions as described above for example (212) sounding an alarm or sending a signal to a local alarm box which calls a guard to check the computer. If the alarm is deactivated (214) it exits the wait state (206) and allows the release of alarm device 10.
  • FIG. 2A-2B illustrate different views of an exemplary embodiment of the invention in which an alarm device 210 optionally comprises the same elements as alarm device 10 but is shaped like a computer card instead of a diskette.
  • Alarm device 210 like alarm device 10 comprises a base 25 and an optional user interface 20 as shown in Fig. 2 A and Fig. 2B.
  • FIG. 2 A illustrates a side view of alarm device 210 and Fig. 2B illustrates a front view showing user interface 20 of alarm device 210.
  • alarm device 210 is installed internal to computer 100 and seated in a motherboard slot 120, with optionally any standard bus connector 205 for example ISA or PCI or EISA.
  • alarm device bus connector 205 functionally replaces I/O port 90 on user interface 20 of alarm device 10 and/or power source 60.
  • alarm device 210 Alternatively or additionally both options are implemented in alarm device 210, for example in order to connect alarm device 210 to other computers or devices external to the computer in which it is installed.
  • a laptop can connect to I/O port 90 of alarm device 210 in order to activate or deactivate it.
  • bus connector 205 is non conducting and is not electrically connected to a computer motherboard 120. In this case bus connector 205 is used to hold alarm device 210 in place on computer motherboard 120.
  • Fig. 3 is an illustration of an exemplary embodiment of the invention in which is illustrated, an alarm device 310 comprising the same elements as alarm device 210.
  • Alarm device 310 is placed in the box of computer 100 and not in a computer slot 120 as with alarm device 210.
  • Fig. 4C illustrates an exemplary deployment of alarm device 310.
  • base 25 of alarm device 310 is fixed in place in the box of computer 100, for example with an adhesive material for example glue or using a magnet.
  • User interface 20 of alarm device 310 is optionally fastened with a screw as a back panel of computer 100.
  • Wires 305 connect between base 25 and user interface 20 of alarm device 310, in order to connect between interface 20 and base 25 of alarm device 310.
  • an alarm device for example alarm device 10 is constructed to fit into other openings of a computer 100 and/or past its metal housing shell, for example an alarm device with a prong or prongs which fit into an opening of a fan, or an alarm device which connects to an I/O port of a computer 100, for example a keyboard port, a USB port, a parallel port, a serial port or a pcmcia slot of a laptop or a notebook computer.
  • Fig. 8 is an illustration of an alarm device 410 with similar characteristics as alarm device 10 and designed to fit into a pcmcia slot of a laptop computer 420.
  • installation of an alarm device for example alarm device 10, 210, 310, 410 is a simple task which require no prior technical knowledge, and as can be seen in some embodiments, does not require opening computer 100 and or installing special software.
  • alarm devices 10, 210, 310, 410 comprise abase 25 without user interface 20 as described supra.
  • alarm devices 10, 210, 310, 410 are activated and deactivated by an external transmission to/from wireless transmitter 150.
  • alarm device 10 is used in conjunction with alarm device 210 or 310 or 410, such that insertion or activation of alarm device 10 activates alarm device 210 or 310 or 410 by wireless transmission either in the same computer or in a different computer with a matching transmission code.
  • an alarm device 210 or 310 or 410 is installed in a computer 100 or a plurality of computers, activation of the installed alarm devices is done by inserting an alarm device 10 into a floppy drive 130 of one of the computers 100.
  • Fig. 7 illustrates an exemplary implementation of the invention in which an alarm device 310 without a user interface 20 is used in conjunction with base 25 of an alarm device 10 without a user interface 20.
  • Alarm device 310 is placed inside a computer 100 and activated by inserting alarm device 10 into floppy drive 130 of computer 100. Deactivation is optionally performed by a transmission from another computer or from an external transmitter for example local alarm box 160 in Fig. 5, or by removing base 25 (which is (or not) locked) from floppy drive 130.
  • some functions are performed by alarm device 10 and some functions are performed by alarm device 310.
  • some functions are performed by both alarm device 310 and alarm device 10.

Abstract

An alarm device for installing in a computer, comprising, an alarm unit that fits into a standard opening of a computer housing and is operative to generate an alert, once triggered; a sensor that generates a triggering signal for the alarm; and an input interface coupled to the alarm unit and operative to allow at least one of activation and deactivation of the alarm device.

Description

COMPUTER ALARM FIELD OF THE INVENTION
The present invention relates generally to alarm systems and specifically to alarm systems to protect computers. BACKGROUND OF THE INVENTION
Personal computers are valuable items that can be moved easily from place to place. In many burglaries, personal computers are among the targets of thieves.
In many cases the damage of a stolen computer is greater than just the face value of the computer, since they are typically used for income generation tasks and their disappearance may cause further financial damage.
In many cases configuring a new computer to replace an old one is costly and time consuming. In some cases the information on the computer does not have a backup and cannot be replaced. In some cases the information on the computer is of a confidential nature and may cause the owner further damage if it reaches the wrong hands. From all the above reasons and others, methods of preventing or deterring computer theft are desirable.
Devices comprising conventional cable locks securing a computer to a larger body for example a table or floor, are commonly used. Also metal cages for computers are commonly used. Once a thief overcomes, these devices for example by cutting the cable or breaking the lock they lose their effectiveness. These devices further commonly require installation by a craftsman and are an annoyance for cleaners and repair technicians.
U.S patent 5,983,679 describes a portable anti-theft locking anchor to secure computer equipment.
U.S. patent 5,673,573 describes an anti tamper device for use with apparatus of the type having a slot for receiving a component needed in use, for example a car radio-cassette player.
U.S. patent 5,258,746 describes a personal alarm that can be manually actuated to produce a high intensity sonic alarm signal.
The disclosures of the above patents are incorporated herein by reference. SUMMARY OF THE INVENTION
An aspect of some embodiments of the invention relates to an alarm device that is at least partially inside a computer housing. In an exemplary embodiment of the invention, the alarm device is inserted via a standard opening of the housing, which is common to many computers, for example, a diskette drive slot, a card slot or a fan grille.
In some embodiments of the invention, when the alarm is triggered it sounds an audible alarm to call attention to it and/or otherwise notify the owner that the computer is being tampered with.
In some embodiments of the invention, the alarm device is configured so that while it is activated it cannot be removed without breaking the computer or taking it apart. In one exemplary embodiment of the invention, the degree of force required to remove the device is expected to require a considerable time to apply (which many thieves do not have) or is expected to cause considerable damage to the computer.
In some embodiments of the invention, an activated alarm device is triggered by motion of the computer and/or by a change in its physical location and/or by a person getting to close to it.
In some embodiments of the invention the alarm device is controlled by a program in the computer in which it is installed. Alternatively or additionally the alarm device is controlled by a physical interface. Further alternatively or additionally the alarm device is controlled by a device external to the computer in which it is installed.
In some embodiments of the invention, the alarm device is comprised of a working part and an interface part. The interface part is accessible from the computer exterior. The working part is optionally unseen from the computer exterior and the alarm is triggered if the working part is forcefully disconnected from the user interface part.
In some embodiments of the invention, the interface part is designed to break away from the working part if an attempt is made to remove it forcefully, for example, so that the working part remains inaccessible inside the compute housing. There is thus provided in accordance with an exemplary embodiment of the invention, an alarm device for installing in a computer, including: an alarm unit that fits into a standard opening of a computer housing and is operative to generate an alert, once triggered; a sensor that generates a triggering signal for the alarm; and an input interface coupled to the alarm unit and operative to allow at least one of activation and deactivation of the alarm device.
There is thus further provided in accordance with an exemplary embodiment of the invention, an alarm device for installing in a computer, including: an alarm unit adapted to be installed inside a computer housing and is operative to generate an alert, once triggered; a sensor that generates a triggering signal for the alarm; and an input interface coupled to the alarm unit and operative to allow at least one of activation and deactivation of the alarm device.
Optionally, the alarm device is inserted into a floppy drive of a computer.
Optionally, the alarm device is inserted into a pcmcia slot of a computer.
Optionally, the alarm device is inserted into a ventilation opening of a computer.
Optionally, the alarm device is inserted into an I/O port opening of a computer. In some embodiments of the invention, the alarm device is inserted into a slot on a motherboard of a computer.
Optionally, the alarm device is glued to a panel inside the computer housing.
Optionally, the alarm device is inserted inside the computer housing without being attached. In some embodiments of the invention, the alarm device includes an anchor which prevents the removal of the device without force when the device is activated.
In some embodiments of the invention, the alert comprises sounding a loud sound.
Optionally, the alert comprises soi ding an irritating sound.
Optionally, the alert comprises sounding a verbal message. Optionally, the alert comprises emitting a bad odor.
Optionally, the alert is performed continuously.
Optionally, the alert is performed intermittently.
Optionally, the alert is performed for a set amount of time from when it is triggered.
In some embodiments of the invention, the alarm device is activated by the input interface.
Optionally, the alarm device is activated by a computer in which it is installed.
Optionally, the alarm device is activated from an external device.
In some embodiments of the invention, the alarm device keeps a record of alarm triggering. Optionally, the sensor is motion sensitive.
Optionally, the sensor is position sensitive.
In some embodiments of the invention, the alert comprises transmitting a signal.
Optionally, the signal is wireless. Optionally, the signal is transmitted locally.
Optionally, the signal includes notification of the device's location.
Optionally, the signal is wired.
In some embodiments of the invention, the alarm device includes a separate unit adapted to activate a plurality of alarm devices.
Optionally, the alarm device includes a separate unit adapted to deactivate a plurality of alarm devices.
Optionally, activation of the alarm device is performed with a delay.
Optionally, the alarm device allows a grace period before triggering the alarm. In some embodiments of the invention, the alert is performed at least by a device external to the computer.
In some embodiments of the invention, the alarm device is activated by a remote user via a telephone connection.
Optionally, the alarm device is triggered by a different alarm device. Optionally, the interface and the unit are coupled by a weakened link, such that when the link is broken the alarm unit remains inside the housing.
In some embodiments of the invention, the alarm device includes a power link to the computer.
Optionally, the alarm device includes a data link to the computer. Optionally, the alarm device includes a cable that couples the alarm device to the housing.
Optionally, the alarm device senses an on/off state of the computer.
Optionally, the alarm device generates an alert responsive to the sensed on/off state of the computer and an activation state of the alarm. BRIEF DESCRIPTION OF FIGURES
Particular exemplary embodiments of the invention will be described with reference to the following description of embodiments in conjunction with the figures, wherein identical structures, elements or parts which appear in more than one figure are preferably labeled with a same or similar number in all the figures in which they appear, in which: Figs. 1A-1C illustrate different views of an exemplary alarm device, in accordance with an exemplary embodiment of the invention;
Figs. 2A-2B illustrate different views of an exemplary alarm device, in accordance with an exemplary embodiment of the invention; Fig. 3 is an illustration of an exemplary alarm device, in accordance with an exemplary embodiment of the invention;
Figs. 4A-4C illustrate the deployment of different alarm devices, in accordance with an exemplary embodiment of the invention; Fig. 5 is an illustration of a group of computers using alarm devices, in accordance with an exemplary embodiment of the invention;
Fig. 6 is a flowchart of the use of an exemplary alarm device according to some embodiments of the invention;
Fig. 7 is an illustration of an exemplary implementation of an alarm device, in accordance with an exemplary embodiment of the invention; and
Fig. 8 is an illustration of an exemplary implementation of an alarm device, in accordance with an exemplary embodiment of the invention.
DETAILED DESCRIPTION OF EMBODIMENTS Fig. 1A-1C illustrate different views of an exemplary alarm device 10, in accordance with some embodiments of the present invention.
Fig. 1A shows a top view of alarm device 10 illustrating functional elements which are deployed into a computer. Fig. IB shows a top view of alarm device 10 illustrating functional elements when it is deployed in a computer. Fig. 1C shows a front view of alarm device 10 as seen from the front of a computer when alarm device 10 is deployed. In some embodiments of the invention, alarm device 10 comprises a working part and an interface part. Optionally the working part comprises a base 25 shaped like a standard floppy diskette, which is insertable into a standard floppy drive. The interface part is comprised of a user interface 20 and attached to base 25. Optionally, user interface 20 accepts commands from a user and gives indication of the status of the alarm. User interface 20 is attached to base 25 in such a way that it does not interfere with the insertion of base 25 and is accessible to a user, even when the device is inserted in a computer. Optionally user interface
20 is as small as a diskette topface or is omitted. In some embodiments of the invention, user interface 20 is big, for example at least half the size of base 25. Alternatively or additionally user interface 20 is comprised of a functionless plate to cover the diskette entrance and inhibit removal of alarm device 10 by force.
In some embodiments of the invention, alarm device 10 is created from materials similar to those used for 3.5" floppy diskettes for example plastic. Fig 4A illustrates the deployment of alarm device 10 in an exemplary embodiment of the invention. In order to protect a computer from theft, alarm device 10 is inserted into a floppy drive 130 or another opening of a computer 100 and optionally, activated by a user via user interface 20. In some embodiments of the invention, alarm device 10 comprises a sensor 65, which can detect some types of attempts to tamper with or steal computer 100. Optionally, sensor 65 is vibration sensitive or motion sensitive, many designs of which are known in the art. A perpetrator that attempts to move an activated computer 100, will trigger alarm device 10. In some embodiments of the invention, sensor 65 is position sensitive and is triggered if computer 100 is moved more than a small distance for example 1 meter. Optionally, a position signal base station is provided in a different computer or elsewhere in the room, to provide a relative position for distance sensors that compare a signal or interrogate a remote unit to estimate movement and or location. Alternatively or additionally, sensor 65 is a heat detector or uses an RF signal to detect the presence of people near computer 100. In some embodiments of the invention, alarm device 10 allows a grace period before activating an alarm in order to permit a legal user to deactivate the alarm. For example alarm device 10 may permit one minute to deactivate the alarm from the moment it detects a perpetrator.
In an exemplary embodiment of the invention, alarm device 10 sounds a loud siren when triggered, which may serve to call attention to computer 100 and a bearer. Optionally, alarm device 10 speaks a loud verbal message, for example notifying bystanders that computer 100 is being illegally moved. Alternatively or additionally alarm device 10 sounds an irritating sound, which may interfere with an attempt to illegally handle computer 100. Further alternatively or additionally, alarm device 10 emits a bad odor from a cache on alarm device 10 when triggered, which may keep people away from the computer (for example in Fig. 1A instead of speaker 45). Some of these alert methods may also serve to temporarily or semipermanently mark a vehicle used in transporting a stolen computer during or after the theft.
In some embodiments of the invention, the action performed by alarm device 10 is performed continuously until alarm device 10 is turned off or its power runs out. Alternatively the action is performed intermittently for example every 3 minutes for 30 seconds. This may serve, for example, to save power with a longer lasting action and/or to meet various laws regarding alarms. In some embodiments of the invention, the action is performed intermittently with a random time pattern so that for a group of computers that were triggered some will sound an alarm while others wait. This may serve, for example to save energy and/or confuse a thief. Optionally alarm device 10 stops the alarm after a set time, for example after 5 minutes, if the cause that triggered the alarm is not repeated. This may serve, for example to conserve the energy of alarm device 10 in case the triggering was a false alarm. As shown in Fig. IB, in some embodiments of the invention, alarm device 10 comprises one or more anchor legs 30. In an exemplary embodiment of the invention anchor legs 30 are positioned under a diskette tab 15, in such a way that they will not damage the reading head of a diskette drive 130. Anchor legs 30 are positioned on the upper or lower side of alarm device 10, or on both sides. Alternatively or additionally, one or more anchor legs may be provided at the edges of device 10. When alarm device 10 is inserted into diskette drive 130, tab 15 moves to the side as in a standard diskette and as shown in Fig. IB, and anchor leg 30 protrudes from the upper or lower side of base 25. Optionally when a diskette release lever 135 is pushed anchor legs 30 slip back under tab 15 and base 25 is ejected without resistance. When alarm device 10 is activated a lock 180 (shown in Fig. IB) prevents anchor leg 30 from returning to its original position so that base 25 cannot be removed from diskette drive 130 without first deactivating alarm device 10.
It should be noted that the exemplary position and implementation of anchor legs 30 and lock 180 as described above are but one option. Other positions and implementation to achieve the same goals will be obvious to one skilled in the art, for example, lock 180 may be an electro-mechanical lock or a mechanical lock and/or anchor legs 30 may be moved using a solenoid and/or during activation, rather than mechanically, during insertion.
In some embodiments of the invention, if user interface 20 is forcefully broken off from alarm device 10, a circuit 170 (shown in Fig. IB) is broken and an activated alarm device 10 will be triggered. Optionally alarm device 10 is designed with a deliberate weakening 190 which is prone to break when force is exerted on alarm device 10, so that the active part of the alarm remains in the computer and is both operable and more difficult to remove. Weakening 190 may be in various shapes and positions, for example in the middle of base 25 or in user interface 20. Optionally, if the user interface is broken off, the alarm falls silent for a while, in order to fool a thief. Alternatively, such breaking triggers the alarm. The breaking may be detected, for example, by it breaking a circuit in device 10.
In some embodiments of the invention, alarm device 10 comprises a power source for example a battery 60, and a sound generating device for example a speaker 45. Optionally, battery 60 supplies power for alarm device 10 and speaker 45 sounds an alarm. Optionally if user interface 20 is forcefully broken off, battery 60 and speaker 45 remain on the broken half of alarm device 10 inside computer 100 in order to sound an alarm wherever computer 100 goes. In some embodiments of the invention, instead of battery 60 or in addition to battery 60 a container comprising a powder or gas (not shown) is installed in alarm device 10 and a siren sound is created for example by a chemical reaction of the powder which releases a gas or by releasing a gas.
In some embodiments of the invention, a sensor, for example sensor 65 of alarm device 10 detects if the computer is on or off for example by detecting electromagnetic waves of a specific wavelength or vibrations or heat. As is known in the art, electronic circuits generate electromagnetic waves of different wavelengths, in some embodiments of the invention a sensor in alarm device 10 for example sensor 65 or a different sensor, is trained by a user to differentiate between the on and off state of a computer 100 in which alarm device 10 is installed. In an exemplary embodiment of the invention, pressing a button or a code on user interface 20 in the on and off states of computer 100, teaches alarm device 10 to differentiate between both states by indicating what the current state is and allowing the sensor to formulate a base line for that state. Alternatively or additionally alarm device 10 is connected directly to computer 100 and can query computer 100 regarding the status of computer 100. In some embodiments, computer 100 stays on and the alarm may be activated, for example, by detection that for a given period of time no input has been received or based on the hour of the day.
In an exemplary embodiment of the invention, alarm device 10 comprises an I/O port 90 that is connected by an I/O cable 95 inside or outside of computer 100, to an I/O port of computer 100. For example I/O cable 95 can be connected to a USB port, parallel port, serial port or keyboard port. Optionally cable 95 is connected to a dongle that is connected to an I/O port and allows use of the port for other devices in addition to alarm device 10.
In some embodiments of the invention the I/O port of computer 100 supplies power to alarm device 10 instead of battery 60 or in addition to battery 60. Optionally, power from an I/O port is used to recharge battery 60.
A connection between alarm device 10 and computer 100 support the implementation of various features, for example controlling alarm device 10 and configuring it, as will be described infra.
In some embodiments of the invention, alarm device 10 interferes with the use of computer 100 and is deployed in a computer only when it is off, for example alarm device 10 may interfere with a rotational motor (not shown) of floppy drive 130 if the computer is on when alarm device 10 is deployed.
Optionally, when alarm device 10 is inserted into floppy drive 130 and computer 100 is off, the alarm is automatically activated thus simplifying activation of the device. Alternatively, a user is required to activate the alarm so that he may choose the appropriate time for activating. Alternatively, the computer may sense the insertion and perform an automatic power down of the computer.
Optionally, when alarm device 10 is inserted into floppy drive 130 and computer 100 is off, alarm device 10 gives an alert sound for example a beep or a periodic beep to notify or remind a user that alarm device 10 is ready to be activated.
In some embodiments of the invention, alarm device 10 gives an alert sound if computer 100 is off and the alarm was not activated, possibly even if the alarm is not yet inserted into the computer.
In an exemplary embodiment of the invention, user interface 20 comprises an input device 35 (Fig 1C), which is optionally used to activate and deactivate alarm device 10. Input device 35 comprises a device optionally, for activating the alarm and deactivating it, for example a keypad, a mechamcal key, an electromagnetic key (such as used with automotive immobilizers), a magnetic card a contact or contactless smart card or memory card and/or a wireless receiver. In some embodiments of the invention, input device 35 is used additionally for activating and deactivating lock 180 and/or configuring parameters of alarm device 10, for example choosing alarm options such as the volume of the alarm or other options as described infra.
Optionally, alarm device 10 is activated and/or deactivated in a method matching input device 35, for example using a mechamcal key or electromagnetic key and/or keying in a key code. Alternatively or additionally, alarm device 10 is activated, triggered and/or deactivated by a wireless transmission for example using an electromagnetic signal or an acoustic signal sent from a different alarm device 10 or some other device such as a whistle or remote control.
In some embodiments of the invention, alarm device 10 is activated and or deactivated by software. For example by turning on computer 100 and running a software program. Optionally, alarm device 10 is configured, controlled and/or monitored by software on computer 100, for example setting a password, setting the alarm volume or checking the battery status. In some embodiments of the invention, alarm device 10 can be activated and/or deactivated by a command given by a remote user that accesses computer 100 (for example by a dial up connection or via an Internet connection).
In some embodiments of the invention, I/O cable 95 of alarm device 10 is connected (optionally temporarily) to an I/O port of a different computer than the one in which it is installed. For example to a laptop with software installed to control an alarm device 10, thus allowing a user to go from one computer to another and set parameters or activate the alarm device 10.
In some embodiments of the invention, user interface 20 comprises a visual and/or audio display 40 in order to give feedback to a user, for example a level indicator of battery 60 as mentioned above, and/or an indication if alarm device 10 is activated or not. In some embodiments display 40 comprises one or more LEDs and/or a speaker. Alternatively user interface 20 utilizes speaker 45 of alarm device 10. Optionally, display 40 is comprised of a diverse display for example series of.LED's or an LCD display. In some embodiments of the invention alarm device 10 comprises a non- volatile memory 70 and optionally a clock 75, in order to keep a log of events for example of activation, deactivation, alarm triggering and/or alarm ceasing. In some embodiments of the invention, alarm device 10 is functional in the aperture in which it is inserted, for example a readable and writeable floppy diskette (not shown) in base 25. Optionally alarm device 10 uses the floppy diskette as a hard copy device to back up memory 70. For example in an alarm that is activated and/or deactivated by software running on the same computer 100, before activation or after deactivation the contents of memory 70 are written to the floppy diskette.
In some embodiments of the invention, clock 75 is set and/or synchronized with the internal clock of computer 100. Alternatively or additionally clock 75 is set by a user through input device 35 on user interface 20.
In some embodiments of the invention, as illustrated in Fig. 1C, alarm device 10 comprises a power input connector 50 through which power is supplied to recharge battery 60. Alternatively or additionally battery 60 is replaced when it runs low for example after the alarm is used. In some embodiments of the invention, alarm device 10 needs to be replaced after a set amount of time, for example one year, because battery 60 (or other type of power source) or other consumable parts (for example a powder to sound an alarm as mentioned above) are used up. Optionally, the alarm forces its replacement, for example, by stopping to work or forcefully discharging its battery.
In some embodiments of the invention, alarm device 10 is attached to computer 100 by a cable 85 ending with an adhesive pad 80 which is attached to a heavy or non moveable object near the computer (or the computer itself) in order to keep alarm device 10 near when not in use. Optionally pad 80 sticks for example with a magnet or velcro to a pad 105 and pad 105 is attached with a strong attachment to computer 100 (for example with glue) as shown in Fig. 4A. In some embodiments of the invention alarm device 10 is attached with a permanent attachment (for example screws) with cable 85 and pad 80 to a heavy or non moveable object for example a table or floor (like with a standard security cable). Computer 100 can only be moved if alarm device 10 is released from computer 100 or if cable 85 is torn. In some embodiments of the invention cable 85 comprises a closed circuit and triggers alarm device 10 if it is torn or cut when alarm device 10 is activated as is known in the art for example as described in U.S. patent 5,387,899 to DiLauro et al, of which the disclosure is incorporated herein by reference.
In some embodiments of the invention, alarm device 10 is programmed to activate itself automatically according to its internal clock, for example alarm device 10 can be set to be activated between certain hours for example after work hours of an office.
In some embodiments of the invention, alarm device 10 is programmed to be activated with a set or controllable time delay from the moment it is given a command to activate itself. The time delay allows a user to reposition computer 100, move away from computer 100 or remove any hindrance that could trigger the alarm. Another example is to allow putting a laptop computer in a safe after activating the alarm.
In some embodiments of the invention, alarm device 10 is programmed with a grace period from triggering the alarm until alarm device 10 takes action, in order to allow deactivation of the alarm or repositioning of computer 100 in order to access alarm device 10 and deactivate it.
In some embodiments of the invention, alarm device 10 comprises a wireless transmitter 150, for example a cellular telephone, a radio transmitter or a pager, to notify a user or a security company if alarm device 10 is triggered. Optionally alarm device 10 notifies a user or security company silently without giving off a human audible sound so that a thief will not be aware that an alarm had been triggered. Optionally, alarm device 10 notifies a local alarm or a local box at a guard compound. Alternatively or additionally, device 10 notifies other computers or alarms in the local area, in response to which the other alarms may be triggered and/or perform other actions, such as change their sensitivity and/or logic of response to triggering. Device 10 may include circuitry for applying such logic, which may include, for example, a microprocessor, analog electronic circuitry and/or a memory. In some embodiments of the invention, an alarm action is performed (for example, an alarm is sounded or a user is notified) only when more than one alarm is triggered. This may serve to reduce false alarms. For example, a remote alarm is sounded only if a central alarm for the room is triggered in addition to alarm device 10 or if the alarms from two computers are triggered. hi some embodiment of the invention, alarm device 10 works in collaboration with an alarm control program which is run on computer 100 and follows the status of alarm device 10 via a communication port as described above. Optionally, alarm device 10, sends a message via the Internet at a set time interval notifying a server for example at a security company that all is well. Optionally a guard can be sent to check if the messages fail to come. Alternatively or additionally, wireless transmitter 150 is used to send status notifications or alarm notifications. Optionally a wireless or wired data link such as transmitter 150 or other methods described herein are used to download updated software to alarm device 10 or perform local or remote maintenance on it. Optionally, the uploading and/or downloading require certain passwords or a smart card authentication. In other embodiments, alarm device 10 may be electrically or datawise separated from computer 100 so that it cannot be subverted via software.
Fig. 5 illustrates an exemplary embodiment of the invention in which a local alarm box 160 sends and receives transmissions from one or more wireless transmitters 150 of alarm devices 10. In some embodiments of the invention, local alarm box 160 is used to activate or deactivate one or more of alarm devices 10 together or at different times. For example a room full of computers can be activated or deactivated together.
In some embodiments of the invention one computer can activate or deactivate other computers, for example by sending signals from one to another with wireless transmitter 150, or using a LAN that interconnects the host computers, for example if the computers stay on while the alarm is activated.
In some embodiments of the invention, when one computer 100 is triggered, it notifies other computers 100 nearby that belong, to an optionally pre-selected group and the whole group triggers their alarms. Optionally, if one computer 100 is damaged or destroyed other computers 100 can act in its place. For example to notify a user or sound an alarm.
In some embodiments of the invention, local alarm box 160 differentiates between different audio alarm signals of different alarm devices 10. Optionally local alarm device 160 notifies different users according to the alarm that was triggered.
In some embodiments of the invention, local alarm box 160 is controlled by a computer 100, for example to initiate a command to activate or deactivate a computer 100 and/or to create a list of computers to activate. Optionally local alarm box 160 is connected to a standard telephone line, in order to notify in case of alarm. In some embodiments of the invention, local alarm box 160 is connected by wires to some or all of computers 100. Optionally local alarm box 160 is connected on a local area network with computers 100.
In some embodiments of the invention, an alarm function or functions are performed by a device external to computer 100 for example a local alarm which sounds a siren or dials a security company in response to a request by alarm device 10 in a computer 100. Optionally, the external alarm function is performed in addition to the functions performed by computer 100 or alarm device 10.
In some embodiments of the invention, alarm device 10 comprises a GPS (global positioning system) for example in sensor 65, so that when an alarm is triggered, wireless transmitter 150 transmits the position of computer 100 or gives off a signal which can be tracked by a pursuer, for example the police, using a tracking device having for example an effective radius of up to 10 kilometers. Alternatively, alarm device 10 may generate a beacon to be used for tracking the computer.
Fig. 6 is a flowchart 200 of the use of an exemplary alarm device 10 according to some embodiments of the invention. In an exemplary embodiment of the invention, alarm device 10 is inserted into a floppy drive 130, of a computer 100 (202). In the next act (204) a user keys in an activation code or turns the key on keypad or lock 35. Optionally, display 40 shows that alarm device 10 is activated. Once alarm device 10 is activated it enters a wait state (206) in which it either actively checks if the alarm was triggered (208) or if the alarm was deactivated (210). Optionally, if the alarm is triggered or deactivated, alarm device 10 is automatically released from its wait state (206). If the alarm was triggered for example by sensing that computer 100 is moving, alarm device 10 takes actions as described above for example (212) sounding an alarm or sending a signal to a local alarm box which calls a guard to check the computer. If the alarm is deactivated (214) it exits the wait state (206) and allows the release of alarm device 10.
Fig. 2A-2B illustrate different views of an exemplary embodiment of the invention in which an alarm device 210 optionally comprises the same elements as alarm device 10 but is shaped like a computer card instead of a diskette. Alarm device 210, like alarm device 10 comprises a base 25 and an optional user interface 20 as shown in Fig. 2 A and Fig. 2B. Fig.
2 A illustrates a side view of alarm device 210 and Fig. 2B illustrates a front view showing user interface 20 of alarm device 210.
In an exemplary embodiment of the invention, as illustrated in Fig. 4B, alarm device 210 is installed internal to computer 100 and seated in a motherboard slot 120, with optionally any standard bus connector 205 for example ISA or PCI or EISA.
In some embodiments of the invention alarm device bus connector 205 functionally replaces I/O port 90 on user interface 20 of alarm device 10 and/or power source 60.
Alternatively or additionally both options are implemented in alarm device 210, for example in order to connect alarm device 210 to other computers or devices external to the computer in which it is installed. For example a laptop can connect to I/O port 90 of alarm device 210 in order to activate or deactivate it.
In some embodiments of the invention, bus connector 205 is non conducting and is not electrically connected to a computer motherboard 120. In this case bus connector 205 is used to hold alarm device 210 in place on computer motherboard 120.
Fig. 3 is an illustration of an exemplary embodiment of the invention in which is illustrated, an alarm device 310 comprising the same elements as alarm device 210. Alarm device 310 is placed in the box of computer 100 and not in a computer slot 120 as with alarm device 210. Fig. 4C illustrates an exemplary deployment of alarm device 310. In some embodiments of the invention, as illustrated in Fig. 4C, base 25 of alarm device 310 is fixed in place in the box of computer 100, for example with an adhesive material for example glue or using a magnet. User interface 20 of alarm device 310 is optionally fastened with a screw as a back panel of computer 100. Wires 305 connect between base 25 and user interface 20 of alarm device 310, in order to connect between interface 20 and base 25 of alarm device 310. In an exemplary embodiment of the invention, an alarm device for example alarm device 10 is constructed to fit into other openings of a computer 100 and/or past its metal housing shell, for example an alarm device with a prong or prongs which fit into an opening of a fan, or an alarm device which connects to an I/O port of a computer 100, for example a keyboard port, a USB port, a parallel port, a serial port or a pcmcia slot of a laptop or a notebook computer. Fig. 8 is an illustration of an alarm device 410 with similar characteristics as alarm device 10 and designed to fit into a pcmcia slot of a laptop computer 420.
In some embodiments of the invention, installation of an alarm device for example alarm device 10, 210, 310, 410 is a simple task which require no prior technical knowledge, and as can be seen in some embodiments, does not require opening computer 100 and or installing special software.
In some embodiments of the invention alarm devices 10, 210, 310, 410 comprise abase 25 without user interface 20 as described supra. Optionally alarm devices 10, 210, 310, 410 are activated and deactivated by an external transmission to/from wireless transmitter 150. In some embodiments of the invention alarm device 10 is used in conjunction with alarm device 210 or 310 or 410, such that insertion or activation of alarm device 10 activates alarm device 210 or 310 or 410 by wireless transmission either in the same computer or in a different computer with a matching transmission code. For example an alarm device 210 or 310 or 410 is installed in a computer 100 or a plurality of computers, activation of the installed alarm devices is done by inserting an alarm device 10 into a floppy drive 130 of one of the computers 100.
Fig. 7 illustrates an exemplary implementation of the invention in which an alarm device 310 without a user interface 20 is used in conjunction with base 25 of an alarm device 10 without a user interface 20. Alarm device 310 is placed inside a computer 100 and activated by inserting alarm device 10 into floppy drive 130 of computer 100. Deactivation is optionally performed by a transmission from another computer or from an external transmitter for example local alarm box 160 in Fig. 5, or by removing base 25 (which is (or not) locked) from floppy drive 130. Optionally, some functions are performed by alarm device 10 and some functions are performed by alarm device 310. Alternatively or additionally, some functions are performed by both alarm device 310 and alarm device 10.
It will be appreciated that the above described methods may be varied in many ways, including, changing the order of steps, and the exact implementation used. It should also be appreciated that the above described description of methods and apparatus are to be interpreted as including apparatus for carrying out the methods and methods of using the apparatus.
The present invention has been described using non-limiting detailed descriptions of embodiments thereof that are provided by way of example and are not intended to limit the scope of the invention. It should be understood that features and/or steps described with respect to one embodiment may be used with other embodiments and that not all embodiments of the invention have all of the features and/or steps shown in a particular figure or described with respect to one of the embodiments. Variations of embodiments described will occur to persons of the art.
It is noted that some of the above described embodiments may describe the best mode contemplated by the inventors and therefore may include structure, acts or details of structures and acts that may not be essential to the invention and which are described as examples. Structure and acts described herein are replaceable by equivalents which perform the same function, even if the structure or acts are different, as known in the art. Therefore, the scope of the invention is limited only by the elements and limitations as used in the claims. When used in the following claims, the terms "comprise", "include", "have" and their conjugates mean "including but not limited to".

Claims

1. An alarm device for installing in a computer, comprising: an alarm unit that fits into a standard opening of a computer housing and is operative to generate an alert, once triggered; a sensor that generates a triggering signal for said alarm; and an input interface coupled to said alarm unit and operative to allow at least one of activation and deactivation of the alarm device.
2. An alarm device for installing in a computer, comprising: an alarm unit adapted to be installed inside a computer housing and is operative to generate an alert, once triggered; a sensor that generates a triggering signal for said alarm; and an input interface coupled to said alarm unit and operative to allow at least one of activation and deactivation of the alarm device.
3. An alarm device according to claim 1 in which said alarm device is inserted into a floppy drive of a computer.
4. An alarm device according to claim 1 in which said alarm device is inserted into a pcmcia slot of a computer.
5. An alarm device according to claim 1 in which said alarm device is inserted into a ventilation opening of a computer.
6. An alarm device according to claim 1 in which said alarm device is inserted into an I/O port opening of a computer.
7. An alarm device according to claim 2 in which said alarm device is inserted into a slot on a motherboard of a computer.
8. An alarm device according to claim 2 in which said alarm device is glued to a panel inside the computer housing.
9. An alarm device according to claim 2 in which said alarm device is inserted inside the computer housing without being attached.
10. An alarm device according to any of the previous claims, comprising an anchor which prevents the removal of the device without force when the device is activated.
11. An alarm device according to any of the previous claims in which said alert comprises sounding a loud sound.
12. An alarm device according to any of the previous claims in which said alert comprises sounding an irritating sound.
13. An alarm device according to any of the previous claims in which said alert comprises sounding a verbal message.
14. An alarm device according to any of the previous claims in which said alert comprises emitting a bad odor.
15. An alarm device according to any of the previous claims in which said alert is performed continuously.
16. An alarm device according to any of the previous claims in which said alert is performed intermittently.
17. An alarm device according to any of the previous claims in which said alert is performed for a set amount of time from when it is triggered.
18. An alarm device according to any of the previous claims in which said alarm device is activated by said input interface.
19. An alarm device according to any of the previous claims in which said alarm device is activated by a computer in which it is installed.
20. An alarm device according to any of the previous claims in which said alarm device is activated from an external device.
21. An alarm device according to any of the previous claims in which said alarm device keeps a record of alarm triggering.
22. An alarm device according to any of the previous claims in which said sensor is motion sensitive.
23. An alarm device according to any of the previous claims in which said sensor is position sensitive.
24. An alarm device according to any of the previous claims in which said alert comprises transmitting a signal.
25. An alarm device according to claim 24, wherein said signal is wireless.
26. An alarm device according to claim 24, wherein said signal is transmitted locally.
27. An alarm device according to claim 25 or claim 26 in which said signal comprises notification of the device's location.
28. An alarm device according to claim 24, wherein said signal is wired.
29. An alarm device according to any of the previous claims, comprising a separate unit adapted to activate a plurality of alarm devices.
30. An alarm device according to any of the previous claims, comprising a separate unit adapted to deactivate a plurality of alarm devices .
31. An alarm device according to any of the previous claims in which activation of said alarm device is performed with a delay.
32. An alarm device according to any of the previous claims in which said alarm device allows a grace period before triggering the alarm.
33. An alarm device according to any of the previous claims in which said alert is performed at least by a device external to the computer.
34. An alarm device according to any of the previous claims in which said alarm device is activated by a remote user via a telephone connection.
35. An alarm device according to any of the previous claims in which said alarm device is triggered by a different alarm device.
36. An alarm device according to any of the previous claims in which said interface and said unit are coupled by a weakened link, such that when the link is broken the alarm unit remains inside said housing.
37. An alarm device according to any of the previous claims, comprising a power link to said computer.
38. An alarm device according to any of the previous claims, comprising a data link to said computer.
39. An alarm device according to any of the previous claims, comprising a cable that couples said alarm device to said housing.
40. An alarm device according to any of the previous claims, in which said alarm device senses an on/off state of said computer.
41. An alarm device according to claim 36, in which said alarm device generates an alert responsive to the sensed on/off state of said computer and an activation state of said alarm.
PCT/IL2003/000104 2002-02-19 2003-02-11 Computer alarm WO2003071546A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003206113A AU2003206113A1 (en) 2002-02-19 2003-02-11 Computer alarm

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IL14825402A IL148254A0 (en) 2002-02-19 2002-02-19 Computer alarm
IL148254 2002-02-19

Publications (1)

Publication Number Publication Date
WO2003071546A1 true WO2003071546A1 (en) 2003-08-28

Family

ID=27742224

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2003/000104 WO2003071546A1 (en) 2002-02-19 2003-02-11 Computer alarm

Country Status (3)

Country Link
AU (1) AU2003206113A1 (en)
IL (1) IL148254A0 (en)
WO (1) WO2003071546A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110131003A1 (en) * 2008-04-04 2011-06-02 Safe Innovations As Vibration logging in computers

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4908608A (en) * 1988-08-01 1990-03-13 Reinke Dana J Alarmcard
GB2285703A (en) * 1993-12-03 1995-07-19 Michael John Webb Computer apparatus with anti-theft deterrent provision
GB2292629A (en) * 1994-05-26 1996-02-28 Mangall Anthony Kay Security system for computer
GB2300508A (en) * 1995-04-29 1996-11-06 Deritend Electro Mechanical Se Security alarm device for a computer
GB2303173A (en) * 1995-07-11 1997-02-12 Clive Robert Homewood Computer Security Module
GB2304810A (en) * 1995-09-08 1997-03-26 Westcoast Management Ltd Computer Security Module
US5675321A (en) * 1995-11-29 1997-10-07 Mcbride; Randall C. Personal computer security system
GB2312310A (en) * 1996-04-18 1997-10-22 Paul Anthony Unwin Audible security device for mains connected electrical equipment
US5748084A (en) * 1996-11-18 1998-05-05 Isikoff; Jeremy M. Device security system
GB2321275A (en) * 1997-01-17 1998-07-22 Roy Bateman Electronic equipment security lock and alarm device
GB2322216A (en) * 1997-02-12 1998-08-19 Jeffrey David Dines Electrical appliance alarm
GB2329273A (en) * 1997-09-10 1999-03-17 Jetarch Computers Limited Computer theft alarm mounted on an expansion card
US6014079A (en) * 1998-10-20 2000-01-11 Huang; Dennis Burglar alarm system for an electronic apparatus with a slot
US6137409A (en) * 1998-08-28 2000-10-24 Stephens; Bruce Randall Computer anti-theft system
US6150923A (en) * 1996-10-10 2000-11-21 Johnson; William Nevil Heaton Alarm system
WO2001001362A1 (en) * 1999-06-25 2001-01-04 Michael Morris Security device
WO2001075830A1 (en) * 2000-03-31 2001-10-11 British Telecommunications Public Limited Company Secured appliance
US20010052855A1 (en) * 2000-01-10 2001-12-20 Ogilvie John W.L. Self-contained public identification of a device's owner

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4908608A (en) * 1988-08-01 1990-03-13 Reinke Dana J Alarmcard
GB2285703A (en) * 1993-12-03 1995-07-19 Michael John Webb Computer apparatus with anti-theft deterrent provision
GB2292629A (en) * 1994-05-26 1996-02-28 Mangall Anthony Kay Security system for computer
GB2300508A (en) * 1995-04-29 1996-11-06 Deritend Electro Mechanical Se Security alarm device for a computer
GB2303173A (en) * 1995-07-11 1997-02-12 Clive Robert Homewood Computer Security Module
GB2304810A (en) * 1995-09-08 1997-03-26 Westcoast Management Ltd Computer Security Module
US5675321A (en) * 1995-11-29 1997-10-07 Mcbride; Randall C. Personal computer security system
GB2312310A (en) * 1996-04-18 1997-10-22 Paul Anthony Unwin Audible security device for mains connected electrical equipment
US6150923A (en) * 1996-10-10 2000-11-21 Johnson; William Nevil Heaton Alarm system
US5748084A (en) * 1996-11-18 1998-05-05 Isikoff; Jeremy M. Device security system
GB2321275A (en) * 1997-01-17 1998-07-22 Roy Bateman Electronic equipment security lock and alarm device
GB2322216A (en) * 1997-02-12 1998-08-19 Jeffrey David Dines Electrical appliance alarm
GB2329273A (en) * 1997-09-10 1999-03-17 Jetarch Computers Limited Computer theft alarm mounted on an expansion card
US6137409A (en) * 1998-08-28 2000-10-24 Stephens; Bruce Randall Computer anti-theft system
US6014079A (en) * 1998-10-20 2000-01-11 Huang; Dennis Burglar alarm system for an electronic apparatus with a slot
WO2001001362A1 (en) * 1999-06-25 2001-01-04 Michael Morris Security device
US20010052855A1 (en) * 2000-01-10 2001-12-20 Ogilvie John W.L. Self-contained public identification of a device's owner
WO2001075830A1 (en) * 2000-03-31 2001-10-11 British Telecommunications Public Limited Company Secured appliance

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110131003A1 (en) * 2008-04-04 2011-06-02 Safe Innovations As Vibration logging in computers

Also Published As

Publication number Publication date
AU2003206113A1 (en) 2003-09-09
IL148254A0 (en) 2002-09-12

Similar Documents

Publication Publication Date Title
US10134265B2 (en) Portable alarm system with self-monitoring sensor
EP0401322B1 (en) Programmable alarm system having proximity detection with vocal alarm and reporting features
US7116224B2 (en) Method and apparatus for securing firearms and other valuables in an alarm protected facility
EP1090378B1 (en) Motion sensitive anti-theft device with alarm screening
US5963131A (en) Anti-theft device with alarm screening
US20050149752A1 (en) System and method for tracking laptop computers
US20050174238A1 (en) Theft protection plug for electrical devices
GB2489845A (en) Theft deterrent device
WO1991016695A1 (en) Proximity sensing security system
US20110050419A1 (en) Remote Intrusion Signaling Security System
US6150923A (en) Alarm system
WO1996035195A1 (en) Security device for a computer
US6950011B2 (en) Vehicle theft detection device and method
WO2003071546A1 (en) Computer alarm
JP2002302014A (en) Vehicle control device, on-vehicle monitor, vehicle control and monitor method and program, recording medium recording vehicle control and monitor program, and action flow in vehicle control device in forgetting set of security mode
EP0850159B1 (en) Alarm system
EP1239358B1 (en) Security system for preventing a personal computer from being stolen or used by unauthorized people
JPH04123487U (en) Vending machine security device
CA2273716A1 (en) Security alarm system for portable devices
CA2235918A1 (en) Security alarm system for notebook computers
GB2429562A (en) Theft deterrent arrangement

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP