Protection device against theft
(57) Abstract:The invention relates to computer technology. Usage: to protect against theft of computers and / or computer component, and other electronic equipment applying the processors, components such as storage devices, hard disks, removable motherboard and processors, allows to obtain a technical result in significant difficulties unauthorized use of stolen computers or their parts. This result is achieved due to the fact that the device comprises a blocking scheme that integrates with the protected component containing a storage device for storing an identifying code (IR) for each blocking schemes, and the fact that each blocking scheme contains terminal communication equipment to enter the key code in the blocking circuit and a comparator to compare this input key code with IR blocking schemes, while blocking scheme made with the possibility of blocking component for further use in case a wrong key code. 5 C.p. f-crystals, 5 Il. The technical field to which the invention relates
The invention relates to ustroystvayu, plug-in card, hard drives, etc.Prior art
In recent times inside the computer business has significantly increased the number of thefts, in particular, the internal component of the computer, such as memory devices, processors, hard drives and so on, which, of course, creates serious problems for those whom it affects.It is already known from European patent 687968 use in computer circuits, which is in communication with the computer is started automatically reproduces information on personal property. Identifying data stored in the storage device and storing data when you turn off the power and identity is checked at each system startup. However, the scheme does not prevent the possibility of direct use of the computer by unauthorized person and does not prevent the possibility of theft component of the computer.To solve this problem, the inventors have developed a system for preventing unauthorized use of stolen computer equipment.The object of the invention
Therefore, the present of the invention is razrabotannie stolen computers or computer parts.This problem is solved with a device, as defined in paragraph 1 of the claims.Brief description of drawings
For example, the invention will be described below with reference to an embodiment and to the accompanying drawings, on which:
Fig.1 illustrates the basic idea of the invention;
Fig.2 depicts the verification of identity in General in accordance with the invention;
Fig.3 depicts a block diagram of the structure of the schema validation;
Fig.4 depicts a block diagram function block diagram;
Fig. 5 depicts a block diagram of the startup process in accordance with one application.Description of the preferred options of the incarnation
As schematically illustrated in Fig.1, the protection device against theft in accordance with the invention concerns the protection of, for example, various components of the computer. Components are checked when the computer starts. This is done by providing each of the protected components specially made by the scheme of identification (block diagram), through which checks the data stream to the computer. Each blocking scheme each component has a special identifying code (IR). The code is also entered into the main computer and the mod could be stored on your computer's hard disk or the like. In the event that the computer component that has a code which is unacceptable for a computer, the system stops. In addition, also blocked each module, which requires the correct code. This scheme is unique due to its one-way communication, which means that you can enter directional information in the schema, but you cannot find out the information about the IR, which guarantees full protection.If the blocking scheme has a capacity of 64 bits, turns around 18,41018possible combinations of IR. You can add that IR, preferably, is stored permanently.Thanks to this device becomes impossible unmanaged migration modules (storage devices, cards, and so on) between computers. This means that the computer and its modules can function together only under the condition that all computer codes and modules are consistent.In Fig.3 illustrates one embodiment of a blocking scheme. This scheme contains two sets of permanent storage devices 301, 302, such as electrically erasable programmable permanent memory (EEPROM), one of which 301 is intended to remember the IR and d is not available. In addition, the circuit contains an input for a supply voltage 305 and one data input 304 and a comparator for comparing the data entered via the input 304, IR, stored in the memory 302. The schema also contains the exit 306, through which the circuit can lock component on which it is located. This output 306 is connected to the comparator so that the circuit activates a locking function when the key code entered via the input 304 is not consistent with the stored IR.Some components, equipped with a blocking scheme, could partially have the same IR and, thus, could be queried in the same way. This could be done, for example, by the so-called masking, according to which the key code is compared only certain elements of IR. This is advantageous, for example, for commercial and industrial enterprises, for which it is desirable to have the possibility to freely exchange components between computers in the enterprise. Possible number of such groups depends on the number of items that can be masked.Described in more detail below blocking scheme with reference to the flowchart shown in Fig.4.1. The scheme first pod. the information via the input 304 of the blocking scheme is introduced startup code (CC). After this blocking scheme is ready for taking control word.3. Then put control word for control scheme.4. The blocking scheme verifies the correctness of the control word. When his wrong blocking circuit blocks that blocks a component.5. Control word may, for example, to enable the transfer sequence number of the blocking circuit to output data schema.6. Instead, the second control word could cause the query to mask (6A).7. The third control word provides crediting the wrong case (7a).8. Then through the information input 304 blocking schemes will say families and types.9. Then through the information input 304 blocking scheme introduces the remaining bits (55-0).10. Block diagram compares the binary code, including the mask, in the presence of the control word related to masking. In the case of the coordination of binary code (10A) is a blocking scheme sets the active level of the control output (10b). Then block diagram of blakiruetsya increment register errors per unit.12. When installing the error register to zero blocking scheme is blocked.13. Otherwise, the blocking circuit is restored to the position of the adoption of the new key code and returns to the point 8.14. Standard blocking program blocking scheme. Control output remains in its previous state (10b).Below will be described the startup process for a system with components that are secured to the blocking schemes, with reference to the flowchart shown in Fig.5.1. The system starts up or is reset".2. Is the initial load of the system.3. The system returns to the control program blocking scheme.4. The control program reads the settings of the system module block diagram.5. The control program passes the short circuit, which activates the blocking scheme, placing it in the receiving position.6. The control program sends a control word to the blocking scheme, which issues commands block diagram relating to the processing of the input data.7. The control program adds the mask information (7a), if it should be required when ustanovke.9. Any information under point 7 and/or 8 is transferred (9a) to the blocking scheme.10. The control program reads the setup information for identifying codes (IR).11. The transmission of information to the blocking scheme.12. Sending IR to the blocking scheme.13. The control program checks the receipt of the additional key codes. When the request masking control program does not take it into account. Or read the new IR (13A).14. The control program ends and returns to the main program.15. The system reads the settings in the memory and run.16. The system performs self-control.17. With the positive results of self-monitoring is a normal system start-up (18). Otherwise it shows the error message (17A).18. Run.19. The system is caught in an infinite loop.Because of the presence of the above-mentioned error register blocking scheme may allow the number of input attempts with the wrong IR. The number of permissible attempts of this kind depends on a specified degree of confidence. The error register is decremented by one at each input item is convenient is desirable in cases when the operation input IR is performed, for example, manually and, therefore, there may be typographical errors and the like. In addition, it is desirable, when some components are arranged one after another and the data being transmitted must achieve all the component. In this case, all the IR can be transmitted to all components and each component will consider other IR component as failed attempts.Block diagram according to the invention makes it impossible unmanaged exchanges modules (memory, motherboards, processors, and so on) between computers or groups of computers because the computer and its modules can work together only when approved computer codes and modules. This effectively makes the business of harboring stolen goods, which in turn reduces the attractiveness of products, which are particularly susceptible to theft.Similarly, it is possible to provide a data register for serial numbers, IR and property of different blocking schemes. You can also add other information in the register of this type. However, this register must be protected to ensure that it had access regulatory authorities and other San the tea theft or the like, or to provide access to the rightful owner to find the lost codes. It could also be used actively to provide access to the component manufacturers, retailers and the like to the correct IR, based on the special order number, when the scheme should run.Block diagram according to the invention is integrated into the network topology of each module and its units due to its configuration, while you are using the correct key. The code in the block diagram in any way inaccessible from the outside other than through identification through the register, which is connected to the blocking scheme. In addition, the blocking circuit is sufficiently low to allow connection to any electronic module.Preferably, the blocking scheme is also sealed, which makes it completely inaccessible to outside influences.In the production of a component of a computer or electronic component, which are supplied to the blocking schemes according to the invention, it is possible to memorize IR in memory schemes are already in the production process. However, this requires that the components be accompanied by a list of IKI, applicable to each component, allowing you to enter codes into the control software in the Assembly system.Alternatives to the Yeni. The delay function of this type could, for example, to indicate that the blocking scheme is not activated, resulting supported the availability of components within a specified period of time, which is usually several minutes. During this period of time component and a blocking scheme is suitable for operation by the user and, therefore, when assembling the system, the user can enter Icy, desired for the component. However, these Icy could still be selected centrally by the manufacturer of the component and delivered to the user after completion of the build system.The invention has been described above with reference to one embodiment. However, there may be some variety of embodiments of the invention. For example, the protection device against theft according to the invention can be used in other environments than computers, such as mobile phones, electronic units in automobiles and ships and the like, in which the control is performed using a processor of a specific type. Of course, you can also use key codes having different separation between the IR part, control word, and so on, and you can also use key codes rasoolum, for example, through radio signals or other wireless signals. Thus, you could run blocking function by remote control in stolen property, such as cars, mobile phones and similar electrical appliances.Such modifications of the embodiments should be considered obvious and must be within the scope of the invention defined in the attached claims. 1. Electronic device to protect against theft of computers and other electronic equipment applying the processors, components such as storage devices, hard disks, plug-in card and the processor, characterized in that it comprises a blocking scheme that integrates with the protected component containing a storage device for storing an identifying code (IR) for each blocking schemes, and the fact that each blocking scheme contains terminal communication equipment to enter the key code in the blocking circuit and a comparator to compare this input key code with IR blocking schemes when this blocking scheme is made with the possibility of blocking component for further use yuusha scheme contains a unit time delay, used to delay the blocking component during a pre-determined period of time.3. Electronic device under item 1 or 2, characterized in that the protected components are part of a system that contains, in the storage register ISR for various components included in the system and is equipped with protection devices against theft, and system startup process automatically sends key codes to these components to manage them, thus the system operates only with the approval of codes of system and component.4. An electronic device according to any one of the preceding paragraphs, characterized in that the IR is not available outside of the blocking scheme.5. An electronic device according to any one of the preceding paragraphs, characterized in that the IR is permanently stored in the storage device.6. An electronic device according to any one of the preceding paragraphs, wherein each security device also includes a unique and saved in the blocking scheme, a sequence number, which is accessible from the outside of the blocking scheme.
FIELD: computers, data protection.
SUBSTANCE: processor has bus interface device, device for selection/decoding of commands, device for dispatching/execution, program string decoding device, which string is selected from program and loaded in first levels command cash, which contains a set of N two-input elements XOR, keys memory, storing different N-bit decoding keys.
EFFECT: higher efficiency.
FIELD: technologies for authentication of information.
SUBSTANCE: method includes performing absolute identification for confirming legality of data carrier according to first rule in preset time. Authentication information is recorded on this data carrier in previously set position. Process of arbitrary authentication is performed for confirming legality of said data carrier in accordance to second rule in arbitrary time. First rule includes announcing confirmation of standard match, if information for authentication is detected as registered in selected preset position. Second rule in given arbitrary authentication process includes announcing standard match, if information for authentication is detected as not registered in arbitrary positions, different from given preset position.
EFFECT: higher reliability.
6 cl, 12 dwg
SUBSTANCE: method includes, on basis of contents of central processor registers, received after processor performs some sort of command, by means of mathematical logical operation, forming certain finite control sum and storing it in memory, and on basis of contents of registers, received before start of execution by said processor of directly next command, certain starting checksum is formed, while if starting checksum mismatches finite checksum, error message is generated, which can be followed by halting of processor operation or blocking of chip board with its removal from circulation.
EFFECT: higher reliability.
2 cl, 2 dwg
FIELD: copy protection.
SUBSTANCE: system has content distribution block, multiple recording and playback devices for digital data, calculations processing block, meant to perform communications with recording and playback devices and performing calculations processing for transferring license payments.
EFFECT: higher reliability of copy protection.
5 cl, 55 dwg
SUBSTANCE: device has signaling bus, loaded with clock signal, at least one couple of buses serving for encoding one bit, detector circuit, multiplexer. According to method in case of first value of signal of signal bus two buses of one couple detect same level of signal, and in case of second value of signal of signal bus two buses of one couple detect different signal levels, detect forbidden states during operation of board, change process of system functioning, to generate alarm in that way.
EFFECT: higher reliability of protection.
2 cl, 7 dwg
SUBSTANCE: device has central processing devices, including first cryptographic block, at least one peripheral block, including second cryptographic block, device also has data bus, random numbers generator, conductor for supplying clock signal, conductor for providing random numbers signal, set of logical communication elements, while each cryptographic block has register of displacement with check connection.
EFFECT: higher level of unsanctioned access protection.
7 cl, 1 dwg
FIELD: digital memory technologies.
SUBSTANCE: board has rewritable power-independent memory and control circuit, means for storing address, pointing at limit between authentication area and non-authentication area, circuit for changing size of said areas. Reading device contains estimation means, reading information, pointing at number of times, for which digital data can be read, and playback means. Second device variant additionally has means for digital output of contents.
EFFECT: higher efficiency.
3 cl, 23 dwg
FIELD: computer science.
SUBSTANCE: method includes protective mathematical conversion of service data of network frame prior to transfer to environment for transfer of a LAN. To said protective conversion the data is subjected, which is contained in headers of network frames of channel level, and also in headers of all encapsulated network packets and segments. As a result the very possibility of interception is prevented.
EFFECT: higher efficiency.
7 cl, 2 dwg
FIELD: data carriers.
SUBSTANCE: device for reproduction of data from data carrier, program zone of which is used for recording a set of files, and control zone - for controlling copy protection data concerning the file, recorded in program zone, has computer for calculating copy protection information for each time file is reproduced, comparison means for comparing value, calculated on reproduction command, being prior to current one, to value, calculated on current reproduction command, and if these values coincide, the last value is stored as copy protection value, calculated on reproduction command , prior to current one and control means for allowing reproduction of file, appropriate for current command, if value, calculated as response to command, previous relatively to current command, coincides as a result of comparison to value, calculated as a response to current command.
EFFECT: higher reliability, higher efficiency.
4 cl, 46 dwg
FIELD: data carriers.
SUBSTANCE: device has calculating, reserving and recording modules. Each variant of semiconductor memory card contains area for recording user data for controlling volume and area for recording user data. On carrier method for computer initialization is recorded, including calculation of size of volume control information, reserving areas and recording therein of control information for volume and user data, recording main boot record and sectors table in first section of first area, skipping preset number of sectors, recording information of boot sector of section, file allocation table and root directory element to following sectors.
EFFECT: higher efficiency.
5 cl, 59 dwg