Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
1998-10-06
2001-07-17
Beausoleil, Robert (Department: 2184)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C710S104000
Reexamination Certificate
active
06263441
ABSTRACT:
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention generally relates to computer systems, and more particularly to an inexpensive mechanism for real-time monitoring of computer components in network clients (workstations), and generating alerts to a remote network server signaling a component loss or change of system configuration.
2. Description of Related Art
A typical structure for a conventional computer system includes one or more processing units connected to a system memory device (random access memory or RAM) and to various peripheral, or input/output (I/O), devices such as a display monitor, a keyboard, a graphical pointer (mouse), and a permanent storage device (hard disk). The system memory device is used by a processing unit in carrying out program instructions, and stores those instructions as well as data values that are fed to or generated by the programs. A processing unit communicates with the other components by various means, including one or more interconnects (buses), or direct memory-access channels. A computer system may have many additional components, such as serial and parallel ports and expansion slots for connection to, e.g., printers and network adapters. Other components might further be used in conjunction with the foregoing; for example, a display adapter might be used to control a video display monitor, a memory controller can be used to access the system memory, etc.
Computers can be interconnected in a variety of ways, one common approach being a client-server network. A generalized client-server computing network
2
is shown in FIG.
1
. Network
2
has several nodes or servers
4
,
6
,
8
and
10
which are interconnected, either directly to each other or indirectly through one of the other servers. Each server is essentially a stand-alone computer system as described above (having one or more processors, memory devices, storage devices and communications devices), but has been adapted (programmed) for one primary purpose, that of providing information to individual users at another set of nodes, or workstation clients
12
. Clients
12
can also be fully functional, stand-alone computer systems (like computers, or PCs), or so-called “dumber” systems adapted for limited use with network
2
(like network computers, or NCs). A single, physical computer can act as both a server and a client, although this implementation occurs infrequently.
A client is generally a member of a class or group of computers or computer systems that uses the services of another class or group to which it is not related. A client also be thought of as a process (i.e., a program or task) that requests a service which is provided by another program. The client process uses the requested service without having to “know” any working details about the other program or the service itself. Based upon requests by the user, a server presents filtered electronic information to the user as server responses to the client process.
The information provided by a server can be in the form of programs which run locally on a given client
12
, or in the form of data such as files that are used by other programs. Users can also communicate with each other in real-time as well as by delayed file delivery, i.e., users connected to the same server can all communicate with each other without the need for the complete network
2
, and users at different servers, such as servers
4
and
6
, can communicate with each other via network
2
. The network can be local in nature, or can be further connected to other systems (not shown) as indicated with servers
8
and
10
. The construction of network
2
is also generally applicable to the Internet.
As described above, a given computer can have many components that are generally removable, and so a large network has a tremendous amount of such relocatable assets. Theft of personal computer components, particularly those located at unsecured workstation clients, is thus becoming a major industry problem. Costly components such as central processing units (CPUs), memory, hard disks and disk drives are easily removed. Frequently, the components are reinstalled in another machine within a company. In given the small size of many of the components, they can be hidden in a pocket, briefcase or purse, and away for use in a home system.
Several solutions have been provided to address the issue of component theft. Some computer desktop systems such as those sold by International Business Machines Corp. (IBM—assignee of the present invention) have a tamper detect circuit, which requires the user to enter a password to boot the system after the cover of the desktop unit has been removed. Another solution is IBM's “Alert on LAN,” which creates a network alert whenever a desktop unit's cover is removed. Neither of these solutions, however, provides information about removal or addition of critical components inside the computer system.
In light of the foregoing, it would be desirable to provide a method of notifying a remote server when key system components are removed or added to a networked computer. It would be further advantageous if the method did not require additional cabling or hardware, and if it could operate with standard network protocols and with standard management applications.
SUMMARY OF THE INVENTION
It is therefore one object of the present invention to provide an improved method and system for monitoring computer components.
It is another object of the present invention to provide such a method and system that can generate alerts to a remote network server in the event of a change in a computer's configuration.
It is yet another object of the present invention to provide such a method and system that is generally compatible with conventional hardware and protocols.
The foregoing objects are achieved in a method of monitoring a computer system, generally comprising the steps of detecting a change to a configuration of the computer system, using detection logic of the computer, and generating an alert associated with any change in the configuration in real time. The computer system is networked, and the alert is transmitted to a remote server. In an illustrative implementation, the detection logic can detect (i) a change in the number of storage devices present in the computer system, (ii) a change in the number of memory modules present in the computer system, and (iii) a change in the number of processors present in the computer system. The configuration information may be saved between boot operations of the computer using a battery-powered latch. By detecting any change with sensitive components on networked clients, the present invention provides effective asset control over relocatable computer components.
The above as well as additional objectives, features, and advantages of the present invention will become apparent in the following detailed written description.
REFERENCES:
patent: 5406260 (1995-04-01), Cummings et al.
patent: 5568611 (1996-10-01), Khatri et al.
patent: 5644731 (1997-07-01), Liencres et al.
patent: 5748083 (1998-05-01), Rietkerk
patent: 5912621 (1999-06-01), Schmidt
patent: 5945915 (1999-08-01), Cromer et al.
patent: 6014746 (2000-01-01), Krehnke et al.
patent: 6014747 (2000-01-01), Fackenthall et al.
patent: 6056579 (2000-05-01), Richards, III et al.
patent: 6064305 (2000-05-01), Lockyer
patent: 6111505 (2000-08-01), Wagener
patent: WO 97/09667 (1997-03-01), None
Microsoft Press, “Computer Dictionary, 2nd edition”, p. 182, 1994.
Cromer Daryl C.
Ellison Brandon J.
Evans Robert Joseph
Kern Eric Richard
Ward James Peter
Baderman Scott
Beausoleil Robert
Dillon Andrew
International Business Machines - Corporation
Schelkopf John B.
LandOfFree
Real-time alert mechanism for signaling change of system... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Real-time alert mechanism for signaling change of system..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Real-time alert mechanism for signaling change of system... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2484048