GB2336225A - An in-line keyswitch for disabling computer keyboards or monitors - Google Patents
An in-line keyswitch for disabling computer keyboards or monitors Download PDFInfo
- Publication number
- GB2336225A GB2336225A GB9807829A GB9807829A GB2336225A GB 2336225 A GB2336225 A GB 2336225A GB 9807829 A GB9807829 A GB 9807829A GB 9807829 A GB9807829 A GB 9807829A GB 2336225 A GB2336225 A GB 2336225A
- Authority
- GB
- United Kingdom
- Prior art keywords
- key
- central processing
- processing unit
- alarm
- security device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Burglar Alarm Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
A key-operated computer security device 8 is interposed between a computer 2 and a keyboard 6 and monitor 4. The device 8 has a secure housing accommodating switches which interrupt clock, data, or synch. signals unless a physical key is applied to the device 8. The key may be an electronic key and the device may include a touch key system, the device 8 storing a number of codes for selected users. The cable connections may be released only by use of a special tool. A tamper loop may be connected to a remote alarm. The tamper loop may respond to tampering with the key decoding logic, and voltages may be applied to the cables to allow disconnection to be sensed.
Description
2336225 COMPUTER SYSTEM SECURITY DEVICE The present invention relates to
security devices for computer systems.
Computer systems generally comprise a central processing unit (CPU) in its own housing connected by cabling to a plurality of peripherals such as a keyboard, a mouse, a visual display unit (VDU) and a printer.
Access to certain parts of the CPU are often inhibited by the need to input a password. In the event that the user is temporarily absent from his computer, there is a reluctance of the user to switch the system OFF, since on return to the computer, there is considerable delay due to warm-up time, booting time and time to input the password before the system is again ready for use. As a consequence, most users tend to leave the computer unprotected for short periods, during which time, the data can be accessed by unauthorised personnel.
Also password& tend to be less secure than physical keys and so password systems are generally less secure.
According to the present invention there is provided a computer system security device, comprising a unit providing a connection between a central processing unit and separate peripheral components, said device comprising switching means for interrupting at least one electrical path between the central processing unit and each of the peripheral components, and a key operated lock allowing the switch means to be operated to complete said electrical path only when the correct key is used.
A computer system security device embodying the present invention, will now be described, by way of example, with reference to the accompanying diagrammatic drawings, in which:
Figure 1 is a block diagram of the system; and Figure 2 is a circuit and block diagram of the security device.
A computer system as shown in Figure 1, includes a central processing system 2 in its own housing, a separate video monitor 4 and a separate keyboard 6. A security device 8, in its own housing, provides a connection from the keyboard 6 to the CPU 2 and a connection from the monitor 4 to the CPU 2.
The original keyboard and monitor cables are used to connect them to the device 8 while extension leads are provided to connect the keyboard and monitor terminals on the CPU to the security device 8.
The connectors, at the opposite ends of the cables, are locked to their respective connections using security bolts or fixings (not shown) which need a special tool to remove them, thereby making it difficult to bypass the device with auxiliary cables.
The device is provided with a key socket which may comprise a mechanical lock but is preferably an electrical key lock.
The security device as shown more clearly in Figure 2, is essentially a switch which interrupts certain links between the CPU 2 and its peripherals. The links are selected so that the peripherals remain in an energised or stand-by phase but are disabled from active interaction with the CPU 2.
As shown in Figure 2, the cable from the CPU 2 to the monitor 4 has its horizontal synch wire and vertical synch wire interrupted by respective switches 10 and 12 while the cable from the CPU 2 to the keyboard has its clock pulse and/or data transmission wires interrupted bv switches 14 decoding logic of the correct 10 to 16.
and 16. The switches are operated by a key unit 18 which responds to the application electronic key to close all four switches The unit 18 responds to the reapplication or removal of the key to open all four switches 10 to 16. The key may be secured by an elongate member to the user so that if the user leaves the station, the key also has to leave.
The unit 8 also has a tamper loop system connected to a remote alarm (not shown).
The tamper loop system may respond to the key decoding logic unit being tampered with to generate an alarm. The tamper loop system is also coupled to certain wires of the cables attached to the security device to apply a voltage thereto. When one or more cables are disconnected, an electrical change takes place and by monitoring this change, an alarm can be generated to indicate that a cable has been disconnected.
The voltage applied to the cable is primarily provided from the CPU 4 but in the event that the CPU 4 is switched OFF a back up battery with a long life takes over.
Where the electronic key system comprises an electronic touch key system, the security unit 8 may be provided with a memory capable of storing a plurality of allowable codes so that the security device can be used by a plurality of different selected individuals, each with their own unique code.
Thus, when a user ceases to be authorised or loses their key, the memory can be accessed and that code deleted.
While the switches 10 to 16 are preferably electronic switches such as controlled diodes, they may, of course, be electromechanical switches such as relays.
The housing for the security device is a robust housing secured with tamper proof fixings to prevent access to the contents thereof.
1 i
Claims (7)
1. A computer system security device, comprising a unit providing a connection between a central processing unit and separate peripheral components, said device comprising switching means for interrupting at least one electrical path between the central processing unit and each of the peripheral components, and a key operated lock allowing the switch means to be operated to complete said electrical path only when the correct key is used.
2. A device according to Claim 1, wherein said lock comprises an electronic lock.
3. A device according to Claim 2, wherein said electronic lock comprises a touch key lock.
4. A device according to any one of Claims 1 to 3, including an alarm system which responds to tampering by operating an alarm.
5. A device according to Claim 4, wherein said alarm system monitors at least one electrical path to the central processing unit and to each of said peripherals and triggers the said alarm when a said path is interrupted.
6. A device according to any preceding claim, wherein the connection between the device and the peripheral components and the central processing unit is provided by cable connections which are secured to corresponding connections with the aid of fastenings which - 6 can only be released with a special tool.
7. A computer system security device substantially as hereinbefore described, with reference to the accompanying drawings.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9807829A GB2336225A (en) | 1998-04-09 | 1998-04-09 | An in-line keyswitch for disabling computer keyboards or monitors |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9807829A GB2336225A (en) | 1998-04-09 | 1998-04-09 | An in-line keyswitch for disabling computer keyboards or monitors |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9807829D0 GB9807829D0 (en) | 1998-06-10 |
GB2336225A true GB2336225A (en) | 1999-10-13 |
Family
ID=10830254
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9807829A Withdrawn GB2336225A (en) | 1998-04-09 | 1998-04-09 | An in-line keyswitch for disabling computer keyboards or monitors |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2336225A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2825492A1 (en) * | 2001-05-31 | 2002-12-06 | Acive | Equipment for controlling access to personal computer, comprises electronic lock interposed between computer and external peripherals and released by the use of smart card containing electronic key |
GB2411255A (en) * | 2004-01-20 | 2005-08-24 | Alessandro Deriu | Input control system |
GB2527504A (en) * | 2014-06-19 | 2015-12-30 | Audiotel Internat Ltd | Monitoring system for data communication / electrical signalling cables |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2060228A (en) * | 1979-10-09 | 1981-04-29 | Mastiff Security Syst Ltd | Computer System |
US4975550A (en) * | 1989-06-12 | 1990-12-04 | Panchisin S Joseph | Security device for computers |
US5313639A (en) * | 1992-06-26 | 1994-05-17 | George Chao | Computer with security device for controlling access thereto |
US5434562A (en) * | 1991-09-06 | 1995-07-18 | Reardon; David C. | Method for limiting computer access to peripheral devices |
WO1997046931A1 (en) * | 1996-06-05 | 1997-12-11 | Ckd (S.A.) | Device for ensuring the safety of computerised transactions, in particular for electronic payment |
-
1998
- 1998-04-09 GB GB9807829A patent/GB2336225A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2060228A (en) * | 1979-10-09 | 1981-04-29 | Mastiff Security Syst Ltd | Computer System |
US4975550A (en) * | 1989-06-12 | 1990-12-04 | Panchisin S Joseph | Security device for computers |
US5434562A (en) * | 1991-09-06 | 1995-07-18 | Reardon; David C. | Method for limiting computer access to peripheral devices |
US5313639A (en) * | 1992-06-26 | 1994-05-17 | George Chao | Computer with security device for controlling access thereto |
WO1997046931A1 (en) * | 1996-06-05 | 1997-12-11 | Ckd (S.A.) | Device for ensuring the safety of computerised transactions, in particular for electronic payment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2825492A1 (en) * | 2001-05-31 | 2002-12-06 | Acive | Equipment for controlling access to personal computer, comprises electronic lock interposed between computer and external peripherals and released by the use of smart card containing electronic key |
GB2411255A (en) * | 2004-01-20 | 2005-08-24 | Alessandro Deriu | Input control system |
GB2527504A (en) * | 2014-06-19 | 2015-12-30 | Audiotel Internat Ltd | Monitoring system for data communication / electrical signalling cables |
Also Published As
Publication number | Publication date |
---|---|
GB9807829D0 (en) | 1998-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5347095A (en) | Electrical receptacle for use with annunciator apparatus for monitoring electrical connections | |
US8473651B1 (en) | Isolated protected access device | |
US6115822A (en) | Power distribution unit for detecting system status | |
US5960172A (en) | Digital computer system security device | |
US5506990A (en) | Key lock system for personal computer | |
KR19980703809A (en) | Electronic device protection method and device against theft | |
US5818345A (en) | Theft protection for electrically-powered articles | |
EP0889415A2 (en) | Dual voltage card connector | |
CA2272693A1 (en) | Multi-computer access secure switching system | |
JPH0356027B2 (en) | ||
US7409563B2 (en) | Method and apparatus for preventing un-authorized attachment of computer peripherals | |
WO1993019415A1 (en) | Intelligent power supply | |
US9400896B2 (en) | Portable computer and security operating method thereof | |
WO1997009667A1 (en) | Method of monitoring a computer system | |
GB2336225A (en) | An in-line keyswitch for disabling computer keyboards or monitors | |
WO1997003397A1 (en) | A method and an arrangement relating to theft-deterrents | |
SE513662C3 (en) | Procedure and device for the prevention of theft | |
US20030217293A1 (en) | System for permitting access to an electronic device when the password is not known | |
JP2732520B2 (en) | Anomaly detection device | |
US6338142B1 (en) | Method and apparatus for providing secure lockout in electronic devices | |
GB2274532A (en) | Method and apparatus for securing mains powered electrical equipment | |
JPH08320742A (en) | Power source monitor system | |
GB2285703A (en) | Computer apparatus with anti-theft deterrent provision | |
WO2002043342A3 (en) | Link-lock device and method of monitoring and controlling a link for failures and intrusions | |
CA2054486C (en) | Reservation and interlocking in the operation of electric switching devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |