Browse Prior Art Database

Computer security system with handleld wireless devices

IP.com Disclosure Number: IPCOM000013318D
Original Publication Date: 2002-Oct-10
Included in the Prior Art Database: 2003-Jun-18
Document File: 3 page(s) / 39K

Publishing Venue

IBM

Abstract

A program is disclosed that enables data security on portable computes. This program keeps watching a handheld wireless device which is owned by operater. If operater moved with the handheld wireless device and went away from the personal computer, this program automatically enables security feature to lock the personal computer. This program senses operater's absense by detecting wireless communication is lost or radio signal becomes too weak. Fig.1 shows how this program works..................................... Title: Computer Security Function for Portable Wireless Devices Computers are highly susceptible to unauthorized use and theft.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 3

Computer security system with handleld wireless devices

         A program is disclosed that enables data security on portable computes.
This program keeps
watching a handheld wireless device which is owned by operater. If operater
moved with the handheld
wireless device and went away from the personal computer, this program
automatically enables
security feature to lock the personal computer. This program senses
operater's absense by
detecting wireless communication is lost or radio signal becomes too weak.

Fig.1 shows how this program works.....................................

Title: Computer Security Function for Portable Wireless Devices

Computers are highly susceptible to unauthorized use and theft.

According to one statistic, theft of PCs in the U.S. is second only to that of
automobiles, with damage of over $1.4 billion.

If stolen, the chance that a PC will be returned is just 3%.

The damage caused by unauthorized use of data is incalculable. A list of
customers being stolen is at the lower end of the scale,
while it was not too long ago that secret data regarding nuclear power was
stolen from the Los Alamos Research Center.

In some cases, greater damage occurs by data being stolen from a computer than
if the computer hardware itself was stolen.

The strengthening of computer security is an eternal problem concerning
computers.

On the other hand, recently people carrying around cellular phones and
portable information devices has become an everyday occurrence.

These devices are made to always be carried around and used, and so normally
they move around with the owner.

Due to advances in technology, wireless communication has become possible
between computers and cellular phones or portable information devices.
However, in order to use radio wave resources effectively, or in order to
reduce power consumption, the radio waves used in such wireless technology are
of short range.

Therefore, using this kind of situation, the essence of this invention is that
"if it is detected that a cellular phone or portable information device

  (that is being carried around by its owner) with wireless communication
ability has gone outside its communication range, a previously determined
security measure is activated, preventing unauthorized use or theft of the
computer".

It is taken that a computer is fitted with wireless communication, and that it
can co...