Browse Prior Art Database

Wireless Inventory ID tags for Personal Computers and Devices Containing Multiple Components

IP.com Disclosure Number: IPCOM000126518D
Original Publication Date: 2005-Jul-22
Included in the Prior Art Database: 2005-Jul-22
Document File: 2 page(s) / 31K

Publishing Venue

IBM

Abstract

Radio Frequency Identification Tags For Personal Computers and Other Devices Containing Multiple Components allowing automated licensing checks, registration, helpdesk assistance, installation recovery, and more.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

Wireless Inventory ID tags for Personal Computers and Devices Containing Multiple Components

Disclosed is the ability to encrypt an RFID tag (or similar technology that stores data, with a common format, and can be read wirelessly) so that it includes information regarding the hardware and/or software that's contained in a particular Personal Computer (PC), PDA, Cell Phone, or other device that contains multiple types of hardware or software features. Adding tags to PCs or other electronically programmable devices that contain software and/or hardware information allows these items to be monitored. This can be used for problem determination, accurate logging of all system components when logged in and out of sales and repair facilities as well as validation of key numbers to ensure that software is validly and legally being used in this installation.

In one embodiment, the supplier of the hardware and/or software would create RFID tags that store inventory information for the product. The RFID tag would identify the component, serial number and/or software key, as applicable. When a component is installed, the accompanying RFID tag would be placed on (e.g., the back) of the machine. The machine's BIOS could read the RFID at boot up and log the component into its hardware and software configuration as appropriate. Alternatively, installing or executing a software application could trigger the reading of tags. Installing an application for the first time could read the serial numbers and use that information to register the product. Thereafter, when running the program, it could read the RFID tags to ensure that the registered numbers match that read from the tag.

The RFIDs would establish valid use of the hardware/software. This would deter the stealing of hardware memory cards or other components as the RFID would destruct if removed after being attached. Should a valid removal be necessary (e.g., PC upgrade), then a new RFID c...