Browse Prior Art Database

Hardware Inventory Tamper Analysis

IP.com Disclosure Number: IPCOM000183867D
Original Publication Date: 2009-Jun-03
Included in the Prior Art Database: 2009-Jun-03
Document File: 1 page(s) / 24K

Publishing Venue

Lenovo

Abstract

Hardware attached to either a primary system or docked system may be tampered with, stolen, or replaced without owner's knowledge. A solution is provided herein.

This text was extracted from a Microsoft Word document.
This is the abbreviated version, containing approximately 100% of the total text.

Hardware Inventory Tamper Analysis

Hardware attached to either a primary system or docked system may be tampered with, stolen, or replaced without owner's knowledge.  Many automated hardware inventory solutions exist but rely on either the administrator to schedule the event or have the user to manually invoke it. Typically, changes in hardware are simply logged and little to no alerting is provided. 

Each time a system detects that it is locked in a dock or if a keylock is attached, it would invoke a hardware inventory of all peripherals attached. An alert, message, or log would be created for any changes which would immediately provide notification that a device was removed or changed. Stolen or missing devices would show up immediately allowing for a higher probability of recovery. Additionally the system would be triggered to alert the user if some form of software manipulation or unauthorized login was attempted by plugging in an external device.