WO2006089352A1 - Method and system for monitoring computer systems - Google Patents
Method and system for monitoring computer systems Download PDFInfo
- Publication number
- WO2006089352A1 WO2006089352A1 PCT/AU2006/000217 AU2006000217W WO2006089352A1 WO 2006089352 A1 WO2006089352 A1 WO 2006089352A1 AU 2006000217 W AU2006000217 W AU 2006000217W WO 2006089352 A1 WO2006089352 A1 WO 2006089352A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer system
- snapshot
- hardware configuration
- name
- hardware
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Definitions
- TITLE METHOD AND SYSTEM FOR MONITORING COMPUTER SYSTEMS
- the present invention relates to methods and systems for monitoring computer systems and more particularly to monitoring modifications to hardware configurations of computer systems.
- Manufacturer's warranties vary in terms of the extent of repair, replacement and refund options that are available for a particular product. Most manufacturers' warranties contain express limitations regarding computer equipment which has been modified since the purchase date.
- Extended warranties may take effect either when the manufacturer's warranty expires, or operate during and after the term of the manufacturer's warranty. Some extended warranties can be obtained through third-party warranty vendors.
- Warranty abuse or fraud is a major problem for warranty vendors.
- the customer When system failures occur for a product under warranty, the customer usually sends the system back to the manufacturer or authorised service provider for warranty repair. The manufacturer or third party warranty provider then repairs the system, expending whatever parts and/or labour are required to rectify the problem.
- the manufacturer or third party warranty provider then repairs the system, expending whatever parts and/or labour are required to rectify the problem.
- a related issue is an increase in the theft of notebooks, desktop computers and peripheral computer equipment, The theft of such devices has become a significant problem for many businesses, Security measures such as password protection can be readily circumvented by making hardware modifications to the stolen computer.
- a method for tracking modifications to a hardware configuration of a computer system including the following steps;
- the method further includes the step of generating an alert to notify a nominated person that a modification has been made to the hardware configuration, Such an alert may be directed to a system administrator, warranty provider or other nominated person.
- the fi ⁇ st point in time occurs when a program for performing the steps of the method for tracking modifications to a hardware configuration of a computer system is installed in the computer system and the second point in time occurs each time the computer system is turned on or restarted subsequent to the program being installed on the computer system.
- the hardware configuration includes one or more of the following:
- CPU central processing unit
- peripheral devices Most preferably, the method further includes the following steps:
- the network identifier can be used to determine the physical location of the computer system.
- the network identifier may include one or more of the following:
- the method further includes the step of monitoring a performance parameter of one or more hardware components,
- the performance parameter is measured and the measured performance parameter is compared to a stored performance parameter included in the first snapshot.
- the performance parameter is measured each time the system is started up.
- a change in the performance parameter ' causes an alert to be generated to notify the nominated person that a potential problem exists with the hardware component.
- a method of 5 providing a warranty for a computer system including the following steps:
- a difference between the first and second snapshots indicates that 0 a change has been made to the hardware configuration of the computei system and causes the warranty provider to reassess validity of the warranty
- the network identifier can be used to determine the physical location of the computer system.
- An advantage of the present invention is that manufacturer's and/or other warranty providers are enabled to monitor whether hardware modifications have been made ; to a computer system to alleviate the problem of fraudulent warranty claims
- FIG. 1 is a systematic view showing the system components used to perform the present invention according to an embodiment.
- Figure 2A is a flow chart illustrating the steps of the method of the present invention according to an embodiment.
- Figure 2B is a flowchart which is a continuation of the flow chart in Figure 2A,
- the components include a plurality of computer systems 10 coupled to a remote server 12 via a TCP/iP 10 network 14 such as the Internet or some other analogous network.
- a software program configured to perform the steps of the method must be installed on each of the computer systems to be monitored 16.
- the program is configured to capture a snapshot of the hardware configuration of the system and transmit the same to a remote server via a network for storing
- Installation of this software involves the inputting of requested user data for storage in a database on the remote server 18.
- the requested data includes a product key (or warranty identification number) which is provided on purchase of the software, a purchase date, an expiry date, and customer details including the name and email address of a person nominated by the 0 customer to receive alerts regarding any system modifications, This person may be a system administrator, computer system manufacturer, warranty provider, or other suitable person.
- the data provided by the customer is encrypted and transmitted to the remote server, where it is stored in a database.
- the 5 system conducts a check to ensure that the product key is valid 20, If the product key is not valid, the registration process is terminated, If the product key is valid, the registration process is completed and the user data is entered into and stored in the database. Once the user data has been entered into the database, an auto generated PDF file containing the warranty policy details, terms and conditions is forwarded to the nominated person's email address for future reference.
- a first snapshot of the hardware configuration of the system is captured 24.
- the hardware configuration may include any one or more of the following: disc drive type; central processing unit (Cf 3 U) type; memory configuration; connected peripheral devices and the like.
- the snapshot includes a build sheet encompassing the system's hardware configuration. I O
- the snapshot or build sheet is stored in the database as an XML file 26. An example of such a build sheet is shown in Appendix 1.
- the sample build sheet provides a number of examples of features which may b ⁇ monitored in accordance with an embodiment of the invention.
- the first snapshot will include data relating to hardware components and ! 5 specifications which were installed in the system when it was built and/or when the software was installed.
- original equipment may be annotated as "original equipment" for easy reference,
- a second or subsequent snapshot is captured automatically each time that the computer system is turned on or restarted 28.
- the 0 second snapshot captures the same data set as the first snapshot but at a subsequent point in time 30. This enables the snapshots to be compared such that any difference in the snapshot data is indicative of modifications made to the hardware configuration of the computer system in the intervening period,
- the second snapshot is encrypted 5 and transmitted to the remote server 32 for comparison to the first snapshot 34. Any variation in system configuration parameters between the first and second snapshots indicates that a modification has been made to the hardware configuration since the first snapshot was captured 36.
- the build sheet resulting from the second snapshot is annotated with the terms "modified equipment" or similar to clearly indicate which system configuration parameters have been modified.
- the resulting build sheet can also be configured to indicate when a hardware modification was detected
- the rnodif ⁇ cation(s) will be stored in an XML file to be transmitted to the server the next time that a network connection is delected
- T are two clear uses for the system hardware modification data Firstly, a system administrator can be made aware that a hardware modification has occurred to enable appropriate action to be taken if required For example, consider the scenario where the hardware modification is the result of a monitor having been disconnected from the computer system The alert should prompt the system administrator to take appropriate steps to determine whether disconnection of the device was authorised and if not, and attempts to locate the missing device are unsuccessful, it can be concluded that device has been stolen, This enables system administrators to monitor theft of computer components which may not otherwise be obvious
- the system preferably includes a theft tracking facility.
- the role of the theft tracking facility is to monitor the status of each computer system and if the status is recorded as "stolen" to undertake to track a location identifier associated with the device, Each time the computer system is turned on or restarted, a check is made of the status of the system.
- the theft tracking script may be an ASP script residing on the remote server.
- the script runs in the background such that a thief would not ordinarily be aware that the stolen computer is being tracked.
- the ASP theft tracker script according to an embodiment of the invention is attached as Appendix 2,
- the theft tracking script captures a network identifier as soon as the stolen computer system is connected to the Internet
- the network identifier is typically a network address which is given to a device when it is manufactured or assigned when the device is connected to a network.
- Such network addresses include Internet Protocol
- IP addresses IP addresses
- MAC addresses Media Access Protocol addresses
- IP address can be used to trace the physical location of the device and will also have associated with it the name and address of the IP address owner.
- the network identifier is forwarded to the nominated person to enable action to be taken to determine the physical address of the device, such as for example contacting an Internet Service provider for resolution of the IP address.
- the monitoring system can further monitor performance parameters of one or more system hardware components.
- the first snapshot includes a fan speed in revolutions per minute (rprn).
- the original fan speed is logged together with the snapshot data on the build sheet such that it can be compared with the fan speed at subsequent points in time.
- the system may be configured to generate an alert if there is a change in the fan speed, A tolerance level can be set by the warranty provider at say 20% or some other appropriate figure, In this case the alert would indicate that preventative maintenance is required before the fan fails.
- RSPIDJ/IMColParam REQUESTQueryStringfpld) else RSPID.MMColParam - REQUEST,form("pid)
- RSPID Server.CreateObjectC'ADODB.R ⁇ Cordset"
- RSPID.ActiveConnection conn
- RSPID LockType a 2 RSPID.OpenO
- RSPID(" CLI ENT_PID") req uest.form (“pld”)
- RSPID("REMOTE_IP) request.ServerVariables("REMOTE_ADDR”)
- RSPID("REMOTE_MAC”) req uest.form ⁇ "remote_mac)
- RSPID("DENIED_REQUEST” ) request.form("denied_request)
- RSPID("DENIED_REASON”) request.form("denied_reason”)
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Environmental & Geological Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
Abstract
A method for tracking modifications to a hardware configuration of a computer system is disclosed, the method including the steps of (a) capturing a first snapshot of the hardware configuration of the computer system at a first point in time; (b) storing the first snapshot in a remote database; (c) capturing a second snapshot of the hardware configuration of the computer system at a second subsequent point in time; and (d) comparing the stored first snapshot and the second snapshot. Any difference between the first and second snapshots indicates that a change has been made to the hardware configuration of the computer system. This method can reduce warranty abuse or fraud by the users of the computer system and also reduce the likelihood of theft of the computer(s) and any attached peripheral equipment.
Description
TITLE: METHOD AND SYSTEM FOR MONITORING COMPUTER SYSTEMS
Field of the Invention
The present invention relates to methods and systems for monitoring computer systems and more particularly to monitoring modifications to hardware configurations of computer systems.
Background to the Invention
Many new computer products and peripherals are covered by a manufacturer's warranty. Manufacturer's warranties vary in terms of the extent of repair, replacement and refund options that are available for a particular product. Most manufacturers' warranties contain express limitations regarding computer equipment which has been modified since the purchase date.
Many computer equipment distributors or resellers offer extended warranties on newly purchased equipment which constitutes an upgrade on the basic manufacturer's warranty, Extended warranties may take effect either when the manufacturer's warranty expires, or operate during and after the term of the manufacturer's warranty. Some extended warranties can be obtained through third-party warranty vendors.
Warranty abuse or fraud is a major problem for warranty vendors. When system failures occur for a product under warranty, the customer usually sends the system back to the manufacturer or authorised service provider for warranty repair. The manufacturer or third party warranty provider then repairs the system, expending whatever parts and/or labour are required to rectify the problem. However, it is not uncommon for a customer to modify a system through installation of non-genuine, defective or used parts, before reporting the system as being faulty and returning it to the manufacturer or third party warranty provider for repair under warranty.
A related issue is an increase in the theft of notebooks, desktop computers and peripheral computer equipment, The theft of such devices has become a significant problem for many businesses, Security measures such as password protection can be readily circumvented by making hardware modifications to the stolen computer. Moreover, such security measures clearly fail to prevent or deter authorised users to whom the password is known from stealing computing equipment. Other security measures such as physical locks and other attachment devices can be forcibly removed and an authorised user with an appropriate key can merely use the key to unlock the attachment device and steal the computer,
The discussion of the background to the invention included herein is included to explain the context of the invention, This is not to be taken as an admission that any of the material referred to is published, known or part of the common general knowledge as at the priority date of the claims,
Summary of the Invention
According to an aspect of the present invention, there is provided a method for tracking modifications to a hardware configuration of a computer system, the method including the following steps;
(a) capturing a first snapshot of the hardware configuration of the computer system at a first point in time;
(b) storing the first snapshot in a remote database;
(c) capturing a second snapshot of the hardware configuration of the computer system at a second subsequent point in time;
(d) comparing the stored first snapshot and the second snapshot;
wherein any difference between the first and second snapshots indicates that a change has been made to the hardware configuration of the computer system.
The tracking of modifications to the hardware configuration of a computer system is useful both for warranty providers and also for reporting theft of computer components.
Preferably, the method further includes the step of generating an alert to notify a nominated person that a modification has been made to the hardware configuration, Such an alert may be directed to a system administrator, warranty provider or other nominated person.
In a preferred embodiment of the invention, the fiπst point in time occurs when a program for performing the steps of the method for tracking modifications to a hardware configuration of a computer system is installed in the computer system and the second point in time occurs each time the computer system is turned on or restarted subsequent to the program being installed on the computer system.
In one form of the invention, the hardware configuration includes one or more of the following:
(a) disc drive type;
(b) central processing unit (CPU) type;
(c) memory configuration;
(d) peripheral devices.
Most preferably, the method further includes the following steps:
(a) checking a status of the computer system each time a snapshot is captured; and
(b) if the status of the computer system indicates that the system has been stolen;
(c) determining a network identifier associated with the computer system; and
(d) reporting the network identifier to the nominated person;
wherein the network identifier can be used to determine the physical location of the computer system.
The network identifier may include one or more of the following:
(a) an IP address; or
(b) a MAC address.
In one embodiment, the method further includes the step of monitoring a performance parameter of one or more hardware components,
Preferably, the performance parameter is measured and the measured performance parameter is compared to a stored performance parameter included in the first snapshot. Preferably, the performance parameter is measured each time the system is started up.
Most preferably, a change in the performance parameter' causes an alert to be generated to notify the nominated person that a potential problem exists with the hardware component.
According to another aspect of the present invention, there is provided a method of 5 providing a warranty for a computer system, the method including the following steps:
(a) providing software for tracking changes in one or more hardware configuration parameters in a computer system.
(b) installing the software on the computer system;
■ 0 (C) capturing a first snapshot of a hardware configuration of the computer system at a first point in time;
(d) storing the first snapshot in a remote database;
(e) capturing a second snapshot of the hardware configuration of the computer system at a second subsequent point in time,
; 5 (f) comparing the stored first snapshot and the second snapshot, and
(9) generating an alert for transmission to a warranty provider if the comparison reveals any difference between the first and second snapshots;
wherein a difference between the first and second snapshots indicates that 0 a change has been made to the hardware configuration of the computei system and causes the warranty provider to reassess validity of the warranty
According to yet another aspect of the present invention, there is provided a method of tracking a stolen computer system, including the following steps-
(a) providing software for tracking a network identifier associated with a computer system;
(b) installing the software on the computer system,
(c) reporting the computer system as being stolen;
(d) monitoring a network identifier associated with the stolen system; and
(e) reporting the network identifier to the nominated person,
wherein the network identifier can be used to determine the physical location of the computer system.
An advantage of the present invention is that manufacturer's and/or other warranty providers are enabled to monitor whether hardware modifications have been made; to a computer system to alleviate the problem of fraudulent warranty claims
Another advantage of the present invention is the ability to track a network identifiei for a stolen computer system which can be used to determine a physical location of the stolen device
Brief Description of the Drawings
The invention will hereinafter be described in greater detail with reference to the attached drawings, which show example embodiments of the invention It is to bo understood that the particularity of the drawings does not supersede the generality of the preceding description of the invention
Figure 1 is a systematic view showing the system components used to perform the present invention according to an embodiment.
Figure 2A is a flow chart illustrating the steps of the method of the present invention according to an embodiment.
5 Figure 2B is a flowchart which is a continuation of the flow chart in Figure 2A,
Detailed Description
Referring firstly to Figure 1 , there are shown the components used to perform the method according to one embodiment of the invention. The components include a plurality of computer systems 10 coupled to a remote server 12 via a TCP/iP 10 network 14 such as the Internet or some other analogous network.
Referring now to Figure 2A, a software program configured to perform the steps of the method must be installed on each of the computer systems to be monitored 16. The program is configured to capture a snapshot of the hardware configuration of the system and transmit the same to a remote server via a network for storing
I S and/or further processing. Installation of this software involves the inputting of requested user data for storage in a database on the remote server 18. The requested data includes a product key (or warranty identification number) which is provided on purchase of the software, a purchase date, an expiry date, and customer details including the name and email address of a person nominated by the 0 customer to receive alerts regarding any system modifications, This person may be a system administrator, computer system manufacturer, warranty provider, or other suitable person.
The data provided by the customer is encrypted and transmitted to the remote server, where it is stored in a database. As part of the registration process, the 5 system conducts a check to ensure that the product key is valid 20, If the product key is not valid, the registration process is terminated, If the product key is valid, the
registration process is completed and the user data is entered into and stored in the database. Once the user data has been entered into the database, an auto generated PDF file containing the warranty policy details, terms and conditions is forwarded to the nominated person's email address for future reference.
5 Once the software has been installed and registered, a first snapshot of the hardware configuration of the system is captured 24. The hardware configuration may include any one or more of the following: disc drive type; central processing unit (Cf3U) type; memory configuration; connected peripheral devices and the like. The snapshot includes a build sheet encompassing the system's hardware configuration. I O The snapshot or build sheet is stored in the database as an XML file 26. An example of such a build sheet is shown in Appendix 1. The sample build sheet provides a number of examples of features which may bθ monitored in accordance with an embodiment of the invention.
The first snapshot will include data relating to hardware components and ! 5 specifications which were installed in the system when it was built and/or when the software was installed. In the build sheet, original equipment may be annotated as "original equipment" for easy reference,
Referring now to Figure 2B, a second or subsequent snapshot is captured automatically each time that the computer system is turned on or restarted 28. The 0 second snapshot captures the same data set as the first snapshot but at a subsequent point in time 30. This enables the snapshots to be compared such that any difference in the snapshot data is indicative of modifications made to the hardware configuration of the computer system in the intervening period,
As with the first snapshot (or original build sheet) the second snapshot is encrypted 5 and transmitted to the remote server 32 for comparison to the first snapshot 34. Any variation in system configuration parameters between the first and second snapshots indicates that a modification has been made to the hardware configuration since the first snapshot was captured 36. The build sheet resulting from the second snapshot
is annotated with the terms "modified equipment" or similar to clearly indicate which system configuration parameters have been modified. The resulting build sheet can also be configured to indicate when a hardware modification was detected In the event that the computer system is not connected to a network when modification of hardware configuration is detected, the rnodifιcation(s) will be stored in an XML file to be transmitted to the server the next time that a network connection is delected It is to be understood that the tracking of hardware configuration modifications is a transparent back end process,
When the comparison indicates that a modification has been made 38, an alert is generated for transmission to the nominated person, to notify the system administrator, warranty provider or other suitable person that a hardware modification has occurred in a system for which the nominated person is responsible 40
T here are two clear uses for the system hardware modification data Firstly, a system administrator can be made aware that a hardware modification has occurred to enable appropriate action to be taken if required For example, consider the scenario where the hardware modification is the result of a monitor having been disconnected from the computer system The alert should prompt the system administrator to take appropriate steps to determine whether disconnection of the device was authorised and if not, and attempts to locate the missing device are unsuccessful, it can be concluded that device has been stolen, This enables system administrators to monitor theft of computer components which may not otherwise be obvious
Alternatively, the occurrence of any hardware modifications can be reported to a warranty provider such that the warranty provider can determine whether the modification invalidates the terms of any warranty existing for the computer system T he database on the remote server may be provided by a warranty vendor, to enable the warranty vendor to keep lrack of any authorised or unauthorised hardware modifications
In addition to the hardware modification facility, the system preferably includes a theft tracking facility. The role of the theft tracking facility is to monitor the status of each computer system and if the status is recorded as "stolen" to undertake to track a location identifier associated with the device, Each time the computer system is turned on or restarted, a check is made of the status of the system. For instance, if a system administrator advised the warranty provider that a particular system has been stolen, that system will be flagged as being stolen in the database and subsequent sta rting of that device will cause the theft tracking script to be activated , The theft tracking script may be an ASP script residing on the remote server. In ■ addition, it should be understood that the script runs in the background such that a thief would not ordinarily be aware that the stolen computer is being tracked. The ASP theft tracker script according to an embodiment of the invention is attached as Appendix 2,
The theft tracking script captures a network identifier as soon as the stolen computer system is connected to the Internet, The network identifier is typically a network address which is given to a device when it is manufactured or assigned when the device is connected to a network. Such network addresses include Internet Protocol
(IP) addresses or Media Access Protocol (MAC) addresses, An IP address can be used to trace the physical location of the device and will also have associated with it the name and address of the IP address owner.
The network identifier is forwarded to the nominated person to enable action to be taken to determine the physical address of the device, such as for example contacting an Internet Service provider for resolution of the IP address. An advantage of hosting the theft tracker script on the remote server is that any problems and/or issues with the script can be sorted out at the server end without requiring access to the client.
In addition to monitoring hardware configuration modifications, the monitoring system can further monitor performance parameters of one or more system hardware components. For instance, the first snapshot includes a fan speed in
revolutions per minute (rprn). The original fan speed is logged together with the snapshot data on the build sheet such that it can be compared with the fan speed at subsequent points in time. The system may be configured to generate an alert if there is a change in the fan speed, A tolerance level can be set by the warranty provider at say 20% or some other appropriate figure, In this case the alert would indicate that preventative maintenance is required before the fan fails.
It is to be understood that various additions, alterations and/or modifications may be made to the parts previously described without departing from the ambit of the invention.
Appendix 1
- <ORIG!NAL_BUIDSHEET>
- <HEADER>
<ID>PC888990</ID>
<DATE>30/12/2004</ DATE> </HEADER>
-<DISKDRIVEJHARDWARE>
-<WIN32_DISKDRIVE devicestatus="or!glnal equipment" guid="IDE\DISKIC2SN020ATCS04-0_CA2OA71A\5&3923B928&0&0.0.0 ">
<Availability>,</Availability> <BytesPerSector>512</BytesPerSector>
<Caption>IC25N020ATCS04-0</Caρtion>
<DθScription>Di8k drivθ</DθScription>
<DevicelD^\\.\PHYSICALDRIVEO</DθvicelD>
<lndex>0</lndex> <lπstallDatθ/>
<lntβrfaceType>lDE</lnterfaceType>
<Manufacturer>(Staπdard disk drivθβ)</Manufadurer>
<MediaLoadθd>Truθ</MθdlaLθaded> <MediaTyρe>Flxed hard disk mβdia</MediaType>
<Model>b</Model>
«Name>\\.\PHYSICALDRIVE0</Name> <Partitions>4</Partitions> <PNPDeviceID>IDEDISKIC25N020ATCS04- 0_CA20A71A\5&3923B928&o&0.0.0</PNPDeviceID>
<PowerManagementsupported />
<SectorsPerTrack>63</SectorsPerTrack>
<Size>20,003,880,960</Size>
<Status>OK</Status>\ <Statuslnfo />
<TotalCylinders>2,432</TotalCylinders>
<ConfigMaπagerErrorCode>Device is working properly </ConfigManagerErrorCode>
</W!N32_DISKDRIVE> </D!SKDRIVE_HARDWARE>
- <FAN_HARDWARE>
-<WIN32_FAN devicestatus="original equipment" guid-"">
<PowerManagementCapabilities>b</PowerManagerπentCapabilities>
</WlN32_FAN> </FAN_HARDWARE>
-<CDROMDR!VE_HARDWARE>
-<WIN32-CDROMDRIVE devicestatus="original equipment" guid="IDE\CDROMSAMSUNG_CD-ROM_SN124-N100-\5&10429FC6&0&0.0.0">
<Availability>,running/full power</Availability> <BytesPerSector l>
<Caption>SAMSUNG CD-ROM SN-124</Caption>
<Description>CD-ROM Drfve</Description»
<DevicelD>IDE\CDROMSAMSUNG-CD-ROM-SN-124N100_
\5&10429FC6&0&0.0.0</DeviceID> < Index />
<Jnsta)IDate /> ^lnterfaceType />
<Manufacturer>(Standard CD-ROM drives)</Manufacturer>
<MediaLoaded> False</MediaLoaded>
<MediaType>CD-ROM</Med iaType>
<Model /> <Name>SAMSUNG CD-ROM SN-124</Name>
^Partitions />
<PNPDevicelD>IDE\CDROMSAMSUNG-C D-ROM_SN-
124_N100_\5&10429FC6&0&0.0.0</PNPDevιcelD>
<PowerManagementSupported /> <SectorsPerTrack />
<Size />
<Status>OK</Status>
<Statuslnfo l>
<Tota!Cylinders /> <ConfigManagerErrorCode>Device is working properly. </ConfigManagerE rrorCode>
<PowerManagemeπtCapabilities>Unknowri</PowerMaπagemeπtCapabilities>
</WIN32.. CDROMDRIVE>
</CDROM DRIVE.. HAR DWAR E > - <FLOPPYDRIVE_HARDWARE>
• <WIN32_FLOPPYDRIVE devicestatus="original equipment" guid= "FDC\GENERIC-FLOPPY_DRIVE\5&3371E7B8&0&0">
^Availability>, running/full power</Availabi!ity>
<Caρtion>Floppy disk drive</Caption> <Descriρtion>b</Descrlptlon>
<DevicelD>FDC\GENERIC-FLOPPY_DRIVE\5&3371E7B8&0&0</DevicelD>
<lπstallDa(:e />
<Manufacturer>(Standard floppy disk drivβs)</Manufacturer>
^Name>Floppy disk drive</Name> <PNPDevicelD>FDC\GENERIC_äFLOPPY_DRIVE\5&3371E7B8&0&0</PNPDevι celD> <PowerManagementCaρabilities>Unknown</PowerManagementCapabilities>
<PowerManagernentSupported /> <Statu$>OK<:/Status> <Statuslnfo />
<ConfigManagerErrorCodθ>Dθvlcβ is working properly.</ConfigManagerErrorCode> </WIN 32_FLOPPYDRIVE> </FlQPPYDRIVE_HARD WARE>
- <KEYBOARD JHARDWARE> «WIN32_KEYBQARD devicestatua="original equipment" guid="ACPI\PNP0303\0">
<Availability>,</Availabi!ity>
<Caption>Enhancβd (101- or 102-key)</Caption>
<Description>Standard 101/102-Køy or Microsoft Natural PS/2
Keyboa rd </Descriptio n> <DevicelD>ACPI\PNP0303\0</DevicelD>
<lπstaliDate l>
<Name>Enhanced (101- or 102-kβy</Name>
<PNPDθvicelD>ACPI\PNP0303\0</PNPDβvicelD>
<PoworManagementCapabilities>Unknown-</PowerManagementCapabilltles> <PowerMaπagemθntSupported>Falβθ</PowerManagemβntSupported>
<Status>OK</Status>
<Statυslnfo />
<ConfigManagerErrorCode>Devlce is working properly.</ConfigManagerErrorCode> </WIN32J<EYBOARD>
</KEYBOARD_HARDWARE>
- <BASEBOARD^HARDWARE>
- <WIN32_BASEBOARD devicestatuss'Original equipment" guida""> <Caption>Basβ Board</Caption> <DθScription>Bas© Board</De3cription> <HotSwappable /> <lnstallDatθ />
<Manufacturer>KAPOK</Manufacturer> .
<.Model />
<Name>Baae Board</Name>
<OtherIdentifyinglnfo /> <PartNumber />
<PoweredOn>Trυe</PoweredOn>
<ReplaceablE />
<SerialNumber>12345678</SerialNumber> <Status /> <Tag> Base Board</Tag>
<Version>None</Version>
<ConfigManager ErrorCode>Device is working properly, <:/ConfιgManagerErrorCode>
<PowerManagementCapabilities>Unknown<:/PowerManagementCapabilities> <ΛΛ/IN32..BASEBOARD>
</BASE8OARD..HARDWARE>
- <PROCESSOR_HARDWARE>
- <WlN32- PROCE SSOR devicestatus="original equipment" guid="x86 Family 6 Model 11 Stepping 1 "> <AddressWidth>32</AddressWidth>
<Availability>,running/full power</Av ailability>
<Caption>x86 Family 6 Model 11 Stepping 1</Caption>
<CpuStatus>1 </Cpu Status>
<CurrentClockSpeed>1096</CurrentClockSpeed > <CurrentVoltage>29</CurrentValtage >
<DataWidth>32</DataWidth>
<Descriρtion>x86 Family 6 Model 11 Stepping 1 </Description>
<DevicelD>CPU0</DevicelD>
<ExtClock>66</ExtClock> <Family>2</Family>
<lnstallDate />
<L2CacheSize>256</L2CacheSize>
<L2CacheSpeed>1096</L2CacheSpeed>
<Level>6</Level>
<LoadPercentage>1 </LoadPercentage>
<Manufacturer>Genuinelntel</Manufacturer> ^MaxClockSpeed>1096</MaxClookSpeed>
<Name>lntel(R) Celeron(TM) CPU 1100MHz</Name>
<OtherFami!yDescriptιon />
<PNPDevicelD />
^PowerManagementCapabilities>Unknown</PowerManagementCapabilities> <PowerManagementSupported>False</PowerManagerneftSUρported>
<Processorld>000000000383F9FF</Processorld >
< ProcessorType>3</ProcessorType> <Revisioπ>2817</Revision>
<Role>CPU</Role> <SocketDesignation>uPGA2</SocketDesignation>
<Status>OK</Status>
<Statuslnfo>3</Statuslnfo>
<Stepping>1 </Steppιng>
<Uniqueld /> <UpgradeMethod>6</UpgradeMethod>
<Version>Model 11 , Stepping 1<Λ/eιsion>
<VoltageCaps>4<Λ/oltageCaps>
<ΛΛ/IN32_PROCESSOR>
</PROCE SSOR. HARDWARE> - <MEMORYDEVICE,HARDWARE>
■ <WIN32- MEMORYDEVICE devlcestatus="orlginal equipment" guid-"">
<ConfigManagerErrorCode>Unknσwn</ConfigManagerErrorCode>
</WIN32_MEMORYDEVICE>
-•/MEMORYDEVICE_ HARD WARE> - <PHYSICALMEMORY_HARDWARE>
- <WIN32 .PHYSICALMEMORY devicestatus="original equipment" guid="">
<BankLabel>Banks 0/1</BankLabel>
<Capacity>1,069,547,520</Capacity> <Caption>Physical Memory </Captιon> <DataWidth>64</DataWidth> <Description>PhysicaI Memory</Description>. <DeviceLocator>DRAM Slot 0</DevιceL ocator> <FormFactor>DlMM</Form Factor> <HotSwappable l> <lnstallDate />
<(nterleavePosltion>DIMM</lnterleavePosition> Manufacturer />
< MemoryType>DRAM</MemoryType> <Mode) l>
<Name>Physical Me mory</Name> <Otheridenlifyinginfo l> <PartNumber /> <Positionin Row />
< Powered On /* <Reρlaceable /> <SerialNumber /> <Speed />
<Status l>
<7ag>b</Tag> <TypeDetail>EDO</TypeDetatl>
<Version /> <ConfigManagerErrorCode>Device is working properly. </ConfigManagerErrorCode>
</W!N32._PHYS!CALMEMORY>
- <WIN32_PHYSICALMEMORY devicestatυs="original equipment" guid="">
<BankLabel>U39/U40</BankLabel> <Capacity>2,097,152<;/Capacity>
<Caption>Physical Memory</Caption> <DataWidth>64</DataWidth>
<Description>Physical Memory</Descnption>
<DeviceLocator>Vidβo Memory</DeviceLocator> <
FormFactor>TSOP</Form Factor*
<HotSwappable l> <ln$tal!Date />
<1nterleavePositioπ>TSOP</lnterleavePosition>
Manufacturer />
<MemoryType>VRAM</MβmoiγTypβ>
<Model /> <Name>Phyβlcal Memory</Name>
<Otherldeπtifyinglnfo />
<PartNumbβr />
<PositionlnRow />
<PoweredOn /> <Replaceable />
<SerialNumber />
<Speed />
<Status />
<Tag>Physical Memory 3</Tag> <TypeDetatl>Uπknown</TypeDetail>
<Version l>
<ConfigManagerErrorCode>Dβvicθ is working properly.</ConfigManagerErrorCodθ>
</WIN 32^PHYSICALMEMORY> - <WIN32_PHYSICALMEMORY devicestatus="origlnal equipment" guid="">
<BankLabel>U5/U6'</BankLabθl>
<Capacity>262,144</Capacity>
<Caρtion>Physlcal Mβmory</Caption>
<DataWidth>64</DataWidth> <Dβscriptiαn>Physlcal Memory</De$cription>
<DeviCθLocator>Cachθ SRAWI</DeviceLocator> < FormFactor>TSOP</ FormFactor>
<HotSwappablθ />
<lnstaliDate />
<lntθrlθavePositioπ>TSOP</lnterleavePosition>
^Manufacturer /> <MemoryType>SRAM </MemoryType>
<Model l>
<Otherldentifyinglnfo l>
<PartNumber /> <PositioπlnRow />
< Powered On l> <Rβp!aceable /> <SθrialNumber /> <Speed /> <Status />
<Tag>Physlcal Memory 4</Tag
•s;TypeDetail>Unknown</TypeDθtail>
<:Version l>
<ConfιgManagerErrorCode>Dθvic© is working properly.</ConfigManagθrErrorCode>
</WlN 32_PHYSICALMEMORY>
- <WIN32_ PHYSICAUMEMORY devicestatυ&="orlginal θqυipmont" guid="">
<BankLabel>U43</BankLabel>
< Capacity >2,097,152</Capacity > <Caption;>Physical Mβmory</Caption>
<DataWidth>16</DataWidth>
<Description>Physlcal Mβmory</Description>
<DeviceLocator>Flash BIOS U43</DeviceLocator>
<FormFactor>TSOP</FormFactor> <HotSwapρable />
<lnstallDate /> <lnterleavePosition>TSOP</lnterleavePo$ltlon>
<Manufacturer />
< MemoryType>EEPROM</MemoryType>
<Model />
<Name>Physical Memory</Name> <Otherldentifyinglnfo />
<PartNumber />
<PositionlnRow />
<PoweredOn />
<Replaceable /> <SerialNumber />
<Speed />
<Status />
<Tag>Physical Memory 5</Tag>
<TypeDetail>Unknown</TypeDetail> <Version />
<ConfigManagerErrorCode>Device is working properly,</ConfigManagerErrorCode>
</WIN32_PHYSICALMEMORY>
</PHYSICALMEMORY_HARDWARE> - <POINTINGDEVICE_HARDWARE>
- <W1N32--PO!NTINGDEVICE devicestatus="original equipment" guid="ACPI\PNPOF13\4&15D87081 &0">
<Availability>,</Availability>
<Caption>PS/2 Compatible Moυse</Caption> <Description>PS/2 Compatible Moυse<;/Description>
<DevicelD>ACPI\PNP0F13\4&15D87081&0</DevicelD>
<:Devicelnterface>PS/2</Devicelnterface>
<Handedness>Right Handed Opβration^/Handedπess*
<HardwareType>PS/2 Compatible Mouse<;/HardwareType> <lnstallDate />
<Manυfacturer>Microsoft</Manufacturer> <Name>PS/2 Compatible Mouse</Name>
<PNPDevicelD>ACPI\PNP0F13\4&15D87081&0</PNPDevιceiD>
<PointingType>Uπkπown</PointingType>
<PowerManagemθntCapabilitiθ8>Unknown</PowerMaπagementCapabilities>
<PowerManagementSupportθd >Falsθ</PowerMaπagementSupported> 5 <Status>OK</Status>
<Statuslπfo />
<;ConfigManagerErrorCode>DθVlcθ is working properly. </Conf!gManagerErrorCode>
</WIN32_POINTINGDEVICE> I O </POINT!NGDEVICE_HARDWARE>
- <NETWORKADAPTER_HARDWARE>
«<WIN32_NETWORKADAPTER devicestatus="origlnal equipment" guid="PCI\VEN_1 O3θ&DEV_O9OO&SUBSYS-22O21558&REV_82\3&13COBO
C5&0&09"> 15 <AdapterType>Etherπet 802,3</AdapterType>
<Availability>,runπiπg/fυll powβr</Availability>
<Caption>[00000001] SiS 900 PCI Fast Ethernet Adapter</Caption>
<Description>SiS 900 PCI Fast Ethernet Adapter</Description>
<DevicelD>1 </DeviceiD> 0 <lπdex>1 </lndex>
<lπstallDate />
<MACAddress>00:90:FS:10:18:CF</MACAddress>
<Maπufacturer>SiS</Manufacturβr>
<Name>SiS 900 PCI Fast Ethernet Adapt©r</Name> 5 <PN PDevicelD>PCl\VEN_1039&DEV_0900&SUBSYS^220215S8&REV.82\3
&13COBOC5&0&09</PN PDevicelD>
<PowθrManagementSupported>Fal»θ</PowerManagementSυpportθd>
<Spθθd />
<Status /> 0 <Statuslπfo />
<ConfigManagerErrorCodθ>Dθvicθ Is working properly ./ConfigMaπagerErrorCode*
«/WIN32_NETWORKADAPTER>
- <WIN32_NETWORKADAPTER devicestatus-"original equipment" guid="[00000002] RAS Async Adapter">
<Availability>, running/full power</Avai!ability> <Caption>[00000002] RAS Async Adaρter</Caption>
<Description>RAS Async Adapters/Description
<DevicelD>2</DevicelD>
<lndex>2</lndex>
<lnstalIDate l> <MAC Address />
<Manufacturer />
<Name>RAS Async Adapter</Name>
<PNPDevicelD />
<PowerManagementSupported>False</PowerManagementSupported> <Speed />
<Status />
<Statuslnfo />
<ConfigManagerErrorCode>running/full power</ConfigManagerErrorCode>
</WIN32_NETWORKADAPTER> - <WIN32_.NETWORKADAPTER devicestatus="original equipment" guid-"ROOT\MS_PSCHEDIVIP\0000">
<Availability>, running/full power</Availability>
<Caption>[00000003] Packet Scheduler Miniport</Caption>
<Description>Packet Scheduler Miniport</Description> <DevicelD>3</DevicelD>
<lndex>3</lndex>
<lnstallDate />
<MACAddress />
<Manufacturer>Microsoft</Manufacturer> <Name>Packet Scheduler Miniport</Name>
<PNPDevicelD>ROOT\MS-PSCHEDMP\0000</PNPDevicelD>
<PowerManagementSupported>False</PowerManagementSupported>
<Speed /> <Status /> <Statuslnfo />
<ConfigManagerΕrrorCode>Device is working properly. </ConfigManagerErrorCode> </WlN32. NETWORKADAPTER>
- <WIN32. NETWORKADAPTER devicestatus="original equipment" guid ="ROOT\M S_L2TPMINIPORT\0000" >
<Availability>, running/full power</Availability> <:Caρtion>[00000004] WAN Miniport (L2TP)</Caption>
^Description>WAN Miniport (L2TP)</Descriρtion>
<DevicelD>4</DevicelD>
<Index>4< /lnd ex >
<lnstallDate l> <MACAddress />
< Manufacturer>Microsoft</Manufacturer> <Name>WAN Miniport (L2TP)</Name>
<PNPDevicelD>ROOT\MS_L2TPM INIPORT\0000</PNPDevicelD> <PowerManagememt Supported>False</PowerManagementSupported> <Sρeed />
<Status 1>
<Statuslnfo />
<;ConfigMa nagerErrorCode>Device is working properly. -'/ConfigManagerErrorCode-> </WIN32 NETWORKADAPTER>
- <WIN32 NETWORKADAPTER devicestatus="original equipment" guid ="ROOT\MS-PPTPMINIPOR\0000" > <Availabιlity>,running/full power</Availability> <Caption>[00000005] WAN Miniport (PPTP)</Caption> <Description> WAN Miniport (PPTP)<\Description>
< DevicelD >5</DevicelD > <Iπdex>b< /lndex >
<!nstallDate />
<MACAddress>60:60:54:50:30:30</MACAddress>
<Manufacturer>Microsoft<yManufacturer>
<Name>WAN Mlnlport (PPTP)</Name> <PNPDevicelD>ROOT\MS_PPTPMINIPORT\0000</PNPDevicelD>
<PowerManagementSupported>Falsβ</PowerManagementSupported>
<Speβd />
<Status />
<Statuslπfo /> <ConfigMaπagerErrorCodθ;>Dθvlcθ Is working propβr(y.</ConfigMaπagerErrorCodβ>
<ΛΛ/IN32_NETWORKADAPTER>
- <WIN32_NETWORKADAPTER devicestatus="ori0inal equipment" guid="ROOT\MSJ*PPOEMINIPORT\0000"> <Availability>, running/full powβr</Availability>
<Caption>[00000006] WAN Minlport (PPPOE)</Captioπ>
^Description>WAN Minfport (PPPOE) </Description>
<DevicelD>6</DevicelD>
<Jndex>6</lπdex> <lπstallDate />
<MACAddress>33:50:βF:45:30:30</MACAddress>
<Maπufacturer>Microsoft</Manufacturer>
<Name>WAN Miniport (PPPOE)</Name>
<PNPDevicelD>ROOTλMS^PPPOEMINIPORT\0000</PNPDevicelD> <PowerManagementSupported>False</Pow©rManagem©ntSupported>
<Speed />
<Status />
<Statuslπfo />
<ConfigManagerErrorCodθ>Dβvice is working propθrly.</CoπfigManagerErrorCodθ>
</WIN32J\JETWORKADAPTER>
■ <WIN32_NETWORKAOAPTER devicestatus-'Orlglnal equipment"
guid="ROOT\MS_PTIMINIPORT\0000">
<Availability>,running/full ρower</Availability>
<Caption> [00000007] Direct Parallel</Caption>
<Description>Dlrect Parallθl</Description> <DevicelD>7</DevicelD>
<lndex>7</lndex>
<lnstallDate />
<MACAddress />
<Manufacturer>Mlcrosoft</Manufacturer> <Name>Direct Parallθl</Name>
<PNPDevicelD>ROOT \MS_PTIMINIPORT\0000</PNPDevicelD>
<PowerManagemβntSupported>False</PowerManagementSupportθd>
<Speed />
<Status /> <StatusTnfo />
<ConfigMaπagθrErrorCode>DθviCθ is working properly.</ConfigManagerErrorCode>
</WIN32_NETWORKADAPTER>
- <WIN32_NETWORKADAPTER devicestatus="original equipment" guid ="ROOT\MS_NDISWANIP\0000">
<Availability>,running/full power</Availability>
<Caption>[00000008] WAN Miniport (IP)</Caption>
<Dθscriρtion>WAN Wljniport {IPH/Description>
<DevicelD>8</DevicelD> <lndex>8</lndex>
<lnstallDate />
<MACAddress />
<Manufacturer>Mfcro3oft</Mar>ufacturer>
<Name>WAN Miniport (IP)</Name> <PNPDevicelD>ROOT\MS^NDISWANIP\0000</PNPDβvicθlD>
<PowerManagementSupported>Falee</PowerManagementSupported> <Speed />
<Status /> <Statuslnfo />
<ConfigManagerErrorCode>Device is working properly,/ConfigManagerErrorCode> </WIN32_NETWORKADAPTER>
- <WIN32_NETWORKADAPTER devicestatus="original equipment" guid="ROOT\MS_PSCHEDMP\0001"> <Availability>, running/full power</Availability> <Caption>[00000009] Packet Scheduler Miniport</Caption> <Description>Packet Scheduler Miniport</Description> <DevicelD>9</DevicelD> <lndex>9</lndex> <lnstallDate />
<MACAddress>42: BO: 20:52:41 :63 </MACAddress> <Manufactυrer>Microsoft</Manυfacturer>
<Name>Packet Scheduler Miniport</Name> <PNPDevlcelD>ROOT\MS_PSCHEDMP\000K/PNPDeviceID> <PowerManagementSupported>False</PowerManagementSupported> <Speed /> <Status />
<Statuslnfo />
<ConfigManagerErrorCode>Device is working properly.</ConfigManagerErrorCode> <ΛΛ/IN32_NETWORKADAPTER> - <WIN32_NETWORKADAPTER devicestatus="original equipment" guid="[00000010] NETGEAR MA101 USB Adapter"> <Availability>, running/full power</Availability> <Caption>[00000010] NETGEAR MA101 USB Adapter</Caption> <Description>NETGEAR MA101 USB Adapter</Description> <DevicelD>10</DevicelD> «lndex>10</lndex> <lnstallDate />
<MACAddress /> Manufacturer /> <Name>NETGEAR MA101 USB Adapter</Name>
<PNPDevicelD /> <PowerManagementSupported>False</PowerManagementSupported>
<Speed l> <Status />
< StatusI nf o />
<CoπfigManagerErrorCode>running/full power</ConfigManagerErrorCode> <ΛΛ/!N32_NETWORKADAPTER>
- <WIN32_NETWORKADAPTER devicestatus="original eqυipment guid="ROOT\MS_PSCHEDMP\0002'>
<Availability>,rυnning/full power</Availabi!ity>
<Caption>[00000011] Packet Scheduler Mlniport</Caption> <Description>Packet Scheduler Miniport</Description>
<DevicelD>11 </DevicelD>
<lndex>11 </lndex>
<!nstalIDate />
< MACAdd ress>00;90: F5:10:18:CF</MACAdd ress> <Manufacturer>Microsoft</Manufacturer>
<Name>Packet Scheduler Miniport</Narπe>
<PNPDeviceID>ROOT\MS- PSCHEDMP\0002</PNPDevicelD>
<PσwerManagementSupported>False</PowerManagemeπtSυpported>
<Speed l> <Status />
<StatusInfo />
<ConfigManagerErrorCode>Devlce is working properly.</ConfigManagerErrorCσde>
</WIN32_NETWORKADAPTER> - <WIN32_NETWORKADAPTER devicestatus="original equipment" guid="(00000012] Microsoft TV/Video Connection">
<Availability> .running/full power</Availability>
<Captioπ>[00000012] Microsoft TV/Video Connection</Caption> <Description>Microsoft TV/Video Connection</Description> <DevicelD>12</DevicejD> <lndex>12</lndex> <InstallDate /> <MACAddress l> <Manufacturer !>
<Name>Microsoft TV/Video Connection</Name> <PNPDevicelD /> <PowerManagementSupported>False</PowerManagementSupported> <Speed /> <Status /> <Statuslnfo /> <ConfigManagerErrorCode>running/full power</ConfigManagerErrorCode> </WIN32_NETWORKADAPTER>
- <WIN32_NETWORKADAPTER devicestatus="original equipment" guid="[00000013] SMC EZ Connect USB/Ethernet Series Converter">
<Availability>,running/fυll power</Availability>
<Caption>[00000013] SMC EZ Connect USB/Ethernet Series Converter</rCaption>
<Description>SM C EZ Connect USB/Ethernet Series Converter</Description>
<DevicelD>13</DevicelD>
<lndex>13</lndex>
<lnstallDate /> «MACAddress />
<Manufacturer />
<Name>SMC EZ Connect USB/Ethernet Series Coπverter</Name>
<PNPDevicelD />
<PowerManagementSupported>False</PowerManagementSupported> <Speed />
<Status />
< Status Info />
<ConfigManagerErrorCode>running/full power</ConfigManagerErrorCode>
</WIN32. NETWORKADAPTER>
■ <WIN32_.NETWORKADAPTER devicestatυs=" original equipment" guid="RO OT\MS-PSCHEDMP\0003"> <Availability>, running/full power</Availability>
<Caption>[00000014] Packet Scheduler Miniport</Caption>
^Descriptions-Packet Scheduler Miniport</Description>
<DevicelD>14</DevicelD>
<lndex>14</lndex> <lnstallDate ι>
<MACAddress />
<:Maπufacturer>Microsoft</Manufacturer>
<Name>Packet Scheduler Miniport</Name>
<PNPDevicelD>ROOT\MS-PSCHEDMP\0003</PNPDevlcelD> <PowerManagementSupported>False</PowerManagementSupported>
<Speed />
<Status l>
<Siatuslnfo />
<ConfιgManagerErrorCode>Device is working properly,</ConfigManagerErrorCode>
</W IN32_ NETWORKADAPTER>
- <WIN32_.NETWORKADAPTER devicestatυs="original equipment" guid="USB\VID_0707&PID_0200\0001">
<Availabιlity>,running/full power</Availabitity> <Caption>[00000015] SWlC EZ Connect USB/Ethernet Series
Converter</Captioπ:'
<Description>SMC EZ Connect USB/Ethernet Series Converters/Description >
<DevicelD>15</DevicelD>
<lndex>15</lndex> <lnstallDate l>
<MACAddress>00:04: E2:08:8E:06</MACAddress>
<Manufacturer>SMC'-/Manufacturer>
<Name >SMC EZ Connect USB/Ethernet Series Converter</Name>
<PNPDeviceiD>USB/VID_0707&PlD-0200\0001</PNPDevicelD>
<PowerManagementSupporteci>Falsβ</PowerMaπagernentSυpported>
<Speed /> <Status l>
<Statusinfo />
<ConfigManagerErrorCode>Devlce is working properly.</ConfigMa nagerErrorCode>
</WIN32_NETWORKADAPTER> - <WIN32_NETWORKADAPTER devicestatus«"orlginal equipment" guid=ROOT\MS.PSCHEDMP\0004">
<Availability >, running/full power</Availability>
<Captioπ>[00000016] Packet Scheduler Miniport</Caption>
<Description>Packet Scheduler Miniport</Descriptioπ> <DevicelD>16</DevicelD>
<lndex>16</lndex>
<lnstallDate />
<MACAddress>00;04:E2;08:8E;06</MACAddress>
<Manufacturer>Microsoft</Manufacturer> . <Name>Packe1 Scheduler Miniport</Name>
<PNPDevicelD>ROOT\MS-.PSCHEDMP\0004</PNPDevicelD>
<PowerManagementSupported>False</PowerManagementSupported>
^Speed />
<Status l> <Statuslnfo />
<ConfigManagerErrorCode>Device Is working properly,</Config Ma nagerErτorCode>
</WIN32_NETWORKADAPTER>
- <W1N32_NETWORKADAPTER devicestatus="original equipment" guid="[00000017] SMC EZ Connect USB/Ethernet Series Converter'^
<Availability>,running/full powør</Avai!abi!ity> <Caption>l00000017] SMC EZ Connect USB/Ethernet Series
Converter</Caption>
<Descriρtion;>SMC EZ Connect USB/Ethernet Series Converter</Description>
<DevicelD>17</DeviceiD>
<lndex>17</lndex> <lnstallDate />
<MACAddress />
<Maπufacturβr />
<Name>SMC EZ Connect USB/Ethernet Series Converter</Name>
<PNPDevicelD /> <PowθrManagementSupported>Falsθ</PowerManagθmβntSupported>
<Speed />
<Status />
<Statuslnfo />
<ConfigManagerErrσrCode>running/full power</ConfigManagerErrorCode> </WIN32_NETWDRKADAPTER>
- <WIN32_NETWORKADAPTER devicestatus="origlnal equipment" gυtd="ROOT\MS_PSCHEDMP\0005">
<Availability>, running/full power</Availability>
<Caption>[00000018] Packet Scheduler Miniρort</Caption> <Description>Packθt Scheduler Minlport</Deecription>
<DevicelD>18</DeviCθlD>
<lndex>18</lndex>
<lnstallDate />
<MACAddress /> <Manufacturer>Microsoft</Maπufacturer>
<Namθ>Packet Scheduler Mllniport</Name>
<PNPDθvicθlD>ROOT\MS_PSCHEDMP\0005</PNPDevicelD>
<PowerManagementSupported>Fa!se</PowerManagementSupported>
<Speed /> <Status />
<Status!nfo /> <ConfιgManagΘrErrorCodθ>Device is working
properly./ConfigManagerErrorCode> </WIN32_NETWORKADAPTER>
- <WIN32_NETWORKADAPTER deviceStatus-"Original equipment" guid ="[00000019] SMC EZ Connect USB/Ethernet Series Converter'> <Availability>, running/full power<:/Availability>
<Caρtion>[00000019] SMC EZ Connect USB/Ethernet Series
Converter</Caption>
<Description>SMC EZ Connect USB/Ethernet Series Converter</Description>
<DevicelD>19<;/DevlceID> <lndex>19</lndex>
<lnsta!IDate l>
<MACAddress />
Manufacturer />
<Name>SMC EZ Connect USB/Ethernet Series Converter</Name> <PNPDevicelD />
<PowerManagementSupported>False</PowerManagementSupported>
<Speed />
<Status />
<Statuslnfo /> <ConfigManagerErrorCode>running/full power</ConfigManagerErrorCode>
</WIN 32-NETWORKADAPTER>
- <WIN32_NETWORKADAPTER devicestatuss"Origlnal equipment" guid="ROOT\MS-PSCHEDMP\0006"> <Availability>,runnlng/full power</Availability> -ϊCaptiσn>[00000020] Packet Scheduler Miniport</Caption>
<Description>Packet Scheduler Miniport</Description>
<DevicelD>20</DevicelD>
<lndex>20</lndex>
<lnstallDate /> <MACAddress />
< M\anufacturer>Mlcrosoft</Manufacturer> <Name >Packet Scheduler Miniport</Name>
<PNPDevicelD>ROOT\MS-PSCHEDMP\0006</PNPDevicelD>
<PowerManagementSupported>False</PowerManagementSupported>
<Speed />
<Statυs /> <Statuslnfo />
<ConfigManagerErrorCode>Device Is working properly.</Config Ma nagerErrorCode>
</WIN32_NETWORKADAPTER>
■ <WIN32_NETWORKADAPTER devicestatus="original equipment" guid="[00000021 ] SMC EZ Connect USB/Ethernet Series Converter">
<Availability>, running/full power</Availability>
«Caption>[00000021] SMC EZ Connect USB/Ethernet Series
Converter</Caption>
<Description>SMC EZ connect USB/Ethernet Series Converted/Description> <DeviceID>21</DevicelD>
<Index>21 </lndex>
<lnstallDate />
<MACAddress />
Manufacturer /> <Name>SMC EZ Connect USB/Ethernet Series Converter</Name>
<PNPDevicelD f>
<PowerManagementSupported>False</PowerManagementSupported>
<Sρeed />
<Status l> <Statuslπfo />
<ConfigMaπagerErrorCode>running/full power</ConfigManagerErrorCode>
</WIN32_NETWORKADAPTER>
- <WIN32_NETWORKADAPTER devicestatus="original equipment" guid=" ROOT\MS_PSCHEDMP\0007"> <Availability>,running/full power</Availability>
<Caption>[00000022) Packet Scheduler Miniport</Caption> <Descriρtion>Packet Scheduler Miniport</Description>
<DeviceID>22</DevicelD>
<lndex>22</lndex>
<lnstallDate />
<MACAddress /> <Manufacturer>Microsoft</Manufacturer>
<Name>Packet Scheduler Minlport</Name>
< PNPDevicelD>ROOT\MS_PSCHEDMP\0007</PNPDevicelD>
<PowerManagementSupported>False</PowerManagementSupported>
<Speed /> ^Status l>
<Statuslnfo />
<ConfigManagerErrorCode>Device is working properly. </Config Ma nagerErrorCode>
</WIN32_NETWORKADAPTER> </NETWORKADAPTER_HARDWARE>
- <VI DEOCONTROLLE R_HARDWARE>
- <WIN32_VIDEOCONTROLLER devicestatus="original equipment" guid="PCI\VEN_1039&DEV_6300&SUB8YS-22021558&REV-31 \4&DA4DF0 &0&0010"> <Availability>,runnlng/fυll power</Availability>
<Caption>SiS 300/305/630/540/730</Caption>
<Description>SiS 300/30S/630/540/730</Description>
<DevicelD>VideoController1 < /DevicelD>
<lnstallDate /> <Name >S!S 300/305/630/540/730</Name>
<PNPDevicelD>PCI\VEN_1039&DEV_6300&SUBSYS-2202i568&REV_31\4
&DA4DF0&0&0010</PNPDevicelD>
<PowerManagementCapabilities>Unknownn/PowerManagementCapabilities>
<PowerManagementSupported /> <Status>OK</Status>
<Statusinfo />
<ConfigManagerErrorCode>Devlce is working
properly. </ConfigManagerErrorCode>
</WIN32_VIDEOCONTROLLER>
<Λ/IDEOCONTROLLER_HARDWARE>
- <DESKTOPMONITOR_HARDWARE> - <WIN32_DESKTOPMONITOR devicestatus="original equipment" quid="DISPLAY\DEFAULT-MONITOR\5&CC3080B&0&10000001&01&00">
<Availability>, running/full power</Availability>
<Caρtion>Default Monitor</Caption>
<Description>Default Monitor</Description > <DevicelD>DesktopMonitor1</DevicelD>
<!nstallDate l>
< Nam e>Default Monitor</Nam e>
<PNPDevicelD>DISPLAY\DEFAULT_MONITOR\5&CC3080B&0&10000001&0
1&00</PNPDevicelD> <PowerManagemenlCapabilities>Unknown</PowerManagementCapabilities>
<PowerManagementSupported />
<Status>OK</Status>
<Statusinfo />
<ConfigManagerErrorCode>Device Is working properly. </ConfigManagerErrorCode>
</WIN32 _DESKTOPMONITOR>
</DESKTOPM0NIT0R_HARDWARE>
- <POTSMODEM_HARDWARE>
- <WIN32_POTSMODEM devicestatυs="origina! equipment" guid=" PCI\VEN1039&,DEV_7013&SUBSYS-22021558&REV_A0\3&13COB0
C5&0&0E">
<Avai!ability>,</Availability>
<Caption>HAMR5600 Modem</Caption>
<ConfigManagerErrorCode>Device is working properly,</ConfigManagerErrorCode>
<Description>HAMR5600 M odem</Description >
< DevicelD>PCI\VEN 1039&<DEV_7013&SU BSYS_22021558&REV_A0\3&13
C0B0C5&0&0E</DevicelD> <lndex>0</lndex> <lnstallDate />
<Model >HAMR5600 Modem</Model» <Name>HAMR5600 Modem</Name>
<PNPDevicelD>PCI\VEN_1039&DEV_7O13&SUBSYS_22θ21558&REV_A0\3
&13C0B0CS&Q&QE</PNPDevicelD>
<PowerManagementCapabilities>Unknown</PowerManagementCapabilities> <PowerManagementSupported>False</PowerManagementSupported> <Status>OK</Statυs>
<Statuslnfo>3-::/Statusinfo> </WIN32_POTSMODEM> </POTS MODEM_HARDWARE> </ORIGINAL_BUILDSHEET>
Appendix 2
<%@LANGUAGE="VBSCRIPT" CODEPAGE-"1252"%> <%
'GUARDIAN ANTI-THEFT (©) 2004 United Electrical Software Pty Ltd 'Author: Nathan Powell Version: 1.01 Revision- A
'Script Purpose: Log MAC / IP address of STOLEN PC Into Guardian Database
cst - "Provider=Microsoft.Jet.OLEDB.4.0;Data Source*" cst = cst & Server,MaρPath("../Data/Guardian.mdb") set conn = CreateObject(ADODB. Connection") conn. mode = 3 ' adModeReadWrite conn. open cst
Dim RSPID MMColPararn
RSPIDJ/IMColParam = "1"
If (REQUEST.QueryString("ρid")<> "") Then
RSPIDJ/IMColParam = REQUESTQueryStringfpld") else RSPID.MMColParam - REQUEST,form("pid")
End If
Dim RSPID
Dim RSPID_numRows
Set RSPID = Server.CreateObjectC'ADODB.RθCordset") RSPID.ActiveConnection = conn
RSPID.Source = "SELECT * FROM AntitheftJPTracker"
RSPID.CursorType = 2
RSPID, CursorLocation = 2
RSPID. LockType a 2 RSPID.OpenO
RSPID_numRows = 0 %>
<html> <head> <title>Guardian Anti-Theft Tracking Scriρt«/title> <% dim strDatβ dim δtrTimθ
1 Set the date / time of the client activity, strDate=date strTimθ=tfme
if RSPID_MMCo!Param <> "" then Track our Client by requesting server variables from the Web Server RSPID.Addnew RSPID("Date")=εtrDate RSPID(!Time")=strTime
RSPID(" CLI ENT_PID") = req uest.form ("pld") RSPID("REMOTE_IP")=request.ServerVariables("REMOTE_ADDR") RSPID("REMOTE_MAC") = req uest.form <"remote_mac") RSPID("DENIED_REQUEST" )=request.form("denied_request") RSPID("DENIED_REASON")=request.form("denied_reason")
RSPID.UPDATE
' By setting a third command 'DEACTIVATE'.
' We can remotely deactivate the stolen software here if required.
' This command is currently UNUSED but can be implemented at any time.
IF RSPID.EOF<>TRUE THEN
REGSTATUS="LOGGED" ELSE
REGSTATUS=ΕRROR" END IF %>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
</head>
<body> <% response.write("?REGSTATUS="& REGSTATUS &"")
%>
</body> </html> <%
RSPID.CIoseO conn.closθ()
Set RSPID = Nothing set coπn=nothing
%>
Claims
Claims
1 , A method for tracking modifications to a hardware configuration of a computer system for tracking changes in one or more hardware configuration parameters in a computer system, the method including the following steps:
(A) capturing a first snapshot of the hardware configuration of the computer system at a first point in time;
(B) storing the first snapshot in a remote database;
(C) capturing a second snapshot of the hardware configuration of the computer system at a second subsequent point in time;
(D) comparing the stored first snapshot and the second snapshot;
wherein any difference between the first and second snapshots indicates that a change has been made to the hardware configuration of the computer system.
2. A method according to claim I, further including the step oi generating an alert to notify a nominated person that a modification has been made to the hardware configuration,
3. A method according to claim 1 or 2, wherein the first point in time occurs when a program which performs the steps of the method is installed in the computer system and the second point in time occurs each t/rne the computer system is turned on or restarted subsequent to the program being installed on the computer system.
4. A method aocording to any one of the preceding claims, wherein the hardware configuration includes one or more of the following:
(A) disc drive type;
(B) central processing unit (CPU) type;
(C) memory configuration;
(D) peripheral devices.
5, A method of any one of the preceding claims, the method further includes the following steps;
(A) checking a status of the computer system each time a snapshot is captured; and
(B) if the status of the computer system indicates that the system has been stolen;
(C) monitoring a network identifier associated with th© computer system; and
(D) reporting the network identifier to the nominated person;
wherein the network identifier can be used to determine the physical location of the computer system.
, A method according to claim 5, wherein the network identifier includes one or more of the following;
(A) an IP address; or
(B) a MAC address.
7. A method according to any one of the preceding claims, further including the step of monitoring a performance parameter of one or more hardware components.
8. A method according to claim 7, further including the step of measuring a performance parameter and comparing the performance parameter to a stored performance parameter included in the first snapshot.
9. A method according to claim 8, wherein a change in the performance parameter causes an alert to be generated to notify the nominated person that a potential problem exists with the hardware component.
10. A method of providing a warranty for a computer system, the method including the following steps:
(A) providing software for tracking changes in one or more hardware configuration parameters in a computer system;
(B) installing the software on the computer system;
(C) capturing a first snapshot of a hardware configuration of the computer system at a first point in time;
(D) storing the first snapshot in a remote database;
(E) capturing a second snapshot of the hardware configuration of the computer system at a second subsequent point in time;
(F) comparing the stored first snapshot and the second snapshot; and
(G) generating an alert for transmission to a warranty provider if the comparison reveals any difference between the first and second snapshots;
wherein a difference between the first and second snapshots indicates that a change has been made to the hardware configuration of the computer system and causes the warranty provider to reassess validity of the warranty,
11. A method of tracking a stolen computer system, including the following steps:
(A) providing software for tracking a network identifier associated with a computer system;
(B) installing the software on the computer system;
(C) reporting the computer system as being stolen;
(D) monitoring a network identifier associated with the stolen computer system; and
(F) reporting the network identifier to the nominated person;
wherein the network identifier can be used to determine the physical location of the computer system.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2005900825A AU2005900825A0 (en) | 2005-02-22 | Method and system for monitoring computer systems | |
AU2005900825 | 2005-02-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006089352A1 true WO2006089352A1 (en) | 2006-08-31 |
Family
ID=36926951
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2006/000217 WO2006089352A1 (en) | 2005-02-22 | 2006-02-21 | Method and system for monitoring computer systems |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006089352A1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2199938A2 (en) | 2008-12-19 | 2010-06-23 | Fujitsu Limited | Control assistance system, information processing apparatus and computer-readable medium having a computer program |
WO2013147760A1 (en) | 2012-03-28 | 2013-10-03 | Intel Corporation | Securing thermal management parameters in firmware from cyber attack |
EP2312483A3 (en) * | 2009-10-16 | 2014-01-15 | Uniloc USA, Inc. | Authentication of computing and communications hardware |
US9444802B2 (en) | 2013-04-25 | 2016-09-13 | Uniloc Luxembourg S.A. | Device authentication using display device irregularity |
US9547780B2 (en) | 2005-03-28 | 2017-01-17 | Absolute Software Corporation | Method for determining identification of an electronic device |
US9571492B2 (en) | 2011-09-15 | 2017-02-14 | Uniloc Luxembourg S.A. | Hardware identification through cookies |
US9578502B2 (en) | 2013-04-11 | 2017-02-21 | Uniloc Luxembourg S.A. | Device authentication using inter-person message metadata |
US10423509B2 (en) * | 2011-08-05 | 2019-09-24 | Entit Software Llc | System and method for managing environment configuration using snapshots |
US10719604B2 (en) | 2018-01-30 | 2020-07-21 | Hewlett Packard Enterprise Development Lp | Baseboard management controller to perform security action based on digital signature comparison in response to trigger |
US10754945B2 (en) | 2010-09-16 | 2020-08-25 | Uniloc 2017 Llc | Psychographic device fingerprinting |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5289372A (en) * | 1992-08-18 | 1994-02-22 | Loral Aerospace Corp. | Global equipment tracking system |
WO1998006213A1 (en) * | 1996-08-07 | 1998-02-12 | Halstead William D | System for securing a computer |
EP1006447A2 (en) * | 1998-11-30 | 2000-06-07 | General Electric Company | Remote monitoring of electronic boards/software routines |
CA2354248A1 (en) * | 2000-08-02 | 2002-02-02 | International Business Machines Corporation | Method and apparatus for tracing hardware states using dynamically reconfigurable test circuits |
US6804699B1 (en) * | 2000-07-18 | 2004-10-12 | Palmone, Inc. | Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server |
US6883120B1 (en) * | 1999-12-03 | 2005-04-19 | Network Appliance, Inc. | Computer assisted automatic error detection and diagnosis of file servers |
US20050114234A1 (en) * | 2003-11-21 | 2005-05-26 | Thomas Andrew J. | Software configuration of module dependent on history |
US20050144139A1 (en) * | 2003-12-24 | 2005-06-30 | Ling Dynamic Systems Ltd. | Internet-based software license key |
US20060026604A1 (en) * | 2004-07-30 | 2006-02-02 | Microsoft Corporation | Method and system for single reactivation of software product licenses |
-
2006
- 2006-02-21 WO PCT/AU2006/000217 patent/WO2006089352A1/en not_active Application Discontinuation
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5289372A (en) * | 1992-08-18 | 1994-02-22 | Loral Aerospace Corp. | Global equipment tracking system |
WO1998006213A1 (en) * | 1996-08-07 | 1998-02-12 | Halstead William D | System for securing a computer |
EP1006447A2 (en) * | 1998-11-30 | 2000-06-07 | General Electric Company | Remote monitoring of electronic boards/software routines |
US6883120B1 (en) * | 1999-12-03 | 2005-04-19 | Network Appliance, Inc. | Computer assisted automatic error detection and diagnosis of file servers |
US6804699B1 (en) * | 2000-07-18 | 2004-10-12 | Palmone, Inc. | Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server |
CA2354248A1 (en) * | 2000-08-02 | 2002-02-02 | International Business Machines Corporation | Method and apparatus for tracing hardware states using dynamically reconfigurable test circuits |
US20050114234A1 (en) * | 2003-11-21 | 2005-05-26 | Thomas Andrew J. | Software configuration of module dependent on history |
US20050144139A1 (en) * | 2003-12-24 | 2005-06-30 | Ling Dynamic Systems Ltd. | Internet-based software license key |
US20060026604A1 (en) * | 2004-07-30 | 2006-02-02 | Microsoft Corporation | Method and system for single reactivation of software product licenses |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9547780B2 (en) | 2005-03-28 | 2017-01-17 | Absolute Software Corporation | Method for determining identification of an electronic device |
EP2199938A3 (en) * | 2008-12-19 | 2012-05-30 | Fujitsu Limited | Control assistance system, information processing apparatus and computer-readable medium having a computer program |
US8539052B2 (en) | 2008-12-19 | 2013-09-17 | Fujitsu Limited | Control assistance system, information processing apparatus and computer-readable medium having a computer program |
EP2199938A2 (en) | 2008-12-19 | 2010-06-23 | Fujitsu Limited | Control assistance system, information processing apparatus and computer-readable medium having a computer program |
EP2312483A3 (en) * | 2009-10-16 | 2014-01-15 | Uniloc USA, Inc. | Authentication of computing and communications hardware |
US10754945B2 (en) | 2010-09-16 | 2020-08-25 | Uniloc 2017 Llc | Psychographic device fingerprinting |
US10423509B2 (en) * | 2011-08-05 | 2019-09-24 | Entit Software Llc | System and method for managing environment configuration using snapshots |
US10142337B2 (en) | 2011-09-15 | 2018-11-27 | Uniloc 2017 Llc | Hardware identification through cookies |
US9571492B2 (en) | 2011-09-15 | 2017-02-14 | Uniloc Luxembourg S.A. | Hardware identification through cookies |
US9971890B2 (en) | 2012-03-28 | 2018-05-15 | Intel Corporation | Securing thermal management parameters in firmware from cyber attack |
US9355249B2 (en) | 2012-03-28 | 2016-05-31 | Intel Corporation | Securing thermal management parameters in firmware from cyber attack |
EP2831789A4 (en) * | 2012-03-28 | 2015-12-02 | Intel Corp | Securing thermal management parameters in firmware from cyber attack |
CN104205110A (en) * | 2012-03-28 | 2014-12-10 | 英特尔公司 | Securing thermal management parameters in firmware from cyber attack |
WO2013147760A1 (en) | 2012-03-28 | 2013-10-03 | Intel Corporation | Securing thermal management parameters in firmware from cyber attack |
US9578502B2 (en) | 2013-04-11 | 2017-02-21 | Uniloc Luxembourg S.A. | Device authentication using inter-person message metadata |
US9444802B2 (en) | 2013-04-25 | 2016-09-13 | Uniloc Luxembourg S.A. | Device authentication using display device irregularity |
US10719604B2 (en) | 2018-01-30 | 2020-07-21 | Hewlett Packard Enterprise Development Lp | Baseboard management controller to perform security action based on digital signature comparison in response to trigger |
US11995182B2 (en) | 2018-01-30 | 2024-05-28 | Hewlett Packard Enterprise Development Lp | Baseboard management controller to perform security action based on digital signature comparison in response to trigger |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006089352A1 (en) | Method and system for monitoring computer systems | |
US10719604B2 (en) | Baseboard management controller to perform security action based on digital signature comparison in response to trigger | |
US8850587B2 (en) | Network security scanner for enterprise protection | |
US6636983B1 (en) | Method and system for uniform resource locator status tracking | |
US9967759B2 (en) | Information handling system physical component maintenance through near field communication device interaction | |
US6658585B1 (en) | Method and system for simple network management protocol status tracking | |
US20030135756A1 (en) | System and method for preventing software piracy | |
CN100487626C (en) | Computer implemented method and system for controlling use of digitally encoded products | |
US11030347B2 (en) | Protect computing device using hash based on power event | |
CN111490981B (en) | Access management method and device, bastion machine and readable storage medium | |
WO2001025884A1 (en) | Method and system for device tracking | |
US12111937B2 (en) | Memory scan-based process monitoring | |
US20040215569A1 (en) | Method to ensure a unique machine serial number | |
CN103455352A (en) | Method for deploying application software and application software deploying device | |
CN113221180B (en) | Database security access system and method | |
US7716137B2 (en) | System and method for automatically tracking and enabling the operation of a product | |
US20090150882A1 (en) | System and method for software application installation | |
US12086257B2 (en) | Trusted firmware verification | |
CN111931192B (en) | rootkit detection method and device and electronic equipment | |
US20120174206A1 (en) | Secure computing environment | |
US20070282895A1 (en) | Network management apparatus, management server, client terminal, and control method therefor | |
US20180123917A1 (en) | System and method for monitoring multiple terminal devices | |
CN111556024B (en) | Reverse access control system and method | |
CN111510431B (en) | Universal terminal access control platform, client and control method | |
US8702812B2 (en) | Remote disablement of a computer system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06704894 Country of ref document: EP Kind code of ref document: A1 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 6704894 Country of ref document: EP |