System and Method for Protecting Assets Using Wide Area Network Connection
First Claim
1. A machine-implemented method comprising:
- detecting whether a network adapter has been removed from a computer system; and
in response to detecting that the network adapter has been removed from the computer system;
setting a tamper evident indicator in a nonvolatile memory of the computer system; and
setting a hard drive password according to a hard drive password policy, wherein the hard drive password protects files stored on a hard drive.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and program product is provided that detects whether a network adapter has been removed from a computer system. If the network adapter, such as a wireless network adapter, has been removed from the computer system, then a tamper evident indicator (e.g., bit) is set in a nonvolatile memory area of the computer system. In addition, a hard drive password is set to a different password according to a hard drive password policy. The hard drive password controls access to files stored on the hard drive. In one embodiment, the power-on password is also changed to a new password so that the user has to enter the new power-on password when initializing the computer system in order to access the files stored on the computer system.
15 Citations
20 Claims
-
1. A machine-implemented method comprising:
-
detecting whether a network adapter has been removed from a computer system; and in response to detecting that the network adapter has been removed from the computer system; setting a tamper evident indicator in a nonvolatile memory of the computer system; and setting a hard drive password according to a hard drive password policy, wherein the hard drive password protects files stored on a hard drive. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An information handling system comprising:
-
one or more processors; a memory accessible by at least one of the processors; a nonvolatile storage device accessible by at least one of the processors; a network adapter, accessible by at least one of the processors, that connects the information handling system to a computer network; and a set of instructions which are loaded into memory and executed by at least one of the processors in order to perform actions of; detecting whether the network adapter has been removed from the information handling system; and in response to detecting that the network adapter has been removed from the information handling system; setting a tamper evident indicator in a nonvolatile memory of the information handling system; and setting a hard drive password according to a hard drive password policy, wherein the hard drive password protects files stored on a hard drive. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product stored in a computer readable medium, comprising functional descriptive material that, when executed by an information handling system, causes the information handling system to perform actions that include:
-
detecting whether a network adapter has been removed from a information handling system; and in response to detecting that the network adapter has been removed from the information handling system; setting a tamper evident indicator in a nonvolatile memory of the information handling system; and setting a hard drive password according to a hard drive password policy, wherein the hard drive password protects files stored on a hard drive. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification