Method and system for detecting an authorized tamper event
First Claim
1. A system for monitoring tamper events in a computer system comprising:
- a counter for detecting at least one tamper event, the at least one tamper event comprising a cover tamper event, and for providing an indication when the tamper event has occurred for longer than a predetermined time period, the counter being programmed through a system bus within the computer system, wherein the programming of the counter requires use of a privileged access password to enable the computer system after a tamper event has occurred; and
an adapter means coupled to the counter for receiving the indication and disabling the computer system, the adapter means comprising a physical layer and a media independent interface wherein the media independent interface comprises a specification of signals and protocols which formalizes an interfacing of an access controller to the physical layer.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for monitoring tamper events in a computer system in accordance with the present invention is disclosed. The system comprises a detector means for detecting at least one tamper event and for providing an indication when the tamper event has occurred for longer than a predetermined time period. The system also includes an adapter means coupled to the detector means for receiving the indication and for disabling the computer system. The present invention is directed to a computer system, which has the ability to functionally determine if a tamper event is authorized and therefore allows the computer to operate after such an event. In a preferred embodiment, the tamper event could be as simple as a toggle switch being activated when the cover of the personal computer is removed.
54 Citations
7 Claims
-
1. A system for monitoring tamper events in a computer system comprising:
a counter for detecting at least one tamper event, the at least one tamper event comprising a cover tamper event, and for providing an indication when the tamper event has occurred for longer than a predetermined time period, the counter being programmed through a system bus within the computer system, wherein the programming of the counter requires use of a privileged access password to enable the computer system after a tamper event has occurred; and
an adapter means coupled to the counter for receiving the indication and disabling the computer system, the adapter means comprising a physical layer and a media independent interface wherein the media independent interface comprises a specification of signals and protocols which formalizes an interfacing of an access controller to the physical layer.- View Dependent Claims (2, 3, 4)
-
5. A system for monitoring tamper events in a computer system, the computer system being on a network;
- the system comprising;
a counter for detecting at least one tamper event, the at least one tamper event comprising a cover tamper event and for providing an indication when the tamper event has occurred for longer than a predetermined time period, the counter being programmed through a system bus within the computer system, wherein the programming of the counter requires the use of a privileged access password to enable the computer system after a tamper event has occurred; and
an adapter means coupled to the counter for receiving the indication and disabling the computer system, the adapter means including a physical layer, the physical layer for disabling the computer system responsive to the indication, wherein the physical layer provides a link status signal coupled to the monitor means which reflects the status of a link between the computer system and a hub. - View Dependent Claims (6, 7)
- the system comprising;
Specification