`
`;;;;;;;;;;;;;;; !"\
`- \ j ,
`c:=~-c
`~
`~---"'-c
`_ __ (n
`c:=l;;;;;;;;;;;;;;;
`
`HARNESS, DICKEY & PIERCE, P.L.C.
`ATTORNEYS AND COUNSELORS
`P 0 BOX 828
`BLOOMFIELD HILLS. MICHIGA">; 48303
`U S.A
`
`Date: April 10, 1998
`
`' - 0_ .
`. .
`~;;;;;;;;;;;;;;;
`'tiHon. Comm1ss1oner of Patents and Trademarks
`ciWashington, D.C. 20231
`
`TELEPHONE
`(248) 641-1600
`
`TELEFACSIMILE
`(248) 641-0270
`
`Re: Title: NETWORK SYSTEM FOR UNIQUELY IDENTIFYING AND TRACKING
`ELECTRONIC EQUIPMENT
`
`Atty. Docket:
`
`991 9-000002
`
`Sir:
`
`This is a request for filing a provisional patent application. Pursuant to 37 C.F.R. 1.51 {2){i),
`the following information and documents are provided:
`
`1. The names and addresses of the inventor{s):
`
`First Inventor: Marshall Bruce Cummings
`Residence: Canton. Michigan
`
`Second Inventor: John Frederick Austermann
`Residence: Huntington Woods. Michigan
`
`Ill
`
`Third Inventor: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - (cid:173)
`Residence: ----------------------------------
`
`Fourth Inventor: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - (cid:173)
`Residence: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
`
`2. A specification having 11 pages.
`
`3.
`
`[.f)
`
`SIX sheets of drawings showing Figures 1-8.
`
`4.
`
`[
`
`] This invention was made by an agency of the United States Government or under
`a contract with an agency of the United States Government under contract number
`
`5.
`
`[
`
`] A Verified Statement Claiming Small Entity Status is enclosed.
`
`6a. [ ]
`
`A check is enclosed to cover the fees as calculated below. The Commissioner is
`hereby authorized to charge any additional fees which may be required, or credit
`any overpayment to Deposit Account No. 08-0750. A duplicate copy of this
`document is enclosed.
`
`6b. [
`
`] The fees calculated below will be paid within the time allotted for completion of the
`filing requirements.
`
`6c. [.1]
`
`The fees calculated below are to be charged to Deposit Account No. 08-0750. The
`Commissioner is hereby authorized to charge any additional fees which may be
`required, or credit any overpayment to said Deposit Account. A duplicate copy of this
`document is enclosed.
`
`Page 1 of 2
`
`Page 1
`
` Dell Inc.
` Exhibit 1005
`
`
`
`Atty. Docket No. 9919-000002
`
`Date: April 10, 1998
`
`I ElLING EEE CALCULAIIQN - B8SIC EEE
`
`FILING FEE - NON-SMALL ENTITY ........................
`
`FILING FEE -SMALL ENTITY: Reduction by 1/2
`A Verified Statement is enclosed.
`
`0 • • • • • • • • • • • • • •
`
`Assignment Recorda! Fee ($40.00) • • • • • • • • • • • • • • • • 0 • • • •
`
`. ...
`
`I
`
`$15Q QQ
`
`150.00
`
`$.00
`
`I TOTAL ...............................................
`
`$150.00
`
`I
`
`7.
`
`[
`
`] An Assignment of the invention is enclosed. The required cover sheet under 37
`C.F.R. §3.11, §3.28 and §3.41 is attached.
`
`8.
`
`[
`
`] Because the enclosed application is in a non-English language, a verified English
`translation for examination purposes of same [
`] is enclosed [
`] will be filed within
`the allotted time period.
`
`9
`
`[.1]
`
`An Express Mailing Certificate is enclosed.
`
`10. [
`
`] Other __________________________________________________ __
`
`11. Please direct all correspondence and telephone calls relative to this application to the
`undersigned at the following address:
`
`HARNESS, DICKEY & PIERCE, P.L.C.
`P. 0. Box 828
`Bloomfield Hills, Michigan 48303
`(248) 641-1600
`
`If, for some reason, Applicant(s) has/have not paid a sufficient fee, please charge our
`Deposit Account No. 08-0750 for any further fees which may be due or credit any overpayment
`to Deposit Account No. 08-0750. A duplicate copy of this document is enclosed.
`
`Respectfully,
`
`Page 2 of 2
`
`Page 2
`
`
`
`HARNESS, DICKEY & PIERCE, P.L.C.
`
`ATTORNEYS AND COUNSELORS
`P 0 BOX 828
`BLOOMFIELD HILLS, MICHIGA:--< 48303
`L S. A
`
`Date: April 10, 1998
`
`TELEPHONE
`(248) 641-1600
`
`TELEFACSIMILE
`(248) 641-0270
`
`Hon. Commissioner of Patents
`and Trademarks
`Washington, D.C. 20231
`
`Sir:
`
`EH293848242US
`
`EXPRESS MAILING CERTIFICATE
`
`Applicant: Marshall Bruce Cummings and John Frederick Austermann, Ill
`
`Serial No. (if any):
`
`For:
`
`NETWORK SYSTEM FOR UNIQUELY IDENTIFYING
`AND TRACKING ELECTRONIC EUQIPMENT
`
`Docket.
`
`9919-000002
`
`Attorney:
`
`G. Gregory Schivley
`
`"Express Mail" Mailing Label Number . . . . . . . . . . . EH293848242US
`
`Date of Deposit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . April 10, 1998
`
`I hereby certify and verify that the accompanying transmittal letter (in duplicate); 11-page
`
`provisional patent application; 6 sheets informal drawings (Figs. 1-8) are being deposited with
`
`the United States Postal Service "Express Mall Post Office To Addressee" service under 37
`
`C. F. R. 1. 1 0 on the date indicated above and are addressed to the Commissioner of Patents
`
`and Trademarks, Washington, D.C. 20231.
`
`Sharon Morse
`
`Page 3
`
`
`
`NETWORK SYSTEM FOR UNIQUELY IDENTIFYING
`AND TRACKING ELECTRONIC EQUIPMENT
`
`BACKGROUND OF THE INVENTION
`
`1.
`
`Technical Field
`
`Invention relates generally to computerized asset tracking systems and, more
`
`particularly, to a network security system for tracking the relocation of remotely located
`
`5
`
`electronic equipment from a network.
`
`2. Discussion
`
`Over the last several years, one of the largest problems in managing the computerized
`
`office environment has been identified as controlling the Total Cost of Ownership, or TCO
`
`of the office computer. Controlling TCO includes not only the cost of the asset but also all
`
`costs associated with that asset such as support costs, software costs, and costs due to loss
`
`or theft, including hardware, software, and most importantly, information.
`
`An additional aspect of TCO is asset movement. Today, many employees have more
`
`than one computer; when that employee is moved to another location, the assets must be
`
`15
`
`moved as well. A typical organization can have as much as 40% of its employees move
`
`from one location to another over the course of a year. When these movements occur daily,
`
`tracking each asset over time is nearly impossible. In addition to these physical movements,
`
`the asset may also be changed over time through hardware and software modifications. Even
`
`if an asset is successfully, tracked over a period of time, the asset may not be the same at
`
`20
`
`the end of the period. Due to this constant asset relocation and reorganization, an
`
`organization may not always know where all of its assets are located.
`
`In fact, it is very
`
`likely that a company may not even know how many assets they own or if those assets are
`
`still in their possession. A method for permanently identifying an asset by attaching an
`
`Page 4
`
`
`
`external or internal device to the asset and communicating with that device using existing
`
`network wiring is desirable. Such a device would allow a company to track its asset as well
`
`as locate any given asset and count the total number of identified assets at any given time,
`
`thus significantly reducing its TCO of identified assets.
`
`5
`
`One method that attempted to control the theft aspect of TCO is disclosed in U.S. Pat.
`
`No. 5,406,260 issued to Cummings et. al, (hereby incorporated by reference) which
`
`discusses a means of detecting the unauthorized removal of a networked device by injecting
`
`a low current power signal into each existing communications link. A sensor monitors the
`
`returning current flow and can thereby detect a removal of the equipment. This method
`
`~1 0
`
`provides a means to monitor the connection status of any networked electronic device thus
`
`providing an effective theft detection/deterrent system.
`
`It would, however, be desirable to provide a further means in which a networked device
`
`may also be identified by a unique identification number using the existing network wiring
`
`as a means of communicating this information back to a central location. More particularly,
`
`~15
`
`it is desirable to provide a means for identification that feasibly employs separate current
`
`loops provided through an existing data communication link. In addition, it is desirable to
`
`provide an identification system that is easily and inexpensively implemented in an existing
`
`network system.
`
`20
`
`SUMMARY OF THE INVENTION
`
`In accordance with the teachings of the present invention, an identification system is
`
`provided for generating and monitoring a unique number that may easily be attached to
`
`networked computer equipment. The system includes current loops internally coupled to
`
`identified pieces of equipment so that each piece of associated equipment has an associated
`
`2
`
`Page 5
`
`
`
`current loop. A low current power signal is provided to each of the current loops. A sensor
`
`monitors the current flow through each current loop to determine the identity of the
`
`electronic equipment. The system also includes an ID device attached to the electronic
`
`equipment which is powered by a low current power signal, that continuously modulates the
`
`5
`
`power signal by fluctuating the current draw of the ID device in a unique preprogrammed
`
`pattern, thereby transmitting a unique ID to a current sensor. The power signal to the ID
`
`device may also be fluctuated to provide useful information, such as status information, to
`
`the ID device. Relocation of the electronic equipment with attached ID device to another
`
`location on the network is detected immediately and may be used to update a database. This
`
`~io
`
`invention is particularly adapted to be used with an existing 1 OBase-T communications link
`
`or equivalents thereof, employing existing wiring to form the current loops.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Other objects and advantages of the present invention will become apparent to those
`
`::=-'15
`
`skilled in the art upon reading the following detailed description and upon reference to the
`
`drawings in which.
`
`FIG 1 is a general block diagram which illustrates a network identification receiver
`
`coupled to a network in accordance with the present invention;
`
`FIG. 2 is a schematic which illustrates a network identification circuitry or transmitter
`
`20
`
`coupled to a network in accordance with the present invention;
`
`FIG. 3 is an exploded perspective view which illustrates installation of the network
`
`identification receiver into an existing computer network in accordance with the present
`
`invention; and
`
`FIGS. 4-8 are diagrams which illustrate the installation of the network identification
`
`3
`
`Page 6
`
`
`
`circuitry or transmitter into an existing computer network by way of attaching the network
`
`identification circuitry to the electronic device being uniquely identified in accordance with
`
`the present invention.
`
`5
`
`DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
`
`Turning now to FIGS. 1 and 2 a network identification receiver 15 and transmitter
`
`16 system is provided therein for achieving identification of electronic computer equipment
`
`associated with a computer network 17. In general, the identification receiver 15 monitors
`
`identification transmitter circuitry 16 that may be permanently attached to remotely located
`
`electronic workstations such as personal computers 3A through 3D over the computer
`
`network 17. The network identification system 15 and 16 described herein is particularly
`
`adapted to be easily implemented in conjunction with an existing computer network 17 while
`
`realizing minimal interference to the computer network.
`
`Remotely located personal computers 3A through 3D are each connected to the computer
`
`~15
`
`network 17 so as to provide widespread remote user access to the computer network 17. The
`
`remotely located personal computers 3A through 3D are shown connected to hub 1 via data
`
`communication links 2A through 2D. Data communication links 2A through 2D include a
`
`plurality of transmit and receive data communication links for communicating information
`
`between each of remotely located computers 3A through 3D and other communication
`
`20
`
`devices on the network such as other computers and file servers (not shown).
`
`The invention described herein is particularly suited to be implemented in conjunction
`
`with a computer network 17 which preferably employs a conventional wiring approach of the
`
`type which may include twisted pair wiring such as Ethernet. Wiring schemes of the
`
`Ethernet are commonly employed to provide data communication links for electronic
`
`4
`
`Page 7
`
`
`
`computer equipment.
`
`In accordance with conventional wiring approaches, data
`
`communication links 2A-2D generally include a pair of transmit wires (not shown) as well
`
`as a pair of receive wires (not shown) connected to each of personal computers 3A through
`
`3D. Each pair of transmit and receive wires are internally coupled to an associated personal
`
`5
`
`computer via two windings of an internally located isolation transformer (not shown). Each
`
`pair of transmit wires and each pair of receive wires thereby form a current loop through the
`
`personal computer 3A through 3D which is advantageously employed in accordance with the
`
`approach described herein.
`
`The network identification receiver 15 includes an isolation power supply 8 which
`
`~io
`·-
`
`supplies a continuous direct current (DC) power supply to each of current loops 2A through
`
`2D. The DC power supply has a low current preferably on the order of magnitude of less
`
`than one milliamp (1
`
`rna) and, more specifically
`
`includes a preferred current of
`
`approximately 700 microamps (700 JJ.A). The isolation power supply 8 includes an input
`
`terminal for receiving a low voltage signal V LV which has a magnitude of approximately
`
`~15
`
`fifteen (15) volts.
`
`The power generated by isolation power supply 8 is passed through signal modulator 7
`
`which can slightly alter the voltage supplied by isolation power supply 8 based upon status
`
`data provided by the status data en.:oder 9. Status data encoder 9 receives its status data
`
`from the firmware kernel 4. Signal modulator 7 inserts this low power supply across the
`
`20
`
`transmit and receive lines or into either the transmit lines or the receive lines in order to
`
`supply the network identification circuitry 16 with both power and status information.
`
`Isolation power supply 13 draws power for the network identification circuitry 16 and
`
`provides status information which was encoded into the power supply signal by signal
`
`modulator 7 within the network identification receiver 15. This status information is in turn
`
`5
`
`Page 8
`
`
`
`passed over to the firmware kernel 10 of the network identification circuitry 16 by way of
`
`the status data reader 14.
`
`Firmware kernel 10 provides a preprogrammed unique identification number to
`
`manchester encoder 11 in order to reliably traverse the data communication link 2A. The
`
`5
`
`manchester encoder then passes this encoded number to signal transmitter 12 which sends the
`
`encoded number across the data communication link 2A by altering the total current draw
`
`of the network identification circuitry 16. The firmware kernel 10 may also elect to send
`
`additional information such as confirmation of the status information or additional data
`
`provided by an external device 18, such as the computer 3A to which the network
`
`BO
`
`identification circuitry 16 is attached.
`
`The information sent from the network identification circuitry 16 is received by the signal
`
`receiver 6 within the network identification receiver 15, decoded by manchester decoder 5,
`
`and passed on to the firmware kernel 4. The firmware kernel may now pass this received
`
`information on to an external device 19, such as a computer responsible for asset tracking.
`
`Kernel 4 may optionally provide a blocking signal to blocking circuit 20 to deny to an
`
`unauthorized computer access to the network information via hub 1.
`
`Turning now to FIGS. 4-6, one embodiment of the network identification circuitry
`
`16 is illustrated as being contained in a special box-like housing 23. The electronics are
`
`mounted on a suitable card 22 within the confines of a container 24. The container 24 is
`
`20
`
`mounted to the computer 3A using the existing fasteners normally found on the back of the
`
`computer. Such a fastener is illustrated at 26. The fastener 26 is chosen to be one that is
`
`required to be removed in order to gain access to the hardware inside the computer.
`
`Therefore, the potential thief must remove fastener 26 to steal the mother board, network
`
`identification card (NIC), etc. Lid 32 likewise contains opening 34. When the lid is closed
`
`6
`
`Page 9
`
`
`
`as shown in FIG. 6, the opening 28 is aligned with opening 34. These openings allow the
`
`normal network wire connector 38 to pass through the openings in housing 23 and engage
`
`the electronics 22. Housing 23 includes an output cord 40 with a connector 42 which
`
`engages the standard network interface card (NIC) found in the computer. This construction
`
`5
`
`is designed to require the potential thief to disconnect connector 38 from housing 23 in order
`
`to gain access to the fastener 26 which must be unscrewed in order to remove the internal
`
`computer parts. When the connector 38 is removed, the computer 3A becomes, likewise,
`
`disconnected from the network. This causes the current in loop 2A to drop below a
`
`threshold level which causes the system 15 to cause an alarm or the like to be activated.
`
`~10
`
`Thus this housing configuration deters theft of the internal parts of the computer since
`
`fastener 26 must be removed to gain access to them, as well as deterring removal of the
`
`entire computer terminal.
`
`FIGS. 7-8 show an alternative embodiment in which the electronics for network
`
`identification circuitry 16 are instead placed upon a card 44 which can be inserted into an
`
`t_:15
`
`adjacent slot in the computer next to the standard NIC card 46. The network wire connector
`
`38 is connected to the input of card 44 and the output of identification card 44 is then
`
`connected to the normal input receptacle 48 of NIC card 46. It is also envisioned that the
`
`electronics of the network identification circuitry can be placed on a mother board within the
`
`computer or as part of the circuitry on the NIC card.
`
`20
`
`Another feature of this invention is that it is possible to deny access to an
`
`unauthorized user.
`
`If, for example, someone uses a laptop to attempt to plug into the
`
`network, the identification system 15 detects the absence of the proper identification code
`
`from the laptop and, as noted before, kernel 4 can issue a suitable signal to blocking circuit
`
`20 to prevent access to the network information. Furthermore, if the potential thief later
`
`7
`
`Page 10
`
`
`
`disconnects his laptop from the network, this action is also detected and an alarm can be
`
`generated.
`
`8
`
`Page 11
`
`
`
`What is claimed is:
`
`CLAIMS
`
`1 . An electronic identification system for determining unique identification number
`
`attached to electronic equipment on a network using an ID circuitry attached to the electronic
`
`equipment, said identification system comprising:
`
`current loop means including separate current loops associated with different pieces
`
`of identified equipment,
`
`each of said current loops employing one or more pair of data communication lines
`
`which connect one of the associated pieces of equipment to the network and which are
`
`coupled to an identification circuit, and wherein respective pairs of data communication lines
`
`are associated with different ones of the associated pieces of equipment;
`
`source means for supplying a low DC current to each of said current loops to supply
`
`necessary power to the identification circuit; and
`
`receiver means for receiving a unique identification through each of the current loops.
`
`2.
`
`The identification system as defined in claim 1 wherein said electronic
`
`equipment comprises computer workstations each connected to a network and located
`
`remotely from the equipment which said workstations may be connecting.
`
`3.
`
`The identification system as defined in claim 1 where each of said current
`
`loops includes existing pairs of data communication lines used by said network for sending
`
`data between the associated pieces of equipment.
`
`9
`
`Page 12
`
`
`
`4.
`
`The identification system as defined in claim 1 wherein said network includes
`
`an Ethernet network and said respective pairs of data communication lines include existing
`
`twisted pair wiring connecting the different ones of the associated pieces of equipment to said
`
`network.
`
`5.
`
`A method for identifying remotely located electronic equipment which has
`
`existing data communication lines connecting the equipment to a network, said method
`
`comprising:
`
`selecting respective pairs of the existing data communication lines for
`
`associated pieces of identified equipment so that each of said selected pairs of data
`
`communication lines forms a current loop through the associated pieces of identified
`
`equipment, wherein said respective pairs of data communication lines are associated with
`
`different ones of the associated pieces of equipment;
`
`supplying a low current power source to remotely located identification
`
`circuitry that generates a preprogrammed unique identification number;
`
`transmitting status data to the identification circuitry for the purpose of passing
`
`on to an external device such as a computer by altering the voltage level of the low current
`
`power source;
`
`transmitting a preprogrammed unique
`
`identification number from
`
`the
`
`identification circuitry to a receiver by altering the current draw of the identification circuitry
`
`itself; and
`
`receiving an identification number transmitted by the identification circuitry
`
`by measuring the current draw of the identification circuitry.
`
`10
`
`Page 13
`
`
`
`ABSTRACT
`
`A system and method are provided for uniquely identifying electronic equipment, such
`
`as remote computer workstations, that are connected to a network via a communication link
`
`and tracking the equipment as it is moved to different locations on the network. The system
`
`includes current loops internally coupled to identified pieces of equipment so that each piece
`
`of associated equipment has an associated current loop. A low current power signal is
`
`provided to each of the current loops. A sensor monitors the current flow through each
`
`current loop to determine the identity of the electronic equipment. The system also includes
`
`an ID device attached to the electronic equipment which is powered by a low current power
`
`signal, that continuously modulates the power signal by fluctuating the current draw of the
`
`ID device in a unique preprogrammed pattern, thereby transmitting a unique ID to a current
`
`sensor. The power signal to the ID device may also be fluctuated to provide useful
`
`information, such as status information, to the ID device. Relocation of the electronic
`
`equipment with attached ID device to another location on the network is detected immediately
`
`and may be used to update a database. This invention is particularly adapted to be used with
`
`an existing 1 OBase-T communication link or equivalent thereof, employing existing wiring
`
`to form the current loops.
`
`11
`
`Page 14
`
`
`
`-)J
`
`
`
`
`
`
`
`
`
`zvrraw;xv“-s"szfMnew2::M5":2::::33f:::::':§:M22255.;
`
`Page 15
`
`Page 15
`
`
`
`Hub
`
`I
`15
`l1 g ::;;···~=ta=c:=~=~=ata=~····---~~-D.;:- J
`I
`I
`I
`I
`M------4~--17 ir~clllator - =;Po~
`
`17
`
`I
`1 .. 6
`1-----r'"" 1
`
`I i
`
`!
`
`Signal
`Receiver
`
`5
`
`:Manchester
`Decoder
`
`Unique
`Identification
`Number
`
`4 Firmware
`Kernel
`
`19 External
`Device
`
`I
`
`16
`r··-·····--··----~--·------~---~····-···
`
`13
`
`Reader
`
`11 Manchester
`Encoder
`
`...____
`
`I
`
`,......_
`
`2D
`
`2C
`
`2B 2A
`
`I
`PC
`
`3C
`
`I
`
`I
`
`3BPC
`
`A
`
`'
`
`L
`
`I
`
`A
`
`1
`
`f-h Isolation Power 1 - -14 Status Data
`! Supply
`!
`i
`J-_ 12 Signal
`!
`Transmitter
`I
`I !
`
`
`Preprogrammed
`UmqueiDNo.
`L ... .......-....... ......... , ....... ..,.. ..................... _.
`1 10 Firmware L
`I
`~----~----··-·-·-···
`
`'
`
`Xemcl
`
`18 External
`Device
`
`3A PC
`
`I
`
`Page 16
`
`
`
`-
`
`
`*'v-”4~1-’=A-"‘““F5'"2W1‘W2‘n..Mn...tHE.,.E.":;:&h*'v-”4~1-’=A-"‘““F5'"2W1‘W2‘n..Mn...tHE.,.E.":;:&h
`
`41:2‘"N.,41:2‘"N.,
`
`
`
`Page 17Page 17
`
`Page 17
`
`
`
`~
`
`=
`
`
`
`3~____”2E.5E,2E2E.is:EE3~____”2E.5E,2E2E.is:EE
`
`J
`j
`I
`
`\
`\
`I
`i
`/
`\
`\
`
`I
`\
`\
`)
`I
`
`
`
`K§>§:mK§>§:m
`
`
`
`Page 18Page 18
`
`Page 18
`
`
`
`
`
`4/ 9/96 4:23PM;
`Received:
`04/09/98 THU 15:22 FAX
`
`-> HARNESS.DICKEY & PIERCE; Page 7
`
`~007
`
`(
`
`'f!bt;
`
`Etherlock ID
`Card
`
`Standard NIC
`
`Page 19
`
`
`
`4/ 9/98 4:24PM;
`Received:
`04/09/98 THU 15:22 FAX
`
`-> HARNESS.DICKEY & PIERCE; Page 9
`
`~009
`
`I {t
`
`/
`
`EtherLock ID
`
`NIC
`
`Page 20