throbber
United States Patent [191
`Cummings et al.
`
`US005406260A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,406,260
`Apr. 11, 1995
`
`[54]
`
`[75]
`
`[73]
`
`[21]
`[22]
`[51]
`[52]
`[53]
`
`NETWORK SECURITY SYSTEM FOR
`DETECTING REMOVAL OF ELECTRONIC
`EQUIPMENT
`Inventors: Marshall B. Cummings, Ann Arbor,
`Mich.; Christopher R. Young, Austin,
`Tex.
`Assignee: ChriMar Systems, Inc., Ann Arbor,
`Mich.
`992,
`924
`Dec. 18, 1992
`
`Appl. No.:
`Filed:
`
`............................... .. G08B 21/00
`Int. Cl.6 ........... ..
`340/568; 340/687
`US Cl. ........... ..
`Field of Search ........ ..'.'.'... 340/568, 571, 572, 652,
`340/664, 687
`
`[56]
`
`References Cited
`U_.S. PATENT DOCUMENTS
`11/1971
`3,618,065
`1/1976
`3,932,857
`4,654,640
`3/1987
`8/1987
`4,686,514
`4,736,195
`4/1988
`7/1988
`4,760,382
`5,034,723
`7/1991
`1/1991
`5,059,948
`11/1991
`5,066,942
`8/1992
`5,136,580
`7/1993
`5,231,375
`
`Matsuo ..... ..
`
`5,243,328 9/1993 Lee et a1. .......................... .. 340/568
`
`FOREIGN PATENT DOCUMENTS
`
`357482 3/1990 European Pat. on". .......... .. 340/568
`4203304 8/1992 Germany .......................... .. 340/568
`Primary Examiner-John K. Peng
`Assistant Examiner—Thomas J. Mullen, Jr.
`Attorney, Agent, or Firm—Harness, Dickey & Pierce
`[57]
`ABSTRACT
`A system and method are provided for monitoring the
`connection of electronic equipment, such as remote
`computer workstations, to a network via a communica
`tion link and detecting the disconnection of such equip
`ment from the network. The system includes current
`loops internally coupled to protected pieces of equip
`ment so that each piece of associated equipment has an
`associated current loop. A low current power signal is
`provided to each of the current loops. A sensor moni
`tors the current ?ow through each current loop to de
`tect removal of the equipment from the network. Re
`moval of a piece of hardware breaks the current ?ow
`through the associated current loop which in turn may
`activate an alarm. This invention is particularly adapted
`to be used with an existing 10BaseT communication link
`or equivalent thereof, employing existing wiring to
`form the current loops.
`
`19 Claims, 3 Drawing Sheets
`
`1s
`
`NETWORK
`FILE
`SERVER
`
`NETWORK BACKBONE >
`,
`l
`
`.09
`
`1
`
`HUB
`23
`
`1
`
`2o
`
`HUB [HUB] 1473/
`21
`22
`
`1
`
`14
`
`ISOLATION
`POWER SUPPLY
`
`26
`
`VOL A
`SIGNAL
`ISOLATION __ CURRENT
`\
`CONVERTER
`32
`
`34
`
`36
`
`l
`l
`1
`i
`1
`CONDITIONING ‘I
`,
`l
`I
`:
`{
`
`0111.11
`38/ LOGIC
`
`I l I l l l l l l l l l l I I l l l I | l l l l l l
`
`l
`
`40
`
`D-Link-1010
`Page 1 (of 8)
`
`

`
`U.S. Patent
`
`Apr. 11, 1995
`
`Sheet 1 of 3
`
`5,406,260
`
`mm
`
`
`
`mzHzoHHHazouFzmmmzu
`
`4<zwHmohmm<H4o>
`
`m2<-mo
`
`4<HHmHQ
`
`2¢<4<
`
`mmHmm>zou
`
`vm
`
`2oHH<4omH
`
`>4ua:mmmzoa
`
`4<zmHm
`
`zoH»<4omH
`
`mm
`
`cm
`
`00
`
`
`
`mzomxu<mxmozhmz
`
`xmozgmz
`
`mqam
`
`mm>mmm
`
`ow
`
`ma:ms:ma:
`
`ma:
`
`D-Link-1010
`Page 2 (of 8)
`
`
`
`
`
`
`
`
`
`
`

`
`U.S. Patent
`
`Apr. 11, 1995
`
`Sheet 2 of 3
`
`5,406,260’
`
`on
`
`2m<4<
`
`Hmmmm
`
`NV
`
`~H2x-m::
`
`D-Link-1010
`Page 3 (of 8)
`
`
`

`
`US. Patent
`
`Apr. 11, 1995
`
`‘
`
`Sheet 3 of 3
`
`5,406,260
`
`[III/III’,
`
`D-Link-1010
`Page 4 (of 8)
`
`

`
`1
`
`5,406,260
`
`NETWORK SECURITY SYSTEM FOR DETECTING
`REMOVAL OF ELECTRONIC EQUIPMENT
`
`30
`
`35
`
`BACKGROUND OF THE INVENTION
`1. Technical Field
`This invention relates generally to theft protection
`security systems and, more particularly, to a network
`security system for detecting the unauthorized removal
`of remotely located electronic equipment from a net
`work.
`2. Discussion
`There has been an ever increasing need to provide
`security for electronic equipment against the unautho
`rized removal or theft thereof. Computer systems have
`become a major capital expenditure for users which
`commonly include businesses, educational institutions
`and governmental entities, among other users. Ad
`vancements in technology have signi?cantly reduced
`the size and weight of complex computer equipment,
`thus making expensive computer equipment more easily
`portable. As a consequence, modern computer equip
`ment is generally more compact and more easily trans
`portable, which further makes it more difficult to secure
`against the unauthorized removal or theft thereof.
`Today, computer network systems are frequently
`employed to provide efficient computing capabilities
`throughout a large work area. Existing computer net
`work systems generally include a number of remotely
`located work stations coupled via a data communica
`tion link to a central processing center. For instance,
`many educational institutions such as universities com~
`monly provide a large number of individual work sta
`tions at different locations throughout the university
`campus so as to allow easy computing access to the
`computer network system. However, the wide dissemi
`nation of such equipment at remote locations has made
`the equipment an accessible target for computer thieves.
`Accordingly, a number of methods have been devel
`oped for guarding against the unauthorized removal of
`.40
`electronic equipment. Early methods of protection have
`included the physical attachment of a security cord to
`each piece of protected equipment. However, the secu
`rity cord generally may be cut or physically detached
`from its secured position and is usually considered to be
`45
`a non-appealing aesthetic addition to the equipment.
`Another method of protection includes the attachment
`of a non-removal tag to the equipment which also re
`quires cooperating sensing devices responsive to the tag
`which are properly located at exit locations from the
`premises. However, this approach requires rather ex
`pensive sensing devices and is generally not very feasi
`ble especially when multiple exit points exist.
`Other methods of theft protection have included
`installing a special electronic card inside each computer
`machine which responds to polls from an external moni
`toring station. Upon removal of the machine, the card
`stops responding to the polling of the central station and ,
`an alarm is initiated. Another approach involves mount
`ing a sensing device on or into the machine to detect
`movement of the machines. These approaches, how
`ever, are generally undesirable since they require the
`incorporation of additional components into each ma
`chine.
`More recent methods of theft protection have in
`cluded the sensing of a current loop coupled to the
`protected equipment. One such method is discussed in
`U.S. Pat. No. 4,654,640 issued to Carll et al which dis
`
`60
`
`65
`
`2
`closes a theft alarm system for use with a digital signal
`PBX telephone system. This method includes a plural
`ity of electronic tethers which are connected to individ
`ual pieces of protected equipment by way of connectors
`which in turn are bonded to the surface of the protected
`equipment. Each tether includes a pair of conductors
`which are connected together to form a closed current
`loop via a series resistor and conductive foil which is
`adhesively bonded to the outside of the equipment.
`However, this method requires the addition of an exter
`nally mounted current loop, and it is conceivable that
`the current loop may be carefully removed without any
`detection.
`It is therefore desirable to provide for an enhanced
`network security system which detects unauthorized
`removal of remotely located pieces of hardware from a
`network. More particularly, it is desirable to provide for
`such a security system which feasibly employs separate
`current loops provided through an existing data com~
`munication link to monitor the presence of remotely
`located computer equipment. In addition, it is desirable
`to provide for a security network system which may be
`easily and inexpensively implemented in an existing
`network system and may not be easily physically re
`moved or detached from tile system without detection.
`
`SUMMARY OF THE INVENTION
`In accordance with the teachings of the present in
`vention, a security system is provided for detecting
`unauthorized removal of electronic equipment from a
`network. The system includes current loops internally
`coupled to protected pieces of equipment so that each
`piece of associated equipment has an associated current
`loop. A low current power signal is applied to each of
`the current loops. A detector monitors current flow
`through each of the current loops so as to detect a drop
`in current ?ow which represents removal of equipment
`from the network. Detection of removal of a piece of
`equipment may in turn activate an alarm. This invention
`is particularly adapted to be used in conjunction with a
`computer network having an existing communication
`wiring scheme coupling each piece of equipment to the
`network, and which may be used to form the current
`loops.
`BRIEF DESCRIPTION OF THE DRAWINGS
`Other objects and advantages of the present invention
`will become apparent to those skilled in the art upon
`reading the following detailed description and upon
`reference to the drawings in which:
`FIG. 1 is a block diagram which illustrates a network
`security system coupled in to a computer network in
`accordance with the present invention;
`FIG. 2 is a circuit diagram which illustrates the net
`work security system coupled to the computer network
`in accordance with the present invention; and
`FIG. 3 is a schematic diagram which illustrates instal
`lation of the network security system into an existing
`computer network in accordance with the present in
`vention.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`Turning now to FIGS. 1 and 2 a network security
`system 24 is provided therein for achieving theft protec
`tion of electronic computer equipment associated with a
`computer network 10. In general, the network security
`
`D-Link-1010
`Page 5 (of 8)
`
`

`
`10
`
`5,406,260
`3
`system 24 monitors remotely located electronic work
`stations such as personal computers 12a through 12d via
`current loop continuity so as to detect the removal of
`any of the personal computers 12a through 12d from the
`computer network 10. The network security system 24
`described herein is particularly adapted to be easily
`implemented in conjunction with an existing computer
`network 10 without the need for substantial modi?ca
`tions and while realizing minimal interference to the
`computer network 10.
`Remotely located personal computers 12a through
`12d are each connected to the computer network 10 so
`as to provide widespread remote user access to the
`computer network 10. The computer network 10 shown
`herein is of the conventional type which includes a
`network ?le server 18 connected to a network back
`bone 16. The computer network 10 may include most
`any type of backbone such as, for instance, an Ether
`net ® backbone manufactured by Xerox Corporation.
`A plurality of hubs such as hubs 20, 21, 22 and 23 are
`generally coupled to the network ?le server 18 or back
`bone 16 to provide communication links therewith. The
`remotely located personal computers 120 through 12d
`are shown connected to hub 20 via a data communica
`tion link 14. Data communication link 14 includes a
`plurality of transmit and receive data communication
`lines for communicating information between each of
`remotely located personal computers 12a through 12d
`and the network ?le server 18 via network backbone 16
`and hub 20.
`The invention described herein is particularly suited
`to be implemented in conjunction with a computer
`network 10 which preferably employs a conventional
`wiring approach of the type which may include 10Ba
`seT wiring. Wiring schemes of the 10BaseT type are
`commonly employed to provide data communication
`lines for electronic computer equipment. In accordance
`with conventional wiring approaches, data communica
`tion link 14 generally includes a plurality of pairs of
`transmit wires 44 and 46 as well as a plurality of pairs of
`40
`receive wires (not shown) connected to each of per
`sonal computers 12a through 12d. Each pair of transmit
`wires 44 and 46 are internally coupled to an associated
`personal computer 12 via one winding 53 of an inter
`nally located isolation transformer 52. Each pair of
`45
`transmit wires 44 and 46 along with isolation trans
`former 52 thereby form a current loop 50 through the
`personal computer 12 which is advantageously em
`ployed in accordance with the approach described
`herein. However, the same approach could be imple
`mented with the pairs of receive wires without depart
`ing from the scope of this invention.
`The network security system 24 includes an isolation
`power supply 26 which supplies a continuous direct
`current (DC) power signal to each of current loops 500
`through 50d. The DC power signal has a low current
`preferably on the order of magnitude of less than one
`milliamp (1 mA) and, more speci?cally includes a pre
`ferred current of approximately ?fty microamps (50
`[1A). The isolation power supply 26 includes an input
`terminal 25 for receiving a low voltage signal VIN.
`which has a magnitude of approximately ?ve (5) volts.
`A plurality of parallel connected capacitors C1, C2, and
`C3 are connected to input terminal 25. In addition, a
`plurality of power supply lines 280 through 28d are
`provided, each of which has one of capacitors C4(a—d)
`coupled thereto, and all of which are coupled to parallel
`connected capacitors C1 through C3. Capacitors C1
`
`4
`through C4 operate as a power supply ?lter to ?lter out
`any undesirable AC signals such as network operating
`signals. Each of power supply lines 28a through 28d is
`further coupled in series to one of resistors R1(a—d) and
`one of inductors L1(a—d), respectively. Each of resistors
`R1(a—d) has a preferred resistance of about one kiloohm
`(1 k0) which ensures a low current ?ow thereacross.
`Accordingly, inductors L1(a—d) provide isolation to
`power supply 26 by blocking unwanted AC signals
`from transmitting through lines 280 through 28d. Ac
`cording to one embodiment, capacitors C1 through C3
`have respective values of 100 pF, 0.1 uF and 1.0 uF,
`while capacitors C4(a-d) each have values of 0.1 ptF and
`inductors L1(a—d) each have values of 120 mH.
`The power supply lines 280 through 28d each are
`electrically coupled to respective transmit wires 440
`through 44d found within data communication link 14.
`Receive power lines 30a through 30d are likewise elec
`trically coupled to transmit wires 46a through 46d also
`found within the data communication link 14. Transmit
`wires 440 through 44d and 460 through 46d are existing
`wires found within data communication link 14 that are
`selectively tapped as pairs in accordance with the pres
`ent invention to provide current loops 50a through 50d.
`As a consequence, power supply line 28a continu
`ously supplies a low current DC power signal to remote
`personal computer 12a via transmit wire 44a. The low
`current power signal ?ows through an internal path
`provided by existing circuitry in personal computer
`12a. The low current power signal then exits the remote
`personal computer 12a via transmit wire 46a and in turn
`is picked up by receive power line 30a. The low current
`power signal is continuously supplied to current loops
`50a through 500' at all times regardless of whether the
`computer network 10 or any personal computers 12a
`through 12d are operating or not. In addition, the very
`low current DC power signal is so small that it does not
`interfere with or adversely effect the operation of the
`associated computers 12a through 12d or computer
`network 10. To prevent the ?ow of DC current to or
`from hub 20, each of transmit wires 44a through 44d
`and 46a through 46d are further coupled to DC block
`ing capacitors C5 between each of current loops 50a
`through 50d and hub 20. DC blocking capacitors C5
`thereby prevent unwanted DC current paths through
`hub 20.
`-
`The return power signals tapped from transmit wires
`46a through 46d via receive power lines 300 through
`30d are then applied to a signal isolation device 32. The
`signal isolation device 32 includes an RLC circuit made
`up of inductors L2(a—d) coupled in parallel to grounded
`pairs of parallel connected resistors R2 and capacitors
`C5 which are coupled to each of receive power lines 30a
`through 30d. Accordingly, the signal isolation device 32
`helps to prevent network operating signals from inter
`fering with one another. According to one preferred
`embodiment, resistors R2 and capacitors C6 each have
`preferred values of 100 k0 and 0.33 uF, respectively,
`while inductors L2(a—d) each have preferred values of
`120 mH each.
`'
`Op-amp voltage to current converters 34a through
`34d are further connected to receive power lines 30a
`through 30d, respectively. The voltage to current con
`verters 34A through 34D each convert the return
`power signal to a desired magnitude current signal via
`an operational transconductance ampli?er. A signal
`conditioning unit 36 in turn is connected to the output
`of the voltage to current converter 34. The signal condi
`
`25
`
`65
`
`D-Link-1010
`Page 6 (of 8)
`
`

`
`5,406,260
`5
`tioning unit 36 includes Schmidt trigger buffers 36a
`through 36d which further ensure a smooth DC signal
`response.
`The signal conditioning unit 36 has an output con
`nected to digital alarm logic 38 which essentially in
`cludes a NAND gate 38. The NAND gate 38 has four
`inputs for receiving a signal from each of receive power
`lines 30(a-d) and generates a NAND logic operation in
`response thereto. The output of the NAND gate 38 in
`turn provides an alarm output signal to an alarm 40.
`Accordingly, a “high” signal on each NAND gate input
`which is indicative of unbroken current loop continuity
`will result in a “low” alarm output signal. Whereas, a
`“low” signal on any input which is indicative of a cur
`rent loop discontinuity will result in a “high” alarm
`output signal. The alarm 40 includes a reset 42 for dis
`abling the alarm 40 when so desired. In addition, the
`alarm output signal may be further used to activate the
`operation of additional security related functions which
`may include alarm status noti?cation to designated au
`thorities via a telephone link amongst other possible
`functions known throughout the ?eld.
`In addition, each of receive power lines 30a through
`30d is further coupled to one end of light emitting di
`odes 480 through 48d. The other end of light emitting
`diodes 480 through 48d are coupled to a voltage'power
`supply V+. As a consequence, each of light emitting
`diodes 4811 through 48d provides an energized light
`indication whenever the associated current loop 50 is
`broken so as to indicate which. of the personal comput
`ers 12a through 12d are disconnected from the com
`puter network 10.
`FIG. 3 illustrates the connection of the network secu
`rity system 24 to an existing computer network 10. The
`network security system 24 is substantially enclosed
`within a housing 60 which is connected between data
`communication link 14 and hub 20. The housing 60 has
`one or more female receptacles 62 each for receiving a
`male plug 66 that is connected to one end of the data
`communication link 14. The housing 60 further includes
`one or more additional female receptacles 64 for receiv
`ing a male plug 68 from an additional data communica
`tion extension line 70 which in turn connects to female
`receptacle 74 in hub 20 via male plug 72. For purposes
`of maintaining a secure system, the network security
`system 24 is preferably located in a secure area separate
`from personal computers 12a through 12d. This further
`’ ensures against unwanted tampering with the network
`security system 24.
`To implement the present invention, the network
`security system 24 is easily installed into an existing
`computer network 10 such as that employing a l0BaseT
`hub to workstation communication link 14. In doing so,
`the housing 60 enclosing the network security system 24
`is connected between data communication link 14 and
`hub 20 so that male plug 66 is removed from female
`receptacle 74 in hub 20 and inserted into female recepta
`cle 62 in housing 60. The additional data communica
`tion extension link 70 is in turn connected between
`housing 60 and hub 20. As a consequence, power supply
`lines 280 through 28d and receive power lines 30a
`through 30d are easily tapped into selected pairs of
`existing transmit wires 44(a-d) and 46(a-d) found in
`data communication link 14. The selected pairs of trans
`mit wires 44 and 46 enable current to flow through
`current loops 50a through 50d internally coupled to
`personal computers 12a through 12d, respectively.
`
`6
`In operation, the isolation power supply 26 supplies a
`continuous low current DC power signal to each of
`power supply lines 28a through 28d. The low current
`power signal ?ows through current loops 50a through
`50d via pairs of transmit wires 44 and 46 and existing
`circuitry such as isolation transformers 52 within each
`of the remote personal computers 120 through 12d
`being monitored. The return signal in each of current
`loops 50a through 50d is applied to a signal isolation
`device 32 for preventing signal interference among the
`separate communication channels and then is further
`coupled to an op-amp voltage to current converter 34.
`Voltage to current converter 34 converts the voltage to
`a desired current level which in turn is applied to a logic
`NAND gate 38. The logic NAND gate 38 detects dis
`continuities in the current loops 500 through 50d being
`monitored and provides an output indication to an
`alarm 40 which indicates removal of one or more of
`remote personal computers 12a through 12d from the
`computer network 10. In addition, detection of a cur
`rent ?ow discontinuity further energizes the appropri
`ate light emitting diodes‘44a through 44d associated
`with the disconnected personal computer 12.
`While this invention has been described herein in
`connection with a network security system 24 for de
`tecting continued connection of remotely located per
`sonal computers 12a through 12d to a computer net
`work 10, it is conceivable that other electronic equip
`ment may likewise be detected without departing from
`the spirit of this invention. In addition, any number of
`pieces of equipment may be monitored with the net
`work security system 24 and any number of network
`security systems may be coupled to a given network or
`a plurality of networks to handle large numbers of re
`motely located pieces of equipment.
`In view of the foregoing, it can be appreciated that
`the present invention enables the user to achieve anti
`theft protection for remotely located electronic equip- I
`ment connected to an existing network system. Thus,
`while this invention has been disclosed herein in combi
`nation with a particular example thereof, no limitation is
`intended thereby except as de?ned in the following
`claims. This is because a skilled practitioner recognizes
`that other modi?cations can be made without departing
`from the spirit of this invention after studying the speci
`?cation and drawings.
`What is claimed is:
`1. A security system for detecting disconnection of
`electronic equipment from a network, said security
`system comprising:
`current loop means including separate current loops '
`associated with different pieces of monitored
`equipment, each of said current loops employing a
`pair of data communication lines which connect
`one of the associated pieces of equipment to the
`network and which are coupled to existing internal
`circuitry within the associated piece of monitored
`equipment, and wherein respective pairs of data
`communication lines are associated with different
`ones of the associated pieces of equipment;
`source means for supplying a low DC current signal
`to each of said current loops; and
`detector means for monitoring the current signal
`through each of said current loops and detecting a
`change in said current signal through one of said
`current loops which represents disconnection of
`said associated piece of equipment from the net
`work.
`
`45
`
`55
`
`65
`
`D-Link-1010
`Page 7 (of 8)
`
`

`
`5,406,260
`7
`2. The security system as de?ned in claim 1 wherein
`said electronic equipment comprises computer worksta
`tions each connected to a network ?le server and lo
`cated remote from the network ?le server.
`3. The security system as de?ned in claim 1 wherein
`each of said current loops includes existing pairs of data
`communication lines used ‘by said network for commu
`nicating data between the associated pieces of equip
`ment and a network ?le server.
`4. The security system as de?ned in claim 1 wherein
`said network includes an Ethernet ® network and said
`respective pairs of data communication lines include
`I existing IOBaseT wiring connecting the different ones
`of the associated pieces of equipment to said network.
`5. The security system as de?ned in claim 1 wherein
`said existing internal circuitry includes an isolation
`transformer having a ?rst winding coupled between
`said pair of data communication lines so as to allow said
`current signal to ?ow therethrough when the associated
`piece of equipment is connected to the network.
`6. The security system as de?ned in claim 1 wherein
`said system further comprises high frequency ?lter
`means coupled to each of said current loops for provid
`ing isolation to each of said current loops.
`7. The security system as de?ned in claim 1 further
`25
`comprising DC blocking capacitors coupled to each of
`said current loops for preventing said current signal
`through one of said current loops from interfering with
`other of said current loops.
`8. The security system as de?ned in claim 1 further
`comprising alarm indicator means responsive to said
`current detection for providing an alarm signal indica
`tive of a disconnected piece of said equipment when
`said change in the current signal through one of said
`current loops is detected.
`9. A security system for detecting unauthorized dis
`connection of electronic equipment that is connected to
`a network communication link having existing pairs of
`data communication lines interconnecting said elec
`tronic equipment to a network, said system comprising:
`current loop means including separate current loops
`associated with different pieces of protected equip
`ment and internally coupled to the associated
`pieces of protected equipment, each of said current
`loops using said existing pair of data communica
`tion lines which are coupled together via existing
`internal circuitry within said associated equipment
`to form a complete circuit path therethrough, and
`wherein respective pairs of data communication
`lines are associated with different ones of the asso
`ciated pieces of equipment;
`source means for supplying a low DC current signal
`to each of said current loops;
`sensing means for sensing current ?ow through each
`of said current loops and detecting a change in said
`current flow through one of said current loops
`which is indicative of disconnection of one of the
`associated pieces of equipment; and
`output means for providing an alarm output signal so
`as to indicate detection of a disconnected one of
`said pieces of equipment.
`
`35
`
`40
`
`8
`10. The security system as de?ned in claim 9 wherein
`.each of said pairs of data communication lines are cou
`pled between one of said associated pieces of equipment
`and a network ?le server.
`11. The security system as de?ned in claim 9 wherein
`said data communication lines are provided via l0Ba
`seT wiring.
`12. The security system as de?ned in claim 9 wherein
`said internal circuitry within said associated equipment
`comprises a ?rst winding of a transformer which is
`coupled between each of said respective pairs of data
`communication lines to form a circuit path through
`each of said pairs of data communication lines.
`13. The security system as de?ned in claim 9 wherein
`said DC current signal has a current of less than 1 milli
`amp.
`14. A method for detecting unauthorized disconnec
`tion of remotely located electronic equipment which
`has existing data communication lines connecting the
`equipment to a network, said method comprising:
`selecting respective pairs of the existing data commu
`nication lines for associated pieces of monitored
`equipment so that each of said selected pairs of data
`communication lines forms a current loop through
`the associated pieces of monitored equipment,
`wherein said respective pairs of data communica
`tion lines are associated with different ones of the
`associated pieces of equipment;
`supplying a low DC current signal to each current
`loop so as to achieve continuous current flow
`through each current loop while each of said asso
`ciated pieces of equipment is physically connected
`to said network via the data communication lines;
`and
`sensing said DC current signal in each of said current
`loops so as to detect a change in current ?ow indic
`ative of disconnection of one of said pieces of asso
`ciated equipment.
`15. The method as de?ned in claim 14 further com
`prising the step of providing an alarm signal when said
`disconnection of one of said pieces of equipment is
`detected.
`16. The method as de?ned in claim 14 further com
`prising the step of:
`selectively tapping into each of said selected pairs of
`existing data communication lines at a location
`which is remote from said associated pieces of
`equipment.
`17. The method as de?ned in claim 14 wherein said
`existing data communication lines comprise IOBaseT
`wiring.
`18. The method as de?ned in claim 14 wherein each
`of said pieces of electronic equipment comprises a com
`puter workstation connected to an Ethernet ® net
`work.
`19. The method as de?ned in claim 14 wherein each
`of said current loops includes existing circuitry within
`the associated piece of equipment and coupled between
`the one of said associated pairs of data communication
`lines to provide a circuit path therebetween.
`*
`* * *
`*
`
`45
`
`55
`
`65
`
`D-Link-1010
`Page 8 (of 8)

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket