`(10) Patent No.:
`a2) United States Patent
`US 6,263,440 B1
`
`Pruett et al. Jul. 17, 2001 (45) Date of Patent:
`
`
`(54) TRACKING AND PROTECTION OF DISPLAY
`MONITORS BY REPORTING THEIR
`IDENTITY
`
`Primary Examiner—Norman M. Wright
`(74) Attorney, Agent, or Firm—George E. Grosser; Joseph
`A. Sawyer, Jr.
`
`(57)
`
`ABSTRACT
`
`The present invention is directed toward a method, system
`and computer readable medium (the present invention) for
`reporting information related to a monitor attached to a
`computer which includes a system memory. The present
`invention includes electronically reading the information
`from the monitor and storing the monitor information in the
`system memory. The present
`invention further includes
`retrieving the monitor information from the system memory
`and providing the monitor information to a display via a
`browser. The monitor information comprises electronically
`readable information including its identity. One aspect of the
`present invention further includes comparing the monitor
`information with a corresponding last known information,
`wherein a mismatch indicates that the monitor has been
`changed. Another aspect of the present invention further
`includes copying the monitor information to a radio fre-
`quency (RF) enabled memory, wherein the monitor infor-
`mation can be logged utilizing an RF reader device. The RF
`reader device may be included in an RF gate and/or a hand
`held device. Computer systems with Radio Frequency Iden-
`5,377,269 * 12/1994 Heptig et al. cesses 380/25__tification (RFID) technology configured in accordance with
`. 364/514 R
`5,715,174 *
`2/1998 Cotichini et al
`the present invention enable automated electronic tracking
`
`
`5,787,174 *
`7/1998 Tuttle «0.0...
`w- 380/23
`of computer assets such as the monitors as they pass through
`9/1998 Cotichini et al.
`.
`395/200.3
`5,802,280 *
`the RF gate in or out of a portal. Computer systems with the
`
`4/1999 Woolley et al...
`- 340/539
`5,892,441 *
`RFID technology also enable the automated electronic track-
`8/1999 Ross «0
`wee 345/11
`5,943,029 *
`:
`:
`:
`340/539
`5.959.529 *
`9/1909 Kail, IV .
`ing of the monitors or other computer assets via the hand
`
`
`.. 395/186
`9/1999 Hwang......
`5,960,172 *
`held device. In either case, no direct contact with the monitor
`6,087,937 *
`7/2000 McCarthy .....
`.. 340/567
`is needed for the tracking and reporting.
`6,160,477 * 12/2000 Sandelmanet al... 340/506
`
`(75)
`
`Inventors: Gregory B. Pruett, Durham; Gregory
`W. Kilmer, Raleigh; Barry B. Khatri,
`Cary, all of NC (US)
`
`(73) Assignee:
`
`International Business Machines
`Corporation, Armonk, NY (US)
`
`(*) Notice:
`
`Subject to any disclaimer,the term ofthis
`patent is extended or adjusted under 35
`US.C, 154(b) by 0 days.
`
`(21) Appl. No.: 09/113,945
`(22)
`Filed:
`Jul. 10, 1998
`(51)
`Int. CW. GO6F 11/30; GO6E 7/04;
`G05B 23/02
`(52) US. Ch ce. 713/200; 340/825.11; 340/825.15;
`340/825.17; 340/825.32; 340/825.36
`(58) Field of Search oo...ees 713/200, 201,
`713/202; 340/825.11, 825.15, 825.17, 825.1,
`825.32, 825.36
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`* cited by examiner
`
`18 Claims, 4 Drawing Sheets
`
`404)
`
`
`RF-ENABLED MEMORY
`
`
`
`
`
`
`
`
`
`
`SYSTEMIS
`OPERATING SYSTEM
`POWERED ON
`SYSTEM READY FOR
`
`¥
`TRACKING
`TEST WHETHER
`
`400|VIDEO CARD AND | FIND THE EBDA, THEN|498
`MONITOR SUPPORT|
`|
`SCANS =OR THE
`
`DC2B
`i
`i
`EDID' SIGNATURE
`EDID S GNATURE
`RETRIEVE POINTER
`FOUNDIN EBDA
`t DDC28 SUPPORTED
`
`4o2|RETRIEVE EDID TO UPPER MEMORY|410
`NATA BLOCK FROM
`EDID BLOCK FROM
`MONITCR
`ACCESS TO READ
`EDID RETRIEVED
`THE PHYSICAL
`SUCCESSFULLY
`MEMORY BLOCK
`y
`REFERENCEDBY
`DETERMINE THE
`y THE PCINTER
`END OF PHYSICAL
`MEMORY, COPY THE
`; READ 128 BYTE EDID: BLOCK FROMHIGH
`
`
`128 BYTE EDID BLOCK
`ap
`EMORY AND
`1
`
`THERE, AND SAVE APOINTER TO THIS
`VERIFIESTHE=|”
`BLOCKIN THE EBDA
`CHECKSUM
`COPY SUCCESSFUL
`EDID GHEGKSUM
`¥
`y SAL
`PROTECTS THE EDID
`PARSE EDID DATA
`408) BLOCK AND OBTAINS|414BLOCK IN UPPER
`
`THERE FROM VIDEO
`MEMORY BY
`INDICATING THAT THIS.
`MONITORIDENTIFY
`AREA OF MEMORYIS
`RESERVED
`
`
`
`
`|
`VIDEO MONITOR
`AIG
`IDENTITY IS
`COMPARED AGAINST [7
`
`LAST KNOWN IDENTITY!
`MONITOR CHANGED
`IE LAST KNOWN AND
`CACHEECID DATA
`CURRENTIDENTITY
`TO BE REPORTED
`DO NOT MATCH
`
`420|VIABROWSERIN PROVIDE VISIBLE|41a
`SYSTEM MEMORY
`ALERT; COPY TO
`
`Google Exhibit 1038
`Google v. VirtaMove
`
`Google Exhibit 1038
`Google v. VirtaMove
`
`
`
`U.S. Patent
`
`Jul. 17, 2001
`
`US 6,263,440 B1 OOOOOUOUOU SL!
`
`Sheet 1 of 4
`
`FIG. 1
`
`
`
`U.S. Patent
`
`US 6,263,440 B1
`
`Jul. 17, 2001
`
`Sheet 2 of 4
`
`
`
`
`
`
`
`
`IOdASOHgxnyJaydepyayoegJajouogAiowayy
`
`ralUd|e[|e4edHod[aleeWOud34
`
`
`NV1oFolJajjosjUuoyayoey
`reeeZp
`
`
`[OspUODosSI9|[OIJUODYING‘JE|]04}U05JdruequU|
`on[aoeSa
`
`
`Mowe,e6pig
`
`
`euuajuy¥99L—"_siayjonuo0Dbl08eumdiayO/l
`
`
`uu0D‘dx¥SIJUSLUSDeBURBWJ8EMOdWVYHANO1H
`
`
`
`
`wuod“6x319d]|eoepaiulysel4‘Siow‘efpugWSI/IOd
`
`[Beg
`
`
`s9}OJUOD3QI‘e0eH9}U]sNgWS
`6‘‘
`
`||sueo[aonbereogfeUagUOd
`
`
`
`
`
`vi89aAaexsIq‘edwel
`
`
`
`pseoghaypaeoqheyo607|9%!pei06
`
`U.S. Patent
`
`Jul. 17, 2001
`
`Sheet 3 of 4
`
`US 6,263,440 BI
`
`OV
`
`JOSSs901q
`
`0g
`
`419}/OU]UO0
`
`bS
`
`yse|4
`
`
`
`99<a
`
`
`
`
`
`
`U.S. Patent
`
`Jul. 17, 2001
`
`Sheet 4 of 4
`
`US 6,263,440 B1
`
`DDC2B SUPPORTED
`
`OPERATING SYSTEM
`POWERED ON
`SYSTEM IS
`BOOTS.
`
`SYSTEM READY FOR
`
`
`TRACKING
`
`TEST WHETHER
`
`400|VIDEO CARD AND FIND THE EBDA, THEN;408
`
`MONITOR SUPPORT
`SCANS FOR THE
`
`DDC2B
`EDID' SIGNATURE
`
`
`EDID SIGNATURE
`
`FOUND IN EBDA
`
`
`RETRIEVE POINTER
`
`
`RETRIEVE EDID
`402
`410
`TO UPPER MEMORY
`
`
`DATA BLOCK FROM
`
`
`
`EDID BLOCK FROM
`MONITOR
`EBDA
`
`
`
`
` EDID RETRIEVED
`ACCESS TO READ
`SUCCESSFULLY
`THE PHYSICAL
`
`MEMORYBLOCK
`
`REFERENCED BY
`
`DETERMINE THE
`404
`THE POINTER
`END OF PHYSICAL
`
`
`
`MEMORY, COPY THE
`READ 128 BYTE EDID
`128 BYTE EDID BLOCK
`
`BLOCK FROM HIGH
`
`
`THERE, AND SAVE A
`POINTER TO THIS
`MEMORY AND
`412
`
`
`BLOCKIN THE EBDA
`VERIFIES THE
`
`
`
`CHECKSUM
`
`COPY SUCCESSFUL
`EDID CHECKSUM
`IS VALID
`
`
`
`406
`
`PROTECTS THE EDID
`BLOCK IN UPPER
`MEMORYBY
`INDICATING THAT THIS
`AREA OF MEMORYIS
`RESERVED
`
`PARSE EDID DATA
`BLOCK AND OBTAINS
`THERE FROM VIDEO
`MONITOR IDENTIFY
`
`VIDEO MONITOR
`IDENTITY IS
`COMPARED AGAINST
`LAST KNOWN IDENTITY
`
`MONITOR CHANGED
`
`
`
`
`IF LAST KNOWN AND
`
`
`CURRENTIDENTITY
`
`CACHE EDID DATA
`DO NOT MATCH
`
`TO BE REPORTED
`
`
`PROVIDE VISIBLE
`VIA BROWSER IN
`418
`420
`
`
`ALERT; COPY TO
`
`SYSTEM MEMORY
`
`
`RF-ENABLED MEMORY
`
`
`FIG. 4
`
`
`
`US 6,263,440 B1
`
`1
`TRACKING AND PROTECTION OF DISPLAY
`MONITORS BY REPORTING THEIR
`IDENTITY
`
`FIELD OF THE INVENTION
`
`The present invention relates to computcr systems asscts
`tracking and protection and more particularly to electronic
`tracking and protection of display monitors attached to
`computers.
`
`DESCRIPTION OF RELATED ART
`
`Personal computer and workstation systems (computers)
`are well known in the art. Computers include components
`such as hard disk drives, dual in line memories (DIMMs),
`single in-line memories (SIMMs), display monitors, central
`processing units (CPUs), and other components. Computers
`and their respective components, are highly valuable assets.
`At the same time, computers and computer componentsare
`easily portable and easily reconfigured. The more compact
`the computers and the computer components the easierit is
`to transport
`them. Moreover,
`the more conforming the
`computers and computer components are to indusiry stan-
`dards the easier it
`is to reconfigure the computers with
`exchanged or stolen components.
`Thus, assets management, misplacement and theft of
`computers and computer components present a major prab-
`lem. As a result, there exists an ever increasing need for
`improved computer assets management and protection such
`as security for computers against the unauthorized removal
`or theft of their components.
`In addition,
`today, computer networks (networks) are
`employed to provide increased computing power and effi-
`ciency to a plurality of computers which are located
`throughout a large area. Through the network, the plurality
`of computers are generally interlinked with each other and
`with a server system or a central processing center.
`However, the dissemination of the computers throughoutthe
`large area compounds the computer assets tracking and
`protection problem.
`Computers provided by IBM Corporation currently carry
`a tamper detection switch, which can detect when a com-
`puter cover has been removed and causes the computers to
`be functionally disabled on subsequent boots until the user
`successfully enters an appropriate password. This and other
`similar mechanisms adequately protects the overall com-
`puter system but does not deter theft of the components
`within the computer, nor does it provide meansfor tracking
`computer assets.
`Accordingly, a number of methods have been developed
`for guarding against the unauthorized removal of computer
`assets. One such method is the use of Electronic Article
`Surveillance (EAS) tags which are widely used in commer-
`cial markets for everything from clothing to Compact Disks.
`Whenan item with an EAStag is carried through a portal,
`the portal sounds an audible alarm to notify security of a
`tamper event. The EAS tags are attached or embedded in
`computer systems to provide a notification of when an asset
`is removed.
`
`Although usefulfor retail applications, EAS technologyis
`less effective for protecting corporate assets such as com-
`puters and computer components. Opportunities may exist
`for employees to defeat the technology by removing the
`tags, transferring components through a mail service, or
`reusing componentsin other computers within the building.
`It is therefore desirable to provide a system and method
`that provide clectronic tracking and protection of computer
`
`10
`
`20
`
`25
`
`30
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`assets. Particularly, obtaining and reporting information
`associated with display monitors is needed. The tracking and
`protection of computer assets should be automated and
`easily implemented in various computer systems environ-
`ments. ‘he present invention addresses such a need.
`
`SUMMARY OF THE INVENTION
`
`The present inventionis directed toward a method, system
`and computer readable medium (the present invention) for
`reporting information related to a monitor attached to a
`computer which includes a system memory. The present
`invention includes electronically reading the information
`from the monitor and storing the monitor information in the
`system memory. The present
`invention further includes
`retrieving the monitor information from the system memory
`and providing the monitor information for viewing via a
`browser. The monitor information comprises electronically
`readable information includingits identity.
`One aspect of the present
`invention further includes
`comparing the monitor information with a corresponding
`last known information, wherein a mismatch indicates that
`the monitor has been changed. Another aspect of the present
`invention further includes copying the monitor information
`to a radio frequency (RF) enabled memory, wherein the
`monitor information can be logged utilizing an RF reader
`means.
`
`The RF reader means may be included in an RF gate
`and/or a hand held device. Computer systems with Radio
`Frequency Identification (RFID) technology configured in
`accordance with the present
`invention enable automated
`electronic tracking of computer assets such as the monitors
`as they pass through the RF gate in or out of a portal.
`Computer systems with the RFID technology also enable the
`automated electronic tracking of the monitors or other
`computer assets via the hand held device. In either case, no
`direct contact with the monitor is neededfor the tracking and
`reporting.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 illustrates a computer embodying the system and
`method in accordance with the present invention which can
`be connected to a network through a hub.
`FIG. 2 is a more detailed description of the computer of
`FIG. 1 which embodies the system and method in accor-
`dance with the present invention.
`FIG. 3, illustrates a block diagram of a computer config-
`ured in accordance with the present invention such as the
`computer of FIGS. 1 and 2.
`FIG. 4 is a flow diagram illustrating the process, in the
`preferred embodiment, of retrieving the EDID or VDIF
`information and using this information for the tracking and
`reporting of the display monitor identification.
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`The present invention relates to computer systems assets
`tracking and protection and more particularly to electronic
`tracking and protection of display monitors attached to a
`computer. The following description is presented to cnable
`oneof ordinary skill in the art to make and use the invention
`and is provided in the context of a patent application and its
`requirements. Various modifications to the preferred
`embodimentwill be readily apparent to those skilled in the
`art and the generic principles herein may be applied to other
`embodiments. Thus, the present invention is not intended to
`
`
`
`US 6,263,440 B1
`
`3
`be limited to the embodiment shown but is to be accorded
`the widest scope consistent with the principles and features
`described herein.
`
`In accordance with the present invention, the system and
`method for an automated electronic tracking and protection
`of display monitors associated with a computer utilize
`display monitors identification for monitoring and reporting
`their presence. Display monitors specification may also be
`monitored and reported. Display monitors identification,
`also known asserialization information (serialization),
`includes information such as an identity or serial number.
`Preferably, for tracking and protection of display monitors
`that conform with the Display Data Channel (DDC)
`standard, the system and methodutilize the extended display
`identification (EDID) information that contains the display
`monitor identity and some specification or the video display
`identification format (VDIF) information that contains the
`full specification of the display monitor. The present inven-
`tion takes advantage of the fact that the display monitor
`information, in this case the EDID and VDIF information,is
`electronically readable from the display monitor in that it
`uses this information for tracking and reporting the display
`monitors identification. Hence, any monitor which is adapt-
`able to the DDC or other standard that display monitor
`manufacturers implement and which providesits identifica-
`tion in an electronically readable form may be suitably used
`in conjunction with the system and method in accordance
`with the present invention.
`The identification of display monitorsis preferably logged
`in a radio frequency (RF)-enabled EEPROM througha serial
`bus interface, and an RFreader obtains the identification
`through an RFlink to the RF-enabled EEPROM. Preferably,
`the identification is also logged for future reference in a
`computer file which holds the last known computer con-
`figuration data.
`Electronically retrieving and reporting of the identifica-
`tion of display monitors via a browser such as, in a preferred
`embodiment,
`a Desktop Management Interface (DMI)
`browser, and/or via the RI’ link to the RI’ reader, automates
`the tracking and protection of the display monitors. The RF
`reader can be included, for example, in RF gates installed in
`portal entryways or in hand held devices. Hence, there is no
`need for direct connection to the display monitors in order
`to provide the automated electronic tracking and protection
`thereof.
`
`In the preferred embodiment, the system and method in
`accordance with the present invention additionally utilize a
`software program such as,
`for example,
`the AssetCare
`software program by IBM corporation, for implementing the
`automated tracking and protection of the display monitors.
`In this case,
`the software program is executed by the
`computer under an operating system such as Windows NT,
`Windows 95, or OS/2. The operating system and the soft-
`ware program each comprises computer readable instruc-
`tions which, in general, are tangibly embodied in or are
`readable from a media such as a system memory, data
`storage devices including hard disk drives, and/or a data
`communications device. When executed by the computer,
`the instructions cause the computer to perform steps asso-
`ciated with implementing the present invention. Thus, the
`automated tracking and protection of the display monitors
`may be implemented as a method, system, or an article of
`manufacture (a computer-readable media or device) using
`programming and/or engineering techniques to produce
`software, hardware, firmware, or any combination thereof.
`The present invention is implemented in personal com-
`puter and workstation systems (computers) as hereaftcr
`
`10
`
`20
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`described. A computer 10 embodying the system and
`method in accordance with the present invention is illus-
`trated in FIG. 1. The computer 10 typically has an associated
`display monitor 11, keyboard 12, mouse 14, and printer or
`plotter (not shown). The computer 10 is typically connected
`to a network of one type or another including Ethernet,
`Token Ring, ATM, or other mechanism used to transmit
`data.
`
`In the preferred embodiment the network is a local area
`network (LAN). A T.AN attachment
`is provided,
`for
`example, through hub 34 whichis connected to the computer
`10 via a cable 36, wherein effective communication may be
`established with other computers through links comprising
`electrically conductive connections and/or radiation links
`including fiber optic links and infrared links. The other
`computers may be physically remote from or, conversely,
`adjacent to computer 10. Each of the computers maybe a
`personal computer or workstation system in the form of a
`desktop, floor standing or portable computer. Alternatively,
`one or more of the computers may comprise a computer
`system which is different than the personal computer or
`workstation systemsin thatit is differently configured and/or
`it has different functional capabilities.
`A more detailed description of the computer 10 which
`embodies the system and method in accordance with the
`present invention is provided in conjunction with FIG. 2. As
`illustrated in FIG. 2, the computer 10 has a cover 15 which
`is a decorative outer memberthat cooperates with a chassis
`19 in defining an enclosed, shielded volume for receiving
`electrically powered data processing and storage compo-
`nents for processing and storing digital data. At least some
`of these components are mounted on a multilayer planar 20
`or motherboard which is mounted on the chassis 19. The
`multilayer planar 20 provides means for electrically inter-
`connecting the components of the computer 10 including
`those identified above and such other associated components
`as floppy disk drives, various formsof direct access storage
`devices, accessory adapter cards or boards, and the like.
`Provisions are made in the planar 20 for the passage of
`input/output signals to and from the components of the
`computer 10.
`The system 10 has a power supply 17, a power button 21,
`also herein referred to as switch 21. In the illustrated form,
`the chassis 19 defines a pair of upper bays 26, 28 and a lower
`bay 29. One of the upper bays 26 is adapted to receive
`peripheral drivesof a first size (such as those knownas 3.5
`inch drives) while the other 28 is adapted to receive drives
`of a differentsize (such as a CD ROM drive). The lower bay
`is adapted to receive another drive. One floppy disk drive is
`indicated at 27 in FIGS. 1 and 2, and is a removable medium
`direct access storage device (DASD) capable of receiving a
`diskette inserted there into and using the diskette to receive,
`store and deliver data as is generally known. One CD ROM
`drive is indicated at 30, both in FIGS. 1 and 2, and is a
`removable medium direct access storage device capable of
`receiving a compact disc inserted there into and using the
`disc to deliver data as is generally known. One hard disk
`drive is indicated at 31 in FIG. 2 and is a fixed medium direct
`access storage device (hard disk drive) capable of storing
`and delivering data as is generally known.
`The above described computer 10 of FIGS. 1 and 2 is
`described in further detail in conjunction with FIG. 3. FIG.
`3, illustrates a black diagram of a computer configured in
`accordance with the present invention such as the computer
`10 of FIGS. 1 and 2. The computer 10 includesthe planar 20
`for mounting components on the planar 20. The planar 20 is
`connected to input/output (I/O) cxpansion connectors and
`
`
`
`US 6,263,440 B1
`
`5
`other computer hardware such as the system central pro-
`cessing unit (CPU) or processor 40, which is further con-
`nected to a high speed CPU host bus 42.
`Connected to the high speed CPU host bus 42 are also a
`first system core logic chipset 44 and an L2 cache memory
`46. The first chipset 44 can be, for example, a Triton VX chip
`by Intel Corporation. Thefirst chipset 44 includes a memory
`control unit, a cache controller and a peripheral component
`interconnect (PCI) bridge. The cache controller is opera-
`tively coupled to the L2 cache memory 46. The memory
`control unit includes memory mapping logic for mapping
`CPU 40 addresses to particular address spaces in system
`memory 48. The memory control unit is coupled to the
`system memory 48.
`The system memory48 includes a random access memory
`(RAM). The system memory 48 mayalso include and one or
`more of dual in-line memory modules (DIMMs)and single
`in-line memory modules (SIMMs). The system memory 48
`may be further connected to a low speed serial bus such as
`an I7C bus or a System Management (SM) bus 64.
`The PCI bridge within the first chipset 44 provides an
`interface between the CPU host bus 42 which is used as a
`local bus and a PCI bus 50. Coupled to the PCI bus 50 is a
`second core chipset 52. The second chipset 52 can be, for
`example, a PITX4 chip by Intel Corporation. The second
`chipset 52 contains a bus control and timing unit, a plurality
`of timers, an interrupt controller, a direct access memory
`(DMA)unit, nonvolatile CMOS RAM, also herein referred
`to as NVRAM, a CMOSreal-time clock (RTC), an SM bus
`controller, a PCI/ISA bridge, flash memory interface, power
`managementlogic and an integrated drive electronics (IDE)
`controller.
`
`Attached to the flash memory interface in the second
`chipset 52 is a flash memory module or chip 66. Flash
`memory is in general a non-volatile memory that can be
`electrically erased and reprogrammed in the circuit. Flash
`memory does not require continuous power to retain its
`memory contents. Thus flash memoryis typically used as
`non-volatile storage for
`the BIOS (basic input/output
`system) and the instructions that start the computer.
`The NVRAM is used to store computer system configu-
`ration data. That is, the NVRAM will contain values which
`describe the present configuration of the computer including
`the types of components associated therewith, the amount of
`system memory, etc. These valucs are stored in NVRAM
`and updated whenevera special configuration program, such
`as configuration/setup, is executed.
`The RTC within the second chipset 52 is used for time of
`daycalculations within the computer system (hence, system
`RTC). In one embodiment, a logic 92 containsa duplicate of
`the system RTC. This duplicate RTC herein referred to as a
`tamper RTC contains a shadow of the system RTC but the
`tamper RTC can be stopped by a tamper event (such as
`removal of the computer cover).
`The power management logic within the second chipset
`52 manages switching between computer powerstates such
`as off, standby, sleep, suspend and normal operating states.
`The present invention will operate in any of these power
`states. Accordingly,
`the description that follows will be
`independent of powerstate.
`The PCI/ISA bridge within the second chipset 52 provides
`an interface between the PCI bus 50 and an optional feature
`or expansion bus such as the Industry Standard Architecture
`(ISA) bus 58. Coupled to the ISA bus 58 is a multi-function
`/O controller 68 such as the PC87307 by National Semi-
`conductor. The I/O controller 68 contains a varicty of I/O
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`adapters and other components suchas a diskette adapter 70,
`a serial adapter 72, a parallel adapter 74 and a keyboard
`controller 76. The diskette adapter 70 provides an interface
`to the diskette drive 27. The serial adapter 72 has an external
`port connector 82 [or attachmentof external devices such as
`a modem (not shown).
`‘The parallel adapter 74 has an
`external port connector 80 for attachment of external devices
`such as printers (not shown). The keyboard controller 76is
`the interface for the keyboard 12 and the mouse 14. Addi-
`tionally coupled to the ISA bus 58 are a plurality of ISA
`expansion connectors 60 for receiving ISA adapter cards
`(not shown).
`The IDE controller within the second chipset 52 interfaces
`with IDE compatible storage devices such as the hard disk
`drive 31 and CD-ROMdrive 30. However, one of ordinary
`skill in the art can readily recognize that the computer 10
`may alternatively be configured to support any hard disk
`drive(s) including either one or both of the IDE compatible
`and small computer system interface (SCSI) compatible
`hard disk drives.
`
`In addition to the second chipset 52, coupled to the PCI
`bus 50 are a plurality of PCI expansion connectors 54 for
`receiving PCI bus compatible peripheral cards. One such
`peripheral card is a display controller 56. The display
`controller 56 includes a display memory and is coupled to
`the display monitor or terminal 11. Preferably, the display
`monitor 11 is adaptable to the DDC protocol and is config-
`ured to provide the EDID and or VDIF data structures. That
`is, the EDID and VDIFare electronically readable from the
`respective display monitor.
`A LAN adapter or subsystem 94 can be coupledto either
`the PCI bus 50 or the ISA bus 58 for allowing the computer
`10 to communicate with the LAN via a connectionorlink 36
`to hub 34 (FIG. 1). The LAN adapter is supplied with
`auxiliary power (AUXS) from the power supply 17 when the
`system 10 is off. The LAN adapter can be, for example, the
`Auto Wake Token-Ring ISA Adapter by IBM corporation.
`Further, a planar SM Bus 64 is coupled to the PCT bus 50
`and the ISA bus 58 via the SM bus controller within the
`
`second chipset 52, The planar SM Bus 64 is an additional
`I/O bus in computer 10 andis used as a local bus to support
`slow speed peripheral devices. Logic 92 is coupled to SM
`bus 64.
`
`An RFID (Radio Frequency Identification) EEPROM 90
`is coupled to the SM Bus 64 and an RF interface. In a
`preferred embodiment,
`the RFID EEPROM 90 is a dual
`ported non-volatile memory element with both a digital
`serial (I°C) and an RFinterface. Hence,is it an RF-enabled
`LEPROM. The non-volatile memory provides storage for
`computer assets information such as components serial
`numberincluding the memory modules serial number 49
`and code revisions for
`the computer 10. The RFID
`EEPROM 90 can be updated through a digital interface that
`connects to the SM bus64 or through the RF interface which
`connects to an antenna 120 which providesthe RFlink to the
`RF reader.
`
`While the present invention is described hereinafter with
`particular reference to the block diagram of FIG. 3, it is to
`be understood that the system and method in accordance
`with the present invention may be used with other hardware
`configurations, including different planar board configura-
`tions. For example, the system processor 40 can be an Intel
`Pentium processor, Cyrix 586-P75 processor or Advanced
`Micro Devices 80486 processor or any other suitable pro-
`cessor.
`
`invention preferably
`the present
`As previously stated,
`uscs the EDID or VDIF for tracking and protection of
`
`
`
`7
`display monitors that conform with the DDC standard. The
`display monitor information (EDID or VDIF) is typically
`presented using defined management information format
`(DMTF)andit includes information such as a manufacturer
`indication, a model code, and an identity or serial number.
`Several DDC standard types exist as is well knowninthe art.
`(Information about the DDC standard may be found in the
`Display Data Channel Proposal document, Version 1p, Revi-
`sion 1-74p, dated Aug. 26, 1995, which is published by the
`Video Electronic Standards Association, San Jose, Calif.)
`Two DDCstandard types are DDC1 and DDC2. The
`DDC1standard defines a uni-directional display data chan-
`nel from the display monitor to the host computer which
`carries continuous transmission of the EDID information.
`
`US 6,263,440 B1
`
`8
`be suitably used in conjunction with the present invention
`without departing from the scope and spirit of the present
`invention.
`
`As illustrated in ['IG. 4, during the POST,it is determined
`whether the display controller card and display monitor
`conform with the DDC2B mode of the DDC standard (DDC
`standard) by, for example, executing an INTx10 function
`call, via step 400. It is noted that different operating systems
`may handle the system calls in a different way because
`different operating system have different device driver layers
`and file control mechanisms.
`
`10
`
`If it is determinedthateither the display controller card or
`the display monitor does not conform with the DDC
`standard, as when there is no valid response from either one
`15
`of them, then the process ends. If it is determined that both
`The DDC2 standard defines a bi-directional display data
`the display controller card and the display monitor conform
`channel based onaserial bus protocol such as the °C bus
`with the DDCstandard then a read EDID command(or read
`protocol. The data is synchronized with a clock signal and
`VDIF command)is issued in orderto retrieve the EDID (or
`typically the timing complies with the I°C busspecification.
`VDIF) information from the display monitor, via step 402.
`In a DDC2B mode of the DDC2 standard, the only trans-
`For example, in the preferred embodiment, an INT 0x10
`mission from the host computer to the display monitoris a
`function call is issued in order to read the 128-byte block of
`request for either the EDID or VDIF. Thatis, in the DDC2B
`the EDID or VDIF(hereafter collectively EDID) informa-
`mode the DDC2 standard produces a semi-bi-directional
`tion from the display monitor. The EDID information is
`display data channel, wherein the request for the EDID or
`successfully retrieved from the display monitor unless there
`VDIFis issued by the host computer and the EDID or VDIF
`is a hardwarefailure, in which case, the POST execution will
`are provided by the display monitor in response to the
`attend to this failure (not shown).
`request.
`Next, it is determined where the upper range of the system
`The present invention takes advantage of the fact that the
`memoryis located, that is, the highest 128 bytes are found
`EDID and VDIF are electronically readable from their
`into which the EDID data block is copied, via step 404. The
`respective display monitors in that it uses this information
`EDIDdata block is stored in a table format such as the MIF
`for tracking and reporting the display monitors identifica-
`tion. Hence,it should be understood that any monitor which
`is adaptable to the DDC or other standard that display
`monitor manufacturers implement and which provides its
`identification in an electronically readable form may be
`suitably used in conjunction with the system and method in
`accordance with the present
`invention.
`In the preferred
`embodiment, both the display monitor and the display
`controller conform with the DDC standard in the DDC2B
`mode.
`
`20
`
`25
`
`30
`
`35
`
`in order to retrieve the
`In the preferred embodiment,
`EDID and VDIF information a communication protocol is
`followed including the issuing of read commands. One
`sequence during which the communication protocol is fol-
`lowedis a power-up or system start-up sequence. After the
`computer has been powered on,
`the power-up sequence
`commences during which a Power On Self Test (POST) is
`performed. The POSTis executed every time the computer
`is powered on, and it cannot be disabled by the computer
`user. The POST preferably includes execution of a program
`code (POST code). The POST codeis preferably stored in
`the flash memory which typically is used for the BIOS.
`During execution of the POST, a process of retrieving the
`display monitor EDID (or VDIF) information is performed,
`wherein the EDID (or VDIF)
`is stored in the system
`memory. After the power-up sequence has ended and the
`operating system boot-up process has completed, the EDID
`information in the system memory is then used for the
`tracking and reporting of the display monitor identification.
`FIG. 4 is a flow diagram illustrating the process, in the
`preferred embodiment, of retrieving the EDID or VDIF
`information and using this information for the tracking and
`reporting of the display monitor identification. It should be
`understood that, even though the pro