throbber
US006263440B1
`(10) Patent No.:
`a2) United States Patent
`US 6,263,440 B1
`
`Pruett et al. Jul. 17, 2001 (45) Date of Patent:
`
`
`(54) TRACKING AND PROTECTION OF DISPLAY
`MONITORS BY REPORTING THEIR
`IDENTITY
`
`Primary Examiner—Norman M. Wright
`(74) Attorney, Agent, or Firm—George E. Grosser; Joseph
`A. Sawyer, Jr.
`
`(57)
`
`ABSTRACT
`
`The present invention is directed toward a method, system
`and computer readable medium (the present invention) for
`reporting information related to a monitor attached to a
`computer which includes a system memory. The present
`invention includes electronically reading the information
`from the monitor and storing the monitor information in the
`system memory. The present
`invention further includes
`retrieving the monitor information from the system memory
`and providing the monitor information to a display via a
`browser. The monitor information comprises electronically
`readable information including its identity. One aspect of the
`present invention further includes comparing the monitor
`information with a corresponding last known information,
`wherein a mismatch indicates that the monitor has been
`changed. Another aspect of the present invention further
`includes copying the monitor information to a radio fre-
`quency (RF) enabled memory, wherein the monitor infor-
`mation can be logged utilizing an RF reader device. The RF
`reader device may be included in an RF gate and/or a hand
`held device. Computer systems with Radio Frequency Iden-
`5,377,269 * 12/1994 Heptig et al. cesses 380/25__tification (RFID) technology configured in accordance with
`. 364/514 R
`5,715,174 *
`2/1998 Cotichini et al
`the present invention enable automated electronic tracking
`
`
`5,787,174 *
`7/1998 Tuttle «0.0...
`w- 380/23
`of computer assets such as the monitors as they pass through
`9/1998 Cotichini et al.
`.
`395/200.3
`5,802,280 *
`the RF gate in or out of a portal. Computer systems with the
`
`4/1999 Woolley et al...
`- 340/539
`5,892,441 *
`RFID technology also enable the automated electronic track-
`8/1999 Ross «0
`wee 345/11
`5,943,029 *
`:
`:
`:
`340/539
`5.959.529 *
`9/1909 Kail, IV .
`ing of the monitors or other computer assets via the hand
`
`
`.. 395/186
`9/1999 Hwang......
`5,960,172 *
`held device. In either case, no direct contact with the monitor
`6,087,937 *
`7/2000 McCarthy .....
`.. 340/567
`is needed for the tracking and reporting.
`6,160,477 * 12/2000 Sandelmanet al... 340/506
`
`(75)
`
`Inventors: Gregory B. Pruett, Durham; Gregory
`W. Kilmer, Raleigh; Barry B. Khatri,
`Cary, all of NC (US)
`
`(73) Assignee:
`
`International Business Machines
`Corporation, Armonk, NY (US)
`
`(*) Notice:
`
`Subject to any disclaimer,the term ofthis
`patent is extended or adjusted under 35
`US.C, 154(b) by 0 days.
`
`(21) Appl. No.: 09/113,945
`(22)
`Filed:
`Jul. 10, 1998
`(51)
`Int. CW. GO6F 11/30; GO6E 7/04;
`G05B 23/02
`(52) US. Ch ce. 713/200; 340/825.11; 340/825.15;
`340/825.17; 340/825.32; 340/825.36
`(58) Field of Search oo...ees 713/200, 201,
`713/202; 340/825.11, 825.15, 825.17, 825.1,
`825.32, 825.36
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`* cited by examiner
`
`18 Claims, 4 Drawing Sheets
`
`404)
`
`
`RF-ENABLED MEMORY
`
`
`
`
`
`
`
`
`
`
`SYSTEMIS
`OPERATING SYSTEM
`POWERED ON
`SYSTEM READY FOR
`

`TRACKING
`TEST WHETHER
`
`400|VIDEO CARD AND | FIND THE EBDA, THEN|498
`MONITOR SUPPORT|
`|
`SCANS =OR THE
`
`DC2B
`i
`i
`EDID' SIGNATURE
`EDID S GNATURE
`RETRIEVE POINTER
`FOUNDIN EBDA
`t DDC28 SUPPORTED
`
`4o2|RETRIEVE EDID TO UPPER MEMORY|410
`NATA BLOCK FROM
`EDID BLOCK FROM
`MONITCR
`ACCESS TO READ
`EDID RETRIEVED
`THE PHYSICAL
`SUCCESSFULLY
`MEMORY BLOCK
`y
`REFERENCEDBY
`DETERMINE THE
`y THE PCINTER
`END OF PHYSICAL
`MEMORY, COPY THE
`; READ 128 BYTE EDID: BLOCK FROMHIGH
`
`
`128 BYTE EDID BLOCK
`ap
`EMORY AND
`1
`
`THERE, AND SAVE APOINTER TO THIS
`VERIFIESTHE=|”
`BLOCKIN THE EBDA
`CHECKSUM
`COPY SUCCESSFUL
`EDID GHEGKSUM

`y SAL
`PROTECTS THE EDID
`PARSE EDID DATA
`408) BLOCK AND OBTAINS|414BLOCK IN UPPER
`
`THERE FROM VIDEO
`MEMORY BY
`INDICATING THAT THIS.
`MONITORIDENTIFY
`AREA OF MEMORYIS
`RESERVED
`
`
`
`
`|
`VIDEO MONITOR
`AIG
`IDENTITY IS
`COMPARED AGAINST [7
`
`LAST KNOWN IDENTITY!
`MONITOR CHANGED
`IE LAST KNOWN AND
`CACHEECID DATA
`CURRENTIDENTITY
`TO BE REPORTED
`DO NOT MATCH
`
`420|VIABROWSERIN PROVIDE VISIBLE|41a
`SYSTEM MEMORY
`ALERT; COPY TO
`
`Google Exhibit 1038
`Google v. VirtaMove
`
`Google Exhibit 1038
`Google v. VirtaMove
`
`

`

`U.S. Patent
`
`Jul. 17, 2001
`
`US 6,263,440 B1 OOOOOUOUOU SL!
`
`Sheet 1 of 4
`
`FIG. 1
`
`

`

`U.S. Patent
`
`US 6,263,440 B1
`
`Jul. 17, 2001
`
`Sheet 2 of 4
`
`
`
`

`

`
`
`
`IOdASOHgxnyJaydepyayoegJajouogAiowayy
`
`ralUd|e[|e4edHod[aleeWOud34
`
`
`NV1oFolJajjosjUuoyayoey
`reeeZp
`
`
`[OspUODosSI9|[OIJUODYING‘JE|]04}U05JdruequU|
`on[aoeSa
`
`
`Mowe,e6pig
`
`
`euuajuy¥99L—"_siayjonuo0Dbl08eumdiayO/l
`
`
`uu0D‘dx¥SIJUSLUSDeBURBWJ8EMOdWVYHANO1H
`
`
`
`
`wuod“6x319d]|eoepaiulysel4‘Siow‘efpugWSI/IOd
`
`[Beg
`
`
`s9}OJUOD3QI‘e0eH9}U]sNgWS
`6‘‘
`
`||sueo[aonbereogfeUagUOd
`
`
`
`
`
`vi89aAaexsIq‘edwel
`
`
`
`pseoghaypaeoqheyo607|9%!pei06
`
`U.S. Patent
`
`Jul. 17, 2001
`
`Sheet 3 of 4
`
`US 6,263,440 BI
`
`OV
`
`JOSSs901q
`
`0g
`
`419}/OU]UO0
`
`bS
`
`yse|4
`
`
`
`99<a
`
`
`
`
`

`

`U.S. Patent
`
`Jul. 17, 2001
`
`Sheet 4 of 4
`
`US 6,263,440 B1
`
`DDC2B SUPPORTED
`
`OPERATING SYSTEM
`POWERED ON
`SYSTEM IS
`BOOTS.
`
`SYSTEM READY FOR
`
`
`TRACKING
`
`TEST WHETHER
`
`400|VIDEO CARD AND FIND THE EBDA, THEN;408
`
`MONITOR SUPPORT
`SCANS FOR THE
`
`DDC2B
`EDID' SIGNATURE
`
`
`EDID SIGNATURE
`
`FOUND IN EBDA
`
`
`RETRIEVE POINTER
`
`
`RETRIEVE EDID
`402
`410
`TO UPPER MEMORY
`
`
`DATA BLOCK FROM
`
`
`
`EDID BLOCK FROM
`MONITOR
`EBDA
`
`
`
`
` EDID RETRIEVED
`ACCESS TO READ
`SUCCESSFULLY
`THE PHYSICAL
`
`MEMORYBLOCK
`
`REFERENCED BY
`
`DETERMINE THE
`404
`THE POINTER
`END OF PHYSICAL
`
`
`
`MEMORY, COPY THE
`READ 128 BYTE EDID
`128 BYTE EDID BLOCK
`
`BLOCK FROM HIGH
`
`
`THERE, AND SAVE A
`POINTER TO THIS
`MEMORY AND
`412
`
`
`BLOCKIN THE EBDA
`VERIFIES THE
`
`
`
`CHECKSUM
`
`COPY SUCCESSFUL
`EDID CHECKSUM
`IS VALID
`
`
`
`406
`
`PROTECTS THE EDID
`BLOCK IN UPPER
`MEMORYBY
`INDICATING THAT THIS
`AREA OF MEMORYIS
`RESERVED
`
`PARSE EDID DATA
`BLOCK AND OBTAINS
`THERE FROM VIDEO
`MONITOR IDENTIFY
`
`VIDEO MONITOR
`IDENTITY IS
`COMPARED AGAINST
`LAST KNOWN IDENTITY
`
`MONITOR CHANGED
`
`
`
`
`IF LAST KNOWN AND
`
`
`CURRENTIDENTITY
`
`CACHE EDID DATA
`DO NOT MATCH
`
`TO BE REPORTED
`
`
`PROVIDE VISIBLE
`VIA BROWSER IN
`418
`420
`
`
`ALERT; COPY TO
`
`SYSTEM MEMORY
`
`
`RF-ENABLED MEMORY
`
`
`FIG. 4
`
`

`

`US 6,263,440 B1
`
`1
`TRACKING AND PROTECTION OF DISPLAY
`MONITORS BY REPORTING THEIR
`IDENTITY
`
`FIELD OF THE INVENTION
`
`The present invention relates to computcr systems asscts
`tracking and protection and more particularly to electronic
`tracking and protection of display monitors attached to
`computers.
`
`DESCRIPTION OF RELATED ART
`
`Personal computer and workstation systems (computers)
`are well known in the art. Computers include components
`such as hard disk drives, dual in line memories (DIMMs),
`single in-line memories (SIMMs), display monitors, central
`processing units (CPUs), and other components. Computers
`and their respective components, are highly valuable assets.
`At the same time, computers and computer componentsare
`easily portable and easily reconfigured. The more compact
`the computers and the computer components the easierit is
`to transport
`them. Moreover,
`the more conforming the
`computers and computer components are to indusiry stan-
`dards the easier it
`is to reconfigure the computers with
`exchanged or stolen components.
`Thus, assets management, misplacement and theft of
`computers and computer components present a major prab-
`lem. As a result, there exists an ever increasing need for
`improved computer assets management and protection such
`as security for computers against the unauthorized removal
`or theft of their components.
`In addition,
`today, computer networks (networks) are
`employed to provide increased computing power and effi-
`ciency to a plurality of computers which are located
`throughout a large area. Through the network, the plurality
`of computers are generally interlinked with each other and
`with a server system or a central processing center.
`However, the dissemination of the computers throughoutthe
`large area compounds the computer assets tracking and
`protection problem.
`Computers provided by IBM Corporation currently carry
`a tamper detection switch, which can detect when a com-
`puter cover has been removed and causes the computers to
`be functionally disabled on subsequent boots until the user
`successfully enters an appropriate password. This and other
`similar mechanisms adequately protects the overall com-
`puter system but does not deter theft of the components
`within the computer, nor does it provide meansfor tracking
`computer assets.
`Accordingly, a number of methods have been developed
`for guarding against the unauthorized removal of computer
`assets. One such method is the use of Electronic Article
`Surveillance (EAS) tags which are widely used in commer-
`cial markets for everything from clothing to Compact Disks.
`Whenan item with an EAStag is carried through a portal,
`the portal sounds an audible alarm to notify security of a
`tamper event. The EAS tags are attached or embedded in
`computer systems to provide a notification of when an asset
`is removed.
`
`Although usefulfor retail applications, EAS technologyis
`less effective for protecting corporate assets such as com-
`puters and computer components. Opportunities may exist
`for employees to defeat the technology by removing the
`tags, transferring components through a mail service, or
`reusing componentsin other computers within the building.
`It is therefore desirable to provide a system and method
`that provide clectronic tracking and protection of computer
`
`10
`
`20
`
`25
`
`30
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`assets. Particularly, obtaining and reporting information
`associated with display monitors is needed. The tracking and
`protection of computer assets should be automated and
`easily implemented in various computer systems environ-
`ments. ‘he present invention addresses such a need.
`
`SUMMARY OF THE INVENTION
`
`The present inventionis directed toward a method, system
`and computer readable medium (the present invention) for
`reporting information related to a monitor attached to a
`computer which includes a system memory. The present
`invention includes electronically reading the information
`from the monitor and storing the monitor information in the
`system memory. The present
`invention further includes
`retrieving the monitor information from the system memory
`and providing the monitor information for viewing via a
`browser. The monitor information comprises electronically
`readable information includingits identity.
`One aspect of the present
`invention further includes
`comparing the monitor information with a corresponding
`last known information, wherein a mismatch indicates that
`the monitor has been changed. Another aspect of the present
`invention further includes copying the monitor information
`to a radio frequency (RF) enabled memory, wherein the
`monitor information can be logged utilizing an RF reader
`means.
`
`The RF reader means may be included in an RF gate
`and/or a hand held device. Computer systems with Radio
`Frequency Identification (RFID) technology configured in
`accordance with the present
`invention enable automated
`electronic tracking of computer assets such as the monitors
`as they pass through the RF gate in or out of a portal.
`Computer systems with the RFID technology also enable the
`automated electronic tracking of the monitors or other
`computer assets via the hand held device. In either case, no
`direct contact with the monitor is neededfor the tracking and
`reporting.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 illustrates a computer embodying the system and
`method in accordance with the present invention which can
`be connected to a network through a hub.
`FIG. 2 is a more detailed description of the computer of
`FIG. 1 which embodies the system and method in accor-
`dance with the present invention.
`FIG. 3, illustrates a block diagram of a computer config-
`ured in accordance with the present invention such as the
`computer of FIGS. 1 and 2.
`FIG. 4 is a flow diagram illustrating the process, in the
`preferred embodiment, of retrieving the EDID or VDIF
`information and using this information for the tracking and
`reporting of the display monitor identification.
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`The present invention relates to computer systems assets
`tracking and protection and more particularly to electronic
`tracking and protection of display monitors attached to a
`computer. The following description is presented to cnable
`oneof ordinary skill in the art to make and use the invention
`and is provided in the context of a patent application and its
`requirements. Various modifications to the preferred
`embodimentwill be readily apparent to those skilled in the
`art and the generic principles herein may be applied to other
`embodiments. Thus, the present invention is not intended to
`
`

`

`US 6,263,440 B1
`
`3
`be limited to the embodiment shown but is to be accorded
`the widest scope consistent with the principles and features
`described herein.
`
`In accordance with the present invention, the system and
`method for an automated electronic tracking and protection
`of display monitors associated with a computer utilize
`display monitors identification for monitoring and reporting
`their presence. Display monitors specification may also be
`monitored and reported. Display monitors identification,
`also known asserialization information (serialization),
`includes information such as an identity or serial number.
`Preferably, for tracking and protection of display monitors
`that conform with the Display Data Channel (DDC)
`standard, the system and methodutilize the extended display
`identification (EDID) information that contains the display
`monitor identity and some specification or the video display
`identification format (VDIF) information that contains the
`full specification of the display monitor. The present inven-
`tion takes advantage of the fact that the display monitor
`information, in this case the EDID and VDIF information,is
`electronically readable from the display monitor in that it
`uses this information for tracking and reporting the display
`monitors identification. Hence, any monitor which is adapt-
`able to the DDC or other standard that display monitor
`manufacturers implement and which providesits identifica-
`tion in an electronically readable form may be suitably used
`in conjunction with the system and method in accordance
`with the present invention.
`The identification of display monitorsis preferably logged
`in a radio frequency (RF)-enabled EEPROM througha serial
`bus interface, and an RFreader obtains the identification
`through an RFlink to the RF-enabled EEPROM. Preferably,
`the identification is also logged for future reference in a
`computer file which holds the last known computer con-
`figuration data.
`Electronically retrieving and reporting of the identifica-
`tion of display monitors via a browser such as, in a preferred
`embodiment,
`a Desktop Management Interface (DMI)
`browser, and/or via the RI’ link to the RI’ reader, automates
`the tracking and protection of the display monitors. The RF
`reader can be included, for example, in RF gates installed in
`portal entryways or in hand held devices. Hence, there is no
`need for direct connection to the display monitors in order
`to provide the automated electronic tracking and protection
`thereof.
`
`In the preferred embodiment, the system and method in
`accordance with the present invention additionally utilize a
`software program such as,
`for example,
`the AssetCare
`software program by IBM corporation, for implementing the
`automated tracking and protection of the display monitors.
`In this case,
`the software program is executed by the
`computer under an operating system such as Windows NT,
`Windows 95, or OS/2. The operating system and the soft-
`ware program each comprises computer readable instruc-
`tions which, in general, are tangibly embodied in or are
`readable from a media such as a system memory, data
`storage devices including hard disk drives, and/or a data
`communications device. When executed by the computer,
`the instructions cause the computer to perform steps asso-
`ciated with implementing the present invention. Thus, the
`automated tracking and protection of the display monitors
`may be implemented as a method, system, or an article of
`manufacture (a computer-readable media or device) using
`programming and/or engineering techniques to produce
`software, hardware, firmware, or any combination thereof.
`The present invention is implemented in personal com-
`puter and workstation systems (computers) as hereaftcr
`
`10
`
`20
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`described. A computer 10 embodying the system and
`method in accordance with the present invention is illus-
`trated in FIG. 1. The computer 10 typically has an associated
`display monitor 11, keyboard 12, mouse 14, and printer or
`plotter (not shown). The computer 10 is typically connected
`to a network of one type or another including Ethernet,
`Token Ring, ATM, or other mechanism used to transmit
`data.
`
`In the preferred embodiment the network is a local area
`network (LAN). A T.AN attachment
`is provided,
`for
`example, through hub 34 whichis connected to the computer
`10 via a cable 36, wherein effective communication may be
`established with other computers through links comprising
`electrically conductive connections and/or radiation links
`including fiber optic links and infrared links. The other
`computers may be physically remote from or, conversely,
`adjacent to computer 10. Each of the computers maybe a
`personal computer or workstation system in the form of a
`desktop, floor standing or portable computer. Alternatively,
`one or more of the computers may comprise a computer
`system which is different than the personal computer or
`workstation systemsin thatit is differently configured and/or
`it has different functional capabilities.
`A more detailed description of the computer 10 which
`embodies the system and method in accordance with the
`present invention is provided in conjunction with FIG. 2. As
`illustrated in FIG. 2, the computer 10 has a cover 15 which
`is a decorative outer memberthat cooperates with a chassis
`19 in defining an enclosed, shielded volume for receiving
`electrically powered data processing and storage compo-
`nents for processing and storing digital data. At least some
`of these components are mounted on a multilayer planar 20
`or motherboard which is mounted on the chassis 19. The
`multilayer planar 20 provides means for electrically inter-
`connecting the components of the computer 10 including
`those identified above and such other associated components
`as floppy disk drives, various formsof direct access storage
`devices, accessory adapter cards or boards, and the like.
`Provisions are made in the planar 20 for the passage of
`input/output signals to and from the components of the
`computer 10.
`The system 10 has a power supply 17, a power button 21,
`also herein referred to as switch 21. In the illustrated form,
`the chassis 19 defines a pair of upper bays 26, 28 and a lower
`bay 29. One of the upper bays 26 is adapted to receive
`peripheral drivesof a first size (such as those knownas 3.5
`inch drives) while the other 28 is adapted to receive drives
`of a differentsize (such as a CD ROM drive). The lower bay
`is adapted to receive another drive. One floppy disk drive is
`indicated at 27 in FIGS. 1 and 2, and is a removable medium
`direct access storage device (DASD) capable of receiving a
`diskette inserted there into and using the diskette to receive,
`store and deliver data as is generally known. One CD ROM
`drive is indicated at 30, both in FIGS. 1 and 2, and is a
`removable medium direct access storage device capable of
`receiving a compact disc inserted there into and using the
`disc to deliver data as is generally known. One hard disk
`drive is indicated at 31 in FIG. 2 and is a fixed medium direct
`access storage device (hard disk drive) capable of storing
`and delivering data as is generally known.
`The above described computer 10 of FIGS. 1 and 2 is
`described in further detail in conjunction with FIG. 3. FIG.
`3, illustrates a black diagram of a computer configured in
`accordance with the present invention such as the computer
`10 of FIGS. 1 and 2. The computer 10 includesthe planar 20
`for mounting components on the planar 20. The planar 20 is
`connected to input/output (I/O) cxpansion connectors and
`
`

`

`US 6,263,440 B1
`
`5
`other computer hardware such as the system central pro-
`cessing unit (CPU) or processor 40, which is further con-
`nected to a high speed CPU host bus 42.
`Connected to the high speed CPU host bus 42 are also a
`first system core logic chipset 44 and an L2 cache memory
`46. The first chipset 44 can be, for example, a Triton VX chip
`by Intel Corporation. Thefirst chipset 44 includes a memory
`control unit, a cache controller and a peripheral component
`interconnect (PCI) bridge. The cache controller is opera-
`tively coupled to the L2 cache memory 46. The memory
`control unit includes memory mapping logic for mapping
`CPU 40 addresses to particular address spaces in system
`memory 48. The memory control unit is coupled to the
`system memory 48.
`The system memory48 includes a random access memory
`(RAM). The system memory 48 mayalso include and one or
`more of dual in-line memory modules (DIMMs)and single
`in-line memory modules (SIMMs). The system memory 48
`may be further connected to a low speed serial bus such as
`an I7C bus or a System Management (SM) bus 64.
`The PCI bridge within the first chipset 44 provides an
`interface between the CPU host bus 42 which is used as a
`local bus and a PCI bus 50. Coupled to the PCI bus 50 is a
`second core chipset 52. The second chipset 52 can be, for
`example, a PITX4 chip by Intel Corporation. The second
`chipset 52 contains a bus control and timing unit, a plurality
`of timers, an interrupt controller, a direct access memory
`(DMA)unit, nonvolatile CMOS RAM, also herein referred
`to as NVRAM, a CMOSreal-time clock (RTC), an SM bus
`controller, a PCI/ISA bridge, flash memory interface, power
`managementlogic and an integrated drive electronics (IDE)
`controller.
`
`Attached to the flash memory interface in the second
`chipset 52 is a flash memory module or chip 66. Flash
`memory is in general a non-volatile memory that can be
`electrically erased and reprogrammed in the circuit. Flash
`memory does not require continuous power to retain its
`memory contents. Thus flash memoryis typically used as
`non-volatile storage for
`the BIOS (basic input/output
`system) and the instructions that start the computer.
`The NVRAM is used to store computer system configu-
`ration data. That is, the NVRAM will contain values which
`describe the present configuration of the computer including
`the types of components associated therewith, the amount of
`system memory, etc. These valucs are stored in NVRAM
`and updated whenevera special configuration program, such
`as configuration/setup, is executed.
`The RTC within the second chipset 52 is used for time of
`daycalculations within the computer system (hence, system
`RTC). In one embodiment, a logic 92 containsa duplicate of
`the system RTC. This duplicate RTC herein referred to as a
`tamper RTC contains a shadow of the system RTC but the
`tamper RTC can be stopped by a tamper event (such as
`removal of the computer cover).
`The power management logic within the second chipset
`52 manages switching between computer powerstates such
`as off, standby, sleep, suspend and normal operating states.
`The present invention will operate in any of these power
`states. Accordingly,
`the description that follows will be
`independent of powerstate.
`The PCI/ISA bridge within the second chipset 52 provides
`an interface between the PCI bus 50 and an optional feature
`or expansion bus such as the Industry Standard Architecture
`(ISA) bus 58. Coupled to the ISA bus 58 is a multi-function
`/O controller 68 such as the PC87307 by National Semi-
`conductor. The I/O controller 68 contains a varicty of I/O
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`adapters and other components suchas a diskette adapter 70,
`a serial adapter 72, a parallel adapter 74 and a keyboard
`controller 76. The diskette adapter 70 provides an interface
`to the diskette drive 27. The serial adapter 72 has an external
`port connector 82 [or attachmentof external devices such as
`a modem (not shown).
`‘The parallel adapter 74 has an
`external port connector 80 for attachment of external devices
`such as printers (not shown). The keyboard controller 76is
`the interface for the keyboard 12 and the mouse 14. Addi-
`tionally coupled to the ISA bus 58 are a plurality of ISA
`expansion connectors 60 for receiving ISA adapter cards
`(not shown).
`The IDE controller within the second chipset 52 interfaces
`with IDE compatible storage devices such as the hard disk
`drive 31 and CD-ROMdrive 30. However, one of ordinary
`skill in the art can readily recognize that the computer 10
`may alternatively be configured to support any hard disk
`drive(s) including either one or both of the IDE compatible
`and small computer system interface (SCSI) compatible
`hard disk drives.
`
`In addition to the second chipset 52, coupled to the PCI
`bus 50 are a plurality of PCI expansion connectors 54 for
`receiving PCI bus compatible peripheral cards. One such
`peripheral card is a display controller 56. The display
`controller 56 includes a display memory and is coupled to
`the display monitor or terminal 11. Preferably, the display
`monitor 11 is adaptable to the DDC protocol and is config-
`ured to provide the EDID and or VDIF data structures. That
`is, the EDID and VDIFare electronically readable from the
`respective display monitor.
`A LAN adapter or subsystem 94 can be coupledto either
`the PCI bus 50 or the ISA bus 58 for allowing the computer
`10 to communicate with the LAN via a connectionorlink 36
`to hub 34 (FIG. 1). The LAN adapter is supplied with
`auxiliary power (AUXS) from the power supply 17 when the
`system 10 is off. The LAN adapter can be, for example, the
`Auto Wake Token-Ring ISA Adapter by IBM corporation.
`Further, a planar SM Bus 64 is coupled to the PCT bus 50
`and the ISA bus 58 via the SM bus controller within the
`
`second chipset 52, The planar SM Bus 64 is an additional
`I/O bus in computer 10 andis used as a local bus to support
`slow speed peripheral devices. Logic 92 is coupled to SM
`bus 64.
`
`An RFID (Radio Frequency Identification) EEPROM 90
`is coupled to the SM Bus 64 and an RF interface. In a
`preferred embodiment,
`the RFID EEPROM 90 is a dual
`ported non-volatile memory element with both a digital
`serial (I°C) and an RFinterface. Hence,is it an RF-enabled
`LEPROM. The non-volatile memory provides storage for
`computer assets information such as components serial
`numberincluding the memory modules serial number 49
`and code revisions for
`the computer 10. The RFID
`EEPROM 90 can be updated through a digital interface that
`connects to the SM bus64 or through the RF interface which
`connects to an antenna 120 which providesthe RFlink to the
`RF reader.
`
`While the present invention is described hereinafter with
`particular reference to the block diagram of FIG. 3, it is to
`be understood that the system and method in accordance
`with the present invention may be used with other hardware
`configurations, including different planar board configura-
`tions. For example, the system processor 40 can be an Intel
`Pentium processor, Cyrix 586-P75 processor or Advanced
`Micro Devices 80486 processor or any other suitable pro-
`cessor.
`
`invention preferably
`the present
`As previously stated,
`uscs the EDID or VDIF for tracking and protection of
`
`

`

`7
`display monitors that conform with the DDC standard. The
`display monitor information (EDID or VDIF) is typically
`presented using defined management information format
`(DMTF)andit includes information such as a manufacturer
`indication, a model code, and an identity or serial number.
`Several DDC standard types exist as is well knowninthe art.
`(Information about the DDC standard may be found in the
`Display Data Channel Proposal document, Version 1p, Revi-
`sion 1-74p, dated Aug. 26, 1995, which is published by the
`Video Electronic Standards Association, San Jose, Calif.)
`Two DDCstandard types are DDC1 and DDC2. The
`DDC1standard defines a uni-directional display data chan-
`nel from the display monitor to the host computer which
`carries continuous transmission of the EDID information.
`
`US 6,263,440 B1
`
`8
`be suitably used in conjunction with the present invention
`without departing from the scope and spirit of the present
`invention.
`
`As illustrated in ['IG. 4, during the POST,it is determined
`whether the display controller card and display monitor
`conform with the DDC2B mode of the DDC standard (DDC
`standard) by, for example, executing an INTx10 function
`call, via step 400. It is noted that different operating systems
`may handle the system calls in a different way because
`different operating system have different device driver layers
`and file control mechanisms.
`
`10
`
`If it is determinedthateither the display controller card or
`the display monitor does not conform with the DDC
`standard, as when there is no valid response from either one
`15
`of them, then the process ends. If it is determined that both
`The DDC2 standard defines a bi-directional display data
`the display controller card and the display monitor conform
`channel based onaserial bus protocol such as the °C bus
`with the DDCstandard then a read EDID command(or read
`protocol. The data is synchronized with a clock signal and
`VDIF command)is issued in orderto retrieve the EDID (or
`typically the timing complies with the I°C busspecification.
`VDIF) information from the display monitor, via step 402.
`In a DDC2B mode of the DDC2 standard, the only trans-
`For example, in the preferred embodiment, an INT 0x10
`mission from the host computer to the display monitoris a
`function call is issued in order to read the 128-byte block of
`request for either the EDID or VDIF. Thatis, in the DDC2B
`the EDID or VDIF(hereafter collectively EDID) informa-
`mode the DDC2 standard produces a semi-bi-directional
`tion from the display monitor. The EDID information is
`display data channel, wherein the request for the EDID or
`successfully retrieved from the display monitor unless there
`VDIFis issued by the host computer and the EDID or VDIF
`is a hardwarefailure, in which case, the POST execution will
`are provided by the display monitor in response to the
`attend to this failure (not shown).
`request.
`Next, it is determined where the upper range of the system
`The present invention takes advantage of the fact that the
`memoryis located, that is, the highest 128 bytes are found
`EDID and VDIF are electronically readable from their
`into which the EDID data block is copied, via step 404. The
`respective display monitors in that it uses this information
`EDIDdata block is stored in a table format such as the MIF
`for tracking and reporting the display monitors identifica-
`tion. Hence,it should be understood that any monitor which
`is adaptable to the DDC or other standard that display
`monitor manufacturers implement and which provides its
`identification in an electronically readable form may be
`suitably used in conjunction with the system and method in
`accordance with the present
`invention.
`In the preferred
`embodiment, both the display monitor and the display
`controller conform with the DDC standard in the DDC2B
`mode.
`
`20
`
`25
`
`30
`
`35
`
`in order to retrieve the
`In the preferred embodiment,
`EDID and VDIF information a communication protocol is
`followed including the issuing of read commands. One
`sequence during which the communication protocol is fol-
`lowedis a power-up or system start-up sequence. After the
`computer has been powered on,
`the power-up sequence
`commences during which a Power On Self Test (POST) is
`performed. The POSTis executed every time the computer
`is powered on, and it cannot be disabled by the computer
`user. The POST preferably includes execution of a program
`code (POST code). The POST codeis preferably stored in
`the flash memory which typically is used for the BIOS.
`During execution of the POST, a process of retrieving the
`display monitor EDID (or VDIF) information is performed,
`wherein the EDID (or VDIF)
`is stored in the system
`memory. After the power-up sequence has ended and the
`operating system boot-up process has completed, the EDID
`information in the system memory is then used for the
`tracking and reporting of the display monitor identification.
`FIG. 4 is a flow diagram illustrating the process, in the
`preferred embodiment, of retrieving the EDID or VDIF
`information and using this information for the tracking and
`reporting of the display monitor identification. It should be
`understood that, even though the pro

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket