Inventor(s)

HP INCFollow

Abstract

• When hardware is tampered with additional ‘spying’ components, local Electro‐magnetic (EM)

pattern will be disturbed/changed, and show a different pattern.

• The need for the detection of hardware tampering could be monitored and detected by this

method outlined, through the comparison to ‘ground state’ of local EM field and pattern

recognition, then notify administrator and/or end user.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 4.0 License.

Share

COinS