Theft Prevention Patents (Class 726/35)
  • Publication number: 20140075584
    Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 13, 2014
    Applicant: ABSOLUTE SOFTWARE CORPORATION
    Inventors: Fraser CAIN, Christian COTICHINI, Thanh Cam NGUYEN
  • Patent number: 8667306
    Abstract: In one embodiment, there is provided a mobile communications device comprising: a processor; a communications subsystem operable to exchange signals with a wireless network; a storage element having application modules and data stored thereon, the data comprising at least user application data associated with the application modules and service data including data for establishing communications with the wireless network; and a security module operable to detect policy messages received by the device, and to perform a security action if a first policy message to enforce a first data protection policy is received and a subsequent policy message to enforce a second data protection policy is not received within a predetermined duration from the time at which the first policy message is received; wherein the security action comprises erasing or encrypting at least some of the data on the storage element.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: March 4, 2014
    Assignee: BlackBerry Limited
    Inventors: Michael Stephen Brown, Neil Patrick Adams, Herbert Anthony Little, Steven Henry Fyke
  • Patent number: 8667610
    Abstract: A portable computer and a charging method thereof are provided. The portable computer includes a charge integrated circuit (IC), a basic input/output system (BIOS) and embedded controller (EC), a south bridge chip, a north bridge chip and a central processing unit (CPU). After the portable computer is connected to a battery, the BIOS and EC controls the south bridge chip to read a sealed security bit of the battery and checks whether the sealed security bit equals a default value. The BIOS and EC controls the south bridge chip to read a battery data of the battery if the sealed security bit equals default value. The BIOS and EC controls the charge IC via the south bridge chip to charge the battery according to the battery data. The CPU controls the south bridge chip and the north bridge chip.
    Type: Grant
    Filed: October 23, 2009
    Date of Patent: March 4, 2014
    Assignee: Quanta Computer Inc.
    Inventors: Pi-Chi Chen, Wei-Ting Yen, Cheng-Lu Lin
  • Patent number: 8639926
    Abstract: A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet from the MD to the NBS and multifactor authentication is performed based on the details and the policy. If the multifactor authentication is successful, access privileges are set for the MD for accessing the NBS and perhaps for accessing local resources of the MD.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: January 28, 2014
    Assignee: Novell, Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch
  • Publication number: 20140020123
    Abstract: A platform protected by an always-available security system to protect against platform loss and platform theft is described. The system comprises, in one embodiment, a pairing logic to pair the platform with an other device, the other device reached via a network connection, an interface to detect when the proximity to the other device is lost. The system further comprises, in one embodiment, the arming logic to arm the platform in response to the loss of proximity, and move the system to an armed mode, and a core logic to evaluate the risk behavior and determine whether a security action logic should take a security action.
    Type: Application
    Filed: December 22, 2011
    Publication date: January 16, 2014
    Inventors: Michael Berger, Shlomo Avital
  • Publication number: 20140020122
    Abstract: A platform including an always-available theft protection system is described. In one embodiment, the system comprises an arming logic to arm the platform, when an arming command is received, a risk behavior logic to detect a potential problem when the platform is armed, and a core logic component to provide logic to analyze the potential problem, and to move the platform to a suspecting mode, when the potential problem indicates a theft suspicion. The system, in one embodiment, further comprises configuration logic to configure settings for the system when the platform is in an unarmed mode, the configuration logic including a user logic enabling an authorized user to alter settings and an administrator logic enabling an administrator to alter the settings using an authenticated set request.
    Type: Application
    Filed: December 22, 2011
    Publication date: January 16, 2014
    Inventor: Michael Berger
  • Publication number: 20140013454
    Abstract: A system to provide an always-on embedded anti-theft protection for a platform is described. The system in one embodiment comprises an arming logic to move the platform to an armed mode when receiving an arming command, a disarming logic to move the platform to an unarmed mode when receiving a disarming command, the disarming logic active while the platform is in a low power state, and a power transition logic to move the system from the low power state to an ON state in response to a user request, the power transition logic to present a log-in screen when the platform is armed, and to move the platform to the ON state without a log-in screen when the platform is unarmed.
    Type: Application
    Filed: December 22, 2011
    Publication date: January 9, 2014
    Inventors: Michael Berger, Steven W. Deutsch
  • Patent number: 8623099
    Abstract: According to the present invention, there is provided a system for securing data with a storage system. The system includes at least one storage device. In addition, the system includes a security mechanism for recognizing an attempt to insert or remove the storage device. Moreover, the system includes a management unit to control the insertion and removal of the storage device.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: January 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Windsor Wee Sun Hsu, Shauchi Ong
  • Patent number: 8621657
    Abstract: The invention relates to an electronic system comprising a printed circuit contained in a package. The system comprises a protection device comprising conducting tracks carried by the printed circuit and each having a free end; a first integrated circuit connected to the conducting tracks and adapted for detecting a variation in the capacitance seen by each conducting track; and a second integrated circuit, optionally merged with the first integrated circuit, comprising a configurable memory for selecting certain of the conducting tracks. The second integrated circuit is adapted for determining that an authorized or unauthorized access has occurred on the basis of the detection of the variation of the capacitance seen by at least one of the selected conducting tracks.
    Type: Grant
    Filed: July 15, 2009
    Date of Patent: December 31, 2013
    Assignee: Compagnie Industrielle et Financiere d'Ingenierie “Ingenico”
    Inventor: Pierre Lacroix
  • Publication number: 20130326643
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location.
    Type: Application
    Filed: June 4, 2012
    Publication date: December 5, 2013
    Applicant: Apple Inc.
    Inventors: Raghu Pai, Karthik Narayanan, Megan M. Frost, Patrice Olivier Gautier, Usama Mikael Hajj
  • Publication number: 20130318639
    Abstract: A security device for functional display, security, and charging of a handheld electronic device is disclosed. The device comprises a universal clamping apparatus with an integrated alarm sensor and charging port to prevent theft of handheld electronic devices without hindering customer inspection thereof while providing charging of the battery of the devices.
    Type: Application
    Filed: February 8, 2012
    Publication date: November 28, 2013
    Applicant: SCORPION SECURITY PRODUCTS, INC.
    Inventor: Franklyn W. Gulick, JR.
  • Patent number: 8582137
    Abstract: A multifunction peripheral that can set appropriate criteria of security levels for another device, and improves usability while lowering a risk of data alteration, information leakage and the like by including a holding part 11 holding therein security criteria set for the image processing functions in one-to-one correspondence; a receiver 12 that receives, from an external terminal, a request for an access that is necessary for executing at least one of the image processing functions; an acquisition part 13 that acquires, from the external terminal, security information that is a security indicator regarding the access from the external terminal; a judgment part 15 that judges whether or not one of the security criteria set for the at least one of the image processing functions is met, based on the acquired security information; an access controller 16 that permits the access if the judgment part 15 judges affirmatively, and prohibits the access or permit the access with a limitation if the judgment part 15
    Type: Grant
    Filed: December 11, 2009
    Date of Patent: November 12, 2013
    Assignee: Konica Minolta Business Technologies, Inc.
    Inventors: Tomonari Yoshimura, Atsushi Ohshima, Masami Yamada, Masakazu Murakami
  • Patent number: 8566610
    Abstract: Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed.
    Type: Grant
    Filed: December 18, 2009
    Date of Patent: October 22, 2013
    Assignee: Intel Corporation
    Inventors: Mousumi Hazra, Gyan Prakash, Saurabh Dadu, Mojtaba Mirashrafi, Duncan Glendinning
  • Publication number: 20130276152
    Abstract: Described herein are apparatus, system, and method for protecting electronic devices through the creation of a virtual perimeter among the electronic devices. The virtual perimeter may be generated by the electronic devices themselves. The method performed by an electronic device comprises: identifying a current context; receiving a role, according to the current context, in a hierarchy of multiple electronic devices, and operating in accordance with the role in the hierarchy within a secure perimeter in the current context around the multiple electronic devices, wherein the hierarchy includes a system of security checks based on context information.
    Type: Application
    Filed: November 10, 2011
    Publication date: October 17, 2013
    Inventors: Dan F. Hirsch, Cristian F. Bullokles
  • Patent number: 8556991
    Abstract: Techniques for protecting resources of a client from theft or unauthorized access. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules operating in the BIOS of the client. The policy data describes one or more security policies which the client is to follow. In response to the client following at least one of the one or more security policies, a persistent storage medium of the client is locked by instructing a controller of the persistent storage medium to deny, to any entity, access to data stored on the persistent storage medium unless the entity supplies, to the controller, a recognized authentication credential. In this way, a malicious user without access to the recognized authentication credential cannot access the data stored on the persistent storage medium, even if the persistent storage medium is removed from the client.
    Type: Grant
    Filed: November 5, 2009
    Date of Patent: October 15, 2013
    Assignee: Absolute Software Corporation
    Inventors: Anahit Tarkhanyan, Ravi Gupta
  • Patent number: 8561138
    Abstract: In some embodiments, the invention involves protecting a platform using locality-based data and, more specifically, to using the locality-based data to ensure that the platform has not been stolen or subject to unauthorized access. In some embodiments, a second level of security, such as a key fob, badge or other source device having an identifying RFID is used for added security. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 31, 2008
    Date of Patent: October 15, 2013
    Assignee: Intel Corporation
    Inventors: Michael M. Rothman, Vincent Zimmer
  • Patent number: 8553885
    Abstract: A wireless personal area network (WPAN) system includes a plurality of WPAN devices using encrypted wireless communication therebetween when in an enabled state and not wirelessly communicating when in a disabled state. At least one of the WPAN devices includes a WPAN identity reader for reading at least one identifying parameter of a user, for confirming that the user is an authorized user based upon reading the at least one identifying parameter, and for wirelessly communicating with at least one other WPAN device to switch the at least one other WPAN device from the disabled state to the enabled state based upon confirming the user is an authorized user.
    Type: Grant
    Filed: January 27, 2005
    Date of Patent: October 8, 2013
    Assignee: BlackBerry Limited
    Inventors: Herbert A. Little, Scott D. Rose, Scott W. Totzke, Mihal Lazaridis
  • Patent number: 8551186
    Abstract: A user device determines that the user device has been stolen and generates an audible alert when the user device has been stolen.
    Type: Grant
    Filed: December 6, 2010
    Date of Patent: October 8, 2013
    Assignee: Amazon Technologies, Inc.
    Inventor: William Alexander Strand
  • Publication number: 20130263291
    Abstract: An apparatus and a method for protecting an electronic equipment from being stolen when using a protection unit adapted to communicate with a surveillance centre when it is detected that the electronic equipment has been stolen. A communication unit at the electronic equipment transmits control signals indicating whether the protection unit is working alright. A fault detector receives the control signals and indicates a fault when detecting that the protection unit is not working depending on the control signals. In that case, an operation control unit disables the electronic equipment in response to the indicated fault. Thereby, it is not attractive to steal the electronic equipment since it will be made more or less useless once it is detected that it has been stolen.
    Type: Application
    Filed: March 29, 2013
    Publication date: October 3, 2013
    Applicant: Telefonaktiebolaget L M Ericsson (publ)
    Inventor: Peter Öhman
  • Patent number: 8539590
    Abstract: When unauthorized use of a device is suspected, a recharging mechanism (e.g., recharge-circuit) of the device is disabled in order to guard against extended unauthorized use of the device. The recharging mechanism normally recharges the rechargeable-power-supply that powers the device. Consequently, normal use and enjoyment of the device can be significantly reduced by disabling the rechager. Moreover, for devices that are mainly powered by a rechargeable-power-supply (e.g., music-players, phones, Personal Digital Assistants), disabling the recharger effectively renders the device inoperable when the power of the main power-supply has run out. As such, disabling the recharger should serve as a deterrent to theft.
    Type: Grant
    Filed: December 20, 2005
    Date of Patent: September 17, 2013
    Assignee: Apple Inc.
    Inventors: Michael M. Lee, Jay F. Hamlin, Brian D. Lemker
  • Patent number: 8533776
    Abstract: A method and system for binding a device to a planar is disclosed. According to the preferred embodiment of the method and system of the present invention, a programmable memory chip is provided on the planar and the device is detachably attached to the planar. The method and system further includes using the programmable memory chip to bind the device to the planar. Through the aspects of the present invention, the programmable memory chip transmits a message associated with the planar to the device, which is programmed to receive the message associated with the planar. If the message received by the device is not the message associated with the planar, the device is disabled.
    Type: Grant
    Filed: September 14, 2001
    Date of Patent: September 10, 2013
    Assignee: Lenovo (Singapore) Pte Ltd.
    Inventors: Scott T. Elliott, James P. Hoff, Scott Long, James P. Ward
  • Patent number: 8529635
    Abstract: A system and method for securing and tracking an electronic device. The system includes hardware, software and firmware components that cooperate to allow tracking, disabling, and other interaction with the stolen electronic device. The system includes an application component, non-viewable component and Basic Input/Output Subsystem (BIOS) component that are present on the electronic device. The BIOS component maintains the secured environment of the application and non-viewable components. If only the application component was provided, a simple low level format of the hard disk drive would remove the application and bypass the security features. The system implements an “application and BIOS” based solution to electronic device security.
    Type: Grant
    Filed: July 11, 2006
    Date of Patent: September 10, 2013
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Patent number: 8531442
    Abstract: A display device is provided, and which includes a display panel; a gate and a source driving circuits, both coupled to the display panel, for driving the display panel; and a timing control circuit, coupled to the gate and the source driving circuits, for controlling the operations of the gate and the source driving circuits, wherein the timing control circuit comprises a personal identification circuit, and the personal identification circuit is used for receiving an input data; decoding a stored image to obtain decoded data; accumulating the decoded data to obtain an accumulated value; adding the accumulated value to the input data to obtain a compared value; setting the display device to operate normally and output images through the display panel when the compared value is identical to an initial value; and displaying a preset frame on the display panel when the compared value is different from the initial value.
    Type: Grant
    Filed: October 29, 2012
    Date of Patent: September 10, 2013
    Assignee: Au Optronics Corporation
    Inventor: I-Shu Lee
  • Patent number: 8523952
    Abstract: A protection method is used in a portable communication device. The protection method comprises the steps of generating a specific command, and storing the specific command into the portable communication device; the portable communication device waiting and receiving a message; determining whether the message received by the portable communication device comprises the specific command; and performing a protection mechanism for protecting the important information contained in the portable communication device when the message comprises the specific command.
    Type: Grant
    Filed: November 1, 2006
    Date of Patent: September 3, 2013
    Assignee: Acer Inc.
    Inventor: Jr-Rung Wei
  • Patent number: 8522343
    Abstract: A system and a method are disclosed for managing applications on a mobile computing device. A command message is received at the mobile computing device specifying a command and a target application. The command message may have been sent by a application provider server. The command may be a removal command, an enable command, or a disable command. A removal or disable command may be used to remove or disable a problematic target application. The specified command is performed on the target application.
    Type: Grant
    Filed: December 21, 2009
    Date of Patent: August 27, 2013
    Assignee: Palm, Inc.
    Inventor: Brian Hernacki
  • Patent number: 8516235
    Abstract: A system and method provide for integrating a Basic Input/Output System (BIOS) Read-Only-Memory (ROM) image. A method includes but is not limited to opening a BIOS modification application; opening a target BIOS binary image within the BIOS modification application; and adding an electronic security and tracking system and method (ESTSM) ROM image to the target BIOS binary image.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: August 20, 2013
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Patent number: 8506649
    Abstract: A system and method for securing and tracking an electronic device. The system includes hardware, software and firmware components that cooperate to allow tracking, disabling, and other interaction with the stolen electronic device. The system includes an application component, non-viewable component and Basic Input/Output Subsystem (BIOS) component that are present on the electronic device. The BIOS component maintains the secured environment of the application and non-viewable components. If only the application component was provided, a simple low level format of the hard disk drive would remove the application and bypass the security features. The system implements an “application and BIOS” based solution to electronic device security.
    Type: Grant
    Filed: July 11, 2006
    Date of Patent: August 13, 2013
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Patent number: 8499172
    Abstract: A system and method of recovering encoded information contained in a device by storing and retrieving at least part of the necessary decoding data by setting and measuring the physical characteristics of the device. Storage and recovery options include, but are not limited to, measurement of electronic or optical characteristics of electrically or optically conductive portions of the device using a range of measurement techniques that include, but are not limited to, time-domain reflectometry.
    Type: Grant
    Filed: April 12, 2012
    Date of Patent: July 30, 2013
    Assignee: Lockheed Martin Corp.
    Inventors: Patrick A. Nelson, Christian Adams
  • Patent number: 8489892
    Abstract: A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing.
    Type: Grant
    Filed: March 17, 2008
    Date of Patent: July 16, 2013
    Assignee: Thomson Licensing
    Inventors: Stephane Onno, Olivier Heen
  • Patent number: 8490200
    Abstract: A technique for identifying a user of a device includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger.
    Type: Grant
    Filed: March 25, 2008
    Date of Patent: July 16, 2013
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Rivera, David C. Challener, Rod D. Waltermann
  • Patent number: 8480761
    Abstract: A router comprises a local network interface and routing services. The router also includes a data exchanger interface that can be configured to connect to a data exchanger. A security enclosure is configured to cover the data exchanger when the data exchanger is connected to the data exchanger interface.
    Type: Grant
    Filed: November 30, 2010
    Date of Patent: July 9, 2013
    Assignee: Cradlepoint, Inc.
    Inventors: Steven Wood, David Alan Johnson
  • Patent number: 8453261
    Abstract: This microcircuit card includes means for detecting an attack on the card, command means (130) capable of charging a charge pump (120) capable of applying a programming voltage (UP) to command a write operation into a cell (110) of a nonvolatile memory when an attack is detected, and a capacitor (140) arranged so as to be supplied with power during normal operation and to supply said charge pump (120) with power only when an attack is detected. The card (100) being characterized in that said capacitor (140) also supplies power to the command means (130) when an attack is detected.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: May 28, 2013
    Assignee: Oberthur Technologies
    Inventors: Nicolas Morin, Christophe Giraud
  • Patent number: 8447991
    Abstract: A card authentication system. In one embodiment, the invention relates to a method for authenticating a data card having an intrinsic magnetic characteristic and recorded data on the data card, the method including reading information from the data card, the data card information including the intrinsic magnetic characteristic and the recorded data on the data card, encrypting the data card information, sending the encrypted data card information, receiving the encrypted data card information, decrypting a portion of the encrypted data card information, the portion including the intrinsic magnetic characteristic, generating a score indicative of a degree of correlation between the intrinsic magnetic characteristic of the data card information and a stored value, and determining an authenticity of the data card based at least in part on the score.
    Type: Grant
    Filed: November 6, 2007
    Date of Patent: May 21, 2013
    Assignees: Magtek, Inc., Washington Univ.
    Inventors: Annmarie D. Hart, Lawrence R. Meyers, Carlos Hernandez, Robert E. Morley, Jr., Edward J. Richter, Ronald S. Indeck
  • Patent number: 8443458
    Abstract: An object of the present invention is to provide a mechanism for tamper detection of electronic devices (110) in closed units which is robust and low cost. The object is achieved by a method in an electronic device (110) for detecting if a cover (100) enclosing the electronic device (110) has been opened. The cover (100) comprises an enclosing assembly (250) which is adapted to fasten the cover (100) into a closed position. The electronic (device 110) comprises a non volatile memory (120). The non volatile memory (120) comprises a stored reference signature associated to the enclosing assembly (250) when the cover (100) was fastened into a closed position. The method comprises the following steps: (Creating 1003) a signature associated to the enclosing assembly (250). Comparing (1004) the created signature with the reference signature. Detecting (1007) that the cover 100 has been opened when the comparing (1004) results in a difference.
    Type: Grant
    Filed: January 16, 2008
    Date of Patent: May 14, 2013
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventor: Dan Anders Lindqvist
  • Publication number: 20130117867
    Abstract: The robot in this invention can detect the fading or loss of wireless network signal as an indication of being removed from its working area and enter into alert mode. The purpose of robot entering into alert mode is to deter physical theft, e.g., by sounding an alarm, to protect confidential data loss, and to render the robot useless to an unauthorized person, reducing the incentives for theft.
    Type: Application
    Filed: September 30, 2012
    Publication date: May 9, 2013
    Inventor: Hei Tao Fung
  • Patent number: 8435310
    Abstract: An anti-counterfeiting electronic device includes a function component assigned with an identification code ID and a processor. The processor generates a random code K1 and transmits the random code K1 to the function component; the function component encrypts the random code K1 and the identification code ID to generate a key ID1. The processor further obtains the key ID1 from the function component and decrypts the key ID1 to generate an identification code ID2, and determines whether the identification code ID2 is the same as the ID and executes the system login command if the identification code ID2 is the same as the identification code ID. An anti-counterfeiting method is also provided.
    Type: Grant
    Filed: March 16, 2011
    Date of Patent: May 7, 2013
    Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.
    Inventors: Xiang Li, Sha-Sha Hu, Bo-Ching Lin, Hsien-Chung Shih
  • Patent number: 8438382
    Abstract: A centralized credential management system includes website credentials that are stored at a vault. The website credentials are encrypted based upon a key not available to the vault and are for authenticating a user to a third party website. Through a client, a user authenticates to the vault and retrieves the encrypted website credentials and parameters and code for properly injecting the credentials into a website authentication form. The website credentials are decrypted at the client and injected into the authentication form using the parameters and code.
    Type: Grant
    Filed: August 6, 2008
    Date of Patent: May 7, 2013
    Assignee: Symantec Corporation
    Inventors: Barry Ferg, Gary Krall, David M'Raihi, Nicolas Popp
  • Patent number: 8434158
    Abstract: Various embodiments of the present invention relates to systems, devices and methods of detecting tampering and preventing unauthorized access by incorporating programmability and randomness into a process of coupling, driving and sensing conductive wires that are arranged above sensitive areas in a secured system. Such a tampering detection system comprises a security mesh network, a random number generator, a security controller and a security monitor. The security mesh network includes a plurality of security elements made from the conductive wires. The security controller selects a subset of security elements, forms a security array, and generates a driving stimulus. The security monitor selects a SENSE node, monitors an output at the SENSE node, and generates a flag signal indicating the presence of a tampering attempt. Programmability and randomness are introduced to at least one of the system parameters including array configuration, driving stimulus, SENSE node, and detection mode via random numbers.
    Type: Grant
    Filed: August 29, 2011
    Date of Patent: April 30, 2013
    Assignee: Maxim Integrated Products, Inc.
    Inventors: Jianxin Ma, Sung Ung Kwak, Irfan Azam Chaudhry
  • Patent number: 8434144
    Abstract: A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and preferably by locating the valid hash value within a table of valid hash values indexed by the state information. Candidate authorization information is obtained from the user, and a candidate hash value is generated by applying a hashing algorithm to the candidate authorization information, the state information, or a combination of the candidate authorization information and state information. The candidate hash value and the valid hash value are then compared, and the microprocessor-based system is enabled if the candidate hash value matches the valid hash value.
    Type: Grant
    Filed: June 24, 2011
    Date of Patent: April 30, 2013
    Assignee: The Invention Science Fund I, LLC
    Inventors: W. Daniel Hillis, Bran Ferren
  • Patent number: 8429759
    Abstract: Methods and apparatus for theft management are described. In an embodiment an out-of-band notification is received, indicative of theft of a computing device. In response, a theft message is delivered to the computing device using a wireless wide area network. Other embodiments are also disclosed and claimed.
    Type: Grant
    Filed: March 31, 2009
    Date of Patent: April 23, 2013
    Assignee: Intel Corporation
    Inventor: Farid Adrangi
  • Patent number: 8424092
    Abstract: A battery pack includes at least one rechargeable battery configured to output power; a remaining battery capacity detection unit configured to detect a remaining battery capacity of the at least one rechargeable battery; and a cryptographic unit configured to output a response word in response to an external request word by encrypting the external request word based on a cryptographic algorithm with a common code key.
    Type: Grant
    Filed: September 8, 2011
    Date of Patent: April 16, 2013
    Assignees: Mitsumi Electric Co., Ltd., Sony Mobile Communications Japan, Inc.
    Inventors: Akira Ikeuchi, Itsuki Nakano, Kenichi Kasai, Katsuya Suzuki, Kuniharu Suzuki
  • Patent number: 8419806
    Abstract: A data protection system selectively deletes data from an electronic device when the device is reported as lost or stolen, or when another data protection triggering event occurs. Different data files may, for example, be treated differently depending on when such files were created. For example, data files that were created while the computing device was known to be in the owner's possession may be deleted, while data files created after the electronic device left the owner's possession may be left intact (since they may have been created by an innocent user). Data files created between these two points in time may be quarantined so that they later be restored, if appropriate.
    Type: Grant
    Filed: May 5, 2010
    Date of Patent: April 16, 2013
    Assignee: Absolute Software Corporation
    Inventor: Robert Chase
  • Patent number: 8423801
    Abstract: An electronic device including an external-memory-medium installing portion in which an external memory medium storing contents data, a display portion for displaying the contents data, a sound generating portion for generating a sound, a power-shut-down-requirement receiving portion for receiving a requirement for shutting-down a power supply to the electronic device, a monitoring portion for determining whether the external memory medium is installed in the external-memory-medium installing portion, a sound-generation commanding portion for commanding command the sound generating portion to generate an alarming sound when the monitoring portion has determined that the external memory medium is not installed in the external-memory-medium installing portion while the contents data are displayed, and a power supply control portion for inhibiting an operation to shut down the power supply to the electronic device when the power-shut-down-requirement receiving portion has received the requirement for shutting do
    Type: Grant
    Filed: January 19, 2010
    Date of Patent: April 16, 2013
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Hideto Matsumoto
  • Publication number: 20130091590
    Abstract: A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.
    Type: Application
    Filed: November 26, 2012
    Publication date: April 11, 2013
    Inventors: Jasmeet Chhabra, Gyan Prakash
  • Patent number: 8403998
    Abstract: A theft-deterrence process enabling a theft-deterrence server, remotely disposed from the processor based device, to deter or thwart theft of the processor based device, is disclosed herein. In various embodiments, the theft-deterrence process employs connection and network independent communication for at least one direction between the theft deterrence server and the processor based device.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: March 26, 2013
    Assignee: Intel Corporation
    Inventors: Mousumi M. Hazra, Gyan Prakash, Carol A. Bell, Selim Aissi
  • Patent number: 8397310
    Abstract: The present invention is an apparatus and method for associating electronic devices to portable containers. A smart container is a container used for transporting items while traveling and comprising electronic devices. The smart container may comprise at least one module bay configured for receiving a module and a controller comprising a processing device associated with a memory. The controller is electrically associated with the module bay and configured for sending and/or receiving data to/from an electronic device associated with the module bay. The controller may be either an integral component of the smart container or a controller module removably received by the smart container. The smart container further comprises a power source associated with a power bus. The power bus is electrically associated with at least one of (a) a module bay, and (b) the controller.
    Type: Grant
    Filed: October 11, 2005
    Date of Patent: March 12, 2013
    Inventors: Earl H. Parris, John Michael Kay
  • Patent number: 8391488
    Abstract: A data encryption and decryption system securely geoencrypts data using location-dependent navigation signals. To increase the entropy of the cryptographic key to guard against a brute-force attack, geoencryption is made to depend on largely time-independent characteristics of the navigation signals that are not easily spoofed, including the time difference of arrival, the envelope-to-cycle difference, the differential signal-to-noise, the signal envelope shape, and the directions of arrival of the navigation signal set.
    Type: Grant
    Filed: January 15, 2009
    Date of Patent: March 5, 2013
    Assignees: Geocodex LLC, Leland Stanford Junior University
    Inventors: Di Qiu, Sherman Lo, Per Enge, Logan Scott, Dan Boneh, Ron Karpf
  • Patent number: 8384412
    Abstract: A method distributes personalized circuits to one or more parties. The method distributes a generic circuit to each party, encrypts a unique personalization value using a secret encryption key, and transmits each encrypted personalization value to the corresponding party. Each party then stores the encrypted personalization value in their circuit. The stored encrypted personalization value allows a piece of software to be properly executed by the circuit. A semiconductor integrated circuit is arranged to execute a piece of software that inputs a personalization value as an input parameter. The circuit comprises a personalization memory arranged to store an encrypted personalization value; a key memory for storing a decryption key; a control unit comprising a cryptographic circuit arranged to decrypt the encrypted personalization value using the decryption key; and a processor arranged to receive the decrypted personalization value and execute the software using the decrypted personalization value.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: February 26, 2013
    Assignee: STMicroelectronics R&D Limited
    Inventor: Andrew Dellow
  • Patent number: 8379813
    Abstract: Method and apparatus for authorizing a calling card telephone call are described. In one example, a telephone calling card includes a planar body having a memory system, an input circuit, a controller, and a display. The memory system is configured to store key code information. The input circuit is configured to receive a personal identification number (PIN). The controller is configured to derive a key code from the key code information using the PIN. The display is configured to present the key code. The user may then use the key code for purposes of authorizing a call made using a calling card. The key code may change from time-to-time as the user uses the calling card. Since the user's PIN is not entered into a telephone by the user, the calling card is less susceptible to unauthorized and/or fraudulent use by third parties.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: February 19, 2013
    Assignee: Vonage Network LLC
    Inventors: Donald J. Weber, Daniel T. Smires
  • Publication number: 20130042329
    Abstract: An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device.
    Type: Application
    Filed: August 13, 2012
    Publication date: February 14, 2013
    Inventor: Jon Stevens