Theft Prevention Patents (Class 726/35)
-
Publication number: 20140075584Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.Type: ApplicationFiled: August 30, 2013Publication date: March 13, 2014Applicant: ABSOLUTE SOFTWARE CORPORATIONInventors: Fraser CAIN, Christian COTICHINI, Thanh Cam NGUYEN
-
Patent number: 8667306Abstract: In one embodiment, there is provided a mobile communications device comprising: a processor; a communications subsystem operable to exchange signals with a wireless network; a storage element having application modules and data stored thereon, the data comprising at least user application data associated with the application modules and service data including data for establishing communications with the wireless network; and a security module operable to detect policy messages received by the device, and to perform a security action if a first policy message to enforce a first data protection policy is received and a subsequent policy message to enforce a second data protection policy is not received within a predetermined duration from the time at which the first policy message is received; wherein the security action comprises erasing or encrypting at least some of the data on the storage element.Type: GrantFiled: February 28, 2012Date of Patent: March 4, 2014Assignee: BlackBerry LimitedInventors: Michael Stephen Brown, Neil Patrick Adams, Herbert Anthony Little, Steven Henry Fyke
-
Patent number: 8667610Abstract: A portable computer and a charging method thereof are provided. The portable computer includes a charge integrated circuit (IC), a basic input/output system (BIOS) and embedded controller (EC), a south bridge chip, a north bridge chip and a central processing unit (CPU). After the portable computer is connected to a battery, the BIOS and EC controls the south bridge chip to read a sealed security bit of the battery and checks whether the sealed security bit equals a default value. The BIOS and EC controls the south bridge chip to read a battery data of the battery if the sealed security bit equals default value. The BIOS and EC controls the charge IC via the south bridge chip to charge the battery according to the battery data. The CPU controls the south bridge chip and the north bridge chip.Type: GrantFiled: October 23, 2009Date of Patent: March 4, 2014Assignee: Quanta Computer Inc.Inventors: Pi-Chi Chen, Wei-Ting Yen, Cheng-Lu Lin
-
Patent number: 8639926Abstract: A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet from the MD to the NBS and multifactor authentication is performed based on the details and the policy. If the multifactor authentication is successful, access privileges are set for the MD for accessing the NBS and perhaps for accessing local resources of the MD.Type: GrantFiled: October 29, 2010Date of Patent: January 28, 2014Assignee: Novell, Inc.Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch
-
Publication number: 20140020123Abstract: A platform protected by an always-available security system to protect against platform loss and platform theft is described. The system comprises, in one embodiment, a pairing logic to pair the platform with an other device, the other device reached via a network connection, an interface to detect when the proximity to the other device is lost. The system further comprises, in one embodiment, the arming logic to arm the platform in response to the loss of proximity, and move the system to an armed mode, and a core logic to evaluate the risk behavior and determine whether a security action logic should take a security action.Type: ApplicationFiled: December 22, 2011Publication date: January 16, 2014Inventors: Michael Berger, Shlomo Avital
-
Publication number: 20140020122Abstract: A platform including an always-available theft protection system is described. In one embodiment, the system comprises an arming logic to arm the platform, when an arming command is received, a risk behavior logic to detect a potential problem when the platform is armed, and a core logic component to provide logic to analyze the potential problem, and to move the platform to a suspecting mode, when the potential problem indicates a theft suspicion. The system, in one embodiment, further comprises configuration logic to configure settings for the system when the platform is in an unarmed mode, the configuration logic including a user logic enabling an authorized user to alter settings and an administrator logic enabling an administrator to alter the settings using an authenticated set request.Type: ApplicationFiled: December 22, 2011Publication date: January 16, 2014Inventor: Michael Berger
-
Publication number: 20140013454Abstract: A system to provide an always-on embedded anti-theft protection for a platform is described. The system in one embodiment comprises an arming logic to move the platform to an armed mode when receiving an arming command, a disarming logic to move the platform to an unarmed mode when receiving a disarming command, the disarming logic active while the platform is in a low power state, and a power transition logic to move the system from the low power state to an ON state in response to a user request, the power transition logic to present a log-in screen when the platform is armed, and to move the platform to the ON state without a log-in screen when the platform is unarmed.Type: ApplicationFiled: December 22, 2011Publication date: January 9, 2014Inventors: Michael Berger, Steven W. Deutsch
-
Patent number: 8623099Abstract: According to the present invention, there is provided a system for securing data with a storage system. The system includes at least one storage device. In addition, the system includes a security mechanism for recognizing an attempt to insert or remove the storage device. Moreover, the system includes a management unit to control the insertion and removal of the storage device.Type: GrantFiled: May 30, 2008Date of Patent: January 7, 2014Assignee: International Business Machines CorporationInventors: Windsor Wee Sun Hsu, Shauchi Ong
-
Patent number: 8621657Abstract: The invention relates to an electronic system comprising a printed circuit contained in a package. The system comprises a protection device comprising conducting tracks carried by the printed circuit and each having a free end; a first integrated circuit connected to the conducting tracks and adapted for detecting a variation in the capacitance seen by each conducting track; and a second integrated circuit, optionally merged with the first integrated circuit, comprising a configurable memory for selecting certain of the conducting tracks. The second integrated circuit is adapted for determining that an authorized or unauthorized access has occurred on the basis of the detection of the variation of the capacitance seen by at least one of the selected conducting tracks.Type: GrantFiled: July 15, 2009Date of Patent: December 31, 2013Assignee: Compagnie Industrielle et Financiere d'Ingenierie “Ingenico”Inventor: Pierre Lacroix
-
Publication number: 20130326643Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location.Type: ApplicationFiled: June 4, 2012Publication date: December 5, 2013Applicant: Apple Inc.Inventors: Raghu Pai, Karthik Narayanan, Megan M. Frost, Patrice Olivier Gautier, Usama Mikael Hajj
-
Publication number: 20130318639Abstract: A security device for functional display, security, and charging of a handheld electronic device is disclosed. The device comprises a universal clamping apparatus with an integrated alarm sensor and charging port to prevent theft of handheld electronic devices without hindering customer inspection thereof while providing charging of the battery of the devices.Type: ApplicationFiled: February 8, 2012Publication date: November 28, 2013Applicant: SCORPION SECURITY PRODUCTS, INC.Inventor: Franklyn W. Gulick, JR.
-
Patent number: 8582137Abstract: A multifunction peripheral that can set appropriate criteria of security levels for another device, and improves usability while lowering a risk of data alteration, information leakage and the like by including a holding part 11 holding therein security criteria set for the image processing functions in one-to-one correspondence; a receiver 12 that receives, from an external terminal, a request for an access that is necessary for executing at least one of the image processing functions; an acquisition part 13 that acquires, from the external terminal, security information that is a security indicator regarding the access from the external terminal; a judgment part 15 that judges whether or not one of the security criteria set for the at least one of the image processing functions is met, based on the acquired security information; an access controller 16 that permits the access if the judgment part 15 judges affirmatively, and prohibits the access or permit the access with a limitation if the judgment part 15Type: GrantFiled: December 11, 2009Date of Patent: November 12, 2013Assignee: Konica Minolta Business Technologies, Inc.Inventors: Tomonari Yoshimura, Atsushi Ohshima, Masami Yamada, Masakazu Murakami
-
Patent number: 8566610Abstract: Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed.Type: GrantFiled: December 18, 2009Date of Patent: October 22, 2013Assignee: Intel CorporationInventors: Mousumi Hazra, Gyan Prakash, Saurabh Dadu, Mojtaba Mirashrafi, Duncan Glendinning
-
Publication number: 20130276152Abstract: Described herein are apparatus, system, and method for protecting electronic devices through the creation of a virtual perimeter among the electronic devices. The virtual perimeter may be generated by the electronic devices themselves. The method performed by an electronic device comprises: identifying a current context; receiving a role, according to the current context, in a hierarchy of multiple electronic devices, and operating in accordance with the role in the hierarchy within a secure perimeter in the current context around the multiple electronic devices, wherein the hierarchy includes a system of security checks based on context information.Type: ApplicationFiled: November 10, 2011Publication date: October 17, 2013Inventors: Dan F. Hirsch, Cristian F. Bullokles
-
Patent number: 8556991Abstract: Techniques for protecting resources of a client from theft or unauthorized access. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules operating in the BIOS of the client. The policy data describes one or more security policies which the client is to follow. In response to the client following at least one of the one or more security policies, a persistent storage medium of the client is locked by instructing a controller of the persistent storage medium to deny, to any entity, access to data stored on the persistent storage medium unless the entity supplies, to the controller, a recognized authentication credential. In this way, a malicious user without access to the recognized authentication credential cannot access the data stored on the persistent storage medium, even if the persistent storage medium is removed from the client.Type: GrantFiled: November 5, 2009Date of Patent: October 15, 2013Assignee: Absolute Software CorporationInventors: Anahit Tarkhanyan, Ravi Gupta
-
Patent number: 8561138Abstract: In some embodiments, the invention involves protecting a platform using locality-based data and, more specifically, to using the locality-based data to ensure that the platform has not been stolen or subject to unauthorized access. In some embodiments, a second level of security, such as a key fob, badge or other source device having an identifying RFID is used for added security. Other embodiments are described and claimed.Type: GrantFiled: December 31, 2008Date of Patent: October 15, 2013Assignee: Intel CorporationInventors: Michael M. Rothman, Vincent Zimmer
-
Patent number: 8553885Abstract: A wireless personal area network (WPAN) system includes a plurality of WPAN devices using encrypted wireless communication therebetween when in an enabled state and not wirelessly communicating when in a disabled state. At least one of the WPAN devices includes a WPAN identity reader for reading at least one identifying parameter of a user, for confirming that the user is an authorized user based upon reading the at least one identifying parameter, and for wirelessly communicating with at least one other WPAN device to switch the at least one other WPAN device from the disabled state to the enabled state based upon confirming the user is an authorized user.Type: GrantFiled: January 27, 2005Date of Patent: October 8, 2013Assignee: BlackBerry LimitedInventors: Herbert A. Little, Scott D. Rose, Scott W. Totzke, Mihal Lazaridis
-
Patent number: 8551186Abstract: A user device determines that the user device has been stolen and generates an audible alert when the user device has been stolen.Type: GrantFiled: December 6, 2010Date of Patent: October 8, 2013Assignee: Amazon Technologies, Inc.Inventor: William Alexander Strand
-
Publication number: 20130263291Abstract: An apparatus and a method for protecting an electronic equipment from being stolen when using a protection unit adapted to communicate with a surveillance centre when it is detected that the electronic equipment has been stolen. A communication unit at the electronic equipment transmits control signals indicating whether the protection unit is working alright. A fault detector receives the control signals and indicates a fault when detecting that the protection unit is not working depending on the control signals. In that case, an operation control unit disables the electronic equipment in response to the indicated fault. Thereby, it is not attractive to steal the electronic equipment since it will be made more or less useless once it is detected that it has been stolen.Type: ApplicationFiled: March 29, 2013Publication date: October 3, 2013Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventor: Peter Öhman
-
Patent number: 8539590Abstract: When unauthorized use of a device is suspected, a recharging mechanism (e.g., recharge-circuit) of the device is disabled in order to guard against extended unauthorized use of the device. The recharging mechanism normally recharges the rechargeable-power-supply that powers the device. Consequently, normal use and enjoyment of the device can be significantly reduced by disabling the rechager. Moreover, for devices that are mainly powered by a rechargeable-power-supply (e.g., music-players, phones, Personal Digital Assistants), disabling the recharger effectively renders the device inoperable when the power of the main power-supply has run out. As such, disabling the recharger should serve as a deterrent to theft.Type: GrantFiled: December 20, 2005Date of Patent: September 17, 2013Assignee: Apple Inc.Inventors: Michael M. Lee, Jay F. Hamlin, Brian D. Lemker
-
Patent number: 8533776Abstract: A method and system for binding a device to a planar is disclosed. According to the preferred embodiment of the method and system of the present invention, a programmable memory chip is provided on the planar and the device is detachably attached to the planar. The method and system further includes using the programmable memory chip to bind the device to the planar. Through the aspects of the present invention, the programmable memory chip transmits a message associated with the planar to the device, which is programmed to receive the message associated with the planar. If the message received by the device is not the message associated with the planar, the device is disabled.Type: GrantFiled: September 14, 2001Date of Patent: September 10, 2013Assignee: Lenovo (Singapore) Pte Ltd.Inventors: Scott T. Elliott, James P. Hoff, Scott Long, James P. Ward
-
Patent number: 8529635Abstract: A system and method for securing and tracking an electronic device. The system includes hardware, software and firmware components that cooperate to allow tracking, disabling, and other interaction with the stolen electronic device. The system includes an application component, non-viewable component and Basic Input/Output Subsystem (BIOS) component that are present on the electronic device. The BIOS component maintains the secured environment of the application and non-viewable components. If only the application component was provided, a simple low level format of the hard disk drive would remove the application and bypass the security features. The system implements an “application and BIOS” based solution to electronic device security.Type: GrantFiled: July 11, 2006Date of Patent: September 10, 2013Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Patent number: 8531442Abstract: A display device is provided, and which includes a display panel; a gate and a source driving circuits, both coupled to the display panel, for driving the display panel; and a timing control circuit, coupled to the gate and the source driving circuits, for controlling the operations of the gate and the source driving circuits, wherein the timing control circuit comprises a personal identification circuit, and the personal identification circuit is used for receiving an input data; decoding a stored image to obtain decoded data; accumulating the decoded data to obtain an accumulated value; adding the accumulated value to the input data to obtain a compared value; setting the display device to operate normally and output images through the display panel when the compared value is identical to an initial value; and displaying a preset frame on the display panel when the compared value is different from the initial value.Type: GrantFiled: October 29, 2012Date of Patent: September 10, 2013Assignee: Au Optronics CorporationInventor: I-Shu Lee
-
Patent number: 8523952Abstract: A protection method is used in a portable communication device. The protection method comprises the steps of generating a specific command, and storing the specific command into the portable communication device; the portable communication device waiting and receiving a message; determining whether the message received by the portable communication device comprises the specific command; and performing a protection mechanism for protecting the important information contained in the portable communication device when the message comprises the specific command.Type: GrantFiled: November 1, 2006Date of Patent: September 3, 2013Assignee: Acer Inc.Inventor: Jr-Rung Wei
-
Patent number: 8522343Abstract: A system and a method are disclosed for managing applications on a mobile computing device. A command message is received at the mobile computing device specifying a command and a target application. The command message may have been sent by a application provider server. The command may be a removal command, an enable command, or a disable command. A removal or disable command may be used to remove or disable a problematic target application. The specified command is performed on the target application.Type: GrantFiled: December 21, 2009Date of Patent: August 27, 2013Assignee: Palm, Inc.Inventor: Brian Hernacki
-
Patent number: 8516235Abstract: A system and method provide for integrating a Basic Input/Output System (BIOS) Read-Only-Memory (ROM) image. A method includes but is not limited to opening a BIOS modification application; opening a target BIOS binary image within the BIOS modification application; and adding an electronic security and tracking system and method (ESTSM) ROM image to the target BIOS binary image.Type: GrantFiled: October 30, 2007Date of Patent: August 20, 2013Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Patent number: 8506649Abstract: A system and method for securing and tracking an electronic device. The system includes hardware, software and firmware components that cooperate to allow tracking, disabling, and other interaction with the stolen electronic device. The system includes an application component, non-viewable component and Basic Input/Output Subsystem (BIOS) component that are present on the electronic device. The BIOS component maintains the secured environment of the application and non-viewable components. If only the application component was provided, a simple low level format of the hard disk drive would remove the application and bypass the security features. The system implements an “application and BIOS” based solution to electronic device security.Type: GrantFiled: July 11, 2006Date of Patent: August 13, 2013Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Patent number: 8499172Abstract: A system and method of recovering encoded information contained in a device by storing and retrieving at least part of the necessary decoding data by setting and measuring the physical characteristics of the device. Storage and recovery options include, but are not limited to, measurement of electronic or optical characteristics of electrically or optically conductive portions of the device using a range of measurement techniques that include, but are not limited to, time-domain reflectometry.Type: GrantFiled: April 12, 2012Date of Patent: July 30, 2013Assignee: Lockheed Martin Corp.Inventors: Patrick A. Nelson, Christian Adams
-
Patent number: 8489892Abstract: A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing.Type: GrantFiled: March 17, 2008Date of Patent: July 16, 2013Assignee: Thomson LicensingInventors: Stephane Onno, Olivier Heen
-
Patent number: 8490200Abstract: A technique for identifying a user of a device includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger.Type: GrantFiled: March 25, 2008Date of Patent: July 16, 2013Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: David Rivera, David C. Challener, Rod D. Waltermann
-
Patent number: 8480761Abstract: A router comprises a local network interface and routing services. The router also includes a data exchanger interface that can be configured to connect to a data exchanger. A security enclosure is configured to cover the data exchanger when the data exchanger is connected to the data exchanger interface.Type: GrantFiled: November 30, 2010Date of Patent: July 9, 2013Assignee: Cradlepoint, Inc.Inventors: Steven Wood, David Alan Johnson
-
Patent number: 8453261Abstract: This microcircuit card includes means for detecting an attack on the card, command means (130) capable of charging a charge pump (120) capable of applying a programming voltage (UP) to command a write operation into a cell (110) of a nonvolatile memory when an attack is detected, and a capacitor (140) arranged so as to be supplied with power during normal operation and to supply said charge pump (120) with power only when an attack is detected. The card (100) being characterized in that said capacitor (140) also supplies power to the command means (130) when an attack is detected.Type: GrantFiled: December 13, 2011Date of Patent: May 28, 2013Assignee: Oberthur TechnologiesInventors: Nicolas Morin, Christophe Giraud
-
Patent number: 8447991Abstract: A card authentication system. In one embodiment, the invention relates to a method for authenticating a data card having an intrinsic magnetic characteristic and recorded data on the data card, the method including reading information from the data card, the data card information including the intrinsic magnetic characteristic and the recorded data on the data card, encrypting the data card information, sending the encrypted data card information, receiving the encrypted data card information, decrypting a portion of the encrypted data card information, the portion including the intrinsic magnetic characteristic, generating a score indicative of a degree of correlation between the intrinsic magnetic characteristic of the data card information and a stored value, and determining an authenticity of the data card based at least in part on the score.Type: GrantFiled: November 6, 2007Date of Patent: May 21, 2013Assignees: Magtek, Inc., Washington Univ.Inventors: Annmarie D. Hart, Lawrence R. Meyers, Carlos Hernandez, Robert E. Morley, Jr., Edward J. Richter, Ronald S. Indeck
-
Patent number: 8443458Abstract: An object of the present invention is to provide a mechanism for tamper detection of electronic devices (110) in closed units which is robust and low cost. The object is achieved by a method in an electronic device (110) for detecting if a cover (100) enclosing the electronic device (110) has been opened. The cover (100) comprises an enclosing assembly (250) which is adapted to fasten the cover (100) into a closed position. The electronic (device 110) comprises a non volatile memory (120). The non volatile memory (120) comprises a stored reference signature associated to the enclosing assembly (250) when the cover (100) was fastened into a closed position. The method comprises the following steps: (Creating 1003) a signature associated to the enclosing assembly (250). Comparing (1004) the created signature with the reference signature. Detecting (1007) that the cover 100 has been opened when the comparing (1004) results in a difference.Type: GrantFiled: January 16, 2008Date of Patent: May 14, 2013Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventor: Dan Anders Lindqvist
-
Publication number: 20130117867Abstract: The robot in this invention can detect the fading or loss of wireless network signal as an indication of being removed from its working area and enter into alert mode. The purpose of robot entering into alert mode is to deter physical theft, e.g., by sounding an alarm, to protect confidential data loss, and to render the robot useless to an unauthorized person, reducing the incentives for theft.Type: ApplicationFiled: September 30, 2012Publication date: May 9, 2013Inventor: Hei Tao Fung
-
Patent number: 8435310Abstract: An anti-counterfeiting electronic device includes a function component assigned with an identification code ID and a processor. The processor generates a random code K1 and transmits the random code K1 to the function component; the function component encrypts the random code K1 and the identification code ID to generate a key ID1. The processor further obtains the key ID1 from the function component and decrypts the key ID1 to generate an identification code ID2, and determines whether the identification code ID2 is the same as the ID and executes the system login command if the identification code ID2 is the same as the identification code ID. An anti-counterfeiting method is also provided.Type: GrantFiled: March 16, 2011Date of Patent: May 7, 2013Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.Inventors: Xiang Li, Sha-Sha Hu, Bo-Ching Lin, Hsien-Chung Shih
-
Patent number: 8438382Abstract: A centralized credential management system includes website credentials that are stored at a vault. The website credentials are encrypted based upon a key not available to the vault and are for authenticating a user to a third party website. Through a client, a user authenticates to the vault and retrieves the encrypted website credentials and parameters and code for properly injecting the credentials into a website authentication form. The website credentials are decrypted at the client and injected into the authentication form using the parameters and code.Type: GrantFiled: August 6, 2008Date of Patent: May 7, 2013Assignee: Symantec CorporationInventors: Barry Ferg, Gary Krall, David M'Raihi, Nicolas Popp
-
Patent number: 8434158Abstract: Various embodiments of the present invention relates to systems, devices and methods of detecting tampering and preventing unauthorized access by incorporating programmability and randomness into a process of coupling, driving and sensing conductive wires that are arranged above sensitive areas in a secured system. Such a tampering detection system comprises a security mesh network, a random number generator, a security controller and a security monitor. The security mesh network includes a plurality of security elements made from the conductive wires. The security controller selects a subset of security elements, forms a security array, and generates a driving stimulus. The security monitor selects a SENSE node, monitors an output at the SENSE node, and generates a flag signal indicating the presence of a tampering attempt. Programmability and randomness are introduced to at least one of the system parameters including array configuration, driving stimulus, SENSE node, and detection mode via random numbers.Type: GrantFiled: August 29, 2011Date of Patent: April 30, 2013Assignee: Maxim Integrated Products, Inc.Inventors: Jianxin Ma, Sung Ung Kwak, Irfan Azam Chaudhry
-
Patent number: 8434144Abstract: A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and preferably by locating the valid hash value within a table of valid hash values indexed by the state information. Candidate authorization information is obtained from the user, and a candidate hash value is generated by applying a hashing algorithm to the candidate authorization information, the state information, or a combination of the candidate authorization information and state information. The candidate hash value and the valid hash value are then compared, and the microprocessor-based system is enabled if the candidate hash value matches the valid hash value.Type: GrantFiled: June 24, 2011Date of Patent: April 30, 2013Assignee: The Invention Science Fund I, LLCInventors: W. Daniel Hillis, Bran Ferren
-
Patent number: 8429759Abstract: Methods and apparatus for theft management are described. In an embodiment an out-of-band notification is received, indicative of theft of a computing device. In response, a theft message is delivered to the computing device using a wireless wide area network. Other embodiments are also disclosed and claimed.Type: GrantFiled: March 31, 2009Date of Patent: April 23, 2013Assignee: Intel CorporationInventor: Farid Adrangi
-
Patent number: 8424092Abstract: A battery pack includes at least one rechargeable battery configured to output power; a remaining battery capacity detection unit configured to detect a remaining battery capacity of the at least one rechargeable battery; and a cryptographic unit configured to output a response word in response to an external request word by encrypting the external request word based on a cryptographic algorithm with a common code key.Type: GrantFiled: September 8, 2011Date of Patent: April 16, 2013Assignees: Mitsumi Electric Co., Ltd., Sony Mobile Communications Japan, Inc.Inventors: Akira Ikeuchi, Itsuki Nakano, Kenichi Kasai, Katsuya Suzuki, Kuniharu Suzuki
-
Patent number: 8419806Abstract: A data protection system selectively deletes data from an electronic device when the device is reported as lost or stolen, or when another data protection triggering event occurs. Different data files may, for example, be treated differently depending on when such files were created. For example, data files that were created while the computing device was known to be in the owner's possession may be deleted, while data files created after the electronic device left the owner's possession may be left intact (since they may have been created by an innocent user). Data files created between these two points in time may be quarantined so that they later be restored, if appropriate.Type: GrantFiled: May 5, 2010Date of Patent: April 16, 2013Assignee: Absolute Software CorporationInventor: Robert Chase
-
Patent number: 8423801Abstract: An electronic device including an external-memory-medium installing portion in which an external memory medium storing contents data, a display portion for displaying the contents data, a sound generating portion for generating a sound, a power-shut-down-requirement receiving portion for receiving a requirement for shutting-down a power supply to the electronic device, a monitoring portion for determining whether the external memory medium is installed in the external-memory-medium installing portion, a sound-generation commanding portion for commanding command the sound generating portion to generate an alarming sound when the monitoring portion has determined that the external memory medium is not installed in the external-memory-medium installing portion while the contents data are displayed, and a power supply control portion for inhibiting an operation to shut down the power supply to the electronic device when the power-shut-down-requirement receiving portion has received the requirement for shutting doType: GrantFiled: January 19, 2010Date of Patent: April 16, 2013Assignee: Brother Kogyo Kabushiki KaishaInventor: Hideto Matsumoto
-
Publication number: 20130091590Abstract: A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.Type: ApplicationFiled: November 26, 2012Publication date: April 11, 2013Inventors: Jasmeet Chhabra, Gyan Prakash
-
Patent number: 8403998Abstract: A theft-deterrence process enabling a theft-deterrence server, remotely disposed from the processor based device, to deter or thwart theft of the processor based device, is disclosed herein. In various embodiments, the theft-deterrence process employs connection and network independent communication for at least one direction between the theft deterrence server and the processor based device.Type: GrantFiled: March 31, 2008Date of Patent: March 26, 2013Assignee: Intel CorporationInventors: Mousumi M. Hazra, Gyan Prakash, Carol A. Bell, Selim Aissi
-
Patent number: 8397310Abstract: The present invention is an apparatus and method for associating electronic devices to portable containers. A smart container is a container used for transporting items while traveling and comprising electronic devices. The smart container may comprise at least one module bay configured for receiving a module and a controller comprising a processing device associated with a memory. The controller is electrically associated with the module bay and configured for sending and/or receiving data to/from an electronic device associated with the module bay. The controller may be either an integral component of the smart container or a controller module removably received by the smart container. The smart container further comprises a power source associated with a power bus. The power bus is electrically associated with at least one of (a) a module bay, and (b) the controller.Type: GrantFiled: October 11, 2005Date of Patent: March 12, 2013Inventors: Earl H. Parris, John Michael Kay
-
Patent number: 8391488Abstract: A data encryption and decryption system securely geoencrypts data using location-dependent navigation signals. To increase the entropy of the cryptographic key to guard against a brute-force attack, geoencryption is made to depend on largely time-independent characteristics of the navigation signals that are not easily spoofed, including the time difference of arrival, the envelope-to-cycle difference, the differential signal-to-noise, the signal envelope shape, and the directions of arrival of the navigation signal set.Type: GrantFiled: January 15, 2009Date of Patent: March 5, 2013Assignees: Geocodex LLC, Leland Stanford Junior UniversityInventors: Di Qiu, Sherman Lo, Per Enge, Logan Scott, Dan Boneh, Ron Karpf
-
Patent number: 8384412Abstract: A method distributes personalized circuits to one or more parties. The method distributes a generic circuit to each party, encrypts a unique personalization value using a secret encryption key, and transmits each encrypted personalization value to the corresponding party. Each party then stores the encrypted personalization value in their circuit. The stored encrypted personalization value allows a piece of software to be properly executed by the circuit. A semiconductor integrated circuit is arranged to execute a piece of software that inputs a personalization value as an input parameter. The circuit comprises a personalization memory arranged to store an encrypted personalization value; a key memory for storing a decryption key; a control unit comprising a cryptographic circuit arranged to decrypt the encrypted personalization value using the decryption key; and a processor arranged to receive the decrypted personalization value and execute the software using the decrypted personalization value.Type: GrantFiled: July 31, 2006Date of Patent: February 26, 2013Assignee: STMicroelectronics R&D LimitedInventor: Andrew Dellow
-
Patent number: 8379813Abstract: Method and apparatus for authorizing a calling card telephone call are described. In one example, a telephone calling card includes a planar body having a memory system, an input circuit, a controller, and a display. The memory system is configured to store key code information. The input circuit is configured to receive a personal identification number (PIN). The controller is configured to derive a key code from the key code information using the PIN. The display is configured to present the key code. The user may then use the key code for purposes of authorizing a call made using a calling card. The key code may change from time-to-time as the user uses the calling card. Since the user's PIN is not entered into a telephone by the user, the calling card is less susceptible to unauthorized and/or fraudulent use by third parties.Type: GrantFiled: June 29, 2007Date of Patent: February 19, 2013Assignee: Vonage Network LLCInventors: Donald J. Weber, Daniel T. Smires
-
Publication number: 20130042329Abstract: An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device.Type: ApplicationFiled: August 13, 2012Publication date: February 14, 2013Inventor: Jon Stevens