Theft Prevention Patents (Class 726/35)
  • Patent number: 8375226
    Abstract: A system and method for providing a firewall system that prevents a computer from being accessed by an unauthorized user via a computer network. The system includes a switch assembly that connects and disconnects the computer from a computer network. The switch assembly is controlled by the types of data transmissions generated by the computer. If the computer generates a data transmission addressed to the computer network, the switch assembly automatically interconnects the computer to the computer network. If the data transmission generated by the computer includes a data request from some point on the computer network, the interconnection with the computer network is held open until the requested data is received. Once the requested data is received, the switch assembly disconnects the computer from the computer network.
    Type: Grant
    Filed: September 18, 2007
    Date of Patent: February 12, 2013
    Inventor: Raymond Brandl
  • Patent number: 8361166
    Abstract: A system and method for presenting electronic device security and tracking information. A method includes but is not limited to making accessible at least one first webpage capable of presenting a category for an electronic device registered with an electronic device security and tracking system and method (ESTSM) service; making accessible at least one second webpage capable of accepting a report that the electronic device has been stolen; and making accessible at least one third webpage capable of accepting at least one item of information pertaining to enablement of the electronic device.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: January 29, 2013
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Patent number: 8359481
    Abstract: A coprocessor includes a calculation unit for executing at least one command, and a securization device. The securization device includes an error detection circuit for monitoring the execution of the command so as to detect any execution error, putting the coprocessor into an error mode by default as soon as the execution of the command begins, and lifting the error mode at the end of the execution of the command if no error has been detected, an event detection circuit for monitoring the appearance of at least one event to be detected, and a masking circuit for masking the error mode while the event to be detected does not happen, and declaring the error mode to the outside of the coprocessor if the event to be detected happens while the coprocessor is in the error mode. Application in particular but not exclusively to coprocessors embedded in integrated circuits for smart cards.
    Type: Grant
    Filed: April 19, 2011
    Date of Patent: January 22, 2013
    Assignee: STMicroelectronics S.A.
    Inventors: Frederic Bancel, Nicolas Berard
  • Patent number: 8356189
    Abstract: The invention describes a method for hardening a security mechanism against physical intrusion and substitution attacks. A user establishes a connection between a network peripheral device and a network via a security mechanism. The security mechanism includes read only memory (ROM) that contains code that initiates operation of the mechanism and performs authentication functions. A persistent memory contains configuration information. A volatile memory stores user and device identification information that remains valid only for a given session and is erased thereafter to prevent a future security breach. A tamper-evident enclosure surrounds the memory elements, which if breached, becomes readily apparent to the user.
    Type: Grant
    Filed: August 23, 2010
    Date of Patent: January 15, 2013
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Sandra Lynn Carrico, Philippe Hebrais
  • Patent number: 8353026
    Abstract: A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot.
    Type: Grant
    Filed: October 23, 2008
    Date of Patent: January 8, 2013
    Assignee: Dell Products L.P.
    Inventors: Muhammed K. Jaber, Mukund P. Khatri, Kevin T. Marks, Don Charles McCall
  • Patent number: 8343236
    Abstract: A mobile phone anti-theft system includes a mobile phone, a SIM card and a real-name card-issuing system. The real-name card-issuing system includes a central processing unit, a first user information storage area, transmission equipment, and a card reader. The SIM card communicates with the central processing unit through the card reader and the transmission equipment. The real-name card-issuing system sends user information stored in the first user information storage area to the SIM card. If the SIM card needs to change the user information, it should verify first cryptographic keys with the real-name card-issuing system. The mobile phone includes a micro control unit, a second user information storage area and a transmission unit. The SIM card communicates with the micro control unit through the transmission unit. After each startup of the mobile phone, the mobile phone verifies second cryptographic keys with the SIM card.
    Type: Grant
    Filed: October 23, 2009
    Date of Patent: January 1, 2013
    Assignees: Shenzhen Futaihong Precision Industry Co., Ltd., FIH (Hong Kong) Limited
    Inventor: Li-Jin Jia
  • Patent number: 8343235
    Abstract: Systems and methods of theft prevention of communication devices are provided. In one embodiment, the method may include, for example, one or more of the following: registering a communication device being used at a home, where the device is connected to a communication network; entering validation information relating to the communication device; and analyzing the validation information to determine whether the communication device is authorized for use in the communication network.
    Type: Grant
    Filed: September 26, 2003
    Date of Patent: January 1, 2013
    Assignee: Broadcom Corporation
    Inventors: Jeyhan Karaoguz, James D. Bennett
  • Patent number: 8341729
    Abstract: Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies for hardware access and monitoring control. One embodiment includes obtaining device property data from each device coupled to a system and determining if each device is a device authorized for use with the system. Such embodiments may further include allowing only devices authorized for use with the system to be accessed by processes of the system.
    Type: Grant
    Filed: June 3, 2008
    Date of Patent: December 25, 2012
    Assignee: CA, Inc.
    Inventor: Srikanth Mandava
  • Patent number: 8341757
    Abstract: An exemplary electronic device includes a detecting component and a storage unit. The detecting component generates detecting signals when the electronic device has been disassembled. The storage unit stores disassemble history information based on detecting signals received from the detecting component.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: December 25, 2012
    Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.
    Inventor: Jin-Shi Lai
  • Patent number: 8330998
    Abstract: A scanner device includes a scanner body enclosed by a housing and an external cover covering an outer side of the housing. The external cover is comprised of a plurality of external members. By spacing the adjacent external members apart from each other at the side edge parts of the housing, recesses are formed between the adjacent external members so as to constitute parts of the external design of the scanner body. Preferably, the side edge parts of the housing are exposed between the adjacent external members at the side edge parts of the housing, and information providing devices providing information on the scanner device are provided at the side edge parts of the housing exposed between the adjacent external members.
    Type: Grant
    Filed: August 14, 2009
    Date of Patent: December 11, 2012
    Assignee: PFU Limited
    Inventors: Shoji Yoshida, Hideaki Shibata, Yasuhiro Matsuda, Masaaki Yamashita
  • Patent number: 8327443
    Abstract: An intrusion masquerade detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine a masquerade based on a distance from a threshold in a model of an estimated algorithmic minimum sufficient statistic.
    Type: Grant
    Filed: October 29, 2008
    Date of Patent: December 4, 2012
    Assignee: Lockheed Martin Corporation
    Inventors: Edward E. Eiland, Scott C. Evans, Thomas S. Markham, Jeremy D. Impson
  • Patent number: 8325168
    Abstract: A method of controlling a display device is provided. The method includes the steps of receiving an input data; decoding a stored image to obtain decoded data; accumulating the decoded data to obtain an accumulated value; adding the accumulated value to the input data to obtain a compared value; setting the display device to operate normally when the compared value is identical to an initial value; and displaying a preset frame on the display device when the compared value is different from the initial value.
    Type: Grant
    Filed: October 18, 2009
    Date of Patent: December 4, 2012
    Assignee: Au Optronics Corporation
    Inventor: I-Shu Lee
  • Patent number: 8317878
    Abstract: A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: November 27, 2012
    Assignee: Intel Corporation
    Inventors: Jasmeet Chhabra, Gyan Prakash
  • Patent number: 8319616
    Abstract: A system and method for authorizing a remote device amongst multiple remote devices for passive functions, such as passive entry and passive start, includes a vehicle having a plurality of strategically located antennas, combinations of which transmit a query signal and receive query responses, a challenge antenna amongst the plurality of antennas for transmitting a challenge signal to at least one of the multiple remote devices in accordance with a challenge order, and a control unit having a controller in communication with the antennas for determining the challenge order based upon the query responses. The controller can determine whether a remote device is located in an authorization zone, out of an authorization zone, or whether the remote device's location is indeterminate.
    Type: Grant
    Filed: October 30, 2009
    Date of Patent: November 27, 2012
    Assignee: Lear Corporation
    Inventors: Hilton W. Girard, III, Nikolay Yakovenko, Riad Ghabra
  • Patent number: 8321916
    Abstract: An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon's to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible.
    Type: Grant
    Filed: December 19, 2008
    Date of Patent: November 27, 2012
    Assignee: Intel Corporation
    Inventors: Selim Aissi, Jasmeet Chhabra, Gyan Prakash
  • Patent number: 8321683
    Abstract: An electronic control device and method for operating an electric roller shutter include establishing a wireless connection between the electronic control device and an electronic device if a preset login password is input. The electronic control device provides an operation interface to the electronic device, and receives a function instruction from the electronic device if a function key on the operation interface is pressed. The electric roller shutter is operated by the electronic control device according to the received function instruction.
    Type: Grant
    Filed: August 31, 2010
    Date of Patent: November 27, 2012
    Assignee: Hon Hai Precision Industry Co., Ltd.
    Inventor: Ming-Yuan Hsu
  • Patent number: 8314700
    Abstract: A method and system for notifying an owner of a mobile electronic device of an unauthorized movement of the mobile electronic device from a physical location.
    Type: Grant
    Filed: August 11, 2005
    Date of Patent: November 20, 2012
    Assignee: International Business Machines Corporation
    Inventor: Mark Joseph Hamzy
  • Patent number: 8308819
    Abstract: Various methods for detecting the removal of a processing unit, such as a microprocessor or a microcontroller, form a printed circuit board in a secure printing system, such as a postage metering system are provided. The methods utilize one or more of a real time clock provided internal to the processing unit, a CMOS device provided on the printed circuit board external to the processing unit, and CMOS memory internal to the processing unit to detect the removal of the processing unit and therefore an attack.
    Type: Grant
    Filed: December 19, 2006
    Date of Patent: November 13, 2012
    Assignee: Pitney Bowes Inc.
    Inventors: Wesley A. Kirschner, Robert W. Sisson, John A. Hurd, Frederick W. Ryan, Jr., Gary S. Jacobson
  • Patent number: 8308820
    Abstract: A container security device includes a housing, electronic circuitry, and cabling. The electronic circuitry is disposed within the housing, and includes first and second microprocessor functions and an interface for accepting and providing data. The cabling is removably coupled to the housing, provides the only communicative coupling between the first microprocessor function and the second microprocessor function, and is adapted to be attached to a container latch so as to break the communicative coupling if the latch is opened. The housing includes a port for the electronic circuitry interface. A method of providing container security includes closing a container using a latch device and removably coupling the cabling to the housing so that the communicative coupling is broken if the latch is opened., providing the only communicative coupling between the first microprocessor function and the second microprocessor function.
    Type: Grant
    Filed: March 16, 2011
    Date of Patent: November 13, 2012
    Assignee: TecSec, Inc.
    Inventors: Edward M Scheidt, C. Jay Wack, Wai Lin Tsang
  • Publication number: 20120278907
    Abstract: A theft prevention system for protecting portable electronic devices is disclosed. An acceleration sensor detects the acceleration of a portable electronic device, and a controller analyzes this acceleration to determine whether a theft condition is present. If so, an alarm can be initiated. The theft prevention system can include a filter for attenuating irrelevant acceleration frequencies and isolating those representative of theft, and comparison hardware/software for determining whether the detected acceleration matches a known acceleration profile characteristic of theft. Various parameters of the theft prevention system can also be set by a user through mechanisms such as a graphical user interface.
    Type: Application
    Filed: June 11, 2012
    Publication date: November 1, 2012
    Applicant: Apple Inc.
    Inventor: Paul J. Wehrenberg
  • Patent number: 8298295
    Abstract: A manageability engine of a processor based device and a host theft-deterrence agent of the processor based device, jointly implement a theft-deterrence protocol with a theft-deterrence service, remotely disposed from the processor based device, to deter theft of the processor based device. The host theft-deterrence agent is configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine is configured to operate outside the application execution environment.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: October 30, 2012
    Assignee: Intel Corporation
    Inventors: Selim Aissi, Jasmeet Chhabra, Gyan Prakash
  • Patent number: 8292969
    Abstract: A system and method for electronic device protection. A method includes activating the electronic device; transferring control to a Basic Input/Output System (BIOS) component after activation; transferring control to a non-viewable component from the BIOS component; verifying that an application component operated correctly during a previous device activation; and continuing with activation of the electronic device if the application component operated correctly during the previous device activation.
    Type: Grant
    Filed: February 12, 2008
    Date of Patent: October 23, 2012
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Patent number: 8287603
    Abstract: An electronic device has software for protecting the electronic device from unauthorized utilization. When executed, the software causes the electronic device to execute an application component, wherein the application component is configured to automatically ascertain whether the electronic device has been reported stolen, based on information received from a server system. The electronic device also automatically determines whether the application component is operating correctly, and if so, automatically provides a basic input/output system (BIOS) component of the electronic device with information indicating that the application component is operating correctly. During a subsequent boot process for the electronic device, the software automatically prevents the electronic device from completing the boot process if the BIOS component does not find the information from the application component indicating that the application component was operating correctly. Other embodiments are described and claimed.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: October 16, 2012
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Patent number: 8282687
    Abstract: A security apparatus and method is provided for a portable computer, wherein a solenoid within the portable computer is controlled by a specified program running on the computer. Activation of the solenoid is usefully enabled by a password or computer security chip. One embodiment, comprising a security apparatus, includes a locking mechanism such as a conventional manually operated USS locking device having a locking element. The security apparatus further includes a component positioned proximate to a slot disposed to receive the locking element, the component being adjustable to vary a dimension of the slot entrance between hold and release modes. The component is coupled to the solenoid and is actuated to adjust the slot entrance dimension, from the hold mode to the release mode, when the solenoid is energized in response to a command generated by the specified program running on the computer.
    Type: Grant
    Filed: May 27, 2008
    Date of Patent: October 9, 2012
    Assignee: International Business Machines Corporation
    Inventor: John Daniel Upton
  • Publication number: 20120255039
    Abstract: A protected data storage device that protects data from a wireless computer network from theft and environmental conditions includes a housing having front, rear, top, and bottom walls each constructed of a rigid, fire resistant material, the housing defining an interior area. A digital storage unit is positioned in the housing interior area. A processor is situated in the housing interior area in data communication with the digital storage unit. A wireless receiver is coupled to an outer surface of a respective housing wall in data communication with the storage unit and processor. Programming in data communication with the processor causes the processor to actuate the receiver to receive data signals from the wireless network and store received data in the storage unit.
    Type: Application
    Filed: March 31, 2011
    Publication date: October 4, 2012
    Inventor: Keith Sipes
  • Patent number: 8281411
    Abstract: A security memory device includes a memory cell array that stores a plurality of contents, including a mine, which is stored as a portion of the plurality of contents. The mine is triggered when it is accessed, typically such that the mine erases the memory contents. Also, control logic is included that controls access to the plurality of contents. In one aspect, the memory cell array can include a protected-cell zone and a free-cell zone. In this aspect, the security memory device can further include a lock that provides protection for contents stored in the protected-cell zone from access and a key that is capable of unlocking the lock.
    Type: Grant
    Filed: September 17, 2008
    Date of Patent: October 2, 2012
    Assignee: Macronix International Co., Ltd.
    Inventors: Minfu Li, Min Nan Yen
  • Patent number: 8281154
    Abstract: Provided are a computer program product, system, and method to allocate blocks of memory in a memory device having a plurality of blocks. At least one unencrypted memory allocation function coded in an application is executed to request allocation of unencrypted blocks in the memory device. An encrypted memory allocation function coded in the application is executed to request allocation of encrypted blocks in the memory device. At least one unencrypted Input/Output (I/O) request function coded in the application indicating an I/O operation to perform against the unencrypted blocks in the memory device is executed. At least one encrypted I/O request function coded in the application indicating an I/O operation to perform against the encrypted blocks in the memory device is executed.
    Type: Grant
    Filed: July 23, 2009
    Date of Patent: October 2, 2012
    Assignee: International Business Machines Corporation
    Inventors: Benjamin Jay Donie, Andreas Mattias Koster, Nicole Forsgren Velasquez
  • Patent number: 8274363
    Abstract: A system and/or method to control access to medication and/or medical supplies may be implemented by providing secured compartments for the medication spread through a medical facility, such as in or adjacent patient rooms and/or connecting locking mechanisms to the secured compartments. Computers positioned throughout the facility are interfaced to respective locking mechanisms to operate the locking mechanism in response to access codes, which may be transmitted over the network. Additional steps may involve programming an authorization computer for providing access codes in whole or part for use with the computers. One or more access points may be functionally coupled to a computer system and/or to the locking mechanism and accessible to users for entry of requests for access to the secured compartment.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: September 25, 2012
    Inventor: Roger Goza
  • Patent number: 8269599
    Abstract: A system and/or method to control access to secured compartments in a facility. Computers positioned throughout the facility are interfaced to respective locking mechanisms to operate the locking mechanism in response to access codes, which may be transmitted over the network. Additional steps may involve programming an authorization computer for providing access codes in whole or part for use with the computers. One or more access points may be functionally coupled to a computer system and/or to the locking mechanism and accessible to users for entry of requests for access to the secured compartment.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: September 18, 2012
    Inventor: Roger Goza
  • Patent number: 8271642
    Abstract: A system, method, and computer program product are provided for isolating a device associated with at least potential data leakage activity, based on user input. In operation, at least potential data leakage activity associated with a device is identified. Furthermore, at least one action is performed to isolate the device, based on user input received utilizing a user interface.
    Type: Grant
    Filed: August 29, 2007
    Date of Patent: September 18, 2012
    Assignee: McAfee, Inc.
    Inventors: Srinivasan Sankararaman, Deepakeswaran Kolingivadi
  • Publication number: 20120226910
    Abstract: A lock and modular system for securing an electronic device. The system includes a device security module that couples to an electronic device and secures the electronic device to its location. A monitor module ensures that the device security module is coupled to the electronic device before a data security module allows the electronic device to operate. The monitor module may also require that the device security module be recognized before the electronic device will operate. If the device security module is coupled and recognized, the user is prompted to provide an encryption key. If the key is correct, the electronic device will operate. The user may have a limited number of attempts to provide the encryption key. If the user makes too many attempts, the electronic device is disabled and the data thereon destroyed. If the device security module is uncoupled during operation, the electronic device is shut down.
    Type: Application
    Filed: March 4, 2011
    Publication date: September 6, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard Hutzler, William M. Smith, JR.
  • Patent number: 8255370
    Abstract: A method and apparatus for scanning structured data from a data repository having an arbitrary data schema and for applying a policy to the data of the data repository are described. In one embodiment, the structured data is converted to unstructured text data to allow a schema-independent policy to be applied to the text data in order to detect a policy violation in the data repository regardless of the data schema used by the data repository.
    Type: Grant
    Filed: June 24, 2011
    Date of Patent: August 28, 2012
    Assignee: Symantec Corporation
    Inventors: Michel Zoppas, Jeremy Hermann, Conal O'Raghallaigh, Eric Bothwell, Alexander Fontana
  • Patent number: 8252067
    Abstract: A latch and latch handle recessed into the computer cover is provided, with the latch handle preferably presently a cam surface internally that interacts with a compatible cam surface associated with a lock bar. Preferably, a key lock is functionally integrated with the latch in such a way that when the key lock is unlocked the latch handle and latch are free to displace and to then urge the retention bar to disengage detents or hooks from slots or receptacles, by way of releasing the cover from a chassis or body of the desktop or workstation. Accordingly, in essentially one efficient movement via engaging the latch handle, a user will be able to quickly remove the cover.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: August 28, 2012
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Timothy S. Farrow, William F. Martin-Otto
  • Patent number: 8241369
    Abstract: An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device.
    Type: Grant
    Filed: October 24, 2011
    Date of Patent: August 14, 2012
    Assignee: Absolute Software Corporation
    Inventor: Jon Stevens
  • Patent number: 8241368
    Abstract: In a method for securing and disabling an electronic device, the electronic device automatically executes a basic input/output system (BIOS) component of a security and tracking service during boot up. The BIOS component automatically determines whether an application component of the security and tracking service has requested disabling of the electronic device. In response to a determination that the application component has requested disabling of the electronic device, the BIOS component automatically displays system information and unlock key. The BIOS component also automatically prompts a user of the electronic device to enter an activation password to re-enable the electronic device. Other embodiments are described and claimed.
    Type: Grant
    Filed: July 29, 2010
    Date of Patent: August 14, 2012
    Assignee: Softex Incorporated
    Inventors: Apurva M. Bhansali, Manoj K. Jain, Shradha Dube, Gayathri Rangarajan, Mehul R. Patel, Rayesh K. Raikar, Kamal M. Dhanani, Ranjit Kapila, Elza A. Varghese, Thomas D. Tucker
  • Patent number: 8245315
    Abstract: Aspects describe remotely diagnosing unauthorized hardware changes on a mobile device. The changes can be identified based on hardware component identification and/or based on behavior characteristics of the device. If an unauthorized change is detected, information relating to that change can be reported to a service provider. Further, actions associated with the authorized change can be automatically implemented or implemented after confirmation to proceed with the recommended action.
    Type: Grant
    Filed: September 10, 2008
    Date of Patent: August 14, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Tia Manning Cassett, Kenny Fok
  • Patent number: 8214913
    Abstract: A secured computing system and container therefor may comprise: a base for receiving a computing device; a securable first cover for substantially enclosing at least part of the computing device when the first cover is in a first position in the base; a securable second cover for preventing access to the computing device when the second cover is in a secured position, wherein access to the computing device is available when the second cover is not in the secured position. The computing device may be substantially enclosed when the first cover is in the first position in the base and the second cover is in the secured position; and one or more user features of the computing device may be accessible when the first cover is not in the first position in the base. The computing device may include a computer processor or computer peripheral.
    Type: Grant
    Filed: April 14, 2009
    Date of Patent: July 3, 2012
    Assignee: Panasec Corporation
    Inventors: Kevin Kwong-Tai Chung, Victor Jun Dong
  • Patent number: 8209443
    Abstract: A system and method for identifying lost/stale peripheral hardware devices connected to an enterprise computer system is disclosed. In one embodiment, a method for identifying lost peripheral hardware devices connected to an enterprise computer system includes initializing system memory by obtaining data structures associated with last detected connected peripheral hardware devices stored in an external database upon reboot, initiating an enterprise computer system wide scanning to obtain the detected data structures associated with current connected peripheral hardware devices during the reboot, and comparing the obtained data structures associated with the last detected connected peripheral hardware devices and the current connected peripheral hardware devices to determine whether there is any chance in system resources associated with the connected peripheral hardware devices during the reboot.
    Type: Grant
    Filed: September 18, 2008
    Date of Patent: June 26, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeevan Basavaraju, Harish Kuttan, Santosh Ananth Rao
  • Patent number: 8206460
    Abstract: Described herein are one or more implementations of a security system for one or more protected devices. The security system implements an authentication system that enables protected devices. Protected devices are enabled for a particular network, and are disabled when the protected devices leave the network.
    Type: Grant
    Filed: December 5, 2006
    Date of Patent: June 26, 2012
    Assignee: Intel Corporation
    Inventor: Joshua Posamentier
  • Patent number: 8182549
    Abstract: A process is provided for protection against theft of electronic payment terminals utilized in a group including at least two electronic payment terminals organized as a network. The process includes the following steps: mutual detection of the presence of each of the terminals of the group; and transmission of absence information if at least one of the terminals is not detected.
    Type: Grant
    Filed: December 5, 2008
    Date of Patent: May 22, 2012
    Assignee: Compagnie Industrielle et Financiere d'Ingenierie “Ingencio”
    Inventor: David Naccache
  • Patent number: 8182548
    Abstract: An electronic device security and tracking system. A system includes one or more clients, wherein the clients are electronic devices; and a server computer system connected to each of the clients, wherein the server computer system is capable of tracking and locating each of the clients. In one aspect, the server computer system includes one or more web servers coupled to each of the clients, wherein the web servers include a website for the electronic device security and tracking system; one or more file transfer protocol servers coupled to each of the web servers; and one or more database servers connected to each of the web servers.
    Type: Grant
    Filed: July 2, 2008
    Date of Patent: May 22, 2012
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Publication number: 20120124388
    Abstract: A method and apparatus to deter theft of electronic-devices is disclosed. Electronic-devices have locked and unlocked states that permit deny and permit use of the electronic-device. Electronic-devices are shipped from manufacturers, thorough suppliers, to retailers in the locked state. Unlocking functions are transmitted through computer networks to the retail locations and held in volatile storage. The unlocking of the electronic-device occurs subsequent to purchase. Other methods and apparatus are disclosed related to multiple distribution methods of unlocking schemes, re-locking and return validation and data structures.
    Type: Application
    Filed: November 14, 2010
    Publication date: May 17, 2012
    Applicant: DiSa DigitalSafety Pte Ltd
    Inventors: Weng Wah CHNG, Yang Kwang HAN
  • Patent number: 8176547
    Abstract: A system requires a user to enter a geometric pattern on an interface device to gain access to the system. After the correct geometric pattern is entered, a timer times a duration before an authenticating password is subsequently entered by the user. If the duration exceeds a predetermined length of time, access to a set of one or more files is at least temporarily prevented. If the user enters the authenticating password before the duration exceeds the predetermined length of time, access to the set of one or more files is granted.
    Type: Grant
    Filed: January 24, 2011
    Date of Patent: May 8, 2012
    Assignee: Micron Technology, Inc.
    Inventor: James McKeeth
  • Patent number: 8163035
    Abstract: This disclosure relates to interference management for a security and tracking system of an electronic device. In one embodiment, during a startup process, an electronic device executes a security program and automatically attempts to access a first web server to ascertain whether the electronic devices has been reported as stolen. In response to an unsuccessful attempt to access the first web server, the electronic device may automatically attempt to access a second web server for data regarding operational status of the first web server. In response to unsuccessful attempts to access the first and second web servers, the electronic device may automatically present an interference alert to provide notification that the electronic device will be disabled if the electronic device continues to experience interference. The electronic device may be automatically disabled in response to a predetermined number of startup sequences with interference. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: April 24, 2012
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Patent number: 8151367
    Abstract: An information processing system includes a management apparatus having a transmission preventing part preventing transmission of a predetermined usage allowing signal allowing usage of a predetermined device, in response to receiving a predetermined usage preventing instruction for the predetermined device.
    Type: Grant
    Filed: May 23, 2005
    Date of Patent: April 3, 2012
    Assignee: Fujitsu Limited
    Inventors: Yuzi Kanazawa, Yoshihiro Tsuchiya
  • Publication number: 20120073000
    Abstract: The present invention relates to an embedded anti-thief system and a method thereof for executing anti-thief procedures, the embedded anti-thief system comprises: a core firmware module, an embedded system module and a cloud server module, wherein the core firmware module is disposed in a firmware device of a portable computer and capable of automatically inspecting the security status of the portable computer when the portable computer is booted. The embedded system module is disposed on a hard disk device of the portable computer and able to communicate with the core firmware module and the cloud server module, so as to confirm the security status of the portable computer. Through the method, the core firmware module and the embedded system module can be loaded and effectively cooperate with the cloud server module for executing the anti-theft procedures for the portable computer at any time.
    Type: Application
    Filed: March 3, 2011
    Publication date: March 22, 2012
    Applicant: NATIONAL TSING HUA UNIVERSITY (TAIWAN)
    Inventors: Jang-Ping Sheu, Yi-Chang Chen
  • Patent number: 8137410
    Abstract: A method for tracking, locating and disabling an electronic device. A method includes checking if an application component operated correctly during last power-up of the device; and placing the device under control of power on self test to proceed with powering-up the device if the application component operated correctly during last device power-up.
    Type: Grant
    Filed: July 2, 2008
    Date of Patent: March 20, 2012
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Patent number: 8140863
    Abstract: A mobile communications device, server, and method for providing security on a mobile communications device are described.
    Type: Grant
    Filed: May 18, 2007
    Date of Patent: March 20, 2012
    Assignee: Research In Motion Limited
    Inventors: Michael S. Brown, Neil Adams, Steven Fyke, Herbert Little
  • Patent number: 8128710
    Abstract: A system and method for securing and tracking an electronic device. A method includes but is not limited to accepting a selection of a service to erase a hard disk drive in the electronic device; recording that the electronic device has been reported stolen; and erasing the hard disk drive.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: March 6, 2012
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Patent number: 8132021
    Abstract: An information processing apparatus has a decrypting part configured to receive decrypting key information from a managing apparatus which manages the decrypting key information for decrypting information to decrypt the information; a monitoring part configured to communicate with the managing apparatus, after the decrypting until the information is encrypted again, and a terminating part configured to terminate processing carried out on the information, when the monitoring part cannot receive a predetermined response from the managing apparatus.
    Type: Grant
    Filed: July 25, 2007
    Date of Patent: March 6, 2012
    Assignee: Fujitsu Limited
    Inventor: Naozumi Anzai