Theft Prevention Patents (Class 726/35)
-
Patent number: 8375226Abstract: A system and method for providing a firewall system that prevents a computer from being accessed by an unauthorized user via a computer network. The system includes a switch assembly that connects and disconnects the computer from a computer network. The switch assembly is controlled by the types of data transmissions generated by the computer. If the computer generates a data transmission addressed to the computer network, the switch assembly automatically interconnects the computer to the computer network. If the data transmission generated by the computer includes a data request from some point on the computer network, the interconnection with the computer network is held open until the requested data is received. Once the requested data is received, the switch assembly disconnects the computer from the computer network.Type: GrantFiled: September 18, 2007Date of Patent: February 12, 2013Inventor: Raymond Brandl
-
Patent number: 8361166Abstract: A system and method for presenting electronic device security and tracking information. A method includes but is not limited to making accessible at least one first webpage capable of presenting a category for an electronic device registered with an electronic device security and tracking system and method (ESTSM) service; making accessible at least one second webpage capable of accepting a report that the electronic device has been stolen; and making accessible at least one third webpage capable of accepting at least one item of information pertaining to enablement of the electronic device.Type: GrantFiled: October 30, 2007Date of Patent: January 29, 2013Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Patent number: 8359481Abstract: A coprocessor includes a calculation unit for executing at least one command, and a securization device. The securization device includes an error detection circuit for monitoring the execution of the command so as to detect any execution error, putting the coprocessor into an error mode by default as soon as the execution of the command begins, and lifting the error mode at the end of the execution of the command if no error has been detected, an event detection circuit for monitoring the appearance of at least one event to be detected, and a masking circuit for masking the error mode while the event to be detected does not happen, and declaring the error mode to the outside of the coprocessor if the event to be detected happens while the coprocessor is in the error mode. Application in particular but not exclusively to coprocessors embedded in integrated circuits for smart cards.Type: GrantFiled: April 19, 2011Date of Patent: January 22, 2013Assignee: STMicroelectronics S.A.Inventors: Frederic Bancel, Nicolas Berard
-
Patent number: 8356189Abstract: The invention describes a method for hardening a security mechanism against physical intrusion and substitution attacks. A user establishes a connection between a network peripheral device and a network via a security mechanism. The security mechanism includes read only memory (ROM) that contains code that initiates operation of the mechanism and performs authentication functions. A persistent memory contains configuration information. A volatile memory stores user and device identification information that remains valid only for a given session and is erased thereafter to prevent a future security breach. A tamper-evident enclosure surrounds the memory elements, which if breached, becomes readily apparent to the user.Type: GrantFiled: August 23, 2010Date of Patent: January 15, 2013Assignee: AT&T Intellectual Property II, L.P.Inventors: Sandra Lynn Carrico, Philippe Hebrais
-
Patent number: 8353026Abstract: A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot.Type: GrantFiled: October 23, 2008Date of Patent: January 8, 2013Assignee: Dell Products L.P.Inventors: Muhammed K. Jaber, Mukund P. Khatri, Kevin T. Marks, Don Charles McCall
-
Patent number: 8343236Abstract: A mobile phone anti-theft system includes a mobile phone, a SIM card and a real-name card-issuing system. The real-name card-issuing system includes a central processing unit, a first user information storage area, transmission equipment, and a card reader. The SIM card communicates with the central processing unit through the card reader and the transmission equipment. The real-name card-issuing system sends user information stored in the first user information storage area to the SIM card. If the SIM card needs to change the user information, it should verify first cryptographic keys with the real-name card-issuing system. The mobile phone includes a micro control unit, a second user information storage area and a transmission unit. The SIM card communicates with the micro control unit through the transmission unit. After each startup of the mobile phone, the mobile phone verifies second cryptographic keys with the SIM card.Type: GrantFiled: October 23, 2009Date of Patent: January 1, 2013Assignees: Shenzhen Futaihong Precision Industry Co., Ltd., FIH (Hong Kong) LimitedInventor: Li-Jin Jia
-
Patent number: 8343235Abstract: Systems and methods of theft prevention of communication devices are provided. In one embodiment, the method may include, for example, one or more of the following: registering a communication device being used at a home, where the device is connected to a communication network; entering validation information relating to the communication device; and analyzing the validation information to determine whether the communication device is authorized for use in the communication network.Type: GrantFiled: September 26, 2003Date of Patent: January 1, 2013Assignee: Broadcom CorporationInventors: Jeyhan Karaoguz, James D. Bennett
-
Patent number: 8341729Abstract: Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies for hardware access and monitoring control. One embodiment includes obtaining device property data from each device coupled to a system and determining if each device is a device authorized for use with the system. Such embodiments may further include allowing only devices authorized for use with the system to be accessed by processes of the system.Type: GrantFiled: June 3, 2008Date of Patent: December 25, 2012Assignee: CA, Inc.Inventor: Srikanth Mandava
-
Patent number: 8341757Abstract: An exemplary electronic device includes a detecting component and a storage unit. The detecting component generates detecting signals when the electronic device has been disassembled. The storage unit stores disassemble history information based on detecting signals received from the detecting component.Type: GrantFiled: March 26, 2009Date of Patent: December 25, 2012Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.Inventor: Jin-Shi Lai
-
Patent number: 8330998Abstract: A scanner device includes a scanner body enclosed by a housing and an external cover covering an outer side of the housing. The external cover is comprised of a plurality of external members. By spacing the adjacent external members apart from each other at the side edge parts of the housing, recesses are formed between the adjacent external members so as to constitute parts of the external design of the scanner body. Preferably, the side edge parts of the housing are exposed between the adjacent external members at the side edge parts of the housing, and information providing devices providing information on the scanner device are provided at the side edge parts of the housing exposed between the adjacent external members.Type: GrantFiled: August 14, 2009Date of Patent: December 11, 2012Assignee: PFU LimitedInventors: Shoji Yoshida, Hideaki Shibata, Yasuhiro Matsuda, Masaaki Yamashita
-
Patent number: 8327443Abstract: An intrusion masquerade detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine a masquerade based on a distance from a threshold in a model of an estimated algorithmic minimum sufficient statistic.Type: GrantFiled: October 29, 2008Date of Patent: December 4, 2012Assignee: Lockheed Martin CorporationInventors: Edward E. Eiland, Scott C. Evans, Thomas S. Markham, Jeremy D. Impson
-
Patent number: 8325168Abstract: A method of controlling a display device is provided. The method includes the steps of receiving an input data; decoding a stored image to obtain decoded data; accumulating the decoded data to obtain an accumulated value; adding the accumulated value to the input data to obtain a compared value; setting the display device to operate normally when the compared value is identical to an initial value; and displaying a preset frame on the display device when the compared value is different from the initial value.Type: GrantFiled: October 18, 2009Date of Patent: December 4, 2012Assignee: Au Optronics CorporationInventor: I-Shu Lee
-
Patent number: 8317878Abstract: A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.Type: GrantFiled: December 30, 2008Date of Patent: November 27, 2012Assignee: Intel CorporationInventors: Jasmeet Chhabra, Gyan Prakash
-
Patent number: 8319616Abstract: A system and method for authorizing a remote device amongst multiple remote devices for passive functions, such as passive entry and passive start, includes a vehicle having a plurality of strategically located antennas, combinations of which transmit a query signal and receive query responses, a challenge antenna amongst the plurality of antennas for transmitting a challenge signal to at least one of the multiple remote devices in accordance with a challenge order, and a control unit having a controller in communication with the antennas for determining the challenge order based upon the query responses. The controller can determine whether a remote device is located in an authorization zone, out of an authorization zone, or whether the remote device's location is indeterminate.Type: GrantFiled: October 30, 2009Date of Patent: November 27, 2012Assignee: Lear CorporationInventors: Hilton W. Girard, III, Nikolay Yakovenko, Riad Ghabra
-
Patent number: 8321916Abstract: An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon's to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible.Type: GrantFiled: December 19, 2008Date of Patent: November 27, 2012Assignee: Intel CorporationInventors: Selim Aissi, Jasmeet Chhabra, Gyan Prakash
-
Patent number: 8321683Abstract: An electronic control device and method for operating an electric roller shutter include establishing a wireless connection between the electronic control device and an electronic device if a preset login password is input. The electronic control device provides an operation interface to the electronic device, and receives a function instruction from the electronic device if a function key on the operation interface is pressed. The electric roller shutter is operated by the electronic control device according to the received function instruction.Type: GrantFiled: August 31, 2010Date of Patent: November 27, 2012Assignee: Hon Hai Precision Industry Co., Ltd.Inventor: Ming-Yuan Hsu
-
Patent number: 8314700Abstract: A method and system for notifying an owner of a mobile electronic device of an unauthorized movement of the mobile electronic device from a physical location.Type: GrantFiled: August 11, 2005Date of Patent: November 20, 2012Assignee: International Business Machines CorporationInventor: Mark Joseph Hamzy
-
Patent number: 8308819Abstract: Various methods for detecting the removal of a processing unit, such as a microprocessor or a microcontroller, form a printed circuit board in a secure printing system, such as a postage metering system are provided. The methods utilize one or more of a real time clock provided internal to the processing unit, a CMOS device provided on the printed circuit board external to the processing unit, and CMOS memory internal to the processing unit to detect the removal of the processing unit and therefore an attack.Type: GrantFiled: December 19, 2006Date of Patent: November 13, 2012Assignee: Pitney Bowes Inc.Inventors: Wesley A. Kirschner, Robert W. Sisson, John A. Hurd, Frederick W. Ryan, Jr., Gary S. Jacobson
-
Patent number: 8308820Abstract: A container security device includes a housing, electronic circuitry, and cabling. The electronic circuitry is disposed within the housing, and includes first and second microprocessor functions and an interface for accepting and providing data. The cabling is removably coupled to the housing, provides the only communicative coupling between the first microprocessor function and the second microprocessor function, and is adapted to be attached to a container latch so as to break the communicative coupling if the latch is opened. The housing includes a port for the electronic circuitry interface. A method of providing container security includes closing a container using a latch device and removably coupling the cabling to the housing so that the communicative coupling is broken if the latch is opened., providing the only communicative coupling between the first microprocessor function and the second microprocessor function.Type: GrantFiled: March 16, 2011Date of Patent: November 13, 2012Assignee: TecSec, Inc.Inventors: Edward M Scheidt, C. Jay Wack, Wai Lin Tsang
-
Publication number: 20120278907Abstract: A theft prevention system for protecting portable electronic devices is disclosed. An acceleration sensor detects the acceleration of a portable electronic device, and a controller analyzes this acceleration to determine whether a theft condition is present. If so, an alarm can be initiated. The theft prevention system can include a filter for attenuating irrelevant acceleration frequencies and isolating those representative of theft, and comparison hardware/software for determining whether the detected acceleration matches a known acceleration profile characteristic of theft. Various parameters of the theft prevention system can also be set by a user through mechanisms such as a graphical user interface.Type: ApplicationFiled: June 11, 2012Publication date: November 1, 2012Applicant: Apple Inc.Inventor: Paul J. Wehrenberg
-
Patent number: 8298295Abstract: A manageability engine of a processor based device and a host theft-deterrence agent of the processor based device, jointly implement a theft-deterrence protocol with a theft-deterrence service, remotely disposed from the processor based device, to deter theft of the processor based device. The host theft-deterrence agent is configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine is configured to operate outside the application execution environment.Type: GrantFiled: September 28, 2007Date of Patent: October 30, 2012Assignee: Intel CorporationInventors: Selim Aissi, Jasmeet Chhabra, Gyan Prakash
-
Patent number: 8292969Abstract: A system and method for electronic device protection. A method includes activating the electronic device; transferring control to a Basic Input/Output System (BIOS) component after activation; transferring control to a non-viewable component from the BIOS component; verifying that an application component operated correctly during a previous device activation; and continuing with activation of the electronic device if the application component operated correctly during the previous device activation.Type: GrantFiled: February 12, 2008Date of Patent: October 23, 2012Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Patent number: 8287603Abstract: An electronic device has software for protecting the electronic device from unauthorized utilization. When executed, the software causes the electronic device to execute an application component, wherein the application component is configured to automatically ascertain whether the electronic device has been reported stolen, based on information received from a server system. The electronic device also automatically determines whether the application component is operating correctly, and if so, automatically provides a basic input/output system (BIOS) component of the electronic device with information indicating that the application component is operating correctly. During a subsequent boot process for the electronic device, the software automatically prevents the electronic device from completing the boot process if the BIOS component does not find the information from the application component indicating that the application component was operating correctly. Other embodiments are described and claimed.Type: GrantFiled: August 7, 2009Date of Patent: October 16, 2012Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Patent number: 8282687Abstract: A security apparatus and method is provided for a portable computer, wherein a solenoid within the portable computer is controlled by a specified program running on the computer. Activation of the solenoid is usefully enabled by a password or computer security chip. One embodiment, comprising a security apparatus, includes a locking mechanism such as a conventional manually operated USS locking device having a locking element. The security apparatus further includes a component positioned proximate to a slot disposed to receive the locking element, the component being adjustable to vary a dimension of the slot entrance between hold and release modes. The component is coupled to the solenoid and is actuated to adjust the slot entrance dimension, from the hold mode to the release mode, when the solenoid is energized in response to a command generated by the specified program running on the computer.Type: GrantFiled: May 27, 2008Date of Patent: October 9, 2012Assignee: International Business Machines CorporationInventor: John Daniel Upton
-
Publication number: 20120255039Abstract: A protected data storage device that protects data from a wireless computer network from theft and environmental conditions includes a housing having front, rear, top, and bottom walls each constructed of a rigid, fire resistant material, the housing defining an interior area. A digital storage unit is positioned in the housing interior area. A processor is situated in the housing interior area in data communication with the digital storage unit. A wireless receiver is coupled to an outer surface of a respective housing wall in data communication with the storage unit and processor. Programming in data communication with the processor causes the processor to actuate the receiver to receive data signals from the wireless network and store received data in the storage unit.Type: ApplicationFiled: March 31, 2011Publication date: October 4, 2012Inventor: Keith Sipes
-
Patent number: 8281411Abstract: A security memory device includes a memory cell array that stores a plurality of contents, including a mine, which is stored as a portion of the plurality of contents. The mine is triggered when it is accessed, typically such that the mine erases the memory contents. Also, control logic is included that controls access to the plurality of contents. In one aspect, the memory cell array can include a protected-cell zone and a free-cell zone. In this aspect, the security memory device can further include a lock that provides protection for contents stored in the protected-cell zone from access and a key that is capable of unlocking the lock.Type: GrantFiled: September 17, 2008Date of Patent: October 2, 2012Assignee: Macronix International Co., Ltd.Inventors: Minfu Li, Min Nan Yen
-
Patent number: 8281154Abstract: Provided are a computer program product, system, and method to allocate blocks of memory in a memory device having a plurality of blocks. At least one unencrypted memory allocation function coded in an application is executed to request allocation of unencrypted blocks in the memory device. An encrypted memory allocation function coded in the application is executed to request allocation of encrypted blocks in the memory device. At least one unencrypted Input/Output (I/O) request function coded in the application indicating an I/O operation to perform against the unencrypted blocks in the memory device is executed. At least one encrypted I/O request function coded in the application indicating an I/O operation to perform against the encrypted blocks in the memory device is executed.Type: GrantFiled: July 23, 2009Date of Patent: October 2, 2012Assignee: International Business Machines CorporationInventors: Benjamin Jay Donie, Andreas Mattias Koster, Nicole Forsgren Velasquez
-
Patent number: 8274363Abstract: A system and/or method to control access to medication and/or medical supplies may be implemented by providing secured compartments for the medication spread through a medical facility, such as in or adjacent patient rooms and/or connecting locking mechanisms to the secured compartments. Computers positioned throughout the facility are interfaced to respective locking mechanisms to operate the locking mechanism in response to access codes, which may be transmitted over the network. Additional steps may involve programming an authorization computer for providing access codes in whole or part for use with the computers. One or more access points may be functionally coupled to a computer system and/or to the locking mechanism and accessible to users for entry of requests for access to the secured compartment.Type: GrantFiled: September 28, 2007Date of Patent: September 25, 2012Inventor: Roger Goza
-
Patent number: 8269599Abstract: A system and/or method to control access to secured compartments in a facility. Computers positioned throughout the facility are interfaced to respective locking mechanisms to operate the locking mechanism in response to access codes, which may be transmitted over the network. Additional steps may involve programming an authorization computer for providing access codes in whole or part for use with the computers. One or more access points may be functionally coupled to a computer system and/or to the locking mechanism and accessible to users for entry of requests for access to the secured compartment.Type: GrantFiled: September 28, 2007Date of Patent: September 18, 2012Inventor: Roger Goza
-
Patent number: 8271642Abstract: A system, method, and computer program product are provided for isolating a device associated with at least potential data leakage activity, based on user input. In operation, at least potential data leakage activity associated with a device is identified. Furthermore, at least one action is performed to isolate the device, based on user input received utilizing a user interface.Type: GrantFiled: August 29, 2007Date of Patent: September 18, 2012Assignee: McAfee, Inc.Inventors: Srinivasan Sankararaman, Deepakeswaran Kolingivadi
-
Publication number: 20120226910Abstract: A lock and modular system for securing an electronic device. The system includes a device security module that couples to an electronic device and secures the electronic device to its location. A monitor module ensures that the device security module is coupled to the electronic device before a data security module allows the electronic device to operate. The monitor module may also require that the device security module be recognized before the electronic device will operate. If the device security module is coupled and recognized, the user is prompted to provide an encryption key. If the key is correct, the electronic device will operate. The user may have a limited number of attempts to provide the encryption key. If the user makes too many attempts, the electronic device is disabled and the data thereon destroyed. If the device security module is uncoupled during operation, the electronic device is shut down.Type: ApplicationFiled: March 4, 2011Publication date: September 6, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Richard Hutzler, William M. Smith, JR.
-
Patent number: 8255370Abstract: A method and apparatus for scanning structured data from a data repository having an arbitrary data schema and for applying a policy to the data of the data repository are described. In one embodiment, the structured data is converted to unstructured text data to allow a schema-independent policy to be applied to the text data in order to detect a policy violation in the data repository regardless of the data schema used by the data repository.Type: GrantFiled: June 24, 2011Date of Patent: August 28, 2012Assignee: Symantec CorporationInventors: Michel Zoppas, Jeremy Hermann, Conal O'Raghallaigh, Eric Bothwell, Alexander Fontana
-
Patent number: 8252067Abstract: A latch and latch handle recessed into the computer cover is provided, with the latch handle preferably presently a cam surface internally that interacts with a compatible cam surface associated with a lock bar. Preferably, a key lock is functionally integrated with the latch in such a way that when the key lock is unlocked the latch handle and latch are free to displace and to then urge the retention bar to disengage detents or hooks from slots or receptacles, by way of releasing the cover from a chassis or body of the desktop or workstation. Accordingly, in essentially one efficient movement via engaging the latch handle, a user will be able to quickly remove the cover.Type: GrantFiled: March 28, 2008Date of Patent: August 28, 2012Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Timothy S. Farrow, William F. Martin-Otto
-
Patent number: 8241369Abstract: An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device.Type: GrantFiled: October 24, 2011Date of Patent: August 14, 2012Assignee: Absolute Software CorporationInventor: Jon Stevens
-
Patent number: 8241368Abstract: In a method for securing and disabling an electronic device, the electronic device automatically executes a basic input/output system (BIOS) component of a security and tracking service during boot up. The BIOS component automatically determines whether an application component of the security and tracking service has requested disabling of the electronic device. In response to a determination that the application component has requested disabling of the electronic device, the BIOS component automatically displays system information and unlock key. The BIOS component also automatically prompts a user of the electronic device to enter an activation password to re-enable the electronic device. Other embodiments are described and claimed.Type: GrantFiled: July 29, 2010Date of Patent: August 14, 2012Assignee: Softex IncorporatedInventors: Apurva M. Bhansali, Manoj K. Jain, Shradha Dube, Gayathri Rangarajan, Mehul R. Patel, Rayesh K. Raikar, Kamal M. Dhanani, Ranjit Kapila, Elza A. Varghese, Thomas D. Tucker
-
Patent number: 8245315Abstract: Aspects describe remotely diagnosing unauthorized hardware changes on a mobile device. The changes can be identified based on hardware component identification and/or based on behavior characteristics of the device. If an unauthorized change is detected, information relating to that change can be reported to a service provider. Further, actions associated with the authorized change can be automatically implemented or implemented after confirmation to proceed with the recommended action.Type: GrantFiled: September 10, 2008Date of Patent: August 14, 2012Assignee: QUALCOMM IncorporatedInventors: Tia Manning Cassett, Kenny Fok
-
Patent number: 8214913Abstract: A secured computing system and container therefor may comprise: a base for receiving a computing device; a securable first cover for substantially enclosing at least part of the computing device when the first cover is in a first position in the base; a securable second cover for preventing access to the computing device when the second cover is in a secured position, wherein access to the computing device is available when the second cover is not in the secured position. The computing device may be substantially enclosed when the first cover is in the first position in the base and the second cover is in the secured position; and one or more user features of the computing device may be accessible when the first cover is not in the first position in the base. The computing device may include a computer processor or computer peripheral.Type: GrantFiled: April 14, 2009Date of Patent: July 3, 2012Assignee: Panasec CorporationInventors: Kevin Kwong-Tai Chung, Victor Jun Dong
-
Patent number: 8209443Abstract: A system and method for identifying lost/stale peripheral hardware devices connected to an enterprise computer system is disclosed. In one embodiment, a method for identifying lost peripheral hardware devices connected to an enterprise computer system includes initializing system memory by obtaining data structures associated with last detected connected peripheral hardware devices stored in an external database upon reboot, initiating an enterprise computer system wide scanning to obtain the detected data structures associated with current connected peripheral hardware devices during the reboot, and comparing the obtained data structures associated with the last detected connected peripheral hardware devices and the current connected peripheral hardware devices to determine whether there is any chance in system resources associated with the connected peripheral hardware devices during the reboot.Type: GrantFiled: September 18, 2008Date of Patent: June 26, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jeevan Basavaraju, Harish Kuttan, Santosh Ananth Rao
-
Patent number: 8206460Abstract: Described herein are one or more implementations of a security system for one or more protected devices. The security system implements an authentication system that enables protected devices. Protected devices are enabled for a particular network, and are disabled when the protected devices leave the network.Type: GrantFiled: December 5, 2006Date of Patent: June 26, 2012Assignee: Intel CorporationInventor: Joshua Posamentier
-
Patent number: 8182549Abstract: A process is provided for protection against theft of electronic payment terminals utilized in a group including at least two electronic payment terminals organized as a network. The process includes the following steps: mutual detection of the presence of each of the terminals of the group; and transmission of absence information if at least one of the terminals is not detected.Type: GrantFiled: December 5, 2008Date of Patent: May 22, 2012Assignee: Compagnie Industrielle et Financiere d'Ingenierie “Ingencio”Inventor: David Naccache
-
Patent number: 8182548Abstract: An electronic device security and tracking system. A system includes one or more clients, wherein the clients are electronic devices; and a server computer system connected to each of the clients, wherein the server computer system is capable of tracking and locating each of the clients. In one aspect, the server computer system includes one or more web servers coupled to each of the clients, wherein the web servers include a website for the electronic device security and tracking system; one or more file transfer protocol servers coupled to each of the web servers; and one or more database servers connected to each of the web servers.Type: GrantFiled: July 2, 2008Date of Patent: May 22, 2012Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Publication number: 20120124388Abstract: A method and apparatus to deter theft of electronic-devices is disclosed. Electronic-devices have locked and unlocked states that permit deny and permit use of the electronic-device. Electronic-devices are shipped from manufacturers, thorough suppliers, to retailers in the locked state. Unlocking functions are transmitted through computer networks to the retail locations and held in volatile storage. The unlocking of the electronic-device occurs subsequent to purchase. Other methods and apparatus are disclosed related to multiple distribution methods of unlocking schemes, re-locking and return validation and data structures.Type: ApplicationFiled: November 14, 2010Publication date: May 17, 2012Applicant: DiSa DigitalSafety Pte LtdInventors: Weng Wah CHNG, Yang Kwang HAN
-
Patent number: 8176547Abstract: A system requires a user to enter a geometric pattern on an interface device to gain access to the system. After the correct geometric pattern is entered, a timer times a duration before an authenticating password is subsequently entered by the user. If the duration exceeds a predetermined length of time, access to a set of one or more files is at least temporarily prevented. If the user enters the authenticating password before the duration exceeds the predetermined length of time, access to the set of one or more files is granted.Type: GrantFiled: January 24, 2011Date of Patent: May 8, 2012Assignee: Micron Technology, Inc.Inventor: James McKeeth
-
Patent number: 8163035Abstract: This disclosure relates to interference management for a security and tracking system of an electronic device. In one embodiment, during a startup process, an electronic device executes a security program and automatically attempts to access a first web server to ascertain whether the electronic devices has been reported as stolen. In response to an unsuccessful attempt to access the first web server, the electronic device may automatically attempt to access a second web server for data regarding operational status of the first web server. In response to unsuccessful attempts to access the first and second web servers, the electronic device may automatically present an interference alert to provide notification that the electronic device will be disabled if the electronic device continues to experience interference. The electronic device may be automatically disabled in response to a predetermined number of startup sequences with interference. Other embodiments are described and claimed.Type: GrantFiled: October 30, 2007Date of Patent: April 24, 2012Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Patent number: 8151367Abstract: An information processing system includes a management apparatus having a transmission preventing part preventing transmission of a predetermined usage allowing signal allowing usage of a predetermined device, in response to receiving a predetermined usage preventing instruction for the predetermined device.Type: GrantFiled: May 23, 2005Date of Patent: April 3, 2012Assignee: Fujitsu LimitedInventors: Yuzi Kanazawa, Yoshihiro Tsuchiya
-
Publication number: 20120073000Abstract: The present invention relates to an embedded anti-thief system and a method thereof for executing anti-thief procedures, the embedded anti-thief system comprises: a core firmware module, an embedded system module and a cloud server module, wherein the core firmware module is disposed in a firmware device of a portable computer and capable of automatically inspecting the security status of the portable computer when the portable computer is booted. The embedded system module is disposed on a hard disk device of the portable computer and able to communicate with the core firmware module and the cloud server module, so as to confirm the security status of the portable computer. Through the method, the core firmware module and the embedded system module can be loaded and effectively cooperate with the cloud server module for executing the anti-theft procedures for the portable computer at any time.Type: ApplicationFiled: March 3, 2011Publication date: March 22, 2012Applicant: NATIONAL TSING HUA UNIVERSITY (TAIWAN)Inventors: Jang-Ping Sheu, Yi-Chang Chen
-
Patent number: 8137410Abstract: A method for tracking, locating and disabling an electronic device. A method includes checking if an application component operated correctly during last power-up of the device; and placing the device under control of power on self test to proceed with powering-up the device if the application component operated correctly during last device power-up.Type: GrantFiled: July 2, 2008Date of Patent: March 20, 2012Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Patent number: 8140863Abstract: A mobile communications device, server, and method for providing security on a mobile communications device are described.Type: GrantFiled: May 18, 2007Date of Patent: March 20, 2012Assignee: Research In Motion LimitedInventors: Michael S. Brown, Neil Adams, Steven Fyke, Herbert Little
-
Patent number: 8128710Abstract: A system and method for securing and tracking an electronic device. A method includes but is not limited to accepting a selection of a service to erase a hard disk drive in the electronic device; recording that the electronic device has been reported stolen; and erasing the hard disk drive.Type: GrantFiled: October 30, 2007Date of Patent: March 6, 2012Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Patent number: 8132021Abstract: An information processing apparatus has a decrypting part configured to receive decrypting key information from a managing apparatus which manages the decrypting key information for decrypting information to decrypt the information; a monitoring part configured to communicate with the managing apparatus, after the decrypting until the information is encrypted again, and a terminating part configured to terminate processing carried out on the information, when the monitoring part cannot receive a predetermined response from the managing apparatus.Type: GrantFiled: July 25, 2007Date of Patent: March 6, 2012Assignee: Fujitsu LimitedInventor: Naozumi Anzai