Theft Prevention Patents (Class 726/35)
  • Patent number: 10438467
    Abstract: This disclosure provides a portable object detection system and method. The system includes a first cluster network, a family cluster network, and a detection server. The first cluster network includes a portable object coupled with a small communication device (SCD), a first cluster head device (first CHD) including a smartphone that registers the SCD prior to monitoring, and performs mutual monitoring between the SCD and the first CHD. The detection server manages the first CHD and a second CHD, and when the detection server receives a loss event from the first CHD in the first cluster network, it requests a mutual search by the second CHD for the SCD as a lost target in the first cluster network. The mutual monitoring in a first cluster network adjusts a message transmission interval and a radio transmission power depending on collected parameters such as the SCD's location information, mobility, power capacity, and others.
    Type: Grant
    Filed: June 19, 2017
    Date of Patent: October 8, 2019
    Inventors: Myongsu Choe, Seyoung Choe
  • Patent number: 10425819
    Abstract: A mobile device is provided. The mobile device includes an activity sensor for generating data, a channel controller configured to determine the user presence based on the data obtained through the activity sensor, and a communication interface for communicating with an external network. The channel controller is configured to block or disable the communication between a source on the mobile device and the external network when the channel controller determines a lack of the user presence for a predetermined time.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: September 24, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Kunal Patel, John S. Morrison, Robert L. Harrison
  • Patent number: 10182345
    Abstract: A system is provided for recovering a mobile device by enabling an authorized user to remotely change the profile of the device to assist others in returning the device to the user. Initially, a user registers the mobile device with a recovery assist server. When the user is unable to locate the device because it is, for example, lost or stolen, the user indicates with the server that the device is missing. The device and the server are configured to communicate with each other, for example, periodically or, in another example, on device start up. If the device is identified as missing on the server, the operation of the mobile device is configured based on a missing profile associated with the mobile device. Once the device is located, the user indicates with the server that the device is no longer missing. When the device is unidentified as missing on the server, the operation of the mobile device is configured based on a user profile associated with the mobile device.
    Type: Grant
    Filed: April 21, 2015
    Date of Patent: January 15, 2019
    Assignee: EXCALIBUR IP, LLC
    Inventors: Tomi Blinnikka, Jeffery Bennett
  • Patent number: 10175675
    Abstract: A machine tool system includes a portable operation terminal capable of operating an industrial machine by wireless communication and including a terminal body including an external connector that is able to receive image information about an image and a communicator that is able to transmit the image information received by the external connector.
    Type: Grant
    Filed: May 8, 2015
    Date of Patent: January 8, 2019
    Inventor: Hidetsugu Kawai
  • Patent number: 10031721
    Abstract: A system and method for processing user speech commands in a voice interactive system is disclosed. Users issue speech phrases on a local device in a premises network, and the local devices first determine if the speech phrases match any commands in a set of local control commands. The control commands, in examples, can activate and deactivate premises devices such as “smart” televisions and simpler lighting devices connected to home automation hubs. In the event of a command match, local actions associated with the commands are executed directly on the premises devices in response. When no match is found on the local device, the speech phrases are sent in messages to a remote server over a network cloud such as the Internet for further processing. This can save on bandwidth and cost as compared to current voice recognition systems.
    Type: Grant
    Filed: May 15, 2015
    Date of Patent: July 24, 2018
    Assignee: Tyco Safety Products Canada Ltd.
    Inventors: Andrei Bucsa, Stephen D. W. Fosty, Gregory W. Hill
  • Patent number: 10013583
    Abstract: An electronic device of an aspect of the present disclosure includes an underwater detection unit and at least one processor. The underwater detection unit is configured to detect whether or not the electronic device is underwater. The at least one processor is configured to determine whether or not the electronic device has been lost when the underwater detection unit detects that the electronic device is underwater. The at least one processor is configured to determine that the electronic device has been lost when a predetermined condition is satisfied.
    Type: Grant
    Filed: July 25, 2016
    Date of Patent: July 3, 2018
    Assignee: KYOCERA Corporation
    Inventors: Masatoshi Nonogaki, Yuuko Aoki
  • Patent number: 9825804
    Abstract: Devices and methods are provided for monitoring terminal devices. For example, one or more first terminal devices are scanned; one or more first identifications of the first terminal devices are recorded; a first list including the first identifications of the first terminal devices is generated; one or more second identifications of one or more second terminal devices are retrieved from a stored second list, the second terminal devices being scanned previously; the second identifications and the first identifications are compared; and in response to the second identifications being different from the first identifications, an alarm message is output.
    Type: Grant
    Filed: January 7, 2015
    Date of Patent: November 21, 2017
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventors: Shouqiang Qin, Yuan Zhang
  • Patent number: 9805220
    Abstract: According to one embodiment, an electronic apparatus includes a processor configured to operate based on a clock, the processor includes a register in which a value added in accordance with the clock is stored, and a memory configured to store first period information indicating a first period in which a file is accessible. The processor is configured to acquire first time and date information indicating a first time and date from an external device, calculate a second time and date indicating a present time and date based on the first time and date information and the value, and restrict access to a resource of the electronic apparatus, when the second time and date does not correspond to the first period.
    Type: Grant
    Filed: May 21, 2015
    Date of Patent: October 31, 2017
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Tatsuo Yamaguchi, Yuki Kanbe
  • Patent number: 9792453
    Abstract: A method and system are disclosed for placing a computer in a safe and secure lock down state from a remote location using a remote command device such as a cellular telephone. The method and system includes optional security provisions before restarting the computer.
    Type: Grant
    Filed: September 26, 2007
    Date of Patent: October 17, 2017
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David Carroll Challener, Daryl Cromer, Howard Locker, Randall Scott Springfield
  • Patent number: 9711095
    Abstract: According to one embodiment, an electronic apparatus includes a first detector, a second detector, a third detector and a security controller. The first detector detects a speed of movement of the electronic apparatus. The second detector detects a direction of the movement. The third detector detects whether the electronic device is located in a first area. The security controller updates position information wherein the position information is indicative of a first position in the first area, and executes a monitoring process based on the position information, detection information of the first detector and detection information of the second detector.
    Type: Grant
    Filed: April 16, 2015
    Date of Patent: July 18, 2017
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Tadashi Tsuji
  • Patent number: 9648041
    Abstract: A security management system managing security of plural types of client apparatuses which are mutually connected to each other via a network, includes an acquisition unit acquiring or receiving information which is used to change a security level of any of the client apparatuses; a determination unit determining a specific client apparatus whose security setting value is to be changed and a security setting value to be applied to the specific client apparatus, in response to the acquired or received information to change the security level of any of the client apparatuses, based on a definition table defining the security levels of the plural types of client apparatuses; and a notification unit notifying the specific client apparatus of the security setting value to be applied to the specific client apparatus.
    Type: Grant
    Filed: April 10, 2014
    Date of Patent: May 9, 2017
    Assignee: RICOH COMPANY, LTD.
    Inventors: Yutaro Nishimura, Susumu Fujioka
  • Patent number: 9638805
    Abstract: Embodiments provide a satellite navigation receiver. The satellite navigation receiver has a receiver unit and a transmitter or a controller. The receiver unit is configured to receive and process a satellite navigation signal from a satellite navigation system at the certain time, to obtain a received signal, the received signal having a first component in a digital form, wherein the first component in the digital form is encrypted. The transmitter is configured to transmit the first component in the digital form together with an identification of a user of the satellite navigation receiver at the certain time. The controller is configured to store the first component in the digital form on a non-volatile storage medium in association with other data representing an information from a location, at which the satellite navigation receiver was located at the certain time.
    Type: Grant
    Filed: July 5, 2013
    Date of Patent: May 2, 2017
    Inventors: Alexander Ruegamer, Manuel Stahl, Guenter Rohmer
  • Patent number: 9549290
    Abstract: A method performed by an apparatus includes scanning at least one of multiple radio frequencies using at least two beamforming antennas of a plurality of beamforming antennas coupled to the eyewear and detecting, on a first scanned radio frequency, first externally emitted radio energy. The method further includes identifying a first wireless device using the detected first externally emitted radio energy and determining a first direction of the first wireless device relative to the eyewear.
    Type: Grant
    Filed: January 8, 2014
    Date of Patent: January 17, 2017
    Assignee: Google Technology Holdings LLC
    Inventor: Dwight R. Smith
  • Patent number: 9537882
    Abstract: Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O interface, responsive to the detection that the first device is coupled with the first I/O interface, temporarily disabling data communication between the first and second I/O interfaces, acquiring a file from the detected first device via the first I/O interface, determining whether the acquired file poses a security threat, and responsive to a determination that the acquired file does not pose a security threat, enabling the data communication between the first and second I/O interfaces.
    Type: Grant
    Filed: December 19, 2014
    Date of Patent: January 3, 2017
    Inventors: Christopher Perry Patteson, Edward Michael Maier, Michael Jesse Mings
  • Patent number: 9521523
    Abstract: A method for predicting lost mobile devices. The method includes, identifying, by one or more processors, one or more pre-designated locations, where each of the one or more pre-designated locations contains devices and a main device to be tracked. The one or more processors receive information from the devices. The one or more processors derive a common usage pattern of the main device based on, the information from the devices. The pattern is associated with a location of the main device. The one or more processors determine whether the main device follows substantially all of the common usage pattern. Finally, in response to determining the main device does not follow substantially all of the common usage pattern, the one or more processors sends at least one different types of alerts to at least one predetermined device of the devices.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: December 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: James E. Bostick, John M. Ganci, Jr., Martin G. Keen, Sarbajit K. Rakshit
  • Patent number: 9473507
    Abstract: Methods and systems for proximity-based access control include determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor; and activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device.
    Type: Grant
    Filed: January 3, 2013
    Date of Patent: October 18, 2016
    Inventors: Paul C. Castro, Yunwu Huang, Marco Pistoia, Umut Topkara
  • Patent number: 9401935
    Abstract: A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration. The method further includes initiating restoration procedures by performing an initial registration.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: July 26, 2016
    Assignee: BlackBerry Limited
    Inventors: Jan Hendrik Lucas Bakker, Adrian Buckley, Andrew Allen
  • Patent number: 9379953
    Abstract: Network connectivity is selectively established by monitoring, on a client, communications activity incident to accessing a network, the communications activity including a request to access the network. An application associated with the communications activity is be identified. A communications configuration associated with the application is accessed, the communications configuration indicating how the application is configured to access the network. Network connectivity is selectively established based on the communications configuration, and the application may be enabled to access the network to support the communications activity.
    Type: Grant
    Filed: November 18, 2013
    Date of Patent: June 28, 2016
    Assignee: AOL INC.
    Inventor: Philip W. Flack
  • Patent number: 9313190
    Abstract: Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a processor, a memory, and an access restriction module stored in the memory. The module is typically configured for: integrating one or more account access channels associated with the user's account with an access restriction procedure; receiving a request from the user to implement the access restriction procedure; based on receiving the request from the user to implement the access restriction procedure, implementing the access restriction procedure, wherein implementing the access restriction procedure comprises restricting access to the user's account via the account access channel(s).
    Type: Grant
    Filed: February 7, 2014
    Date of Patent: April 12, 2016
    Assignee: Bank of America Corporation
    Inventors: David M. Grigg, Hood Qaim-Maqami, Alicia C. Jones, Elizabeth S. Votaw, Joseph Neil Johansen, Charles Jason Burrell, Carrie Anne Hanson, Michael Patrick Lynch
  • Patent number: 9143509
    Abstract: A system for assessing a computer device's state may collect state data about the device, then assess the state with respect to the policy for granting one or more claims. Each claim may be defined by a set of requirements that, if fulfilled, may be used to permit or deny access to a resource, such as an application, network, data, or other resource. A collection engine may reside on the device or other location and may collect requested data, and some collection engines may be extensible with a plugin architecture for expansion. A server may receive information from the device to evaluate claims. Depending on the use scenario, the claim results may be incorporated into communications and passed to an evaluator that may produce an access token which is used to permit or deny access based on the claim results.
    Type: Grant
    Filed: May 20, 2011
    Date of Patent: September 22, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Daniel Rose, Amos Ortal, Boaz Feldbaum, Avihai Dgany, Elan Levy, Raanan Zvi, Yoav Yassour
  • Patent number: 9131381
    Abstract: A mobile computing device may automatically determine an occurrence of a security event associated with the device, and automatically erase all software and data on the device. The security event may be the mobile computing device being unlocked and away from a trusted location or user associated with the device, or the device moving a pre-determined distance over a pre-determined amount of time while unlocked, or a user performing an incorrect touch gesture to unlock the mobile computing device, or entry of an incorrect password a pre-determined consecutive number of times. The mobile computing may display a visual cue to the user to prompt the user to perform the incorrect touch gesture. Software and data on the mobile computing device may be automatically erased without receiving instructions from another computing device, or may be erased when the mobile computing device establishes a network connection with another computing device.
    Type: Grant
    Filed: October 26, 2012
    Date of Patent: September 8, 2015
    Assignee: Facebook, Inc.
    Inventor: Jason S. Sobel
  • Patent number: 9106670
    Abstract: A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level.
    Type: Grant
    Filed: February 15, 2013
    Date of Patent: August 11, 2015
    Assignee: BlackBerry Limited
    Inventors: Michael Kenneth Brown, Michael Stephen Brown, Herbert Anthony Little, Scott William Totzke
  • Patent number: 9083624
    Abstract: A mobile device, e.g. portable computer, location tracking and data backup-and-wipe system and method enable a lost or stolen device to be recovered by reporting to its rightful owner and optionally to others its approximate location via triangulation and the use of location service providers. Social network members may be made aware automatically of the location of a reported lost or stolen device and can assist the rightful owner in recovering it based upon their identification of the user of the device, whether by the location coordinates or by viewing a photographic image taken by the computer. Alternatively, in governmental and/or institutional settings having privacy concerns, no photographic images are sent to a public website. Instead, they are sent to a proprietary employer server and maintained behind an institutional firewall.
    Type: Grant
    Filed: October 23, 2009
    Date of Patent: July 14, 2015
    Assignee: ActiveTrak, Inc.
    Inventor: Kenneth Vernon Westin
  • Patent number: 9060103
    Abstract: Tampering with doorbells can lead to injury and doorbell theft. Methods and systems can discourage doorbell tampering by emitting an alert when a doorbell detects tampering. In some embodiments, a doorbell includes a system to detect movement of the outer housing of the doorbell. In several embodiments, if a doorbell detects movement of the outer housing while the doorbell detects that it is connected to an external power supply, the doorbell can emit an alert to warn against additional tampering.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: June 16, 2015
    Assignee: SkyBell Technologies, Inc.
    Inventor: Joseph Frank Scalisi
  • Patent number: 9039785
    Abstract: A security device for functional display, security, and charging of a handheld electronic device is disclosed. The device comprises a universal clamping apparatus with an integrated alarm sensor and charging port to prevent theft of handheld electronic devices without hindering customer inspection thereof while providing charging of the battery of the devices.
    Type: Grant
    Filed: February 8, 2012
    Date of Patent: May 26, 2015
    Assignee: Scorpion Security Products, Inc.
    Inventor: Franklyn W. Gulick, Jr.
  • Patent number: 9026788
    Abstract: In a centralized credential management system, website credentials are stored in a vault storage at a vault. The website credentials are encrypted based upon a key not available to the vault and are for authenticating a user to a third party website. Through a client, a user authenticates to the vault and retrieves the encrypted website credentials and parameters and code for properly injecting the credentials into a website authentication form. The website credentials are decrypted at the client and injected into the authentication form using the parameters and code.
    Type: Grant
    Filed: April 25, 2013
    Date of Patent: May 5, 2015
    Assignee: Symantec Corporation
    Inventors: Barry Ferg, Gary Krall, David M'Raihi, Nicolas Popp
  • Patent number: 9015472
    Abstract: Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message is human originated are received. Then, the fact that the electronic message is human originated is conveyed to one or more recipients of the electronic message by associating with the electronic message a human origination indication.
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: April 21, 2015
    Assignee: McAfee, Inc.
    Inventor: C. Scott Chasin
  • Patent number: 9003544
    Abstract: A mobile device and associated method and computer-readable medium, wherein the device is configurable for data protection readiness. A preparation module is configured to perform preprocessing to prepare the mobile device for data protection readiness, the preprocessing includes: indicating certain items of data stored in the data storage arrangement which are of personal importance to an owner of the mobile device; indicating criteria that defines a situation for which the items of data of personal importance are to be secured; and indicating a set of actions to be carried out to secure the items of data of personal importance. A protection module is configured to monitor for an occurrence of the situation for which the items of data of personal importance are to be secured based on the criteria indicated by the preparation module, and to execute the set of actions indicated by the preparation module in response to a detection of the occurrence of the situation.
    Type: Grant
    Filed: July 26, 2011
    Date of Patent: April 7, 2015
    Assignee: Kaspersky Lab ZAO
    Inventors: Sergey V. Nevstruev, Oleg V. Nevstruev, Andrey V. Matveev
  • Publication number: 20150096062
    Abstract: The position information acquisition unit acquires the first current position information of the multifunction peripheral and the second current position information of HDD. The position information determination unit executes the first determination whether or not the first current position information is identical with the first registered position information and the second determination whether or not the second current position information is identical with the second registered position information.
    Type: Application
    Filed: September 26, 2014
    Publication date: April 2, 2015
    Inventor: Yoshiaki TAMURA
  • Patent number: 8992631
    Abstract: Systems and methods of theft prevention of communication devices are provided. In one embodiment, the method may include, for example, one or more of the following: registering a communication device being used at a home, where the device is connected to a communication network; entering validation information relating to the communication device; and analyzing the validation information to determine whether the communication device is authorized for use in the communication network.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: March 31, 2015
    Assignee: Broadcom Corporation
    Inventors: Jeyhan Karaoguz, James D. Bennett
  • Publication number: 20150089675
    Abstract: A security device for allowing functional display and charging of handheld electronic devices is disclosed. The security device includes clamps with channels configured to press against and grip the edges of the handheld electronic device. In some embodiments, the security device includes a charging/data connector onto which the charging/data port of the handheld security device can be mounted.
    Type: Application
    Filed: May 9, 2013
    Publication date: March 26, 2015
    Applicant: Scorpion Secruity Products, Inc.
    Inventor: Franklyn W. Gulick, JR.
  • Patent number: 8988233
    Abstract: A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly operative to sense when the housing is opened and tamper indication circuitry operative to receive an input from the at least one case-open switch assembly and to provide an output indication of possible tampering with the data entry circuitry located within the housing. The at least one case-open switch assembly includes an arrangement of electrical contacts arranged on a base surface and a resiliently deformable conductive element, which defines a short circuit between at least some of the arrangement of electrical contacts only when the housing is closed.
    Type: Grant
    Filed: May 8, 2014
    Date of Patent: March 24, 2015
    Assignee: Verifone, Inc.
    Inventors: Richard H. H. Neo, Mehran Mirkazemi-Moud, John Henry Barrowman, Christian Eric Schulz
  • Patent number: 8989809
    Abstract: A mobile terminal using a common antenna to perform an NFC function and an FM-TX function is provided. The mobile terminal includes a baseband chip, an NFC chip, an FM chip, and an antenna. The NFC chip and the FM chip are connected to the baseband chip. The mobile terminal also comprises a selecting unit connected to the baseband chip, the NFC chip, the FM chip, and the antenna, for conducting the NFC chip and the antenna or conducting the FM chip and the antenna based on a control of the baseband chip. The mobile terminal proposes a single antenna for performing the NFC function and the FM-TX function. A passage between corresponding functions is conducted through the selecting unit. It is unnecessary to use an additional antenna inside the mobile terminal. Thus, the mobile terminal has more spacious capacity, and the cost of the mobile terminal is reduced.
    Type: Grant
    Filed: April 17, 2012
    Date of Patent: March 24, 2015
    Assignee: Huizhou TCL Mobile Communication Co., Ltd.
    Inventors: Jianliang Gu, Zihua Lin, Lei Zhang
  • Patent number: 8974544
    Abstract: An approach is provided for remotely configuring a mobile device designated as missing. A request to remotely configure the mobile device is received. In response to the request, at least one setting parameter specifying at least one action to be performed by the mobile device is retrieved. A control message specifying the at least one setting parameter is generated. It is determined whether the mobile device is network inaccessible. The control message is queued for transmission over a data channel to the mobile device when the mobile device is determined to be network inaccessible.
    Type: Grant
    Filed: December 16, 2009
    Date of Patent: March 10, 2015
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Paul Hubner, Steven T. Archer, Robert A. Clavenna, Kristopher A. Pate
  • Patent number: 8973154
    Abstract: Some embodiments provide a method for authenticating a user to access computing resources that uses transient event data regarding previous interactions of the user with the computing resources. The method receives a notification that a user is unable to provide a correct user identifier and password. The method generates authentication questions for the remote user using the transient event data. The authentication questions are presented to the user. The method authenticates the user based on answers to the password recovery questions. The user may be a remote user and the computing resources are a set of application servers to which the user has forgotten a password. The computing resources may be a portable device that the user wishes to access remotely in order to delete data from the portable device.
    Type: Grant
    Filed: February 2, 2010
    Date of Patent: March 3, 2015
    Inventor: Kazu Yanagihara
  • Patent number: 8972679
    Abstract: A method for managing a storage device including identifying a lock timing for the storage device when coupling to a device, transitioning the storage device into a locked state in response to detecting the storage device decoupling from the device, and configuring the storage device to remain in the locked state if the storage device is re-coupled to the device after the lock timing has elapsed.
    Type: Grant
    Filed: April 12, 2010
    Date of Patent: March 3, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Leonard E Russo, Valiuddin Y Ali, Walter A Gaspard, Christoph J Graham
  • Patent number: 8961619
    Abstract: Securing access to a portable electronic device (PED), securing e-commerce transactions at an electronic device (ED) and dynamically adjusting system settings at a PED are disclosed. In an example, usage or mobility characteristics of the PED or ED (e.g., a location of the ED or PED, etc.) are compared with current parameters of the PED or ED. A determination as to whether to permit an operation (e.g., access, e-commerce transaction, etc.) at the ED or PED can be based at least in part upon a degree to which the current parameters conform with the usage or mobility characteristics. In another example, at least a current location of a PED can be used to determine which system settings to load at the PED.
    Type: Grant
    Filed: January 6, 2009
    Date of Patent: February 24, 2015
    Assignee: QUALCOMM Incorporated
    Inventor: Arnold Jason Gum
  • Patent number: 8954753
    Abstract: Provided are a computer program product, system, and method to allocate blocks of memory in a memory device having a plurality of blocks. An unencrypted memory allocation function requests allocation of unencrypted blocks in the memory device. An encrypted memory allocation function requests allocation of encrypted blocks in the memory device. An unencrypted Input/Output (I/O) request performs an I/O operation against the unencrypted blocks in the memory device. An encrypted I/O request function performs an I/O operation against the encrypted blocks in the memory device. An operating system uses an encryption key associated with the encrypted blocks to encrypt or decrypt data in the encrypted blocks to perform the encrypted I/O operation in response to processing the encrypted I/O request functions, wherein the unencrypted and encrypted memory allocation functions and unencrypted and encrypted I/O request functions comprise different functions in a library of functions available to the application.
    Type: Grant
    Filed: June 13, 2012
    Date of Patent: February 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: Benjamin Jay Donie, Andreas Mattias Koster, Nicole Forsgren Velasquez
  • Patent number: 8954624
    Abstract: The pureness of a connection between an external device and a host computer can be inspected or monitored to determine the status: connected or disconnected. When it is determined that a disconnection state is entered, an indication can be sent to the host and, in parallel, the data transportation from and/or to the external device may be manipulated. In some embodiments an exemplary connection protector device (CPD) may be added to the connection in between the external device and the host. The CPD can have two connectors one for the host and one for the cable of the external device. The CPD can be adapted to identify any disconnection in the connection with the host and/or the connection with the external device on the other side of the CPD.
    Type: Grant
    Filed: October 4, 2006
    Date of Patent: February 10, 2015
    Assignee: Safend Ltd.
    Inventors: Avner Rosenan, Zvi Gutterman, Dor Skuler, Gil Sever
  • Patent number: 8932368
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Grant
    Filed: September 3, 2008
    Date of Patent: January 13, 2015
    Assignee: Yougetitback Limited
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20150007355
    Abstract: Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device.
    Type: Application
    Filed: September 18, 2014
    Publication date: January 1, 2015
    Inventors: Bran FERREN, W. Daniel HILLIS
  • Patent number: 8925100
    Abstract: A data protection system selectively deletes data from an electronic device when the device is reported as lost or stolen, or when another data protection triggering event occurs. Different data files may, for example, be treated differently depending on when such files were created. For example, data files that were created while the computing device was known to be in the owner's possession may be deleted, while data files created after the electronic device left the owner's possession may be left intact (since they may have been created by an innocent user). Data files created between these two points in time may be quarantined so that they later be restored, if appropriate.
    Type: Grant
    Filed: April 11, 2013
    Date of Patent: December 30, 2014
    Assignee: Absolute Software Corporation
    Inventor: Robert Chase
  • Patent number: 8918893
    Abstract: A microcontroller is awakened from a lower power state in response to a trigger indication indicative of a fault condition. After the awakening, the microcontroller performs a security action with respect to secret information in the security module in response to the fault condition.
    Type: Grant
    Filed: October 29, 2012
    Date of Patent: December 23, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Ted A. Hadley
  • Patent number: 8915971
    Abstract: A lock and modular system for securing an electronic device. The system includes a device security module that couples to an electronic device and secures the electronic device to its location. A monitor module ensures that the device security module is coupled to the electronic device before a data security module allows the electronic device to operate. The monitor module may also require that the device security module be recognized before the electronic device will operate. If the device security module is coupled and recognized, the user is prompted to provide an encryption key. If the key is correct, the electronic device will operate. The user may have a limited number of attempts to provide the encryption key. If the user makes too many attempts, the electronic device is disabled and the data thereon destroyed. If the device security module is uncoupled during operation, the electronic device is shut down.
    Type: Grant
    Filed: March 4, 2011
    Date of Patent: December 23, 2014
    Assignee: International Business Machines Corporation
    Inventors: Richard Hutzler, William M. Smith, Jr.
  • Publication number: 20140373185
    Abstract: An anti-theft method for a computer system including a detection module, a photographing module and a controlling module is disclosed. The anti-theft method includes when the computer system is off, the detection module determines whether a predetermined event occurs for generating a detection signal; the controlling module initiates the computer system according to the detection signal, such that the computer system operates a basic input/output system (BIOS); and when the computer system operates the BIOS, an anti-theft operation is initiated to control the photographing module for capturing a digital information.
    Type: Application
    Filed: February 20, 2014
    Publication date: December 18, 2014
    Applicant: Wistron Corporation
    Inventor: Yung-Yen Chang
  • Publication number: 20140373184
    Abstract: A security application program provides features to help users recover their stolen mobile communication devices. The security application program may be pre-loaded into a system partition of the mobile device so that the security application program will not be erased during a wipe or factory reset of the mobile device. An owner registration service may be provided to help verify ownership of the mobile device.
    Type: Application
    Filed: June 12, 2013
    Publication date: December 18, 2014
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, Samir Vilas Gupte, Ankur Bharatbhushan Nandwani
  • Patent number: 8911507
    Abstract: A computer-implemented method for mitigating mobile device loss may include (1) identifying historical data specifying a plurality of past locations of a mobile computing device, (2) identifying a current location of the mobile computing device, (3) determining that the current location deviates from an expected location based on the historical data, and (4) performing a security measure on the mobile computing device in response to determining that the current location deviates from the expected location. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 22, 2011
    Date of Patent: December 16, 2014
    Assignee: Symantec Corporation
    Inventors: Alan Gilbert, Jim Casaburi
  • Patent number: 8906114
    Abstract: A method and apparatus are disclosed for detecting the removal of a device connected to a network. The present invention generates an alarm on a protected device when an unauthorized user disconnects the device from a network connection. The network connection is monitored and an alarm is generated if the protected device is disconnected from the network connection without proper notification to the theft protection utility. A number of fail-safe features can optionally be employed to ensure that the theft protection aspects of the present invention are not bypassed. For example, the theft protection utility process can employ speaker, volume and/or power control features to ensure that the alarms generated by the present invention, or the theft protection feature itself, cannot be bypassed.
    Type: Grant
    Filed: May 18, 2009
    Date of Patent: December 9, 2014
    Assignee: Agere Systems LLC
    Inventors: Jalaludeen Ca, Nandakumar Gn
  • Patent number: 8902066
    Abstract: A computer process is disclosed for assessing the risk of theft or loss of electronic devices in particular locations. The risk assessments may be based on data regarding reported theft and/or loss events, and based on data regarding current locations of user devices. The risk assessments may be used to generate location-based alerts.
    Type: Grant
    Filed: June 5, 2014
    Date of Patent: December 2, 2014
    Assignee: Absolute Software Corporation
    Inventors: Timothy Parker, Damien Gerard Loveland
  • Publication number: 20140338006
    Abstract: Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Methods are provided for detecting that a security event has occurred on a portable electronic device and then establishing an audio transmission between the device and one or more clients, and in some embodiments, sending a command to initiate the audio transmission. The detection of a security event may be based on, for example, detecting that the device has been turned on, detecting movement of the device, detecting that an incorrect password has been entered, the device camera has been used, contacts have been added or deleted, the SIM card as been removed or replaced, application programs have been installed or uninstalled from the device, or uncharacteristic behavior has been detected.
    Type: Application
    Filed: July 23, 2014
    Publication date: November 13, 2014
    Inventors: Vance Grkov, David Richardson, Ayan Mandal, Cherry Mangat, Kevin Patrick Mahaffey