Theft Prevention Patents (Class 726/35)
-
Patent number: 12141337Abstract: An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.Type: GrantFiled: May 31, 2023Date of Patent: November 12, 2024Assignee: TEXAS INSTRUMENTS INCORPORATEDInventor: Veeramanikandan Raju
-
Patent number: 12111937Abstract: A technique includes an operating system agent of a computer system monitoring a process to detect whether an integrity of the process has been compromised. The monitoring includes the operating system agent scanning a data structure. The process executes in a user space, and the data structure is part of an operating system kernel space. The technique includes a hardware controller of the computer system listening for a heartbeat that is generated by the operating system agent. The hardware controller takes a corrective action in response to at least one of the hardware controller detecting an interruption of the heartbeat, or the operating system agent communicating to the hardware controller a security alert for the process.Type: GrantFiled: March 21, 2023Date of Patent: October 8, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Geoffrey Ndu, Nigel John Edwards
-
Patent number: 12010228Abstract: Provided herein is a system, device, method, and subnetwork for performing a secure blockchain transaction of a digital asset. The system includes a terminal for generating the blockchain transaction, the terminal configured to operate in a first mode and a second mode, and a switch connector for preventing the terminal from operating in the first mode and the second mode simultaneously. When the terminal is in the first mode, the terminal is connected via a network to a system provider server, the system provider server in communication with a plurality of blockchain devices. When the terminal is in the second mode, the terminal is in communication with a cold storage device. The cold storage device is configured to store a private key for signing the blockchain transaction. The terminal is configured to sign the blockchain transaction on the cold storage device using the private key.Type: GrantFiled: March 27, 2019Date of Patent: June 11, 2024Assignee: Kelvin Zero Inc.Inventors: Philippe Desmarais, Thierry St-Jacques-Gagnon
-
Patent number: 11876816Abstract: To promptly investigate the cause of interruption of Ethernet communication. An anomaly monitoring device includes a power supply, an Ethernet port, an anomaly determination unit configured to determine whether or not an anomaly related to Ethernet communication has occurred between a peripheral device and a control device, an information collection unit configured to collect operation information about operation of the peripheral device when the anomaly determination unit determines that an anomaly related to the Ethernet communication has occurred, and an information transmission unit configured to transmit the collected operation information outside via the Ethernet port, on the basis of the Ethernet communication.Type: GrantFiled: April 23, 2020Date of Patent: January 16, 2024Assignee: FANUC CORPORATIONInventor: Kiyoshi Yoshino
-
Patent number: 11876323Abstract: A power supply assembly includes a power supply unit disposed within a housing and an adjustable plate module movably disposed on a floor thereof. The adjustable plate module includes a plate, a shaft, a stopper panel, and a compressible device. The plate has two planar surfaces positioned at different heights with respect to the floor. The shaft is fixedly coupled to and extends outwardly from the plate. The shaft is configured to move between a first position and a second position to transition a connector between the planar surfaces. The stopper panel is disposed adjacent to a distal end of the shaft and has an opening therein for accommodating the shaft. The compressible device is disposed around the shaft such that a displacement of the plate causes the compressible device to compress against the stopper panel and facilitate movement of the shaft from the first position to the second position.Type: GrantFiled: November 15, 2021Date of Patent: January 16, 2024Assignee: QUANTA COMPUTER INC.Inventors: Yaw-Tzorng Tsorng, Jen-Jia Liou, Chun-Chen Hsu
-
Patent number: 11552781Abstract: In some examples, a method includes receiving a plaintext message including plaintext data and error detection bits. The method also includes encrypting the plaintext message based on a feedback algorithm to generate an encrypted message including a set of encrypted bits for error detection, cryptographic integrity, and cryptographic authentication. The set of encrypted bits for error detection, cryptographic integrity, and cryptographic authentication can replace the error detection bits in whole or in part. A receiver can confirm the cryptographic integrity and the cryptographic authentication of the encrypted message by decrypting the set of encrypted bits.Type: GrantFiled: April 5, 2019Date of Patent: January 10, 2023Assignee: Honeywell International Inc.Inventor: Kevin Raymond Driscoll
-
Patent number: 11388246Abstract: A method for providing information about an object is proposed. The method contains determining a usage profile of the object based on a measurement performed by at least one sensor of the object and storing the usage profile. The usage profile can be compared with a standard profile of the object. Based on a result of the comparison information about a usage of the object can be provided. A corresponding object providing information is proposed.Type: GrantFiled: February 20, 2019Date of Patent: July 12, 2022Assignee: SONY CORPORATIONInventors: Conor Aylward, Philip Marivoet
-
Patent number: 11251962Abstract: A security code module is provided that a developer may include in an application. The application, when downloaded onto a mobile communications device, includes the security code module. The security code module then initiates a request to a server to determine the status of the mobile communications device. When the status indicates that the mobile communications device is not in the possession of the registered owner, a security component on the server performs an action in response.Type: GrantFiled: November 15, 2019Date of Patent: February 15, 2022Assignee: LOOKOUT, INC.Inventors: Marc William Rogers, Brian James Buck
-
Patent number: 11190546Abstract: According to some embodiments, an electronic device can implement a failsafe action. The system comprises a processor and a computer-readable medium comprising processor executable instructions, that when executed by the processor, performs a method, the method comprises receiving a first antidote message within a first time interval. Based on receiving the first antidote message, continuing normal operation of the electronic device is continued. The electronic device waits for reception of a second antidote message within a second time interval. A determination is made that the second antidote message was not received within the second time interval. In response to determining that the second antidote message was not received, implementing a first failsafe action.Type: GrantFiled: May 31, 2019Date of Patent: November 30, 2021Inventors: Ivy Wong, Ella Xue
-
Patent number: 11151274Abstract: A computer-implemented method for providing new data object metadata, and by enhancing the scope of OS functionality, block the exfiltration and corruption of data (including ransomware) by cybercriminals and insiders.Type: GrantFiled: September 19, 2017Date of Patent: October 19, 2021Inventor: Elias Haddad
-
Patent number: 11121505Abstract: A system is provided comprising of a first plug module and a second plug module, which can be plugged together, wherein the first plug module has a locking arrangement, whereby the plug modules can be reversely locked to each other. The system can be arranged within the housings of industrial plugs and is thus better protected from mechanical loads.Type: GrantFiled: August 6, 2018Date of Patent: September 14, 2021Assignee: Harting Electric GmbH & Co. KGInventors: Christian Vollmer, Till Riechmann, Malte Frerking
-
Patent number: 11109189Abstract: An electronic device includes a display screen, a communication unit, a processor, and a storage. The display screen displays a lost-and-found interface when the display screen is in a lock-screen state. Personal information input by the finder into the lost-and-found interface and identification information of the electronic device are obtained. The personal information input by the finder and the identification information of the electronic device are sent to a lost-and-found tracking device in communication with the electronic device. The lost-and-found tracking device obtains personal information of an owner of the electronic device according to the identification information of the electronic device and determines a method for returning the electronic device to the owner according to the personal information of the finder and the personal information of the owner.Type: GrantFiled: April 20, 2018Date of Patent: August 31, 2021Assignees: Fu Tai Hua Industry (Shenzhen) Co., Ltd., HON HAI PRECISION INDUSTRY CO., LTD.Inventor: Cheng-Xiang Liu
-
Patent number: 11005827Abstract: A method and apparatus for acquiring vehicular data. An embodiment of the method includes: acquiring vehicular data of an autonomous vehicle equipped with a vehicular data acquisition device by the vehicular data acquisition device, the vehicular data comprising: a control instruction of the autonomous vehicle and sensor data from a sensor on the autonomous vehicle; encrypting the vehicular data to obtain encrypted vehicular data, and storing the encrypted vehicular data; receiving a request for acquiring vehicular data sent by a server; and sending the encrypted vehicular data to the server when the vehicle identifier is identical to a vehicle identifier of the autonomous vehicle and the device identifier is identical to a device identifier of the vehicular data acquisition device.Type: GrantFiled: July 2, 2018Date of Patent: May 11, 2021Assignee: Baidu Online Network Technology (Beijing) Co., Ltd.Inventors: Mingwei Wang, Peng Yun, Shaohua Zhang
-
Patent number: 10849069Abstract: For example, a Bluetooth (BT) apparatus may include a System on Chip (SoC), the SoC including an interface to a BT Lower Medium Access Control (MAC) (L-MAC) external to the SoC; and a BT Upper MAC (U-MAC) to generate setup information to configure one or more BT activities by the BT L-MAC, and to send the setup information to the BT L-MAC via the interface, the setup information to configure one or more wakeup criteria for the BT L-MAC to wake up the BT U-MAC, the one or more BT activities including at least a BT scan, wherein the BT U-MAC is configured to enter a power save mode and to wake up from the power save mode based on receipt of a wakeup indication from the BT L-MAC via the interface to the BT L-MAC.Type: GrantFiled: December 26, 2018Date of Patent: November 24, 2020Assignee: INTEL CORPORATIONInventors: David Lundgren Peavey, Sunil Kumar, Sebastien Fievet, Hakan Magnus Eriksson, Oren Kaidar, Jacques Behar, Michael Shusterman
-
Patent number: 10674557Abstract: A wireless technology device and method for securely communicating a status of a wireless technology device to a non-paired device, includes detecting a status changing event of the wireless technology device, locking the wireless technology device from an unauthorized pairing with another device, in response to detecting the status changing event, sending an encrypted data regarding the status changing event to at least one non-paired device, which is received in a buffer of the at least one non-paired device, wherein, in response to receiving the encrypted data, the at least one non-paired device automatically communicates the encrypted data to a centralized computing network for decrypting the encrypted data, and unlocking the wireless technology device when an authorized pairing attempt is successful.Type: GrantFiled: January 31, 2019Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Gregory R. Hintermeister, Matthew G. Kelm
-
Patent number: 10630665Abstract: Systems, methods, and software can be used to share content. In some aspects, a message is received at an electronic device from a sender. A first type 0 short message service (SMS) message is sent, from the electronic device to the sender. The first type 0 SMS message indicates an authentication request for the message. A second type 0 SMS message is received at the electronic device. The second type 0 SMS message indicates that the message is authenticated.Type: GrantFiled: April 18, 2016Date of Patent: April 21, 2020Assignee: BlackBerry LimitedInventors: Shu-Lin Chen, Reguina Bouianovskaia, Michael Eoin Buckley
-
Patent number: 10438467Abstract: This disclosure provides a portable object detection system and method. The system includes a first cluster network, a family cluster network, and a detection server. The first cluster network includes a portable object coupled with a small communication device (SCD), a first cluster head device (first CHD) including a smartphone that registers the SCD prior to monitoring, and performs mutual monitoring between the SCD and the first CHD. The detection server manages the first CHD and a second CHD, and when the detection server receives a loss event from the first CHD in the first cluster network, it requests a mutual search by the second CHD for the SCD as a lost target in the first cluster network. The mutual monitoring in a first cluster network adjusts a message transmission interval and a radio transmission power depending on collected parameters such as the SCD's location information, mobility, power capacity, and others.Type: GrantFiled: June 19, 2017Date of Patent: October 8, 2019Inventors: Myongsu Choe, Seyoung Choe
-
Patent number: 10425819Abstract: A mobile device is provided. The mobile device includes an activity sensor for generating data, a channel controller configured to determine the user presence based on the data obtained through the activity sensor, and a communication interface for communicating with an external network. The channel controller is configured to block or disable the communication between a source on the mobile device and the external network when the channel controller determines a lack of the user presence for a predetermined time.Type: GrantFiled: September 9, 2016Date of Patent: September 24, 2019Assignee: Samsung Electronics Co., Ltd.Inventors: Kunal Patel, John S. Morrison, Robert L. Harrison
-
Patent number: 10182345Abstract: A system is provided for recovering a mobile device by enabling an authorized user to remotely change the profile of the device to assist others in returning the device to the user. Initially, a user registers the mobile device with a recovery assist server. When the user is unable to locate the device because it is, for example, lost or stolen, the user indicates with the server that the device is missing. The device and the server are configured to communicate with each other, for example, periodically or, in another example, on device start up. If the device is identified as missing on the server, the operation of the mobile device is configured based on a missing profile associated with the mobile device. Once the device is located, the user indicates with the server that the device is no longer missing. When the device is unidentified as missing on the server, the operation of the mobile device is configured based on a user profile associated with the mobile device.Type: GrantFiled: April 21, 2015Date of Patent: January 15, 2019Assignee: EXCALIBUR IP, LLCInventors: Tomi Blinnikka, Jeffery Bennett
-
Patent number: 10175675Abstract: A machine tool system includes a portable operation terminal capable of operating an industrial machine by wireless communication and including a terminal body including an external connector that is able to receive image information about an image and a communicator that is able to transmit the image information received by the external connector.Type: GrantFiled: May 8, 2015Date of Patent: January 8, 2019Assignee: MURATA MACHINERY, LTD.Inventor: Hidetsugu Kawai
-
Patent number: 10031721Abstract: A system and method for processing user speech commands in a voice interactive system is disclosed. Users issue speech phrases on a local device in a premises network, and the local devices first determine if the speech phrases match any commands in a set of local control commands. The control commands, in examples, can activate and deactivate premises devices such as “smart” televisions and simpler lighting devices connected to home automation hubs. In the event of a command match, local actions associated with the commands are executed directly on the premises devices in response. When no match is found on the local device, the speech phrases are sent in messages to a remote server over a network cloud such as the Internet for further processing. This can save on bandwidth and cost as compared to current voice recognition systems.Type: GrantFiled: May 15, 2015Date of Patent: July 24, 2018Assignee: Tyco Safety Products Canada Ltd.Inventors: Andrei Bucsa, Stephen D. W. Fosty, Gregory W. Hill
-
Patent number: 10013583Abstract: An electronic device of an aspect of the present disclosure includes an underwater detection unit and at least one processor. The underwater detection unit is configured to detect whether or not the electronic device is underwater. The at least one processor is configured to determine whether or not the electronic device has been lost when the underwater detection unit detects that the electronic device is underwater. The at least one processor is configured to determine that the electronic device has been lost when a predetermined condition is satisfied.Type: GrantFiled: July 25, 2016Date of Patent: July 3, 2018Assignee: KYOCERA CorporationInventors: Masatoshi Nonogaki, Yuuko Aoki
-
Patent number: 9825804Abstract: Devices and methods are provided for monitoring terminal devices. For example, one or more first terminal devices are scanned; one or more first identifications of the first terminal devices are recorded; a first list including the first identifications of the first terminal devices is generated; one or more second identifications of one or more second terminal devices are retrieved from a stored second list, the second terminal devices being scanned previously; the second identifications and the first identifications are compared; and in response to the second identifications being different from the first identifications, an alarm message is output.Type: GrantFiled: January 7, 2015Date of Patent: November 21, 2017Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Shouqiang Qin, Yuan Zhang
-
Patent number: 9805220Abstract: According to one embodiment, an electronic apparatus includes a processor configured to operate based on a clock, the processor includes a register in which a value added in accordance with the clock is stored, and a memory configured to store first period information indicating a first period in which a file is accessible. The processor is configured to acquire first time and date information indicating a first time and date from an external device, calculate a second time and date indicating a present time and date based on the first time and date information and the value, and restrict access to a resource of the electronic apparatus, when the second time and date does not correspond to the first period.Type: GrantFiled: May 21, 2015Date of Patent: October 31, 2017Assignee: Kabushiki Kaisha ToshibaInventors: Tatsuo Yamaguchi, Yuki Kanbe
-
Patent number: 9792453Abstract: A method and system are disclosed for placing a computer in a safe and secure lock down state from a remote location using a remote command device such as a cellular telephone. The method and system includes optional security provisions before restarting the computer.Type: GrantFiled: September 26, 2007Date of Patent: October 17, 2017Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: David Carroll Challener, Daryl Cromer, Howard Locker, Randall Scott Springfield
-
Patent number: 9711095Abstract: According to one embodiment, an electronic apparatus includes a first detector, a second detector, a third detector and a security controller. The first detector detects a speed of movement of the electronic apparatus. The second detector detects a direction of the movement. The third detector detects whether the electronic device is located in a first area. The security controller updates position information wherein the position information is indicative of a first position in the first area, and executes a monitoring process based on the position information, detection information of the first detector and detection information of the second detector.Type: GrantFiled: April 16, 2015Date of Patent: July 18, 2017Assignee: Kabushiki Kaisha ToshibaInventor: Tadashi Tsuji
-
Patent number: 9648041Abstract: A security management system managing security of plural types of client apparatuses which are mutually connected to each other via a network, includes an acquisition unit acquiring or receiving information which is used to change a security level of any of the client apparatuses; a determination unit determining a specific client apparatus whose security setting value is to be changed and a security setting value to be applied to the specific client apparatus, in response to the acquired or received information to change the security level of any of the client apparatuses, based on a definition table defining the security levels of the plural types of client apparatuses; and a notification unit notifying the specific client apparatus of the security setting value to be applied to the specific client apparatus.Type: GrantFiled: April 10, 2014Date of Patent: May 9, 2017Assignee: RICOH COMPANY, LTD.Inventors: Yutaro Nishimura, Susumu Fujioka
-
Patent number: 9638805Abstract: Embodiments provide a satellite navigation receiver. The satellite navigation receiver has a receiver unit and a transmitter or a controller. The receiver unit is configured to receive and process a satellite navigation signal from a satellite navigation system at the certain time, to obtain a received signal, the received signal having a first component in a digital form, wherein the first component in the digital form is encrypted. The transmitter is configured to transmit the first component in the digital form together with an identification of a user of the satellite navigation receiver at the certain time. The controller is configured to store the first component in the digital form on a non-volatile storage medium in association with other data representing an information from a location, at which the satellite navigation receiver was located at the certain time.Type: GrantFiled: July 5, 2013Date of Patent: May 2, 2017Assignee: FRAUNHOFER-GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.VInventors: Alexander Ruegamer, Manuel Stahl, Guenter Rohmer
-
Patent number: 9549290Abstract: A method performed by an apparatus includes scanning at least one of multiple radio frequencies using at least two beamforming antennas of a plurality of beamforming antennas coupled to the eyewear and detecting, on a first scanned radio frequency, first externally emitted radio energy. The method further includes identifying a first wireless device using the detected first externally emitted radio energy and determining a first direction of the first wireless device relative to the eyewear.Type: GrantFiled: January 8, 2014Date of Patent: January 17, 2017Assignee: Google Technology Holdings LLCInventor: Dwight R. Smith
-
Patent number: 9537882Abstract: Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O interface, responsive to the detection that the first device is coupled with the first I/O interface, temporarily disabling data communication between the first and second I/O interfaces, acquiring a file from the detected first device via the first I/O interface, determining whether the acquired file poses a security threat, and responsive to a determination that the acquired file does not pose a security threat, enabling the data communication between the first and second I/O interfaces.Type: GrantFiled: December 19, 2014Date of Patent: January 3, 2017Assignee: FEDEX CORPORATED SERVICES, INC.Inventors: Christopher Perry Patteson, Edward Michael Maier, Michael Jesse Mings
-
Patent number: 9521523Abstract: A method for predicting lost mobile devices. The method includes, identifying, by one or more processors, one or more pre-designated locations, where each of the one or more pre-designated locations contains devices and a main device to be tracked. The one or more processors receive information from the devices. The one or more processors derive a common usage pattern of the main device based on, the information from the devices. The pattern is associated with a location of the main device. The one or more processors determine whether the main device follows substantially all of the common usage pattern. Finally, in response to determining the main device does not follow substantially all of the common usage pattern, the one or more processors sends at least one different types of alerts to at least one predetermined device of the devices.Type: GrantFiled: June 8, 2015Date of Patent: December 13, 2016Assignee: International Business Machines CorporationInventors: James E. Bostick, John M. Ganci, Jr., Martin G. Keen, Sarbajit K. Rakshit
-
Patent number: 9473507Abstract: Methods and systems for proximity-based access control include determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor; and activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device.Type: GrantFiled: January 3, 2013Date of Patent: October 18, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul C. Castro, Yunwu Huang, Marco Pistoia, Umut Topkara
-
Patent number: 9401935Abstract: A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration. The method further includes initiating restoration procedures by performing an initial registration.Type: GrantFiled: October 29, 2010Date of Patent: July 26, 2016Assignee: BlackBerry LimitedInventors: Jan Hendrik Lucas Bakker, Adrian Buckley, Andrew Allen
-
Patent number: 9379953Abstract: Network connectivity is selectively established by monitoring, on a client, communications activity incident to accessing a network, the communications activity including a request to access the network. An application associated with the communications activity is be identified. A communications configuration associated with the application is accessed, the communications configuration indicating how the application is configured to access the network. Network connectivity is selectively established based on the communications configuration, and the application may be enabled to access the network to support the communications activity.Type: GrantFiled: November 18, 2013Date of Patent: June 28, 2016Assignee: AOL INC.Inventor: Philip W. Flack
-
Patent number: 9313190Abstract: Disclosed is a system and associated method or restricting access to a user's account via one or more account access channels. The system typically includes a processor, a memory, and an access restriction module stored in the memory. The module is typically configured for: integrating one or more account access channels associated with the user's account with an access restriction procedure; receiving a request from the user to implement the access restriction procedure; based on receiving the request from the user to implement the access restriction procedure, implementing the access restriction procedure, wherein implementing the access restriction procedure comprises restricting access to the user's account via the account access channel(s).Type: GrantFiled: February 7, 2014Date of Patent: April 12, 2016Assignee: Bank of America CorporationInventors: David M. Grigg, Hood Qaim-Maqami, Alicia C. Jones, Elizabeth S. Votaw, Joseph Neil Johansen, Charles Jason Burrell, Carrie Anne Hanson, Michael Patrick Lynch
-
Patent number: 9143509Abstract: A system for assessing a computer device's state may collect state data about the device, then assess the state with respect to the policy for granting one or more claims. Each claim may be defined by a set of requirements that, if fulfilled, may be used to permit or deny access to a resource, such as an application, network, data, or other resource. A collection engine may reside on the device or other location and may collect requested data, and some collection engines may be extensible with a plugin architecture for expansion. A server may receive information from the device to evaluate claims. Depending on the use scenario, the claim results may be incorporated into communications and passed to an evaluator that may produce an access token which is used to permit or deny access based on the claim results.Type: GrantFiled: May 20, 2011Date of Patent: September 22, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Daniel Rose, Amos Ortal, Boaz Feldbaum, Avihai Dgany, Elan Levy, Raanan Zvi, Yoav Yassour
-
Patent number: 9131381Abstract: A mobile computing device may automatically determine an occurrence of a security event associated with the device, and automatically erase all software and data on the device. The security event may be the mobile computing device being unlocked and away from a trusted location or user associated with the device, or the device moving a pre-determined distance over a pre-determined amount of time while unlocked, or a user performing an incorrect touch gesture to unlock the mobile computing device, or entry of an incorrect password a pre-determined consecutive number of times. The mobile computing may display a visual cue to the user to prompt the user to perform the incorrect touch gesture. Software and data on the mobile computing device may be automatically erased without receiving instructions from another computing device, or may be erased when the mobile computing device establishes a network connection with another computing device.Type: GrantFiled: October 26, 2012Date of Patent: September 8, 2015Assignee: Facebook, Inc.Inventor: Jason S. Sobel
-
Patent number: 9106670Abstract: A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level.Type: GrantFiled: February 15, 2013Date of Patent: August 11, 2015Assignee: BlackBerry LimitedInventors: Michael Kenneth Brown, Michael Stephen Brown, Herbert Anthony Little, Scott William Totzke
-
Patent number: 9083624Abstract: A mobile device, e.g. portable computer, location tracking and data backup-and-wipe system and method enable a lost or stolen device to be recovered by reporting to its rightful owner and optionally to others its approximate location via triangulation and the use of location service providers. Social network members may be made aware automatically of the location of a reported lost or stolen device and can assist the rightful owner in recovering it based upon their identification of the user of the device, whether by the location coordinates or by viewing a photographic image taken by the computer. Alternatively, in governmental and/or institutional settings having privacy concerns, no photographic images are sent to a public website. Instead, they are sent to a proprietary employer server and maintained behind an institutional firewall.Type: GrantFiled: October 23, 2009Date of Patent: July 14, 2015Assignee: ActiveTrak, Inc.Inventor: Kenneth Vernon Westin
-
Patent number: 9060103Abstract: Tampering with doorbells can lead to injury and doorbell theft. Methods and systems can discourage doorbell tampering by emitting an alert when a doorbell detects tampering. In some embodiments, a doorbell includes a system to detect movement of the outer housing of the doorbell. In several embodiments, if a doorbell detects movement of the outer housing while the doorbell detects that it is connected to an external power supply, the doorbell can emit an alert to warn against additional tampering.Type: GrantFiled: November 17, 2014Date of Patent: June 16, 2015Assignee: SkyBell Technologies, Inc.Inventor: Joseph Frank Scalisi
-
Patent number: 9039785Abstract: A security device for functional display, security, and charging of a handheld electronic device is disclosed. The device comprises a universal clamping apparatus with an integrated alarm sensor and charging port to prevent theft of handheld electronic devices without hindering customer inspection thereof while providing charging of the battery of the devices.Type: GrantFiled: February 8, 2012Date of Patent: May 26, 2015Assignee: Scorpion Security Products, Inc.Inventor: Franklyn W. Gulick, Jr.
-
Patent number: 9026788Abstract: In a centralized credential management system, website credentials are stored in a vault storage at a vault. The website credentials are encrypted based upon a key not available to the vault and are for authenticating a user to a third party website. Through a client, a user authenticates to the vault and retrieves the encrypted website credentials and parameters and code for properly injecting the credentials into a website authentication form. The website credentials are decrypted at the client and injected into the authentication form using the parameters and code.Type: GrantFiled: April 25, 2013Date of Patent: May 5, 2015Assignee: Symantec CorporationInventors: Barry Ferg, Gary Krall, David M'Raihi, Nicolas Popp
-
Patent number: 9015472Abstract: Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message is human originated are received. Then, the fact that the electronic message is human originated is conveyed to one or more recipients of the electronic message by associating with the electronic message a human origination indication.Type: GrantFiled: March 10, 2006Date of Patent: April 21, 2015Assignee: McAfee, Inc.Inventor: C. Scott Chasin
-
Patent number: 9003544Abstract: A mobile device and associated method and computer-readable medium, wherein the device is configurable for data protection readiness. A preparation module is configured to perform preprocessing to prepare the mobile device for data protection readiness, the preprocessing includes: indicating certain items of data stored in the data storage arrangement which are of personal importance to an owner of the mobile device; indicating criteria that defines a situation for which the items of data of personal importance are to be secured; and indicating a set of actions to be carried out to secure the items of data of personal importance. A protection module is configured to monitor for an occurrence of the situation for which the items of data of personal importance are to be secured based on the criteria indicated by the preparation module, and to execute the set of actions indicated by the preparation module in response to a detection of the occurrence of the situation.Type: GrantFiled: July 26, 2011Date of Patent: April 7, 2015Assignee: Kaspersky Lab ZAOInventors: Sergey V. Nevstruev, Oleg V. Nevstruev, Andrey V. Matveev
-
Publication number: 20150096062Abstract: The position information acquisition unit acquires the first current position information of the multifunction peripheral and the second current position information of HDD. The position information determination unit executes the first determination whether or not the first current position information is identical with the first registered position information and the second determination whether or not the second current position information is identical with the second registered position information.Type: ApplicationFiled: September 26, 2014Publication date: April 2, 2015Applicant: KYOCERA DOCUMENT SOLUTIONS INC.Inventor: Yoshiaki TAMURA
-
Patent number: 8992631Abstract: Systems and methods of theft prevention of communication devices are provided. In one embodiment, the method may include, for example, one or more of the following: registering a communication device being used at a home, where the device is connected to a communication network; entering validation information relating to the communication device; and analyzing the validation information to determine whether the communication device is authorized for use in the communication network.Type: GrantFiled: December 31, 2012Date of Patent: March 31, 2015Assignee: Broadcom CorporationInventors: Jeyhan Karaoguz, James D. Bennett
-
Publication number: 20150089675Abstract: A security device for allowing functional display and charging of handheld electronic devices is disclosed. The security device includes clamps with channels configured to press against and grip the edges of the handheld electronic device. In some embodiments, the security device includes a charging/data connector onto which the charging/data port of the handheld security device can be mounted.Type: ApplicationFiled: May 9, 2013Publication date: March 26, 2015Applicant: Scorpion Secruity Products, Inc.Inventor: Franklyn W. Gulick, JR.
-
Patent number: 8989809Abstract: A mobile terminal using a common antenna to perform an NFC function and an FM-TX function is provided. The mobile terminal includes a baseband chip, an NFC chip, an FM chip, and an antenna. The NFC chip and the FM chip are connected to the baseband chip. The mobile terminal also comprises a selecting unit connected to the baseband chip, the NFC chip, the FM chip, and the antenna, for conducting the NFC chip and the antenna or conducting the FM chip and the antenna based on a control of the baseband chip. The mobile terminal proposes a single antenna for performing the NFC function and the FM-TX function. A passage between corresponding functions is conducted through the selecting unit. It is unnecessary to use an additional antenna inside the mobile terminal. Thus, the mobile terminal has more spacious capacity, and the cost of the mobile terminal is reduced.Type: GrantFiled: April 17, 2012Date of Patent: March 24, 2015Assignee: Huizhou TCL Mobile Communication Co., Ltd.Inventors: Jianliang Gu, Zihua Lin, Lei Zhang
-
Patent number: 8988233Abstract: A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly operative to sense when the housing is opened and tamper indication circuitry operative to receive an input from the at least one case-open switch assembly and to provide an output indication of possible tampering with the data entry circuitry located within the housing. The at least one case-open switch assembly includes an arrangement of electrical contacts arranged on a base surface and a resiliently deformable conductive element, which defines a short circuit between at least some of the arrangement of electrical contacts only when the housing is closed.Type: GrantFiled: May 8, 2014Date of Patent: March 24, 2015Assignee: Verifone, Inc.Inventors: Richard H. H. Neo, Mehran Mirkazemi-Moud, John Henry Barrowman, Christian Eric Schulz
-
Patent number: 8974544Abstract: An approach is provided for remotely configuring a mobile device designated as missing. A request to remotely configure the mobile device is received. In response to the request, at least one setting parameter specifying at least one action to be performed by the mobile device is retrieved. A control message specifying the at least one setting parameter is generated. It is determined whether the mobile device is network inaccessible. The control message is queued for transmission over a data channel to the mobile device when the mobile device is determined to be network inaccessible.Type: GrantFiled: December 16, 2009Date of Patent: March 10, 2015Assignee: Verizon Patent and Licensing Inc.Inventors: Paul Hubner, Steven T. Archer, Robert A. Clavenna, Kristopher A. Pate