Theft Prevention Patents (Class 726/35)
  • Patent number: 8972679
    Abstract: A method for managing a storage device including identifying a lock timing for the storage device when coupling to a device, transitioning the storage device into a locked state in response to detecting the storage device decoupling from the device, and configuring the storage device to remain in the locked state if the storage device is re-coupled to the device after the lock timing has elapsed.
    Type: Grant
    Filed: April 12, 2010
    Date of Patent: March 3, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Leonard E Russo, Valiuddin Y Ali, Walter A Gaspard, Christoph J Graham
  • Patent number: 8973154
    Abstract: Some embodiments provide a method for authenticating a user to access computing resources that uses transient event data regarding previous interactions of the user with the computing resources. The method receives a notification that a user is unable to provide a correct user identifier and password. The method generates authentication questions for the remote user using the transient event data. The authentication questions are presented to the user. The method authenticates the user based on answers to the password recovery questions. The user may be a remote user and the computing resources are a set of application servers to which the user has forgotten a password. The computing resources may be a portable device that the user wishes to access remotely in order to delete data from the portable device.
    Type: Grant
    Filed: February 2, 2010
    Date of Patent: March 3, 2015
    Inventor: Kazu Yanagihara
  • Patent number: 8961619
    Abstract: Securing access to a portable electronic device (PED), securing e-commerce transactions at an electronic device (ED) and dynamically adjusting system settings at a PED are disclosed. In an example, usage or mobility characteristics of the PED or ED (e.g., a location of the ED or PED, etc.) are compared with current parameters of the PED or ED. A determination as to whether to permit an operation (e.g., access, e-commerce transaction, etc.) at the ED or PED can be based at least in part upon a degree to which the current parameters conform with the usage or mobility characteristics. In another example, at least a current location of a PED can be used to determine which system settings to load at the PED.
    Type: Grant
    Filed: January 6, 2009
    Date of Patent: February 24, 2015
    Assignee: QUALCOMM Incorporated
    Inventor: Arnold Jason Gum
  • Patent number: 8954624
    Abstract: The pureness of a connection between an external device and a host computer can be inspected or monitored to determine the status: connected or disconnected. When it is determined that a disconnection state is entered, an indication can be sent to the host and, in parallel, the data transportation from and/or to the external device may be manipulated. In some embodiments an exemplary connection protector device (CPD) may be added to the connection in between the external device and the host. The CPD can have two connectors one for the host and one for the cable of the external device. The CPD can be adapted to identify any disconnection in the connection with the host and/or the connection with the external device on the other side of the CPD.
    Type: Grant
    Filed: October 4, 2006
    Date of Patent: February 10, 2015
    Assignee: Safend Ltd.
    Inventors: Avner Rosenan, Zvi Gutterman, Dor Skuler, Gil Sever
  • Patent number: 8954753
    Abstract: Provided are a computer program product, system, and method to allocate blocks of memory in a memory device having a plurality of blocks. An unencrypted memory allocation function requests allocation of unencrypted blocks in the memory device. An encrypted memory allocation function requests allocation of encrypted blocks in the memory device. An unencrypted Input/Output (I/O) request performs an I/O operation against the unencrypted blocks in the memory device. An encrypted I/O request function performs an I/O operation against the encrypted blocks in the memory device. An operating system uses an encryption key associated with the encrypted blocks to encrypt or decrypt data in the encrypted blocks to perform the encrypted I/O operation in response to processing the encrypted I/O request functions, wherein the unencrypted and encrypted memory allocation functions and unencrypted and encrypted I/O request functions comprise different functions in a library of functions available to the application.
    Type: Grant
    Filed: June 13, 2012
    Date of Patent: February 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: Benjamin Jay Donie, Andreas Mattias Koster, Nicole Forsgren Velasquez
  • Patent number: 8932368
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Grant
    Filed: September 3, 2008
    Date of Patent: January 13, 2015
    Assignee: Yougetitback Limited
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20150007355
    Abstract: Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device.
    Type: Application
    Filed: September 18, 2014
    Publication date: January 1, 2015
    Inventors: Bran FERREN, W. Daniel HILLIS
  • Patent number: 8925100
    Abstract: A data protection system selectively deletes data from an electronic device when the device is reported as lost or stolen, or when another data protection triggering event occurs. Different data files may, for example, be treated differently depending on when such files were created. For example, data files that were created while the computing device was known to be in the owner's possession may be deleted, while data files created after the electronic device left the owner's possession may be left intact (since they may have been created by an innocent user). Data files created between these two points in time may be quarantined so that they later be restored, if appropriate.
    Type: Grant
    Filed: April 11, 2013
    Date of Patent: December 30, 2014
    Assignee: Absolute Software Corporation
    Inventor: Robert Chase
  • Patent number: 8918893
    Abstract: A microcontroller is awakened from a lower power state in response to a trigger indication indicative of a fault condition. After the awakening, the microcontroller performs a security action with respect to secret information in the security module in response to the fault condition.
    Type: Grant
    Filed: October 29, 2012
    Date of Patent: December 23, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Ted A. Hadley
  • Patent number: 8915971
    Abstract: A lock and modular system for securing an electronic device. The system includes a device security module that couples to an electronic device and secures the electronic device to its location. A monitor module ensures that the device security module is coupled to the electronic device before a data security module allows the electronic device to operate. The monitor module may also require that the device security module be recognized before the electronic device will operate. If the device security module is coupled and recognized, the user is prompted to provide an encryption key. If the key is correct, the electronic device will operate. The user may have a limited number of attempts to provide the encryption key. If the user makes too many attempts, the electronic device is disabled and the data thereon destroyed. If the device security module is uncoupled during operation, the electronic device is shut down.
    Type: Grant
    Filed: March 4, 2011
    Date of Patent: December 23, 2014
    Assignee: International Business Machines Corporation
    Inventors: Richard Hutzler, William M. Smith, Jr.
  • Publication number: 20140373185
    Abstract: An anti-theft method for a computer system including a detection module, a photographing module and a controlling module is disclosed. The anti-theft method includes when the computer system is off, the detection module determines whether a predetermined event occurs for generating a detection signal; the controlling module initiates the computer system according to the detection signal, such that the computer system operates a basic input/output system (BIOS); and when the computer system operates the BIOS, an anti-theft operation is initiated to control the photographing module for capturing a digital information.
    Type: Application
    Filed: February 20, 2014
    Publication date: December 18, 2014
    Applicant: Wistron Corporation
    Inventor: Yung-Yen Chang
  • Publication number: 20140373184
    Abstract: A security application program provides features to help users recover their stolen mobile communication devices. The security application program may be pre-loaded into a system partition of the mobile device so that the security application program will not be erased during a wipe or factory reset of the mobile device. An owner registration service may be provided to help verify ownership of the mobile device.
    Type: Application
    Filed: June 12, 2013
    Publication date: December 18, 2014
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, Samir Vilas Gupte, Ankur Bharatbhushan Nandwani
  • Patent number: 8911507
    Abstract: A computer-implemented method for mitigating mobile device loss may include (1) identifying historical data specifying a plurality of past locations of a mobile computing device, (2) identifying a current location of the mobile computing device, (3) determining that the current location deviates from an expected location based on the historical data, and (4) performing a security measure on the mobile computing device in response to determining that the current location deviates from the expected location. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 22, 2011
    Date of Patent: December 16, 2014
    Assignee: Symantec Corporation
    Inventors: Alan Gilbert, Jim Casaburi
  • Patent number: 8906114
    Abstract: A method and apparatus are disclosed for detecting the removal of a device connected to a network. The present invention generates an alarm on a protected device when an unauthorized user disconnects the device from a network connection. The network connection is monitored and an alarm is generated if the protected device is disconnected from the network connection without proper notification to the theft protection utility. A number of fail-safe features can optionally be employed to ensure that the theft protection aspects of the present invention are not bypassed. For example, the theft protection utility process can employ speaker, volume and/or power control features to ensure that the alarms generated by the present invention, or the theft protection feature itself, cannot be bypassed.
    Type: Grant
    Filed: May 18, 2009
    Date of Patent: December 9, 2014
    Assignee: Agere Systems LLC
    Inventors: Jalaludeen Ca, Nandakumar Gn
  • Patent number: 8902066
    Abstract: A computer process is disclosed for assessing the risk of theft or loss of electronic devices in particular locations. The risk assessments may be based on data regarding reported theft and/or loss events, and based on data regarding current locations of user devices. The risk assessments may be used to generate location-based alerts.
    Type: Grant
    Filed: June 5, 2014
    Date of Patent: December 2, 2014
    Assignee: Absolute Software Corporation
    Inventors: Timothy Parker, Damien Gerard Loveland
  • Publication number: 20140338006
    Abstract: Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Methods are provided for detecting that a security event has occurred on a portable electronic device and then establishing an audio transmission between the device and one or more clients, and in some embodiments, sending a command to initiate the audio transmission. The detection of a security event may be based on, for example, detecting that the device has been turned on, detecting movement of the device, detecting that an incorrect password has been entered, the device camera has been used, contacts have been added or deleted, the SIM card as been removed or replaced, application programs have been installed or uninstalled from the device, or uncharacteristic behavior has been detected.
    Type: Application
    Filed: July 23, 2014
    Publication date: November 13, 2014
    Inventors: Vance Grkov, David Richardson, Ayan Mandal, Cherry Mangat, Kevin Patrick Mahaffey
  • Patent number: 8878672
    Abstract: Devices, methods, systems and a computer readable medium for the provision of alerts to electronic devices in response to real-time, location based analysis of the risk of theft or loss of such devices are provided. A continually updated database of locations of thefts, losses and/or stolen or lost electronic devices is accessed in order to provide the alerts to the electronic devices.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: November 4, 2014
    Assignee: Absolute Software Corporation
    Inventors: Timothy Parker, Damien Gerard Loveland
  • Patent number: 8881310
    Abstract: Systems, methods, and non-transitory computer-readable storage media are provided for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic.
    Type: Grant
    Filed: September 9, 2012
    Date of Patent: November 4, 2014
    Assignee: Apple Inc.
    Inventors: Usama Mikael Hajj, Megan M. Frost
  • Publication number: 20140325689
    Abstract: A shutdown verification method executed by a mobile terminal is provided. At first, a shutdown command is received. Then, a shutdown verification prompt which requests a verification input is output. After the verification input is received, the verification input is compared with preset verification data previously stored in the mobile terminal. At last, the mobile terminal is shut down if the verification input matches the preset verification data. A shutdown verification device corresponding to the shutdown verification method is also provided. The mobile terminal cannot be shut down without verification. Therefore, malicious shutdown of the mobile terminal is avoided.
    Type: Application
    Filed: July 10, 2014
    Publication date: October 30, 2014
    Inventors: YING-HUA YE, YUE-JIAO HOU
  • Patent number: 8870971
    Abstract: Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device.
    Type: Grant
    Filed: October 7, 2011
    Date of Patent: October 28, 2014
    Assignee: Applied Minds, LLC
    Inventors: Bran Ferren, W. Daniel Hillis
  • Patent number: 8864847
    Abstract: A computer-implemented method for preventing mobile device loss may include 1) identifying historical data specifying a plurality of past locations of a plurality of mobile computing devices, 2) identifying a current location of a mobile computing device within the plurality of mobile computing devices, 3) determining that the current location deviates from an expected location based on the historical data, and 4) performing a security measure on the mobile computing device in response to determining that the current location deviates from the expected location. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 4, 2012
    Date of Patent: October 21, 2014
    Assignee: Symantec Corporation
    Inventors: Jim Casaburi, Alan Gilbert, William Allen
  • Publication number: 20140304841
    Abstract: An electronic device includes a washer, a printed circuit board, and a screw. The printed circuit board includes a copper foil, a detecting unit and a processing unit. The copper foil comprises a plurality of electrical signal interfaces surrounding a first via defined in the copper foil. The washer defines a second via and includes a transmission metal. The screw combines the printed circuit board and the washer through the second via and the first via. The detecting unit stores an original logic level signal, and detects logic level signals of the electrical signal interfaces in real-time. The processing unit compares the original logic level signal and the detected logic level signal, to determine whether the electronic device is disassembled. If the electronic device is disassembled, the electronic device stops working.
    Type: Application
    Filed: October 8, 2013
    Publication date: October 9, 2014
    Applicant: HON HAI PRECISION INDUSTRY CO., LTD.
    Inventors: CHI-HSIN WU, MAO-CHANG CHUANG
  • Publication number: 20140298492
    Abstract: The present invention is a self contained, portable security case or container. The case is secure in its locked condition by locks which are preferably operated by an electronic key. The electronic key can be programmed to open the case or container dependent upon various different conditions, for example, location, time, identification of operator, etc. In addition to the electronic key, a biometric identification device can be employed. The exterior of the case or container is made from different materials which are impermeable and resistant to heat, drilling and ballistic impact. A GPS type of location device located within the case enables the case to be tracked from remote locations.
    Type: Application
    Filed: March 14, 2014
    Publication date: October 2, 2014
    Applicant: Rollaguard Security, LLC
    Inventor: Anthony T. Simpson
  • Publication number: 20140298491
    Abstract: Techniques are provided for assisting owners to recover missing devices. The missing device automatically performs certain actions proactively in response to detecting conditions that indicate that the device has been lost or stolen. Conditions that indicate the device has been lost or stolen (“triggering conditions”) may include that a password failure has occurred more than a predetermined number of times. Any number and type of recovery-assisting actions may be taken, in response to triggering conditions, to assist owners in recovering a missing device. For example, a device may generate a record that indicates the current location of the device, and synchronize the record with an online service or some other device. The generation and synchronization of such records may be repeated on a periodic basis until either (a) the device becomes disabled, or (b) a user enters an appropriate password.
    Type: Application
    Filed: April 2, 2013
    Publication date: October 2, 2014
    Applicant: Dropbox, Inc.
    Inventor: Cailen D'sa
  • Publication number: 20140245464
    Abstract: A method for a power receiver for protecting a power receiver from being taken without permission while charged wirelessly includes receiving wireless power from a power transmitter and performing wireless charging in a security mode by the power receiver; detecting whether the wireless charging is interrupted without receiving a security code for authorization; and starting a protection function if the power receiver detects that the wireless charging is interrupted without receiving the security code for authorization.
    Type: Application
    Filed: February 24, 2014
    Publication date: August 28, 2014
    Applicant: HTC Corporation
    Inventor: Feng-Seng Chu
  • Patent number: 8819858
    Abstract: Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies for hardware access and monitoring control in concert with a premises security system that controls ingress and egress of a facility. One embodiment includes identifying when certain devices are removed or decoupled from a computer and preventing one or more users of that computer from leaving a facility within which the computer is located.
    Type: Grant
    Filed: December 19, 2012
    Date of Patent: August 26, 2014
    Assignee: CA, Inc.
    Inventor: Srikanth Mandava
  • Patent number: 8819448
    Abstract: A system and method for protecting information on a mobile device. The method and apparatus obtain a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generate an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associate the identifier with the ciphered information; and store the ciphered information as associated with the identifier.
    Type: Grant
    Filed: April 29, 2011
    Date of Patent: August 26, 2014
    Assignee: Georgetown University
    Inventors: Ophir Frieder, Micah Sherr, Jordan Wilberding
  • Publication number: 20140223587
    Abstract: A transceiver locking assembly includes at least one processor device, a network device, in a network environment, in communication with the least one processor device, a transceiver in communication with the network device; a transceiver port, coupled to the network device, defining a first slot opening in at least one of a variety of positions of the transceiver port and configured for selectively receiving the transceiver, and a dynamically controlled locking mechanism coupled to the transceiver port. The dynamically controlled locking mechanism is selectively positioned into the first slot opening to lock the transceiver into the network device or selectively removed away from the first slot opening to unlock the transceiver from the network device.
    Type: Application
    Filed: November 7, 2013
    Publication date: August 7, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lei CHEN, Martin TIERNAN
  • Publication number: 20140223586
    Abstract: A system comprising a platform protected by an always-on always-available security system is described. In one embodiment, the system includes a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to move the platform to a suspecting mode when the potential problem indicates a theft suspicion, and the security action logic, to send periodic alerts to a security server when the platform is in the suspecting mode, the alert including movement related data, such that the security server can take an action to protect the platform.
    Type: Application
    Filed: December 22, 2011
    Publication date: August 7, 2014
    Inventors: Michael Berger, Mark Segal, Dan Horovitz
  • Publication number: 20140223585
    Abstract: A transceiver locking assembly includes at least one processor device, a network device, in a network environment, in communication with the least one processor device, a transceiver in communication with the network device; a transceiver port, coupled to the network device, defining a first slot opening in at least one of a variety of positions of the transceiver port and configured for selectively receiving the transceiver, and a dynamically controlled locking mechanism coupled to the transceiver port. The dynamically controlled locking mechanism is selectively positioned into the first slot opening to lock the transceiver into the network device or selectively removed away from the first slot opening to unlock the transceiver from the network device.
    Type: Application
    Filed: February 1, 2013
    Publication date: August 7, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lei CHEN, Martin TIERNAN
  • Patent number: 8795388
    Abstract: An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon's to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible.
    Type: Grant
    Filed: November 8, 2012
    Date of Patent: August 5, 2014
    Assignee: Intel Corporation
    Inventors: Selim Aissi, Jasmeet Chhabra, Gyan Prakash
  • Patent number: 8800061
    Abstract: An automated method and apparatus is provided for deterring unauthorized use or theft of electronic devices, or other sorts of items into which a tracking device has been installed, particularly those in a distribution channel.
    Type: Grant
    Filed: March 5, 2010
    Date of Patent: August 5, 2014
    Assignee: Absolute Software Corporation
    Inventor: Geoffrey John Glave
  • Publication number: 20140208447
    Abstract: A platform protected by a system, the platform including a power source, is described. The system in one embodiment comprises a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to trigger a security action logic to perform a security action, when the potential problem indicates a theft suspicion, and the security action logic to utilize a kill pill to disable the platform, when the platform has set a high security status authorizing use of a self-kill pill or the platform sends an alert and receives a remote instruction to utilize a remote kill pill.
    Type: Application
    Filed: December 22, 2011
    Publication date: July 24, 2014
    Inventor: Michael Berger
  • Patent number: 8781502
    Abstract: The present disclosure provides a system and method for providing a user with supplemental content based on the user's preferences and location. The disclosure provides a computer program that allows users to discover and organize content from a platform that is accessible from a mobile device or computer. Additionally, the disclosure provides a system for determining a user's location while indoors. The system can associate the user's location with specific content or items in a store and provide the user with supplemental content related to those items.
    Type: Grant
    Filed: December 9, 2013
    Date of Patent: July 15, 2014
    Assignee: Swirl Networks, Inc.
    Inventors: Thomas Middleton, Robert Todd Boes
  • Publication number: 20140195826
    Abstract: A case for an electronic device is provided. The case includes a battery and electrical circuitry. The electrical circuitry is configured to receive electrical power from a power source connected to the case, supply the electrical power to the electronic device, and monitor an amount of current of the electrical power used by the electronic device. The electrical circuitry is also configured to charge the battery using a remaining amount of current of the electrical power where the sum of the amount of current used by the electronic device and the remaining amount of current do not exceed a current limit for the power source.
    Type: Application
    Filed: March 15, 2013
    Publication date: July 10, 2014
    Applicant: 1 OAK TECHNOLOGIES, LLC
    Inventors: James John Wojcik, Adam Douglas Center, Abhishek Joshi, Adam Benzion
  • Publication number: 20140189891
    Abstract: A hard disk assembly includes a frame, a hard disk, and a lock device. The hard disk is assembled in the frame. The lock device is located in the frame. The hard disk assembly is installed in an electronic device. The electronic device includes a support. The frame is slidably installed in the support. The lock device stores a predetermined password and receives a password inputted by a user. The lock device unlocks the hard disk assembly from the support if the password inputted by the user matches the predetermined password.
    Type: Application
    Filed: December 26, 2013
    Publication date: July 3, 2014
    Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (Shenzhen) CO., LTD
    Inventors: KANG WU, BO TIAN
  • Patent number: 8768300
    Abstract: The present invention provides a remote control method and system for a smart card. The remote control method for a smart card includes the following steps: a smart card management platform receives a request for destruction of a smart card from a user (S101); the smart card management platform carries out short message interactive processing with a terminal via a mobile network platform according to the request to make the terminal destruct the smart card (S103).
    Type: Grant
    Filed: December 24, 2009
    Date of Patent: July 1, 2014
    Assignee: ZTE Corporation
    Inventors: Chuanxi Wu, Jingwang Ma
  • Patent number: 8763111
    Abstract: A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 26, 2012
    Date of Patent: June 24, 2014
    Assignee: Intel Corporation
    Inventors: Jasmeet Chhabra, Gyan Prakash
  • Patent number: 8752192
    Abstract: Whether a combination method defined in an output rule satisfies a combination condition of each content specified in a play list is judged in order of priority defined in a priority list. Based on the judgment result, the output rule is edited in such a manner that the combination condition of each content specified in the play list is satisfied. The resources of the combination target contents specified in the play list are combined in accordance with the combination method of the edited output rule.
    Type: Grant
    Filed: August 21, 2009
    Date of Patent: June 10, 2014
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Kenji Odaka, Yoshiki Terashima, Satoshi Ozaki, Shirou Wakayama, Keiichi Teramoto, Eiji Tokita
  • Patent number: 8744403
    Abstract: The present disclosure provides a method and system for remote control of a smart card. The method comprises that: a smart card management platform receives a request of locking or unlocking a smart card from a subscriber; and the smart card management platform performs interactive processing with a terminal side according to the request via a mobile network platform, so as to enable the terminal side to perform the locking or unlocking of the smart card. The present disclosure enables the payment subscriber to avoid loss when the terminal is robbed, lost, stolen, or is illegally used seriously, and provide a higher flexibility to the payment system.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: June 3, 2014
    Assignee: ZTE Corporation
    Inventors: Chuanxi Wu, Jingwang Ma
  • Patent number: 8734529
    Abstract: An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device.
    Type: Grant
    Filed: August 13, 2012
    Date of Patent: May 27, 2014
    Assignee: Absolute Software Corporation
    Inventor: Jon Stevens
  • Publication number: 20140143896
    Abstract: A theft control system may be implemented between a server and a client. The server may provide a certificate which must be periodically renewed. Execution of the certificate may be controlled by a trusted platform module on the client under control of a theft control controller.
    Type: Application
    Filed: November 13, 2013
    Publication date: May 22, 2014
    Inventor: Xiaodong Richard Chen
  • Patent number: 8721738
    Abstract: Systems and methods for limiting access to data in a portable data storage device. An exemplary method may use an electronic computing device to prevent access to the data and includes the step of providing the portable storage device with a first software program that has a current expiration time value. The first software program is able to compare the current expiration time value against a time based parameter and activate a security mechanism protecting the data stored in the portable data storage device based on the comparison. The method also includes the step of providing an electronic computing device with a second software program. The second software program is able to identify the portable data storage device and reset the current expiration time value of the first software program to a later time value when the electronic computing device is electronically communicating with the portable data storage device.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: May 13, 2014
    Inventor: Timothy T. Miller
  • Patent number: 8726407
    Abstract: A method for authenticating a computing device or hardware component includes computer-implemented process steps for assigning a unique identifier to the hardware component, generating a baseline fingerprint for the hardware component using algorithm-processing characteristic configuration data determined from the hardware component as input, wherein the baseline fingerprint is capable of being regenerated from the hardware component so long as configuration of the hardware component is not changed, transmitting the identifier in association with the baseline fingerprint for storage in a computer-readable data structure, and generating a data signal, in response to a query comprising the assigned identifier, indicating whether the stored baseline fingerprint for the assigned identifier matches a second fingerprint regenerated from the hardware component at a time after the baseline fingerprint is generated.
    Type: Grant
    Filed: October 13, 2010
    Date of Patent: May 13, 2014
    Assignee: DeviceAuthority, Inc.
    Inventor: Craig S. Etchegoyen
  • Patent number: 8718603
    Abstract: The present application discloses a method and system for remote control of a smart card. The method includes: a smart card management platform receives a request to destroy the smart card from a subscriber (S101); according to the request, the smart card management platform performs interactive processing with a terminal side via a mobile network platform to make the terminal side destroy the smart card (S103). The present application enables the subscriber to avoid loss when the terminal is robbed, lost, stolen, or is illegally used seriously, and provide a higher flexibility to the payment system.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: May 6, 2014
    Assignee: ZTE Corporation
    Inventors: Chuanxi Wu, Jingwang Ma
  • Patent number: 8718602
    Abstract: The disclosure discloses a method and a system for remote control of a smart card; the method comprises: receiving, by a smart card management platform, a request for performing a LOCKING/UNLOCKING operation for a smart card from a user (S101); and the smart card management platform performs a short message interaction with a terminal side through a mobile network platform based on the request, so as to make the terminal side perform the LOCKING/UNLOCKING operation for the smart card (S103). By means of the disclosure, the effects are achieved that the user can apply to a smart card supervision department for locking/unlocking the smart card and a terminal through a short message and disabling or enabling the smart card, when the smart card and the terminal in which the smart card is located are robbed, lost, stolen and has a serious illegal behavior, so as to protect the security of the user and the smart card relevant department to the greatest extent and provide a better flexibility for a payment system.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: May 6, 2014
    Assignee: ZTE Corporation
    Inventors: Chuanxi Wu, Jingwang Ma
  • Publication number: 20140123328
    Abstract: A platform including an always-available theft protection system is described. In one embodiment, the system comprises a power management logic to selectively power elements of the system, a disarming logic to disarm the platform from an armed mode when a disarming command is received via an interface, the interface powered when the platform is in the armed and suspecting modes to detect the disarming command. The system further comprises, in one embodiment, a risk behavior logic to detect a potential problem via a interface, the interface powered when the platform is in the armed mode to detect the potential problem, and a core logic component to provide logic to analyze the potential problem, and to move the platform to a suspecting mode, when the potential problem indicates a theft suspicion, the core logic powered when the risk behavior logic detects the potential problem.
    Type: Application
    Filed: December 22, 2011
    Publication date: May 1, 2014
    Inventor: Michael Berger
  • Patent number: 8702812
    Abstract: Methods and arrangements for ensuring that, when a computer system is stolen or otherwise misplaced, the system is rendered unusable (i.e., locked down). Conventional solutions have required software running on the system to perform the lockdown action, but in accordance with at least one preferred embodiment of the present invention is the linkage of TPM (Trusted Platform Module) and AMT (Active Management Technology) solutions whereby an AMT arrangement can remove secure data or identifiers so that any encrypted data present on the system will become unusable.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: April 22, 2014
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David C. Challener, Howard Locker, Randall S. Springfield
  • Patent number: 8701013
    Abstract: A device, method, system and computer readable medium are disclosed for the remote, intelligent capture of screenshots and keystrokes which can subsequently be transmitted with reduced bandwidth requirements.
    Type: Grant
    Filed: November 6, 2009
    Date of Patent: April 15, 2014
    Assignee: Absolute Software Corporation
    Inventors: Trevor Cox, Damien Loveland, Michael Sitter
  • Patent number: 8696765
    Abstract: This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.
    Type: Grant
    Filed: September 17, 2010
    Date of Patent: April 15, 2014
    Assignee: Good Technology Corporation
    Inventors: Daniel J. Mendez, Mason Ng