Theft Prevention Patents (Class 726/35)
-
Patent number: 8972679Abstract: A method for managing a storage device including identifying a lock timing for the storage device when coupling to a device, transitioning the storage device into a locked state in response to detecting the storage device decoupling from the device, and configuring the storage device to remain in the locked state if the storage device is re-coupled to the device after the lock timing has elapsed.Type: GrantFiled: April 12, 2010Date of Patent: March 3, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Leonard E Russo, Valiuddin Y Ali, Walter A Gaspard, Christoph J Graham
-
Patent number: 8973154Abstract: Some embodiments provide a method for authenticating a user to access computing resources that uses transient event data regarding previous interactions of the user with the computing resources. The method receives a notification that a user is unable to provide a correct user identifier and password. The method generates authentication questions for the remote user using the transient event data. The authentication questions are presented to the user. The method authenticates the user based on answers to the password recovery questions. The user may be a remote user and the computing resources are a set of application servers to which the user has forgotten a password. The computing resources may be a portable device that the user wishes to access remotely in order to delete data from the portable device.Type: GrantFiled: February 2, 2010Date of Patent: March 3, 2015Inventor: Kazu Yanagihara
-
Patent number: 8961619Abstract: Securing access to a portable electronic device (PED), securing e-commerce transactions at an electronic device (ED) and dynamically adjusting system settings at a PED are disclosed. In an example, usage or mobility characteristics of the PED or ED (e.g., a location of the ED or PED, etc.) are compared with current parameters of the PED or ED. A determination as to whether to permit an operation (e.g., access, e-commerce transaction, etc.) at the ED or PED can be based at least in part upon a degree to which the current parameters conform with the usage or mobility characteristics. In another example, at least a current location of a PED can be used to determine which system settings to load at the PED.Type: GrantFiled: January 6, 2009Date of Patent: February 24, 2015Assignee: QUALCOMM IncorporatedInventor: Arnold Jason Gum
-
Patent number: 8954624Abstract: The pureness of a connection between an external device and a host computer can be inspected or monitored to determine the status: connected or disconnected. When it is determined that a disconnection state is entered, an indication can be sent to the host and, in parallel, the data transportation from and/or to the external device may be manipulated. In some embodiments an exemplary connection protector device (CPD) may be added to the connection in between the external device and the host. The CPD can have two connectors one for the host and one for the cable of the external device. The CPD can be adapted to identify any disconnection in the connection with the host and/or the connection with the external device on the other side of the CPD.Type: GrantFiled: October 4, 2006Date of Patent: February 10, 2015Assignee: Safend Ltd.Inventors: Avner Rosenan, Zvi Gutterman, Dor Skuler, Gil Sever
-
Patent number: 8954753Abstract: Provided are a computer program product, system, and method to allocate blocks of memory in a memory device having a plurality of blocks. An unencrypted memory allocation function requests allocation of unencrypted blocks in the memory device. An encrypted memory allocation function requests allocation of encrypted blocks in the memory device. An unencrypted Input/Output (I/O) request performs an I/O operation against the unencrypted blocks in the memory device. An encrypted I/O request function performs an I/O operation against the encrypted blocks in the memory device. An operating system uses an encryption key associated with the encrypted blocks to encrypt or decrypt data in the encrypted blocks to perform the encrypted I/O operation in response to processing the encrypted I/O request functions, wherein the unencrypted and encrypted memory allocation functions and unencrypted and encrypted I/O request functions comprise different functions in a library of functions available to the application.Type: GrantFiled: June 13, 2012Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Benjamin Jay Donie, Andreas Mattias Koster, Nicole Forsgren Velasquez
-
Patent number: 8932368Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.Type: GrantFiled: September 3, 2008Date of Patent: January 13, 2015Assignee: Yougetitback LimitedInventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
-
Publication number: 20150007355Abstract: Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device.Type: ApplicationFiled: September 18, 2014Publication date: January 1, 2015Inventors: Bran FERREN, W. Daniel HILLIS
-
Patent number: 8925100Abstract: A data protection system selectively deletes data from an electronic device when the device is reported as lost or stolen, or when another data protection triggering event occurs. Different data files may, for example, be treated differently depending on when such files were created. For example, data files that were created while the computing device was known to be in the owner's possession may be deleted, while data files created after the electronic device left the owner's possession may be left intact (since they may have been created by an innocent user). Data files created between these two points in time may be quarantined so that they later be restored, if appropriate.Type: GrantFiled: April 11, 2013Date of Patent: December 30, 2014Assignee: Absolute Software CorporationInventor: Robert Chase
-
Patent number: 8918893Abstract: A microcontroller is awakened from a lower power state in response to a trigger indication indicative of a fault condition. After the awakening, the microcontroller performs a security action with respect to secret information in the security module in response to the fault condition.Type: GrantFiled: October 29, 2012Date of Patent: December 23, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventor: Ted A. Hadley
-
Patent number: 8915971Abstract: A lock and modular system for securing an electronic device. The system includes a device security module that couples to an electronic device and secures the electronic device to its location. A monitor module ensures that the device security module is coupled to the electronic device before a data security module allows the electronic device to operate. The monitor module may also require that the device security module be recognized before the electronic device will operate. If the device security module is coupled and recognized, the user is prompted to provide an encryption key. If the key is correct, the electronic device will operate. The user may have a limited number of attempts to provide the encryption key. If the user makes too many attempts, the electronic device is disabled and the data thereon destroyed. If the device security module is uncoupled during operation, the electronic device is shut down.Type: GrantFiled: March 4, 2011Date of Patent: December 23, 2014Assignee: International Business Machines CorporationInventors: Richard Hutzler, William M. Smith, Jr.
-
Publication number: 20140373185Abstract: An anti-theft method for a computer system including a detection module, a photographing module and a controlling module is disclosed. The anti-theft method includes when the computer system is off, the detection module determines whether a predetermined event occurs for generating a detection signal; the controlling module initiates the computer system according to the detection signal, such that the computer system operates a basic input/output system (BIOS); and when the computer system operates the BIOS, an anti-theft operation is initiated to control the photographing module for capturing a digital information.Type: ApplicationFiled: February 20, 2014Publication date: December 18, 2014Applicant: Wistron CorporationInventor: Yung-Yen Chang
-
Publication number: 20140373184Abstract: A security application program provides features to help users recover their stolen mobile communication devices. The security application program may be pre-loaded into a system partition of the mobile device so that the security application program will not be erased during a wipe or factory reset of the mobile device. An owner registration service may be provided to help verify ownership of the mobile device.Type: ApplicationFiled: June 12, 2013Publication date: December 18, 2014Inventors: Kevin Patrick Mahaffey, Brian James Buck, Samir Vilas Gupte, Ankur Bharatbhushan Nandwani
-
Patent number: 8911507Abstract: A computer-implemented method for mitigating mobile device loss may include (1) identifying historical data specifying a plurality of past locations of a mobile computing device, (2) identifying a current location of the mobile computing device, (3) determining that the current location deviates from an expected location based on the historical data, and (4) performing a security measure on the mobile computing device in response to determining that the current location deviates from the expected location. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: November 22, 2011Date of Patent: December 16, 2014Assignee: Symantec CorporationInventors: Alan Gilbert, Jim Casaburi
-
Patent number: 8906114Abstract: A method and apparatus are disclosed for detecting the removal of a device connected to a network. The present invention generates an alarm on a protected device when an unauthorized user disconnects the device from a network connection. The network connection is monitored and an alarm is generated if the protected device is disconnected from the network connection without proper notification to the theft protection utility. A number of fail-safe features can optionally be employed to ensure that the theft protection aspects of the present invention are not bypassed. For example, the theft protection utility process can employ speaker, volume and/or power control features to ensure that the alarms generated by the present invention, or the theft protection feature itself, cannot be bypassed.Type: GrantFiled: May 18, 2009Date of Patent: December 9, 2014Assignee: Agere Systems LLCInventors: Jalaludeen Ca, Nandakumar Gn
-
Patent number: 8902066Abstract: A computer process is disclosed for assessing the risk of theft or loss of electronic devices in particular locations. The risk assessments may be based on data regarding reported theft and/or loss events, and based on data regarding current locations of user devices. The risk assessments may be used to generate location-based alerts.Type: GrantFiled: June 5, 2014Date of Patent: December 2, 2014Assignee: Absolute Software CorporationInventors: Timothy Parker, Damien Gerard Loveland
-
Publication number: 20140338006Abstract: Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Methods are provided for detecting that a security event has occurred on a portable electronic device and then establishing an audio transmission between the device and one or more clients, and in some embodiments, sending a command to initiate the audio transmission. The detection of a security event may be based on, for example, detecting that the device has been turned on, detecting movement of the device, detecting that an incorrect password has been entered, the device camera has been used, contacts have been added or deleted, the SIM card as been removed or replaced, application programs have been installed or uninstalled from the device, or uncharacteristic behavior has been detected.Type: ApplicationFiled: July 23, 2014Publication date: November 13, 2014Inventors: Vance Grkov, David Richardson, Ayan Mandal, Cherry Mangat, Kevin Patrick Mahaffey
-
Patent number: 8878672Abstract: Devices, methods, systems and a computer readable medium for the provision of alerts to electronic devices in response to real-time, location based analysis of the risk of theft or loss of such devices are provided. A continually updated database of locations of thefts, losses and/or stolen or lost electronic devices is accessed in order to provide the alerts to the electronic devices.Type: GrantFiled: March 18, 2014Date of Patent: November 4, 2014Assignee: Absolute Software CorporationInventors: Timothy Parker, Damien Gerard Loveland
-
Patent number: 8881310Abstract: Systems, methods, and non-transitory computer-readable storage media are provided for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic.Type: GrantFiled: September 9, 2012Date of Patent: November 4, 2014Assignee: Apple Inc.Inventors: Usama Mikael Hajj, Megan M. Frost
-
Publication number: 20140325689Abstract: A shutdown verification method executed by a mobile terminal is provided. At first, a shutdown command is received. Then, a shutdown verification prompt which requests a verification input is output. After the verification input is received, the verification input is compared with preset verification data previously stored in the mobile terminal. At last, the mobile terminal is shut down if the verification input matches the preset verification data. A shutdown verification device corresponding to the shutdown verification method is also provided. The mobile terminal cannot be shut down without verification. Therefore, malicious shutdown of the mobile terminal is avoided.Type: ApplicationFiled: July 10, 2014Publication date: October 30, 2014Inventors: YING-HUA YE, YUE-JIAO HOU
-
Patent number: 8870971Abstract: Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device.Type: GrantFiled: October 7, 2011Date of Patent: October 28, 2014Assignee: Applied Minds, LLCInventors: Bran Ferren, W. Daniel Hillis
-
Patent number: 8864847Abstract: A computer-implemented method for preventing mobile device loss may include 1) identifying historical data specifying a plurality of past locations of a plurality of mobile computing devices, 2) identifying a current location of a mobile computing device within the plurality of mobile computing devices, 3) determining that the current location deviates from an expected location based on the historical data, and 4) performing a security measure on the mobile computing device in response to determining that the current location deviates from the expected location. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: October 4, 2012Date of Patent: October 21, 2014Assignee: Symantec CorporationInventors: Jim Casaburi, Alan Gilbert, William Allen
-
Publication number: 20140304841Abstract: An electronic device includes a washer, a printed circuit board, and a screw. The printed circuit board includes a copper foil, a detecting unit and a processing unit. The copper foil comprises a plurality of electrical signal interfaces surrounding a first via defined in the copper foil. The washer defines a second via and includes a transmission metal. The screw combines the printed circuit board and the washer through the second via and the first via. The detecting unit stores an original logic level signal, and detects logic level signals of the electrical signal interfaces in real-time. The processing unit compares the original logic level signal and the detected logic level signal, to determine whether the electronic device is disassembled. If the electronic device is disassembled, the electronic device stops working.Type: ApplicationFiled: October 8, 2013Publication date: October 9, 2014Applicant: HON HAI PRECISION INDUSTRY CO., LTD.Inventors: CHI-HSIN WU, MAO-CHANG CHUANG
-
Publication number: 20140298492Abstract: The present invention is a self contained, portable security case or container. The case is secure in its locked condition by locks which are preferably operated by an electronic key. The electronic key can be programmed to open the case or container dependent upon various different conditions, for example, location, time, identification of operator, etc. In addition to the electronic key, a biometric identification device can be employed. The exterior of the case or container is made from different materials which are impermeable and resistant to heat, drilling and ballistic impact. A GPS type of location device located within the case enables the case to be tracked from remote locations.Type: ApplicationFiled: March 14, 2014Publication date: October 2, 2014Applicant: Rollaguard Security, LLCInventor: Anthony T. Simpson
-
Publication number: 20140298491Abstract: Techniques are provided for assisting owners to recover missing devices. The missing device automatically performs certain actions proactively in response to detecting conditions that indicate that the device has been lost or stolen. Conditions that indicate the device has been lost or stolen (“triggering conditions”) may include that a password failure has occurred more than a predetermined number of times. Any number and type of recovery-assisting actions may be taken, in response to triggering conditions, to assist owners in recovering a missing device. For example, a device may generate a record that indicates the current location of the device, and synchronize the record with an online service or some other device. The generation and synchronization of such records may be repeated on a periodic basis until either (a) the device becomes disabled, or (b) a user enters an appropriate password.Type: ApplicationFiled: April 2, 2013Publication date: October 2, 2014Applicant: Dropbox, Inc.Inventor: Cailen D'sa
-
Publication number: 20140245464Abstract: A method for a power receiver for protecting a power receiver from being taken without permission while charged wirelessly includes receiving wireless power from a power transmitter and performing wireless charging in a security mode by the power receiver; detecting whether the wireless charging is interrupted without receiving a security code for authorization; and starting a protection function if the power receiver detects that the wireless charging is interrupted without receiving the security code for authorization.Type: ApplicationFiled: February 24, 2014Publication date: August 28, 2014Applicant: HTC CorporationInventor: Feng-Seng Chu
-
Patent number: 8819858Abstract: Various embodiments described and illustrated here include one or more of systems, methods, software, and data structures that may be used to implement policies for hardware access and monitoring control in concert with a premises security system that controls ingress and egress of a facility. One embodiment includes identifying when certain devices are removed or decoupled from a computer and preventing one or more users of that computer from leaving a facility within which the computer is located.Type: GrantFiled: December 19, 2012Date of Patent: August 26, 2014Assignee: CA, Inc.Inventor: Srikanth Mandava
-
Patent number: 8819448Abstract: A system and method for protecting information on a mobile device. The method and apparatus obtain a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generate an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associate the identifier with the ciphered information; and store the ciphered information as associated with the identifier.Type: GrantFiled: April 29, 2011Date of Patent: August 26, 2014Assignee: Georgetown UniversityInventors: Ophir Frieder, Micah Sherr, Jordan Wilberding
-
Publication number: 20140223587Abstract: A transceiver locking assembly includes at least one processor device, a network device, in a network environment, in communication with the least one processor device, a transceiver in communication with the network device; a transceiver port, coupled to the network device, defining a first slot opening in at least one of a variety of positions of the transceiver port and configured for selectively receiving the transceiver, and a dynamically controlled locking mechanism coupled to the transceiver port. The dynamically controlled locking mechanism is selectively positioned into the first slot opening to lock the transceiver into the network device or selectively removed away from the first slot opening to unlock the transceiver from the network device.Type: ApplicationFiled: November 7, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lei CHEN, Martin TIERNAN
-
Publication number: 20140223586Abstract: A system comprising a platform protected by an always-on always-available security system is described. In one embodiment, the system includes a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to move the platform to a suspecting mode when the potential problem indicates a theft suspicion, and the security action logic, to send periodic alerts to a security server when the platform is in the suspecting mode, the alert including movement related data, such that the security server can take an action to protect the platform.Type: ApplicationFiled: December 22, 2011Publication date: August 7, 2014Inventors: Michael Berger, Mark Segal, Dan Horovitz
-
Publication number: 20140223585Abstract: A transceiver locking assembly includes at least one processor device, a network device, in a network environment, in communication with the least one processor device, a transceiver in communication with the network device; a transceiver port, coupled to the network device, defining a first slot opening in at least one of a variety of positions of the transceiver port and configured for selectively receiving the transceiver, and a dynamically controlled locking mechanism coupled to the transceiver port. The dynamically controlled locking mechanism is selectively positioned into the first slot opening to lock the transceiver into the network device or selectively removed away from the first slot opening to unlock the transceiver from the network device.Type: ApplicationFiled: February 1, 2013Publication date: August 7, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lei CHEN, Martin TIERNAN
-
Patent number: 8795388Abstract: An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon's to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible.Type: GrantFiled: November 8, 2012Date of Patent: August 5, 2014Assignee: Intel CorporationInventors: Selim Aissi, Jasmeet Chhabra, Gyan Prakash
-
Patent number: 8800061Abstract: An automated method and apparatus is provided for deterring unauthorized use or theft of electronic devices, or other sorts of items into which a tracking device has been installed, particularly those in a distribution channel.Type: GrantFiled: March 5, 2010Date of Patent: August 5, 2014Assignee: Absolute Software CorporationInventor: Geoffrey John Glave
-
Publication number: 20140208447Abstract: A platform protected by a system, the platform including a power source, is described. The system in one embodiment comprises a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to trigger a security action logic to perform a security action, when the potential problem indicates a theft suspicion, and the security action logic to utilize a kill pill to disable the platform, when the platform has set a high security status authorizing use of a self-kill pill or the platform sends an alert and receives a remote instruction to utilize a remote kill pill.Type: ApplicationFiled: December 22, 2011Publication date: July 24, 2014Inventor: Michael Berger
-
Patent number: 8781502Abstract: The present disclosure provides a system and method for providing a user with supplemental content based on the user's preferences and location. The disclosure provides a computer program that allows users to discover and organize content from a platform that is accessible from a mobile device or computer. Additionally, the disclosure provides a system for determining a user's location while indoors. The system can associate the user's location with specific content or items in a store and provide the user with supplemental content related to those items.Type: GrantFiled: December 9, 2013Date of Patent: July 15, 2014Assignee: Swirl Networks, Inc.Inventors: Thomas Middleton, Robert Todd Boes
-
Publication number: 20140195826Abstract: A case for an electronic device is provided. The case includes a battery and electrical circuitry. The electrical circuitry is configured to receive electrical power from a power source connected to the case, supply the electrical power to the electronic device, and monitor an amount of current of the electrical power used by the electronic device. The electrical circuitry is also configured to charge the battery using a remaining amount of current of the electrical power where the sum of the amount of current used by the electronic device and the remaining amount of current do not exceed a current limit for the power source.Type: ApplicationFiled: March 15, 2013Publication date: July 10, 2014Applicant: 1 OAK TECHNOLOGIES, LLCInventors: James John Wojcik, Adam Douglas Center, Abhishek Joshi, Adam Benzion
-
Publication number: 20140189891Abstract: A hard disk assembly includes a frame, a hard disk, and a lock device. The hard disk is assembled in the frame. The lock device is located in the frame. The hard disk assembly is installed in an electronic device. The electronic device includes a support. The frame is slidably installed in the support. The lock device stores a predetermined password and receives a password inputted by a user. The lock device unlocks the hard disk assembly from the support if the password inputted by the user matches the predetermined password.Type: ApplicationFiled: December 26, 2013Publication date: July 3, 2014Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (Shenzhen) CO., LTDInventors: KANG WU, BO TIAN
-
Patent number: 8768300Abstract: The present invention provides a remote control method and system for a smart card. The remote control method for a smart card includes the following steps: a smart card management platform receives a request for destruction of a smart card from a user (S101); the smart card management platform carries out short message interactive processing with a terminal via a mobile network platform according to the request to make the terminal destruct the smart card (S103).Type: GrantFiled: December 24, 2009Date of Patent: July 1, 2014Assignee: ZTE CorporationInventors: Chuanxi Wu, Jingwang Ma
-
Patent number: 8763111Abstract: A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.Type: GrantFiled: November 26, 2012Date of Patent: June 24, 2014Assignee: Intel CorporationInventors: Jasmeet Chhabra, Gyan Prakash
-
Patent number: 8752192Abstract: Whether a combination method defined in an output rule satisfies a combination condition of each content specified in a play list is judged in order of priority defined in a priority list. Based on the judgment result, the output rule is edited in such a manner that the combination condition of each content specified in the play list is satisfied. The resources of the combination target contents specified in the play list are combined in accordance with the combination method of the edited output rule.Type: GrantFiled: August 21, 2009Date of Patent: June 10, 2014Assignee: Kabushiki Kaisha ToshibaInventors: Kenji Odaka, Yoshiki Terashima, Satoshi Ozaki, Shirou Wakayama, Keiichi Teramoto, Eiji Tokita
-
Patent number: 8744403Abstract: The present disclosure provides a method and system for remote control of a smart card. The method comprises that: a smart card management platform receives a request of locking or unlocking a smart card from a subscriber; and the smart card management platform performs interactive processing with a terminal side according to the request via a mobile network platform, so as to enable the terminal side to perform the locking or unlocking of the smart card. The present disclosure enables the payment subscriber to avoid loss when the terminal is robbed, lost, stolen, or is illegally used seriously, and provide a higher flexibility to the payment system.Type: GrantFiled: December 23, 2009Date of Patent: June 3, 2014Assignee: ZTE CorporationInventors: Chuanxi Wu, Jingwang Ma
-
Patent number: 8734529Abstract: An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device.Type: GrantFiled: August 13, 2012Date of Patent: May 27, 2014Assignee: Absolute Software CorporationInventor: Jon Stevens
-
Publication number: 20140143896Abstract: A theft control system may be implemented between a server and a client. The server may provide a certificate which must be periodically renewed. Execution of the certificate may be controlled by a trusted platform module on the client under control of a theft control controller.Type: ApplicationFiled: November 13, 2013Publication date: May 22, 2014Inventor: Xiaodong Richard Chen
-
Patent number: 8721738Abstract: Systems and methods for limiting access to data in a portable data storage device. An exemplary method may use an electronic computing device to prevent access to the data and includes the step of providing the portable storage device with a first software program that has a current expiration time value. The first software program is able to compare the current expiration time value against a time based parameter and activate a security mechanism protecting the data stored in the portable data storage device based on the comparison. The method also includes the step of providing an electronic computing device with a second software program. The second software program is able to identify the portable data storage device and reset the current expiration time value of the first software program to a later time value when the electronic computing device is electronically communicating with the portable data storage device.Type: GrantFiled: January 25, 2012Date of Patent: May 13, 2014Inventor: Timothy T. Miller
-
Patent number: 8726407Abstract: A method for authenticating a computing device or hardware component includes computer-implemented process steps for assigning a unique identifier to the hardware component, generating a baseline fingerprint for the hardware component using algorithm-processing characteristic configuration data determined from the hardware component as input, wherein the baseline fingerprint is capable of being regenerated from the hardware component so long as configuration of the hardware component is not changed, transmitting the identifier in association with the baseline fingerprint for storage in a computer-readable data structure, and generating a data signal, in response to a query comprising the assigned identifier, indicating whether the stored baseline fingerprint for the assigned identifier matches a second fingerprint regenerated from the hardware component at a time after the baseline fingerprint is generated.Type: GrantFiled: October 13, 2010Date of Patent: May 13, 2014Assignee: DeviceAuthority, Inc.Inventor: Craig S. Etchegoyen
-
Patent number: 8718603Abstract: The present application discloses a method and system for remote control of a smart card. The method includes: a smart card management platform receives a request to destroy the smart card from a subscriber (S101); according to the request, the smart card management platform performs interactive processing with a terminal side via a mobile network platform to make the terminal side destroy the smart card (S103). The present application enables the subscriber to avoid loss when the terminal is robbed, lost, stolen, or is illegally used seriously, and provide a higher flexibility to the payment system.Type: GrantFiled: December 23, 2009Date of Patent: May 6, 2014Assignee: ZTE CorporationInventors: Chuanxi Wu, Jingwang Ma
-
Patent number: 8718602Abstract: The disclosure discloses a method and a system for remote control of a smart card; the method comprises: receiving, by a smart card management platform, a request for performing a LOCKING/UNLOCKING operation for a smart card from a user (S101); and the smart card management platform performs a short message interaction with a terminal side through a mobile network platform based on the request, so as to make the terminal side perform the LOCKING/UNLOCKING operation for the smart card (S103). By means of the disclosure, the effects are achieved that the user can apply to a smart card supervision department for locking/unlocking the smart card and a terminal through a short message and disabling or enabling the smart card, when the smart card and the terminal in which the smart card is located are robbed, lost, stolen and has a serious illegal behavior, so as to protect the security of the user and the smart card relevant department to the greatest extent and provide a better flexibility for a payment system.Type: GrantFiled: December 23, 2009Date of Patent: May 6, 2014Assignee: ZTE CorporationInventors: Chuanxi Wu, Jingwang Ma
-
Publication number: 20140123328Abstract: A platform including an always-available theft protection system is described. In one embodiment, the system comprises a power management logic to selectively power elements of the system, a disarming logic to disarm the platform from an armed mode when a disarming command is received via an interface, the interface powered when the platform is in the armed and suspecting modes to detect the disarming command. The system further comprises, in one embodiment, a risk behavior logic to detect a potential problem via a interface, the interface powered when the platform is in the armed mode to detect the potential problem, and a core logic component to provide logic to analyze the potential problem, and to move the platform to a suspecting mode, when the potential problem indicates a theft suspicion, the core logic powered when the risk behavior logic detects the potential problem.Type: ApplicationFiled: December 22, 2011Publication date: May 1, 2014Inventor: Michael Berger
-
Patent number: 8702812Abstract: Methods and arrangements for ensuring that, when a computer system is stolen or otherwise misplaced, the system is rendered unusable (i.e., locked down). Conventional solutions have required software running on the system to perform the lockdown action, but in accordance with at least one preferred embodiment of the present invention is the linkage of TPM (Trusted Platform Module) and AMT (Active Management Technology) solutions whereby an AMT arrangement can remove secure data or identifiers so that any encrypted data present on the system will become unusable.Type: GrantFiled: February 29, 2008Date of Patent: April 22, 2014Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: David C. Challener, Howard Locker, Randall S. Springfield
-
Patent number: 8701013Abstract: A device, method, system and computer readable medium are disclosed for the remote, intelligent capture of screenshots and keystrokes which can subsequently be transmitted with reduced bandwidth requirements.Type: GrantFiled: November 6, 2009Date of Patent: April 15, 2014Assignee: Absolute Software CorporationInventors: Trevor Cox, Damien Loveland, Michael Sitter
-
Patent number: 8696765Abstract: This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.Type: GrantFiled: September 17, 2010Date of Patent: April 15, 2014Assignee: Good Technology CorporationInventors: Daniel J. Mendez, Mason Ng