`Patent Cooperation Treaty (PCT)
`
`the
`
`International application number: PCT/US05/030171
`
`International filing date:
`
`22 August 2005 (22.08.2005)
`
`Document type:
`
`Certified copy of priority document
`
`Document details:
`
`Country/Office: US
`Number:
`10/945,332
`Filing date:
`20 September 2004 (20.09.2004)
`
`Date of receipt at the International Bureau:
`
`21 October 2005 (21.10.2005)
`
`Remark:
`
`Priority document submitted or transmitted to the International Bureau in
`compliance with Rule 17 .1 (a) or (b)
`
`World Intellectual Property Organization (WIPO) - Geneva, Switzerland
`Organisation Mondiale de la Propriete Intellectuelle (OMPI) - Geneve, Suisse
`
`EX-1026
`US Patent 10,789,393
`
`Page 1 of 290
`
`
`
`Lnder Secretary ilf Commcr·c1c
`for lntdk-ctual Pro1>crty
`a1u! Dinctor oftlH'. UnifNI. Siate8
`Pal:t~llt and Trnd1cmark Oflke
`
`Page 2 of 290
`
`
`
`I\)
`
`0 co
`o -0
`~
`
`Practitioner's Docket No. CWILSON-1 CIP
`
`PATENT
`
`------------------------------------------.0 1-C\I
`~ ' Preliminary Classification:
`C.
`
`Proposed Class:
`
`a..C')
`(/) C')
`"LO
`::)~
`
`C
`~
`"'O
`
`Subclass:
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`0~
`r---o
`~~ ....
`
`L--------------------------------------------..1
`c1
`Commissioner for Patents
`P.O. Box 1450
`Alexandria VA 22313-1450
`
`NEW APPLICATION TRANSMITTAL
`
`Transmitted herewith for filing is the patent application of
`
`Inventor(s):
`
`Carolyn W. Hafeman
`
`For (title): COMPUTER RECOVERY OR RETURN
`
`1.
`
`Type of Application
`
`This application is for a continuation-in-part (C-1-P).
`
`2.
`
`Benefit of Prior U.S. Application (35 U.S.C. §§ 119(e), 120, or 121)
`
`The new application being transmitted claims the benefit of prior U.S. application. Enclosed are
`ADDED PAGES FOR NEW APPLICATION TRANSMITTAL WHERE BENEFIT OF PRIOR U.S.
`APPLICATION CLAIMED.
`
`EXPRESS MAILING UNDER 37 C.F.R. § 1.10*
`(Express Mail label number is mandatory.)
`(Express Mail certification is optional.)
`
`I hereby certify that this paper, along with any document referred to, is being deposited with the United States Postal Service on this date
`September 20, 2004, in an envelope addressed to the Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450 as "Express Mail Post
`Office to Addressee" Mailing Label No. EL700963215US.
`
`Date: q /J.- 0 ( 0 ~
`
`Tracey L. Milka
`Type or print name of person mailing paper
`
`h .. €:.1JUlw
`
`WARNING: Certificate of mailing (first class) or facsimile transmission procedures of 37 C.F.R. 1.8 cannot be used to obtain a date of mailing
`or transmission/or this correspondence.
`
`*WARNING: Each paper or Jee filed by "Express Mail" must have the number of the "Express Mail" mailing label placed thereon prior 10
`mailing. 37 C.F.R. I.IO(b).
`'"Since the filing of correspondence under§ I. IO without the Express Mail mailing label thereon is an oversight that can be avoided by the exercise
`of reasonable care. requestsforwaiverofthis requirement will not be granted on petition." Notice of Oct. 24. 1996. 60 Fed. Reg. 56,439, al 56,442.
`
`New Application Transmittal-page I of 4
`
`Page 3 of 290
`
`
`
`3.
`
`Papers Enclosed
`
`A.
`
`Required for filing date under 37 C.F.R. § 1.53(b) (Regular) or 37 C.F.R. § 1.153 (Design)
`Application
`
`3 7 Page( s) of Specification
`3 Page(s) of Claims
`10 Sheet(s) ofDrawing(s)--Informal
`
`B. Other Papers Enclosed
`
`1 Page(s) of abstract
`
`4.
`
`Declaration or Oath
`
`Not Enclosed.
`
`5.
`
`Inventorship Statement
`
`The inventorship for all the claims in this application is the same.
`
`6.
`
`Language
`
`English
`
`7.
`
`Fee Calculation (37 C.F.R. § 1.16)
`
`Regular Application
`
`CLAIMS AS FILED
`
`Number Filed
`
`Number Extra
`
`Rate
`
`Basic Fee
`37 C.F.R. § 1.16(a)
`770.00
`
`Total
`Claims (3 7 C.F.R.
`§ 1.16(c))
`
`Independent
`Claims (3 7 C.F.R
`§ l.16(b))
`
`10
`
`2
`
`Multiple Dependent Claim(s),
`if any (37 C.F.R. § 1.16(d))
`
`20 =
`
`0
`
`X $
`
`18.00
`
`= $
`
`0.00
`
`3 =
`
`0
`
`X $
`
`86.00
`
`$
`
`+ $
`
`290.00
`
`= $
`
`0.00
`
`0.00
`
`Filing Fee Calculation
`
`$770.00
`
`New Application Transmittal-page 2 of 4
`
`Page 4 of 290
`
`
`
`8.
`
`Assertion of Small Entity Status
`
`Applicant hereby asserts status as a small entity under 37 C.F.R. § 1.27.
`
`Status as a small entity was asserted in the prior application 10/304,827 filed on November 25,
`2002 from which benefit is being claimed for this application under 35 U.S.C. § 120 and which
`status as a small entity is still proper and asserted for this application.
`
`Filing Fee Calculation (50% of above Filing Fee Calculation)
`
`$385.00
`
`9.
`
`Fee Payment Being Made at This Time
`
`Enclosed
`
`Filing Fee
`
`Total Fees Enclosed
`
`10.
`
`Method of Payment of Fees
`
`Attached is a check in the amount of $385.00.
`A duplicate of this paper is attached.
`
`11.
`
`Instructions as to Overpayment
`
`Credit Account No. 19-0737.
`
`$385.00
`
`$385.00
`
`New Application Transmittal-page 3 of 4
`
`Page 5 of 290
`
`
`
`Practitioner's Docket No. CWILSON-1 CIP
`
`PATENT
`
`ADDED PAGES FOR APPLICATION TRANSMITTAL WHERE BENEFIT OF PRIOR U.S.
`APPLICATION CLAIMED
`(37 C.F.R. § 1.78)
`
`12. Relate Back
`
`Amend the specification by inserting, before the first line following the title, the following
`sentence:
`
`A.
`
`35 U.S.C. Sections 120, 121 and 365(c)
`
`"This application is a continuation-in-part of copending applications
`
`Application number 10/304,827 filed on November 25, 2002."
`
`13. Maintenance of Copendency of Prior Application
`
`A.
`
`Extension of Time in Prior Application
`
`A petition, fee and response extends the term in the pending prior application until
`September 18, 2004.
`
`A copy of the petition filed in prior application is attached.
`
`14. Further lnventorsbip Statement Where Benefit of Prior Application(s) Claimed
`
`(a)
`
`This application discloses and claims only subject matter disclosed in the prior
`application whose particulars are set out above and the inventor in this application is
`the same.
`
`15. Small Entity (37 C.F.R. Section 1.28(a))
`
`Applicant has established small entity status by the filing of a statement in parent application
`10/304,827 on November 25, 2002.
`
`Ansel M. Schwartz
`Registration No. 30,587
`Attorney at Law
`201 N. Craig Street
`Suite 304
`Pittsburgh, PA 15213
`412-621-9222
`
`Added Pages for Application Transmittal Where Benefit of Prior U.S. Application(s) Claimed-page 4 of 4
`
`Page 6 of 290
`
`
`
`Practitioner's Docket No. CWILSON-1
`
`PATENT
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re application of:
`Carolyn W. Hafeman
`Application No.: 10/304,827
`Filed: 11/25/2002
`For: COMPUTER RECOVERY OR RETURN
`
`Group No.: 2131
`Examiner: Christopher A. Revak
`
`Mail Stop Amendment
`Commissioner for Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`1.
`
`2.
`
`3.
`
`4.
`
`PETITION AND FEE FOR EXTENSION OF TIME (37 C.F.R. § 1.136(a))
`
`This is a petition for an extension of the time for a total period of three months to response to the
`Office Action dated March 18, 2004.
`
`A response in connection with the matter for which this extension is requested has been filed.
`
`Applicant is a small entity. A verified statement was already filed.
`
`Calculation of extension fee (37 C.F.R. § 1.17(a)(l)-(5)):
`
`Extension:
`three months
`
`Fee for small entity:
`$475.00
`
`Fee $475.00
`
`CERTIFICATION UNDER 37 C.F.R. §§ 1.8(a) and 1.10*
`(When using Express Mail, the Express Mail label number is mandatory;.
`Express Mail certification is optional.)
`
`I hereby certify that, on the date shown below, this correspondence is being:
`
`MAILING
`X deposited with the United States Postal Service in an envelope addressed to the Commissioner for Patents, P.O. Box 1450, Alexandria, VA
`22313-1450.
`
`37 C.F.R. § 1.8(a)
`X with sufficient postage as first class mail.
`
`37 C.F.R. § 1.10*
`□ as "Express Mail Post Office to Addressee"
`Mailing Label No. _ _ _ _ _ _ _ _ _ _ (mandatory)
`
`TRANSMISSION
`□ facsimile transmitted to the Patent and Trademark Office, (703) _ _ _ -
`
`s;,,..! ~ f_ 1)1,,,J_fe-~
`
`•
`
`Date: q /(}o /o.y
`
`Tracey L. Milka
`
`(type or print name of person certifying)
`
`* Only the date of filing (§ I. 6) will be the date used in a patent tenn adjustment calculation. although the date on any certificate of mailing or
`transmission under§ 1.8 continues to be taken into account in detennining timeliness. See§ I. 703(/). Consider "Express Mail Post Office to
`Addressee"(§ I. JO) or facsimile transmission (§ J.6(d)) for the reply to be accorded the earliest possible filing date/or patent tenn adjustment
`calculations.
`
`Petition and Fee for Extension of Time (37 C.F.R. § I .136{a)}-page I of 2
`
`Page 7 of 290
`
`
`
`If an additional extension of time is required, please consider this a petition therefor.
`
`Extension fee due with this request $475.00
`
`5.
`
`Extended period for response
`
`Based on the extension requested in this petition (and that for which a previous petition has been
`filed, if any), the extended period for response will expire on September 18, 2004.
`
`6.
`
`Fee Payment
`
`Attached is a check in the amount of $475.00.
`
`A duplicate copy of this paper is attached.
`
`Ansel M. Schwartz
`Registration No. 30,587
`Attorney at Law
`201 N. Craig Street
`Suite 304
`Pittsburgh, PA 15213
`412-621-9222
`
`Petition and Fee for Extension of Time (37 C.F.R § l.136(a))-page 2 of2
`
`Page 8 of 290
`
`
`
`\
`
`COMPUTER RECOVERY OR RETURN
`
`FIELD OF THE INVENTION
`
`The present invention is related to the return of lost or
`the present invention is
`stolen computers. More specifically,
`related to the return of lost or stolen computers using a recovery
`screen that appears during or after boot-up of the computer.
`
`5
`
`BACKGROUND OF THE INVENTION
`
`Current methods of computer return or recovery products
`
`include:
`
`( 1) Physical labels that attach to the outside hardware
`of the computer equipment.
`
`These hardware labels can contain custom recovery
`information, but because they are hardware based,
`they can not be interactively changed by the owner.
`Also, since they do not have any ability to affect
`the computer boot-up process, they can do nothing
`to help protect the confidential owner information
`on the hard drive. An example of a well known
`physical hardware/recovery label is the STOP Tag by
`Security
`Tracking
`of Office
`Property
`in
`Connecticut. This labeling system has been patented
`in France,
`the US,
`and other countries.
`The
`product can be easily defeated by removing the
`physical label.
`In
`the case of STOP Tag which
`includes a
`'recovery mark' which states "STOLEN
`
`10
`
`15
`
`20
`
`25
`
`Page 9 of 290
`
`
`
`\
`
`5
`
`10
`
`15
`
`20
`
`25
`
`-2-
`
`PROPERTY" underneath the label, a new label can be
`
`simply added over the 'recovery mark' to hide the
`
`(The Security Tracking of
`STOLEN PROPERTY sign.
`Office Property
`equipment
`recovery patent
`is
`
`#5,163,711 This patent actually refers to how the
`
`labels adhere to the equipment - but this is their
`
`patent).
`
`The computer security recovery /return program of
`the present
`invention utilizes
`this
`type of
`
`hardware recovery approach to a small degree, but
`
`is greatly different from this system, because this
`is a
`software program rather
`than a hardware
`solution. Additionally,
`the present invention is
`greatly superior, since the owner can interactively
`customize the return/recovery information displayed
`at any time, and the present invention also helps
`protect
`the
`important,
`confidential
`owner
`information on the hard drive, by the positioning
`of
`the program
`layer
`in
`the equipment boot-up
`process.
`
`( 2) Computer Software Programs that attempt recovery
`through the use of the modem.
`
`security
`several patented computer
`There are
`software products on the market
`today that are
`designed for the purpose of recovering lost or
`stolen equipment. These programs use the computer's
`modem to regularly call a recovery center. Then
`
`Page 10 of 290
`
`
`
`\
`
`5
`
`10
`
`15
`
`20
`
`25
`
`-3-
`
`once a computer is stolen,
`
`the recovery center
`
`waits for the stolen computer to call in. When the
`
`computer modem calls in, the recovery centers use
`
`something similar to the reverse 911 system to get
`
`the phone number
`
`that
`
`the stolen equipment
`
`is
`
`accessing. Using the phone number,
`
`the recovery
`
`system then can try to get a map of where the
`
`computer
`
`is. Some of
`
`these computer security
`
`recovery programs can also attempt to locate stolen
`computers
`through an IP address. Some of these
`
`computer security recovery software programs, can
`
`actually attempt to seize the communication between
`
`the stolen computer and the recovery center and
`
`delete selected files to help protect the owner's
`
`confidential
`
`information. Products
`
`like
`
`these
`
`include CompuTrace,
`LapTrak and Luceria.
`
`PC Phone Home, CyberAngel,
`
`the
`invention is also designed for
`The present
`purpose of recovering lost or stolen equipment, but
`
`the method is distinctively different and unique
`from the current methods.
`The present invention
`
`does not rely on the use of the computer modem.
`The present invention uses a layered program in the
`
`boot-up process to provide a display of the proper
`
`owner recovery and return information using the
`
`The present
`computer's own monitor or screen.
`invention is also different and superior to the
`
`above software tracking products,
`
`in helping to
`
`accomplish international recovery.
`
`None of the
`
`Page 11 of 290
`
`
`
`-4-
`
`above products to date have been able to use the
`modem phone or IP system to track stolen equipment
`internationally. The present
`invention provides
`international recovery by displaying owner email
`information as well as providing recovery help
`through an
`international
`recovery
`internet web
`site.
`
`There are other differences as well in how these
`programs try to also protect the information on the
`hard drive.
`The present invention automatically
`initiates during
`the boot-up process of
`the
`equipment, in order to display the recovery/return
`information before a security prompt screen to
`always help protect
`the owner's confidential
`information on the hard drive. Some of the programs
`above do nothing to protect the user information.
`Others like LapTrak include a Hide-A-File feature
`that an owner can access after the user enters the
`operating system. CyberAngel includes an encryption
`feature. Luceria includes the ability to delete
`pre-selected files from the recovery center. By
`layering
`this
`computer
`security
`application
`strategically before or during a security prompt in
`the boot-up process, this application provides a
`unique and different method to help protect owner
`information.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`Page 12 of 290
`
`
`
`-5-
`
`(An example of patents for these types of products
`would be
`the CompuTrace US Patents #5,715,174,
`#5,764,892, and #5,802,280).
`
`(3) Bios Based Password Identification systems.
`
`There are some computers that are sold with Bios
`based
`identification
`systems
`included.
`These
`products activate immediately when a computer is
`turned on, and prompt
`the user for a password
`before accessing the data on the computer.
`
`The present invention is very different and unique
`from the Bios based program, for many reasons. Most
`importantly the bios based password identification
`products are built
`into
`the hardware of
`the
`computer equipment - not the hard drive. In other
`words, if you removed the hard drive from a stolen
`or lost laptop, and inserted the stolen hard drive
`into a different laptop, you would bypass the bios
`based password identification system, and the bios
`based password identification system would remain
`with the original equipment. Thus, the Bios Based
`Password Identification system can identify the
`computer hardware, but not the hard drive (the most
`important part of the computer equipment).
`
`In addition, the Bios Based Password Identification
`systems are designed as
`a unique method
`for
`providing
`an
`additional
`layer
`of
`password
`
`5
`
`10
`
`15
`
`20
`
`25
`
`Page 13 of 290
`
`
`
`-6-
`
`protection to the equipment hardware, but are not
`designed for recovery or return. There is no design
`for
`including complete
`owner
`information,
`no
`recovery
`information displayed,
`no
`effective
`protection of the information on the hard drive, no
`effective method for the recovery or return of the
`hard drive
`the most
`important
`item
`that a
`consumer would want back.
`In fact
`the Bios
`Password
`Identification product occurs before
`allowing the hard drive to boot up.
`The present
`invention is unique because it is an "application
`software program
`that provides
`its
`layer of
`protection during the boot-up process (not before),
`and thus allows the security product to move with
`the hard drive,
`the most critical part of
`the
`computer.
`
`SUMMARY OF THE INVENTION
`
`invention pertains to a computer return
`The present
`apparatus.
`The apparatus comprises a processor.
`The apparatus
`comprises a memory
`connected to the processor.
`The apparatus
`comprises a display.
`The apparatus comprises a return screen that
`the processor automatically causes to appear during or after boot(cid:173)
`up of
`the processor on
`the display,
`that displays ownership
`information concerning who owns the computer and return information
`for returning the computer to the owner from data stored in the
`memory.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`Page 14 of 290
`
`
`
`-7-
`
`The present invention pertains to a method for returning
`a computer to its owner.
`The method comprises
`the steps of
`activating a computer.
`Then there is the step of displaying
`automatically a return screen on a display of the computer during
`5 or after boot-up of
`the computer, which displays
`information
`concerning owner information about who owns the computer and return
`information for returning the computer to the owner from data
`stored in the memory of the computer.
`
`The present invention pertains to a computer readable
`10 medium whose contents cause a computer to show who is its owner by
`performing the steps of activating a computer. Then there is the
`step of displaying automatically a return screen on a display of
`the computer during or after boot-up of
`the computer, which
`displays information concerning owner information about who owns
`the computer and return information for returning the computer to
`the owner from data stored in the memory of the computer.
`
`15
`
`invention pertains to a computer return
`The present
`apparatus. The apparatus comprises a processor. The apparatus
`comprises a memory connected to the processor.
`The apparatus
`20 comprises a display. The apparatus comprises a return screen that
`the processor automatically causes
`to appear during or after
`boot-up of the processor on the display, that displays information
`concerning an owner who owns
`the computer,
`concerning user
`information about who the user is who the computer is assigned to
`for use, and return information for returning the computer to the
`owner from data stored in the memory.
`
`25
`
`Page 15 of 290
`
`
`
`-8-
`
`The present invention pertains to a method for displaying
`information to assist with returning a computer to its owner. The
`
`method comprises the steps of activating a computer. There is the
`step of displaying automatically a return screen on a display of
`the computer during or after boot-up which displays information
`
`5
`
`concerning owner
`
`information about who
`
`owns
`
`the
`
`computer,
`
`concerning user information about who the user is who the computer
`is assigned to for use, and return information for returning the
`computer to the owner from data stored in a memory of the computer.
`
`10
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`In the accompanying drawings, the preferred embodiment of
`the invention and preferred methods of practicing the invention are
`illustrated in which:
`
`Figure 1 is a schematic representation of the apparatus
`15 of the present invention.
`
`Figure 2 is a representation of a return/recovery dialog
`
`box of an embodiment of the present invention.
`
`Figure 3 is a flow chart regarding an embodiment of the
`present invention.
`
`20
`
`Figure 4 is a flow chart regarding a second embodiment of
`the present invention.
`
`Figure 5 is a representation of an administration program
`section of the present invention.
`
`Page 16 of 290
`
`
`
`-9-
`
`Figure 6 is a representation of a return screen of the
`present invention.
`
`Figure 7 is an example of a password screen utilized by
`the present invention.
`
`5
`
`Figure 8 is a return administration screen of the present
`invention.
`
`Figure 9 is a second return administration screen of the
`present invention.
`
`Figure 10 is a third return administration screen of the
`present invention.
`
`10
`
`Figure 11 is a fourth return administration screen of the
`present invention.
`
`DETAILED DESCRIPTION
`
`Ref erring now to the drawings wherein like reference
`15 numerals refer to similar or identical parts throughout the several
`views, and more specifically to figure 1 thereof, there is shown a
`computer 12 return apparatus 10.
`The apparatus 10 comprises a
`processor 14. The apparatus 10 comprises a memory 16 connected to
`the processor 14. The apparatus 10 comprises a display 18. The
`20 apparatus 10 comprises a return screen 20 that the processor 14
`automatically causes to appear during or after boot-up of the
`14
`on
`the display 18,
`processor
`that displays ownership
`information concerning who owns
`the computer 12 and
`return
`
`Page 17 of 290
`
`
`
`-10-
`
`information for returning the computer 12 to the owner from data
`stored in the memory 16.
`The Owner is defined as the person or
`entity that owns, rents, or licenses the Retriever, and/ or the
`person or entity who controls the recovery service. The Owner has
`5 greater control over the computer 12 than the user. This could
`include, but not be limited to, an employee of a company that owns
`the computer 12, or an agent of the owner or a friend that has the
`permission of the owner to use or have or recover the computer 12.
`
`10
`
`Preferably, the apparatus 10 includes means for causing
`the screen to appear on the display 18 with the owner and return
`information. The causing means 22 is stored in the memory 16. The
`causing means 22 preferably is a software program 24. Preferably,
`the memory 16
`includes a primary operating system having an
`operating screen 26 for the computer 12, and the return screen 20
`15 appears on the display 18 before the operating screen 26 of the
`operating system appears on the display 18.
`
`The software program 24 preferably appears before a
`security prompt such as a password to be entered to obtain access
`to the primary operating system of the computer 12. Preferably,
`the software program 24 allows the owner to change the return
`information and
`the owner
`information, after the password or
`security prompt is satisfied for the computer 12.
`The software
`program 24 is preferably able to communicate through a modem (or
`wireless)
`to a predetermined location to transfer the return
`information to the location to facilitate return of the computer 12
`if it becomes lost by the owner.
`
`2 O
`
`25
`
`Page 18 of 290
`
`
`
`-11-
`
`The present invention pertains to a method for returning
`a computer 12 to its owner.
`The method comprises the steps of
`activating a computer 12.
`Then there is the step of displaying
`automatically a return screen 20 on a display 18 of the computer 12
`5 during or after boot-up of
`the computer 12, which displays
`information concerning owner
`information about who owns
`the
`computer 12 and return information for returning the computer 12 to
`the owner from data stored in the memory 16 of the computer 12.
`
`the displaying step includes the step of
`Preferably,
`10 displaying automatically the return screen 20 before an operating
`screen 26 of the primary operating system of the computer 12.
`There is preferably the step of displaying the return screen 20
`before satisfying a security prompt such as entering a password
`into the computer 12
`to access the primary operating system.
`15 Preferably, there is the step of changing the return information,
`and the owner information after the step of satisfying a security
`prompt such as entering the password into the computer 12.
`
`The present invention pertains to a computer 12 readable
`medium whose contents caus~ a computer 12 to show who is its owner
`20 by performing the steps of activating a computer 12. Then there is
`the step of displaying automatically a return screen 20 on a
`display 18 of the computer 12 during or after boot-up of the
`computer
`12, which displays
`information
`concerning
`owner
`information about who owns the computer 12 and return information
`for returning the computer 12 to the owner from data stored in the
`memory 16 of the computer 12.
`
`25
`
`Page 19 of 290
`
`
`
`-12-
`
`the displaying step includes the step of
`Preferably,
`displaying automatically the return screen 20 before an operating
`screen 26 of the primary operating system of the computer 12.
`There is preferably the step of displaying the return screen 20
`5 before satisfying a security prompt such as entering a password
`into the computer 12
`to access
`the primary operating system.
`Preferably, there is the step of changing the return information
`and the owner information after the step of satisfying a security
`prompt such as entering a password into the computer 12.
`
`10
`
`In the operation of the invention, first, the owner of
`computer
`12 would
`install
`the
`computer
`12
`security
`the
`recovery/return software program 24 application. The program could
`be installed to work on any type of computer 12 screen including
`but not limited to, PC's,
`laptops, handheld computers
`( such as
`15 blackberries, palm pilots), UPS computerized handheld tracking
`display units,
`and
`even cell phone displays. The
`unique
`recovery/return computer 12 security program could in fact, be
`installed and used by any type of computer 12 that utilized a
`monitor display screen. The software application program provides
`an additional layer to the existing operating system of each
`computer 12. The coding language used for the software program 24
`could and would vary depending upon the computer 12 equipment, but
`the core structure of how the program operates would be similar in
`all items.
`
`20
`
`25
`
`Once the computer 12 security software program 24 is
`installed, the monitor of the computer 12 will display the complete
`and current recovery/return
`information
`that
`the program has
`
`Page 20 of 290
`
`
`
`-13-
`
`allowed the owner of the equipment to interactively enter, change
`and update at anytime.
`
`5
`
`10
`
`This "on the fly" ability to change owner recovery
`information to aid return of equipment is an important feature for
`anyone, including college students who travel from home to college
`during different parts of
`the year, people who move,
`and
`particularly business people who travel throughout the world. The
`recovery/return information would not only allow the display 18 of
`physical address return information, and owner contact telephone
`information, but would also provide for international internet
`based recovery
`through
`the added display 18 of owner email
`information, as well as the ability to display an international
`recovery center web site.
`
`20
`
`In addition to increasing chances of return and recovery
`15 of the stolen or lost equipment by using the computer's 12 display
`18 monitor, the program is an additional programming layer added
`into the initial start up program of the computer 12, so that the
`recovery/return display 18 information occurs during or before a
`password or security prompt screen. This is an important feature
`that helps create an environment whereby
`the
`individual that
`happens upon a stolen or lost piece of equipment will see the owner
`recovery/return information displayed before a password or security
`prompt screen. By automatically initiating this program during or
`before a user's security prompt, such as a password screen program,
`the recovery/return program will not only increase chances of
`recovery, but will also increase chances that the computer 12
`information on the hard drive is protected while the computer 12 is
`not in the owner's possession.
`
`25
`
`Page 21 of 290
`
`
`
`-14-
`
`For example,
`program is as follows:
`
`the actual step by step operation of the
`
`5
`
`10
`
`15
`
`20
`
`25
`
`( 1) Someone finds a lost or stolen computer 12. The
`person who
`finds
`the computer 12,
`turns
`the
`computer 12 on.
`(The software program 24 could be provided with a
`warning sticker that will be placed on the outside
`of
`the
`equipment
`telling anyone
`finding
`the
`equipment,
`about
`the program and
`the display
`recovery screen.)
`
`(2)
`
`The computer 12 display 18 screen turns on. The
`computer
`12
`security
`software
`return/recovery
`program
`automatically
`initiates
`during
`the
`computer's 12 boot-up process.
`
`( 3) As the computer 12 booting up process moves the
`user to a password or security prompt screen, the
`computer 12 security software program 24 displays a
`dialog box which includes owner recovery and return
`information,
`so
`that
`the person
`finding
`the
`equipment can return the equipment either directly
`or
`through
`the
`international web site recovery
`center. The information screen can include any of
`the following items of information that the owner
`would like displayed including but not limited to:
`contact name, organization name, owner address,
`owner telephone number, owner email, international
`web site recovery site,
`international
`recovery
`
`Page 22 of 290
`
`
`
`-15-
`
`information,
`serial/registration number.
`
`program
`unique
`( See Figure 2) .
`
`Virtually all of this information would have been
`interactively inputted by the owner, and the owner
`would
`have
`control
`over
`how much
`recovery
`information
`is displayed.
`(This
`is
`important,
`because some owners would like all the available
`information displayed, and others would not. For
`example, a U.S. secret service agent, accountant,
`or military personnel, might only want his name and
`phone number displayed, and would not
`like the
`organization name displayed for fear that would
`encourage a thief to try harder to break into the
`system rather than return the equipment.)
`
`The individual who has found the lost or stolen
`computer 12,
`is now able to easily return the
`equipment
`to
`the
`rightful owner. Because
`the
`display 18 screen showing the owner information is
`before, or during a password or security prompt
`screen that occurs before allowing the user to
`access
`the full operating
`system,
`the person
`recovering the equipment is blocked by the password
`or security prompt screen from accessing the data,
`and
`is unable
`to avoid
`seeing
`the
`recovery
`information screen.
`
`5
`
`10
`
`15
`
`( 4)
`
`20
`
`25
`
`security
`
`to note only that
`important
`It is
`software recovery/return program be
`
`the computer 12
`displayed on
`the
`
`Page 23 of 290
`
`
`
`-16-
`
`computer 12 screen monitor before, or during a password or security
`prompt display screen, because the operating system password screen
`
`5
`
`'wall' before taking the computer 12 user to the computer
`creates a
`12 operating system.
`(See Figure 3). This helps not only protect
`the owner's information on the hard drive, but also ensures that
`the person finding the equipment will see the owner recovery/return
`information.
`If the program initiated after
`the password or
`security prompt screen,
`the person finding the lost or stolen
`equipment would have difficulty ever seeing the recovery/return
`10 display 20.
`
`through the
`It is also important to note that even
`recovery screen dialog box would ideally be the first screen, this
`may not be possible due to the wide variety of software operating
`systems used by computer 12 systems.
`Each computer 12 security
`15 program will attempt to display the recovery information on the
`initial screen when possible. However,
`for one of the Window
`operating systems for example, the first boot-up default screen is
`a CTR+ ALT+DEL screen, and then the program can move to a password
`screen. In this case, the recovery/return program could provide a
`20 display 18 dialog screen that would be an additional layer between
`the CTR+ALT+DEL dialog box and the password dialog box.
`( See
`Figure 4) . Other operating systems could allow the program to
`display the recovery dialog box, with the password or security
`prompt at the bottom of the dialog box (so that even though the
`recovery dialog application is an additional layer during the boot(cid:173)
`up, it would appear that
`the password or security prompt is
`included within the same dialog box).
`(See