throbber
Document made available under
`Patent Cooperation Treaty (PCT)
`
`the
`
`International application number: PCT/US05/030171
`
`International filing date:
`
`22 August 2005 (22.08.2005)
`
`Document type:
`
`Certified copy of priority document
`
`Document details:
`
`Country/Office: US
`Number:
`10/945,332
`Filing date:
`20 September 2004 (20.09.2004)
`
`Date of receipt at the International Bureau:
`
`21 October 2005 (21.10.2005)
`
`Remark:
`
`Priority document submitted or transmitted to the International Bureau in
`compliance with Rule 17 .1 (a) or (b)
`
`World Intellectual Property Organization (WIPO) - Geneva, Switzerland
`Organisation Mondiale de la Propriete Intellectuelle (OMPI) - Geneve, Suisse
`
`EX-1026
`US Patent 10,789,393
`
`Page 1 of 290
`
`

`

`Lnder Secretary ilf Commcr·c1c
`for lntdk-ctual Pro1>crty
`a1u! Dinctor oftlH'. UnifNI. Siate8
`Pal:t~llt and Trnd1cmark Oflke
`
`Page 2 of 290
`
`

`

`I\)
`
`0 co
`o -0
`~
`
`Practitioner's Docket No. CWILSON-1 CIP
`
`PATENT
`
`------------------------------------------.0 1-C\I
`~ ' Preliminary Classification:
`C.
`
`Proposed Class:
`
`a..C')
`(/) C')
`"LO
`::)~
`
`C
`~
`"'O
`
`Subclass:
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`0~
`r---o
`~~ ....
`
`L--------------------------------------------..1
`c1
`Commissioner for Patents
`P.O. Box 1450
`Alexandria VA 22313-1450
`
`NEW APPLICATION TRANSMITTAL
`
`Transmitted herewith for filing is the patent application of
`
`Inventor(s):
`
`Carolyn W. Hafeman
`
`For (title): COMPUTER RECOVERY OR RETURN
`
`1.
`
`Type of Application
`
`This application is for a continuation-in-part (C-1-P).
`
`2.
`
`Benefit of Prior U.S. Application (35 U.S.C. §§ 119(e), 120, or 121)
`
`The new application being transmitted claims the benefit of prior U.S. application. Enclosed are
`ADDED PAGES FOR NEW APPLICATION TRANSMITTAL WHERE BENEFIT OF PRIOR U.S.
`APPLICATION CLAIMED.
`
`EXPRESS MAILING UNDER 37 C.F.R. § 1.10*
`(Express Mail label number is mandatory.)
`(Express Mail certification is optional.)
`
`I hereby certify that this paper, along with any document referred to, is being deposited with the United States Postal Service on this date
`September 20, 2004, in an envelope addressed to the Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450 as "Express Mail Post
`Office to Addressee" Mailing Label No. EL700963215US.
`
`Date: q /J.- 0 ( 0 ~
`
`Tracey L. Milka
`Type or print name of person mailing paper
`
`h .. €:.1JUlw
`
`WARNING: Certificate of mailing (first class) or facsimile transmission procedures of 37 C.F.R. 1.8 cannot be used to obtain a date of mailing
`or transmission/or this correspondence.
`
`*WARNING: Each paper or Jee filed by "Express Mail" must have the number of the "Express Mail" mailing label placed thereon prior 10
`mailing. 37 C.F.R. I.IO(b).
`'"Since the filing of correspondence under§ I. IO without the Express Mail mailing label thereon is an oversight that can be avoided by the exercise
`of reasonable care. requestsforwaiverofthis requirement will not be granted on petition." Notice of Oct. 24. 1996. 60 Fed. Reg. 56,439, al 56,442.
`
`New Application Transmittal-page I of 4
`
`Page 3 of 290
`
`

`

`3.
`
`Papers Enclosed
`
`A.
`
`Required for filing date under 37 C.F.R. § 1.53(b) (Regular) or 37 C.F.R. § 1.153 (Design)
`Application
`
`3 7 Page( s) of Specification
`3 Page(s) of Claims
`10 Sheet(s) ofDrawing(s)--Informal
`
`B. Other Papers Enclosed
`
`1 Page(s) of abstract
`
`4.
`
`Declaration or Oath
`
`Not Enclosed.
`
`5.
`
`Inventorship Statement
`
`The inventorship for all the claims in this application is the same.
`
`6.
`
`Language
`
`English
`
`7.
`
`Fee Calculation (37 C.F.R. § 1.16)
`
`Regular Application
`
`CLAIMS AS FILED
`
`Number Filed
`
`Number Extra
`
`Rate
`
`Basic Fee
`37 C.F.R. § 1.16(a)
`770.00
`
`Total
`Claims (3 7 C.F.R.
`§ 1.16(c))
`
`Independent
`Claims (3 7 C.F.R
`§ l.16(b))
`
`10
`
`2
`
`Multiple Dependent Claim(s),
`if any (37 C.F.R. § 1.16(d))
`
`20 =
`
`0
`
`X $
`
`18.00
`
`= $
`
`0.00
`
`3 =
`
`0
`
`X $
`
`86.00
`
`$
`
`+ $
`
`290.00
`
`= $
`
`0.00
`
`0.00
`
`Filing Fee Calculation
`
`$770.00
`
`New Application Transmittal-page 2 of 4
`
`Page 4 of 290
`
`

`

`8.
`
`Assertion of Small Entity Status
`
`Applicant hereby asserts status as a small entity under 37 C.F.R. § 1.27.
`
`Status as a small entity was asserted in the prior application 10/304,827 filed on November 25,
`2002 from which benefit is being claimed for this application under 35 U.S.C. § 120 and which
`status as a small entity is still proper and asserted for this application.
`
`Filing Fee Calculation (50% of above Filing Fee Calculation)
`
`$385.00
`
`9.
`
`Fee Payment Being Made at This Time
`
`Enclosed
`
`Filing Fee
`
`Total Fees Enclosed
`
`10.
`
`Method of Payment of Fees
`
`Attached is a check in the amount of $385.00.
`A duplicate of this paper is attached.
`
`11.
`
`Instructions as to Overpayment
`
`Credit Account No. 19-0737.
`
`$385.00
`
`$385.00
`
`New Application Transmittal-page 3 of 4
`
`Page 5 of 290
`
`

`

`Practitioner's Docket No. CWILSON-1 CIP
`
`PATENT
`
`ADDED PAGES FOR APPLICATION TRANSMITTAL WHERE BENEFIT OF PRIOR U.S.
`APPLICATION CLAIMED
`(37 C.F.R. § 1.78)
`
`12. Relate Back
`
`Amend the specification by inserting, before the first line following the title, the following
`sentence:
`
`A.
`
`35 U.S.C. Sections 120, 121 and 365(c)
`
`"This application is a continuation-in-part of copending applications
`
`Application number 10/304,827 filed on November 25, 2002."
`
`13. Maintenance of Copendency of Prior Application
`
`A.
`
`Extension of Time in Prior Application
`
`A petition, fee and response extends the term in the pending prior application until
`September 18, 2004.
`
`A copy of the petition filed in prior application is attached.
`
`14. Further lnventorsbip Statement Where Benefit of Prior Application(s) Claimed
`
`(a)
`
`This application discloses and claims only subject matter disclosed in the prior
`application whose particulars are set out above and the inventor in this application is
`the same.
`
`15. Small Entity (37 C.F.R. Section 1.28(a))
`
`Applicant has established small entity status by the filing of a statement in parent application
`10/304,827 on November 25, 2002.
`
`Ansel M. Schwartz
`Registration No. 30,587
`Attorney at Law
`201 N. Craig Street
`Suite 304
`Pittsburgh, PA 15213
`412-621-9222
`
`Added Pages for Application Transmittal Where Benefit of Prior U.S. Application(s) Claimed-page 4 of 4
`
`Page 6 of 290
`
`

`

`Practitioner's Docket No. CWILSON-1
`
`PATENT
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re application of:
`Carolyn W. Hafeman
`Application No.: 10/304,827
`Filed: 11/25/2002
`For: COMPUTER RECOVERY OR RETURN
`
`Group No.: 2131
`Examiner: Christopher A. Revak
`
`Mail Stop Amendment
`Commissioner for Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`1.
`
`2.
`
`3.
`
`4.
`
`PETITION AND FEE FOR EXTENSION OF TIME (37 C.F.R. § 1.136(a))
`
`This is a petition for an extension of the time for a total period of three months to response to the
`Office Action dated March 18, 2004.
`
`A response in connection with the matter for which this extension is requested has been filed.
`
`Applicant is a small entity. A verified statement was already filed.
`
`Calculation of extension fee (37 C.F.R. § 1.17(a)(l)-(5)):
`
`Extension:
`three months
`
`Fee for small entity:
`$475.00
`
`Fee $475.00
`
`CERTIFICATION UNDER 37 C.F.R. §§ 1.8(a) and 1.10*
`(When using Express Mail, the Express Mail label number is mandatory;.
`Express Mail certification is optional.)
`
`I hereby certify that, on the date shown below, this correspondence is being:
`
`MAILING
`X deposited with the United States Postal Service in an envelope addressed to the Commissioner for Patents, P.O. Box 1450, Alexandria, VA
`22313-1450.
`
`37 C.F.R. § 1.8(a)
`X with sufficient postage as first class mail.
`
`37 C.F.R. § 1.10*
`□ as "Express Mail Post Office to Addressee"
`Mailing Label No. _ _ _ _ _ _ _ _ _ _ (mandatory)
`
`TRANSMISSION
`□ facsimile transmitted to the Patent and Trademark Office, (703) _ _ _ -
`
`s;,,..! ~ f_ 1)1,,,J_fe-~
`
`•
`
`Date: q /(}o /o.y
`
`Tracey L. Milka
`
`(type or print name of person certifying)
`
`* Only the date of filing (§ I. 6) will be the date used in a patent tenn adjustment calculation. although the date on any certificate of mailing or
`transmission under§ 1.8 continues to be taken into account in detennining timeliness. See§ I. 703(/). Consider "Express Mail Post Office to
`Addressee"(§ I. JO) or facsimile transmission (§ J.6(d)) for the reply to be accorded the earliest possible filing date/or patent tenn adjustment
`calculations.
`
`Petition and Fee for Extension of Time (37 C.F.R. § I .136{a)}-page I of 2
`
`Page 7 of 290
`
`

`

`If an additional extension of time is required, please consider this a petition therefor.
`
`Extension fee due with this request $475.00
`
`5.
`
`Extended period for response
`
`Based on the extension requested in this petition (and that for which a previous petition has been
`filed, if any), the extended period for response will expire on September 18, 2004.
`
`6.
`
`Fee Payment
`
`Attached is a check in the amount of $475.00.
`
`A duplicate copy of this paper is attached.
`
`Ansel M. Schwartz
`Registration No. 30,587
`Attorney at Law
`201 N. Craig Street
`Suite 304
`Pittsburgh, PA 15213
`412-621-9222
`
`Petition and Fee for Extension of Time (37 C.F.R § l.136(a))-page 2 of2
`
`Page 8 of 290
`
`

`

`\
`
`COMPUTER RECOVERY OR RETURN
`
`FIELD OF THE INVENTION
`
`The present invention is related to the return of lost or
`the present invention is
`stolen computers. More specifically,
`related to the return of lost or stolen computers using a recovery
`screen that appears during or after boot-up of the computer.
`
`5
`
`BACKGROUND OF THE INVENTION
`
`Current methods of computer return or recovery products
`
`include:
`
`( 1) Physical labels that attach to the outside hardware
`of the computer equipment.
`
`These hardware labels can contain custom recovery
`information, but because they are hardware based,
`they can not be interactively changed by the owner.
`Also, since they do not have any ability to affect
`the computer boot-up process, they can do nothing
`to help protect the confidential owner information
`on the hard drive. An example of a well known
`physical hardware/recovery label is the STOP Tag by
`Security
`Tracking
`of Office
`Property
`in
`Connecticut. This labeling system has been patented
`in France,
`the US,
`and other countries.
`The
`product can be easily defeated by removing the
`physical label.
`In
`the case of STOP Tag which
`includes a
`'recovery mark' which states "STOLEN
`
`10
`
`15
`
`20
`
`25
`
`Page 9 of 290
`
`

`

`\
`
`5
`
`10
`
`15
`
`20
`
`25
`
`-2-
`
`PROPERTY" underneath the label, a new label can be
`
`simply added over the 'recovery mark' to hide the
`
`(The Security Tracking of
`STOLEN PROPERTY sign.
`Office Property
`equipment
`recovery patent
`is
`
`#5,163,711 This patent actually refers to how the
`
`labels adhere to the equipment - but this is their
`
`patent).
`
`The computer security recovery /return program of
`the present
`invention utilizes
`this
`type of
`
`hardware recovery approach to a small degree, but
`
`is greatly different from this system, because this
`is a
`software program rather
`than a hardware
`solution. Additionally,
`the present invention is
`greatly superior, since the owner can interactively
`customize the return/recovery information displayed
`at any time, and the present invention also helps
`protect
`the
`important,
`confidential
`owner
`information on the hard drive, by the positioning
`of
`the program
`layer
`in
`the equipment boot-up
`process.
`
`( 2) Computer Software Programs that attempt recovery
`through the use of the modem.
`
`security
`several patented computer
`There are
`software products on the market
`today that are
`designed for the purpose of recovering lost or
`stolen equipment. These programs use the computer's
`modem to regularly call a recovery center. Then
`
`Page 10 of 290
`
`

`

`\
`
`5
`
`10
`
`15
`
`20
`
`25
`
`-3-
`
`once a computer is stolen,
`
`the recovery center
`
`waits for the stolen computer to call in. When the
`
`computer modem calls in, the recovery centers use
`
`something similar to the reverse 911 system to get
`
`the phone number
`
`that
`
`the stolen equipment
`
`is
`
`accessing. Using the phone number,
`
`the recovery
`
`system then can try to get a map of where the
`
`computer
`
`is. Some of
`
`these computer security
`
`recovery programs can also attempt to locate stolen
`computers
`through an IP address. Some of these
`
`computer security recovery software programs, can
`
`actually attempt to seize the communication between
`
`the stolen computer and the recovery center and
`
`delete selected files to help protect the owner's
`
`confidential
`
`information. Products
`
`like
`
`these
`
`include CompuTrace,
`LapTrak and Luceria.
`
`PC Phone Home, CyberAngel,
`
`the
`invention is also designed for
`The present
`purpose of recovering lost or stolen equipment, but
`
`the method is distinctively different and unique
`from the current methods.
`The present invention
`
`does not rely on the use of the computer modem.
`The present invention uses a layered program in the
`
`boot-up process to provide a display of the proper
`
`owner recovery and return information using the
`
`The present
`computer's own monitor or screen.
`invention is also different and superior to the
`
`above software tracking products,
`
`in helping to
`
`accomplish international recovery.
`
`None of the
`
`Page 11 of 290
`
`

`

`-4-
`
`above products to date have been able to use the
`modem phone or IP system to track stolen equipment
`internationally. The present
`invention provides
`international recovery by displaying owner email
`information as well as providing recovery help
`through an
`international
`recovery
`internet web
`site.
`
`There are other differences as well in how these
`programs try to also protect the information on the
`hard drive.
`The present invention automatically
`initiates during
`the boot-up process of
`the
`equipment, in order to display the recovery/return
`information before a security prompt screen to
`always help protect
`the owner's confidential
`information on the hard drive. Some of the programs
`above do nothing to protect the user information.
`Others like LapTrak include a Hide-A-File feature
`that an owner can access after the user enters the
`operating system. CyberAngel includes an encryption
`feature. Luceria includes the ability to delete
`pre-selected files from the recovery center. By
`layering
`this
`computer
`security
`application
`strategically before or during a security prompt in
`the boot-up process, this application provides a
`unique and different method to help protect owner
`information.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`Page 12 of 290
`
`

`

`-5-
`
`(An example of patents for these types of products
`would be
`the CompuTrace US Patents #5,715,174,
`#5,764,892, and #5,802,280).
`
`(3) Bios Based Password Identification systems.
`
`There are some computers that are sold with Bios
`based
`identification
`systems
`included.
`These
`products activate immediately when a computer is
`turned on, and prompt
`the user for a password
`before accessing the data on the computer.
`
`The present invention is very different and unique
`from the Bios based program, for many reasons. Most
`importantly the bios based password identification
`products are built
`into
`the hardware of
`the
`computer equipment - not the hard drive. In other
`words, if you removed the hard drive from a stolen
`or lost laptop, and inserted the stolen hard drive
`into a different laptop, you would bypass the bios
`based password identification system, and the bios
`based password identification system would remain
`with the original equipment. Thus, the Bios Based
`Password Identification system can identify the
`computer hardware, but not the hard drive (the most
`important part of the computer equipment).
`
`In addition, the Bios Based Password Identification
`systems are designed as
`a unique method
`for
`providing
`an
`additional
`layer
`of
`password
`
`5
`
`10
`
`15
`
`20
`
`25
`
`Page 13 of 290
`
`

`

`-6-
`
`protection to the equipment hardware, but are not
`designed for recovery or return. There is no design
`for
`including complete
`owner
`information,
`no
`recovery
`information displayed,
`no
`effective
`protection of the information on the hard drive, no
`effective method for the recovery or return of the
`hard drive
`the most
`important
`item
`that a
`consumer would want back.
`In fact
`the Bios
`Password
`Identification product occurs before
`allowing the hard drive to boot up.
`The present
`invention is unique because it is an "application
`software program
`that provides
`its
`layer of
`protection during the boot-up process (not before),
`and thus allows the security product to move with
`the hard drive,
`the most critical part of
`the
`computer.
`
`SUMMARY OF THE INVENTION
`
`invention pertains to a computer return
`The present
`apparatus.
`The apparatus comprises a processor.
`The apparatus
`comprises a memory
`connected to the processor.
`The apparatus
`comprises a display.
`The apparatus comprises a return screen that
`the processor automatically causes to appear during or after boot(cid:173)
`up of
`the processor on
`the display,
`that displays ownership
`information concerning who owns the computer and return information
`for returning the computer to the owner from data stored in the
`memory.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`Page 14 of 290
`
`

`

`-7-
`
`The present invention pertains to a method for returning
`a computer to its owner.
`The method comprises
`the steps of
`activating a computer.
`Then there is the step of displaying
`automatically a return screen on a display of the computer during
`5 or after boot-up of
`the computer, which displays
`information
`concerning owner information about who owns the computer and return
`information for returning the computer to the owner from data
`stored in the memory of the computer.
`
`The present invention pertains to a computer readable
`10 medium whose contents cause a computer to show who is its owner by
`performing the steps of activating a computer. Then there is the
`step of displaying automatically a return screen on a display of
`the computer during or after boot-up of
`the computer, which
`displays information concerning owner information about who owns
`the computer and return information for returning the computer to
`the owner from data stored in the memory of the computer.
`
`15
`
`invention pertains to a computer return
`The present
`apparatus. The apparatus comprises a processor. The apparatus
`comprises a memory connected to the processor.
`The apparatus
`20 comprises a display. The apparatus comprises a return screen that
`the processor automatically causes
`to appear during or after
`boot-up of the processor on the display, that displays information
`concerning an owner who owns
`the computer,
`concerning user
`information about who the user is who the computer is assigned to
`for use, and return information for returning the computer to the
`owner from data stored in the memory.
`
`25
`
`Page 15 of 290
`
`

`

`-8-
`
`The present invention pertains to a method for displaying
`information to assist with returning a computer to its owner. The
`
`method comprises the steps of activating a computer. There is the
`step of displaying automatically a return screen on a display of
`the computer during or after boot-up which displays information
`
`5
`
`concerning owner
`
`information about who
`
`owns
`
`the
`
`computer,
`
`concerning user information about who the user is who the computer
`is assigned to for use, and return information for returning the
`computer to the owner from data stored in a memory of the computer.
`
`10
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`In the accompanying drawings, the preferred embodiment of
`the invention and preferred methods of practicing the invention are
`illustrated in which:
`
`Figure 1 is a schematic representation of the apparatus
`15 of the present invention.
`
`Figure 2 is a representation of a return/recovery dialog
`
`box of an embodiment of the present invention.
`
`Figure 3 is a flow chart regarding an embodiment of the
`present invention.
`
`20
`
`Figure 4 is a flow chart regarding a second embodiment of
`the present invention.
`
`Figure 5 is a representation of an administration program
`section of the present invention.
`
`Page 16 of 290
`
`

`

`-9-
`
`Figure 6 is a representation of a return screen of the
`present invention.
`
`Figure 7 is an example of a password screen utilized by
`the present invention.
`
`5
`
`Figure 8 is a return administration screen of the present
`invention.
`
`Figure 9 is a second return administration screen of the
`present invention.
`
`Figure 10 is a third return administration screen of the
`present invention.
`
`10
`
`Figure 11 is a fourth return administration screen of the
`present invention.
`
`DETAILED DESCRIPTION
`
`Ref erring now to the drawings wherein like reference
`15 numerals refer to similar or identical parts throughout the several
`views, and more specifically to figure 1 thereof, there is shown a
`computer 12 return apparatus 10.
`The apparatus 10 comprises a
`processor 14. The apparatus 10 comprises a memory 16 connected to
`the processor 14. The apparatus 10 comprises a display 18. The
`20 apparatus 10 comprises a return screen 20 that the processor 14
`automatically causes to appear during or after boot-up of the
`14
`on
`the display 18,
`processor
`that displays ownership
`information concerning who owns
`the computer 12 and
`return
`
`Page 17 of 290
`
`

`

`-10-
`
`information for returning the computer 12 to the owner from data
`stored in the memory 16.
`The Owner is defined as the person or
`entity that owns, rents, or licenses the Retriever, and/ or the
`person or entity who controls the recovery service. The Owner has
`5 greater control over the computer 12 than the user. This could
`include, but not be limited to, an employee of a company that owns
`the computer 12, or an agent of the owner or a friend that has the
`permission of the owner to use or have or recover the computer 12.
`
`10
`
`Preferably, the apparatus 10 includes means for causing
`the screen to appear on the display 18 with the owner and return
`information. The causing means 22 is stored in the memory 16. The
`causing means 22 preferably is a software program 24. Preferably,
`the memory 16
`includes a primary operating system having an
`operating screen 26 for the computer 12, and the return screen 20
`15 appears on the display 18 before the operating screen 26 of the
`operating system appears on the display 18.
`
`The software program 24 preferably appears before a
`security prompt such as a password to be entered to obtain access
`to the primary operating system of the computer 12. Preferably,
`the software program 24 allows the owner to change the return
`information and
`the owner
`information, after the password or
`security prompt is satisfied for the computer 12.
`The software
`program 24 is preferably able to communicate through a modem (or
`wireless)
`to a predetermined location to transfer the return
`information to the location to facilitate return of the computer 12
`if it becomes lost by the owner.
`
`2 O
`
`25
`
`Page 18 of 290
`
`

`

`-11-
`
`The present invention pertains to a method for returning
`a computer 12 to its owner.
`The method comprises the steps of
`activating a computer 12.
`Then there is the step of displaying
`automatically a return screen 20 on a display 18 of the computer 12
`5 during or after boot-up of
`the computer 12, which displays
`information concerning owner
`information about who owns
`the
`computer 12 and return information for returning the computer 12 to
`the owner from data stored in the memory 16 of the computer 12.
`
`the displaying step includes the step of
`Preferably,
`10 displaying automatically the return screen 20 before an operating
`screen 26 of the primary operating system of the computer 12.
`There is preferably the step of displaying the return screen 20
`before satisfying a security prompt such as entering a password
`into the computer 12
`to access the primary operating system.
`15 Preferably, there is the step of changing the return information,
`and the owner information after the step of satisfying a security
`prompt such as entering the password into the computer 12.
`
`The present invention pertains to a computer 12 readable
`medium whose contents caus~ a computer 12 to show who is its owner
`20 by performing the steps of activating a computer 12. Then there is
`the step of displaying automatically a return screen 20 on a
`display 18 of the computer 12 during or after boot-up of the
`computer
`12, which displays
`information
`concerning
`owner
`information about who owns the computer 12 and return information
`for returning the computer 12 to the owner from data stored in the
`memory 16 of the computer 12.
`
`25
`
`Page 19 of 290
`
`

`

`-12-
`
`the displaying step includes the step of
`Preferably,
`displaying automatically the return screen 20 before an operating
`screen 26 of the primary operating system of the computer 12.
`There is preferably the step of displaying the return screen 20
`5 before satisfying a security prompt such as entering a password
`into the computer 12
`to access
`the primary operating system.
`Preferably, there is the step of changing the return information
`and the owner information after the step of satisfying a security
`prompt such as entering a password into the computer 12.
`
`10
`
`In the operation of the invention, first, the owner of
`computer
`12 would
`install
`the
`computer
`12
`security
`the
`recovery/return software program 24 application. The program could
`be installed to work on any type of computer 12 screen including
`but not limited to, PC's,
`laptops, handheld computers
`( such as
`15 blackberries, palm pilots), UPS computerized handheld tracking
`display units,
`and
`even cell phone displays. The
`unique
`recovery/return computer 12 security program could in fact, be
`installed and used by any type of computer 12 that utilized a
`monitor display screen. The software application program provides
`an additional layer to the existing operating system of each
`computer 12. The coding language used for the software program 24
`could and would vary depending upon the computer 12 equipment, but
`the core structure of how the program operates would be similar in
`all items.
`
`20
`
`25
`
`Once the computer 12 security software program 24 is
`installed, the monitor of the computer 12 will display the complete
`and current recovery/return
`information
`that
`the program has
`
`Page 20 of 290
`
`

`

`-13-
`
`allowed the owner of the equipment to interactively enter, change
`and update at anytime.
`
`5
`
`10
`
`This "on the fly" ability to change owner recovery
`information to aid return of equipment is an important feature for
`anyone, including college students who travel from home to college
`during different parts of
`the year, people who move,
`and
`particularly business people who travel throughout the world. The
`recovery/return information would not only allow the display 18 of
`physical address return information, and owner contact telephone
`information, but would also provide for international internet
`based recovery
`through
`the added display 18 of owner email
`information, as well as the ability to display an international
`recovery center web site.
`
`20
`
`In addition to increasing chances of return and recovery
`15 of the stolen or lost equipment by using the computer's 12 display
`18 monitor, the program is an additional programming layer added
`into the initial start up program of the computer 12, so that the
`recovery/return display 18 information occurs during or before a
`password or security prompt screen. This is an important feature
`that helps create an environment whereby
`the
`individual that
`happens upon a stolen or lost piece of equipment will see the owner
`recovery/return information displayed before a password or security
`prompt screen. By automatically initiating this program during or
`before a user's security prompt, such as a password screen program,
`the recovery/return program will not only increase chances of
`recovery, but will also increase chances that the computer 12
`information on the hard drive is protected while the computer 12 is
`not in the owner's possession.
`
`25
`
`Page 21 of 290
`
`

`

`-14-
`
`For example,
`program is as follows:
`
`the actual step by step operation of the
`
`5
`
`10
`
`15
`
`20
`
`25
`
`( 1) Someone finds a lost or stolen computer 12. The
`person who
`finds
`the computer 12,
`turns
`the
`computer 12 on.
`(The software program 24 could be provided with a
`warning sticker that will be placed on the outside
`of
`the
`equipment
`telling anyone
`finding
`the
`equipment,
`about
`the program and
`the display
`recovery screen.)
`
`(2)
`
`The computer 12 display 18 screen turns on. The
`computer
`12
`security
`software
`return/recovery
`program
`automatically
`initiates
`during
`the
`computer's 12 boot-up process.
`
`( 3) As the computer 12 booting up process moves the
`user to a password or security prompt screen, the
`computer 12 security software program 24 displays a
`dialog box which includes owner recovery and return
`information,
`so
`that
`the person
`finding
`the
`equipment can return the equipment either directly
`or
`through
`the
`international web site recovery
`center. The information screen can include any of
`the following items of information that the owner
`would like displayed including but not limited to:
`contact name, organization name, owner address,
`owner telephone number, owner email, international
`web site recovery site,
`international
`recovery
`
`Page 22 of 290
`
`

`

`-15-
`
`information,
`email
`serial/registration number.
`
`program
`unique
`( See Figure 2) .
`
`Virtually all of this information would have been
`interactively inputted by the owner, and the owner
`would
`have
`control
`over
`how much
`recovery
`information
`is displayed.
`(This
`is
`important,
`because some owners would like all the available
`information displayed, and others would not. For
`example, a U.S. secret service agent, accountant,
`or military personnel, might only want his name and
`phone number displayed, and would not
`like the
`organization name displayed for fear that would
`encourage a thief to try harder to break into the
`system rather than return the equipment.)
`
`The individual who has found the lost or stolen
`computer 12,
`is now able to easily return the
`equipment
`to
`the
`rightful owner. Because
`the
`display 18 screen showing the owner information is
`before, or during a password or security prompt
`screen that occurs before allowing the user to
`access
`the full operating
`system,
`the person
`recovering the equipment is blocked by the password
`or security prompt screen from accessing the data,
`and
`is unable
`to avoid
`seeing
`the
`recovery
`information screen.
`
`5
`
`10
`
`15
`
`( 4)
`
`20
`
`25
`
`security
`
`to note only that
`important
`It is
`software recovery/return program be
`
`the computer 12
`displayed on
`the
`
`Page 23 of 290
`
`

`

`-16-
`
`computer 12 screen monitor before, or during a password or security
`prompt display screen, because the operating system password screen
`
`5
`
`'wall' before taking the computer 12 user to the computer
`creates a
`12 operating system.
`(See Figure 3). This helps not only protect
`the owner's information on the hard drive, but also ensures that
`the person finding the equipment will see the owner recovery/return
`information.
`If the program initiated after
`the password or
`security prompt screen,
`the person finding the lost or stolen
`equipment would have difficulty ever seeing the recovery/return
`10 display 20.
`
`through the
`It is also important to note that even
`recovery screen dialog box would ideally be the first screen, this
`may not be possible due to the wide variety of software operating
`systems used by computer 12 systems.
`Each computer 12 security
`15 program will attempt to display the recovery information on the
`initial screen when possible. However,
`for one of the Window
`operating systems for example, the first boot-up default screen is
`a CTR+ ALT+DEL screen, and then the program can move to a password
`screen. In this case, the recovery/return program could provide a
`20 display 18 dialog screen that would be an additional layer between
`the CTR+ALT+DEL dialog box and the password dialog box.
`( See
`Figure 4) . Other operating systems could allow the program to
`display the recovery dialog box, with the password or security
`prompt at the bottom of the dialog box (so that even though the
`recovery dialog application is an additional layer during the boot(cid:173)
`up, it would appear that
`the password or security prompt is
`included within the same dialog box).
`(See

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket