throbber
US 10,789,393 B2
`(10) Patent No.:
`a2) United States Patent
`
` Hafeman (45) Date of Patent: *Sep. 29, 2020
`
`
`US010789393B2
`
`(54) COMPUTER RECOVERY OR RETURN
`;
`(71) Applicant: Carolyn W. Hafeman, Evergreen, CO
`(US)
`Inventor: Carolyn W. Hafeman, Evergreen, CO
`
`(72)
`
`(US)
`
`*)
`
`Notice:
`
`1)
`y
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(52) U.S. Cl.
`CPC ween GO06F 21/88 (2013.01); GO6F 21/31
`(2013.01); GO6F 21/51 (2013.01); GO6F
`21/575 (2013.01); GO6F 21/6218 (2013.01);
`G06F 40/134 (2020.01); GO6F 2221/2117
`(
`);
`(2013.01)
`
`(58) Field of Classification Search
`CPC ...... GO6F 21/88; GO6F 40/134; GO6F 21/575;
`GO6F 21/6218; GO6F 21/51; GO6F 21/31;
`GO6F 2221/2117
`
`,
`
`This patent is subject to a terminal dis-
`claimer.
`
`(56)
`
`See application file for complete search history.
`
`References Cited
`
`(21) Appl. No.: 16/377,768
`Tad:
`Filed:
`
`(22)
`(65)
`
`Apr. 8, 2019
`Prior Publication Data
`US 2019/0236319 Al
`Aug. 1, 2019
`Related U.S. Application Data
`(63) Continuation of application No. 15/864,749, filed on
`Jan. 8, 2018, now Pat. No. 10,325,122, which is a
`continuation of application No. 15/601,645, filed on
`May 22, 2017, now Pat. No. 9,892,287, which is a
`continuation of application No. 15/199,316, filed on
`Jun. 30, 2016, now Pat. No. 9,672,388, which isa
`continuation of application No. 14/691,222, filed on
`Apr. 20, 2015, now Pat. No. 9,390,296, which is a
`continuation of application No. 14/087,866,filed on
`Nov. 22, 2013, now Pat. No. 9,021,610, whichis a
`(Continued)
`
`U.S. PATENT DOCUMENTS
`5,715,174 A
`2/1998 Cotichini
`5,748,084 A
`5/1998 Isikoff
`(Continued)
`OTHER PUBLICATIONS
`Crouch, “Tips for keeping a leash on your PDA’s data,” Network
`World, Dialog text search, p. 1-3, (Feb. 9, 2001).
`
`Primary Examiner — Christopher A Revak
`(74) Attorney, Agent, or Firm — Ansel M. Schwartz
`
`ABSTRACT
`57)
`A computer return apparatus includes a processor. The
`apparatus includes a memory connected to the processor.
`The apparatus includes a display. The apparatus includes a
`return screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays information concerning an owner who
`ownsthe computer, concerning user information about who
`the user is who the computer is assigned to for use, and
`return information for returning the computer to the owner
`from data stored in the memory. A method for displaying
`information to assist with returning a computerto its owner.
`
`(51)
`
`Int. CL
`GO6F 21/88
`GO6F 40/134
`G06F 21/31
`GO6F 21/51
`GO6F 21/57
`GO6F 21/62
`
`(2013.01)
`(2020.01)
`(2013.01)
`(2013.01)
`(2013.01)
`(2013.01)
`
`
`
`7 Claims, 10 Drawing Sheets
`
`
`Workstation Locked
`
`The Retriever by WorldsecurityCorp.com
`[Picture]
`Red “, _,,
`The workstation has been locked, This equipment is protected
`Sign w/white qgcinst thett by the World Security Corp. International
`word STOP
`Registration and Recovery System. The Retriever Program hos
`beeninstalled to help stop theft, protect
`information and recover
`lost or stolen equipment.
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW :
`[Recovery Name/(input from database / requirad)]
`[Organization Nome / ABC Corp/ input/ not required]
`[Address 1 / input from database / not required)
`[Address 2 / input from database / not required)
`[City] [State]
`[Zip / all of these input from databese / nol required
`[Phone 1 / input from database / required][Phone 2 / nol required]
`[Email / input from database / required][Fax / not required]
`OR VISIT
`www.worldsecuritycorp.com/lostandfound.himl
`Email
`:
`testandfound@worldsecuritycorp.com
`Phone : (-B00-xxx-xxxx
`
`[Picture]
`Retriever Logo
`
`[ a|
`User :
`Password: [J
`
`.
`|
`[ok]
`(moves user to operating system with
`correct password,
`
`[SHUTDOWN]
`(initiates operating system
`shutdown)
`
`Registration # : wwoxonncxxnnnx (sequential number unique to each
`software license
`
`
`
`EX-1001
`US Patent 10,789,393
`
`EX-1001
`US Patent 10,789,393
`
`

`

`US 10,789,393 B2
`
`Page 2
`
`Related U.S. Application Data
`
`continuation of application No. 10/945,332, filed on
`Sep. 20, 2004, now Pat. No. 8,601,606, which is a
`continuation-in-part of application No. 10/304,827,
`filed on Nov. 25, 2002, now abandoned.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,764,892 A
`5,802,280 A
`5,896,497 A
`5,987,609 A
`6,087,937 A
`6,244,758 Bl
`6,269,392 Bl
`6,300,863 Bl
`6,300,946 Bl
`6,507,914 Bl
`6,601,095 BI*
`
`6/1998 Cain
`9/1998 Cotichini
`4/1999 Halstead
`11/1999 Hasebe
`7/2000 McCarthy
`6/2001 Solymar
`7/2001 Cotichini
`10/2001 Cotichini
`10/2001 Lincke et al.
`1/2003 Cain
`7/2003 Duffield ............ GO6F 9/44505
`709/222
`
`8/2003 Elledge
`6,609,656 Bl
`12/2003 Helle
`6,662,023 Bl
`4/2004 Dailey
`6,725,339 B2
`10/2004 Henrie
`6,804,699 Bl
`6,832,320 B1* 12/2004 Broyles, III
`
`7,107,349 B2
`7,752,288 B2
`
`9/2006 Britt, Jr.
`7/2010 Mihira
`
`............ GO6F 21/88
`713/155
`
`7,818,557
`7,818,803
`7,945,709
`8,062,380
`8,234,359
`8,241,369
`8,307,055
`8,317,878
`8,332,953
`8,346,234
`8,362,901
`8,418,226
`8,419,806
`8,441,348
`8,510,825
`8,528,105
`8,601,606
`
`8,721,738
`9,021,610
`
`9,390,296
`9,558,338
`9,672,388
`9,892,287
`10,325,122
`2004/0103298
`2015/03 19178
`2018/0124232
`
`B2*
`B2*
`B2*
`B2*
`B2*
`Al
`Al
`Al*
`
`* cited by examiner
`
`10/2010
`10/2010
`5/2011
`11/2011
`7/2012
`8/2012
`11/2012
`11/2012
`12/2012
`1/2013
`1/2013
`4/2013
`4/2013
`5/2013
`8/2013
`9/2013
`12/2013
`
`5/2014
`4/2015
`
`7/2016
`1/2017
`6/2017
`2/2018
`6/2019
`5/2004
`11/2015
`5/2018
`
`Bestmann
`Gordon
`Cain
`Stevens
`Bestmann
`Stevens
`Banga
`Chhabra
`Lemieux
`Banga
`Jung
`Gardner
`Chase
`Loveland
`Tarkhanyan
`Miller
`Hafeman ............ GO6F 21/6218
`726/34
`
`Miller
`Hafeman ............ GO6F 40/134
`726/34
`.. GOG6F 21/88
`Hafeman ..
`... GO6F 21/60
`Lee wn.
`GO6F 21/6218
`Hafeman ..
`w GOG6F 21/51
`Hafeman ..
`Hafeman .......... GO6F 21/51
`Hafeman
`Desai
`Tokutake oe GO6F 21/31
`
`
`
`

`

`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 1 of 10
`
`US 10,789,393 B2
`
` PROCESSOR
`
`CHANGING
`MEANS
`
`CAUSING
`MEANS
`
`SOFTWARE
`PROGRAM
`
`PRIMARY
`OPERATING
`SYSTEM
`
`REMOTE
`STATION
`
`CHANGING
`MEANS
`
`20
`
`26
`
`

`

`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 2 of 10
`
`US 10,789,393 B2
`
`
`Workstation Locked
`
`
`Red Sto
`
`‘an vt against theft by the World Security Corp.
`
` [Picture]
`
`The Retriever by WorldsecurityCorp.com
`The workstation has been locked. This equipment
`
`is protected
`
`International
`
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect
`information and recover
`lost or stolen equipment.
`
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW :
`
`[Recovery Name/(input from database / required)|
`[Organization Name / ABC Corp/ input/ not required]
`[Address 1 / input from database / not required]
`[Address 2 / input from database / not required]
`[City] [State] [Zip / all of these input from database / not required
`[Phone 1 / input from database / required][Phone 2 / not required]
`[Email / input from database / required|[Fax / not required]
`OR VISIT
`www.worldsecuritycorp.com/lostandfound.htm|
`Email
`:
`lostandfound@worldsecuritycorp.com
`Phone : 1-800—xxx-xxxx
`
`Registration # + XxXxxXxxxxxxxxxxx (sequential number unique to each
`software license
`
`User :
`
`[ —]
`
`[Picture]
`Retriever Logo
`
`
`
`Password: [=F————Csd
`
`(moves user to operating system with
`correct password)
`
`[SHUTDOWN]
`(initiates operating system
`shutdown)
`
`FIG.<
`
`

`

`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 3 of 10
`
`US 10,789,393 B2
`
`Turn Computer
`On
`
`Recovery / Return
`Dialog Box appears on
`monitor's display screen.
`
`(Occurs before or with
`Password or Security
`Prompt
`: Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`
`(Can appear as a screen after the Recovery / Return Dialog box or preferably at the
`bottom of
`the Recovery/Return Dialog Box as in Sample 1 above)
`
`[0K]
`
`[SHUTDOWN]
`
`previous screen)
`
`User enters computer
`operating system io access
`programs and information.
`
`Windows or Other Operating System Standard
`Shufdown Computer Screen
`(*) Shutdown
`(.) Shutdown and Reboot
`
`[OK]
`
`(Shuts down
`computer)
`
`[CANCEL]
`
`(Returns back to
`
`| ---------------3>
`Back up fo previous screen.
`
`FIG.S
`
`

`

`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 4 of 10
`
`US 10,789,393 B2
`
`Turn Computer
`On
`
`Recovery/Return Dialog Box)
`
`Welcome
`
`[Picture]
`Wiwtey rane
`
`
`
`Press [CTRL + ALT + DEL]
`
`to Logon.
`
`C 2002-200_ World Computer Security Corp
`Distribuited by www.worldsecuritycorp.com
`Telephone : (303) 670-8800
`
`Picture]
`Retriever Logo
`
`Recovery/Return
`Dialog Box appears on
`monitor's display screen.
`
`(Occurs before or with
`password or Security
`Prompt Dialog Box)
`
`Computer Password or
`Security Dialog Box Prompt
`Screen
`
`(Can appear as a screen after the
`Recovery/Return Dialog box or
`preferably at the bottom of the
`
`FIG.4
`
`

`

`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 5 of 10
`
`US 10,789,393 B2
`
`Computer Monitor Screen
`at Operating System Screen
`
`START
`
`MS Word >
`MS Excel >
`Programs > Administration Section >
`Find >
`DVD Player >
`Help >
`Etc ... >
`Run >
`
`FIG.O
`
`
`
`Windows Logon
`
`[Picture]
`Keys
`
`Enter a valid user name and password fo logon to this
`sysiem :
`
`[Picture]
`Retriever Logo
`
`[0K]
`
`User :
`
`Password :
`
`[
`
`[
`
`|
`
`|
`
`[CANCEL]
`
`FIG.7
`
`[SHUTDOWN]
`
`
`
`

`

`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 6 of 10
`
`US 10,789,393 B2
`
`
`
`[Picture]
`Red Stop
`Sign w/white
`word STOP
`
`The Retriever by WorldsecurityCorp.com
`
`is protected
`The workstation has been locked. This equipment
`against theft by the World Security Corp.
`International
`Registration and Recovery System. The Reiriever Program has
`been installed to help stop theft, protect
`information and recover
`lost or stolen equipment.
`
`
` Workstation Locked
`
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW :
`
`[Recovery Name/(input from database / required)]
`[Organization Name / ABC Corp/ input/ not required]
`[Address 1 / input from database / not required]
`[Address 2 / input from database / not required]
`[City]
`[State] [Zip / all of these input from database / not required
`[Phone 1 / input from database / required|[Phone 2 / not required]
`[Email / input from database / required][Fax / not required]
`OR VISIT
`www.worldsecuritycorp.com/lostandfound.html
`Email
`:
`lostandfound@worldsecuritycorp.com
`Phone : 1-800-xxx-xxxx
`
`Registration # : XXXXXXXXXXXXXXXX
`
`[CANCEL]
`
`[SHUTDOWN]
`
`FIG.6
`
`[Picture]
`Retriever Logo
`
`PRESS
`
`[0K]
`
`

`

`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 7 of 10
`
`US 10,789,393 B2
`
`pooL0dxX]
`
`llypodey
`
`
`
`[pou|0-------------1171OG019/IIV41P3
`
`
`
`PreIel0---jdaq---0|paublssy--9y¢710001
`
`
`
`ars/ajopdp)Q---}daq---0]paublssy--c7¢71000)
`[dEOLpricy
`CL):Jusudeg
`
`soyCtcy
`piooey413I]499/95[0-501]
`CYOMSS¥d01CINOISSV,SVF10/JONVHO
`
`
`
`UOIJDJISIUIWPYJOUMQJ@AalJeyau]
`oju;AsaooayAnjdsiq0}poubissy
`
`
`
`
`
`
`
`
`ISN17:71£007‘ZZ$90‘xe/au0Zaul]‘aul‘ajoq:Ulbo]4s]
`
`gGggcgrs‘xe/pajoajoids}pudsupaddy:#uawojsng
`
`
`"{SI|Odljue98SOfUOLINg|MAA{SI]aSMoUg
`
`[|pakoidsiq#uoyoaysiaypajoajas
`ee
`
`
`po)jonquogs0ung
`Co):0Aiodong
`
`CYOMSS¥dYINMO_JONVHO
`
`(]:ayppdnajbuis40jpqo\b
`
`
`
`oju)AiaaooayAdjdsiqJ8UM()
`
`Jo}#uolpusibay199185
`
`8D
`
`
`
`(IDW]JeUM()
`
`
`
`OYt{99/8840
`
`060}
`
`
`
`
`

`

`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 8 of 10
`
`US 10,789,393 B2
`
`[plonepa|
`[_40-607|
`
`
`
`UOO.SIUIUPY0]peubissy JeAalijey94]
`
`
`
`
`
`(aBpdAyanayoWo}Joqay}Ofppd)woo'dsodAjynoesp|JoM"MAM
`
`6OH
`
`
`
`jdaqMD]psMDY“xa/pajoajoudsipupsupaddy:juewypdeq
`
`
`
`YOMauojswns“xa/pajoajoudsipupsupaddy:Q|paubissy
`
`0607
`
`
`
`
`
`O}u|AvaAooeyAnjdsiqofpaublssy
`
`spuooss[iiW]39607
`
`
`
`QHDWOINYJEADSUBELIS
`
`J:aug
`
`so
`
`
`
`QUOMSSVdOLGINOISSYJONVHO
`
`
`

`

`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 9 of 10
`
`US 10,789,393 B2
`
`
`
`
`
`Windows Logon
`
`The RETRIEVER from World Security Corp
`
`[Stop Sign]
`
`Enter a valid user name and password to log on this system.
`
`Sign On
`
`Name: L Password : [|
`
`PRESS
`
`Correct PW
`Incorrect PW
`
`is protected against theft by the World Security Corp International
`This equipment
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theff, protect
`information and recover lost or stolen equipment.
`To Identify Rightful Owner, Collect Reward & Avoid Prosecution CALL NOW :
`
`Owner Info:
`
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1234
`itadmin@abccorp.com
`
`Assigned To:
`
`Distributed by
`AD SPACE
`
`Carrie Hafeman
`303-670-8800
`lightquardian@msn.com
`OR VISIT
`
`AD SPACE
`
`AD SPACE
`
`Web Site:
`Emai
`:
`Phone :
`
`www.worldsecuritycorp.com/lostandfound/html
`lostandfound@worldsecuritycorp.com
`1-800—xxx-xxxx
`
`The Retriever
`
`Registration # : XXXXXXXXXXXXXXXXXXXXXX
`
`FIG.10
`
`
`
`

`

`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 10 of 10
`
`US 10,789,393 B2
`
`
`
`Workstation Locked
`
`The RETRIEVER from World Security Corp
`
`[Stop Sign]
`
`Enter a valid user name and password to log on this system.
`
`Sign On
`
`Name: Ld Password : [|
`
`PRESS
`
`Correct PW
`Incorrect PW
`
`is protected against theft by the World Security Corp International
`This equipment
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theff, protect
`information and recover lost or stolen equipment.
`To Identify Rightful Owner, Collect Reward & Avoid Prosecution CALL NOW :
`
`Owner Info:
`
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1234
`itadmin@abecorp.com
`
`Assigned To:
`
`Distributed by
`AD SPACE
`
`Carrie Hafeman
`303-670-8800
`lightquardian@msn.com
`OR VISIT
`
`AD SPACE
`
`AD SPACE
`
`Web Site :
`Emai
`:
`Phone:
`
`www.worldsecuritycorp.com/lostandfound/html
`lostandfound@worldsecuritycorp.com
`1-800-xxx-xxxx
`
`The Retriever
`
`Registration # : XXXXXXXXXXXXXXXXXXXXXX
`
`Flc.11
`
`

`

`US 10,789,393 B2
`
`1
`COMPUTER RECOVERY OR RETURN
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This is a continuation of U.S. patent application Ser. No.
`15/864,749 filed Jan. 8, 2018, which is a continuation of
`US. patent application Ser. No. 15/601,645 filed May 22,
`2017, which is a continuation of U.S. patent application Ser.
`No. 15/199,316 filed Jun. 30, 2016, now U.S. Pat. No.
`9,672,388 issued Jun. 6, 2017, which is a continuation of
`USS. patent application Ser. No. 14/691,222 filed Apr. 20,
`2015, now U.S. Pat. No. 9,390,296 issued Jul. 12, 2016,
`which is a continuation of U.S. patent application Ser. No.
`14/087,866 filed Nov. 22, 2013, now USS. Pat. No. 9,021,
`610 issued Apr. 28, 2015, which is a continuation of US.
`patent application Ser. No. 10/945,332 filed Sep. 20, 2004,
`now U.S. Pat. No. 8,601,606 issued Dec. 3, 2013, which is
`a continuation-in-part of U.S. patent application Ser. No.
`10/304,827 filed Nov. 25, 2002, all of which are incorpo-
`rated by reference herein.
`
`FIELD OF THE INVENTION
`
`The present invention is related to the return of lost or
`stolen computers. More specifically, the present invention is
`related to the return of lost or stolen computers using a
`recovery screen that appears during or after boot-up of the
`computer.
`
`BACKGROUND OF THE INVENTION
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Current methods of computer return or recovery products
`include:
`
`35
`
`(1) Physical Labels That Attach to the Outside Hardware
`of the Computer Equipment.
`These hardware labels can contain custom recovery infor-
`mation, but because they are hardware based, they can not
`be interactively changed by the owner. Also, since they do
`not have any ability to affect the computer boot-up process,
`they can do nothing to help protect the confidential owner
`information on the hard drive. An example of a well known
`physical hardware/recovery label is the STOP Tag by Secu-
`rity Tracking of Office Property in Connecticut. This label-
`ing system has been patented in France, the U.S., and other
`countries. The product can be easily defeated by removing
`the physical label. In the case of STOP Tag which includes
`a ‘recovery mark’ which states “STOLEN PROPERTY”
`underneath the label, a new label can be simply added over
`the ‘recovery mark’ to hide the STOLEN PROPERTYsign.
`(The Security Tracking of Office Property equipment recov-
`ery patent is U.S. Pat. No. 5,163,711 This patent actually
`refers to how the labels adhere to the equipment—butthis is
`their patent).
`The computer security recovery/return program of the
`present invention utilizes this type of hardware recovery
`approach to a small degree, but is greatly different from this
`system, because this is a software program rather than a
`hardware solution. Additionally,
`the present
`invention is
`greatly superior, since the owner can interactively customize
`the return/recovery information displayed at any time, and
`the present invention also helps protect the important, con-
`fidential owner information on the hard drive, by the posi-
`tioning of the program layer in the equipment boot-up
`process.
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`(2) Computer Software Programs That Attempt Recovery
`Through the Use of the Modem.
`There are several patented computer security software
`products on the market today that are designed for the
`purpose of recovering lost or stolen equipment. These pro-
`grams use the computer’s modem to regularly call a recov-
`ery center. Then once a computer is stolen, the recovery
`center waits for the stolen computer to call in. When the
`computer modem calls in, the recovery centers use some-
`thing similar to the reverse 911 system to get the phone
`numberthat the stolen equipment is accessing. Using the
`phone number,the recovery system then cantry to get a map
`of where the computer is. Some of these computer security
`recovery programs can also attempt to locate stolen com-
`puters through an IP address. Some of these computer
`security recovery software programs, can actually attemptto
`seize the communication between the stolen computer and
`the recovery center and delete selected files to help protect
`the owner’s confidential information. Products like these
`
`include CompuTrace, PC Phone Home, CyberAngel, Lap-
`Trak and Luceria.
`
`The present invention is also designed for the purpose of
`recovering lost or stolen equipment, but
`the method is
`distinctively different and unique from the current methods.
`The present
`invention does not rely on the use of the
`computer modem. The present
`invention uses a layered
`program in the boot-up process to provide a display of the
`proper owner recovery and return information using the
`computer’s own monitor or screen. The present invention is
`also different and superior to the above software tracking
`products, in helping to accomplish international recovery.
`Noneofthe above products to date have been able to use the
`modem phone or IP system to track stolen equipment
`internationally. The present invention provides international
`recovery by displaying owner email information as well as
`providing recovery help through an international recovery
`internet web site.
`There are other differences as well in how these programs
`try to also protect the information on the hard drive. The
`present invention automatically initiates during the boot-up
`process of the equipment, in order to display the recovery/
`return information before a security prompt screen to always
`help protect the owner’s confidential information on the hard
`drive. Someof the programs above do nothing to protect the
`user information. Others like LapTrak include a Hide-A-File
`feature that an owner can access after the user enters the
`operating system. CyberAngel includes an encryption fea-
`ture. Luceria includes the ability to delete pre-selected files
`from the recovery center. By layering this computer security
`application strategically before or during a security prompt
`in the boot-up process, this application provides a unique
`and different method to help protect owner information.
`(An example of patents for these types of products would
`be the CompuTrace U.S. Pat. Nos. 5,715,174, 5,764,892,
`and 5,802,280).
`(3) Bios Based Password Identification Systems.
`There are some computers that are sold with Bios based
`identification systems included. These products activate
`immediately when a computer is turned on, and prompt the
`user for a password before accessing the data on the com-
`puter.
`The present invention is very different and unique from
`the Bios based program, for many reasons. Most importantly
`the bios based passwordidentification products are built into
`the hardware of the computer equipment—not the hard
`drive. In other words, if you removedthe hard drive from a
`stolen or lost laptop, and inserted the stolen hard drive into
`
`

`

`US 10,789,393 B2
`
`3
`a different laptop, you would bypass the bios based pass-
`word identification system, and the bios based password
`identification system would remain with the original equip-
`ment. Thus, the Bios Based PasswordIdentification system
`can identify the computer hardware, but not the hard drive
`(the most important part of the computer equipment).
`In addition, the Bios Based Password Identification sys-
`tems are designed as a unique method for providing an
`additional layer of password protection to the equipment
`hardware, but are not designed for recovery or return. There
`is no design for including complete owner information, no
`recovery information displayed, no effective protection of
`the information on the hard drive, no effective method for
`the recovery or return of the hard drive—the most important
`item that a consumer would want back. In fact the Bios
`
`Password Identification product occurs before allowing the
`hard drive to boot up. The present
`invention is unique
`because it is an application software program that provides
`its layer of protection during the boot-up process (not
`before), and thus allows the security product to move, with
`the hard drive, the most critical part of the computer.
`
`SUMMARY OF THE INVENTION
`
`The present invention pertains to a computer return appa-
`ratus. The apparatus comprises a processor. The apparatus
`comprises a memory connected to the processor. The appa-
`ratus comprises a display. The apparatus comprises a return
`screen that the processor automatically causes to appear
`during or after boot-up of the processor on the display, that
`displays ownership information concerning who ownsthe
`computer and return information for returning the computer
`to the owner from data stored in the memory.
`The present invention pertains to a method for returning
`a computer to its owner. The method comprises the steps of
`activating a computer. Then there is the step of displaying
`automatically a return screen on a display of the computer
`during or after boot-up of the computer, which displays
`information concerning owner information about who owns
`the computer and return information for returning the com-
`puter to the owner from data stored in the memory of the
`computer.
`The present invention pertains to a computer readable
`medium whose contents cause a computer to show whois its
`owner by performing the steps of activating a computer.
`Then there is the step of displaying automatically a return
`screen on a display of the computer during or after boot-up
`of the computer, which displays information concerning
`ownerinformation about who ownsthe computer and return
`information for returning the computer to the owner from
`data stored in the memory of the computer.
`The present invention pertains to a computer return appa-
`ratus. The apparatus comprises a processor. The apparatus
`comprises a memory connected to the processor. The appa-
`ratus comprises a display. The apparatus comprises a return
`screen that the processor automatically causes to appear
`during or after boot-up of the processor on the display, that
`displays information concerning an owner who owns the
`computer, concerning user information about whothe useris
`who the computer is assigned to for use, and return infor-
`mation for returning the computer to the owner from data
`stored in the memory.
`The present invention pertains to a method for displaying
`information to assist with returning a computerto its owner.
`The method comprises the steps of activating a computer.
`There is the step of displaying automatically a return screen
`on a display of the computer during or after boot-up which
`
`20
`
`25
`
`40
`
`45
`
`50
`
`55
`
`4
`displays information concerning owner information about
`who ownsthe computer, concerning user information about
`whothe user is who the computer is assigned to for use, and
`return information for returning the computer to the owner
`from data stored in a memory of the computer.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`In the accompanying drawings, the preferred embodiment
`of the invention and preferred methods of practicing the
`invention are illustrated in which:
`FIG. 1 is a schematic representation of the apparatus of
`the present invention.
`FIG.2 is a representation of a return/recovery dialog box
`of an embodimentof the present invention.
`FIG. 3 is a flow chart regarding an embodimentof the
`present invention.
`FIG.4 is a flow chart regarding a second embodiment of
`the present invention.
`FIG. 5 is a representation of an administration program
`section of the present invention.
`FIG.6 is a representation of a return screen of the present
`invention.
`FIG.7 is an example of a passwordscreen utilized by the
`present invention.
`FIG. 8 is a return administration screen of the present
`invention.
`FIG. 9 is a second return administration screen of the
`
`present invention.
`FIG. 10 is a third return administration screen of the
`present invention.
`FIG. 11 is a fourth return administration screen of the
`present invention.
`
`DETAILED DESCRIPTION
`
`Referring now to the drawings wherein like reference
`numerals refer to similar or identical parts throughout the
`several views, and more specifically to FIG. 1 thereof, there
`is shown a computer 12 return apparatus 10. The apparatus
`10 comprises a processor 14. The apparatus 10 comprises a
`memory 16 connected to the processor 14. The apparatus 10
`comprises a display 18. The apparatus 10 comprises a return
`screen 20 that the processor 14 automatically causes to
`appear during or after boot-up of the processor 14 on the
`display 18, that displays ownership information concerning
`who owns the computer 12 and return information for
`returning the computer 12 to the owner from data stored in
`the memory 16. The Owneris defined as the personor entity
`that owns, rents, or licenses the Retriever, and/or the person
`or entity who controls the recovery service. The Owner has
`greater control over the computer 12 than the user. This
`could include, but not be limited to, an employee of a
`company that owns the computer 12, or an agent of the
`ownerora friend that has the permission of the ownerto use
`or have or recover the computer 12.
`Preferably, the apparatus 10 includes means for causing
`the screen to appear on the display 18 with the owner and
`return information. The causing means 22 is stored in the
`memory 16. The causing means 22 preferably is a software
`program 24. Preferably, the memory 16 includes a primary
`operating system having an operating screen 26 for the
`computer 12, and the return screen 20 appears on the display
`18 before the operating screen 26 of the operating system
`appears on the display 18.
`The software program 24 preferably appears before a
`security prompt such as a password to be entered to obtain
`
`

`

`US 10,789,393 B2
`
`5
`access to the primary operating system of the computer 12.
`Preferably, the software program 24 allows the owner to
`change the return information and the owner information,
`after the password or security prompt is satisfied for the
`computer 12. The software program 24 is preferably able to
`communicate through a modem (or wireless) to a predeter-
`mined location to transfer the return information to the
`
`location to facilitate return of the computer 12 if it becomes
`lost by the owner.
`The present invention pertains to a method for returning
`a computer 12 to its owner. The method comprises the steps
`of activating a computer 12. Then there is the step of
`displaying automatically a return screen 20 on a display 18
`of the computer 12 during or after boot-up of the computer
`12, which displays information concerning owner informa-
`tion about who owns the computer 12 and return information
`for returning the computer 12 to the owner from data stored
`in the memory 16 of the computer 12.
`Preferably, the displaying step includes the step of dis-
`playing automatically the return screen 20 before an oper-
`ating screen 26 of the primary operating system of the
`computer 12. There is preferably the step of displaying the
`return screen 20 before satisfying a security prompt such as
`entering a password into the computer 12 to access the
`primary operating system. Preferably, there is the step of
`changing the return information, and the owner information
`after the step of satisfying a security prompt such as entering
`the password into the computer 12.
`The present invention pertains to a computer 12 readable
`medium whose contents cause a computer 12 to show who
`is its owner by performingthe steps of activating a computer
`12. Then there is the step of displaying automatically a
`return screen 20 on a display 18 of the computer 12 during
`or after boot-up of the computer 12, which displays infor-
`mation concerning owner information about who owns the
`computer 12 and return information for returning the com-
`puter 12 to the owner from data stored in the memory 16 of
`the computer 12.
`Preferably, the displaying step includes the step of dis-
`playing automatically the return screen 20 before an oper-
`ating screen 26 of the primary operating system of the
`computer 12. There is preferably the step of displaying the
`return screen 20 before satisfying a security prompt such as
`entering a password into the computer 12 to access the
`primary operating system. Preferably, there is the step of
`changing the return information and the owner information
`after the step of satisfying a security prompt such as entering
`a password into the computer 12.
`In the operation of the invention, first, the owner of the
`computer 12 would install the computer 12 security recov-
`ery/return software program 24 application. The program
`could be installed to work on any type of computer 12 screen
`including but not limited to, PC’s, laptops, handheld com-
`puters (such as blackberries, palm pilots), UPS computer-
`ized handheld tracking display units, and even cell phone
`displays. The unique recovery/return computer 12 security
`program could in fact, be installed and used by any type of
`computer 12 that utilized a monitor display screen. The
`software application program provides an additional layer to
`the existing operating system of each computer 12. The
`coding language usedfor the software program 24 could and
`would vary depending upon the computer 12 equipment, but
`the core structure of how the program operates would be
`similar in all items.
`Once the computer 12 security software program 24 is
`installed, the monitor of the computer 12 will display the
`complete and current recovery/return information that the
`program has allowed the owner of the equipmentto inter-
`actively enter, change and update at anytime.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`This “on the fly” ability to change owner recovery infor-
`mation to aid return of equipmentis an important feature for
`anyone, including college students whotravel from home to
`college during different parts of the year, people who move,
`and particularly business people who travel throughout the
`world. The recovery/return information would not only
`allow the display 18 of physical address return information,
`and owner contact telephone information, but would also
`provide for international internet based recovery through the
`added display 18 of owner email information, as well as the
`ability to display an international recovery center website.
`In addition to increasing chances of return and recovery of
`the stolen or lost equipment by using the computer’s 12
`display 18 monitor, the program is an additional program-
`ming layer added into the initial start up program of the
`computer 12, so that the recovery/return display 18 infor-
`mation occurs during or before a password or security
`promptscreen. This is an important feature that helps create
`an environment wherebythe individual that happens upon a
`stolen or lost piece of equipment will see the owner recov-
`ery/return information displayed before a password or secu-
`rity prompt screen. By automatically initiating this program
`during or before a user’s security prompt, such as a pass-
`word screen program, the recovery/return program will not
`only increase chances of recovery, but will also increase
`chances that the computer 12 information on the hard drive
`is protected while the computer 12 is not in the owner’s
`possession.
`For example, the actual step by step operation of the
`program is as follows:
`(1) Someone finds a lost or stolen computer 12. The
`person whofinds the computer 12, turns the computer 12 on.
`(The software program 24 could be provided with a
`warning sticker that will be placed on the outside of the
`equipmenttelling anyone finding the equipment, about the
`program and the display recovery screen.)
`(2) The computer 12 display 18 screen turns on. The
`computer 12 security software return/recovery program
`automatically initiates during the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket