`(10) Patent No.:
`a2) United States Patent
`
` Hafeman (45) Date of Patent: *Sep. 29, 2020
`
`
`US010789393B2
`
`(54) COMPUTER RECOVERY OR RETURN
`;
`(71) Applicant: Carolyn W. Hafeman, Evergreen, CO
`(US)
`Inventor: Carolyn W. Hafeman, Evergreen, CO
`
`(72)
`
`(US)
`
`*)
`
`Notice:
`
`1)
`y
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(52) U.S. Cl.
`CPC ween GO06F 21/88 (2013.01); GO6F 21/31
`(2013.01); GO6F 21/51 (2013.01); GO6F
`21/575 (2013.01); GO6F 21/6218 (2013.01);
`G06F 40/134 (2020.01); GO6F 2221/2117
`(
`);
`(2013.01)
`
`(58) Field of Classification Search
`CPC ...... GO6F 21/88; GO6F 40/134; GO6F 21/575;
`GO6F 21/6218; GO6F 21/51; GO6F 21/31;
`GO6F 2221/2117
`
`,
`
`This patent is subject to a terminal dis-
`claimer.
`
`(56)
`
`See application file for complete search history.
`
`References Cited
`
`(21) Appl. No.: 16/377,768
`Tad:
`Filed:
`
`(22)
`(65)
`
`Apr. 8, 2019
`Prior Publication Data
`US 2019/0236319 Al
`Aug. 1, 2019
`Related U.S. Application Data
`(63) Continuation of application No. 15/864,749, filed on
`Jan. 8, 2018, now Pat. No. 10,325,122, which is a
`continuation of application No. 15/601,645, filed on
`May 22, 2017, now Pat. No. 9,892,287, which is a
`continuation of application No. 15/199,316, filed on
`Jun. 30, 2016, now Pat. No. 9,672,388, which isa
`continuation of application No. 14/691,222, filed on
`Apr. 20, 2015, now Pat. No. 9,390,296, which is a
`continuation of application No. 14/087,866,filed on
`Nov. 22, 2013, now Pat. No. 9,021,610, whichis a
`(Continued)
`
`U.S. PATENT DOCUMENTS
`5,715,174 A
`2/1998 Cotichini
`5,748,084 A
`5/1998 Isikoff
`(Continued)
`OTHER PUBLICATIONS
`Crouch, “Tips for keeping a leash on your PDA’s data,” Network
`World, Dialog text search, p. 1-3, (Feb. 9, 2001).
`
`Primary Examiner — Christopher A Revak
`(74) Attorney, Agent, or Firm — Ansel M. Schwartz
`
`ABSTRACT
`57)
`A computer return apparatus includes a processor. The
`apparatus includes a memory connected to the processor.
`The apparatus includes a display. The apparatus includes a
`return screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays information concerning an owner who
`ownsthe computer, concerning user information about who
`the user is who the computer is assigned to for use, and
`return information for returning the computer to the owner
`from data stored in the memory. A method for displaying
`information to assist with returning a computerto its owner.
`
`(51)
`
`Int. CL
`GO6F 21/88
`GO6F 40/134
`G06F 21/31
`GO6F 21/51
`GO6F 21/57
`GO6F 21/62
`
`(2013.01)
`(2020.01)
`(2013.01)
`(2013.01)
`(2013.01)
`(2013.01)
`
`
`
`7 Claims, 10 Drawing Sheets
`
`
`Workstation Locked
`
`The Retriever by WorldsecurityCorp.com
`[Picture]
`Red “, _,,
`The workstation has been locked, This equipment is protected
`Sign w/white qgcinst thett by the World Security Corp. International
`word STOP
`Registration and Recovery System. The Retriever Program hos
`beeninstalled to help stop theft, protect
`information and recover
`lost or stolen equipment.
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW :
`[Recovery Name/(input from database / requirad)]
`[Organization Nome / ABC Corp/ input/ not required]
`[Address 1 / input from database / not required)
`[Address 2 / input from database / not required)
`[City] [State]
`[Zip / all of these input from databese / nol required
`[Phone 1 / input from database / required][Phone 2 / nol required]
`[Email / input from database / required][Fax / not required]
`OR VISIT
`www.worldsecuritycorp.com/lostandfound.himl
`:
`testandfound@worldsecuritycorp.com
`Phone : (-B00-xxx-xxxx
`
`[Picture]
`Retriever Logo
`
`[ a|
`User :
`Password: [J
`
`.
`|
`[ok]
`(moves user to operating system with
`correct password,
`
`[SHUTDOWN]
`(initiates operating system
`shutdown)
`
`Registration # : wwoxonncxxnnnx (sequential number unique to each
`software license
`
`
`
`EX-1001
`US Patent 10,789,393
`
`EX-1001
`US Patent 10,789,393
`
`
`
`US 10,789,393 B2
`
`Page 2
`
`Related U.S. Application Data
`
`continuation of application No. 10/945,332, filed on
`Sep. 20, 2004, now Pat. No. 8,601,606, which is a
`continuation-in-part of application No. 10/304,827,
`filed on Nov. 25, 2002, now abandoned.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,764,892 A
`5,802,280 A
`5,896,497 A
`5,987,609 A
`6,087,937 A
`6,244,758 Bl
`6,269,392 Bl
`6,300,863 Bl
`6,300,946 Bl
`6,507,914 Bl
`6,601,095 BI*
`
`6/1998 Cain
`9/1998 Cotichini
`4/1999 Halstead
`11/1999 Hasebe
`7/2000 McCarthy
`6/2001 Solymar
`7/2001 Cotichini
`10/2001 Cotichini
`10/2001 Lincke et al.
`1/2003 Cain
`7/2003 Duffield ............ GO6F 9/44505
`709/222
`
`8/2003 Elledge
`6,609,656 Bl
`12/2003 Helle
`6,662,023 Bl
`4/2004 Dailey
`6,725,339 B2
`10/2004 Henrie
`6,804,699 Bl
`6,832,320 B1* 12/2004 Broyles, III
`
`7,107,349 B2
`7,752,288 B2
`
`9/2006 Britt, Jr.
`7/2010 Mihira
`
`............ GO6F 21/88
`713/155
`
`7,818,557
`7,818,803
`7,945,709
`8,062,380
`8,234,359
`8,241,369
`8,307,055
`8,317,878
`8,332,953
`8,346,234
`8,362,901
`8,418,226
`8,419,806
`8,441,348
`8,510,825
`8,528,105
`8,601,606
`
`8,721,738
`9,021,610
`
`9,390,296
`9,558,338
`9,672,388
`9,892,287
`10,325,122
`2004/0103298
`2015/03 19178
`2018/0124232
`
`B2*
`B2*
`B2*
`B2*
`B2*
`Al
`Al
`Al*
`
`* cited by examiner
`
`10/2010
`10/2010
`5/2011
`11/2011
`7/2012
`8/2012
`11/2012
`11/2012
`12/2012
`1/2013
`1/2013
`4/2013
`4/2013
`5/2013
`8/2013
`9/2013
`12/2013
`
`5/2014
`4/2015
`
`7/2016
`1/2017
`6/2017
`2/2018
`6/2019
`5/2004
`11/2015
`5/2018
`
`Bestmann
`Gordon
`Cain
`Stevens
`Bestmann
`Stevens
`Banga
`Chhabra
`Lemieux
`Banga
`Jung
`Gardner
`Chase
`Loveland
`Tarkhanyan
`Miller
`Hafeman ............ GO6F 21/6218
`726/34
`
`Miller
`Hafeman ............ GO6F 40/134
`726/34
`.. GOG6F 21/88
`Hafeman ..
`... GO6F 21/60
`Lee wn.
`GO6F 21/6218
`Hafeman ..
`w GOG6F 21/51
`Hafeman ..
`Hafeman .......... GO6F 21/51
`Hafeman
`Desai
`Tokutake oe GO6F 21/31
`
`
`
`
`
`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 1 of 10
`
`US 10,789,393 B2
`
` PROCESSOR
`
`CHANGING
`MEANS
`
`CAUSING
`MEANS
`
`SOFTWARE
`PROGRAM
`
`PRIMARY
`OPERATING
`SYSTEM
`
`REMOTE
`STATION
`
`CHANGING
`MEANS
`
`20
`
`26
`
`
`
`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 2 of 10
`
`US 10,789,393 B2
`
`
`Workstation Locked
`
`
`Red Sto
`
`‘an vt against theft by the World Security Corp.
`
` [Picture]
`
`The Retriever by WorldsecurityCorp.com
`The workstation has been locked. This equipment
`
`is protected
`
`International
`
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect
`information and recover
`lost or stolen equipment.
`
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW :
`
`[Recovery Name/(input from database / required)|
`[Organization Name / ABC Corp/ input/ not required]
`[Address 1 / input from database / not required]
`[Address 2 / input from database / not required]
`[City] [State] [Zip / all of these input from database / not required
`[Phone 1 / input from database / required][Phone 2 / not required]
`[Email / input from database / required|[Fax / not required]
`OR VISIT
`www.worldsecuritycorp.com/lostandfound.htm|
`:
`lostandfound@worldsecuritycorp.com
`Phone : 1-800—xxx-xxxx
`
`Registration # + XxXxxXxxxxxxxxxxx (sequential number unique to each
`software license
`
`User :
`
`[ —]
`
`[Picture]
`Retriever Logo
`
`
`
`Password: [=F————Csd
`
`(moves user to operating system with
`correct password)
`
`[SHUTDOWN]
`(initiates operating system
`shutdown)
`
`FIG.<
`
`
`
`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 3 of 10
`
`US 10,789,393 B2
`
`Turn Computer
`On
`
`Recovery / Return
`Dialog Box appears on
`monitor's display screen.
`
`(Occurs before or with
`Password or Security
`Prompt
`: Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`
`(Can appear as a screen after the Recovery / Return Dialog box or preferably at the
`bottom of
`the Recovery/Return Dialog Box as in Sample 1 above)
`
`[0K]
`
`[SHUTDOWN]
`
`previous screen)
`
`User enters computer
`operating system io access
`programs and information.
`
`Windows or Other Operating System Standard
`Shufdown Computer Screen
`(*) Shutdown
`(.) Shutdown and Reboot
`
`[OK]
`
`(Shuts down
`computer)
`
`[CANCEL]
`
`(Returns back to
`
`| ---------------3>
`Back up fo previous screen.
`
`FIG.S
`
`
`
`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 4 of 10
`
`US 10,789,393 B2
`
`Turn Computer
`On
`
`Recovery/Return Dialog Box)
`
`Welcome
`
`[Picture]
`Wiwtey rane
`
`
`
`Press [CTRL + ALT + DEL]
`
`to Logon.
`
`C 2002-200_ World Computer Security Corp
`Distribuited by www.worldsecuritycorp.com
`Telephone : (303) 670-8800
`
`Picture]
`Retriever Logo
`
`Recovery/Return
`Dialog Box appears on
`monitor's display screen.
`
`(Occurs before or with
`password or Security
`Prompt Dialog Box)
`
`Computer Password or
`Security Dialog Box Prompt
`Screen
`
`(Can appear as a screen after the
`Recovery/Return Dialog box or
`preferably at the bottom of the
`
`FIG.4
`
`
`
`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 5 of 10
`
`US 10,789,393 B2
`
`Computer Monitor Screen
`at Operating System Screen
`
`START
`
`MS Word >
`MS Excel >
`Programs > Administration Section >
`Find >
`DVD Player >
`Help >
`Etc ... >
`Run >
`
`FIG.O
`
`
`
`Windows Logon
`
`[Picture]
`Keys
`
`Enter a valid user name and password fo logon to this
`sysiem :
`
`[Picture]
`Retriever Logo
`
`[0K]
`
`User :
`
`Password :
`
`[
`
`[
`
`|
`
`|
`
`[CANCEL]
`
`FIG.7
`
`[SHUTDOWN]
`
`
`
`
`
`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 6 of 10
`
`US 10,789,393 B2
`
`
`
`[Picture]
`Red Stop
`Sign w/white
`word STOP
`
`The Retriever by WorldsecurityCorp.com
`
`is protected
`The workstation has been locked. This equipment
`against theft by the World Security Corp.
`International
`Registration and Recovery System. The Reiriever Program has
`been installed to help stop theft, protect
`information and recover
`lost or stolen equipment.
`
`
` Workstation Locked
`
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW :
`
`[Recovery Name/(input from database / required)]
`[Organization Name / ABC Corp/ input/ not required]
`[Address 1 / input from database / not required]
`[Address 2 / input from database / not required]
`[City]
`[State] [Zip / all of these input from database / not required
`[Phone 1 / input from database / required|[Phone 2 / not required]
`[Email / input from database / required][Fax / not required]
`OR VISIT
`www.worldsecuritycorp.com/lostandfound.html
`:
`lostandfound@worldsecuritycorp.com
`Phone : 1-800-xxx-xxxx
`
`Registration # : XXXXXXXXXXXXXXXX
`
`[CANCEL]
`
`[SHUTDOWN]
`
`FIG.6
`
`[Picture]
`Retriever Logo
`
`PRESS
`
`[0K]
`
`
`
`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 7 of 10
`
`US 10,789,393 B2
`
`pooL0dxX]
`
`llypodey
`
`
`
`[pou|0-------------1171OG019/IIV41P3
`
`
`
`PreIel0---jdaq---0|paublssy--9y¢710001
`
`
`
`ars/ajopdp)Q---}daq---0]paublssy--c7¢71000)
`[dEOLpricy
`CL):Jusudeg
`
`soyCtcy
`piooey413I]499/95[0-501]
`CYOMSS¥d01CINOISSV,SVF10/JONVHO
`
`
`
`UOIJDJISIUIWPYJOUMQJ@AalJeyau]
`oju;AsaooayAnjdsiq0}poubissy
`
`
`
`
`
`
`
`
`ISN17:71£007‘ZZ$90‘xe/au0Zaul]‘aul‘ajoq:Ulbo]4s]
`
`gGggcgrs‘xe/pajoajoids}pudsupaddy:#uawojsng
`
`
`"{SI|Odljue98SOfUOLINg|MAA{SI]aSMoUg
`
`[|pakoidsiq#uoyoaysiaypajoajas
`ee
`
`
`po)jonquogs0ung
`Co):0Aiodong
`
`CYOMSS¥dYINMO_JONVHO
`
`(]:ayppdnajbuis40jpqo\b
`
`
`
`oju)AiaaooayAdjdsiqJ8UM()
`
`Jo}#uolpusibay199185
`
`8D
`
`
`
`(IDW]JeUM()
`
`
`
`OYt{99/8840
`
`060}
`
`
`
`
`
`
`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 8 of 10
`
`US 10,789,393 B2
`
`[plonepa|
`[_40-607|
`
`
`
`UOO.SIUIUPY0]peubissy JeAalijey94]
`
`
`
`
`
`(aBpdAyanayoWo}Joqay}Ofppd)woo'dsodAjynoesp|JoM"MAM
`
`6OH
`
`
`
`jdaqMD]psMDY“xa/pajoajoudsipupsupaddy:juewypdeq
`
`
`
`YOMauojswns“xa/pajoajoudsipupsupaddy:Q|paubissy
`
`0607
`
`
`
`
`
`O}u|AvaAooeyAnjdsiqofpaublssy
`
`spuooss[iiW]39607
`
`
`
`QHDWOINYJEADSUBELIS
`
`J:aug
`
`so
`
`
`
`QUOMSSVdOLGINOISSYJONVHO
`
`
`
`
`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 9 of 10
`
`US 10,789,393 B2
`
`
`
`
`
`Windows Logon
`
`The RETRIEVER from World Security Corp
`
`[Stop Sign]
`
`Enter a valid user name and password to log on this system.
`
`Sign On
`
`Name: L Password : [|
`
`PRESS
`
`Correct PW
`Incorrect PW
`
`is protected against theft by the World Security Corp International
`This equipment
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theff, protect
`information and recover lost or stolen equipment.
`To Identify Rightful Owner, Collect Reward & Avoid Prosecution CALL NOW :
`
`Owner Info:
`
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1234
`itadmin@abccorp.com
`
`Assigned To:
`
`Distributed by
`AD SPACE
`
`Carrie Hafeman
`303-670-8800
`lightquardian@msn.com
`OR VISIT
`
`AD SPACE
`
`AD SPACE
`
`Web Site:
`Emai
`:
`Phone :
`
`www.worldsecuritycorp.com/lostandfound/html
`lostandfound@worldsecuritycorp.com
`1-800—xxx-xxxx
`
`The Retriever
`
`Registration # : XXXXXXXXXXXXXXXXXXXXXX
`
`FIG.10
`
`
`
`
`
`U.S. Patent
`
`Sep. 29, 2020
`
`Sheet 10 of 10
`
`US 10,789,393 B2
`
`
`
`Workstation Locked
`
`The RETRIEVER from World Security Corp
`
`[Stop Sign]
`
`Enter a valid user name and password to log on this system.
`
`Sign On
`
`Name: Ld Password : [|
`
`PRESS
`
`Correct PW
`Incorrect PW
`
`is protected against theft by the World Security Corp International
`This equipment
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theff, protect
`information and recover lost or stolen equipment.
`To Identify Rightful Owner, Collect Reward & Avoid Prosecution CALL NOW :
`
`Owner Info:
`
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1234
`itadmin@abecorp.com
`
`Assigned To:
`
`Distributed by
`AD SPACE
`
`Carrie Hafeman
`303-670-8800
`lightquardian@msn.com
`OR VISIT
`
`AD SPACE
`
`AD SPACE
`
`Web Site :
`Emai
`:
`Phone:
`
`www.worldsecuritycorp.com/lostandfound/html
`lostandfound@worldsecuritycorp.com
`1-800-xxx-xxxx
`
`The Retriever
`
`Registration # : XXXXXXXXXXXXXXXXXXXXXX
`
`Flc.11
`
`
`
`US 10,789,393 B2
`
`1
`COMPUTER RECOVERY OR RETURN
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This is a continuation of U.S. patent application Ser. No.
`15/864,749 filed Jan. 8, 2018, which is a continuation of
`US. patent application Ser. No. 15/601,645 filed May 22,
`2017, which is a continuation of U.S. patent application Ser.
`No. 15/199,316 filed Jun. 30, 2016, now U.S. Pat. No.
`9,672,388 issued Jun. 6, 2017, which is a continuation of
`USS. patent application Ser. No. 14/691,222 filed Apr. 20,
`2015, now U.S. Pat. No. 9,390,296 issued Jul. 12, 2016,
`which is a continuation of U.S. patent application Ser. No.
`14/087,866 filed Nov. 22, 2013, now USS. Pat. No. 9,021,
`610 issued Apr. 28, 2015, which is a continuation of US.
`patent application Ser. No. 10/945,332 filed Sep. 20, 2004,
`now U.S. Pat. No. 8,601,606 issued Dec. 3, 2013, which is
`a continuation-in-part of U.S. patent application Ser. No.
`10/304,827 filed Nov. 25, 2002, all of which are incorpo-
`rated by reference herein.
`
`FIELD OF THE INVENTION
`
`The present invention is related to the return of lost or
`stolen computers. More specifically, the present invention is
`related to the return of lost or stolen computers using a
`recovery screen that appears during or after boot-up of the
`computer.
`
`BACKGROUND OF THE INVENTION
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Current methods of computer return or recovery products
`include:
`
`35
`
`(1) Physical Labels That Attach to the Outside Hardware
`of the Computer Equipment.
`These hardware labels can contain custom recovery infor-
`mation, but because they are hardware based, they can not
`be interactively changed by the owner. Also, since they do
`not have any ability to affect the computer boot-up process,
`they can do nothing to help protect the confidential owner
`information on the hard drive. An example of a well known
`physical hardware/recovery label is the STOP Tag by Secu-
`rity Tracking of Office Property in Connecticut. This label-
`ing system has been patented in France, the U.S., and other
`countries. The product can be easily defeated by removing
`the physical label. In the case of STOP Tag which includes
`a ‘recovery mark’ which states “STOLEN PROPERTY”
`underneath the label, a new label can be simply added over
`the ‘recovery mark’ to hide the STOLEN PROPERTYsign.
`(The Security Tracking of Office Property equipment recov-
`ery patent is U.S. Pat. No. 5,163,711 This patent actually
`refers to how the labels adhere to the equipment—butthis is
`their patent).
`The computer security recovery/return program of the
`present invention utilizes this type of hardware recovery
`approach to a small degree, but is greatly different from this
`system, because this is a software program rather than a
`hardware solution. Additionally,
`the present
`invention is
`greatly superior, since the owner can interactively customize
`the return/recovery information displayed at any time, and
`the present invention also helps protect the important, con-
`fidential owner information on the hard drive, by the posi-
`tioning of the program layer in the equipment boot-up
`process.
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`(2) Computer Software Programs That Attempt Recovery
`Through the Use of the Modem.
`There are several patented computer security software
`products on the market today that are designed for the
`purpose of recovering lost or stolen equipment. These pro-
`grams use the computer’s modem to regularly call a recov-
`ery center. Then once a computer is stolen, the recovery
`center waits for the stolen computer to call in. When the
`computer modem calls in, the recovery centers use some-
`thing similar to the reverse 911 system to get the phone
`numberthat the stolen equipment is accessing. Using the
`phone number,the recovery system then cantry to get a map
`of where the computer is. Some of these computer security
`recovery programs can also attempt to locate stolen com-
`puters through an IP address. Some of these computer
`security recovery software programs, can actually attemptto
`seize the communication between the stolen computer and
`the recovery center and delete selected files to help protect
`the owner’s confidential information. Products like these
`
`include CompuTrace, PC Phone Home, CyberAngel, Lap-
`Trak and Luceria.
`
`The present invention is also designed for the purpose of
`recovering lost or stolen equipment, but
`the method is
`distinctively different and unique from the current methods.
`The present
`invention does not rely on the use of the
`computer modem. The present
`invention uses a layered
`program in the boot-up process to provide a display of the
`proper owner recovery and return information using the
`computer’s own monitor or screen. The present invention is
`also different and superior to the above software tracking
`products, in helping to accomplish international recovery.
`Noneofthe above products to date have been able to use the
`modem phone or IP system to track stolen equipment
`internationally. The present invention provides international
`recovery by displaying owner email information as well as
`providing recovery help through an international recovery
`internet web site.
`There are other differences as well in how these programs
`try to also protect the information on the hard drive. The
`present invention automatically initiates during the boot-up
`process of the equipment, in order to display the recovery/
`return information before a security prompt screen to always
`help protect the owner’s confidential information on the hard
`drive. Someof the programs above do nothing to protect the
`user information. Others like LapTrak include a Hide-A-File
`feature that an owner can access after the user enters the
`operating system. CyberAngel includes an encryption fea-
`ture. Luceria includes the ability to delete pre-selected files
`from the recovery center. By layering this computer security
`application strategically before or during a security prompt
`in the boot-up process, this application provides a unique
`and different method to help protect owner information.
`(An example of patents for these types of products would
`be the CompuTrace U.S. Pat. Nos. 5,715,174, 5,764,892,
`and 5,802,280).
`(3) Bios Based Password Identification Systems.
`There are some computers that are sold with Bios based
`identification systems included. These products activate
`immediately when a computer is turned on, and prompt the
`user for a password before accessing the data on the com-
`puter.
`The present invention is very different and unique from
`the Bios based program, for many reasons. Most importantly
`the bios based passwordidentification products are built into
`the hardware of the computer equipment—not the hard
`drive. In other words, if you removedthe hard drive from a
`stolen or lost laptop, and inserted the stolen hard drive into
`
`
`
`US 10,789,393 B2
`
`3
`a different laptop, you would bypass the bios based pass-
`word identification system, and the bios based password
`identification system would remain with the original equip-
`ment. Thus, the Bios Based PasswordIdentification system
`can identify the computer hardware, but not the hard drive
`(the most important part of the computer equipment).
`In addition, the Bios Based Password Identification sys-
`tems are designed as a unique method for providing an
`additional layer of password protection to the equipment
`hardware, but are not designed for recovery or return. There
`is no design for including complete owner information, no
`recovery information displayed, no effective protection of
`the information on the hard drive, no effective method for
`the recovery or return of the hard drive—the most important
`item that a consumer would want back. In fact the Bios
`
`Password Identification product occurs before allowing the
`hard drive to boot up. The present
`invention is unique
`because it is an application software program that provides
`its layer of protection during the boot-up process (not
`before), and thus allows the security product to move, with
`the hard drive, the most critical part of the computer.
`
`SUMMARY OF THE INVENTION
`
`The present invention pertains to a computer return appa-
`ratus. The apparatus comprises a processor. The apparatus
`comprises a memory connected to the processor. The appa-
`ratus comprises a display. The apparatus comprises a return
`screen that the processor automatically causes to appear
`during or after boot-up of the processor on the display, that
`displays ownership information concerning who ownsthe
`computer and return information for returning the computer
`to the owner from data stored in the memory.
`The present invention pertains to a method for returning
`a computer to its owner. The method comprises the steps of
`activating a computer. Then there is the step of displaying
`automatically a return screen on a display of the computer
`during or after boot-up of the computer, which displays
`information concerning owner information about who owns
`the computer and return information for returning the com-
`puter to the owner from data stored in the memory of the
`computer.
`The present invention pertains to a computer readable
`medium whose contents cause a computer to show whois its
`owner by performing the steps of activating a computer.
`Then there is the step of displaying automatically a return
`screen on a display of the computer during or after boot-up
`of the computer, which displays information concerning
`ownerinformation about who ownsthe computer and return
`information for returning the computer to the owner from
`data stored in the memory of the computer.
`The present invention pertains to a computer return appa-
`ratus. The apparatus comprises a processor. The apparatus
`comprises a memory connected to the processor. The appa-
`ratus comprises a display. The apparatus comprises a return
`screen that the processor automatically causes to appear
`during or after boot-up of the processor on the display, that
`displays information concerning an owner who owns the
`computer, concerning user information about whothe useris
`who the computer is assigned to for use, and return infor-
`mation for returning the computer to the owner from data
`stored in the memory.
`The present invention pertains to a method for displaying
`information to assist with returning a computerto its owner.
`The method comprises the steps of activating a computer.
`There is the step of displaying automatically a return screen
`on a display of the computer during or after boot-up which
`
`20
`
`25
`
`40
`
`45
`
`50
`
`55
`
`4
`displays information concerning owner information about
`who ownsthe computer, concerning user information about
`whothe user is who the computer is assigned to for use, and
`return information for returning the computer to the owner
`from data stored in a memory of the computer.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`In the accompanying drawings, the preferred embodiment
`of the invention and preferred methods of practicing the
`invention are illustrated in which:
`FIG. 1 is a schematic representation of the apparatus of
`the present invention.
`FIG.2 is a representation of a return/recovery dialog box
`of an embodimentof the present invention.
`FIG. 3 is a flow chart regarding an embodimentof the
`present invention.
`FIG.4 is a flow chart regarding a second embodiment of
`the present invention.
`FIG. 5 is a representation of an administration program
`section of the present invention.
`FIG.6 is a representation of a return screen of the present
`invention.
`FIG.7 is an example of a passwordscreen utilized by the
`present invention.
`FIG. 8 is a return administration screen of the present
`invention.
`FIG. 9 is a second return administration screen of the
`
`present invention.
`FIG. 10 is a third return administration screen of the
`present invention.
`FIG. 11 is a fourth return administration screen of the
`present invention.
`
`DETAILED DESCRIPTION
`
`Referring now to the drawings wherein like reference
`numerals refer to similar or identical parts throughout the
`several views, and more specifically to FIG. 1 thereof, there
`is shown a computer 12 return apparatus 10. The apparatus
`10 comprises a processor 14. The apparatus 10 comprises a
`memory 16 connected to the processor 14. The apparatus 10
`comprises a display 18. The apparatus 10 comprises a return
`screen 20 that the processor 14 automatically causes to
`appear during or after boot-up of the processor 14 on the
`display 18, that displays ownership information concerning
`who owns the computer 12 and return information for
`returning the computer 12 to the owner from data stored in
`the memory 16. The Owneris defined as the personor entity
`that owns, rents, or licenses the Retriever, and/or the person
`or entity who controls the recovery service. The Owner has
`greater control over the computer 12 than the user. This
`could include, but not be limited to, an employee of a
`company that owns the computer 12, or an agent of the
`ownerora friend that has the permission of the ownerto use
`or have or recover the computer 12.
`Preferably, the apparatus 10 includes means for causing
`the screen to appear on the display 18 with the owner and
`return information. The causing means 22 is stored in the
`memory 16. The causing means 22 preferably is a software
`program 24. Preferably, the memory 16 includes a primary
`operating system having an operating screen 26 for the
`computer 12, and the return screen 20 appears on the display
`18 before the operating screen 26 of the operating system
`appears on the display 18.
`The software program 24 preferably appears before a
`security prompt such as a password to be entered to obtain
`
`
`
`US 10,789,393 B2
`
`5
`access to the primary operating system of the computer 12.
`Preferably, the software program 24 allows the owner to
`change the return information and the owner information,
`after the password or security prompt is satisfied for the
`computer 12. The software program 24 is preferably able to
`communicate through a modem (or wireless) to a predeter-
`mined location to transfer the return information to the
`
`location to facilitate return of the computer 12 if it becomes
`lost by the owner.
`The present invention pertains to a method for returning
`a computer 12 to its owner. The method comprises the steps
`of activating a computer 12. Then there is the step of
`displaying automatically a return screen 20 on a display 18
`of the computer 12 during or after boot-up of the computer
`12, which displays information concerning owner informa-
`tion about who owns the computer 12 and return information
`for returning the computer 12 to the owner from data stored
`in the memory 16 of the computer 12.
`Preferably, the displaying step includes the step of dis-
`playing automatically the return screen 20 before an oper-
`ating screen 26 of the primary operating system of the
`computer 12. There is preferably the step of displaying the
`return screen 20 before satisfying a security prompt such as
`entering a password into the computer 12 to access the
`primary operating system. Preferably, there is the step of
`changing the return information, and the owner information
`after the step of satisfying a security prompt such as entering
`the password into the computer 12.
`The present invention pertains to a computer 12 readable
`medium whose contents cause a computer 12 to show who
`is its owner by performingthe steps of activating a computer
`12. Then there is the step of displaying automatically a
`return screen 20 on a display 18 of the computer 12 during
`or after boot-up of the computer 12, which displays infor-
`mation concerning owner information about who owns the
`computer 12 and return information for returning the com-
`puter 12 to the owner from data stored in the memory 16 of
`the computer 12.
`Preferably, the displaying step includes the step of dis-
`playing automatically the return screen 20 before an oper-
`ating screen 26 of the primary operating system of the
`computer 12. There is preferably the step of displaying the
`return screen 20 before satisfying a security prompt such as
`entering a password into the computer 12 to access the
`primary operating system. Preferably, there is the step of
`changing the return information and the owner information
`after the step of satisfying a security prompt such as entering
`a password into the computer 12.
`In the operation of the invention, first, the owner of the
`computer 12 would install the computer 12 security recov-
`ery/return software program 24 application. The program
`could be installed to work on any type of computer 12 screen
`including but not limited to, PC’s, laptops, handheld com-
`puters (such as blackberries, palm pilots), UPS computer-
`ized handheld tracking display units, and even cell phone
`displays. The unique recovery/return computer 12 security
`program could in fact, be installed and used by any type of
`computer 12 that utilized a monitor display screen. The
`software application program provides an additional layer to
`the existing operating system of each computer 12. The
`coding language usedfor the software program 24 could and
`would vary depending upon the computer 12 equipment, but
`the core structure of how the program operates would be
`similar in all items.
`Once the computer 12 security software program 24 is
`installed, the monitor of the computer 12 will display the
`complete and current recovery/return information that the
`program has allowed the owner of the equipmentto inter-
`actively enter, change and update at anytime.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`This “on the fly” ability to change owner recovery infor-
`mation to aid return of equipmentis an important feature for
`anyone, including college students whotravel from home to
`college during different parts of the year, people who move,
`and particularly business people who travel throughout the
`world. The recovery/return information would not only
`allow the display 18 of physical address return information,
`and owner contact telephone information, but would also
`provide for international internet based recovery through the
`added display 18 of owner email information, as well as the
`ability to display an international recovery center website.
`In addition to increasing chances of return and recovery of
`the stolen or lost equipment by using the computer’s 12
`display 18 monitor, the program is an additional program-
`ming layer added into the initial start up program of the
`computer 12, so that the recovery/return display 18 infor-
`mation occurs during or before a password or security
`promptscreen. This is an important feature that helps create
`an environment wherebythe individual that happens upon a
`stolen or lost piece of equipment will see the owner recov-
`ery/return information displayed before a password or secu-
`rity prompt screen. By automatically initiating this program
`during or before a user’s security prompt, such as a pass-
`word screen program, the recovery/return program will not
`only increase chances of recovery, but will also increase
`chances that the computer 12 information on the hard drive
`is protected while the computer 12 is not in the owner’s
`possession.
`For example, the actual step by step operation of the
`program is as follows:
`(1) Someone finds a lost or stolen computer 12. The
`person whofinds the computer 12, turns the computer 12 on.
`(The software program 24 could be provided with a
`warning sticker that will be placed on the outside of the
`equipmenttelling anyone finding the equipment, about the
`program and the display recovery screen.)
`(2) The computer 12 display 18 screen turns on. The
`computer 12 security software return/recovery program
`automatically initiates during the