`(12) Patent Application Publication (10) Pub. No.: US 2004/0103298 A1
`Hafeman
`(43) Pub. Date:
`May 27, 2004
`
`US 2004O103298A1
`
`5 (54) COMPUTER RECOVERY OR RETURN
`(76) Inventor: Carolyn W. Hafeman, Evergreen, CO
`(US)
`
`Correspondence Address:
`Ansel M. Schwartz
`Suite 304
`201 N. Craig Street
`Pittsburgh, PA 15213 (US)
`
`(21) Appl. No.:
`(22) Filed:
`
`10/304,827
`Nov. 25, 2002
`O
`O
`Publication Classification
`
`(51) Int. Cl." ....................................................... H04L 9/32
`
`(52) U.S. Cl. ............................... 713/200; 345/745; 713/1
`
`(57)
`
`ABSTRACT
`
`A computer return apparatus. The apparatus includes a
`processor. The apparatus includes a memory connected to
`the processor. The apparatus includes a display. The appa
`ratus includes a return Screen that the processor automati
`cally causes to appear during or after boot-up of the pro
`ceSSor on the display, that displays ownership information
`concerning who owns the computer and return information
`for returning the computer to the owner from data Stored in
`the memory. A method for returning a computer to its owner.
`The method includes the Steps of activating a computer. A
`computer readable medium whose contents cause a com
`puter to show who is its owner by performing the Steps of
`activating a computer.
`p
`
`WorkStation Locked
`
`Picture
`Red Stop
`Sign w/white
`word STOP
`
`The Retriever by WorldSecurityCorp.com
`This workstation has been locked. This equipment is protected
`against theft by the World Security Corp. International
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment,
`
`l-- - -e-His
`
`To Identify Rightful Owner & Avoid Prosecution CALL NOW:
`Recovery Name 7 (input from database frequired)
`Organization Name? ABC Corp? input not required
`Address 1 | input from database f not required
`Address 27 input from database / not required
`City) (State Zip fail of these input from database f not required
`Phone 1 finput from database frequired) (Phone 2 f not required
`Email finput from database frequired Fax f not required
`
`(Picture)
`Retriever Logo
`
`OR VISIT
`www worldsecurityCorp.com/loStandfound.html
`Email: lost andfound?worldsecurityCorp corn
`Phone : 1-800-XXX-XXXX
`
`Registration # : XXXXXXXXXXXXXXXX
`
`PRESS
`
`OK
`
`(CANCEL
`
`(SHUTDOWN
`
`EX-1009
`US Patent 10,789,393
`
`
`
`Patent Application Publication May 27, 2004 Sheet 1 of 8
`
`US 2004/0103298 A1
`
`
`
`
`
`Patent Application Publication May 27, 2004 Sheet 2 of 8
`
`US 2004/0103298 A1
`
`Y (6- 2
`
`WorkStation Locked
`
`Picture
`Red Stop
`Sign wwhite
`word STOP
`
`The Retriever by WorldSecurityCorp.com
`
`This workstation has been locked. This equipment is protected
`against theft by the World Security Corp. International
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment.
`
`
`
`To Identify Rightful Owner & Avoid Prosecution CALL NOW:
`
`Recovery Name? (input from database / required)
`Organization Name / ABC Corp? input / not required
`Address 1 f input from database / not required
`-
`Address 27 input from database / not required
`(City State (Zip f all of these input from database / not required)
`Phone 1 / input from database frequired Phone 2 / not required)
`Email / input from database / required Fax/ not required)
`
`OR VIST
`
`www.worldSecurityCorp.com/loStandfound.html
`Picture
`Retriever Logo Email: lostandfound.(a)worldsecurityCorp.corn
`Phone : 1-800-XXX-XXXX
`
`Registration if : XXXXXXXXXXXXXXXX (sequential number unique to each software
`license
`
`User:
`
`Password:
`
`OK
`(moves user to operating system with
`correct password)
`
`SHUTDOWN
`(initiates operating System
`shutdown)
`
`
`
`Patent Application Publication May 27, 2004 Sheet 3 of 8
`
`US 2004/0103298A1
`
`
`
`Fig 3
`
`Turn Computer
`On
`
`Recovery/Return
`Dialog Box appears on
`monitor's display screen.
`
`(Occurs before or with
`Password or Security
`Prompt Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`(Can appear as a screen after the Recovery/Return Dialog box or preferably at the
`bottom of the Recovery/Return Dialog Box as in Sample l above)
`(OK)
`(SHUTDOWN
`
`
`
`User enters computer
`operating system to access
`programs and information.
`
`
`
`
`
`
`
`Windows or Other Operating Systern Standard
`Shutdown Computer Screen
`(*) Shutdown
`( ) Shutdown and Reboot
`
`(OK
`
`(Shuts down
`computer)
`
`CANCEL
`(Returns back to
`previous screen)
`---------------------- -)
`Back up to previous screen.
`
`
`
`Patent Application Publication
`
`May 27, 2004 Sheet 4 of 8
`
`US 2004/0103298A1
`
`FIG 4
`
`Turn Computer
`On
`
`
`
`Welcome
`
`(Picture
`Windows hand
`with key
`
`Press (CTRL + ALT + DEL to Logon.
`(C) 2002-200 World Computer Security Corp
`Distributed by WWW, worldsecurityCorp.com
`Telephone; (303) 670-8800
`
`Picture
`Retriever Logo
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Recovery/Return
`Dialog Box appears on
`nonitor's display screen.
`
`(Occurs before or with
`Password or Security
`Prompt Dialog Box)
`
`Computer Password or
`Security Dialog Box Prompt
`Screen
`
`(Can appear as a screen after the
`Recovery/Retum Dialog box or
`preferably at the botton of the
`Recovery/Return Dialog Box)
`
`
`
`Patent Application Publication May 27, 2004 Sheet 5 of 8
`
`US 2004/0103298A1
`
`
`
`(- 5
`
`Computer Monitor Screen
`at Operating Systern Screen
`
`MS Word
`MS Excell >
`Administration Section >
`DVD Player >
`Etc. -
`
`Programs >
`Find)
`Help>
`Run)
`
`
`
`Windows Logon
`Picture)
`Keys
`
`(Picture
`Retriever Logo
`
`Enter a valid user name and password to logon to this
`system:
`
`User .
`
`Password .
`
`.
`
`OK
`
`(CANCEL)
`
`SHUTDOWN
`
`Yr G
`
`
`
`Patent Application Publication May 27, 2004 Sheet 6 of 8
`
`US 2004/0103298A1
`
`Wu G - (-
`
`WorkStation Locked
`
`(Picture
`Red Stop
`Sign w/white
`word STOP
`
`The Retriever by WorldSecurity Corp.com
`This workstation has been locked. This equipment is protected
`against theft by the World Security. Corp. International
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment.
`
`To Identify Rightful Owner & Avoid Prosecution CALL NOW:
`Recovery Name 7 (input from database frequired)
`Organization Name/ABC Corp? input? not required)
`Address 1 / input from database / not required)
`Address 2 / input from database / not required
`City State Zip fall of these input from database / not required
`(Phone 1 / input from database frequired) Phone 2 / not required
`Email / input from database / required Fax / not required)
`
`Picture
`Retriever Logo
`
`OR VISIT
`www WorldsecurityCorp.com/lost andfound.html
`Email lost andfound@Worldsecurity Corp corn
`Phone : 1-800-XXX-XXXX
`
`
`
`egistration if : XXXXXXXXXXXXXXXX
`
`(CANCEL
`
`(SHUTDOWN
`
`
`
`Patent Application Publication May 27, 2004 Sheet 7 of 8
`
`US 2004/0103298 A1
`
`
`
`The Retriever Administration Screen
`
`Exit X
`
`Recovery
`Info
`
`Blank
`User/Audit
`Screen Saver I
`Order
`Register
`(language?)
`Log
`Features
`About
`Export
`|--|--|--
`Recovery Info
`Location Info (all optional)
`(not displayed)
`Floor: .
`Ofice:
`UserName:
`User Ernai :
`
`Required :
`Recovery Contact:
`Phone Nuber:
`Enlai :
`Serial f :
`
`(displayed/unchangeable)
`
`Optional: Display on Return Screen?
`Organization Name:
`Address 1 :
`Address 2 :
`City :
`State:
`Zip :
`Phone 2:
`Fax :
`
`APPLY
`worldsecurityCorp.com
`lostandfoundalworldscCurityCorp.com
`
`Yes
`
`No
`
`Equipment Info (all optional)
`(not displayed)
`Type Equip:
`Brand:
`Model :
`Serial :
`Lease YIN
`Other 1 :
`Other 2:
`
`OK
`
`CANCEL)
`
`LOGO
`
`
`
`Patent Application Publication May 27, 2004 Sheet 8 of 8
`
`US 2004/0103298A1
`
`
`
`The Retriever Adrainistration Screen
`
`Exit X
`
`Register?
`Export
`
`Recovery
`Info
`
`Blank
`User/Audit
`Screen Saver .
`Order?
`(language?)
`Log
`Features
`About
`|--|--
`Thank you for using our Retriever Recovery system solution. Each license includes a 10 year unlimited recovery registration
`service to help recover your equipment in the event it is lost or stolen. By utilizing the internet, rather than simply relying on a
`local number or 800 number, this system can help provide you with an international recovery service. There are two (2) ways
`to register :
`(l) You can register On-line athltp://www.worldscCurityCorp.com/register.html
`
`OR
`(2) You can register by selecting the export button below. To regisler using the export button, first fill out all information
`using the recovery/info tab above. After filling out your recovery information, come back to this screen Select the export
`button below. This will automatically export your recovery info to an excel spreadshcct titled retreiver register.xls. Please
`email this spreadsheet to registcraworldsecurityCorp.com.
`(x). Export to file
`c:\retrieverregister.xls)
`Overwrite existing file
`
`EXPORT)
`(CANCEL)
`
`TBANK YOU
`
`worldSecurityCorp.com
`loStandfoundiaWorldsecurityCorp.com
`
`LOGO
`
`el G 6,
`
`
`
`US 2004/0103298 A1
`
`May 27, 2004
`
`COMPUTER RECOVERY OR RETURN
`
`FIELD OF THE INVENTION
`0001. The present invention is related to the return of lost
`or Stolen computers. More Specifically, the present invention
`is related to the return of lost or Stolen computers using a
`recovery Screen that appears during or after boot-up of the
`computer.
`
`BACKGROUND OF THE INVENTION
`0002 Current methods of computer return or recovery
`products include:
`0003 (1) Physical labels that attach to the outside hard
`ware of the computer equipment.
`0004. These hardware labels can contain custom recov
`ery information, but because they are hardware based, they
`can not be interactively changed by the owner. Also, Since
`they do not have any ability to affect the computer boot-up
`process, they can do nothing to help protect the confidential
`owner information on the hard drive. An example of a well
`known physical hardware/recovery label is the STOP Tag by
`Security Tracking of Office property in Connecticut. This
`labeling System has been patented in France, the US, and
`other countries. The product can be easily defeated by
`removing the physical label. In the case of STOP Tag which
`includes a recovery mark which states “STOLEN PROP
`ERTY' underneath the label, a new label can be simply
`added over the recovery mark to hide the STOLEN PROP
`ERTY sign. (The Security Tracking of Office Property
`equipment recovery patent is U.S. Pat. No. 5,163,711 This
`patent actually refers to how the labels adhere to the equip
`ment-but this is their patent).
`0005 The computer security recovery/return program of
`the present invention utilizes this type of hardware recovery
`approach to a Small degree, but is greatly different from this
`System, because this is a Software program rather than a
`hardware Solution. Additionally, the present invention is
`greatly Superior, Since the owner can interactively customize
`the return/recovery information displayed at any time, and
`the present invention also helps protect the important, con
`fidential owner information on the hard drive, by the posi
`tioning of the program layer in the equipment boot-up
`proceSS.
`0006 (2) Computer Software programs that attempt
`recovery through the use of the modem.
`0007. There are several patented computer security soft
`ware products on the market today that are designed for the
`purpose of recovering lost or Stolen equipment. These pro
`grams use the computer's modem to regularly call a recov
`ery center. Then once a computer is Stolen, the recovery
`center waits for the stolen computer to call in. When the
`computer modem calls in, the recovery centers use Some
`thing Similar to the reverse 911 System to get the phone
`number that the Stolen equipment is accessing. Using the
`phone number, the recovery System then can try to get a map
`of where the computer is. Some of these computer Security
`recovery programs can also attempt to locate Stolen com
`puters through an IP address. Some of these computer
`Security recovery Software programs, can actually attempt to
`Seize the communication between the Stolen computer and
`the recovery center and delete Selected files to help protect
`
`the owner's confidential information. Products like these
`include CompuTrace, PC phone Home, Cyber Angel, Lap
`Trak and Luceria.
`0008. The present invention is also designed for the
`purpose of recovering lost or Stolen equipment, but the
`method is distinctively different and unique from the current
`methods. The present invention does not rely on the use of
`the computer modem. The present invention uses a layered
`program in the boot-up process to provide a display of the
`proper owner recovery and return information using the
`computer's own monitor or Screen. The present invention is
`also different and Superior to the above Software tracking
`products, in helping to accomplish international recovery.
`None of the above products to date have been able to use the
`modem phone or IP System to track Stolen equipment
`internationally. The present invention provides international
`recovery by displaying owner email information as well as
`providing recovery help through an international recovery
`internet web site.
`0009. There are other differences as well in how these
`programs try to also protect the information on the hard
`drive. The present invention automatically initiates during
`the boot-up process of the equipment, in order to display the
`recovery/return information before a Security prompt Screen
`to always help protect the owner's confidential information
`on the hard drive. Some of the programs above do nothing
`to protect the user information. Others like LapTrak include
`a Hide-A-File feature that an owner can access after the user
`enters the operating System. CyberAngel includes an
`encryption feature. Luceria includes the ability to delete
`pre-Selected files from the recovery center. By layering this
`computer Security application Strategically before or during
`a Security prompt in the boot-up process, this application
`provides a unique and different method to help protect owner
`information.
`0010 (An example of patents for these types of products
`would be the CompuTrace U.S. Pat. No. 5,715,174, No.
`5,764,892, and No. 5,802,280).
`0011 (3) Bios Based Password Identification systems.
`0012. There are some computers that are sold with Bios
`based identification Systems included. These products acti
`Vate immediately when a computer is turned on, and prompt
`the user for a password before accessing the data on the
`computer.
`0013 The present invention is very different and unique
`from the BioS based program, for many reasons. Most
`importantly the bios based password identification products
`are built into the hardware of the computer equipment-not
`the hard drive. In other words, if you removed the hard drive
`from a stolen or lost laptop, and inserted the Stolen hard
`drive into a different laptop, you would bypass the bios
`based password identification System, and the bios based
`password identification System would remain with the origi
`nal equipment. Thus, the Bios Based Password Identification
`System can identify the computer hardware, but not the hard
`drive (the most important part of the computer equipment).
`0014.
`In addition, the Bios Based Password Identification
`Systems are designed as a unique method for providing an
`additional layer of password protection to the equipment
`hardware, but are not designed for recovery or return. There
`is no design for including complete owner information, no
`
`
`
`US 2004/0103298 A1
`
`May 27, 2004
`
`recovery information displayed, no effective protection of
`the information on the hard drive, no effective method for
`the recovery or return of the hard drive-the most important
`item that a consumer would want back. In fact the Bios
`Password Identification product occurs before allowing the
`hard drive to boot up. The present invention is unique
`because it is an application Software program that provides
`its layer of protection during the boot-up process (not
`before), and thus allows the security product to move with
`the hard drive, the most critical part of the computer.
`
`SUMMARY OF THE INVENTION
`0.015 The present invention pertains to a computer return
`apparatus. The apparatus comprises a processor. The appa
`ratus comprises a memory connected to the processor. The
`apparatus comprises a display. The apparatus comprises a
`return Screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays ownership information concerning
`who owns the computer and return information for returning
`the computer to the owner from data Stored in the memory.
`0016. The present invention pertains to a method for
`returning a computer to its owner. The method comprises the
`Steps of activating a computer. Then there is the Step of
`displaying automatically a return Screen on a display of the
`computer during or after boot-up of the computer, which
`displays information concerning owner information about
`who owns the computer and return information for returning
`the computer to the owner from data stored in the memory
`of the computer.
`0.017. The present invention pertains to a computer read
`able medium whose contents cause a computer to show who
`is its owner by performing the Steps of activating a com
`puter. Then there is the Step of displaying automatically a
`return Screen on a display of the computer during or after
`boot-up of the computer, which displays information con
`cerning owner information about who owns the computer
`and return information for returning the computer to the
`owner from data Stored in the memory of the computer.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0.018. In the accompanying drawings, the preferred
`embodiment of the invention and preferred methods of
`practicing the invention are illustrated in which:
`0.019
`FIG. 1 is a schematic representation of the appa
`ratus of the present invention.
`0020 FIG. 2 is a representation of a return/recovery
`dialog box of an embodiment of the present invention.
`0021
`FIG. 3 is a flow chart regarding an embodiment of
`the present invention.
`0022 FIG. 4 is a flow chart regarding a second embodi
`ment of the present invention.
`0023 FIG. 5 is a representation of an administration
`program Section of the present invention.
`0024 FIG. 6 is a representation of a return screen of the
`present invention.
`0.025
`FIG. 7 is an example of a password screen utilized
`by the present invention.
`
`0026 FIG. 8 is a return administration screen of the
`present invention.
`0027 FIG. 9 is a second return administration screen of
`the present invention.
`DETAILED DESCRIPTION
`0028 Referring now to the drawings wherein like refer
`ence numerals refer to Similar or identical parts throughout
`the several views, and more specifically to FIG. 1 thereof,
`there is shown a computer 12 return apparatus 10. The
`apparatus 10 comprises a processor 14. The apparatus 10
`comprises a memory 16 connected to the processor 14. The
`apparatus 10 comprises a display 18. The apparatus 10
`comprises a return Screen 20 that the processor 14 automati
`cally causes to appear during or after boot-up of the pro
`cessor 14 on the display 18, that displays ownership infor
`mation concerning who owns the computer 12 and return
`information for returning the computer 12 to the owner from
`data stored in the memory 16. Owner is defined to be anyone
`who has the lawful and consensual right to use, possess or
`control the computer 12. This could include, but not be
`limited to, an employee of a company that owns the com
`puter 12, or an agent of the owner or a friend that has the
`permission of the owner to use and have the computer 12.
`0029 Preferably, the apparatus 10 includes means for
`causing the Screen to appear on the display 18 with the
`owner and return information. The causing means 22 is
`Stored in the memory 16. The causing means 22 preferably
`is a software program 24. Preferably, the memory 16
`includes a primary operating System having an operating
`screen 26 for the computer 12, and the return screen 20
`appears on the display 18 before the operating Screen 26 of
`the operating System appears on the display 18.
`0030 The software program 24 preferably appears before
`a Security prompt Such as a password to be entered to obtain
`access to the primary operating System of the computer 12.
`Preferably, the software program 24 allows the owner to
`change the return information and the owner information,
`after the password or Security prompt is Satisfied for the
`computer 12. The software program 24 is preferably able to
`communicate through a modem to a predetermined location
`to transfer the return information to the location to facilitate
`return of the computer 12 if it becomes lost by the owner.
`0031. The present invention pertains to a method for
`returning a computer 12 to its owner. The method comprises
`the Steps of activating a computer 12. Then there is the Step
`of displaying automatically a return Screen 20 on a display
`18 of the computer 12 during or after boot-up of the
`computer 12, which displayS information concerning owner
`information about who owns the computer 12 and return
`information for returning the computer 12 to the owner from
`data stored in the memory 16 of the computer 12.
`0032 preferably, the displaying step includes the step of
`displaying automatically the return Screen 20 before an
`operating Screen 26 of the primary operating System of the
`computer 12. There is preferably the Step of displaying the
`return Screen 20 before Satisfying a Security prompt Such as
`entering a password into the computer 12 to access the
`primary operating System. Preferably, there is the Step of
`changing the return information, and the owner information
`after the Step of Satisfying a Security prompt Such as entering
`the password into the computer 12.
`
`
`
`US 2004/0103298 A1
`
`May 27, 2004
`
`0033. The present invention pertains to a computer 12
`readable medium whose contents cause a computer 12 to
`show who is its owner by performing the Steps of activating
`a computer 12. Then there is the Step of displaying auto
`matically a return screen 20 on a display 18 of the computer
`12 during or after boot-up of the computer 12, which
`displays information concerning owner information about
`who owns the computer 12 and return information for
`returning the computer 12 to the owner from data Stored in
`the memory 16 of the computer 12.
`0034 Preferably, the displaying step includes the step of
`displaying automatically the return Screen 20 before an
`operating Screen 26 of the primary operating System of the
`computer 12. There is preferably the Step of displaying the
`return Screen 20 before Satisfying a Security prompt Such as
`entering a password into the computer 12 to access the
`primary operating System. Preferably, there is the Step of
`changing the return information and the owner information
`after the Step of Satisfying a Security prompt Such as entering
`a password into the computer 12.
`0035) In the operation of the invention, first, the owner of
`the computer 12 would install the computer 12 Security
`recovery/return Software program 24 application. The pro
`gram could be installed to work on any type of computer 12
`Screen including but not limited to, PCS, laptops, handheld
`computers (Such as blackberries, palm pilots), UPS comput
`erized handheld tracking display units, and even cell phone
`displays. The unique recovery/return computer 12 security
`program could in fact, be installed and used by any type of
`computer 12 that utilized a monitor display Screen. The
`Software application program provides an additional layer to
`the existing operating System of each computer 12. The
`coding language used for the Software program 24 could and
`would vary depending upon the computer 12 equipment, but
`the core Structure of how the program operates would be
`Similar in all items.
`0036) Once the computer 12 security software program
`24 is installed, the monitor of the computer 12 will display
`the complete and current recovery/return information that
`the program has allowed the owner of the equipment to
`interactively enter, change and update at anytime.
`0037. This “on the fly” ability to change owner recovery
`information to aid return of equipment is an important
`feature for anyone, including college Students who travel
`from home to college during different parts of the year,
`people who move, and particularly business people who
`travel throughout the world. The recovery/return informa
`tion would not only allow the display 18 of physical address
`return information, and owner contact telephone informa
`tion, but would also provide for international internet based
`recovery through the added display 18 of owner email
`information, as well as the ability to display an international
`recovery center web site.
`0.038. In addition to increasing chances of return and
`recovery of the Stolen or lost equipment by using the
`computer's 12 display 18 monitor, the program is an addi
`tional programming layer added into the initial Start up
`program of the computer 12, So that the recovery/return
`display 18 information occurs during or before a password
`
`or Security prompt Screen. This is an important feature that
`helps create an environment whereby the individual that
`happens upon a Stolen or lost piece of equipment will see the
`owner recovery/return information displayed before a pass
`word or Security prompt Screen. By automatically initiating
`this program during or before a user's Security prompt, Such
`as a password Screen program, the recovery/return program
`will not only increase chances of recovery, but will also
`increase chances that the computer 12 information on the
`hard drive is protected while the computer 12 is not in the
`owner's possession.
`0039 For example, the actual step by step operation of
`the program is as follows:
`0040 (1) Someone finds a lost or stolen computer 12. The
`person who finds the computer 12, turns the computer 12 on.
`(The Software program 24 could be provided with a warning
`Sticker that will be placed on the outside of the equipment
`telling anyone finding the equipment, about the program and
`the display recovery Screen.)
`0041) (2) The computer 12 display 18 screen turns on.
`The computer 12 Security Software return/recovery program
`automatically initiates during the computer's 12 boot-up
`proceSS.
`0042 (3) As the computer 12 booting up process moves
`the user to a password or Security prompt Screen, the
`computer 12 Security Software program 24 displays a dialog
`box which includes owner recovery and return information,
`So that the perSon finding the equipment can return the
`equipment either directly or through the international web
`Site recovery center. The information Screen can include any
`of the following items of information that the owner would
`like displayed including but not limited to: contact name,
`organization name, owner address, owner telephone number,
`owner email, international web site recovery site, interna
`tional recovery email information, unique program Serial/
`registration number. (See FIG. 2).
`0043 Virtually all of this information would have been
`interactively inputted by the owner, and the owner would
`have control over how much recovery information is dis
`played. (This is important, because Some owners would like
`all the available information displayed, and others would
`not. For example, a U.S. Secret Service agent, accountant, or
`military perSonnel, might only want his name and phone
`number displayed, and would not like the organization name
`displayed for fear that would encourage a thief to try harder
`to break into the System rather than return the equipment.)
`0044) (4) The individual who has found the lost or stolen
`computer 12, is now able to easily return the equipment to
`the rightful owner. Because the display 18 Screen showing
`the owner information is before, or during a password or
`Security prompt Screen that occurs before allowing the user
`to access the full operating System, the perSon recovering the
`equipment is blocked by the password or Security prompt
`Screen from accessing the data, and is unable to avoid Seeing
`the recovery information Screen.
`0045. It is important to note only that the computer 12
`Security Software recovery/return program be displayed on
`the computer 12 Screen monitor before, or during a password
`or Security prompt display Screen, because the operating
`
`
`
`US 2004/0103298 A1
`
`May 27, 2004
`
`System password Screen creates a wall before taking the
`computer 12 user to the computer 12 operating System. (See
`FIG.3). This helps not only protect the owner's information
`on the hard drive, but also ensures that the person finding the
`equipment will see the owner recovery/return information. If
`the program initiated after the password or Security prompt
`Screen, the person finding the lost or Stolen equipment would
`have difficulty ever seeing the recovery/return display 20.
`0046. It is also important to note that even through the
`recovery Screen dialog box would ideally be the first Screen,
`this may not be possible due to the wide variety of software
`operating Systems used by computer 12 Systems. Each
`computer 12 Security program will attempt to display the
`recovery information on the initial Screen when possible.
`However, for one of the Window operating systems for
`example, the first boot-up default screen is a CTR-ALT+
`DEL Screen, and then the program can move to a password
`Screen. In this case, the recovery/return program could
`provide a display 18 dialog Screen that would be an addi
`tional layer between the CTR-ALT+DEL dialog box and the
`password dialog box. (See FIG. 4). Other operating systems
`could allow the program to display the recovery dialog box,
`with the password or security prompt at the bottom of the
`dialog box (So that even though the recovery dialog appli
`cation is an additional layer during the boot-up, it would
`appear that the password or Security prompt is included
`within the same dialog box). (See FIGS. 2 and 3). The
`recovery dialog box would occur before or during the
`password or Security dialog box that blocks the user from
`accessing the operating System.
`0047 Operation Administration Feature:
`0.048. The computer 12 security Software recovery/return
`program would also include an administration Section to the
`program. The operation of the administration Section fea
`tures would work like this:
`0049 (1) The owner of the computer 12 would turn their
`machine on.
`0050 (2) As the boot-up begins, the owner sees the
`recovery/return display 18 dialog box appear.
`0051 (3) The owner then may see a password or security
`prompt to allow the owner into the operating System.
`0.052
`(4) In the event that there is a security prompt, the
`owner types in the correct password or Satisfies the Security
`prompt to access the hard drive's operating System and
`programs.
`0053 (5) Once the owner gains access to the primary
`operating System, the owner will have the ability to Select an
`administration Section for the computer 12 Security Software
`recovery/return program through the Start Up button or a
`shortcut icon on the display 18 screen. (See FIG. 5). The
`administration dialog box will allow the owner to interac
`tively change the recovery/return display 18 information that
`appears in the recovery/return dialog box displayed during
`the boot-up process.
`0054 (6) There are additional features to the administra
`tion dialog box that may be added. Some of the features
`include:
`
`a) added password or securitv protection
`0.055
`p
`y p
`prompt to allow the owner to access the administra
`
`tive part of the program in order to change the
`recovery/return dialog display information,
`0056 b) interactive email based registration capa
`bility that would export owner information to an
`international recovery center using the internet,
`0057 c) a where to order more licenses informa
`tion screen (that could be tailored to allow dealer/
`distributor contact information),
`0.058
`d) screen saver lock feature, and
`0059) e) possible audit log to track user activity.
`0060. There are at least 3 important features that are
`critical and unique to the program, and make this program
`vastly different from other equipment Security recovery
`products:
`0061 (1) The ability to display recovery/return informa
`tion on