throbber
O
`
`US 2005.0071670A1
`
`(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2005/0071670 A1
`Hafeman
`(43) Pub. Date:
`Mar. 31, 2005
`
`(54) COMPUTER RECOVERY OR RETURN
`(76) Inventor: Carolyn W. Hafeman, Evergreen, CO
`(US)
`Correspondence Address:
`Ansel M. Schwartz
`Attorney at Law
`Suite 304
`201 N. Craig Street
`Pittsburgh, PA 15213 (US)
`
`(21) Appl. No.:
`(22) Filed:
`
`10/945,332
`Sep. 20, 2004
`
`Related U.S. Application Data
`(63) Continuation-in-part of application No. 10/304.827,
`filed on Nov. 25, 2002, now abandoned.
`
`Publication Classification
`(51) Int. Cl." ....................................................... H04L 9/00
`(52) U.S. Cl. .............................................................. 713/200
`
`(57)
`
`ABSTRACT
`
`A computer return apparatus includes a processor. The
`apparatus includes a memory connected to the processor.
`The apparatus includes a display. The apparatus includes a
`return Screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays information concerning an owner who
`owns the computer, concerning user information about who
`the user is who the computer is assigned to for use, and
`return information for returning the computer to the owner
`from data Stored in the memory. A method for displaying
`information to assist with returning a computer to its owner.
`
`Turn Computer
`On
`
`
`
`Recovery / Return
`Dialog Box appears On
`monitor's display screen.
`(Occurs before or with
`Password or Security
`Prompt: Dialog Box)
`
`
`
`
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`(Can appear as a screen after the Recovery / Return Dialog box or preferably at the
`bottom of the Recovery/Return Dialog Box as in Sample 1 above)
`OK)
`SHUTDOWN)
`
`User enters computer
`operating system to access
`programs and information.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Windows or Other Operating System Standard
`Shutdown Computer Screen
`() Shutdown
`() Shutdown and Reboot
`OK
`(Shuts down
`computer)
`
`(CANCEL)
`(Returns back to
`previous screen)
`|----------------se
`Back up to previous Screen.
`
`EX-1011
`US Patent 10,789,393
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 1 of 10
`
`US 2005/0071670 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`PRIMARY
`OPERATING
`SYSTEM
`
`
`
`
`
`RETURN
`SCREEN
`
`OPERATING
`SCREEN ||
`
`20
`
`26
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 2 of 10
`
`US 2005/0071670 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Workstation Locked
`The Retriever by WorldsecurityCorp.com
`Picture
`The workstation has been locked. This equipment is protected
`Red Stop
`Sign, 'Chile agains her by the World Security Corp. Hernational
`word STOP
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost Or stolen equipment.
`
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW:
`Recovery Name/(input from database / required)
`Organization Name / ABC Corp/ input/ not required
`Address 1 / input from database / not required)
`Address 2 / input from database / not required
`City State Zip / all of these input from database / not required
`Phone 1 / input from database / requiredPhone 2 / not required)
`Email / input from database / requiredFox / not required
`OR VISIT
`www.worldsecurityCorp.com/loslandfound.html.
`Picture
`Retriever Logo Email: lostondfoundeworldsecurityCorp.com
`Phone : 1-800-xxx-xxxx
`Registration f : XXXXXXXXXXXXXXXX (sequential number unique to each
`Softwore license
`
`User:
`
`Password:
`
`(OK)
`(moves user to operating system with
`correct possword)
`
`
`
`(SHUTDOWN)
`(initiates operating system
`shutdown)
`
`FIG.2
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 3 of 10
`
`US 2005/0071670 A1
`
`Turn Computer .
`On
`
`
`
`Recovery / Return
`Dialog Box appears On
`monitor's display screen.
`(0ccurs before or with
`Password or Security
`Prompt: Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`(Can appear as a screen after the Recovery / Return Dialog box or preferably at the
`bottom of the Recovery/Return Dialog Box OS in Sample 1 above)
`(SHUTDOWN
`OK
`
`User enters computer
`Operoting system to access
`programs and information.
`
`
`
`Windows or Other Operating System Standard
`Shutdown Computer Screen
`(*) Shutdown
`( ) Shutdown and Reboot
`OK
`(Shuts down
`Computer)
`
`(CNCE)
`(Returns back to
`previous screen)
`|----------------s
`Back up to previous Screen.
`
`FIG 3
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 4 of 10
`
`US 2005/0071670 A1
`
`Turn Computer
`On
`
`Picture
`Windows hand
`with key
`
`
`
`
`
`
`
`
`
`Press CTRL + ALT + DEL to Logon.
`C 2002-200 World Computer Security Corp
`Distribuited by www.worldsecurityCorp.com
`Telephone : (503) 670-8800
`
`
`
`Picture
`Retriever Logo
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Recovery/Return
`Dialog Box appears On
`monitor's display screen.
`(0ccurs before or with
`possword or Security
`Prompt Dialog Box)
`
`Computer Password or
`Security Dialog Box Prompt
`Screen
`(Con appear as a screen after the
`Recovery/Return Dialog box or
`preferably at the bottom of the
`Recovery/Return Dialog Box)
`FIG.4
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 5 of 10
`
`US 2005/0071670 A1
`
`Computer Monitor Screen
`at Operating System Screen
`
`MS Word X
`MS Excel X
`Programs x Administration Section >
`Find X
`DVD Player >
`Help >
`Etc... X
`Run X
`
`START
`
`FIG 5
`
`
`
`Windows logon
`Picture
`Keys
`
`Picture
`Retriever Logo
`
`OK
`
`Enter a valid user name and password to logon to his
`system :
`
`User:
`Possword:
`
`(SHUTDOWN)
`
`(CANCEL)
`FIC 7
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 6 of 10
`
`US 2005/0071670 A1
`
`Workstotion Ocked
`
`The Retriever by WorldsecurityCorD.Com
`Picture
`Red SP, The workstation has been locked. This equipment is protected
`Sign w/white against theft by the World Security Corp. International
`Word STOP
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment.
`
`To indentify Rightful Owner & Avoid Prosecution CALL NOW :
`Recovery Name/(input from database / required)
`Organization Name / ABC Corp/ input/ not required
`Address 1 / input from database / not required
`Address 2 / input from database / not required
`City State Zip / all of these input from database / not required
`Phone 1 / input from database / requiredPhone 2 / not required
`Email / input from database / required Fox / not required
`OR VISIT
`www.worldsecurityCorp.com/lostondfound.html
`Picture
`Retriever Logo Email : loslandfound0 worldsecurityCorp.com
`PhOne : 1-800-XXX-XXXX
`
`Registration f : XXXXXXXXXXXXXXXX
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`SHUTDOWN)
`
`CANCEL
`
`FIG.6
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 7 of 10
`
`US 2005/0071670 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ø?) goelas MO
`
`
`
`|?yon, swael M3NMO EÐNVH2
`
`
`
`
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 8 of 10
`
`US 2005/0071670 A1
`
`ideaMeT puerue?/xa/pºpayoud sy pue sue addy :auau?uedou
`
`
`
`?io:Mouo?sues xº/papa?aud si puesteºddy : ou p?ubissw
`
`
`
`
`
`
`
`
`
`
`
`. , CI MONASSVd.O.L. CIENSDISSSV HØN\/HO.
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 9 of 10
`
`US 2005/0071670 A1
`
`
`
`Stop Sign
`
`The RETRIEVER from World Security C
`Enter a valid user name arid password to log on to this system.
`
`Sign On
`
`Name:
`
`- Password:
`
`PRESS. - 9
`
`CANCEL |
`
`SHUTDOWN
`
`This equipment is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theft, protect information and recover lost or stolen equipment.
`to Scientity Rightful Owner, Ccilee: Resyard & Aveig Prosecessie, CAEL NOW :
`fy seaso:
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-234
`it admin?aabccorp.com
`
`Assigiet "o:
`
`Carrie Hafeman
`303-670-8800
`lightguardian?ansn.com
`
`-
`
`Distributed by
`D SPAC
`safala -
`
`eR WISET
`Web Site :
`Email :
`Phone :
`
`www.worldsecuritycord.com lostandfound/html
`lostandfoundalworldsecurity corp.com
`1-800-xxx-xxxx
`
`The Retrieyer
`
`Registration #: XXXXXXXXXXXXXXXXXXxxxx
`
`
`
`- G- O
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 10 of 10
`
`US 2005/0071670 A1
`
`Workstation Locked
`
`Stop Sign)
`
`The RETRIEVER from World Security Corp
`Enter a valid user name and password to log on to this system.
`
`Name:
`
`Sign. On
`press: - 9
`O
`
`Correct PW
`Incorrect P
`
`Password: |
`
`cANCEL
`
`SHUTDOWN
`HUTDOWN
`
`This equipment is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retriever Program has been installed to help
`... stop theft, protect information and recover lost or stolen equipment.
`To destify Rightful Owater, Collect Reward & Avoid Prosecution CA ill NOW:
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1234
`it admin?aabccorp.com
`
`AD SPAC
`
`SSS
`
`is s
`
`:
`
`Carrie Hafeman
`303-670-8800
`lightguardian?a.msn.com
`
`AD SPAC
`
`Distributed b
`y
`
`
`
`CGr WiS'
`Web Site:
`Email :
`Phone :
`
`www.worldsecurity corp.com/iostandfound/html
`lostandfound(a worldsecurity corp.com
`1-800-xxx-xxxx
`
`The Retriever
`
`
`
`Registration fi : xxxxxxxxxxxxxxxxxxxxxx
`
`

`

`US 2005/0071670 A1
`
`Mar. 31, 2005
`
`COMPUTER RECOVERY OR RETURN
`
`FIELD OF THE INVENTION
`0001. The present invention is related to the return of lost
`or Stolen computers. More Specifically, the present invention
`is related to the return of lost or Stolen computers using a
`recovery Screen that appears during or after boot-up of the
`computer.
`
`BACKGROUND OF THE INVENTION
`0002 Current methods of computer return or recovery
`products include:
`0003) (1) Physical Labels that Attach to the Outside
`Hardware of the Computer Equipment.
`0004. These hardware labels can contain custom
`recovery information, but because they are hardware
`based, they can not be interactively changed by the
`OWC.
`0005 Also, since they do not have any ability to affect the
`computer boot-up process, they can do nothing to help
`protect the confidential owner information on the hard drive.
`An example of a well known physical hardware/recovery
`label is the STOP Tag by Security Tracking of Office
`Property in Connecticut. This labeling system has been
`patented in France, the US, and other countries. The product
`can be easily defeated by removing the physical label. In the
`case of STOP Tag which includes a “recovery mark which
`states “STOLEN PROPERTY' underneath the label, a new
`label can be simply added over the recovery mark to hide
`the STOLEN PROPERTY sign. (The Security Tracking of
`Office Property equipment recovery is U.S. Pat. No. 5,163,
`711 This patent actually refers to how the labels adhere to
`the equipment-but this is their patent).
`0006 The computer security recovery/return pro
`gram of the present invention utilizes this type of
`hardware recovery approach to a Small degree, but is
`greatly different from this System, because this is a
`Software program rather than a hardware Solution.
`Additionally, the present invention is greatly Supe
`rior, Since the owner can interactively customize the
`return/recovery information displayed at any time,
`and the present invention also helps protect the
`important, confidential owner information on the
`hard drive, by the positioning of the program layer in
`the equipment boot-up process.
`0007 (2) Computer Software Programs that Attempt
`Recovery Through the Use of the Modem.
`0008. There are several patented computer security
`Software products on the market today that are
`designed for the purpose of recovering lost or Stolen
`equipment. These programs use the computer's
`modem to regularly call a recovery center. Then once
`a computer is Stolen, the recovery center waits for the
`stolen computer to call in. When the computer
`modem calls in, the recovery centers use Something
`Similar to the reverse 911 System to get the phone
`number that the Stolen equipment is accessing. Using
`the phone number, the recovery System then can try
`to get a map of where the computer is. Some of these
`computer Security recovery programs can also
`
`attempt to locate Stolen computers through an IP
`address. Some of these computer Security recovery
`Software programs, can actually attempt to Seize the
`communication between the Stolen computer and the
`recovery center and delete Selected files to help
`protect the owner's confidential information. Prod
`ucts like these include CompuTrace, PC Phone
`Home, Cyber Angel, LapTrak and Luceria.
`0009. The present invention is also designed for the
`purpose of recovering lost or Stolen equipment, but
`the method is distinctively different and unique from
`the current methods. The present invention does not
`rely on the use of the computer modem. The present
`invention uses a layered program in the boot-up
`process to provide a display of the proper owner
`recovery and return information using the comput
`er's own monitor or Screen. The present invention is
`also different and Superior to the above software
`tracking products, in helping to accomplish interna
`tional recovery. None of the above products to date
`have been able to use the modem phone or IP system
`to track Stolen equipment internationally. The
`present invention provides international recovery by
`displaying owner email information as well as pro
`Viding recovery help through an international recov
`ery internet web site.
`0010) There are other differences as well in how
`these programs try to also protect the information on
`the hard drive. The present invention automatically
`initiates during the boot-up process of the equip
`ment, in order to display the recovery/return infor
`mation before a Security prompt Screen to always
`help protect the owner's confidential information on
`the hard drive. Some of the programs above do
`nothing to protect the user information. Others like
`LapTrak include a Hide-A-File feature that an owner
`can access after the user enters the operating System.
`Cyber Angel includes an encryption feature. Luceria
`includes the ability to delete pre-selected files from
`the recovery center. By layering this computer Secu
`rity application Strategically before or during a Secu
`rity prompt in the boot-up process, this application
`provides a unique and different method to help
`protect owner information.
`0.011
`(An
`ple of p
`for th
`yp
`f
`eXample Of patentS Or theSe tVDeS O
`products would be the CompuTrace U.S. Pat. Nos.
`5,715,174, 5,764,892, and 5,802.280).
`0012 (3) Bios Based Password Identification Systems.
`0013 There are some computers that are sold with
`Bios based identification systems included. These
`products activate immediately when a computer is
`turned on, and prompt the user for a password before
`accessing the data on the computer.
`0014. The present invention is very different and
`unique from the BioS based program, for many
`reasons. Most importantly the bios based password
`identification products are built into the hardware of
`the computer equipment-not the hard drive. In
`other words, if you removed the hard drive from a
`Stolen or lost laptop, and inserted the Stolen hard
`drive into a different laptop, you would bypass the
`
`

`

`US 2005/0071670 A1
`
`Mar. 31, 2005
`
`bios based password identification System, and the
`bios based password identification System would
`remain with the original equipment. Thus, the BioS
`Based Password Identification system can identify
`the computer hardware, but not the hard drive (the
`most important part of the computer equipment).
`0015. In addition, the Bios Based Password Identi
`fication Systems are designed as a unique method for
`providing an additional layer of password protection
`to the equipment hardware, but are not designed for
`recovery or return. There is no design for including
`complete owner information, no recovery informa
`tion displayed, no effective protection of the infor
`mation on the hard drive, no effective method for the
`recovery or return of the hard drive-the most
`important item that a consumer would want back. In
`fact the Bios Password Identification product occurs
`before allowing the hard drive to boot up. The
`present invention is unique because it is an -appli
`cation Software program that provides its layer of
`protection during the boot-up process (not before),
`and thus allows the security product to move with the
`hard drive, the most critical part of the computer.
`
`SUMMARY OF THE INVENTION
`0016. The present invention pertains to a computer return
`apparatus. The apparatus comprises a processor. The appa
`ratus comprises a memory connected to the processor. The
`apparatus comprises a display. The apparatus comprises a
`return Screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays ownership information concerning
`who owns the computer and return information for returning
`the computer to the owner from data Stored in the memory.
`0.017. The present invention pertains to a method for
`returning a computer to its owner. The method comprises the
`Steps of activating a computer. Then there is the Step of
`displaying automatically a return Screen on a display of the
`computer during or after boot-up of the computer, which
`displays information concerning owner information about
`who owns the computer and return information for returning
`the computer to the owner from data Stored in the memory
`of the computer.
`0.018. The present invention pertains to a computer read
`able medium whose contents cause a computer to show who
`is its owner by performing the Steps of activating a com
`puter. Then there is the Step of displaying automatically a
`return Screen on a display of the computer during or after
`boot-up of the computer, which displays information con
`cerning owner information about who owns the computer
`and return information for returning the computer to the
`owner from data Stored in the memory of the computer.
`0019. The present invention pertains to a computer return
`apparatus. The apparatus comprises a processor. The appa
`ratus comprises a memory connected to the processor. The
`apparatus comprises a display. The apparatus comprises a
`return Screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays information concerning an owner who
`owns the computer, concerning user information about who
`the user is who the computer is assigned to for use, and
`
`return information for returning the computer to the owner
`from data Stored in the memory.
`0020. The present invention pertains to a method for
`displaying information to assist with returning a computer to
`its owner. The method comprises the Steps of activating a
`computer. There is the Step of displaying automatically a
`return Screen on a display of the computer during or after
`boot-up which displays information concerning owner infor
`mation about who owns the computer, concerning user
`information about who the user is who the computer is
`assigned to for use, and return information for returning the
`computer to the owner from data Stored in a memory of the
`computer.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0021. In the accompanying drawings, the preferred
`embodiment of the invention and preferred methods of
`practicing the invention are illustrated in which:
`0022 FIG. 1 is a schematic representation of the appa
`ratus of the present invention.
`0023 FIG. 2 is a representation of a return/recovery
`dialog box of an embodiment of the present invention.
`0024 FIG. 3 is a flow chart regarding an embodiment of
`the present invention.
`0025 FIG. 4 is a flow chart regarding a second embodi
`ment of the present invention.
`0026 FIG. 5 is a representation of an administration
`program Section of the present invention.
`0027 FIG. 6 is a representation of a return screen of the
`present invention.
`0028 FIG. 7 is an example of a password screen utilized
`by the present invention.
`0029 FIG. 8 is a return administration screen of the
`present invention.
`0030 FIG. 9 is a second return administration screen of
`the present invention.
`0031 FIG. 10 is a third return administration screen of
`the present invention.
`0032 FIG. 11 is a fourth return administration screen of
`the present invention.
`
`DETAILED DESCRIPTION
`0033 Referring now to the drawings wherein like refer
`ence numerals refer to Similar or identical parts throughout
`the several views, and more specifically to FIG. 1 thereof,
`there is shown a computer 12 return apparatus 10. The
`apparatus 10 comprises a processor 14. The apparatus 10
`comprises a memory 16 connected to the processor 14. The
`apparatus 10 comprises a display 18. The apparatus 10
`comprises a return Screen 20 that the processor 14 automati
`cally causes to appear during or after boot-up of the pro
`cessor 14 on the display 18, that displays ownership infor
`mation concerning who owns the computer 12 and return
`information for returning the computer 12 to the owner from
`data stored in the memory 16. The Owner is defined as the
`perSon or entity that owns, rents, or licenses the Retriever,
`and/or the perSon or entity who controls the recovery
`
`

`

`US 2005/0071670 A1
`
`Mar. 31, 2005
`
`Service. The Owner has greater control over the computer 12
`than the user. This could include, but not be limited to, an
`employee of a company that owns the computer 12, or an
`agent of the owner or a friend that has the permission of the
`owner to use or have or recover the computer 12.
`0034 Preferably, the apparatus 10 includes means for
`causing the Screen to appear on the display 18 with the
`owner and return information. The causing means 22 is
`Stored in the memory 16. The causing means 22 preferably
`is a software program 24. Preferably, the memory 16
`includes a primary operating System having an operating
`screen 26 for the computer 12, and the return screen 20
`appears on the display 18 before the operating Screen 26 of
`the operating System appears on the display 18.
`0035. The software program 24 preferably appears before
`a Security prompt Such as a password to be entered to obtain
`access to the primary operating System of the computer 12.
`Preferably, the software program 24 allows the owner to
`change the return information and the owner information,
`after the password or Security prompt is Satisfied for the
`computer 12. The Software program 24 is preferably able to
`communicate through a modem (or wireless) to a predeter
`mined location to transfer the return information to the
`location to facilitate return of the computer 12 if it becomes
`lost by the owner.
`0.036 The present invention pertains to a method for
`returning a computer 12 to its owner. The method comprises
`the Steps of activating a computer 12. Then there is the Step
`of displaying automatically a return Screen 20 on a display
`18 of the computer 12 during or after boot-up of the
`computer 12, which displays information concerning owner
`information about who owns the computer 12 and return
`information for returning the computer 12 to the owner from
`data stored in the memory 16 of the computer 12.
`0037 Preferably, the displaying step includes the step of
`displaying automatically the return Screen 20 before an
`operating Screen 26 of the primary operating System of the
`computer 12. There is preferably the Step of displaying the
`return Screen 20 before Satisfying a Security prompt Such as
`entering a password into the computer 12 to access the
`primary operating System. Preferably, there is the Step of
`changing the return information, and the owner information
`after the Step of Satisfying a Security prompt Such as entering
`the password into the computer 12.
`0.038. The present invention pertains to a computer 12
`readable medium whose contents cause a computer 12 to
`show who is its owner by performing the Steps of activating
`a computer 12. Then there is the Step of displaying auto
`matically a return screen 20 on a display 18 of the computer
`12 during or after boot-up of the computer 12, which
`displays information concerning owner information about
`who owns the computer 12 and return information for
`returning the computer 12 to the owner from data Stored in
`the memory 16 of the computer 12.
`0.039
`Preferably, the displaying step includes the step of
`displaying automatically the return Screen 20 before an
`operating Screen 26 of the primary operating System of the
`computer 12. There is preferably the Step of displaying the
`return Screen 20 before Satisfying a Security prompt Such as
`entering a password into the computer 12 to access the
`primary operating System. Preferably, there is the Step of
`
`changing the return information and the owner information
`after the Step of Satisfying a Security prompt Such as entering
`a password into the computer 12.
`0040. In the operation of the invention, first, the owner of
`the computer 12 would install the computer 12 Security
`recovery/return Software program 24 application. The pro
`gram could be installed to work on any type of computer 12
`Screen including but not limited to, PCS, laptops, handheld
`computers (Such as blackberries, palm pilots), UPS comput
`erized handheld tracking display units, and even cell phone
`displayS. The unique recovery/return computer 12 Security
`program could in fact, be installed and used by any type of
`computer 12 that utilized a monitor display Screen. The
`Software application program provides an additional layer to
`the existing operating System of each computer 12. The
`coding language used for the Software program 24 could and
`would vary depending upon the computer 12 equipment, but
`the core Structure of how the program operates would be
`Similar in all items.
`0041. Once the computer 12 security software program
`24 is installed, the monitor of the computer 12 will display
`the complete and current recovery/return information that
`the program has allowed the owner of the equipment to
`interactively enter, change and update at anytime.
`0042. This “on the fly' ability to change owner recovery
`information to aid return of equipment is an important
`feature for anyone, including college Students who travel
`from home to college during different parts of the year,
`people who move, and particularly business people who
`travel throughout the world. The recovery/return informa
`tion would not only allow the display 18 of physical address
`return information, and owner contact telephone informa
`tion, but would also provide for international internet based
`recovery through the added display 18 of owner email
`information, as well as the ability to display an international
`recovery center web site.
`0043. In addition to increasing chances of return and
`recovery of the Stolen or lost equipment by using the
`computer's 12 display 18 monitor, the program is an addi
`tional programming layer added into the initial Start up
`program of the computer 12, So that the recovery/return
`display 18 information occurs during or before a password
`or Security prompt Screen. This is an important feature that
`helps create an environment whereby the individual that
`happens upon a Stolen or lost piece of equipment will see the
`owner recovery/return information displayed before a pass
`word or Security prompt Screen. By automatically initiating
`this program during or before a user's Security prompt, Such
`as a password Screen program, the recovery/return program
`will not only increase chances of recovery, but will also
`increase chances that the computer 12 information on the
`hard drive is protected while the computer 12 is not in the
`owner's possession.
`0044) For example, the actual step by step operation of
`the program is as follows:
`0045 (1) Someone finds a lost or stolen computer 12. The
`person who finds the computer 12, turns the computer 12 on.
`0046 (The software program 24 could be provided
`with a warning Sticker that will be placed on the
`outside of the equipment telling anyone finding the
`equipment, about the program and the display recov
`ery Screen.)
`
`

`

`US 2005/0071670 A1
`
`Mar. 31, 2005
`
`0047 (2) The computer 12 display 18 screen turns on.
`The computer 12 Security Software return/recovery program
`automatically initiates during the computer's 12 boot-up
`proceSS.
`(3) As the computer 12 booting up process moves
`0.048
`the user to a password or Security prompt Screen, the
`computer 12 Security Software program 24 displays a dialog
`box which includes owner recovery and return information,
`So that the perSon finding the equipment can return the
`equipment either directly or through the international web
`Site recovery center. The information Screen can include any
`of the following items of information that the owner would
`like displayed including but not limited to: contact name,
`organization name, owner address, owner telephone number,
`owner email, international web site recovery site, interna
`tional recovery email information, unique program Serial/
`registration number. (See FIG. 2).
`0049 Virtually all of this information would have
`been interactively inputted by the owner, and the
`owner would have control over how much recovery
`information is displayed. (This is important, because
`Some owners would like all the available information
`displayed, and others would not. For example, a U.S.
`Secret Service agent, accountant, or military perSon
`nel, might only want his name and phone number
`displayed, and would not like the organization name
`displayed for fear that would encourage a thief to try
`harder to break into the system rather than return the
`equipment.)
`0050 (4) The individual who has found the lost or stolen
`computer 12, is now able to easily return the equipment to
`the rightful owner. Because the display 18 Screen showing
`the owner information is before, or during a password or
`Security prompt Screen that occurs before allowing the user
`to access the full operating System, the perSon recovering the
`equipment is blocked by the password or Security prompt
`Screen from accessing the data, and is unable to avoid Seeing
`the recovery information Screen.
`0051. It is important to note only that the computer 12
`Security Software recovery/return program be displayed on
`the computer 12 Screen monitor before, or during a password
`or Security prompt display Screen, because the operating
`System password Screen creates a wall before taking the
`computer 12 user to the computer 12 operating System. (See
`FIG.3). This helps not only protect the owner's information
`on the hard drive, but also ensures that the person finding the
`equipment will see the owner recovery/return information. If
`the program initiated after the password or Security prompt
`Screen, the person finding the lost or Stolen equipment would
`have difficulty ever seeing the recovery/return display 20.
`0.052
`It is also important to note that even through the
`recovery Screen dialog box would ideally be the first Screen,
`this may not be possible due to the wide variety of software
`operating Systems used by computer 12 Systems. Each
`computer 12 Security program will attempt to display the
`recovery information on the initial Screen when possible.
`
`However, for one of the Window operating systems for
`example, the first boot-up default screen is a CTR-ALT+
`DEL Screen, and then the program can move to a password
`Screen. In this case, the recovery/return program could
`provide a display 18 dialog Screen that would be an addi
`tional layer between the CTR-ALT+DEL dialog box and the
`password dialog box. (See FIG. 4). Other operating systems
`could allow the program to display the recovery dialog box,
`with the password or security prompt at the bottom of the
`dialog box (So that even though the recovery dialog appli
`cation is an additional layer during the boot-up, it would
`appear that the password or Security prompt is included
`within the same dialog box). (See FIGS. 2 and 3). The
`recovery dialog box would occur before or during the
`password or Security dialog box that blocks the user from
`accessing the operating System.
`0053) Operation Administration Feature:
`0054 The computer 12 security software recovery/return
`program would also include an administration Section to the
`program through hard drive or remote. The operation of the
`administration Section features could work like th

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket