`
`US 2005.0071670A1
`
`(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2005/0071670 A1
`Hafeman
`(43) Pub. Date:
`Mar. 31, 2005
`
`(54) COMPUTER RECOVERY OR RETURN
`(76) Inventor: Carolyn W. Hafeman, Evergreen, CO
`(US)
`Correspondence Address:
`Ansel M. Schwartz
`Attorney at Law
`Suite 304
`201 N. Craig Street
`Pittsburgh, PA 15213 (US)
`
`(21) Appl. No.:
`(22) Filed:
`
`10/945,332
`Sep. 20, 2004
`
`Related U.S. Application Data
`(63) Continuation-in-part of application No. 10/304.827,
`filed on Nov. 25, 2002, now abandoned.
`
`Publication Classification
`(51) Int. Cl." ....................................................... H04L 9/00
`(52) U.S. Cl. .............................................................. 713/200
`
`(57)
`
`ABSTRACT
`
`A computer return apparatus includes a processor. The
`apparatus includes a memory connected to the processor.
`The apparatus includes a display. The apparatus includes a
`return Screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays information concerning an owner who
`owns the computer, concerning user information about who
`the user is who the computer is assigned to for use, and
`return information for returning the computer to the owner
`from data Stored in the memory. A method for displaying
`information to assist with returning a computer to its owner.
`
`Turn Computer
`On
`
`
`
`Recovery / Return
`Dialog Box appears On
`monitor's display screen.
`(Occurs before or with
`Password or Security
`Prompt: Dialog Box)
`
`
`
`
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`(Can appear as a screen after the Recovery / Return Dialog box or preferably at the
`bottom of the Recovery/Return Dialog Box as in Sample 1 above)
`OK)
`SHUTDOWN)
`
`User enters computer
`operating system to access
`programs and information.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Windows or Other Operating System Standard
`Shutdown Computer Screen
`() Shutdown
`() Shutdown and Reboot
`OK
`(Shuts down
`computer)
`
`(CANCEL)
`(Returns back to
`previous screen)
`|----------------se
`Back up to previous Screen.
`
`EX-1011
`US Patent 10,789,393
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 1 of 10
`
`US 2005/0071670 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`PRIMARY
`OPERATING
`SYSTEM
`
`
`
`
`
`RETURN
`SCREEN
`
`OPERATING
`SCREEN ||
`
`20
`
`26
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 2 of 10
`
`US 2005/0071670 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Workstation Locked
`The Retriever by WorldsecurityCorp.com
`Picture
`The workstation has been locked. This equipment is protected
`Red Stop
`Sign, 'Chile agains her by the World Security Corp. Hernational
`word STOP
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost Or stolen equipment.
`
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW:
`Recovery Name/(input from database / required)
`Organization Name / ABC Corp/ input/ not required
`Address 1 / input from database / not required)
`Address 2 / input from database / not required
`City State Zip / all of these input from database / not required
`Phone 1 / input from database / requiredPhone 2 / not required)
`Email / input from database / requiredFox / not required
`OR VISIT
`www.worldsecurityCorp.com/loslandfound.html.
`Picture
`Retriever Logo Email: lostondfoundeworldsecurityCorp.com
`Phone : 1-800-xxx-xxxx
`Registration f : XXXXXXXXXXXXXXXX (sequential number unique to each
`Softwore license
`
`User:
`
`Password:
`
`(OK)
`(moves user to operating system with
`correct possword)
`
`
`
`(SHUTDOWN)
`(initiates operating system
`shutdown)
`
`FIG.2
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 3 of 10
`
`US 2005/0071670 A1
`
`Turn Computer .
`On
`
`
`
`Recovery / Return
`Dialog Box appears On
`monitor's display screen.
`(0ccurs before or with
`Password or Security
`Prompt: Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`(Can appear as a screen after the Recovery / Return Dialog box or preferably at the
`bottom of the Recovery/Return Dialog Box OS in Sample 1 above)
`(SHUTDOWN
`OK
`
`User enters computer
`Operoting system to access
`programs and information.
`
`
`
`Windows or Other Operating System Standard
`Shutdown Computer Screen
`(*) Shutdown
`( ) Shutdown and Reboot
`OK
`(Shuts down
`Computer)
`
`(CNCE)
`(Returns back to
`previous screen)
`|----------------s
`Back up to previous Screen.
`
`FIG 3
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 4 of 10
`
`US 2005/0071670 A1
`
`Turn Computer
`On
`
`Picture
`Windows hand
`with key
`
`
`
`
`
`
`
`
`
`Press CTRL + ALT + DEL to Logon.
`C 2002-200 World Computer Security Corp
`Distribuited by www.worldsecurityCorp.com
`Telephone : (503) 670-8800
`
`
`
`Picture
`Retriever Logo
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Recovery/Return
`Dialog Box appears On
`monitor's display screen.
`(0ccurs before or with
`possword or Security
`Prompt Dialog Box)
`
`Computer Password or
`Security Dialog Box Prompt
`Screen
`(Con appear as a screen after the
`Recovery/Return Dialog box or
`preferably at the bottom of the
`Recovery/Return Dialog Box)
`FIG.4
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 5 of 10
`
`US 2005/0071670 A1
`
`Computer Monitor Screen
`at Operating System Screen
`
`MS Word X
`MS Excel X
`Programs x Administration Section >
`Find X
`DVD Player >
`Help >
`Etc... X
`Run X
`
`START
`
`FIG 5
`
`
`
`Windows logon
`Picture
`Keys
`
`Picture
`Retriever Logo
`
`OK
`
`Enter a valid user name and password to logon to his
`system :
`
`User:
`Possword:
`
`(SHUTDOWN)
`
`(CANCEL)
`FIC 7
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 6 of 10
`
`US 2005/0071670 A1
`
`Workstotion Ocked
`
`The Retriever by WorldsecurityCorD.Com
`Picture
`Red SP, The workstation has been locked. This equipment is protected
`Sign w/white against theft by the World Security Corp. International
`Word STOP
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment.
`
`To indentify Rightful Owner & Avoid Prosecution CALL NOW :
`Recovery Name/(input from database / required)
`Organization Name / ABC Corp/ input/ not required
`Address 1 / input from database / not required
`Address 2 / input from database / not required
`City State Zip / all of these input from database / not required
`Phone 1 / input from database / requiredPhone 2 / not required
`Email / input from database / required Fox / not required
`OR VISIT
`www.worldsecurityCorp.com/lostondfound.html
`Picture
`Retriever Logo Email : loslandfound0 worldsecurityCorp.com
`PhOne : 1-800-XXX-XXXX
`
`Registration f : XXXXXXXXXXXXXXXX
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`SHUTDOWN)
`
`CANCEL
`
`FIG.6
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 7 of 10
`
`US 2005/0071670 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ø?) goelas MO
`
`
`
`|?yon, swael M3NMO EÐNVH2
`
`
`
`
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 8 of 10
`
`US 2005/0071670 A1
`
`ideaMeT puerue?/xa/pºpayoud sy pue sue addy :auau?uedou
`
`
`
`?io:Mouo?sues xº/papa?aud si puesteºddy : ou p?ubissw
`
`
`
`
`
`
`
`
`
`
`
`. , CI MONASSVd.O.L. CIENSDISSSV HØN\/HO.
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 9 of 10
`
`US 2005/0071670 A1
`
`
`
`Stop Sign
`
`The RETRIEVER from World Security C
`Enter a valid user name arid password to log on to this system.
`
`Sign On
`
`Name:
`
`- Password:
`
`PRESS. - 9
`
`CANCEL |
`
`SHUTDOWN
`
`This equipment is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theft, protect information and recover lost or stolen equipment.
`to Scientity Rightful Owner, Ccilee: Resyard & Aveig Prosecessie, CAEL NOW :
`fy seaso:
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-234
`it admin?aabccorp.com
`
`Assigiet "o:
`
`Carrie Hafeman
`303-670-8800
`lightguardian?ansn.com
`
`-
`
`Distributed by
`D SPAC
`safala -
`
`eR WISET
`Web Site :
`Email :
`Phone :
`
`www.worldsecuritycord.com lostandfound/html
`lostandfoundalworldsecurity corp.com
`1-800-xxx-xxxx
`
`The Retrieyer
`
`Registration #: XXXXXXXXXXXXXXXXXXxxxx
`
`
`
`- G- O
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 10 of 10
`
`US 2005/0071670 A1
`
`Workstation Locked
`
`Stop Sign)
`
`The RETRIEVER from World Security Corp
`Enter a valid user name and password to log on to this system.
`
`Name:
`
`Sign. On
`press: - 9
`O
`
`Correct PW
`Incorrect P
`
`Password: |
`
`cANCEL
`
`SHUTDOWN
`HUTDOWN
`
`This equipment is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retriever Program has been installed to help
`... stop theft, protect information and recover lost or stolen equipment.
`To destify Rightful Owater, Collect Reward & Avoid Prosecution CA ill NOW:
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1234
`it admin?aabccorp.com
`
`AD SPAC
`
`SSS
`
`is s
`
`:
`
`Carrie Hafeman
`303-670-8800
`lightguardian?a.msn.com
`
`AD SPAC
`
`Distributed b
`y
`
`
`
`CGr WiS'
`Web Site:
`Email :
`Phone :
`
`www.worldsecurity corp.com/iostandfound/html
`lostandfound(a worldsecurity corp.com
`1-800-xxx-xxxx
`
`The Retriever
`
`
`
`Registration fi : xxxxxxxxxxxxxxxxxxxxxx
`
`
`
`US 2005/0071670 A1
`
`Mar. 31, 2005
`
`COMPUTER RECOVERY OR RETURN
`
`FIELD OF THE INVENTION
`0001. The present invention is related to the return of lost
`or Stolen computers. More Specifically, the present invention
`is related to the return of lost or Stolen computers using a
`recovery Screen that appears during or after boot-up of the
`computer.
`
`BACKGROUND OF THE INVENTION
`0002 Current methods of computer return or recovery
`products include:
`0003) (1) Physical Labels that Attach to the Outside
`Hardware of the Computer Equipment.
`0004. These hardware labels can contain custom
`recovery information, but because they are hardware
`based, they can not be interactively changed by the
`OWC.
`0005 Also, since they do not have any ability to affect the
`computer boot-up process, they can do nothing to help
`protect the confidential owner information on the hard drive.
`An example of a well known physical hardware/recovery
`label is the STOP Tag by Security Tracking of Office
`Property in Connecticut. This labeling system has been
`patented in France, the US, and other countries. The product
`can be easily defeated by removing the physical label. In the
`case of STOP Tag which includes a “recovery mark which
`states “STOLEN PROPERTY' underneath the label, a new
`label can be simply added over the recovery mark to hide
`the STOLEN PROPERTY sign. (The Security Tracking of
`Office Property equipment recovery is U.S. Pat. No. 5,163,
`711 This patent actually refers to how the labels adhere to
`the equipment-but this is their patent).
`0006 The computer security recovery/return pro
`gram of the present invention utilizes this type of
`hardware recovery approach to a Small degree, but is
`greatly different from this System, because this is a
`Software program rather than a hardware Solution.
`Additionally, the present invention is greatly Supe
`rior, Since the owner can interactively customize the
`return/recovery information displayed at any time,
`and the present invention also helps protect the
`important, confidential owner information on the
`hard drive, by the positioning of the program layer in
`the equipment boot-up process.
`0007 (2) Computer Software Programs that Attempt
`Recovery Through the Use of the Modem.
`0008. There are several patented computer security
`Software products on the market today that are
`designed for the purpose of recovering lost or Stolen
`equipment. These programs use the computer's
`modem to regularly call a recovery center. Then once
`a computer is Stolen, the recovery center waits for the
`stolen computer to call in. When the computer
`modem calls in, the recovery centers use Something
`Similar to the reverse 911 System to get the phone
`number that the Stolen equipment is accessing. Using
`the phone number, the recovery System then can try
`to get a map of where the computer is. Some of these
`computer Security recovery programs can also
`
`attempt to locate Stolen computers through an IP
`address. Some of these computer Security recovery
`Software programs, can actually attempt to Seize the
`communication between the Stolen computer and the
`recovery center and delete Selected files to help
`protect the owner's confidential information. Prod
`ucts like these include CompuTrace, PC Phone
`Home, Cyber Angel, LapTrak and Luceria.
`0009. The present invention is also designed for the
`purpose of recovering lost or Stolen equipment, but
`the method is distinctively different and unique from
`the current methods. The present invention does not
`rely on the use of the computer modem. The present
`invention uses a layered program in the boot-up
`process to provide a display of the proper owner
`recovery and return information using the comput
`er's own monitor or Screen. The present invention is
`also different and Superior to the above software
`tracking products, in helping to accomplish interna
`tional recovery. None of the above products to date
`have been able to use the modem phone or IP system
`to track Stolen equipment internationally. The
`present invention provides international recovery by
`displaying owner email information as well as pro
`Viding recovery help through an international recov
`ery internet web site.
`0010) There are other differences as well in how
`these programs try to also protect the information on
`the hard drive. The present invention automatically
`initiates during the boot-up process of the equip
`ment, in order to display the recovery/return infor
`mation before a Security prompt Screen to always
`help protect the owner's confidential information on
`the hard drive. Some of the programs above do
`nothing to protect the user information. Others like
`LapTrak include a Hide-A-File feature that an owner
`can access after the user enters the operating System.
`Cyber Angel includes an encryption feature. Luceria
`includes the ability to delete pre-selected files from
`the recovery center. By layering this computer Secu
`rity application Strategically before or during a Secu
`rity prompt in the boot-up process, this application
`provides a unique and different method to help
`protect owner information.
`0.011
`(An
`ple of p
`for th
`yp
`f
`eXample Of patentS Or theSe tVDeS O
`products would be the CompuTrace U.S. Pat. Nos.
`5,715,174, 5,764,892, and 5,802.280).
`0012 (3) Bios Based Password Identification Systems.
`0013 There are some computers that are sold with
`Bios based identification systems included. These
`products activate immediately when a computer is
`turned on, and prompt the user for a password before
`accessing the data on the computer.
`0014. The present invention is very different and
`unique from the BioS based program, for many
`reasons. Most importantly the bios based password
`identification products are built into the hardware of
`the computer equipment-not the hard drive. In
`other words, if you removed the hard drive from a
`Stolen or lost laptop, and inserted the Stolen hard
`drive into a different laptop, you would bypass the
`
`
`
`US 2005/0071670 A1
`
`Mar. 31, 2005
`
`bios based password identification System, and the
`bios based password identification System would
`remain with the original equipment. Thus, the BioS
`Based Password Identification system can identify
`the computer hardware, but not the hard drive (the
`most important part of the computer equipment).
`0015. In addition, the Bios Based Password Identi
`fication Systems are designed as a unique method for
`providing an additional layer of password protection
`to the equipment hardware, but are not designed for
`recovery or return. There is no design for including
`complete owner information, no recovery informa
`tion displayed, no effective protection of the infor
`mation on the hard drive, no effective method for the
`recovery or return of the hard drive-the most
`important item that a consumer would want back. In
`fact the Bios Password Identification product occurs
`before allowing the hard drive to boot up. The
`present invention is unique because it is an -appli
`cation Software program that provides its layer of
`protection during the boot-up process (not before),
`and thus allows the security product to move with the
`hard drive, the most critical part of the computer.
`
`SUMMARY OF THE INVENTION
`0016. The present invention pertains to a computer return
`apparatus. The apparatus comprises a processor. The appa
`ratus comprises a memory connected to the processor. The
`apparatus comprises a display. The apparatus comprises a
`return Screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays ownership information concerning
`who owns the computer and return information for returning
`the computer to the owner from data Stored in the memory.
`0.017. The present invention pertains to a method for
`returning a computer to its owner. The method comprises the
`Steps of activating a computer. Then there is the Step of
`displaying automatically a return Screen on a display of the
`computer during or after boot-up of the computer, which
`displays information concerning owner information about
`who owns the computer and return information for returning
`the computer to the owner from data Stored in the memory
`of the computer.
`0.018. The present invention pertains to a computer read
`able medium whose contents cause a computer to show who
`is its owner by performing the Steps of activating a com
`puter. Then there is the Step of displaying automatically a
`return Screen on a display of the computer during or after
`boot-up of the computer, which displays information con
`cerning owner information about who owns the computer
`and return information for returning the computer to the
`owner from data Stored in the memory of the computer.
`0019. The present invention pertains to a computer return
`apparatus. The apparatus comprises a processor. The appa
`ratus comprises a memory connected to the processor. The
`apparatus comprises a display. The apparatus comprises a
`return Screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays information concerning an owner who
`owns the computer, concerning user information about who
`the user is who the computer is assigned to for use, and
`
`return information for returning the computer to the owner
`from data Stored in the memory.
`0020. The present invention pertains to a method for
`displaying information to assist with returning a computer to
`its owner. The method comprises the Steps of activating a
`computer. There is the Step of displaying automatically a
`return Screen on a display of the computer during or after
`boot-up which displays information concerning owner infor
`mation about who owns the computer, concerning user
`information about who the user is who the computer is
`assigned to for use, and return information for returning the
`computer to the owner from data Stored in a memory of the
`computer.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0021. In the accompanying drawings, the preferred
`embodiment of the invention and preferred methods of
`practicing the invention are illustrated in which:
`0022 FIG. 1 is a schematic representation of the appa
`ratus of the present invention.
`0023 FIG. 2 is a representation of a return/recovery
`dialog box of an embodiment of the present invention.
`0024 FIG. 3 is a flow chart regarding an embodiment of
`the present invention.
`0025 FIG. 4 is a flow chart regarding a second embodi
`ment of the present invention.
`0026 FIG. 5 is a representation of an administration
`program Section of the present invention.
`0027 FIG. 6 is a representation of a return screen of the
`present invention.
`0028 FIG. 7 is an example of a password screen utilized
`by the present invention.
`0029 FIG. 8 is a return administration screen of the
`present invention.
`0030 FIG. 9 is a second return administration screen of
`the present invention.
`0031 FIG. 10 is a third return administration screen of
`the present invention.
`0032 FIG. 11 is a fourth return administration screen of
`the present invention.
`
`DETAILED DESCRIPTION
`0033 Referring now to the drawings wherein like refer
`ence numerals refer to Similar or identical parts throughout
`the several views, and more specifically to FIG. 1 thereof,
`there is shown a computer 12 return apparatus 10. The
`apparatus 10 comprises a processor 14. The apparatus 10
`comprises a memory 16 connected to the processor 14. The
`apparatus 10 comprises a display 18. The apparatus 10
`comprises a return Screen 20 that the processor 14 automati
`cally causes to appear during or after boot-up of the pro
`cessor 14 on the display 18, that displays ownership infor
`mation concerning who owns the computer 12 and return
`information for returning the computer 12 to the owner from
`data stored in the memory 16. The Owner is defined as the
`perSon or entity that owns, rents, or licenses the Retriever,
`and/or the perSon or entity who controls the recovery
`
`
`
`US 2005/0071670 A1
`
`Mar. 31, 2005
`
`Service. The Owner has greater control over the computer 12
`than the user. This could include, but not be limited to, an
`employee of a company that owns the computer 12, or an
`agent of the owner or a friend that has the permission of the
`owner to use or have or recover the computer 12.
`0034 Preferably, the apparatus 10 includes means for
`causing the Screen to appear on the display 18 with the
`owner and return information. The causing means 22 is
`Stored in the memory 16. The causing means 22 preferably
`is a software program 24. Preferably, the memory 16
`includes a primary operating System having an operating
`screen 26 for the computer 12, and the return screen 20
`appears on the display 18 before the operating Screen 26 of
`the operating System appears on the display 18.
`0035. The software program 24 preferably appears before
`a Security prompt Such as a password to be entered to obtain
`access to the primary operating System of the computer 12.
`Preferably, the software program 24 allows the owner to
`change the return information and the owner information,
`after the password or Security prompt is Satisfied for the
`computer 12. The Software program 24 is preferably able to
`communicate through a modem (or wireless) to a predeter
`mined location to transfer the return information to the
`location to facilitate return of the computer 12 if it becomes
`lost by the owner.
`0.036 The present invention pertains to a method for
`returning a computer 12 to its owner. The method comprises
`the Steps of activating a computer 12. Then there is the Step
`of displaying automatically a return Screen 20 on a display
`18 of the computer 12 during or after boot-up of the
`computer 12, which displays information concerning owner
`information about who owns the computer 12 and return
`information for returning the computer 12 to the owner from
`data stored in the memory 16 of the computer 12.
`0037 Preferably, the displaying step includes the step of
`displaying automatically the return Screen 20 before an
`operating Screen 26 of the primary operating System of the
`computer 12. There is preferably the Step of displaying the
`return Screen 20 before Satisfying a Security prompt Such as
`entering a password into the computer 12 to access the
`primary operating System. Preferably, there is the Step of
`changing the return information, and the owner information
`after the Step of Satisfying a Security prompt Such as entering
`the password into the computer 12.
`0.038. The present invention pertains to a computer 12
`readable medium whose contents cause a computer 12 to
`show who is its owner by performing the Steps of activating
`a computer 12. Then there is the Step of displaying auto
`matically a return screen 20 on a display 18 of the computer
`12 during or after boot-up of the computer 12, which
`displays information concerning owner information about
`who owns the computer 12 and return information for
`returning the computer 12 to the owner from data Stored in
`the memory 16 of the computer 12.
`0.039
`Preferably, the displaying step includes the step of
`displaying automatically the return Screen 20 before an
`operating Screen 26 of the primary operating System of the
`computer 12. There is preferably the Step of displaying the
`return Screen 20 before Satisfying a Security prompt Such as
`entering a password into the computer 12 to access the
`primary operating System. Preferably, there is the Step of
`
`changing the return information and the owner information
`after the Step of Satisfying a Security prompt Such as entering
`a password into the computer 12.
`0040. In the operation of the invention, first, the owner of
`the computer 12 would install the computer 12 Security
`recovery/return Software program 24 application. The pro
`gram could be installed to work on any type of computer 12
`Screen including but not limited to, PCS, laptops, handheld
`computers (Such as blackberries, palm pilots), UPS comput
`erized handheld tracking display units, and even cell phone
`displayS. The unique recovery/return computer 12 Security
`program could in fact, be installed and used by any type of
`computer 12 that utilized a monitor display Screen. The
`Software application program provides an additional layer to
`the existing operating System of each computer 12. The
`coding language used for the Software program 24 could and
`would vary depending upon the computer 12 equipment, but
`the core Structure of how the program operates would be
`Similar in all items.
`0041. Once the computer 12 security software program
`24 is installed, the monitor of the computer 12 will display
`the complete and current recovery/return information that
`the program has allowed the owner of the equipment to
`interactively enter, change and update at anytime.
`0042. This “on the fly' ability to change owner recovery
`information to aid return of equipment is an important
`feature for anyone, including college Students who travel
`from home to college during different parts of the year,
`people who move, and particularly business people who
`travel throughout the world. The recovery/return informa
`tion would not only allow the display 18 of physical address
`return information, and owner contact telephone informa
`tion, but would also provide for international internet based
`recovery through the added display 18 of owner email
`information, as well as the ability to display an international
`recovery center web site.
`0043. In addition to increasing chances of return and
`recovery of the Stolen or lost equipment by using the
`computer's 12 display 18 monitor, the program is an addi
`tional programming layer added into the initial Start up
`program of the computer 12, So that the recovery/return
`display 18 information occurs during or before a password
`or Security prompt Screen. This is an important feature that
`helps create an environment whereby the individual that
`happens upon a Stolen or lost piece of equipment will see the
`owner recovery/return information displayed before a pass
`word or Security prompt Screen. By automatically initiating
`this program during or before a user's Security prompt, Such
`as a password Screen program, the recovery/return program
`will not only increase chances of recovery, but will also
`increase chances that the computer 12 information on the
`hard drive is protected while the computer 12 is not in the
`owner's possession.
`0044) For example, the actual step by step operation of
`the program is as follows:
`0045 (1) Someone finds a lost or stolen computer 12. The
`person who finds the computer 12, turns the computer 12 on.
`0046 (The software program 24 could be provided
`with a warning Sticker that will be placed on the
`outside of the equipment telling anyone finding the
`equipment, about the program and the display recov
`ery Screen.)
`
`
`
`US 2005/0071670 A1
`
`Mar. 31, 2005
`
`0047 (2) The computer 12 display 18 screen turns on.
`The computer 12 Security Software return/recovery program
`automatically initiates during the computer's 12 boot-up
`proceSS.
`(3) As the computer 12 booting up process moves
`0.048
`the user to a password or Security prompt Screen, the
`computer 12 Security Software program 24 displays a dialog
`box which includes owner recovery and return information,
`So that the perSon finding the equipment can return the
`equipment either directly or through the international web
`Site recovery center. The information Screen can include any
`of the following items of information that the owner would
`like displayed including but not limited to: contact name,
`organization name, owner address, owner telephone number,
`owner email, international web site recovery site, interna
`tional recovery email information, unique program Serial/
`registration number. (See FIG. 2).
`0049 Virtually all of this information would have
`been interactively inputted by the owner, and the
`owner would have control over how much recovery
`information is displayed. (This is important, because
`Some owners would like all the available information
`displayed, and others would not. For example, a U.S.
`Secret Service agent, accountant, or military perSon
`nel, might only want his name and phone number
`displayed, and would not like the organization name
`displayed for fear that would encourage a thief to try
`harder to break into the system rather than return the
`equipment.)
`0050 (4) The individual who has found the lost or stolen
`computer 12, is now able to easily return the equipment to
`the rightful owner. Because the display 18 Screen showing
`the owner information is before, or during a password or
`Security prompt Screen that occurs before allowing the user
`to access the full operating System, the perSon recovering the
`equipment is blocked by the password or Security prompt
`Screen from accessing the data, and is unable to avoid Seeing
`the recovery information Screen.
`0051. It is important to note only that the computer 12
`Security Software recovery/return program be displayed on
`the computer 12 Screen monitor before, or during a password
`or Security prompt display Screen, because the operating
`System password Screen creates a wall before taking the
`computer 12 user to the computer 12 operating System. (See
`FIG.3). This helps not only protect the owner's information
`on the hard drive, but also ensures that the person finding the
`equipment will see the owner recovery/return information. If
`the program initiated after the password or Security prompt
`Screen, the person finding the lost or Stolen equipment would
`have difficulty ever seeing the recovery/return display 20.
`0.052
`It is also important to note that even through the
`recovery Screen dialog box would ideally be the first Screen,
`this may not be possible due to the wide variety of software
`operating Systems used by computer 12 Systems. Each
`computer 12 Security program will attempt to display the
`recovery information on the initial Screen when possible.
`
`However, for one of the Window operating systems for
`example, the first boot-up default screen is a CTR-ALT+
`DEL Screen, and then the program can move to a password
`Screen. In this case, the recovery/return program could
`provide a display 18 dialog Screen that would be an addi
`tional layer between the CTR-ALT+DEL dialog box and the
`password dialog box. (See FIG. 4). Other operating systems
`could allow the program to display the recovery dialog box,
`with the password or security prompt at the bottom of the
`dialog box (So that even though the recovery dialog appli
`cation is an additional layer during the boot-up, it would
`appear that the password or Security prompt is included
`within the same dialog box). (See FIGS. 2 and 3). The
`recovery dialog box would occur before or during the
`password or Security dialog box that blocks the user from
`accessing the operating System.
`0053) Operation Administration Feature:
`0054 The computer 12 security software recovery/return
`program would also include an administration Section to the
`program through hard drive or remote. The operation of the
`administration Section features could work like th