`US 20050071670Al
`
`(19) United States
`(12) Patent Application Publication
`Hafeman
`
`(10) Pub. No.: US 2005/0071670 Al
`Mar. 31, 2005
`(43) Pub. Date:
`
`(54) COMPUTER RECOVERY OR RETURN
`
`Publication Classification
`
`(76)
`
`Inventor: Carolyn W. Hafeman, Evergreen, CO
`(US)
`
`Int. Cl.7 ....................................................... H04L 9/00
`(51)
`(52) U.S. Cl. .............................................................. 713/200
`
`Correspondence Address:
`Ansel M. Schwartz
`Attorney at Law
`Suite 304
`201 N. Craig Street
`Pittsburgh, PA 15213 (US)
`
`(21)
`
`Appl. No.:
`
`10/945,332
`
`(22)
`
`Filed:
`
`Sep.20,2004
`
`Related U.S. Application Data
`
`(63)
`
`Continuation-in-part of application No. 10/304,827,
`filed on Nov. 25, 2002, now abandoned.
`
`(57)
`
`ABSTRACT
`
`A computer return apparatus includes a processor. The
`apparatus includes a memory connected to the processor.
`The apparatus includes a display. The apparatus includes a
`return screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays information concerning an owner who
`owns the computer, concerning user information about who
`the user is who the computer is assigned to for use, and
`return information for returning the computer to the owner
`from data stored in the memory. A method for displaying
`information to assist with returning a computer to its owner.
`
`Turn Computer
`On
`
`Recovery / Return
`Dialog Box appears on
`monitor's display screen.
`
`(Occurs before or with
`Password or Security
`Prompt : Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`
`( Can appear as a screen after the Recovery / Return Dialog box or preferably al the
`bottom of the Recovery /Return Dialog Bax as in Sample 1 above)
`
`(OK]
`
`(SHUTDOWN]
`
`User enters computer
`operating system lo access
`programs and information.
`
`Windows or Other Operating System Standard
`Shutdown Computer Screen
`(*) Shutdown
`( ) Shutdown and Reboot
`
`[OK]
`
`(Shuts down
`computer)
`
`[CANCEL]
`
`(Returns back lo _
`previous screen)
`
`1----------------►
`Back up to previous screen.
`
`EX-1016
`US Patent 10,789,393
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 1 of 10
`
`US 2005/0071670 Al
`
`ll
`"Y
`
`14
`
`PROCESSOR
`
`-------~----
`
`24
`
`CAUSING
`MEANS
`
`SOFTWARE
`PROGRAM·
`
`PRIMARY
`OPERATING
`SYSTEM
`
`FIG.1
`
`18
`
`20
`
`26
`
`DISPLAY
`
`RETURN
`SCREEN
`
`OPERATING
`SCREEN·
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 2 of 10
`
`US 2005/0071670 Al
`
`Workstation Locked
`
`[Picture]
`Red Stop
`Sign w/white
`word STOP
`
`The Retriever by WorldsecurityCorp.com
`The workstation has been locked. This equipment is protected
`against theft by the World Security Corp. International
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment.
`
`To lndentify Rightful Owner & Avoid Prosecution CALL NOW :
`
`[Recovery Name/(input from database / required)]
`[Organization Name / ABC Corp/ input/ not required]
`[ Address 1 / input from database / not required]
`[ Address 2 / input from database / not required]
`[City] [State] [Zip / all of these input from database/ not required
`[Phone 1 / input from database / required][Phone 2 / not required]
`[Email / input from database / required](Fax / not required]
`OR VISIT
`www.worldsecuritycorp.com/lostandfound.html .
`[Picture]
`Retriever Logo Email : lostandfound@worldsecuritycorp.com
`Phone : 1-800-xxx-xxxx
`
`Registration H : xxxxxxxxxxxxxxxx (sequential number unique to each
`software license
`
`User :
`
`[ _ _ _ _ _ _ ]
`
`Password :
`
`[
`
`]
`
`[OK]
`(moves user to operating system with
`correct password)
`
`(SHUTDOWN]
`(initiates operating system
`shutdown)
`
`FIG.2
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 3 of 10
`
`US 2005/0071670 Al
`
`Turn Computer .
`On
`
`Recovery / Return
`Dialog Bo){ appears on
`monitor's display screen.
`
`( Occurs before or with
`Password or Security
`Prompt : Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`
`(Can appear as a screen. after the Recovery / Return Dialog box or preferably at the
`bottom of the Recovery /Return Dialog Box as in Sample 1 above)
`
`(OK]
`
`[SHUTDOWN]
`
`User enters computer
`operating system to access
`programs and information.
`
`Windows or Other· Operating System· Standard
`Shutdown Computer Screen
`{*) Shutdown
`( ) Shutdown and Reboot
`
`[OK]
`
`(Shuts down
`computer)
`
`(CANCEL]
`
`(Returns back to _
`previous screen)
`
`1----------------►
`Back up to previous screen.
`
`FIG.3
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 4 of 10
`
`US 2005/0071670 Al
`
`Turn Computer
`On
`
`Welcome
`
`[Picture]
`Windows hand
`with key
`
`Press [CTRL + ALT + DEL] to Logan_.
`C 2002-200_ World Computer Security Corp
`Distribuited by· www.worldsecuritycorp.com
`Telephone : (303) 670-8800
`
`[Picture]
`Retriever Logo
`
`Recovery /Return
`Dialog Box appears on
`monitor's display screen.
`
`(Occurs before or with
`password or Security
`Prompt Dialog Box)
`
`Computer Password or
`Security Dialog Box Prompt
`Screen
`
`( Can appear as a screen after the
`Recovery /Return Dialog box or
`preferably at the bottom of the
`Recovery /Return Dialog Box)
`
`FIG.4
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 5 of 10
`
`US 2005/0071670 Al
`
`Computer Monitor Screen
`at Operating System Screen
`
`MS Word >
`MS Excel >
`Administration Section >
`DVD Player >
`Etc ... >
`
`Programs >
`Find >
`Help >
`Run >
`
`START
`
`FIG.5
`
`Windows Logon
`
`[Picture]
`Keys
`
`[Picture]
`Retriever Logo
`
`[OK]
`
`Enter a valid user name and password to logon to this
`system :
`
`User :
`
`Password :
`
`[SHUTDOWN]
`
`[CANCEL]
`
`FJG.7
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 6 of 10
`
`US 2005/0071670 Al
`
`Workstation Locked
`
`[Picture]
`Red Stop
`Sign w/white
`word STOP
`
`The Retriever by WorldsecurityCorp.com
`The workstation has been locked. This equipment is protected
`against theft by the World Security Corp. International
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment.
`
`To lndentify Rightful Owner & Avoid Prosecution CALL NOW :
`
`[Recovery Name/(input from database / required)]
`[Organization Name / ABC Corp/ input/ not required]
`[ Address 1 / input from database / not required]
`[Address 2 / input from database / not required]
`[City] [State] [Zip / all of these input from database / not required
`[Phone 1 · / input from database / required][Phone 2 / not required]
`[Email / input from database / required][Fax / not required]
`OR· VISIT
`www.worldsecuritycorp.com/lostandfound.html
`[Picture]
`Retriever Logo Email : lostandfound@worldsecuritycorp.com
`Phone: 1-800-xxx-xxxx
`
`Registration # : xxxxxxxxxxxxxxxx
`
`PRESS
`
`[OK]
`
`(CANCEL]
`
`[SHUTDOWN]
`
`FIG.6
`
`
`
`FlG- 9
`The Retriever Owner Administration
`
`Last Login: Date, Time, Tim_e Zone/ ex. Oct 27, 200314:41 MST
`Customer # : Appears and is protected/ ex. 54658693
`
`1 Loo~C>ff .•
`
`Logo
`
`Select Registration # for
`global or single update :
`
`CT]
`
`OR select the
`
`Sd1:cl Scroll
`
`Edit.All/ Global Edit---------------------- --0
`I 00012345 ---Assigned Tu------Dept-------O
`l 00012346 ---Assigned To------Dcpt ------0
`I Browse List View
`
`button to see entire list.
`
`. =7
`I · Edit Record
`I
`I Cancel
`I
`I Update / Save
`I Clear All Fields ·7
`Reported
`,-1-,-Re~p-o_rt_L_o_st--,i~st-.o-,e-n-.. -,: I J!
`· ! ~
`I Report Equip Sold
`I Export Record .
`I
`! ··ReportAil · ··
`I
`
`·
`
`Selected Registration# Displayed • - - - - - - - - - - -~
`
`Own~f-Display Recovery Info
`
`A~~lgned to. 0lsplay Rec.ov,ery lnfo
`
`Property Of
`Owner Contact:
`Owner Phone
`Owner Email
`
`"
`
`Assigned To:
`Department
`Phone
`Email:
`
`• Rer1uired
`
`CHANGE O~NER _J>A~WO~D
`
`CHANGE/CLEAR "ASSIGNEO TO" PASSWORD
`
`.j
`
`""C
`~
`
`(')
`
`~ = ....
`t "Cl -....
`~ ....
`.... 0 =
`
`(')
`
`~
`O' =-:
`~ ....
`.... 0 =
`
`~
`~
`;"'l
`~
`r-'
`N
`0
`0
`Ul
`
`'J'J. =(cid:173)~
`~ ....
`-..J
`0 ....,
`'"""' 0
`
`d
`'J'J.
`N
`0
`0
`~
`0
`0
`-..J
`'"""' O'I
`-..J
`0
`>
`'"""'
`
`
`
`The Retriever "Assigned To" Administration
`
`Assigned To: Appears and is protected I ex. Sam Stoneworth
`Deparbnent : Appears and Is protected/ ex. Ha,vard Law Dept
`
`l.ogo
`
`r _, ·• -.. r , 1 ·
`,. , · - . r 1·
`• '- -- -- .•
`r I'
`,- : :., ::..1 I ::J J 1 :·_.: . _ .. . J ____ J ·_-_i r·· J :.l _;
`
`, ,
`
`.f--:,_ :~:: ~:.~ ~ . ..J . / :) J: .:/
`
`I ., ' i ;· J
`- J .I.,
`
`-~
`
`Phone:
`Email:
`
`I
`
`·CHANGE.ASSSIGNED TO PASSWORD
`
`]
`
`Screensaver Automatic
`Log Off Time :
`?
`
`seconds
`
`I Log-off
`
`·. Edit Record
`
`Cancel
`
`Ue,_date /Save
`
`www.worldsecuritycorp.com (add to the bottom of every page)
`
`(=Ll>-- 9
`
`""C
`
`~ .... ~ = ....
`~ "Cl -....
`~ ....
`.... 0 =
`~
`O' -....
`~ ....
`.... 0 =
`
`I")
`
`I")
`
`~
`~ :;
`~
`'"""' ~
`N
`0
`0 u-.
`rF.J. =(cid:173)~
`~ ....
`0 ...,
`'"""' 0
`
`00
`
`d
`rF.J.
`N
`0
`0
`~
`0
`0
`-..J
`'"""' O'I
`-..J
`0
`>
`'"""'
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 9 of 10
`
`US 2005/0071670 Al
`
`The RETRIEVER from WorJd Security Com
`
`[Stop Sign]
`
`Enter a valid user name and password to log on to this system.
`
`· Sign On
`
`Name:
`
`Password:
`
`PRESS:
`
`OK
`·Corre.ct PW
`lncorrec1 l'W
`
`I
`
`CANCEL
`
`SHUTDOWN
`
`This equipmeot is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theft, protect information and recover lost or stolen equipmeot.
`
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1234
`itadrnin!@.abccorp.com
`
`:~~sig;,e!! To:
`
`Carrie Hafeman
`303-670-8800
`lightguardian/@.msn.com
`
`IAIJ SPACFj
`
`bWSPACEj
`
`Distributed by
`\AD SPACFd
`
`II
`
`Tbt Rctritvcr
`
`·· OiR Vt§fT
`
`Web Site:
`Email:
`Phone:
`
`www.worldsecuritvcorp.com/lostandfound/html
`lostan dfou n d/@.worldsecu ritvcorp. com
`1-800-xxx-xxu:
`
`Registration#: xxxxxx.xxxxxxxxxxxxxxxx
`
`
`
`Patent Application Publication Mar. 31, 2005 Sheet 10 of 10
`
`US 2005/0071670 Al
`
`The RETRIEVER from World Security Corn
`
`[Stop Sign]
`
`Enter a valid user name and password to log on to this system.
`
`Sign On
`
`Name:
`
`Password:
`
`PRESS:
`
`OK
`Correc:PW
`[ fTCorrcc:! PW •
`
`CANCEL
`
`SHUTDOWN l
`
`This equipment is protected against theft by.the World Security Corp International
`Registration and Recovery System. The Retriever Program bas been installed to help
`stop theft. protect information and recover lost or stolen equipment.
`
`Property of ABC Corporation
`BiJI Smith, Security Dept
`800-222-1234
`itadmin(a)abccorp.com
`
`.2,,iiig;;,r,; ·-;-.,:
`
`Carrie Hafeman
`303-670-8800
`lightguardian(a)msn.corn
`
`!AD SPACEj
`
`~D SPACEj
`
`Distributed by
`~D SPACE)
`
`II
`
`The Retriever
`
`OR VuSff'T
`
`Web Site:
`Email :
`Phone:
`
`www.worldsecuritvcorp.com/lostandfound/html
`lostandfound@worldsecuritvcorp.com
`1-800-xxx-xxxx
`
`Registration # : xxxxxxxx.xxxxxxxxxxxxxx
`
`
`
`US 2005/0071670 Al
`
`
`
`Mar. 31, 2005
`
`1
`
`FIELD OF THE INVENTION
`
`
`
`attempt to locate stolen computers through an IP
`
`
`
`
`
`COMPUTER RECOVERY OR RETURN
`
`
`address. Some of these computer security recovery
`
`
`
`software programs, can actually attempt to seize the
`
`
`
`
`communication between the stolen computer and the
`[0001] The present invention is related to the return of lost
`
`
`
`
`
`
`
`recovery center and delete selected files to help
`
`
`
`
`or stolen computers. More specifically, the present invention
`
`
`
`protect the owner's confidential information. Prod
`
`
`
`
`is related to the return of lost or stolen computers using a
`
`
`ucts like these include CompuTrace, PC Phone
`
`
`
`
`
`recovery screen that appears during or after boot-up of the
`
`
`Home, CyberAngel, LapTrak and Luceria.
`computer.
`
`BACKGROUND OF THE INVENTION
`
`
`
`
`
`
`products include:
`
`[0003] (1) Physical Labels that Attach to the Outside
`
`
`
`Hardware of the Computer Equipment.
`
`[0009] The present invention is also designed for the
`
`
`
`
`
`
`
`
`purpose of recovering lost or stolen equipment, but
`
`
`
`the method is distinctively different and unique from
`[0002] Current methods of computer return or recovery
`
`
`
`the current methods. The present invention does not
`
`
`
`rely on the use of the computer modem. The present
`
`
`invention uses a layered program in the boot-up
`
`
`
`process to provide a display of the proper owner
`
`
`
`recovery and return information using the comput
`[0004] These hardware labels can contain custom
`
`
`
`
`
`
`
`er's own monitor or screen. The present invention is
`
`
`
`recovery information, but because they are hardware
`
`
`also different and superior to the above software
`
`
`
`
`based, they can not be interactively changed by the
`
`
`
`
`tracking products, in helping to accomplish interna
`owner.
`
`
`
`
`tional recovery. None of the above products to date
`[0005] Also, since they do not have any ability to affect the
`
`
`
`have been able to use the modem phone or IP system
`
`
`
`computer boot-up process, they can do nothing to help
`
`
`to track stolen equipment internationally. The
`
`
`
`protect the confidential owner information on the hard drive.
`
`
`
`
`
`present invention provides international recovery by
`
`
`An example of a well known physical hardware/recovery
`
`
`
`
`displaying owner email information as well as pro
`
`
`label is the STOP Tag by Security Tracking of Office
`
`
`
`viding recovery help through an international recov
`
`
`
`Property in Connecticut. This labeling system has been
`
`ery internet web site.
`
`
`
`
`patented in France, the US, and other countries. The product
`[0010] There are other differences as well in how
`
`
`
`
`
`
`
`can be easily defeated by removing the physical label. In the
`
`
`
`these programs try to also protect the information on
`
`
`
`case of STOP Tag which includes a 'recovery mark' which
`
`
`the hard drive. The present invention automatically
`
`
`
`states "STOLEN PROPERTY" underneath the label, a new
`
`
`
`initiates during the boot-up process of the equip
`
`label can be simply added over the 'recovery mark' to hide
`
`
`
`ment, in order to display the recovery/return infor
`
`
`the STOLEN PROPERTY sign. (The Security Tracking of
`
`mation before a security prompt screen to always
`
`
`
`
`Office Property equipment recovery is U.S. Pat. No. 5,163,
`
`
`
`help protect the owner's confidential information on
`
`
`
`
`711 This patent actually refers to how the labels adhere to
`
`
`the hard drive. Some of the programs above do
`
`
`the equipment-but this is their patent).
`
`
`
`nothing to protect the user information. Others like
`
`
`
`
`LapTrak include a Hide-A-File feature that an owner
`[0006] The computer security recovery/return pro
`
`
`
`
`
`can access after the user enters the operating system.
`
`
`
`gram of the present invention utilizes this type of
`
`
`
`
`CyberAngel includes an encryption feature. Luceria
`
`
`
`hardware recovery approach to a small degree, but is
`
`
`
`
`includes the ability to delete pre-selected files from
`
`
`
`
`greatly different from this system, because this is a
`
`
`
`
`the recovery center. By layering this computer secu
`
`
`
`software program rather than a hardware solution.
`
`
`
`
`rity application strategically before or during a secu
`
`
`
`
`Additionally, the present invention is greatly supe
`
`
`rity prompt in the boot-up process, this application
`
`
`
`rior, since the owner can interactively customize the
`
`
`provides a unique and different method to help
`
`
`
`return/recovery information displayed at any time,
`
`protect owner information.
`
`
`
`and the present invention also helps protect the
`
`
`important, confidential owner information on the
`[0011] (An example of patents for these types of
`
`
`
`
`
`
`hard drive, by the positioning of the program layer in
`
`
`products would be the CompuTrace U.S. Pat. Nos.
`
`
`the equipment boot-up process.
`
`5,715,174, 5,764,892, and 5,802,280).
`
`[0007] (2) Computer Software Programs that Attempt
`
`
`
`
`
`
`Recovery Through the Use of the Modem.
`
`
`
`
`
`[0012] (3) Bias Based Password Identification Systems.
`
`[0013] There are some computers that are sold with
`
`
`[0008] There are several patented computer security
`
`
`
`
`
`Bias based identification systems included. These
`
`software products on the market today that are
`
`
`
`
`products activate immediately when a computer is
`
`
`
`designed for the purpose of recovering lost or stolen
`
`
`turned on, and prompt the user for a password before
`
`
`equipment. These programs use the computer's
`
`
`accessing the data on the computer.
`
`
`
`
`modem to regularly call a recovery center. Then once
`
`
`
`
`
`a computer is stolen, the recovery center waits for the
`[0014] The present invention is very different and
`
`
`
`stolen computer to call in. When the computer
`
`unique from the Bias based program, for many
`
`
`
`modem calls in, the recovery centers use something
`
`
`
`reasons. Most importantly the bias based password
`
`
`
`similar to the reverse 911 system to get the phone
`
`
`
`identification products are built into the hardware of
`
`
`
`number that the stolen equipment is accessing. Using
`
`
`
`the computer equipment-not the hard drive. In
`
`
`
`the phone number, the recovery system then can try
`
`other words, if you removed the hard drive from a
`
`
`
`to get a map of where the computer is. Some of these
`
`
`stolen or lost laptop, and inserted the stolen hard
`
`
`
`computer security recovery programs can also
`
`
`
`drive into a different laptop, you would bypass the
`
`
`
`US 2005/0071670 Al
`2
`
`
`
`Mar. 31, 2005
`
`bias based password identification system, and the
`
`
`
`return information for returning the computer to the owner
`
`
`
`
`
`
`bias based password identification system would
`
`from data stored in the memory.
`
`
`remain with the original equipment. Thus, the Bias
`[0020] The present invention pertains to a method for
`
`
`
`
`Based Password Identification system can identify
`
`
`
`
`
`displaying information to assist with returning a computer to
`
`
`the computer hardware, but not the hard drive (the
`
`
`
`its owner. The method comprises the steps of activating a
`
`
`
`most important part of the computer equipment).
`
`
`
`computer. There is the step of displaying automatically a
`
`
`
`
`
`return screen on a display of the computer during or after
`
`
`[0015] In addition, the Bias Based Password Identi
`
`
`
`
`boot-up which displays information concerning owner infor
`
`
`
`
`fication systems are designed as a unique method for
`
`
`
`mation about who owns the computer, concerning user
`
`
`
`providing an additional layer of password protection
`
`
`
`
`information about who the user is who the computer is
`
`
`
`
`to the equipment hardware, but are not designed for
`
`
`assigned to for use, and return information for returning the
`
`
`
`recovery or return. There is no design for including
`
`
`
`
`computer to the owner from data stored in a memory of the
`
`
`
`complete owner information, no recovery informa
`computer.
`
`
`
`tion displayed, no effective protection of the infor
`
`
`
`
`mation on the hard drive, no effective method for the
`
`
`
`recovery or return of the hard drive-the most
`
`
`important item that a consumer would want back. In
`[0021] In the accompanying drawings, the preferred
`
`
`
`
`fact the Bias Password Identification product occurs
`
`
`
`
`embodiment of the invention and preferred methods of
`
`before allowing the hard drive to boot up. The
`
`
`
`practicing the invention are illustrated in which:
`
`
`
`
`present invention is unique because it is an -appli
`
`
`
`
`cation software program that provides its layer of
`
`
`
`
`
`
`protection during the boot-up process (not before),
`
`
`ratus of the present invention.
`
`
`
`
`and thus allows the security product to move with the
`[0023] FIG. 2 is a representation of a return/recovery
`
`
`
`
`
`hard drive, the most critical part of the computer.
`
`
`
`
`dialog box of an embodiment of the present invention.
`
`[0022] FIG. 1 is a schematic representation of the appa
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`
`
`[0024] FIG. 3 is a flow chart regarding an embodiment of
`
`
`
`[0027] FIG. 6 is a representation of a return screen of the
`
`
`
`[0030] FIG. 9 is a second return administration screen of
`
`
`
`[0031] FIG. 10 is a third return administration screen of
`
`SUMMARY OF THE INVENTION
`
`
`the present invention.
`
`
`
`
`[0016] The present invention pertains to a computer return
`[0025] FIG. 4 is a flow chart regarding a second embodi
`
`
`
`
`
`
`apparatus. The apparatus comprises a processor. The appa
`
`
`ment of the present invention.
`
`
`
`
`
`ratus comprises a memory connected to the processor. The
`
`
`
`apparatus comprises a display. The apparatus comprises a
`[0026] FIG. 5 is a representation of an administration
`
`
`
`
`return screen that the processor automatically causes to
`
`
`
`program section of the present invention.
`
`
`
`appear during or after boot-up of the processor on the
`
`
`
`
`
`
`
`display, that displays ownership information concerning
`
`present invention.
`
`
`
`who owns the computer and return information for returning
`
`
`the computer to the owner from data stored in the memory.
`[0028] FIG. 7 is an example of a password screen utilized
`
`
`
`by the present invention.
`[0017] The present invention pertains to a method for
`
`
`
`
`
`
`returning a computer to its owner. The method comprises the
`
`
`[0029] FIG. 8 is a return administration screen of the
`
`
`
`steps of activating a computer. Then there is the step of
`
`present invention.
`
`
`
`
`
`displaying automatically a return screen on a display of the
`
`
`
`
`
`
`
`computer during or after boot-up of the computer, which
`
`the present invention.
`
`
`
`
`displays information concerning owner information about
`
`
`who owns the computer and return information for returning
`
`
`
`
`
`the computer to the owner from data stored in the memory
`
`the present invention.
`of the computer.
`
`[0032] FIG. 11 is a fourth return administration screen of
`
`
`
`
`
`
`
`
`the present invention.
`
`
`
`[0018] The present invention pertains to a computer read
`
`
`
`able medium whose contents cause a computer to show who
`
`
`
`is its owner by performing the steps of activating a com
`DETAILED DESCRIPTION
`
`puter. Then there is the step of displaying automatically a
`
`
`
`[0033] Referring now to the drawings wherein like refer
`
`
`
`
`
`return screen on a display of the computer during or after
`
`
`
`ence numerals refer to similar or identical parts throughout
`
`
`
`
`boot-up of the computer, which displays information con
`
`
`
`the several views, and more specifically to FIG. 1 thereof,
`
`
`cerning owner information about who owns the computer
`
`
`
`there is shown a computer 12 return apparatus 10. The
`
`
`
`and return information for returning the computer to the
`
`
`
`
`apparatus 10 comprises a processor 14. The apparatus 10
`
`
`owner from data stored in the memory of the computer.
`
`
`
`
`
`comprises a memory 16 connected to the processor 14. The
`
`
`
`
`[0019] The present invention pertains to a computer return
`
`
`
`
`apparatus 10 comprises a display 18. The apparatus 10
`
`
`
`apparatus. The apparatus comprises a processor. The appa
`
`
`
`
`comprises a return screen 20 that the processor 14 automati
`
`
`
`
`
`ratus comprises a memory connected to the processor. The
`
`
`cally causes to appear during or after boot-up of the pro
`
`
`
`apparatus comprises a display. The apparatus comprises a
`
`
`
`
`
`cessor 14 on the display 18, that displays ownership infor
`
`
`return screen that the processor automatically causes to
`
`
`
`mation concerning who owns the computer 12 and return
`
`
`
`appear during or after boot-up of the processor on the
`
`
`information for returning the computer 12 to the owner from
`
`
`
`
`display, that displays information concerning an owner who
`
`
`data stored in the memory 16. The Owner is defined as the
`
`
`
`owns the computer, concerning user information about who
`
`
`
`
`person or entity that owns, rents, or licenses the Retriever,
`
`
`the user is who the computer is assigned to for use, and
`and/or the person or entity who controls the recovery
`
`
`
`US 2005/0071670 Al
`3
`
`
`
`Mar. 31, 2005
`
`service. The Owner has greater control over the computer 12
`
`
`
`changing the return information and the owner information
`
`
`
`
`
`
`than the user. This could include, but not be limited to, an
`
`
`
`after the step of satisfying a security prompt such as entering
`
`
`employee of a company that owns the computer 12, or an
`
`
`a password into the computer 12.
`
`
`agent of the owner or a friend that has the permission of the
`[0040] In the operation of the invention, first, the owner of
`
`
`
`
`owner to use or have or recover the computer 12.
`
`
`
`the computer 12 would install the computer 12 security
`
`
`recovery/return software program 24 application. The pro
`[0034] Preferably, the apparatus 10 includes means for
`
`
`
`
`
`
`gram could be installed to work on any type of computer 12
`
`
`
`causing the screen to appear on the display 18 with the
`
`
`
`
`
`screen including but not limited to, PC's, laptops, handheld
`
`
`
`owner and return information. The causing means 22 is
`
`
`
`computers (such as blackberries, palm pilots), UPS comput
`
`
`stored in the memory 16. The causing means 22 preferably
`
`
`
`
`
`
`erized handheld tracking display units, and even cell phone
`
`
`
`is a software program 24. Preferably, the memory 16
`
`
`
`displays. The unique recovery/return computer 12 security
`
`
`
`
`includes a primary operating system having an operating
`
`
`program could in fact, be installed and used by any type of
`
`
`screen 26 for the computer 12, and the return screen 20
`
`
`
`
`computer 12 that utilized a monitor display screen. The
`
`
`
`
`appears on the display 18 before the operating screen 26 of
`
`
`
`
`software application program provides an additional layer to
`
`
`
`the operating system appears on the display 18.
`
`
`the existing operating system of each computer 12. The
`
`
`
`
`[0035] The software program 24 preferably appears before
`
`
`
`
`
`coding language used for the software program 24 could and
`
`
`
`a security prompt such as a password to be entered to obtain
`
`
`
`would vary depending upon the computer 12 equipment, but
`
`
`
`access to the primary operating system of the computer 12.
`
`
`the core structure of how the program operates would be
`
`
`Preferably, the software program 24 allows the owner to
`
`similar in all items.
`
`change the return information and the owner information,
`[0041] Once the computer 12 security software program
`
`
`
`
`
`after the password or security prompt is satisfied for the
`
`
`
`24 is installed, the monitor of the computer 12 will display
`
`
`
`computer 12. The software program 24 is preferably able to
`
`
`the complete and current recovery/return information that
`
`
`
`
`communicate through a modem (or wireless) to a predeter
`
`
`
`the program has allowed the owner of the equipment to
`
`
`mined location to transfer the return information to the
`
`interactively enter, change and update at anytime.
`
`
`
`
`
`location to facilitate return of the computer 12 if it becomes
`lost by the owner.
`[0042] This "on the fly" ability to change owner recovery
`
`
`
`
`
`
`information to aid return of equipment is an important
`
`
`
`[0036] The present invention pertains to a method for
`
`
`
`
`
`feature for anyone, including college students who travel
`
`
`
`returning a computer 12 to its owner. The method comprises
`
`
`
`from home to college during different parts of the year,
`
`
`the steps of activating a computer 12. Then there is the step
`
`
`
`people who move, and particularly business people who
`
`
`
`of displaying automatically a return screen 20 on a display
`
`
`travel throughout the world. The recovery/return informa
`
`
`18 of the computer 12 during or after boot-up of the
`
`
`
`tion would not only allow the display 18 of physical address
`
`
`
`
`computer 12, which displays information concerning owner
`
`
`return information, and owner contact telephone informa
`
`
`information about who owns the computer 12 and return
`
`tion, but would also provide for international internet based
`
`
`
`information for returning the computer 12 to the owner from
`
`
`recovery through the added display 18 of owner email
`
`
`data stored in the memory 16 of the computer 12.
`
`
`
`
`information, as well as the ability to display an international
`
`
`recovery center web site.
`[0037] Preferably, the displaying step includes the step of
`
`
`
`
`
`
`displaying automatically the return screen 20 before an
`[0043] In addition to increasing chances of return and
`
`
`
`
`
`
`
`
`
`operating screen 26 of the primary operating system of the
`
`
`
`recovery of the stolen or lost equipment by using the
`
`
`
`computer 12. There is preferably the step of displaying the
`
`
`
`
`computer's 12 display 18 monitor, the program is an addi
`
`
`
`return screen 20 before satisfying a security prompt such as
`
`
`
`
`tional programming layer added into the initial start up
`
`
`
`entering a password into the computer 12 to access the
`
`
`
`program of the computer 12, so that the recovery/return
`
`
`
`
`primary operating system. Preferably, there is the step of
`
`
`
`
`
`display 18 information occurs during or before a password
`
`
`
`changing the return information, and the owner information
`
`
`or security prompt screen. This is an important feature that
`
`
`after the step of satisfying a security prompt such as entering
`
`
`
`
`helps create an environment whereby the individual that
`
`
`the password into the computer 12.
`
`
`
`happens upon a stolen or lost piece of equipment will see the
`
`
`
`
`owner recovery/return information displayed before a pass
`[0038] The present invention pertains to a computer 12
`
`
`
`
`
`
`word or security prompt screen. By automatically initiating
`
`
`
`readable medium whose contents cause a computer 12 to
`
`
`
`
`this program during or before a user's security prompt, such
`
`
`show who is its owner by performing the steps of activating
`
`
`as a password screen program, the recovery/return program
`
`
`
`a computer 12. Then there is the step of displaying auto
`
`
`
`will not only increase chances of recovery, but will also
`
`
`
`
`matically a return screen 20 on a display 18 of the computer
`
`
`
`
`
`increase chances that the computer 12 information on the
`
`
`12 during or after boot-up of the computer 12, which
`
`
`
`
`hard drive is protected while the computer 12 is not in the
`
`
`
`
`displays information concerning owner information about
`
`owner's possession.
`
`
`
`
`who owns the computer 12 and return information for
`
`
`
`
`returning the computer 12 to the owner from data stored in
`
`
`
`
`
`
`the memory 16 of the computer 12.
`
`the program is as follows:
`
`[0044] For example, the actual step by step operation of
`
`[0045] (1) Someone finds a lost or stolen computer 12. The
`
`
`
`[0039] Preferably, the displaying step includes the step of
`
`
`
`
`
`
`
`person who finds the computer 12, turns the computer 12 on.
`
`
`
`displaying automatically the return screen 20 before an
`
`
`
`
`
`operating screen 26 of the primary operating system of the
`
`
`[0046] (The software program 24 could be provided
`
`
`
`computer 12. There is preferably the step of displaying the
`
`with a warning sticker that will be placed on the
`
`
`
`return screen 20 before satisfying a security prompt such as
`
`
`
`
`outside of the equipment telling anyone finding the
`
`
`
`entering a password into the computer 12 to access the
`
`
`equipment, about the program and the display recov
`
`
`
`
`primary operating system. Preferably, there is the step of
`ery screen.)
`
`
`
`US 2005/0071670 Al
`4
`
`
`
`Mar. 31, 2005
`
`[0047] (2) The computer 12 display 18 screen turns on.
`
`
`
`
`However, for one of the Window operating systems for
`
`
`
`
`
`
`The computer 12 security software return/recovery program
`
`
`
`
`example, the first boot-up default screen is a CTR+ALT +
`
`automatically initiates during the computer's 12 boot-up
`
`
`
`DEL screen, and then the program can move to a password
`
`
`
`
`
`screen. In this case, the recovery/return program could
`process.
`
`
`
`
`provide a display 18 dialog screen that would be an addi
`
`
`
`[0048] (3) As the computer 12 booting up process moves
`
`
`tional layer between the CTR+ALT +DEL dialog box and the
`
`
`
`
`the user to a password or security prompt screen, the
`
`
`
`password dialog box. (See FIG. 4). Other operating systems
`
`
`
`
`
`computer 12 security software program 24 displays a dialog
`
`
`
`
`
`could allow the program to display the recovery dialog box,
`
`
`
`box which includes owner recovery and return information,
`
`
`
`with the password or security prompt at the bottom of the
`
`
`
`so that the person finding the equipment can return the
`
`
`dialog box (so that even though the recovery dialog appli
`
`
`
`
`equipment either directly or through the international web
`
`
`
`cation is an additional layer during the boot-up, it would
`
`
`
`
`
`site recovery center. The information screen can include any
`
`
`
`appear that the password or security prompt is included
`
`
`
`of the following items of information that the owner would
`
`
`within the same dialog box). (See FIGS. 2 and 3). The
`
`
`
`
`like displayed including but not limited to: contact name,
`
`
`recovery dialog box would occu