throbber
1111111111111111 IIIIII IIIII 11111 1111111111 11111 1111111111 111111111111111 1111111111 11111111
`US 20050071670Al
`
`(19) United States
`(12) Patent Application Publication
`Hafeman
`
`(10) Pub. No.: US 2005/0071670 Al
`Mar. 31, 2005
`(43) Pub. Date:
`
`(54) COMPUTER RECOVERY OR RETURN
`
`Publication Classification
`
`(76)
`
`Inventor: Carolyn W. Hafeman, Evergreen, CO
`(US)
`
`Int. Cl.7 ....................................................... H04L 9/00
`(51)
`(52) U.S. Cl. .............................................................. 713/200
`
`Correspondence Address:
`Ansel M. Schwartz
`Attorney at Law
`Suite 304
`201 N. Craig Street
`Pittsburgh, PA 15213 (US)
`
`(21)
`
`Appl. No.:
`
`10/945,332
`
`(22)
`
`Filed:
`
`Sep.20,2004
`
`Related U.S. Application Data
`
`(63)
`
`Continuation-in-part of application No. 10/304,827,
`filed on Nov. 25, 2002, now abandoned.
`
`(57)
`
`ABSTRACT
`
`A computer return apparatus includes a processor. The
`apparatus includes a memory connected to the processor.
`The apparatus includes a display. The apparatus includes a
`return screen that the processor automatically causes to
`appear during or after boot-up of the processor on the
`display, that displays information concerning an owner who
`owns the computer, concerning user information about who
`the user is who the computer is assigned to for use, and
`return information for returning the computer to the owner
`from data stored in the memory. A method for displaying
`information to assist with returning a computer to its owner.
`
`Turn Computer
`On
`
`Recovery / Return
`Dialog Box appears on
`monitor's display screen.
`
`(Occurs before or with
`Password or Security
`Prompt : Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`
`( Can appear as a screen after the Recovery / Return Dialog box or preferably al the
`bottom of the Recovery /Return Dialog Bax as in Sample 1 above)
`
`(OK]
`
`(SHUTDOWN]
`
`User enters computer
`operating system lo access
`programs and information.
`
`Windows or Other Operating System Standard
`Shutdown Computer Screen
`(*) Shutdown
`( ) Shutdown and Reboot
`
`[OK]
`
`(Shuts down
`computer)
`
`[CANCEL]
`
`(Returns back lo _
`previous screen)
`
`1----------------►
`Back up to previous screen.
`
`EX-1016
`US Patent 10,789,393
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 1 of 10
`
`US 2005/0071670 Al
`
`ll
`"Y
`
`14
`
`PROCESSOR
`
`-------~----
`
`24
`
`CAUSING
`MEANS
`
`SOFTWARE
`PROGRAM·
`
`PRIMARY
`OPERATING
`SYSTEM
`
`FIG.1
`
`18
`
`20
`
`26
`
`DISPLAY
`
`RETURN
`SCREEN
`
`OPERATING
`SCREEN·
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 2 of 10
`
`US 2005/0071670 Al
`
`Workstation Locked
`
`[Picture]
`Red Stop
`Sign w/white
`word STOP
`
`The Retriever by WorldsecurityCorp.com
`The workstation has been locked. This equipment is protected
`against theft by the World Security Corp. International
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment.
`
`To lndentify Rightful Owner & Avoid Prosecution CALL NOW :
`
`[Recovery Name/(input from database / required)]
`[Organization Name / ABC Corp/ input/ not required]
`[ Address 1 / input from database / not required]
`[ Address 2 / input from database / not required]
`[City] [State] [Zip / all of these input from database/ not required
`[Phone 1 / input from database / required][Phone 2 / not required]
`[Email / input from database / required](Fax / not required]
`OR VISIT
`www.worldsecuritycorp.com/lostandfound.html .
`[Picture]
`Retriever Logo Email : lostandfound@worldsecuritycorp.com
`Phone : 1-800-xxx-xxxx
`
`Registration H : xxxxxxxxxxxxxxxx (sequential number unique to each
`software license
`
`User :
`
`[ _ _ _ _ _ _ ]
`
`Password :
`
`[
`
`]
`
`[OK]
`(moves user to operating system with
`correct password)
`
`(SHUTDOWN]
`(initiates operating system
`shutdown)
`
`FIG.2
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 3 of 10
`
`US 2005/0071670 Al
`
`Turn Computer .
`On
`
`Recovery / Return
`Dialog Bo){ appears on
`monitor's display screen.
`
`( Occurs before or with
`Password or Security
`Prompt : Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`
`(Can appear as a screen. after the Recovery / Return Dialog box or preferably at the
`bottom of the Recovery /Return Dialog Box as in Sample 1 above)
`
`(OK]
`
`[SHUTDOWN]
`
`User enters computer
`operating system to access
`programs and information.
`
`Windows or Other· Operating System· Standard
`Shutdown Computer Screen
`{*) Shutdown
`( ) Shutdown and Reboot
`
`[OK]
`
`(Shuts down
`computer)
`
`(CANCEL]
`
`(Returns back to _
`previous screen)
`
`1----------------►
`Back up to previous screen.
`
`FIG.3
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 4 of 10
`
`US 2005/0071670 Al
`
`Turn Computer
`On
`
`Welcome
`
`[Picture]
`Windows hand
`with key
`
`Press [CTRL + ALT + DEL] to Logan_.
`C 2002-200_ World Computer Security Corp
`Distribuited by· www.worldsecuritycorp.com
`Telephone : (303) 670-8800
`
`[Picture]
`Retriever Logo
`
`Recovery /Return
`Dialog Box appears on
`monitor's display screen.
`
`(Occurs before or with
`password or Security
`Prompt Dialog Box)
`
`Computer Password or
`Security Dialog Box Prompt
`Screen
`
`( Can appear as a screen after the
`Recovery /Return Dialog box or
`preferably at the bottom of the
`Recovery /Return Dialog Box)
`
`FIG.4
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 5 of 10
`
`US 2005/0071670 Al
`
`Computer Monitor Screen
`at Operating System Screen
`
`MS Word >
`MS Excel >
`Administration Section >
`DVD Player >
`Etc ... >
`
`Programs >
`Find >
`Help >
`Run >
`
`START
`
`FIG.5
`
`Windows Logon
`
`[Picture]
`Keys
`
`[Picture]
`Retriever Logo
`
`[OK]
`
`Enter a valid user name and password to logon to this
`system :
`
`User :
`
`Password :
`
`[SHUTDOWN]
`
`[CANCEL]
`
`FJG.7
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 6 of 10
`
`US 2005/0071670 Al
`
`Workstation Locked
`
`[Picture]
`Red Stop
`Sign w/white
`word STOP
`
`The Retriever by WorldsecurityCorp.com
`The workstation has been locked. This equipment is protected
`against theft by the World Security Corp. International
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment.
`
`To lndentify Rightful Owner & Avoid Prosecution CALL NOW :
`
`[Recovery Name/(input from database / required)]
`[Organization Name / ABC Corp/ input/ not required]
`[ Address 1 / input from database / not required]
`[Address 2 / input from database / not required]
`[City] [State] [Zip / all of these input from database / not required
`[Phone 1 · / input from database / required][Phone 2 / not required]
`[Email / input from database / required][Fax / not required]
`OR· VISIT
`www.worldsecuritycorp.com/lostandfound.html
`[Picture]
`Retriever Logo Email : lostandfound@worldsecuritycorp.com
`Phone: 1-800-xxx-xxxx
`
`Registration # : xxxxxxxxxxxxxxxx
`
`PRESS
`
`[OK]
`
`(CANCEL]
`
`[SHUTDOWN]
`
`FIG.6
`
`

`

`FlG- 9
`The Retriever Owner Administration
`
`Last Login: Date, Time, Tim_e Zone/ ex. Oct 27, 200314:41 MST
`Customer # : Appears and is protected/ ex. 54658693
`
`1 Loo~C>ff .•
`
`Logo
`
`Select Registration # for
`global or single update :
`
`CT]
`
`OR select the
`
`Sd1:cl Scroll
`
`Edit.All/ Global Edit---------------------- --0
`I 00012345 ---Assigned Tu------Dept-------O
`l 00012346 ---Assigned To------Dcpt ------0
`I Browse List View
`
`button to see entire list.
`
`. =7
`I · Edit Record
`I
`I Cancel
`I
`I Update / Save
`I Clear All Fields ·7
`Reported
`,-1-,-Re~p-o_rt_L_o_st--,i~st-.o-,e-n-.. -,: I J!
`· ! ~
`I Report Equip Sold
`I Export Record .
`I
`! ··ReportAil · ··
`I
`

`
`Selected Registration# Displayed • - - - - - - - - - - -~
`
`Own~f-Display Recovery Info
`
`A~~lgned to. 0lsplay Rec.ov,ery lnfo
`
`Property Of
`Owner Contact:
`Owner Phone
`Owner Email
`
`"
`
`Assigned To:
`Department
`Phone
`Email:
`
`• Rer1uired
`
`CHANGE O~NER _J>A~WO~D
`
`CHANGE/CLEAR "ASSIGNEO TO" PASSWORD
`
`.j
`
`""C
`~
`
`(')
`
`~ = ....
`t "Cl -....
`~ ....
`.... 0 =
`
`(')
`
`~
`O' =-:
`~ ....
`.... 0 =
`
`~
`~
`;"'l
`~
`r-'
`N
`0
`0
`Ul
`
`'J'J. =(cid:173)~
`~ ....
`-..J
`0 ....,
`'"""' 0
`
`d
`'J'J.
`N
`0
`0
`~
`0
`0
`-..J
`'"""' O'I
`-..J
`0
`>
`'"""'
`
`

`

`The Retriever "Assigned To" Administration
`
`Assigned To: Appears and is protected I ex. Sam Stoneworth
`Deparbnent : Appears and Is protected/ ex. Ha,vard Law Dept
`
`l.ogo
`
`r _, ·• -.. r , 1 ·
`,. , · - . r 1·
`• '- -- -- .•
`r I'
`,- : :., ::..1 I ::J J 1 :·_.: . _ .. . J ____ J ·_-_i r·· J :.l _;
`
`, ,
`
`.f--:,_ :~:: ~:.~ ~ . ..J . / :) J: .:/
`
`I ., ' i ;· J
`- J .I.,
`
`-~
`
`Phone:
`Email:
`
`I
`
`·CHANGE.ASSSIGNED TO PASSWORD
`
`]
`
`Screensaver Automatic
`Log Off Time :
`?
`
`seconds
`
`I Log-off
`
`·. Edit Record
`
`Cancel
`
`Ue,_date /Save
`
`www.worldsecuritycorp.com (add to the bottom of every page)
`
`(=Ll>-- 9
`
`""C
`
`~ .... ~ = ....
`~ "Cl -....
`~ ....
`.... 0 =
`~
`O' -....
`~ ....
`.... 0 =
`
`I")
`
`I")
`
`~
`~ :;
`~
`'"""' ~
`N
`0
`0 u-.
`rF.J. =(cid:173)~
`~ ....
`0 ...,
`'"""' 0
`
`00
`
`d
`rF.J.
`N
`0
`0
`~
`0
`0
`-..J
`'"""' O'I
`-..J
`0
`>
`'"""'
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 9 of 10
`
`US 2005/0071670 Al
`
`The RETRIEVER from WorJd Security Com
`
`[Stop Sign]
`
`Enter a valid user name and password to log on to this system.
`
`· Sign On
`
`Name:
`
`Password:
`
`PRESS:
`
`OK
`·Corre.ct PW
`lncorrec1 l'W
`
`I
`
`CANCEL
`
`SHUTDOWN
`
`This equipmeot is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theft, protect information and recover lost or stolen equipmeot.
`
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1234
`itadrnin!@.abccorp.com
`
`:~~sig;,e!! To:
`
`Carrie Hafeman
`303-670-8800
`lightguardian/@.msn.com
`
`IAIJ SPACFj
`
`bWSPACEj
`
`Distributed by
`\AD SPACFd
`
`II
`
`Tbt Rctritvcr
`
`·· OiR Vt§fT
`
`Web Site:
`Email:
`Phone:
`
`www.worldsecuritvcorp.com/lostandfound/html
`lostan dfou n d/@.worldsecu ritvcorp. com
`1-800-xxx-xxu:
`
`Registration#: xxxxxx.xxxxxxxxxxxxxxxx
`
`

`

`Patent Application Publication Mar. 31, 2005 Sheet 10 of 10
`
`US 2005/0071670 Al
`
`The RETRIEVER from World Security Corn
`
`[Stop Sign]
`
`Enter a valid user name and password to log on to this system.
`
`Sign On
`
`Name:
`
`Password:
`
`PRESS:
`
`OK
`Correc:PW
`[ fTCorrcc:! PW •
`
`CANCEL
`
`SHUTDOWN l
`
`This equipment is protected against theft by.the World Security Corp International
`Registration and Recovery System. The Retriever Program bas been installed to help
`stop theft. protect information and recover lost or stolen equipment.
`
`Property of ABC Corporation
`BiJI Smith, Security Dept
`800-222-1234
`itadmin(a)abccorp.com
`
`.2,,iiig;;,r,; ·-;-.,:
`
`Carrie Hafeman
`303-670-8800
`lightguardian(a)msn.corn
`
`!AD SPACEj
`
`~D SPACEj
`
`Distributed by
`~D SPACE)
`
`II
`
`The Retriever
`
`OR VuSff'T
`
`Web Site:
`Email :
`Phone:
`
`www.worldsecuritvcorp.com/lostandfound/html
`lostandfound@worldsecuritvcorp.com
`1-800-xxx-xxxx
`
`Registration # : xxxxxxxx.xxxxxxxxxxxxxx
`
`

`

`US 2005/0071670 Al
`
`
`
`Mar. 31, 2005
`
`1
`
`FIELD OF THE INVENTION
`
`
`
`attempt to locate stolen computers through an IP
`
`
`
`
`
`COMPUTER RECOVERY OR RETURN
`
`
`address. Some of these computer security recovery
`
`
`
`software programs, can actually attempt to seize the
`
`
`
`
`communication between the stolen computer and the
`[0001] The present invention is related to the return of lost
`
`
`
`
`
`
`
`recovery center and delete selected files to help
`
`
`
`
`or stolen computers. More specifically, the present invention
`
`
`
`protect the owner's confidential information. Prod­
`
`
`
`
`is related to the return of lost or stolen computers using a
`
`
`ucts like these include CompuTrace, PC Phone
`
`
`
`
`
`recovery screen that appears during or after boot-up of the
`
`
`Home, CyberAngel, LapTrak and Luceria.
`computer.
`
`BACKGROUND OF THE INVENTION
`
`
`
`
`
`
`products include:
`
`[0003] (1) Physical Labels that Attach to the Outside
`
`
`
`Hardware of the Computer Equipment.
`
`[0009] The present invention is also designed for the
`
`
`
`
`
`
`
`
`purpose of recovering lost or stolen equipment, but
`
`
`
`the method is distinctively different and unique from
`[0002] Current methods of computer return or recovery
`
`
`
`the current methods. The present invention does not
`
`
`
`rely on the use of the computer modem. The present
`
`
`invention uses a layered program in the boot-up
`
`
`
`process to provide a display of the proper owner
`
`
`
`recovery and return information using the comput­
`[0004] These hardware labels can contain custom
`
`
`
`
`
`
`
`er's own monitor or screen. The present invention is
`
`
`
`recovery information, but because they are hardware
`
`
`also different and superior to the above software
`
`
`
`
`based, they can not be interactively changed by the
`
`
`
`
`tracking products, in helping to accomplish interna­
`owner.
`
`
`
`
`tional recovery. None of the above products to date
`[0005] Also, since they do not have any ability to affect the
`
`
`
`have been able to use the modem phone or IP system
`
`
`
`computer boot-up process, they can do nothing to help
`
`
`to track stolen equipment internationally. The
`
`
`
`protect the confidential owner information on the hard drive.
`
`
`
`
`
`present invention provides international recovery by
`
`
`An example of a well known physical hardware/recovery
`
`
`
`
`displaying owner email information as well as pro­
`
`
`label is the STOP Tag by Security Tracking of Office
`
`
`
`viding recovery help through an international recov­
`
`
`
`Property in Connecticut. This labeling system has been
`
`ery internet web site.
`
`
`
`
`patented in France, the US, and other countries. The product
`[0010] There are other differences as well in how
`
`
`
`
`
`
`
`can be easily defeated by removing the physical label. In the
`
`
`
`these programs try to also protect the information on
`
`
`
`case of STOP Tag which includes a 'recovery mark' which
`
`
`the hard drive. The present invention automatically
`
`
`
`states "STOLEN PROPERTY" underneath the label, a new
`
`
`
`initiates during the boot-up process of the equip­
`
`label can be simply added over the 'recovery mark' to hide
`
`
`
`ment, in order to display the recovery/return infor­
`
`
`the STOLEN PROPERTY sign. (The Security Tracking of
`
`mation before a security prompt screen to always
`
`
`
`
`Office Property equipment recovery is U.S. Pat. No. 5,163,
`
`
`
`help protect the owner's confidential information on
`
`
`
`
`711 This patent actually refers to how the labels adhere to
`
`
`the hard drive. Some of the programs above do
`
`
`the equipment-but this is their patent).
`
`
`
`nothing to protect the user information. Others like
`
`
`
`
`LapTrak include a Hide-A-File feature that an owner
`[0006] The computer security recovery/return pro­
`
`
`
`
`
`can access after the user enters the operating system.
`
`
`
`gram of the present invention utilizes this type of
`
`
`
`
`CyberAngel includes an encryption feature. Luceria
`
`
`
`hardware recovery approach to a small degree, but is
`
`
`
`
`includes the ability to delete pre-selected files from
`
`
`
`
`greatly different from this system, because this is a
`
`
`
`
`the recovery center. By layering this computer secu­
`
`
`
`software program rather than a hardware solution.
`
`
`
`
`rity application strategically before or during a secu­
`
`
`
`
`Additionally, the present invention is greatly supe­
`
`
`rity prompt in the boot-up process, this application
`
`
`
`rior, since the owner can interactively customize the
`
`
`provides a unique and different method to help
`
`
`
`return/recovery information displayed at any time,
`
`protect owner information.
`
`
`
`and the present invention also helps protect the
`
`
`important, confidential owner information on the
`[0011] (An example of patents for these types of
`
`
`
`
`
`
`hard drive, by the positioning of the program layer in
`
`
`products would be the CompuTrace U.S. Pat. Nos.
`
`
`the equipment boot-up process.
`
`5,715,174, 5,764,892, and 5,802,280).
`
`[0007] (2) Computer Software Programs that Attempt
`
`
`
`
`
`
`Recovery Through the Use of the Modem.
`
`
`
`
`
`[0012] (3) Bias Based Password Identification Systems.
`
`[0013] There are some computers that are sold with
`
`
`[0008] There are several patented computer security
`
`
`
`
`
`Bias based identification systems included. These
`
`software products on the market today that are
`
`
`
`
`products activate immediately when a computer is
`
`
`
`designed for the purpose of recovering lost or stolen
`
`
`turned on, and prompt the user for a password before
`
`
`equipment. These programs use the computer's
`
`
`accessing the data on the computer.
`
`
`
`
`modem to regularly call a recovery center. Then once
`
`
`
`
`
`a computer is stolen, the recovery center waits for the
`[0014] The present invention is very different and
`
`
`
`stolen computer to call in. When the computer
`
`unique from the Bias based program, for many
`
`
`
`modem calls in, the recovery centers use something
`
`
`
`reasons. Most importantly the bias based password
`
`
`
`similar to the reverse 911 system to get the phone
`
`
`
`identification products are built into the hardware of
`
`
`
`number that the stolen equipment is accessing. Using
`
`
`
`the computer equipment-not the hard drive. In
`
`
`
`the phone number, the recovery system then can try
`
`other words, if you removed the hard drive from a
`
`
`
`to get a map of where the computer is. Some of these
`
`
`stolen or lost laptop, and inserted the stolen hard
`
`
`
`computer security recovery programs can also
`
`
`
`drive into a different laptop, you would bypass the
`
`

`

`US 2005/0071670 Al
`2
`
`
`
`Mar. 31, 2005
`
`bias based password identification system, and the
`
`
`
`return information for returning the computer to the owner
`
`
`
`
`
`
`bias based password identification system would
`
`from data stored in the memory.
`
`
`remain with the original equipment. Thus, the Bias
`[0020] The present invention pertains to a method for
`
`
`
`
`Based Password Identification system can identify
`
`
`
`
`
`displaying information to assist with returning a computer to
`
`
`the computer hardware, but not the hard drive (the
`
`
`
`its owner. The method comprises the steps of activating a
`
`
`
`most important part of the computer equipment).
`
`
`
`computer. There is the step of displaying automatically a
`
`
`
`
`
`return screen on a display of the computer during or after
`
`
`[0015] In addition, the Bias Based Password Identi­
`
`
`
`
`boot-up which displays information concerning owner infor­
`
`
`
`
`fication systems are designed as a unique method for
`
`
`
`mation about who owns the computer, concerning user
`
`
`
`providing an additional layer of password protection
`
`
`
`
`information about who the user is who the computer is
`
`
`
`
`to the equipment hardware, but are not designed for
`
`
`assigned to for use, and return information for returning the
`
`
`
`recovery or return. There is no design for including
`
`
`
`
`computer to the owner from data stored in a memory of the
`
`
`
`complete owner information, no recovery informa­
`computer.
`
`
`
`tion displayed, no effective protection of the infor­
`
`
`
`
`mation on the hard drive, no effective method for the
`
`
`
`recovery or return of the hard drive-the most
`
`
`important item that a consumer would want back. In
`[0021] In the accompanying drawings, the preferred
`
`
`
`
`fact the Bias Password Identification product occurs
`
`
`
`
`embodiment of the invention and preferred methods of
`
`before allowing the hard drive to boot up. The
`
`
`
`practicing the invention are illustrated in which:
`
`
`
`
`present invention is unique because it is an -appli­
`
`
`
`
`cation software program that provides its layer of
`
`
`
`
`
`
`protection during the boot-up process (not before),
`
`
`ratus of the present invention.
`
`
`
`
`and thus allows the security product to move with the
`[0023] FIG. 2 is a representation of a return/recovery
`
`
`
`
`
`hard drive, the most critical part of the computer.
`
`
`
`
`dialog box of an embodiment of the present invention.
`
`[0022] FIG. 1 is a schematic representation of the appa­
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`
`
`[0024] FIG. 3 is a flow chart regarding an embodiment of
`
`
`
`[0027] FIG. 6 is a representation of a return screen of the
`
`
`
`[0030] FIG. 9 is a second return administration screen of
`
`
`
`[0031] FIG. 10 is a third return administration screen of
`
`SUMMARY OF THE INVENTION
`
`
`the present invention.
`
`
`
`
`[0016] The present invention pertains to a computer return
`[0025] FIG. 4 is a flow chart regarding a second embodi­
`
`
`
`
`
`
`apparatus. The apparatus comprises a processor. The appa­
`
`
`ment of the present invention.
`
`
`
`
`
`ratus comprises a memory connected to the processor. The
`
`
`
`apparatus comprises a display. The apparatus comprises a
`[0026] FIG. 5 is a representation of an administration
`
`
`
`
`return screen that the processor automatically causes to
`
`
`
`program section of the present invention.
`
`
`
`appear during or after boot-up of the processor on the
`
`
`
`
`
`
`
`display, that displays ownership information concerning
`
`present invention.
`
`
`
`who owns the computer and return information for returning
`
`
`the computer to the owner from data stored in the memory.
`[0028] FIG. 7 is an example of a password screen utilized
`
`
`
`by the present invention.
`[0017] The present invention pertains to a method for
`
`
`
`
`
`
`returning a computer to its owner. The method comprises the
`
`
`[0029] FIG. 8 is a return administration screen of the
`
`
`
`steps of activating a computer. Then there is the step of
`
`present invention.
`
`
`
`
`
`displaying automatically a return screen on a display of the
`
`
`
`
`
`
`
`computer during or after boot-up of the computer, which
`
`the present invention.
`
`
`
`
`displays information concerning owner information about
`
`
`who owns the computer and return information for returning
`
`
`
`
`
`the computer to the owner from data stored in the memory
`
`the present invention.
`of the computer.
`
`[0032] FIG. 11 is a fourth return administration screen of
`
`
`
`
`
`
`
`
`the present invention.
`
`
`
`[0018] The present invention pertains to a computer read­
`
`
`
`able medium whose contents cause a computer to show who
`
`
`
`is its owner by performing the steps of activating a com­
`DETAILED DESCRIPTION
`
`puter. Then there is the step of displaying automatically a
`
`
`
`[0033] Referring now to the drawings wherein like refer­
`
`
`
`
`
`return screen on a display of the computer during or after
`
`
`
`ence numerals refer to similar or identical parts throughout
`
`
`
`
`boot-up of the computer, which displays information con­
`
`
`
`the several views, and more specifically to FIG. 1 thereof,
`
`
`cerning owner information about who owns the computer
`
`
`
`there is shown a computer 12 return apparatus 10. The
`
`
`
`and return information for returning the computer to the
`
`
`
`
`apparatus 10 comprises a processor 14. The apparatus 10
`
`
`owner from data stored in the memory of the computer.
`
`
`
`
`
`comprises a memory 16 connected to the processor 14. The
`
`
`
`
`[0019] The present invention pertains to a computer return
`
`
`
`
`apparatus 10 comprises a display 18. The apparatus 10
`
`
`
`apparatus. The apparatus comprises a processor. The appa­
`
`
`
`
`comprises a return screen 20 that the processor 14 automati­
`
`
`
`
`
`ratus comprises a memory connected to the processor. The
`
`
`cally causes to appear during or after boot-up of the pro­
`
`
`
`apparatus comprises a display. The apparatus comprises a
`
`
`
`
`
`cessor 14 on the display 18, that displays ownership infor­
`
`
`return screen that the processor automatically causes to
`
`
`
`mation concerning who owns the computer 12 and return
`
`
`
`appear during or after boot-up of the processor on the
`
`
`information for returning the computer 12 to the owner from
`
`
`
`
`display, that displays information concerning an owner who
`
`
`data stored in the memory 16. The Owner is defined as the
`
`
`
`owns the computer, concerning user information about who
`
`
`
`
`person or entity that owns, rents, or licenses the Retriever,
`
`
`the user is who the computer is assigned to for use, and
`and/or the person or entity who controls the recovery
`
`

`

`US 2005/0071670 Al
`3
`
`
`
`Mar. 31, 2005
`
`service. The Owner has greater control over the computer 12
`
`
`
`changing the return information and the owner information
`
`
`
`
`
`
`than the user. This could include, but not be limited to, an
`
`
`
`after the step of satisfying a security prompt such as entering
`
`
`employee of a company that owns the computer 12, or an
`
`
`a password into the computer 12.
`
`
`agent of the owner or a friend that has the permission of the
`[0040] In the operation of the invention, first, the owner of
`
`
`
`
`owner to use or have or recover the computer 12.
`
`
`
`the computer 12 would install the computer 12 security
`
`
`recovery/return software program 24 application. The pro­
`[0034] Preferably, the apparatus 10 includes means for
`
`
`
`
`
`
`gram could be installed to work on any type of computer 12
`
`
`
`causing the screen to appear on the display 18 with the
`
`
`
`
`
`screen including but not limited to, PC's, laptops, handheld
`
`
`
`owner and return information. The causing means 22 is
`
`
`
`computers (such as blackberries, palm pilots), UPS comput­
`
`
`stored in the memory 16. The causing means 22 preferably
`
`
`
`
`
`
`erized handheld tracking display units, and even cell phone
`
`
`
`is a software program 24. Preferably, the memory 16
`
`
`
`displays. The unique recovery/return computer 12 security
`
`
`
`
`includes a primary operating system having an operating
`
`
`program could in fact, be installed and used by any type of
`
`
`screen 26 for the computer 12, and the return screen 20
`
`
`
`
`computer 12 that utilized a monitor display screen. The
`
`
`
`
`appears on the display 18 before the operating screen 26 of
`
`
`
`
`software application program provides an additional layer to
`
`
`
`the operating system appears on the display 18.
`
`
`the existing operating system of each computer 12. The
`
`
`
`
`[0035] The software program 24 preferably appears before
`
`
`
`
`
`coding language used for the software program 24 could and
`
`
`
`a security prompt such as a password to be entered to obtain
`
`
`
`would vary depending upon the computer 12 equipment, but
`
`
`
`access to the primary operating system of the computer 12.
`
`
`the core structure of how the program operates would be
`
`
`Preferably, the software program 24 allows the owner to
`
`similar in all items.
`
`change the return information and the owner information,
`[0041] Once the computer 12 security software program
`
`
`
`
`
`after the password or security prompt is satisfied for the
`
`
`
`24 is installed, the monitor of the computer 12 will display
`
`
`
`computer 12. The software program 24 is preferably able to
`
`
`the complete and current recovery/return information that
`
`
`
`
`communicate through a modem (or wireless) to a predeter­
`
`
`
`the program has allowed the owner of the equipment to
`
`
`mined location to transfer the return information to the
`
`interactively enter, change and update at anytime.
`
`
`
`
`
`location to facilitate return of the computer 12 if it becomes
`lost by the owner.
`[0042] This "on the fly" ability to change owner recovery
`
`
`
`
`
`
`information to aid return of equipment is an important
`
`
`
`[0036] The present invention pertains to a method for
`
`
`
`
`
`feature for anyone, including college students who travel
`
`
`
`returning a computer 12 to its owner. The method comprises
`
`
`
`from home to college during different parts of the year,
`
`
`the steps of activating a computer 12. Then there is the step
`
`
`
`people who move, and particularly business people who
`
`
`
`of displaying automatically a return screen 20 on a display
`
`
`travel throughout the world. The recovery/return informa­
`
`
`18 of the computer 12 during or after boot-up of the
`
`
`
`tion would not only allow the display 18 of physical address
`
`
`
`
`computer 12, which displays information concerning owner
`
`
`return information, and owner contact telephone informa­
`
`
`information about who owns the computer 12 and return
`
`tion, but would also provide for international internet based
`
`
`
`information for returning the computer 12 to the owner from
`
`
`recovery through the added display 18 of owner email
`
`
`data stored in the memory 16 of the computer 12.
`
`
`
`
`information, as well as the ability to display an international
`
`
`recovery center web site.
`[0037] Preferably, the displaying step includes the step of
`
`
`
`
`
`
`displaying automatically the return screen 20 before an
`[0043] In addition to increasing chances of return and
`
`
`
`
`
`
`
`
`
`operating screen 26 of the primary operating system of the
`
`
`
`recovery of the stolen or lost equipment by using the
`
`
`
`computer 12. There is preferably the step of displaying the
`
`
`
`
`computer's 12 display 18 monitor, the program is an addi­
`
`
`
`return screen 20 before satisfying a security prompt such as
`
`
`
`
`tional programming layer added into the initial start up
`
`
`
`entering a password into the computer 12 to access the
`
`
`
`program of the computer 12, so that the recovery/return
`
`
`
`
`primary operating system. Preferably, there is the step of
`
`
`
`
`
`display 18 information occurs during or before a password
`
`
`
`changing the return information, and the owner information
`
`
`or security prompt screen. This is an important feature that
`
`
`after the step of satisfying a security prompt such as entering
`
`
`
`
`helps create an environment whereby the individual that
`
`
`the password into the computer 12.
`
`
`
`happens upon a stolen or lost piece of equipment will see the
`
`
`
`
`owner recovery/return information displayed before a pass­
`[0038] The present invention pertains to a computer 12
`
`
`
`
`
`
`word or security prompt screen. By automatically initiating
`
`
`
`readable medium whose contents cause a computer 12 to
`
`
`
`
`this program during or before a user's security prompt, such
`
`
`show who is its owner by performing the steps of activating
`
`
`as a password screen program, the recovery/return program
`
`
`
`a computer 12. Then there is the step of displaying auto­
`
`
`
`will not only increase chances of recovery, but will also
`
`
`
`
`matically a return screen 20 on a display 18 of the computer
`
`
`
`
`
`increase chances that the computer 12 information on the
`
`
`12 during or after boot-up of the computer 12, which
`
`
`
`
`hard drive is protected while the computer 12 is not in the
`
`
`
`
`displays information concerning owner information about
`
`owner's possession.
`
`
`
`
`who owns the computer 12 and return information for
`
`
`
`
`returning the computer 12 to the owner from data stored in
`
`
`
`
`
`
`the memory 16 of the computer 12.
`
`the program is as follows:
`
`[0044] For example, the actual step by step operation of
`
`[0045] (1) Someone finds a lost or stolen computer 12. The
`
`
`
`[0039] Preferably, the displaying step includes the step of
`
`
`
`
`
`
`
`person who finds the computer 12, turns the computer 12 on.
`
`
`
`displaying automatically the return screen 20 before an
`
`
`
`
`
`operating screen 26 of the primary operating system of the
`
`
`[0046] (The software program 24 could be provided
`
`
`
`computer 12. There is preferably the step of displaying the
`
`with a warning sticker that will be placed on the
`
`
`
`return screen 20 before satisfying a security prompt such as
`
`
`
`
`outside of the equipment telling anyone finding the
`
`
`
`entering a password into the computer 12 to access the
`
`
`equipment, about the program and the display recov­
`
`
`
`
`primary operating system. Preferably, there is the step of
`ery screen.)
`
`

`

`US 2005/0071670 Al
`4
`
`
`
`Mar. 31, 2005
`
`[0047] (2) The computer 12 display 18 screen turns on.
`
`
`
`
`However, for one of the Window operating systems for
`
`
`
`
`
`
`The computer 12 security software return/recovery program
`
`
`
`
`example, the first boot-up default screen is a CTR+ALT +
`
`automatically initiates during the computer's 12 boot-up
`
`
`
`DEL screen, and then the program can move to a password
`
`
`
`
`
`screen. In this case, the recovery/return program could
`process.
`
`
`
`
`provide a display 18 dialog screen that would be an addi­
`
`
`
`[0048] (3) As the computer 12 booting up process moves
`
`
`tional layer between the CTR+ALT +DEL dialog box and the
`
`
`
`
`the user to a password or security prompt screen, the
`
`
`
`password dialog box. (See FIG. 4). Other operating systems
`
`
`
`
`
`computer 12 security software program 24 displays a dialog
`
`
`
`
`
`could allow the program to display the recovery dialog box,
`
`
`
`box which includes owner recovery and return information,
`
`
`
`with the password or security prompt at the bottom of the
`
`
`
`so that the person finding the equipment can return the
`
`
`dialog box (so that even though the recovery dialog appli­
`
`
`
`
`equipment either directly or through the international web
`
`
`
`cation is an additional layer during the boot-up, it would
`
`
`
`
`
`site recovery center. The information screen can include any
`
`
`
`appear that the password or security prompt is included
`
`
`
`of the following items of information that the owner would
`
`
`within the same dialog box). (See FIGS. 2 and 3). The
`
`
`
`
`like displayed including but not limited to: contact name,
`
`
`recovery dialog box would occu

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket