`Hafeman
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,021,610 B2
`*Apr. 28, 2015
`
`USOO902161 OB2
`
`COMPUTER RECOVERY OR RETURN
`
`(56)
`
`References Cited
`
`(54)
`
`(71)
`
`Applicant: Carolyn W. Hafeman, Evergreen, CO
`(US)
`
`(72)
`
`Inventor: Carolyn W. Hafeman, Evergreen, CO
`(US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is Subject to a terminal dis
`claimer.
`
`(21)
`
`Appl. No.: 14/087,866
`
`(22)
`
`Filed:
`
`Nov. 22, 2013
`
`(65)
`
`Prior Publication Data
`US 2014/OO82722 A1
`Mar. 20, 2014
`
`(63)
`
`(51)
`
`(52)
`
`(58)
`
`Related U.S. Application Data
`Continuation of application No. 10/945,332, filed on
`Sep. 20, 2004, now Pat. No. 8,601,606, which is a
`continuation-in-part of application No. 10/304.827,
`filed on Nov. 25, 2002, now abandoned.
`
`Int. C.
`H04L 29/06
`H04L 9M32
`G06F 2/3
`G06F2L/88
`U.S. C.
`CPC ................ G06F 21/31 (2013.01); G06F 2 1/88
`(2013.01)
`
`(2006.01)
`(2006.01)
`(2013.01)
`(2013.01)
`
`Field of Classification Search
`None
`See application file for complete search history.
`
`U.S. PATENT DOCUMENTS
`
`5,715,174 A * 2/1998 Cotichini et al. ............. 709,229
`5,748,084 A * 5/1998 Isikoff ..........
`340,568.1
`5,764,892 A * 6/1998 Cain et al. .....
`709/200
`5,802,280 A * 9/1998 Cotichini et al.
`709/200
`5,896.497 A * 4/1999 Halstead ...
`T26,35
`5,987,609 A * 1 1/1999 Hasebe ......
`T26,35
`6,087,937 A *
`7/2000 McCarthy ...
`340,567
`6,244,758 B1* 6/2001 Solymar et al.
`709,224
`6,269,392 B1* 7/2001 Cotichini et al. .
`709/200
`6,300,863 B1 * 10/2001 Cotichini et al. .............. 340, 5.8
`6,300,946 B1 * 10/2001 Lincke et al. ................. 71.5/7OO
`6,507.914 B1* 1/2003 Cain et al. ...
`T26,35
`6,601,095 B1* 7/2003 Duffield et al.
`709,222
`6,609.656 B1* 8/2003 Elledge ......
`235,382
`6,662,023 B1* 12/2003 Helle ...
`455,558
`6,725,379 B1* 4/2004 Dailey ...
`T26,35
`6,804,699 B1 * 10/2004 Henrie .......
`709,203
`6,832,320 B1* 12/2004 Broyles et al.
`... 726/18
`7,818,557 B2 * 10/2010 Bestmann ..
`713/2
`7,818,803 B2 * 10/2010 Gordon ........................... 726/22
`(Continued)
`OTHER PUBLICATIONS
`"2,001 tips: portables—whether you're on the road or back at home,
`here's how to get the most from your portable computer'. Winter
`1998, Windows Magazine, vol. 5, No. 2, p. 149-152.*
`(Continued)
`
`
`
`Primary Examiner — Christopher Revak
`(74) Attorney, Agent, or Firm — Ansel M. Schwartz
`(57)
`ABSTRACT
`A computer return apparatus includes a processor. The appa
`ratus includes a memory connected to the processor. The
`apparatus includes a display. The apparatus includes a return
`screen that the processor automatically causes to appear dur
`ing or after boot-up of the processor on the display, that
`displays information concerning an owner who owns the
`computer, concerning user information about who the user is
`who the computer is assigned to for use, and return informa
`tion for returning the computer to the owner from data stored
`in the memory. A method for displaying information to assist
`with returning a computer to its owner.
`7 Claims, 10 Drawing Sheets
`
`Workstation Locked
`
`Stop Sign
`
`The RETRIEER from World Security Corp
`Enter q valid usernor's grid password to log on this syster,
`
`Sign on
`
`Neme ;
`
`Password:
`
`PRESS;
`
`CANCE
`
`SHUTDON
`
`OK
`Correct P.
`Incorrect P.
`This equipment is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retrisyer Program has bear installed to help
`stop theft, protect information and recover lost or stolen equipment.
`To identify Rightful Owner, Collect Reyard & Avoid Prosecution CALL NOW;
`Oy?ter Info:
`Proparty of ABC Corporation
`Bill Smith, Security Dep
`800-222-34
`iladminicbccorp.com
`
`Assigned To;
`
`Distributed by
`ADSPACE
`
`The Retrieyer
`
`Corrie Haferman
`303-870-8300
`lightguardianmsn.com
`OR SIT
`Web Site:
`Emi:
`Phone:
`
`www.worldsecurityCorp.comfostandfoundfhtml
`lostencfoundworldsecuritycor.com
`1-800-xx-xxxx
`
`Registration f : Xxxxxxxxxxxx xxxxxxxx
`
`ADSPACE
`
`ADSPACE
`
`EX-1025
`US Patent 10,789,393
`
`
`
`US 9,021,610 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5/2011 Cain et al. ....................... 71 Of 15
`7.945,709 B2 *
`8,062,380 B2 * 1 1/2011 Stevens ...
`T26,35
`8,234,359 B2 * 7/2012 Bestmann ..................... 709,222
`8,241,369 B2 * 8/2012 Stevens ........................... 726/35
`8.307,055 B2 * 1 1/2012 Banga .........
`709/222
`8.332.953 B2 * 12/2012 Lemieux et al.
`... 726/26
`8,346,234 B2* 1/2013 Banga et al. .................. 455,418
`8,362.901 B2 *
`1/2013 Jung et al. .................. 340,568.1
`8,418,226 B2
`4/2013 Gardner ............................ T26/3
`
`4/2013 Chase ............................. 726/35
`8.419,806 B2
`8,441,348 B2 * 5/2013 Loveland ........
`340,539.13
`8,510,825 B2 * 8/2013 Tarkhanyan et al. ............ T26, 16
`8,528,105 B1* 9/2013 Miller ............................. T26/28
`8,601,606 B2 * 12/2013 Hafeman ........................ T26/34
`8,721,738 B1* 5/2014 Miller ............................. 726/35
`
`
`
`OTHER PUBLICATIONS
`d.
`-
`g&r
`Crouch, "Tips for keeping a leash on your PDA's data”, Feb. 9, 2001,
`Network World, Dialog text search, p. 1-3.*
`
`* cited by examiner
`
`
`
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 1 of 10
`
`US 9,021,610 B2
`
`18
`
`RETURN
`SCREEN
`
`OPERATING
`SCREEN
`
`PROCESSOR
`
`
`
`
`
`
`
`REMOTE
`STATION
`
`CHANGING
`MEANS
`
`CHANGING
`MEANS
`
`CAUSING
`MEANS
`
`SOFTWARE
`PROGRAM
`
`PRIMARY
`OPERATING
`SYSTEM
`
`
`
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 2 of 10
`
`US 9,021,610 B2
`
`
`
`Workstation Locked
`
`Picture
`Red Stop
`Sign w/white
`Word STOP
`
`The Retriever by WorldsecurityCorp.com
`The Workstation has been locked. This equipment is protected
`against theft by the World Security Corp. International
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment,
`
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW:
`
`Recovery Name/(input from database / required)
`Organization Name / ABC Corp/ input/ not required
`Address 1 / input from database / not required
`Address 2 / input from database / not required
`City State Zip / all of these input from database / not required
`Phone 1 / input from database / requiredPhone 2 / not required
`Email / input from database / requiredFox / not required
`OR VISIT
`WWW, WorldsecurityCorp.com/lostandfound.html
`Picture
`Retriever Logo Email: lostandfoundworldsecurityCorp.com
`Phone : 1-800-XXX-XXXX
`
`Registration f : XXXXXXXXXXXXXXXX (sequential number unique to each
`software license
`
`User:
`
`Password:
`
`OK
`(moves user to operating system with
`correct password)
`
`SHUTDOWN)
`(initiates Operating system
`shutdown)
`
`FIG.2
`
`
`
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 3 of 10
`
`US 9,021,610 B2
`
`Turn Computer
`On
`
`
`
`Recovery / Return
`Dialog Box Oppears On
`monitor's display screen.
`(0ccurs before or with
`Password or Security
`Prompt: Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`(Can appear as a screen after the Recovery / Return Dialog box or preferably at the
`bottom of the Recovery/Return Dialog Box OS in Sample 1 above)
`OK
`SHUTDOWN
`
`
`
`
`
`
`
`
`
`
`
`User enters computer
`Operating system to access
`programs and information.
`
`Windows or Other Operating System Standard
`Shutdown Computer Screen
`(*) Shutdown
`() Shutdown and Reboot
`
`OK
`(Shuts down
`computer)
`
`
`
`FIG.3
`
`CANCEL)
`(Returns back to
`previous screen)
`----------------e-
`Back up to previous Screen.
`
`
`
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 4 of 10
`
`US 9,021,610 B2
`
`Turn Computer
`On
`
`Welcome
`
`Picture
`Windows hand
`with key
`
`
`
`
`
`
`
`
`
`
`
`Press CTRL + ALT + DEL to Logon.
`C 2002-200 World Computer Security Corp
`Distribuited by www.worldsecurityCorp.com
`Telephone : (303) 670-8800
`
`
`
`Picture
`Retriever Logo
`
`Recovery/Return
`Dialog Box appears On
`monitor's display screen,
`(0ccurs before or with
`password Or Security
`Prompt Dialog Box)
`
`
`
`
`
`
`
`Computer Password or
`Security Dialog Box Prompt
`Screen
`(Can appear as a screen after the
`Recovery/Return Dialog box or
`preferably at the bottom of the
`Recovery/Return Dialog Box)
`
`FIG.4
`
`
`
`
`
`
`
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 5 of 10
`
`US 9,021,610 B2
`
`Computer Monitor Screen
`at Operating System Screen
`
`MS Word X
`MS Excel X
`Programs > Administration Section >
`Find X
`DVD Player >
`Help >
`Etc.., X
`Run X
`
`START
`
`FIG. 5
`
`
`
`Windows Logon
`Picture
`Keys
`
`Picture
`Retriever Logo
`
`OK
`
`Enter a valid user name and password to logon to this
`system :
`
`User:
`
`Password:
`
`SHUTDOWN
`
`CANCEL)
`FIC 7
`
`
`
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 6 of 10
`
`US 9,021,610 B2
`
`Workstation Locked
`
`Picture
`The Retriever by WorldsecurityCorp.COm
`Red SP, The workstation has been locked. This equipment is protected
`Sign w/white against theft by the World Security Corp. International
`word STOP
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost Or stolen equipment,
`
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW:
`Recovery Name/(input from database / required)
`Organization Name / ABC Corp/ input/ not required
`Address 1 / input from database / not required
`Address 2 / input from database / not required
`City State Zip / all of these input from database / not required
`Phone 1 / input from database / requiredPhone 2 / not required
`Email / input from database / requiredFox / not required
`OR VISIT
`www.worldsecurityCorp.com/lostandfound.html
`Picture
`Retriever Logo Email: lostandfound0worldsecurityCorp.com
`Phone : 1-800-XXX-XXXX
`
`Registration f
`
`: XXXXXXXXXXXXXXXX
`
`
`
`SHUTDOWN
`
`CANCEL)
`
`FIG.6
`
`
`
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 7 of 10
`
`US 9,021,610 B2
`
`
`
`
`
`CHOMSSWd „OI CENOISSW, HWH10/30NWHO
`
`T???T
`
`
`
`
`
`, --—
`[F] : ?0 AJ9d014
`
`
`
`U.S. Patent
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 8 of 10
`
`US 9,021,610 B2
`US 9,021,610 B2
`
`[_puooeyP3
`[_0-601|
`
`
`
`UOIJDJISIUIWpPY0]paublssyJevalijoyay]
`
`
`
`
`
`jdeqMD]puoMDy“xe/pajoajoidsipupsupaddy:juewpndag
`
`
`
`YOMaUO}SWOS“xa/pajoajouds|punsupeddy:Q|paubissy
`
`0607
`
`
`
`
`
`Oju|AlanooayAdjdsigofpaubissy
`
`spuosss[|&9,{4060]
`
`
`
`JIJDWOINYJAADSUBELIS
`
`C=toy
`
`———————:py
`
`
`
`QYOMSSVdOLCANQISSYJONVHO
`
`
`
`
`
`
`
`
`
`(apdAusrajowojJoqayy0}ppd)Woo'diootunoespyOm’MMM
`
`6IH
`
`
`
`
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 9 of 10
`
`US 9,021,610 B2
`
`
`
`Windows Logon
`
`Stop Sign
`
`The RETRIEVER from World Security Corp
`Enter a valid user name and password to log on this system.
`
`Sign. On
`
`Name:
`
`POSSWOrd:
`
`PRESS :
`
`Correct PW
`Incorrect PW
`This equipment is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theft, protect information and recover lost or stolen equipment.
`To identify Rightful Owner, Collect Reward & Avoid Prosecution CALL NOW:
`Owner Info:
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1234
`itadmin.0abcCorp.com
`
`Assigned To:
`Distributed by
`AD SPACE
`
`Carrie Hafeman
`503-670-8800
`lightguardian.0msn.com
`OR VISIT
`Web Site :
`Email:
`Phone :
`
`AD SPACE
`
`www.worldsecurityCorp.com/lostandfound/html
`lostandfound 0 WorldsecurityCorp.com
`1-800-XXX-XXXX
`
`The Retriever
`
`Registration f : XXXXXXXXXXXXXXXXXXXXXX
`
`FIC 10
`
`
`
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 10 of 10
`
`US 9,021,610 B2
`
`
`
`Workstation Locked
`
`Stop Sign
`
`The RETRIEVER from World Security Corp
`Enter a valid user name and password to log on this system.
`
`Sign. On
`
`Name :
`
`PoSSWOrd:
`
`PRESS :
`
`Correct PW
`Incorrect PW
`This equipment is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theft, protect information and recover lost or stolen equipment.
`To identify Rightful Owner, Collect Reward & Avoid Prosecution CALL NOW:
`Owner Info:
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1254
`ifadmin0abcCorp.com
`
`Assigned To:
`Distributed by
`AD SPACE
`
`Carrie Hafeman
`305-670-8800
`lightduardian.0msn.com
`OR VISIT
`Web Site :
`Emdi :
`Phone :
`
`AD SPACE
`
`www.worldsecurityCorp.com/lostandfound/html
`lostandfound0 WorldsecurityCorp.com
`1-800-XXX-XXXX
`
`The Retriever
`
`Registration f : XXXXXXXXXXXXXXXXXXXXXX
`
`FIG 11
`
`
`
`US 9,021,610 B2
`
`1.
`COMPUTER RECOVERY OR RETURN
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This is a continuation of U.S. patent application Ser. No.
`10/945,332 filed Sep. 20, 2004, now U.S. Pat. No. 8,601,606,
`which is a continuation-in-part of U.S. patent application Ser.
`No. 10/304.827 filed Nov. 25, 2002, which is now abandoned,
`all of which are incorporated by reference herein.
`
`10
`
`FIELD OF THE INVENTION
`
`The present invention is related to the return of lost or
`stolen computers. More specifically, the present invention is
`related to the return of lost or stolen computers using a recov
`ery screen that appears during or after boot-up of the com
`puter.
`
`15
`
`BACKGROUND OF THE INVENTION
`
`2
`tem to get the phone number that the stolen equipment
`is accessing. Using the phone number, the recovery
`system then can try to get a map of where the com
`puter is. Some of these computer security recovery
`programs can also attempt to locate stolen computers
`through an IP address. Some of these computer secu
`rity recovery software programs, can actually attempt
`to seize the communication between the stolen com
`puter and the recovery center and delete selected files
`to help protect the owners confidential information.
`Products like these include CompuTrace, PC Phone
`Home, Cyber Angel, LapTrak and Luceria.
`The present invention is also designed for the purpose of
`recovering lost or stolen equipment, but the method is
`distinctively different and unique from the current
`methods. The present invention does not rely on the
`use of the computer modem. The present invention
`uses a layered program in the boot-up process to pro
`vide a display of the proper owner recovery and return
`information using the computer's own monitor or
`screen. The present invention is also different and
`Superior to the above Software tracking products, in
`helping to accomplish international recovery. None of
`the above products to date have been able to use the
`modem phone or IP system to track stolen equipment
`internationally. The present invention provides inter
`national recovery by displaying owner email informa
`tion as well as providing recovery help through an
`international recovery internet web site.
`There are other differences as well in how these pro
`grams try to also protect the information on the hard
`drive. The present invention automatically initiates
`during the boot-up process of the equipment, in order
`to display the recovery/return information before a
`security prompt screen to always help protect the
`owner's confidential information on the hard drive.
`Some of the programs above do nothing to protect the
`user information. Others like LapTrak include a Hide
`A-File feature that an owner can access after the user
`enters the operating system. CyberAngel includes an
`encryption feature. Luceria includes the ability to
`delete pre-selected files from the recovery center. By
`layering this computer security application strategi
`cally before or during a security prompt in the boot-up
`process, this application provides a unique and differ
`ent method to help protect owner information.
`(An example of patents for these types of products
`would be the CompuTrace U.S. Pat. Nos. 5,715,174,
`5,764,892, and 5,802,280).
`(3) Bios Based Password Identification systems.
`There are some computers that are sold with Bios based
`identification systems included. These products acti
`vate immediately when a computer is turned on, and
`prompt the user for a password before accessing the
`data on the computer.
`The present invention is very different and unique from
`the Bios based program, for many reasons. Most
`importantly the bios based password identification
`products are built into the hardware of the computer
`equipment—not the hard drive. In other words, if you
`removed the hard drive from a stolen or lost laptop,
`and inserted the stolen hard drive into a different
`laptop, you would bypass the bios based password
`identification system, and the bios based password
`identification system would remain with the original
`equipment. Thus, the Bios Based Password Identifi
`
`Current methods of computer return or recovery products
`include:
`(1) Physical labels that attach to the outside hardware of the
`computer equipment.
`These hardware labels can contain custom recovery
`information, but because they are hardware based,
`they can not be interactively changed by the owner.
`Also, since they do not have any ability to affect the
`computer boot-up process, they can do nothing to help
`protect the confidential owner information on the hard
`drive. An example of a well known physical hard
`ware/recovery label is the STOP Tag by Security
`Tracking of Office Property in Connecticut. This
`labeling system has been patented in France, the US,
`and other countries. The product can be easily
`defeated by removing the physical label. In the case of
`STOP Tag which includes a recovery mark which
`states “STOLEN PROPERTY underneath the label,
`a new label can be simply added over the recovery
`mark to hide the STOLEN PROPERTY sign. (The
`Security Tracking of Office Property equipment
`recovery patentis U.S. Pat. No. 5,163,711 This patent
`actually refers to how the labels adhere to the equip
`ment—but this is their patent).
`The computer security recovery/return program of the
`present invention utilizes this type of hardware recov
`ery approach to a small degree, but is greatly different
`from this system, because this is a software program
`rather than a hardware solution. Additionally, the
`present invention is greatly Superior, since the owner
`can interactively customize the return/recovery infor
`mation displayed at any time, and the present inven
`tion also helps protect the important, confidential
`owner information on the hard drive, by the position
`ing of the program layer in the equipment boot-up
`process.
`(2) Computer Software Programs that attempt recovery
`through the use of the modem.
`There are several patented computer security software
`products on the market today that are designed for the
`purpose of recovering lost or stolen equipment. These
`programs use the computer's modem to regularly call
`a recovery center. Then once a computer is stolen, the
`recovery center waits for the stolen computer to call
`in. When the computer modem calls in, the recovery
`centers use something similar to the reverse 911 sys
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`
`
`3
`cation system can identify the computer hardware, but
`not the hard drive (the most important part of the
`computer equipment).
`In addition, the Bios Based Password Identification sys
`tems are designed as a unique method for providing an
`additional layer of password protection to the equip
`ment hardware, but are not designed for recovery or
`return. There is no design for including complete
`owner information, no recovery information dis
`played, no effective protection of the information on
`the hard drive, no effective method for the recovery or
`return of the hard drive the most important item that
`a consumer would want back. In fact the Bios Pass
`word Identification product occurs before allowing
`the hard drive to boot up. The present invention is
`unique because it is an application Software program
`that provides its layer of protection during the boot-up
`process (not before), and thus allows the Security
`product to move with the hard drive, the most critical
`part of the computer.
`
`5
`
`10
`
`15
`
`SUMMARY OF THE INVENTION
`
`25
`
`30
`
`35
`
`40
`
`The present invention pertains to a computer return appa
`ratus. The apparatus comprises a processor. The apparatus
`comprises a memory connected to the processor. The appa
`ratus comprises a display. The apparatus comprises a return
`screen that the processor automatically causes to appear dur
`ing or after boot-up of the processor on the display, that
`displays ownership information concerning who owns the
`computer and return information for returning the computer
`to the owner from data stored in the memory.
`The present invention pertains to a method for returning a
`computer to its owner. The method comprises the steps of
`activating a computer. Then there is the step of displaying
`automatically a return screen on a display of the computer
`during or after boot-up of the computer, which displays infor
`mation concerning owner information about who owns the
`computer and return information for returning the computer
`to the owner from data stored in the memory of the computer.
`The present invention pertains to a computer readable
`medium whose contents cause a computer to show who is its
`45
`owner by performing the steps of activating a computer. Then
`there is the step of displaying automatically a return screen on
`a display of the computer during or after boot-up of the
`computer, which displays information concerning owner
`information about who owns the computer and return infor
`mation for returning the computer to the owner from data
`stored in the memory of the computer.
`The present invention pertains to a computer return appa
`ratus. The apparatus comprises a processor. The apparatus
`comprises a memory connected to the processor. The appa
`ratus comprises a display. The apparatus comprises a return
`screen that the processor automatically causes to appear dur
`ing or after boot-up of the processor on the display, that
`displays information concerning an owner who owns the
`computer, concerning user information about who the user is
`who the computer is assigned to for use, and return informa
`tion for returning the computer to the owner from data stored
`in the memory.
`The present invention pertains to a method for displaying
`information to assist with returning a computer to its owner.
`The method comprises the steps of activating a computer.
`There is the step of displaying automatically a return screen
`
`50
`
`55
`
`60
`
`65
`
`US 9,021,610 B2
`
`4
`on a display of the computer during or after boot-up which
`displays information concerning owner information about
`who owns the computer, concerning user information about
`who the user is who the computer is assigned to for use, and
`return information for returning the computer to the owner
`from data stored in a memory of the computer.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`In the accompanying drawings, the preferred embodiment
`of the invention and preferred methods of practicing the
`invention are illustrated in which:
`FIG. 1 is a schematic representation of the apparatus of the
`present invention.
`FIG. 2 is a representation of a return/recovery dialog box of
`an embodiment of the present invention.
`FIG. 3 is a flow chart regarding an embodiment of the
`present invention.
`FIG. 4 is a flow chart regarding a second embodiment of the
`present invention.
`FIG. 5 is a representation of an administration program
`section of the present invention.
`FIG. 6 is a representation of a return screen of the present
`invention.
`FIG. 7 is an example of a password screen utilized by the
`present invention.
`FIG. 8 is a return administration screen of the present
`invention.
`FIG. 9 is a second return administration screen of the
`present invention.
`FIG. 10 is a third return administration screen of the
`present invention.
`FIG. 11 is a fourth return administration screen of the
`present invention.
`
`DETAILED DESCRIPTION
`
`Referring now to the drawings wherein like reference
`numerals refer to similar or identical parts throughout the
`several views, and more specifically to FIG. 1 thereof, there is
`shown a computer 12 return apparatus 10. The apparatus 10
`comprises a processor 14. The apparatus 10 comprises a
`memory 16 connected to the processor 14. The apparatus 10
`comprises a display 18. The apparatus 10 comprises a return
`screen 20 that the processor 14 automatically causes to appear
`during or after boot-up of the processor 14 on the display 18,
`that displays ownership information concerning who owns
`the computer 12 and return information for returning the
`computer 12 to the owner from data stored in the memory 16.
`The Owner is defined as the person or entity that owns, rents,
`or licenses the Retriever, and/or the person or entity who
`controls the recovery service. The Owner has greater control
`over the computer 12 than the user. This could include, but not
`be limited to, an employee of a company that owns the com
`puter 12, or an agent of the owner or a friend that has the
`permission of the owner to use or have or recover the com
`puter 12.
`Preferably, the apparatus 10 includes means for causing the
`screen to appear on the display 18 with the owner and return
`information. The causing means 22 is stored in the memory
`16. The causing means 22 preferably is a software program
`24. Preferably, the memory 16 includes a primary operating
`
`
`
`5
`system having an operating screen 26 for the computer 12,
`and the return screen 20 appears on the display 18 before the
`operating screen 26 of the operating system appears on the
`display 18.
`The Software program 24 preferably appears before a secu
`rity prompt such as a password to be entered to obtain access
`to the primary operating system of the computer 12. Prefer
`ably, the Software program 24 allows the owner to change the
`return information and the owner information, after the pass
`word or security prompt is satisfied for the computer 12. The
`Software program 24 is preferably able to communicate
`through a modem (or wireless) to a predetermined location to
`transfer the return information to the location to facilitate
`return of the computer 12 if it becomes lost by the owner.
`The present invention pertains to a method for returning a
`computer 12 to its owner. The method comprises the steps of
`activating a computer 12. Then there is the step of displaying
`automatically a return screen 20 on a display 18 of the com
`puter 12 during or after boot-up of the computer 12, which
`displays information concerning owner information about
`who owns the computer 12 and return information for return
`ing the computer 12 to the owner from data stored in the
`memory 16 of the computer 12.
`Preferably, the displaying step includes the step of display
`ing automatically the return screen 20 before an operating
`screen 26 of the primary operating system of the computer 12.
`There is preferably the step of displaying the return screen 20
`before satisfying a security prompt such as entering a pass
`word into the computer 12 to access the primary operating
`system. Preferably, there is the step of changing the return
`information, and the owner information after the step of sat
`isfying a security prompt such as entering the password into
`the computer 12.
`The present invention pertains to a computer 12 readable
`medium whose contents cause a computer 12 to show who is
`its owner by performing the steps of activating a computer 12.
`Then there is the step of displaying automatically a return
`screen 20 on a display 18 of the computer 12 during or after
`boot-up of the computer 12, which displays information con
`cerning owner information about who owns the computer 12
`and return information for returning the computer 12 to the
`owner from data stored in the memory 16 of the computer 12.
`Preferably, the displaying step includes the step of display
`ing automatically the return screen 20 before an operating
`screen 26 of the primary operating system of the computer 12.
`There is preferably the step of displaying the return screen 20
`before satisfying a security prompt such as entering a pass
`word into the computer 12 to access the primary operating
`system. Preferably, there is the step of changing the return
`information and the owner information after the step of sat
`isfying a security prompt such as entering a password into the
`computer 12.
`In the operation of the invention, first, the owner of the
`computer 12 would install the computer 12 security recovery/
`return Software program 24 application. The program could
`be installed to work on any type of computer 12 screen includ
`ing but not limited to, PC's, laptops, handheld computers
`(such as blackberries, palm pilots), UPS computerized hand
`held tracking display units, and even cellphone displays. The
`unique recovery/return computer 12 security program could
`in fact, be installed and used by any type of computer 12 that
`utilized a monitor display Screen. The Software application
`program provides an additional layer to the existing operating
`system of each computer 12. The coding language used for
`the software program 24 could and would vary depending
`upon the computer 12 equipment, but the core structure of
`how the program operates would be similar in all items.
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 9,021,610 B2
`
`10
`
`15
`
`6
`Once the computer 12 security software program 24 is
`installed, the monitor of the computer 12 will display the
`complete and current recovery/return information that the
`program has allowed the owner of the equipment to interac
`tively enter, change and update at anytime.
`This “on the fly' ability to change owner recovery infor
`mation to aid return of equipment is an important feature for
`anyone, including college students who travel from home to
`college during different parts of the year, people who move,
`and particularly business people who travel throughout the
`world. The recovery/return information would not only allow
`the display 18 of physical address return information, and
`owner contact telephone information, but would also provide
`for international internet based recovery through the added
`display 18 of owner email information, as well as the ability
`to display an international recovery center web site.
`In addition to increasing chances of return and recovery of
`the stolen or lost equipment by using the computer's 12
`display 18 monitor, the program is an additional program
`ming layer added into the initial start up program of the
`computer 12, so that the recovery/return display 18 informa
`tion occurs during or before a password or security prompt
`screen. This is an important feature that helps create an envi
`ronment whereby the individual that happens upon a stolen or
`lost piece of equipment will see the owner recovery/return
`information displayed before a password or security prompt
`screen. By automatically initiating this program during or
`before a user's security prompt, such as a password Screen
`program, the recovery/return program will not only increase
`chances of recovery, but will also increase chances that the
`computer 12 information on the hard drive is protected while
`the computer 12 is not in the owner's possession.
`For example, the actual step by Step operation of the pro
`gram is as follows:
`(1) Someone finds a lost or stolen computer 12. The person
`who finds the computer 12, turns the computer 12 on.
`(The software program 24 could be provided with a
`warning sticker that will be placed on the outside of
`the equipment telling anyone finding the equipment,
`about the program and the display recovery screen.)
`(2) The computer 12 display 18 screen turns on. The com
`puter 12 security software return/recovery program
`automatically initiates during the computer's 12 boot-up
`process.
`(3) As the computer 12 booting up process moves the user
`to a password or security prompt screen, the computer
`12 security software program 24 displays a dialog box
`which includes owner recovery and return information,
`So that the person finding the equipment can return the
`equipment either directly or through the international
`web site recovery center. The information screen can
`include any of the following items of information that
`the owner would like displayed including but not limited
`to: contact name, organization name, owner address,
`owner telephone number, owner email, international
`web site recovery site, international recovery email
`information, unique program serial/registration number.
`(See FIG. 2).
`Virtually all of this information would have been inter
`actively inputted by the owner, and the owner would
`have control over how much recovery information is
`displayed.