throbber
(12) United States Patent
`Hafeman
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,021,610 B2
`*Apr. 28, 2015
`
`USOO902161 OB2
`
`COMPUTER RECOVERY OR RETURN
`
`(56)
`
`References Cited
`
`(54)
`
`(71)
`
`Applicant: Carolyn W. Hafeman, Evergreen, CO
`(US)
`
`(72)
`
`Inventor: Carolyn W. Hafeman, Evergreen, CO
`(US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is Subject to a terminal dis
`claimer.
`
`(21)
`
`Appl. No.: 14/087,866
`
`(22)
`
`Filed:
`
`Nov. 22, 2013
`
`(65)
`
`Prior Publication Data
`US 2014/OO82722 A1
`Mar. 20, 2014
`
`(63)
`
`(51)
`
`(52)
`
`(58)
`
`Related U.S. Application Data
`Continuation of application No. 10/945,332, filed on
`Sep. 20, 2004, now Pat. No. 8,601,606, which is a
`continuation-in-part of application No. 10/304.827,
`filed on Nov. 25, 2002, now abandoned.
`
`Int. C.
`H04L 29/06
`H04L 9M32
`G06F 2/3
`G06F2L/88
`U.S. C.
`CPC ................ G06F 21/31 (2013.01); G06F 2 1/88
`(2013.01)
`
`(2006.01)
`(2006.01)
`(2013.01)
`(2013.01)
`
`Field of Classification Search
`None
`See application file for complete search history.
`
`U.S. PATENT DOCUMENTS
`
`5,715,174 A * 2/1998 Cotichini et al. ............. 709,229
`5,748,084 A * 5/1998 Isikoff ..........
`340,568.1
`5,764,892 A * 6/1998 Cain et al. .....
`709/200
`5,802,280 A * 9/1998 Cotichini et al.
`709/200
`5,896.497 A * 4/1999 Halstead ...
`T26,35
`5,987,609 A * 1 1/1999 Hasebe ......
`T26,35
`6,087,937 A *
`7/2000 McCarthy ...
`340,567
`6,244,758 B1* 6/2001 Solymar et al.
`709,224
`6,269,392 B1* 7/2001 Cotichini et al. .
`709/200
`6,300,863 B1 * 10/2001 Cotichini et al. .............. 340, 5.8
`6,300,946 B1 * 10/2001 Lincke et al. ................. 71.5/7OO
`6,507.914 B1* 1/2003 Cain et al. ...
`T26,35
`6,601,095 B1* 7/2003 Duffield et al.
`709,222
`6,609.656 B1* 8/2003 Elledge ......
`235,382
`6,662,023 B1* 12/2003 Helle ...
`455,558
`6,725,379 B1* 4/2004 Dailey ...
`T26,35
`6,804,699 B1 * 10/2004 Henrie .......
`709,203
`6,832,320 B1* 12/2004 Broyles et al.
`... 726/18
`7,818,557 B2 * 10/2010 Bestmann ..
`713/2
`7,818,803 B2 * 10/2010 Gordon ........................... 726/22
`(Continued)
`OTHER PUBLICATIONS
`"2,001 tips: portables—whether you're on the road or back at home,
`here's how to get the most from your portable computer'. Winter
`1998, Windows Magazine, vol. 5, No. 2, p. 149-152.*
`(Continued)
`
`
`
`Primary Examiner — Christopher Revak
`(74) Attorney, Agent, or Firm — Ansel M. Schwartz
`(57)
`ABSTRACT
`A computer return apparatus includes a processor. The appa
`ratus includes a memory connected to the processor. The
`apparatus includes a display. The apparatus includes a return
`screen that the processor automatically causes to appear dur
`ing or after boot-up of the processor on the display, that
`displays information concerning an owner who owns the
`computer, concerning user information about who the user is
`who the computer is assigned to for use, and return informa
`tion for returning the computer to the owner from data stored
`in the memory. A method for displaying information to assist
`with returning a computer to its owner.
`7 Claims, 10 Drawing Sheets
`
`Workstation Locked
`
`Stop Sign
`
`The RETRIEER from World Security Corp
`Enter q valid usernor's grid password to log on this syster,
`
`Sign on
`
`Neme ;
`
`Password:
`
`PRESS;
`
`CANCE
`
`SHUTDON
`
`OK
`Correct P.
`Incorrect P.
`This equipment is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retrisyer Program has bear installed to help
`stop theft, protect information and recover lost or stolen equipment.
`To identify Rightful Owner, Collect Reyard & Avoid Prosecution CALL NOW;
`Oy?ter Info:
`Proparty of ABC Corporation
`Bill Smith, Security Dep
`800-222-34
`iladminicbccorp.com
`
`Assigned To;
`
`Distributed by
`ADSPACE
`
`The Retrieyer
`
`Corrie Haferman
`303-870-8300
`lightguardianmsn.com
`OR SIT
`Web Site:
`Emi:
`Phone:
`
`www.worldsecurityCorp.comfostandfoundfhtml
`lostencfoundworldsecuritycor.com
`1-800-xx-xxxx
`
`Registration f : Xxxxxxxxxxxx xxxxxxxx
`
`ADSPACE
`
`ADSPACE
`
`EX-1025
`US Patent 10,789,393
`
`

`

`US 9,021,610 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5/2011 Cain et al. ....................... 71 Of 15
`7.945,709 B2 *
`8,062,380 B2 * 1 1/2011 Stevens ...
`T26,35
`8,234,359 B2 * 7/2012 Bestmann ..................... 709,222
`8,241,369 B2 * 8/2012 Stevens ........................... 726/35
`8.307,055 B2 * 1 1/2012 Banga .........
`709/222
`8.332.953 B2 * 12/2012 Lemieux et al.
`... 726/26
`8,346,234 B2* 1/2013 Banga et al. .................. 455,418
`8,362.901 B2 *
`1/2013 Jung et al. .................. 340,568.1
`8,418,226 B2
`4/2013 Gardner ............................ T26/3
`
`4/2013 Chase ............................. 726/35
`8.419,806 B2
`8,441,348 B2 * 5/2013 Loveland ........
`340,539.13
`8,510,825 B2 * 8/2013 Tarkhanyan et al. ............ T26, 16
`8,528,105 B1* 9/2013 Miller ............................. T26/28
`8,601,606 B2 * 12/2013 Hafeman ........................ T26/34
`8,721,738 B1* 5/2014 Miller ............................. 726/35
`
`
`
`OTHER PUBLICATIONS
`d.
`-
`g&r
`Crouch, "Tips for keeping a leash on your PDA's data”, Feb. 9, 2001,
`Network World, Dialog text search, p. 1-3.*
`
`* cited by examiner
`
`

`

`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 1 of 10
`
`US 9,021,610 B2
`
`18
`
`RETURN
`SCREEN
`
`OPERATING
`SCREEN
`
`PROCESSOR
`
`
`
`
`
`
`
`REMOTE
`STATION
`
`CHANGING
`MEANS
`
`CHANGING
`MEANS
`
`CAUSING
`MEANS
`
`SOFTWARE
`PROGRAM
`
`PRIMARY
`OPERATING
`SYSTEM
`
`

`

`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 2 of 10
`
`US 9,021,610 B2
`
`
`
`Workstation Locked
`
`Picture
`Red Stop
`Sign w/white
`Word STOP
`
`The Retriever by WorldsecurityCorp.com
`The Workstation has been locked. This equipment is protected
`against theft by the World Security Corp. International
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost or stolen equipment,
`
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW:
`
`Recovery Name/(input from database / required)
`Organization Name / ABC Corp/ input/ not required
`Address 1 / input from database / not required
`Address 2 / input from database / not required
`City State Zip / all of these input from database / not required
`Phone 1 / input from database / requiredPhone 2 / not required
`Email / input from database / requiredFox / not required
`OR VISIT
`WWW, WorldsecurityCorp.com/lostandfound.html
`Picture
`Retriever Logo Email: lostandfoundworldsecurityCorp.com
`Phone : 1-800-XXX-XXXX
`
`Registration f : XXXXXXXXXXXXXXXX (sequential number unique to each
`software license
`
`User:
`
`Password:
`
`OK
`(moves user to operating system with
`correct password)
`
`SHUTDOWN)
`(initiates Operating system
`shutdown)
`
`FIG.2
`
`

`

`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 3 of 10
`
`US 9,021,610 B2
`
`Turn Computer
`On
`
`
`
`Recovery / Return
`Dialog Box Oppears On
`monitor's display screen.
`(0ccurs before or with
`Password or Security
`Prompt: Dialog Box)
`
`Computer Password or Security Prompt Dialog Box Prompt Screen
`(Can appear as a screen after the Recovery / Return Dialog box or preferably at the
`bottom of the Recovery/Return Dialog Box OS in Sample 1 above)
`OK
`SHUTDOWN
`
`
`
`
`
`
`
`
`
`
`
`User enters computer
`Operating system to access
`programs and information.
`
`Windows or Other Operating System Standard
`Shutdown Computer Screen
`(*) Shutdown
`() Shutdown and Reboot
`
`OK
`(Shuts down
`computer)
`
`
`
`FIG.3
`
`CANCEL)
`(Returns back to
`previous screen)
`----------------e-
`Back up to previous Screen.
`
`

`

`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 4 of 10
`
`US 9,021,610 B2
`
`Turn Computer
`On
`
`Welcome
`
`Picture
`Windows hand
`with key
`
`
`
`
`
`
`
`
`
`
`
`Press CTRL + ALT + DEL to Logon.
`C 2002-200 World Computer Security Corp
`Distribuited by www.worldsecurityCorp.com
`Telephone : (303) 670-8800
`
`
`
`Picture
`Retriever Logo
`
`Recovery/Return
`Dialog Box appears On
`monitor's display screen,
`(0ccurs before or with
`password Or Security
`Prompt Dialog Box)
`
`
`
`
`
`
`
`Computer Password or
`Security Dialog Box Prompt
`Screen
`(Can appear as a screen after the
`Recovery/Return Dialog box or
`preferably at the bottom of the
`Recovery/Return Dialog Box)
`
`FIG.4
`
`
`
`
`
`

`

`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 5 of 10
`
`US 9,021,610 B2
`
`Computer Monitor Screen
`at Operating System Screen
`
`MS Word X
`MS Excel X
`Programs > Administration Section >
`Find X
`DVD Player >
`Help >
`Etc.., X
`Run X
`
`START
`
`FIG. 5
`
`
`
`Windows Logon
`Picture
`Keys
`
`Picture
`Retriever Logo
`
`OK
`
`Enter a valid user name and password to logon to this
`system :
`
`User:
`
`Password:
`
`SHUTDOWN
`
`CANCEL)
`FIC 7
`
`

`

`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 6 of 10
`
`US 9,021,610 B2
`
`Workstation Locked
`
`Picture
`The Retriever by WorldsecurityCorp.COm
`Red SP, The workstation has been locked. This equipment is protected
`Sign w/white against theft by the World Security Corp. International
`word STOP
`Registration and Recovery System. The Retriever Program has
`been installed to help stop theft, protect information and recover
`lost Or stolen equipment,
`
`To Indentify Rightful Owner & Avoid Prosecution CALL NOW:
`Recovery Name/(input from database / required)
`Organization Name / ABC Corp/ input/ not required
`Address 1 / input from database / not required
`Address 2 / input from database / not required
`City State Zip / all of these input from database / not required
`Phone 1 / input from database / requiredPhone 2 / not required
`Email / input from database / requiredFox / not required
`OR VISIT
`www.worldsecurityCorp.com/lostandfound.html
`Picture
`Retriever Logo Email: lostandfound0worldsecurityCorp.com
`Phone : 1-800-XXX-XXXX
`
`Registration f
`
`: XXXXXXXXXXXXXXXX
`
`
`
`SHUTDOWN
`
`CANCEL)
`
`FIG.6
`
`

`

`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 7 of 10
`
`US 9,021,610 B2
`
`
`
`
`
`CHOMSSWd „OI CENOISSW, HWH10/30NWHO
`
`T???T
`
`
`
`
`
`, --—
`[F] : ?0 AJ9d014
`
`

`

`U.S. Patent
`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 8 of 10
`
`US 9,021,610 B2
`US 9,021,610 B2
`
`[_puooeyP3
`[_0-601|
`
`
`
`UOIJDJISIUIWpPY0]paublssyJevalijoyay]
`
`
`
`
`
`jdeqMD]puoMDy“xe/pajoajoidsipupsupaddy:juewpndag
`
`
`
`YOMaUO}SWOS“xa/pajoajouds|punsupeddy:Q|paubissy
`
`0607
`
`
`
`
`
`Oju|AlanooayAdjdsigofpaubissy
`
`spuosss[|&9,{4060]
`
`
`
`JIJDWOINYJAADSUBELIS
`
`C=toy
`
`———————:py
`
`
`
`QYOMSSVdOLCANQISSYJONVHO
`
`
`
`
`
`
`
`
`
`(apdAusrajowojJoqayy0}ppd)Woo'diootunoespyOm’MMM
`
`6IH
`
`
`

`

`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 9 of 10
`
`US 9,021,610 B2
`
`
`
`Windows Logon
`
`Stop Sign
`
`The RETRIEVER from World Security Corp
`Enter a valid user name and password to log on this system.
`
`Sign. On
`
`Name:
`
`POSSWOrd:
`
`PRESS :
`
`Correct PW
`Incorrect PW
`This equipment is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theft, protect information and recover lost or stolen equipment.
`To identify Rightful Owner, Collect Reward & Avoid Prosecution CALL NOW:
`Owner Info:
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1234
`itadmin.0abcCorp.com
`
`Assigned To:
`Distributed by
`AD SPACE
`
`Carrie Hafeman
`503-670-8800
`lightguardian.0msn.com
`OR VISIT
`Web Site :
`Email:
`Phone :
`
`AD SPACE
`
`www.worldsecurityCorp.com/lostandfound/html
`lostandfound 0 WorldsecurityCorp.com
`1-800-XXX-XXXX
`
`The Retriever
`
`Registration f : XXXXXXXXXXXXXXXXXXXXXX
`
`FIC 10
`
`

`

`U.S. Patent
`
`Apr. 28, 2015
`
`Sheet 10 of 10
`
`US 9,021,610 B2
`
`
`
`Workstation Locked
`
`Stop Sign
`
`The RETRIEVER from World Security Corp
`Enter a valid user name and password to log on this system.
`
`Sign. On
`
`Name :
`
`PoSSWOrd:
`
`PRESS :
`
`Correct PW
`Incorrect PW
`This equipment is protected against theft by the World Security Corp International
`Registration and Recovery System. The Retriever Program has been installed to help
`stop theft, protect information and recover lost or stolen equipment.
`To identify Rightful Owner, Collect Reward & Avoid Prosecution CALL NOW:
`Owner Info:
`Property of ABC Corporation
`Bill Smith, Security Dept
`800-222-1254
`ifadmin0abcCorp.com
`
`Assigned To:
`Distributed by
`AD SPACE
`
`Carrie Hafeman
`305-670-8800
`lightduardian.0msn.com
`OR VISIT
`Web Site :
`Emdi :
`Phone :
`
`AD SPACE
`
`www.worldsecurityCorp.com/lostandfound/html
`lostandfound0 WorldsecurityCorp.com
`1-800-XXX-XXXX
`
`The Retriever
`
`Registration f : XXXXXXXXXXXXXXXXXXXXXX
`
`FIG 11
`
`

`

`US 9,021,610 B2
`
`1.
`COMPUTER RECOVERY OR RETURN
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This is a continuation of U.S. patent application Ser. No.
`10/945,332 filed Sep. 20, 2004, now U.S. Pat. No. 8,601,606,
`which is a continuation-in-part of U.S. patent application Ser.
`No. 10/304.827 filed Nov. 25, 2002, which is now abandoned,
`all of which are incorporated by reference herein.
`
`10
`
`FIELD OF THE INVENTION
`
`The present invention is related to the return of lost or
`stolen computers. More specifically, the present invention is
`related to the return of lost or stolen computers using a recov
`ery screen that appears during or after boot-up of the com
`puter.
`
`15
`
`BACKGROUND OF THE INVENTION
`
`2
`tem to get the phone number that the stolen equipment
`is accessing. Using the phone number, the recovery
`system then can try to get a map of where the com
`puter is. Some of these computer security recovery
`programs can also attempt to locate stolen computers
`through an IP address. Some of these computer secu
`rity recovery software programs, can actually attempt
`to seize the communication between the stolen com
`puter and the recovery center and delete selected files
`to help protect the owners confidential information.
`Products like these include CompuTrace, PC Phone
`Home, Cyber Angel, LapTrak and Luceria.
`The present invention is also designed for the purpose of
`recovering lost or stolen equipment, but the method is
`distinctively different and unique from the current
`methods. The present invention does not rely on the
`use of the computer modem. The present invention
`uses a layered program in the boot-up process to pro
`vide a display of the proper owner recovery and return
`information using the computer's own monitor or
`screen. The present invention is also different and
`Superior to the above Software tracking products, in
`helping to accomplish international recovery. None of
`the above products to date have been able to use the
`modem phone or IP system to track stolen equipment
`internationally. The present invention provides inter
`national recovery by displaying owner email informa
`tion as well as providing recovery help through an
`international recovery internet web site.
`There are other differences as well in how these pro
`grams try to also protect the information on the hard
`drive. The present invention automatically initiates
`during the boot-up process of the equipment, in order
`to display the recovery/return information before a
`security prompt screen to always help protect the
`owner's confidential information on the hard drive.
`Some of the programs above do nothing to protect the
`user information. Others like LapTrak include a Hide
`A-File feature that an owner can access after the user
`enters the operating system. CyberAngel includes an
`encryption feature. Luceria includes the ability to
`delete pre-selected files from the recovery center. By
`layering this computer security application strategi
`cally before or during a security prompt in the boot-up
`process, this application provides a unique and differ
`ent method to help protect owner information.
`(An example of patents for these types of products
`would be the CompuTrace U.S. Pat. Nos. 5,715,174,
`5,764,892, and 5,802,280).
`(3) Bios Based Password Identification systems.
`There are some computers that are sold with Bios based
`identification systems included. These products acti
`vate immediately when a computer is turned on, and
`prompt the user for a password before accessing the
`data on the computer.
`The present invention is very different and unique from
`the Bios based program, for many reasons. Most
`importantly the bios based password identification
`products are built into the hardware of the computer
`equipment—not the hard drive. In other words, if you
`removed the hard drive from a stolen or lost laptop,
`and inserted the stolen hard drive into a different
`laptop, you would bypass the bios based password
`identification system, and the bios based password
`identification system would remain with the original
`equipment. Thus, the Bios Based Password Identifi
`
`Current methods of computer return or recovery products
`include:
`(1) Physical labels that attach to the outside hardware of the
`computer equipment.
`These hardware labels can contain custom recovery
`information, but because they are hardware based,
`they can not be interactively changed by the owner.
`Also, since they do not have any ability to affect the
`computer boot-up process, they can do nothing to help
`protect the confidential owner information on the hard
`drive. An example of a well known physical hard
`ware/recovery label is the STOP Tag by Security
`Tracking of Office Property in Connecticut. This
`labeling system has been patented in France, the US,
`and other countries. The product can be easily
`defeated by removing the physical label. In the case of
`STOP Tag which includes a recovery mark which
`states “STOLEN PROPERTY underneath the label,
`a new label can be simply added over the recovery
`mark to hide the STOLEN PROPERTY sign. (The
`Security Tracking of Office Property equipment
`recovery patentis U.S. Pat. No. 5,163,711 This patent
`actually refers to how the labels adhere to the equip
`ment—but this is their patent).
`The computer security recovery/return program of the
`present invention utilizes this type of hardware recov
`ery approach to a small degree, but is greatly different
`from this system, because this is a software program
`rather than a hardware solution. Additionally, the
`present invention is greatly Superior, since the owner
`can interactively customize the return/recovery infor
`mation displayed at any time, and the present inven
`tion also helps protect the important, confidential
`owner information on the hard drive, by the position
`ing of the program layer in the equipment boot-up
`process.
`(2) Computer Software Programs that attempt recovery
`through the use of the modem.
`There are several patented computer security software
`products on the market today that are designed for the
`purpose of recovering lost or stolen equipment. These
`programs use the computer's modem to regularly call
`a recovery center. Then once a computer is stolen, the
`recovery center waits for the stolen computer to call
`in. When the computer modem calls in, the recovery
`centers use something similar to the reverse 911 sys
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`

`

`3
`cation system can identify the computer hardware, but
`not the hard drive (the most important part of the
`computer equipment).
`In addition, the Bios Based Password Identification sys
`tems are designed as a unique method for providing an
`additional layer of password protection to the equip
`ment hardware, but are not designed for recovery or
`return. There is no design for including complete
`owner information, no recovery information dis
`played, no effective protection of the information on
`the hard drive, no effective method for the recovery or
`return of the hard drive the most important item that
`a consumer would want back. In fact the Bios Pass
`word Identification product occurs before allowing
`the hard drive to boot up. The present invention is
`unique because it is an application Software program
`that provides its layer of protection during the boot-up
`process (not before), and thus allows the Security
`product to move with the hard drive, the most critical
`part of the computer.
`
`5
`
`10
`
`15
`
`SUMMARY OF THE INVENTION
`
`25
`
`30
`
`35
`
`40
`
`The present invention pertains to a computer return appa
`ratus. The apparatus comprises a processor. The apparatus
`comprises a memory connected to the processor. The appa
`ratus comprises a display. The apparatus comprises a return
`screen that the processor automatically causes to appear dur
`ing or after boot-up of the processor on the display, that
`displays ownership information concerning who owns the
`computer and return information for returning the computer
`to the owner from data stored in the memory.
`The present invention pertains to a method for returning a
`computer to its owner. The method comprises the steps of
`activating a computer. Then there is the step of displaying
`automatically a return screen on a display of the computer
`during or after boot-up of the computer, which displays infor
`mation concerning owner information about who owns the
`computer and return information for returning the computer
`to the owner from data stored in the memory of the computer.
`The present invention pertains to a computer readable
`medium whose contents cause a computer to show who is its
`45
`owner by performing the steps of activating a computer. Then
`there is the step of displaying automatically a return screen on
`a display of the computer during or after boot-up of the
`computer, which displays information concerning owner
`information about who owns the computer and return infor
`mation for returning the computer to the owner from data
`stored in the memory of the computer.
`The present invention pertains to a computer return appa
`ratus. The apparatus comprises a processor. The apparatus
`comprises a memory connected to the processor. The appa
`ratus comprises a display. The apparatus comprises a return
`screen that the processor automatically causes to appear dur
`ing or after boot-up of the processor on the display, that
`displays information concerning an owner who owns the
`computer, concerning user information about who the user is
`who the computer is assigned to for use, and return informa
`tion for returning the computer to the owner from data stored
`in the memory.
`The present invention pertains to a method for displaying
`information to assist with returning a computer to its owner.
`The method comprises the steps of activating a computer.
`There is the step of displaying automatically a return screen
`
`50
`
`55
`
`60
`
`65
`
`US 9,021,610 B2
`
`4
`on a display of the computer during or after boot-up which
`displays information concerning owner information about
`who owns the computer, concerning user information about
`who the user is who the computer is assigned to for use, and
`return information for returning the computer to the owner
`from data stored in a memory of the computer.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`In the accompanying drawings, the preferred embodiment
`of the invention and preferred methods of practicing the
`invention are illustrated in which:
`FIG. 1 is a schematic representation of the apparatus of the
`present invention.
`FIG. 2 is a representation of a return/recovery dialog box of
`an embodiment of the present invention.
`FIG. 3 is a flow chart regarding an embodiment of the
`present invention.
`FIG. 4 is a flow chart regarding a second embodiment of the
`present invention.
`FIG. 5 is a representation of an administration program
`section of the present invention.
`FIG. 6 is a representation of a return screen of the present
`invention.
`FIG. 7 is an example of a password screen utilized by the
`present invention.
`FIG. 8 is a return administration screen of the present
`invention.
`FIG. 9 is a second return administration screen of the
`present invention.
`FIG. 10 is a third return administration screen of the
`present invention.
`FIG. 11 is a fourth return administration screen of the
`present invention.
`
`DETAILED DESCRIPTION
`
`Referring now to the drawings wherein like reference
`numerals refer to similar or identical parts throughout the
`several views, and more specifically to FIG. 1 thereof, there is
`shown a computer 12 return apparatus 10. The apparatus 10
`comprises a processor 14. The apparatus 10 comprises a
`memory 16 connected to the processor 14. The apparatus 10
`comprises a display 18. The apparatus 10 comprises a return
`screen 20 that the processor 14 automatically causes to appear
`during or after boot-up of the processor 14 on the display 18,
`that displays ownership information concerning who owns
`the computer 12 and return information for returning the
`computer 12 to the owner from data stored in the memory 16.
`The Owner is defined as the person or entity that owns, rents,
`or licenses the Retriever, and/or the person or entity who
`controls the recovery service. The Owner has greater control
`over the computer 12 than the user. This could include, but not
`be limited to, an employee of a company that owns the com
`puter 12, or an agent of the owner or a friend that has the
`permission of the owner to use or have or recover the com
`puter 12.
`Preferably, the apparatus 10 includes means for causing the
`screen to appear on the display 18 with the owner and return
`information. The causing means 22 is stored in the memory
`16. The causing means 22 preferably is a software program
`24. Preferably, the memory 16 includes a primary operating
`
`

`

`5
`system having an operating screen 26 for the computer 12,
`and the return screen 20 appears on the display 18 before the
`operating screen 26 of the operating system appears on the
`display 18.
`The Software program 24 preferably appears before a secu
`rity prompt such as a password to be entered to obtain access
`to the primary operating system of the computer 12. Prefer
`ably, the Software program 24 allows the owner to change the
`return information and the owner information, after the pass
`word or security prompt is satisfied for the computer 12. The
`Software program 24 is preferably able to communicate
`through a modem (or wireless) to a predetermined location to
`transfer the return information to the location to facilitate
`return of the computer 12 if it becomes lost by the owner.
`The present invention pertains to a method for returning a
`computer 12 to its owner. The method comprises the steps of
`activating a computer 12. Then there is the step of displaying
`automatically a return screen 20 on a display 18 of the com
`puter 12 during or after boot-up of the computer 12, which
`displays information concerning owner information about
`who owns the computer 12 and return information for return
`ing the computer 12 to the owner from data stored in the
`memory 16 of the computer 12.
`Preferably, the displaying step includes the step of display
`ing automatically the return screen 20 before an operating
`screen 26 of the primary operating system of the computer 12.
`There is preferably the step of displaying the return screen 20
`before satisfying a security prompt such as entering a pass
`word into the computer 12 to access the primary operating
`system. Preferably, there is the step of changing the return
`information, and the owner information after the step of sat
`isfying a security prompt such as entering the password into
`the computer 12.
`The present invention pertains to a computer 12 readable
`medium whose contents cause a computer 12 to show who is
`its owner by performing the steps of activating a computer 12.
`Then there is the step of displaying automatically a return
`screen 20 on a display 18 of the computer 12 during or after
`boot-up of the computer 12, which displays information con
`cerning owner information about who owns the computer 12
`and return information for returning the computer 12 to the
`owner from data stored in the memory 16 of the computer 12.
`Preferably, the displaying step includes the step of display
`ing automatically the return screen 20 before an operating
`screen 26 of the primary operating system of the computer 12.
`There is preferably the step of displaying the return screen 20
`before satisfying a security prompt such as entering a pass
`word into the computer 12 to access the primary operating
`system. Preferably, there is the step of changing the return
`information and the owner information after the step of sat
`isfying a security prompt such as entering a password into the
`computer 12.
`In the operation of the invention, first, the owner of the
`computer 12 would install the computer 12 security recovery/
`return Software program 24 application. The program could
`be installed to work on any type of computer 12 screen includ
`ing but not limited to, PC's, laptops, handheld computers
`(such as blackberries, palm pilots), UPS computerized hand
`held tracking display units, and even cellphone displays. The
`unique recovery/return computer 12 security program could
`in fact, be installed and used by any type of computer 12 that
`utilized a monitor display Screen. The Software application
`program provides an additional layer to the existing operating
`system of each computer 12. The coding language used for
`the software program 24 could and would vary depending
`upon the computer 12 equipment, but the core structure of
`how the program operates would be similar in all items.
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 9,021,610 B2
`
`10
`
`15
`
`6
`Once the computer 12 security software program 24 is
`installed, the monitor of the computer 12 will display the
`complete and current recovery/return information that the
`program has allowed the owner of the equipment to interac
`tively enter, change and update at anytime.
`This “on the fly' ability to change owner recovery infor
`mation to aid return of equipment is an important feature for
`anyone, including college students who travel from home to
`college during different parts of the year, people who move,
`and particularly business people who travel throughout the
`world. The recovery/return information would not only allow
`the display 18 of physical address return information, and
`owner contact telephone information, but would also provide
`for international internet based recovery through the added
`display 18 of owner email information, as well as the ability
`to display an international recovery center web site.
`In addition to increasing chances of return and recovery of
`the stolen or lost equipment by using the computer's 12
`display 18 monitor, the program is an additional program
`ming layer added into the initial start up program of the
`computer 12, so that the recovery/return display 18 informa
`tion occurs during or before a password or security prompt
`screen. This is an important feature that helps create an envi
`ronment whereby the individual that happens upon a stolen or
`lost piece of equipment will see the owner recovery/return
`information displayed before a password or security prompt
`screen. By automatically initiating this program during or
`before a user's security prompt, such as a password Screen
`program, the recovery/return program will not only increase
`chances of recovery, but will also increase chances that the
`computer 12 information on the hard drive is protected while
`the computer 12 is not in the owner's possession.
`For example, the actual step by Step operation of the pro
`gram is as follows:
`(1) Someone finds a lost or stolen computer 12. The person
`who finds the computer 12, turns the computer 12 on.
`(The software program 24 could be provided with a
`warning sticker that will be placed on the outside of
`the equipment telling anyone finding the equipment,
`about the program and the display recovery screen.)
`(2) The computer 12 display 18 screen turns on. The com
`puter 12 security software return/recovery program
`automatically initiates during the computer's 12 boot-up
`process.
`(3) As the computer 12 booting up process moves the user
`to a password or security prompt screen, the computer
`12 security software program 24 displays a dialog box
`which includes owner recovery and return information,
`So that the person finding the equipment can return the
`equipment either directly or through the international
`web site recovery center. The information screen can
`include any of the following items of information that
`the owner would like displayed including but not limited
`to: contact name, organization name, owner address,
`owner telephone number, owner email, international
`web site recovery site, international recovery email
`information, unique program serial/registration number.
`(See FIG. 2).
`Virtually all of this information would have been inter
`actively inputted by the owner, and the owner would
`have control over how much recovery information is
`displayed.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket