ABSOLUTE SOFTWARE CORPORATION Patent applications |
Patent application number | Title | Published |
20150310714 | RECOGNIZABLE LOCAL ALERT FOR STOLEN OR LOST MOBILE DEVICES - A system is disclosed in which an electronic device of a user emits an identifiable alert as a result of a trigger indicating loss or theft, or probability or risk of loss or theft. Alerts may be acoustic, either audible or inaudible and may be disguised. Alerts may also be short range radio signals. Other, local electronic devices of users may detect the alert and react by transmitting their location and the information in the alert to a monitoring center. The monitoring center may respond by sending a silence code or identification information to the device detecting the alert. | 10-29-2015 |
20140298485 | PERSISTENT AGENT SUPPORTED BY PROCESSOR - A tamper resistant servicing Agent for providing various services (e.g., data delete, firewall protection, data encryption, location tracking, message notification, and updating software) comprises multiple functional modules, including a loader module (CLM) that loads and gains control during POST, independent of the OS, an Adaptive Installer Module (AIM), and a Communications Driver Agent (CDA). Once control is handed to the CLM, it loads the AIM, which in turn locates, validates, decompresses and adapts the CDA for the detected OS environment. The CDA exists in two forms, a mini CDA that determines whether a full or current CDA is located somewhere on the device, and if not, to load the full-function CDA from a network; and a full-function CDA that is responsible for all communications between the device and the monitoring server. The servicing functions can be controlled by a remote server. | 10-02-2014 |
20140278941 | CONSUMER CONTROLLED TRACKING OF AD INTERACTIONS LEADING TO PURCHASES - A system is disclosed that records a user's interactions with online ads, and that detects associations between these interactions and subsequent purchases (such as in-store purchases). The system may include a mobile application that tracks the ad interactions and purchase events. Users control whether the associations between the purchases and ad interactions are divulged to an ad serving entity or any other entity. In return for divulging the associations, the user may be offered compensation. The system enables the ad serving entity to bill the advertiser on a pay-per-purchase basis, and enables advertisers to obtain clear and specific performance indicators for their ads. | 09-18-2014 |
20140278923 | CONSUMER CONTROLLED TRACKING OF AD INTERACTIONS LEADING TO PURCHASES - A system is disclosed that records a user's interactions with online ads, and that detects associations between these interactions and subsequent purchases (such as in-store purchases). The system may include a mobile application that tracks the ad interactions and purchase events. Users control whether the associations between the purchases and ad interactions are divulged to an ad serving entity or any other entity. In return for divulging the associations, the user may be offered compensation. The system enables the ad serving entity to bill the advertiser on a pay-per-purchase basis, and enables advertisers to obtain clear performance indicators for their ads. | 09-18-2014 |
20140197952 | ALERT FOR REAL-TIME RISK OF THEFT OR LOSS - Devices, methods, systems and a computer readable medium for the provision of alerts to electronic devices in response to real-time, location based analysis of the risk of theft or loss of such devices are provided. A continually updated database of locations of thefts, losses and/or stolen or lost electronic devices is accessed in order to provide the alerts to the electronic devices. | 07-17-2014 |
20140182002 | PROCESS FOR CAPTURING AND TRANSMITTING WINDOW SCREEN DISPLAY DATA - A process is disclosed for capturing screenshots on an electronic device of a user, and for transmitting representations of the captured screenshots to a monitoring system for storage. The captured screenshot data may, for example, be used to recover a device that is lost or stolen. | 06-26-2014 |
20140164766 | PRIVACY MANAGEMENT FOR TRACKED DEVICES - A system is disclosed that protects private data of users while permitting the monitoring or tracking of electronic devices that are shared for both business and private purposes. The electronic devices may be configured to selectively encrypt location data, and/or other types of data, before such data is transmitted to a monitoring center. For example, data collected or generated on a user device outside of work hours may be encrypted with a private key of the device's user prior to transmission to the monitoring center, so that the data is not accessible to the employer. Data collected or generated during work hours may be transmitted without such encryption. | 06-12-2014 |
20140156545 | Automated Generation Of Affidavits And Legal Requisitions Including Mobile Device Identification - Approaches for a server, upon receiving notification that a device has been stolen, composing a legal requisition document. An identification of the device is received or otherwise obtained. A legal requisition template for use in a particular jurisdiction where the device was stolen is retrieved. Upon consulting a database which stores information about police departments of a plurality of jurisdictions, the legal requisition document is composed using the template, the identification, and data retrieved from the database. The server may electronically send the legal requisition document to a police department associated with the particular jurisdiction. Advantageously, information about the activity of a device reported stolen may be obtained before the device is factory reset. | 06-05-2014 |
20140082746 | EXTENSIBLE PROTOCOL FOR LOW MEMORY AGENT - A tamper resistant servicing Agent for providing various services (e.g., data delete, firewall protection, data encryption, location tracking, message notification, and updating software) comprises multiple functional modules, including a loader module (CLM) that loads and gains control during POST, independent of the OS, an Adaptive Installer Module (AIM), and a Communications Driver Agent (CDA). Once control is handed to the CLM, it loads the AIM, which in turn locates, validates, decompresses and adapts the CDA for the detected OS environment. The CDA exists in two forms, a mini CDA that determines whether a full or current CDA is located somewhere on the device, and if not, to load the full-function CDA from a network; and a full-function CDA that is responsible for all communications between the device and the monitoring server. The servicing functions can be controlled by a remote server. | 03-20-2014 |
20140075584 | SECURITY APPARATUS AND METHOD - A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it. | 03-13-2014 |
20140047550 | DISCRIMINATING DATA PROTECTION SYSTEM - A data protection system selectively deletes data from an electronic device when the device is reported as lost or stolen, or when another data protection triggering event occurs. Different data files may, for example, be treated differently depending on when such files were created. For example, data files that were created while the computing device was known to be in the owner's possession may be deleted, while data files created after the electronic device left the owner's possession may be left intact (since they may have been created by an innocent user). Data files created between these two points in time may be quarantined so that they later be restored, if appropriate. | 02-13-2014 |
20130303186 | SYSTEM, METHOD AND DATABASE FOR DETERMINING LOCATION BY INDIRECTLY USING GPS COORDINATES - A database stores results of scans for wireless (e.g., Wi-Fi) access points, some of them directly associated with GPS coordinates. Mobile electronic devices detect access points, details of which are sent to the database. Contents of the database are analyzed for relations between the scanned access points and previously stored GPS coordinates. If a relation is found, the GPS coordinates are used for determining or estimating the location of the mobile device. | 11-14-2013 |
20130275560 | CONFIGURATION OF THIRD PARTY APPLICATIONS IN A SANDBOXED ENVIRONMENT - A profile manager application is installed in an electronic device that fetches configuration profiles for third party applications from a remote server. Using code libraries incorporated in the third party applications and URL based commands, the profile manager application communicates with the third party applications to configure them according to the corresponding configuration profiles, even though the third party applications are running in a sandboxed environment. | 10-17-2013 |
20130275508 | SYSTEM AND METHOD FOR DERIVING A NAME FOR ASSOCIATION WITH A DEVICE - Electronic devices without device names are provided with an application for retrieving a data point from the device from which a name can be deduced. A match for the data point is searched for in the contacts list in the device, and when found, the name corresponding to the contact entry, in which the data point has been found, is used to derive the device name. The derived device name (or information from which the device name may be derived) may be transmitted to a remote server which may be used for managing multiple such devices. | 10-17-2013 |
20130241729 | LOCATION DEPENDENT MONITORING FOR STOLEN DEVICES - A system and method for controlling the surveillance conducted by lost or stolen electronic devices dependent upon the location of such electronic devices is provided. A data repository contains data that specifies, for each of a plurality of geographic regions (e.g. legal jurisdictions), a set of surveillance methods that are permissible in the respective region. At least some of the geographic regions have different respective sets of permissible surveillance methods than others. A computer system is operable to communicate with the devices over a computer network, and programmed to use received information regarding a location of a potentially lost or stolen device, in combination with the data in the computer data repository, to cause the potentially lost or stolen device to initiate surveillance according to the set of permissible surveillance methods (and/or other actions) corresponding to the location. | 09-19-2013 |
20130219041 | EXTENSIBLE PROTOCOL FOR LOW MEMORY AGENT - A tamper resistant servicing Agent for providing various services (e.g., data delete, firewall protection, data encryption, location tracking, message notification, and updating software) comprises multiple functional modules, including a loader module (CLM) that loads and gains control during POST, independent of the OS, an Adaptive Installer Module (AIM), and a Communications Driver Agent (CDA). Once control is handed to the CLM, it loads the AIM, which in turn locates, validates, decompresses and adapts the CDA for the detected OS environment. The CDA exists in two forms, a mini CDA that determines whether a full or current CDA is located somewhere on the device, and if not, to load the full-function CDA from a network; and a full-function CDA that is responsible for all communications between the device and the monitoring server. The servicing functions can be controlled by a remote server. | 08-22-2013 |
20130111610 | TEMPORALLY CONTROLLING ACCESS TO SOFTWARE ASSETS ON USER DEVICES | 05-02-2013 |
20120275572 | SECURITY APPARATUS AND METHOD - A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it. | 11-01-2012 |
20120003991 | METHOD AND SYSTEM FOR TRACKING MOBILE ELECTRONIC DEVICES WHILE CONSERVING CELLULAR NETWORK RESOURCES - A system and associated methods are disclosed for tracking mobile electronic devices while conserving cellular network resources used for such tracking. The tracking may be performed for purposes of facilitating recovery of lost or stolen devices. To conserve network resources, different telephone numbers may be assigned depending upon the location of each device and the time of each call, and individual calls may be made only after a determination has been made that a telephone call is required. A determination that a telephone call is required may be made depending upon whether a protected electronic device had been reported lost or stolen, and/or whether an internet communication between the protected electronic device and a monitoring center has been made within a selected previous period of time. A dynamic schedule permits reserved telephone call slots to be freed up if not needed so that they can be used for devices that need the communication time. | 01-05-2012 |
20110115621 | MULTIPLE DEVICE LOSS STATUS RETRIEVAL WITHOUT ID PROVISION - A system is disclosed that enables multiple electronic devices to be tracked in the case of theft or loss without the need for monitoring or tracking the devices prior to the loss or theft. The system operates by sending bulk status information regarding the lost/stolen statuses of multiple devices to one of these devices. The receiving device then decodes the bulk status information to determine its own lost/stolen status. If the status reveals that the device is currently reported as lost or stolen, the device initiates an appropriate security action, such as the transmission of its location to a monitoring center. | 05-19-2011 |
20110057797 | ALERT FOR REAL-TIME RISK OF THEFT OR LOSS - Devices, methods, systems and a computer readable medium for the provision of alerts to electronic devices in response to real-time, location based analysis of the risk of theft or loss of such devices are provided. A continually updated database of locations of thefts, losses and/or stolen or lost electronic devices is accessed in order to provide the alerts to the electronic devices. | 03-10-2011 |
20100287619 | DISCRIMINATING DATA PROTECTION SYSTEM - A data protection system selectively deletes data from an electronic device when the device is reported as lost or stolen, or when another data protection triggering event occurs. Different data files may, for example, be treated differently depending on when such files were created. For example, data files that were created while the computing device was known to be in the owner's possession may be deleted, while data files created after the electronic device left the owner's possession may be left intact (since they may have been created by an innocent user). Data files created between these two points in time may be quarantined so that they later be restored, if appropriate. | 11-11-2010 |
20100229248 | AUTOMATIC CONTROL OF A SECURITY PROTECTION MODE OF AN ELECTRONIC DEVICE - An automated method and apparatus is provided for deterring unauthorized use or theft of electronic devices, or other sorts of items into which a tracking device has been installed, particularly those in a distribution channel. The automated method is performed by a computer system of a monitoring center, and comprises the steps of: receiving a call over a network from the electronic device, said call initiated by an agent installed on the electronic device, said agent including functionality for tracking usage of the electronic device and for reporting information regarding said usage to the monitoring center, the agent thereby facilitating recovery of the electronic device when stolen; in response to the call, determining, at least, whether a sale of the electronic device has been reported; and by communication with the agent, causing the electronic device to enter into a state that is dependent, at least, upon the determination of whether a sale of the electronic device has been reported, said state affecting whether the agent reports information to the monitoring center regarding usage of the electronic device. | 09-09-2010 |
20100194567 | LOCATION DEPENDENT MONITORING FOR STOLEN DEVICES - A system and method for controlling the surveillance conducted by lost or stolen electronic devices dependent upon the location of such electronic devices is provided. A data repository contains data that specifies, for each of a plurality of geographic regions (e.g. legal jurisdictions), a set of surveillance methods that are permissible in the respective region. At least some of the geographic regions have different respective sets of permissible surveillance methods than others. A computer system is operable to communicate with the devices over a computer network, and programmed to use received information regarding a location of a potentially lost or stolen device, in combination with the data in the computer data repository, to cause the potentially lost or stolen device to initiate surveillance according to the set of permissible surveillance methods (and/or other actions) corresponding to the location. | 08-05-2010 |
20100115417 | CONDITIONAL WINDOW CAPTURE - A device, method, system and computer readable medium are disclosed for the remote, intelligent capture of screenshots and keystrokes which can subsequently be transmitted with reduced bandwidth requirements. | 05-06-2010 |
20100064046 | MANAGEMENT OF COMMUNICATIONS FROM STOLEN DEVICES - A device, method, system and computer readable medium are disclosed for the management of communications provided by a multitude of stolen electronic devices reporting location information to a monitoring center. | 03-11-2010 |