Class / Patent application number | Description | Number of patent applications / Date published |
726035000 | Theft prevention | 62 |
20080201785 | CABLE MODEM LOCATION ANALYZING DEVICE - Systems and methods are disclosed according to the implementations of the present disclosure for determining whether a cable modem has been placed in an unauthorized location. One system, among others, comprises a first cable modem and a second cable modem. The first cable modem is configured to transfer data between a first subscriber device and a headend facility and is intended to be used in a first residence. The second cable modem is configured to transfer data between a second subscriber device and the headend facility and is also intended to be used in the first residence. The first cable modem sends first information, corresponding to at least one parameter of the first cable modem, to the second cable modem. The second cable modem compares the first information with second information corresponding to at least one parameter associated with the second cable modem. | 08-21-2008 |
20080229433 | Digital certificate based theft control for computers - A theft control system may be implemented between a server and a client. The server may provide a certificate which must be periodically renewed. Execution of the certificate may be controlled by a trusted platform module on the client under control of a theft control controller. | 09-18-2008 |
20080229434 | Security Locking Apparatus and Method for Portable Computer - A security apparatus and method is provided for a portable computer, wherein a solenoid within the portable computer is controlled by a specified program running on the computer. Activation of the solenoid is usefully enabled by a password or computer security chip. One embodiment, comprising a security apparatus, includes a locking mechanism such as a conventional manually operated USS locking device having a locking element. The security apparatus further includes a component positioned proximate to a slot disposed to receive the locking element, the component being adjustable to vary a dimension of the slot entrance between hold and release modes. The component is coupled to the solenoid and is actuated to adjust the slot entrance dimension, from the hold mode to the release mode, when the solenoid is energized in response to a command generated by the specified program running on the computer. | 09-18-2008 |
20080250510 | DISTRIBUTION CHANNEL LOSS PROTECTION FOR ELECTRONIC DEVICES - An electronic device prior to entering a distribution channel is equipped with a Loss Prevention Client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device. | 10-09-2008 |
20080256648 | Secure portable computer and security method - A computer includes a processor, position determining means for determining the location of the computer, and control means for controlling the operation of the processor. The control means are in communication with the position determining means and control the operation of the processor in response to location information provided to the control means by the position determining means. | 10-16-2008 |
20080295184 | BURGLARPROOF DEVICE AND METHOD FOR ELECTRONIC DEVICE | 11-27-2008 |
20090089887 | Theft-deterrence method and apparatus for processor based devices - A manageability engine of a processor based device and a host theft-deterrence agent of the processor based device, jointly implement a theft-deterrence protocol with a theft-deterrence service, remotely disposed from the processor based device, to deter theft of the processor based device. The host theft-deterrence agent is configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine is configured to operate outside the application execution environment. | 04-02-2009 |
20090151010 | TERMINAL THEFT PROTECTION PROCESS, AND CORRESPONDING SYSTEM, TERMINAL AND COMPUTER PROGRAM - A process is provided for protection against theft of electronic payment terminals utilized in a group including at least two electronic payment terminals organized as a network. The process includes the following steps: mutual detection of the presence of each of the terminals of the group; and transmission of absence information if at least one of the terminals is not detected. | 06-11-2009 |
20090158446 | USB stacking devices and applications - A modular device formed with USB connectors. The USB can be used for connecting different kinds of devices, for example memories, user interfaces and the like. The USB devices can be piggybacked. In an embodiment, the USB devices can be located in a cavity formed inside the computer. Another embodiment forms a modular cellular telephone. | 06-18-2009 |
20090183266 | METHOD AND A SYSTEM FOR RECOVERING A LOST OR STOLEN ELECTRONIC DEVICE - A method and system for recovering a lost or stolen electronic device is provided. The method includes determining trace information to trace a present user of the electronic device, and obtaining an authentication information to determine whether or not the present user of the electronic device is a valid user of the electronic device. The method further includes sending the trace information to another user who had been previously determined to be the valid user of the electronic device, if it is determined that the present user is not the valid user of the electronic device. | 07-16-2009 |
20090193528 | Electronic device physical security component - A portable electronic device comprises a physical security component configured to be in a retracted position and an extended position relative to a housing of the portable electronic device, the physical security component having at least two differently shaped openings enabling at least two different types of locking devices to be coupled to the at least two differently shaped openings. | 07-30-2009 |
20090249497 | METHOD FOR MONITORING THE UNAUTHORIZED USE OF A DEVICE - The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device. | 10-01-2009 |
20090260089 | BURGLARPROOF METHOD AND SYSTEM FOR PORTABLE COMPUTER DEVICES - A burglarproof method for portable computer devices is disclosed. When a portable computer device is activated, an IC thereof registers user data to a data server using an internal network device thereof and creates and uploads a hardware data table generated based on detection results by a BIOS to the data server. The hardware data table comprises an IP and a status field representing a use status of the portable computer device. When the status field represents “stolen”, the IC activates a stolen display function to lock a screen of the portable computer device to be incapable of performing any operations by users and performs a corresponding operation. | 10-15-2009 |
20090288175 | ELECTRONIC ANTI-THEFT SYSTEM FOR VEHICLE COMPONENTS - An electronic anti-theft system utilizes CAN bus for authorizing vehicle components. The electronic anti-theft system includes a central authorization module storing at least one first identifier code, at least one electronic functional module and a CAN bus. Each of the electronic functional modules includes a vehicle electrical system identifier (VESI) device, which stores a second identifier code. The VESI device compares the second identifier code thereof with an associated first identifier code, and issues an acknowledgement signal when the comparison is matched. The central authorization module activates the electronic functional module for normal operation when receiving the acknowledgement signal from the VESI device for the electronic functional module. The electronic functional module includes vehicle crucial components such as trip computer module and infotainment module. Therefore, illegal removal or use of vehicle components can be prevented for the vehicle equipped with the electronic anti-theft system of the present invention. | 11-19-2009 |
20090320146 | SYSTEM AND METHOD FOR SECURING DATA WITHIN A STORAGE SYSTEM - According to the present invention, there is provided a system for securing data with a storage system. The system includes at least one storage device. In addition, the system includes a security mechanism for recognizing an attempt to insert or remove the storage device. Moreover, the system includes a management unit to control the insertion and removal of the storage device. | 12-24-2009 |
20090328238 | Disabling encrypted data - An apparatus associated with protecting encrypted computing platform data protection is described. One example apparatus includes a theft detection logic to identify when a computing platform has been stolen. The example apparatus also includes a theft deterrence logic to selectively manipulate encryption-related material stored in a secure data store. The theft detection logic may control the theft deterrence logic to hide, delete, or otherwise make unavailable the stored encryption-related material to protect encrypted data associated with the encryption-related material. | 12-31-2009 |
20100115634 | PHYSICALLY SECURE COMPUTING SYSTEM AND DEVICE, AND PHYSICALLY SECURE CONTAINER THEREFOR - A secured computing system and container therefor may comprise: a base for receiving a computing device; a securable first cover for substantially enclosing at least part of the computing device when the first cover is in a first position in the base; a securable second cover for preventing access to the computing device when the second cover is in a secured position, wherein access to the computing device is available when the second cover is not in the secured position. The computing device may be substantially enclosed when the first cover is in the first position in the base and the second cover is in the secured position; and one or more user features of the computing device may be accessible when the first cover is not in the first position in the base. The computing device may include a computer processor or computer peripheral. | 05-06-2010 |
20100132054 | System and Method for Securing a Computer System - A secured computer system includes a communication interface and an intrusion detection module. The computer system may be portable and configured for wireless communication with a user of the system. The user may activate and configure an alarm monitor, which may be triggered by motion of the computer system. If the triggered alarm is not deactivated, an alarm sequence is activated. If the alarm sequence is not cancelled, then security measures for protecting sensitive data on the computer system from unauthorized access may be executed. The security measures may include removing data or rendering a storage device inaccessible. | 05-27-2010 |
20110023134 | NETWORK BASED CASUALTY LOSS PREVENTION SYSTEM - A method and apparatus for retrieving lost or stolen network devices. The network devices may be configured with loss prevention logic that may be enabled during initial setup of the network device. The loss prevention logic may detect predefined events that occur at the network device and generate messages to a server upon detecting the predefined events. The messages may include a location, for example, an IP address of the network device, which may enable authorities to locate and retrieve lost or stolen network devices. Once enabled, the loss prevention may be disabled by a predefined message received from the server. | 01-27-2011 |
20110191864 | ANTITHEFT DEVICE AND INTERFACE DEVICE PROVIDED WITH THE SAME - By attaching a connector | 08-04-2011 |
20110296537 | SECURITY ENCLOSURE FOR A ROUTER - A router comprises a local network interface and routing services. The router also includes a data exchanger interface that can be configured to connect to a data exchanger. A security enclosure is configured to cover the data exchanger when the data exchanger is connected to the data exchanger interface. | 12-01-2011 |
20120042397 | DISTRIBUTION CHANNEL LOSS PROTECTION FOR ELECTRONIC DEVICES - An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device. | 02-16-2012 |
20120073000 | EMBEDDED ANTI-THIEF SYSTEM AND ANTI-THIEF METHOD THEREOF - The present invention relates to an embedded anti-thief system and a method thereof for executing anti-thief procedures, the embedded anti-thief system comprises: a core firmware module, an embedded system module and a cloud server module, wherein the core firmware module is disposed in a firmware device of a portable computer and capable of automatically inspecting the security status of the portable computer when the portable computer is booted. The embedded system module is disposed on a hard disk device of the portable computer and able to communicate with the core firmware module and the cloud server module, so as to confirm the security status of the portable computer. Through the method, the core firmware module and the embedded system module can be loaded and effectively cooperate with the cloud server module for executing the anti-theft procedures for the portable computer at any time. | 03-22-2012 |
20120255039 | Protected Digital Storage Device - A protected data storage device that protects data from a wireless computer network from theft and environmental conditions includes a housing having front, rear, top, and bottom walls each constructed of a rigid, fire resistant material, the housing defining an interior area. A digital storage unit is positioned in the housing interior area. A processor is situated in the housing interior area in data communication with the digital storage unit. A wireless receiver is coupled to an outer surface of a respective housing wall in data communication with the storage unit and processor. Programming in data communication with the processor causes the processor to actuate the receiver to receive data signals from the wireless network and store received data in the storage unit. | 10-04-2012 |
20120278907 | ACCELERATION-BASED THEFT DETECTION SYSTEM FOR PORTABLE ELECTRONIC DEVICES - A theft prevention system for protecting portable electronic devices is disclosed. An acceleration sensor detects the acceleration of a portable electronic device, and a controller analyzes this acceleration to determine whether a theft condition is present. If so, an alarm can be initiated. The theft prevention system can include a filter for attenuating irrelevant acceleration frequencies and isolating those representative of theft, and comparison hardware/software for determining whether the detected acceleration matches a known acceleration profile characteristic of theft. Various parameters of the theft prevention system can also be set by a user through mechanisms such as a graphical user interface. | 11-01-2012 |
20130042329 | DISTRIBUTION CHANNEL LOSS PROTECTION FOR ELECTRONIC DEVICES - An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device. | 02-14-2013 |
20130091590 | ENABLING A SERVICE TO RETURN LOST LAPTOPS - A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed. | 04-11-2013 |
20130117867 | Theft Prevention for Networked Robot - The robot in this invention can detect the fading or loss of wireless network signal as an indication of being removed from its working area and enter into alert mode. The purpose of robot entering into alert mode is to deter physical theft, e.g., by sounding an alarm, to protect confidential data loss, and to render the robot useless to an unauthorized person, reducing the incentives for theft. A number of techniques are employed in this invention: confidential data stored on the robot is encrypted; administrator is required to log in the robot to enable robot operations; robot is to detect abnormal conditions such as fading of wireless network signal, sudden loss of wireless network signal, loss of connectivity to management server, and physical disconnection of any computing part from itself; robot is to resume normal operations without administrator intervention when abnormal condition is rectified; an Internet management server instructs the robot to delete stored data when the robot fails to authenticate itself; and place the reset button of a computing part of the robot such that the reset button is only accessible when the computing part is physically disconnected from the robot. | 05-09-2013 |
20130263291 | APPARATUS AND METHOD FOR SUPPORTING THEFT PROTECTION - An apparatus and a method for protecting an electronic equipment from being stolen when using a protection unit adapted to communicate with a surveillance centre when it is detected that the electronic equipment has been stolen. A communication unit at the electronic equipment transmits control signals indicating whether the protection unit is working alright. A fault detector receives the control signals and indicates a fault when detecting that the protection unit is not working depending on the control signals. In that case, an operation control unit disables the electronic equipment in response to the indicated fault. Thereby, it is not attractive to steal the electronic equipment since it will be made more or less useless once it is detected that it has been stolen. | 10-03-2013 |
20130276152 | APPARATUS, SYSTEM, AND METHOD FOR PROTECTING ELECTRONIC DEVICES IN A VIRTUAL PERIMETER - Described herein are apparatus, system, and method for protecting electronic devices through the creation of a virtual perimeter among the electronic devices. The virtual perimeter may be generated by the electronic devices themselves. The method performed by an electronic device comprises: identifying a current context; receiving a role, according to the current context, in a hierarchy of multiple electronic devices, and operating in accordance with the role in the hierarchy within a secure perimeter in the current context around the multiple electronic devices, wherein the hierarchy includes a system of security checks based on context information. | 10-17-2013 |
20130318639 | SECURITY DEVICE FOR FUNCTIONAL DISPLAY, SECURITY, AND CHARGING OF HANDHELD ELECTRONIC DEVICES - A security device for functional display, security, and charging of a handheld electronic device is disclosed. The device comprises a universal clamping apparatus with an integrated alarm sensor and charging port to prevent theft of handheld electronic devices without hindering customer inspection thereof while providing charging of the battery of the devices. | 11-28-2013 |
20130326643 | SYSTEM AND METHOD FOR REMOTELY INITIATING LOST MODE ON A COMPUTING DEVICE - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic | 12-05-2013 |
20140013454 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A system to provide an always-on embedded anti-theft protection for a platform is described. The system in one embodiment comprises an arming logic to move the platform to an armed mode when receiving an arming command, a disarming logic to move the platform to an unarmed mode when receiving a disarming command, the disarming logic active while the platform is in a low power state, and a power transition logic to move the system from the low power state to an ON state in response to a user request, the power transition logic to present a log-in screen when the platform is armed, and to move the platform to the ON state without a log-in screen when the platform is unarmed. | 01-09-2014 |
20140020122 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A platform including an always-available theft protection system is described. In one embodiment, the system comprises an arming logic to arm the platform, when an arming command is received, a risk behavior logic to detect a potential problem when the platform is armed, and a core logic component to provide logic to analyze the potential problem, and to move the platform to a suspecting mode, when the potential problem indicates a theft suspicion. The system, in one embodiment, further comprises configuration logic to configure settings for the system when the platform is in an unarmed mode, the configuration logic including a user logic enabling an authorized user to alter settings and an administrator logic enabling an administrator to alter the settings using an authenticated set request. | 01-16-2014 |
20140020123 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A platform protected by an always-available security system to protect against platform loss and platform theft is described. The system comprises, in one embodiment, a pairing logic to pair the platform with an other device, the other device reached via a network connection, an interface to detect when the proximity to the other device is lost. The system further comprises, in one embodiment, the arming logic to arm the platform in response to the loss of proximity, and move the system to an armed mode, and a core logic to evaluate the risk behavior and determine whether a security action logic should take a security action. | 01-16-2014 |
20140075584 | SECURITY APPARATUS AND METHOD - A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it. | 03-13-2014 |
20140123328 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A platform including an always-available theft protection system is described. In one embodiment, the system comprises a power management logic to selectively power elements of the system, a disarming logic to disarm the platform from an armed mode when a disarming command is received via an interface, the interface powered when the platform is in the armed and suspecting modes to detect the disarming command. The system further comprises, in one embodiment, a risk behavior logic to detect a potential problem via a interface, the interface powered when the platform is in the armed mode to detect the potential problem, and a core logic component to provide logic to analyze the potential problem, and to move the platform to a suspecting mode, when the potential problem indicates a theft suspicion, the core logic powered when the risk behavior logic detects the potential problem. | 05-01-2014 |
20140143896 | Digital Certificate Based Theft Control for Computers - A theft control system may be implemented between a server and a client. The server may provide a certificate which must be periodically renewed. Execution of the certificate may be controlled by a trusted platform module on the client under control of a theft control controller. | 05-22-2014 |
20140189891 | HARD DISK ASSEMBLY AND ELECTRONIC DEVICE USING SAME - A hard disk assembly includes a frame, a hard disk, and a lock device. The hard disk is assembled in the frame. The lock device is located in the frame. The hard disk assembly is installed in an electronic device. The electronic device includes a support. The frame is slidably installed in the support. The lock device stores a predetermined password and receives a password inputted by a user. The lock device unlocks the hard disk assembly from the support if the password inputted by the user matches the predetermined password. | 07-03-2014 |
20140208447 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A platform protected by a system, the platform including a power source, is described. The system in one embodiment comprises a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to trigger a security action logic to perform a security action, when the potential problem indicates a theft suspicion, and the security action logic to utilize a kill pill to disable the platform, when the platform has set a high security status authorizing use of a self-kill pill or the platform sends an alert and receives a remote instruction to utilize a remote kill pill. | 07-24-2014 |
20140223585 | TRANSCEIVER LOCKING ASSEMBLY - A transceiver locking assembly includes at least one processor device, a network device, in a network environment, in communication with the least one processor device, a transceiver in communication with the network device; a transceiver port, coupled to the network device, defining a first slot opening in at least one of a variety of positions of the transceiver port and configured for selectively receiving the transceiver, and a dynamically controlled locking mechanism coupled to the transceiver port. The dynamically controlled locking mechanism is selectively positioned into the first slot opening to lock the transceiver into the network device or selectively removed away from the first slot opening to unlock the transceiver from the network device. | 08-07-2014 |
20140223586 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A system comprising a platform protected by an always-on always-available security system is described. In one embodiment, the system includes a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to move the platform to a suspecting mode when the potential problem indicates a theft suspicion, and the security action logic, to send periodic alerts to a security server when the platform is in the suspecting mode, the alert including movement related data, such that the security server can take an action to protect the platform. | 08-07-2014 |
20140223587 | TRANSCEIVER LOCKING ASSEMBLY - A transceiver locking assembly includes at least one processor device, a network device, in a network environment, in communication with the least one processor device, a transceiver in communication with the network device; a transceiver port, coupled to the network device, defining a first slot opening in at least one of a variety of positions of the transceiver port and configured for selectively receiving the transceiver, and a dynamically controlled locking mechanism coupled to the transceiver port. The dynamically controlled locking mechanism is selectively positioned into the first slot opening to lock the transceiver into the network device or selectively removed away from the first slot opening to unlock the transceiver from the network device. | 08-07-2014 |
20140245464 | Method of Protecting Power Receiver and Related Wireless Charging Device - A method for a power receiver for protecting a power receiver from being taken without permission while charged wirelessly includes receiving wireless power from a power transmitter and performing wireless charging in a security mode by the power receiver; detecting whether the wireless charging is interrupted without receiving a security code for authorization; and starting a protection function if the power receiver detects that the wireless charging is interrupted without receiving the security code for authorization. | 08-28-2014 |
20140298491 | TECHNIQUES FOR RECOVERING MISSING DEVICES - Techniques are provided for assisting owners to recover missing devices. The missing device automatically performs certain actions proactively in response to detecting conditions that indicate that the device has been lost or stolen. Conditions that indicate the device has been lost or stolen (“triggering conditions”) may include that a password failure has occurred more than a predetermined number of times. Any number and type of recovery-assisting actions may be taken, in response to triggering conditions, to assist owners in recovering a missing device. For example, a device may generate a record that indicates the current location of the device, and synchronize the record with an online service or some other device. The generation and synchronization of such records may be repeated on a periodic basis until either (a) the device becomes disabled, or (b) a user enters an appropriate password. | 10-02-2014 |
20140298492 | SECURITY CASE - The present invention is a self contained, portable security case or container. The case is secure in its locked condition by locks which are preferably operated by an electronic key. The electronic key can be programmed to open the case or container dependent upon various different conditions, for example, location, time, identification of operator, etc. In addition to the electronic key, a biometric identification device can be employed. The exterior of the case or container is made from different materials which are impermeable and resistant to heat, drilling and ballistic impact. A GPS type of location device located within the case enables the case to be tracked from remote locations. | 10-02-2014 |
20140304841 | ELECTRONIC DEVICE USING DATA THEFT PROTECTION - An electronic device includes a washer, a printed circuit board, and a screw. The printed circuit board includes a copper foil, a detecting unit and a processing unit. The copper foil comprises a plurality of electrical signal interfaces surrounding a first via defined in the copper foil. The washer defines a second via and includes a transmission metal. The screw combines the printed circuit board and the washer through the second via and the first via. The detecting unit stores an original logic level signal, and detects logic level signals of the electrical signal interfaces in real-time. The processing unit compares the original logic level signal and the detected logic level signal, to determine whether the electronic device is disassembled. If the electronic device is disassembled, the electronic device stops working. | 10-09-2014 |
20140325689 | SHUTDOWN VERIFICATION METHOD AND DEVICE - A shutdown verification method executed by a mobile terminal is provided. At first, a shutdown command is received. Then, a shutdown verification prompt which requests a verification input is output. After the verification input is received, the verification input is compared with preset verification data previously stored in the mobile terminal. At last, the mobile terminal is shut down if the verification input matches the preset verification data. A shutdown verification device corresponding to the shutdown verification method is also provided. The mobile terminal cannot be shut down without verification. Therefore, malicious shutdown of the mobile terminal is avoided. | 10-30-2014 |
20140338006 | METHOD FOR DETECTING A SECURITY EVENT ON A PORTABLE ELECTRONIC DEVICE AND ESTABLISHING AUDIO TRANSMISSION WITH A CLIENT COMPUTER - Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Methods are provided for detecting that a security event has occurred on a portable electronic device and then establishing an audio transmission between the device and one or more clients, and in some embodiments, sending a command to initiate the audio transmission. The detection of a security event may be based on, for example, detecting that the device has been turned on, detecting movement of the device, detecting that an incorrect password has been entered, the device camera has been used, contacts have been added or deleted, the SIM card as been removed or replaced, application programs have been installed or uninstalled from the device, or uncharacteristic behavior has been detected. | 11-13-2014 |
20140373184 | MOBILE DEVICE PERSISTENT SECURITY MECHANISM - A security application program provides features to help users recover their stolen mobile communication devices. The security application program may be pre-loaded into a system partition of the mobile device so that the security application program will not be erased during a wipe or factory reset of the mobile device. An owner registration service may be provided to help verify ownership of the mobile device. | 12-18-2014 |
20140373185 | Anti-theft Method and Computer System thereof - An anti-theft method for a computer system including a detection module, a photographing module and a controlling module is disclosed. The anti-theft method includes when the computer system is off, the detection module determines whether a predetermined event occurs for generating a detection signal; the controlling module initiates the computer system according to the detection signal, such that the computer system operates a basic input/output system (BIOS); and when the computer system operates the BIOS, an anti-theft operation is initiated to control the photographing module for capturing a digital information. | 12-18-2014 |
20150089675 | SECURITY DEVICE FOR FUNCTIONAL DISPLAY, SECURITY, AND CHARGING OF HANDHELD ELECTRONIC DEVICES - A security device for allowing functional display and charging of handheld electronic devices is disclosed. The security device includes clamps with channels configured to press against and grip the edges of the handheld electronic device. In some embodiments, the security device includes a charging/data connector onto which the charging/data port of the handheld security device can be mounted. | 03-26-2015 |
20150096062 | SECURITY PROCESSING APPARATUS AND SECURITY PROCESSING METHOD - The position information acquisition unit acquires the first current position information of the multifunction peripheral and the second current position information of HDD. The position information determination unit executes the first determination whether or not the first current position information is identical with the first registered position information and the second determination whether or not the second current position information is identical with the second registered position information. The activation permission unit activates the multifunction peripheral and HDD when the current position information are identical with the registered position information based on the first and second determinations, or activates the multifunction peripheral only when the current position information is identical with the registered position information based on the first or second determination, or not activates the multifunction peripheral and HDD when the current position information are not identical with the registered position information based on the first and second determinations. | 04-02-2015 |
20150294124 | DEVICE MONITORING USING MULTIPLE SERVERS OPTIMIZED FOR DIFFERENT TYPES OF COMMUNICATIONS - An electronic device monitoring system uses two different types of servers to communicate with electronic devices of users. One type of server, which may be a rapid contact server, is optimized or configured for relatively short and frequent communications with the electronic devices. The other type of server is optimized or configured for less frequent but (typically) longer communications with the electronic devices. In some embodiments, the electronic devices are configured to communicate relatively frequently (e.g., every few minutes) with the rapid contact server. When an electronic device is reported as lost or stolen, the rapid contact server may instruct the electronic device to contact the other type of server to obtain security-related instructions. | 10-15-2015 |
20150324617 | System and Method for Remotely Initiating Lost Mode on a Computing Device - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic | 11-12-2015 |
20150379310 | Electronic Apparatus, Control Method and Storage Medium - According to one embodiment, an electronic apparatus includes a first determination controller, a second determination controller and a security controller. The first determination controller determines, at intervals of a first time period, whether or not communication with a management server is executable. The second determination controller determines, when it is determined that the communication with the management server is not executable, whether or not a second time period elapses from a last one of times at each of which it is determined that the communication with the management server is executable. The security controller executes a process for inhibiting use of the apparatus when it is determined that the second time period elapses. | 12-31-2015 |
20160012258 | SYSTEM AND METHOD FOR SECURING AN INPUT/OUTPUT PORT USING SHAPE MEMORY ALLOYS IN A LOCKING MECHANISM | 01-14-2016 |
20160012260 | SYSTEM AND METHOD FOR SECURING A COMPUTER PORT USING SHAPE MEMORY ALLOYS | 01-14-2016 |
20160019403 | Apparatus, System, and Method for Protecting Electronic Devices in a Virtual Perimeter - Described herein are apparatus, system, and method for protecting electronic devices through the creation of a virtual perimeter among the electronic devices. The virtual perimeter may be generated by the electronic devices themselves. The method performed by an electronic device comprises: identifying a current context; receiving a role, according to the current context, in a hierarchy of multiple electronic devices, and operating in accordance with the role in the hierarchy within a secure perimeter in the current context around the multiple electronic devices, wherein the hierarchy includes a system of security checks based on context information. | 01-21-2016 |
20160055356 | ANTI-DATA THEFT STRUCTURES AND ELECTRONIC DEVICES WITH THE SAME - An anti-data theft structure in an electronic device includes a second cover, a printed circuit board (PCB), a connector, a plurality of terminals, and an elastic element. The PCB includes a first press piece. The connector is rotatably coupled to the second cover and defines a plurality of slots facing PCB. A number of terminals are received in the slots according to a predetermined order. The elastic element is located between the connector and the second cover. When the first press piece resists against connector, the terminals are electrically coupled to the PCB to allow normal working When the first press piece is separated from the connector, the connector is rotated away under the elastic force to cause the terminals to fall from the slots. Reassembly of the connector contacts so as not to be in the predetemined order causes lockdown and lockout of the electronic device. | 02-25-2016 |
20160085999 | System and Method For Item Self-Assessment As Being Extant or Displaced - A portable item reporting device ( | 03-24-2016 |
20160188913 | ELECTRONIC EQUIPMENT SECURITY DEVICE - An apparatus for securing a component to prevent unauthorized removal of the component, the apparatus comprising a security device for securing the component, the security device having: a first corner engagement member pivotally mounted to a first arm for engaging a first corner of the component; a second corner engagement member pivotally mounted to a second arm for engaging a second corner of the component that is diagonal to the first corner; and a locking assembly to secure the first arm relative to the second arm. | 06-30-2016 |