Method and system for limiting use of electronic equipment
First Claim
Patent Images
1. A system for securing electronic devices, the system comprising:
- a mobile electronic device configured to communicate data over a communication network;
software disposed on said mobile electronic device;
said encoded information configured to automatically password restrict, with a disconnected password, access to functionality of said mobile electronic device, in response to a failure of said encoded information to obtain a notification of a connection between said mobile electronic device and the computer network;
where said access to functionality which is automatically password restricted by said encoded information, is access to functionality which would otherwise be available from said mobile electronic device despite a non-existent connection between said mobile electronic device and the computer network;
said disconnected password is not identical to a password otherwise used to gain access to said functionality when said electronic device is connected to the computer network.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securing electronic devices with a non-physical tether which automatically disables operation of the device when the device fails to confirm its location within a predetermined area and/or connection to a predetermined network.
-
Citations
31 Claims
-
1. A system for securing electronic devices, the system comprising:
-
a mobile electronic device configured to communicate data over a communication network;
software disposed on said mobile electronic device;
said encoded information configured to automatically password restrict, with a disconnected password, access to functionality of said mobile electronic device, in response to a failure of said encoded information to obtain a notification of a connection between said mobile electronic device and the computer network;
where said access to functionality which is automatically password restricted by said encoded information, is access to functionality which would otherwise be available from said mobile electronic device despite a non-existent connection between said mobile electronic device and the computer network;
said disconnected password is not identical to a password otherwise used to gain access to said functionality when said electronic device is connected to the computer network. - View Dependent Claims (2)
-
-
3. An apparatus comprising:
-
a protected item;
means for restricting a characteristic of said protected item in response to a determination that said protected item is outside of a predetermined space;
where said characteristic of said protected item would otherwise exist irrespective of whether said electronic device is outside of said predetermined space. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12, 31)
-
-
13. A system for securing electronic equipment comprising:
-
a first electronic device and a second electronic device, having dissimilar characteristics for a percentage of time coupled to a computer network;
said computer network configured for providing data communication between said first and said second electronic devices;
said first electronic device having a first means for storing data;
said second electronic device having a second means for storing data;
said first means for storing data containing a first configurable encoded information security application configured for automatically self-disabling said first electronic device when said first electronic device is disconnected from said computer network for a first predetermined time period;
said second means for storing data containing a second configurable encoded information security application configured for automatically self-disabling said second electronic device when said second electronic device is disconnected from said computer network for a second predetermined time period;
said first means for storing data further containing a first configuration encoded information application programmed for configuring said first configurable encoded information security application;
said second means for storing data further containing a second configuration encoded information application programmed for configuring said second configurable encoded information security application; and
said first configurable encoded information security application and said second configurable encoded information security application being programmed to allow differing configurations for said first electronic device and said second electronic device in response to said dissimilar characteristics for a percentage of time coupled to a computer network. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system for limiting use of electronic equipment comprising:
-
a first encoded information security application configured to perform the steps comprising;
monitoring a first use of a first electronic device to determine if said first use is within a first predetermined space of intended operations;
disabling said first electronic device when said first use is determined to be outside of said first predetermined space of intended operations;
a second encoded information security application configured to perform the steps comprising;
monitoring a second use of a second electronic device to determine if said second use is within a second predetermined space of intended operations; and
disabling said second electronic device when said second use is determined to be outside of said second predetermined space of intended operations. - View Dependent Claims (19)
-
-
20. A system for reducing theft of electronic equipment comprising:
-
a first protected piece of electronic equipment; and
,means, disposed on said first protected piece, for reducing benefits obtained by removing said first protected piece from a first predetermined geographic location.
-
-
21. A system for limiting use of a handheld barcode scanner comprising:
-
a computer network configured to communicate with mobile wireless handheld barcode scanners;
a first mobile wireless handheld barcode scanner which is configured to communicate data over said computer network;
first initial configuration application disposed on said first mobile wireless handheld barcode scanner;
a first wireless tether application, disposed on said first mobile wireless handheld barcode scanner, and configured by said first initial configuration application, wherein said first wireless tether application comprises;
means for determining whether said first mobile wireless handheld barcode scanner is in communication with said computer network;
means for determining a first duration of any lapse of communication between said first mobile wireless handheld barcode scanner and said computer network;
means for comparing said first duration of a lapse of communication to a first predetermined lapse limit; and
,means for automatically limiting further use of said first mobile wireless handheld barcode scanner without the input of a first password where said first password is different from an on-network password which permits use of said first mobile wireless handheld when said first predetermined lapse limit has not been exceeded by said first duration of a lapse of communication;
a second mobile wireless handheld barcode scanner which is configured to communicate data over said computer network;
second initial configuration application disposed on said second mobile wireless handheld barcode scanner;
a second wireless tether application, disposed on said second mobile wireless handheld barcode scanner, and configured by said second initial configuration application, wherein said second wireless tether application comprises;
means for determining whether said second mobile wireless handheld barcode scanner is in communication with said computer network;
means for determining a second duration of any lapse of communication between said second mobile wireless handheld barcode scanner and said computer network;
means for comparing said second duration of a lapse of communication to a second predetermined lapse limit;
means for automatically limiting further use of said second mobile wireless handheld barcode scanner without the input of a second password where said second password is different from an on-network password which permits use of said second mobile wireless handheld when said second predetermined lapse limit has not been exceeded by said second duration of a lapse of communication; and
said first predetermined lapse limit is set by said first initial configuration application and said second predetermined lapse limit is set by said second initial configuration application with differing lapse limits in response to differing use characteristic between said first mobile wireless handheld barcode scanner and said second mobile wireless handheld barcode scanner.
-
-
22. A system comprising:
-
a protected item;
an electronic location detector coupled to said protected item, said electronic location detector configured to make a determination of whether said protected item is located within a predetermined space; and
wherein said protected item has a predetermined characteristic which is responsive to said determination. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
Specification