Electronic device security and tracking system and method
First Claim
1. An electronic device security and tracking system, comprising:
- a non-viewable component;
an application component connected to the non-viewable component, said application component capable of communicating with the non-viewable component;
a BIOS component connected to the non-viewable component; and
, a server system capable of communicating through a secure medium with the application component.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing and tracking an electronic device. The system includes hardware, software and firmware components that cooperate to allow tracking, disabling, and other interaction with the stolen electronic device. The system includes an application component, non-viewable component and Basic Input/Output Subsystem (BIOS) component that are present on the electronic device. The BIOS component maintains the secured environment of the application and non-viewable components. If only the application component was provided, a simple low level format of the hard disk drive would remove the application and bypass the security features. The system implements an “application and BIOS” based solution to electronic device security.
182 Citations
263 Claims
-
1. An electronic device security and tracking system, comprising:
-
a non-viewable component;
an application component connected to the non-viewable component, said application component capable of communicating with the non-viewable component;
a BIOS component connected to the non-viewable component; and
,a server system capable of communicating through a secure medium with the application component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An electronic device security and tracking system, comprising:
-
a nonvolatile storage device;
a changeable area in the nonvolatile storage device, wherein the changeable area further comprises an application component and a secure area coupled to the application component; and
,a server system capable of communicating through a secure medium with the application component. - View Dependent Claims (14, 15, 16, 17)
-
-
18. An electronic device security and tracking system, comprising:
-
a nonvolatile storage device;
a changeable area in the nonvolatile storage device, wherein the changeable area further comprises a system area in the nonvolatile storage device, said system area comprising an application component and a secure area coupled to the application component; and
a server system capable of communicating through a secure medium with the application component. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. An electronic device security and tracking system, comprising:
-
a non-viewable component;
an application component connected to the non-viewable component, wherein the application component comprises an application file, said application file capable of communicating with the non-viewable component;
a BIOS component connected to the non-viewable component; and
,a server system capable of communicating through a secure medium with the application file. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. An electronic device security and tracking system, comprising:
-
a remote component;
an application component connected to the remote component, wherein the application component is capable of communicating with the remote component through a communication medium;
a BIOS component connected to the application component; and
,a server system capable of communicating through a secure medium with the application component. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. An electronic device security and tracking system, comprising:
-
a nonvolatile storage device;
a changeable area in the nonvolatile storage device, wherein the changeable area further comprises an application component and a communication protocol component coupled to the application component; and
,one or more servers capable of communicating through a secure medium with the application component. - View Dependent Claims (49, 50, 51, 52, 53, 54)
-
-
55. An electronic device security and tracking system, comprising:
-
a nonvolatile storage device;
a changeable area in the nonvolatile storage device, wherein the changeable area further comprises a system area in the nonvolatile storage device, said system area comprising an application component and a communication protocol component coupled to the application component; and
,one or more servers capable of communicating through a secure medium with the application component. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62)
-
-
63. A computer system, comprising:
-
a central processing unit;
a memory array coupled to said central processing unit;
an expansion bus coupled to said central processing unit and said memory array, said expansion bus capable of interfacing peripheral devices;
a BIOS memory coupled to said expansion bus, comprising;
a BIOS component;
a hard disk drive coupled to said expansion bus, comprising;
a non-viewable component;
an application component connected to the non-viewable component, said application component capable of communicating with the non-viewable component; and
one or more servers capable of communicating through a secure medium with the application component. - View Dependent Claims (64, 65, 66, 67, 68, 69, 70, 71, 72, 73)
-
-
74. A computer system, comprising:
-
a central processing unit;
a memory array coupled to said central processing unit;
an expansion bus coupled to said central processing unit and said memory array, said expansion bus capable of interfacing peripheral devices;
a BIOS memory coupled to said expansion bus, comprising;
a BIOS component;
a hard disk drive coupled to said expansion bus, comprising;
a non-viewable component;
an application component connected to the non-viewable component, wherein the application component comprises an application file, said application file capable of communicating with the non-viewable component; and
one or more servers capable of communicating through a secure medium with the application file. - View Dependent Claims (75, 76, 77, 78, 79, 80, 81, 82, 83)
-
-
84. A communication system, comprising:
-
a communication device, comprising;
a controller unit;
a digital signal processor coupled to the controller unit;
a nonvolatile storage device coupled to the controller unit, comprising;
a changeable area, wherein the changeable area further comprises an application component and a secure area coupled to the application component; and
a server system capable of communicating through a secure medium with the application component. - View Dependent Claims (85, 86, 87, 88)
-
-
89. A communication system, comprising:
-
a communication device, comprising;
a controller unit;
a digital signal processor coupled to the controller unit;
a nonvolatile storage device coupled to the controller unit, comprising;
a changeable area, wherein the changeable area further comprises a system area, said system area comprising an application component and a secure area coupled to the application component; and
a server system capable of communicating through a secure medium with the application component. - View Dependent Claims (90, 91, 92, 93, 94)
-
-
95. A communication system, comprising:
-
a communication device, comprising;
a controller unit;
a digital signal processor coupled to the controller unit;
a nonvolatile storage device coupled to the controller unit, comprising;
a changeable area, wherein the changeable area further comprises an application component and a communication protocol component coupled to the application component; and
,one or more servers capable of communicating through a secure medium with the application component. - View Dependent Claims (96, 97, 98, 99, 100, 101)
-
-
102. A communication system, comprising:
-
a communication device, comprising;
a controller unit;
a digital signal processor coupled to the controller unit;
a nonvolatile storage device coupled to the controller unit, comprising;
a changeable area, wherein the changeable area further comprises a system area in the nonvolatile storage device, said system area comprising an application component and a communication protocol component coupled to the application component; and
,one or more servers capable of communicating through a secure medium with the application component. - View Dependent Claims (103, 104, 105, 106, 107, 108, 109)
-
-
110. An electronic device security and tracking system, comprising:
-
one or more clients, wherein the clients are electronic devices; and
,a server computer system connected to each of the clients, wherein the server computer system is capable of tracking and locating each of the clients. - View Dependent Claims (111, 112, 113, 114, 115)
-
-
116. A method for tracking, locating and disabling an electronic device, comprising:
-
activating the electronic device;
transferring control to a BIOS component after activation;
transferring control to a non-viewable component from the BIOS component;
verifying that an application component operated correctly during a previous device activation; and
,continuing with activation of the electronic device if the application component operated correctly during the previous device activation. - View Dependent Claims (117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137)
-
-
138. A machine-readable medium that provides instructions, which when executed by a machine, cause said machine to perform operations comprising:
-
activating an electronic device;
transferring control to a BIOS component after activation;
transferring control to a non-viewable component from the BIOS component;
verifying that an application component operated correctly during a previous device activation; and
,continuing with activation of the electronic device if the application component operated correctly during the previous device activation. - View Dependent Claims (139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159)
-
-
160. A method for tracking, locating, and disabling an electronic device including a BIOS component, comprising:
-
determining if the electronic device has been disabled;
displaying system information and unlock key if the electronic device is disabled;
prompting a user of the electronic device to enter activation password to re-enable electronic device if the electronic device is disabled;
determining if a bootable operating system partition exists;
restarting the electronic device to allow the device to boot an operating system; and
,proceeding with booting the electronic device until it stops booting if no bootable operating system partition exists. - View Dependent Claims (161, 162)
-
-
163. A machine-readable medium that provides instructions, which when executed by a machine, cause said machine to perform operations comprising:
-
determining if an electronic device has been disabled;
displaying system information and unlock key if the electronic device is disabled;
prompting a user of the electronic device to enter activation password to re-enable electronic device if the electronic device is disabled;
determining if a bootable operating system partition exists;
restarting the electronic device to allow the device to boot an operating system; and
,proceeding with booting the electronic device until it stops booting if no bootable operating system partition exists. - View Dependent Claims (164, 165)
-
-
166. A method for tracking, locating and disabling an electronic device including a nonviewable component, comprising:
-
checking if an application component operated correctly during last power-up of the device; and
,placing the device under control of power on self test to proceed with powering-up the device if the application component operated correctly during last device power-up. - View Dependent Claims (167, 168, 169, 170)
-
-
171. A machine-readable medium that provides instructions, which when executed by a machine, cause said machine to perform operations comprising:
-
checking if an application component operated correctly during last power-up of an electronic device; and
placing the device under control of power on self test to proceed with powering-up the device if the application component operated correctly during last device power-up. - View Dependent Claims (172, 173, 174, 175)
-
-
176. A method for tracking, locating, and disabling an electronic device including an application component, comprising:
-
executing system processes and an application program contained in an application component;
checking if the application component is operating correctly; and
communicating to a BIOS component if the application component is operating correctly. - View Dependent Claims (177, 178, 179, 180, 181, 182, 183, 184, 185)
-
-
186. A machine-readable medium that provides instructions, which when executed by a machine, cause said machine to perform operations comprising:
-
executing system processes and an application program contained in an application component;
checking if the application component is operating correctly; and
,communicating to a BIOS component if the application component is operating correctly. - View Dependent Claims (187, 188, 189, 190, 191, 192, 193, 194, 195)
-
-
196. An electronic device security and tracking system, comprising:
-
a client device application including an encryption/decryption module, wherein the module directly transmits and receives data to and from the client device application; and
,a server device application including an encryption/decryption module coupled to the client device application through a communication medium, wherein the module directly transmits and receives data to and from the server device application. - View Dependent Claims (197, 198, 199, 200, 201, 202, 203, 204, 205, 206, 207, 208, 209, 210, 211, 212, 213, 214, 215, 216, 217, 218, 219, 220, 221, 222, 223, 224, 225, 226, 227, 228, 229, 230, 231, 232, 233, 234, 235, 236, 237, 238, 239)
-
-
240. A method of encoding data, comprising:
-
selecting a subgroup of bits from one or more bytes of binary encrypted information, wherein the binary encrypted information is for tracking, locating, and disabling an electronic device;
passing the subgroup of bits to an encoding function that performs binary mapping operations on the subgroup of bits to generate an encoded byte; and
,encoding the next one or more bytes of binary encrypted information if the end of the binary encrypted information has not been reached. - View Dependent Claims (241, 242, 243, 244, 245, 246)
-
-
247. A method of decoding data, comprising:
-
selecting a byte of American Standard Code of Information Interchange text format information, wherein the American Standard Code of Information Interchange text format information byte is for tracking, locating, and disabling an electronic device;
passing the byte to a decoding function that returns a decoded byte; and
,extracting the lower six bits of the decoded byte and discarding the upper two bits, wherein the lower six bits are appended to a stream of bits that form consecutive bytes;
decoding the next bytes of data from the American Standard Code of Information Interchange text format information if the end of the American Standard Code of Information Interchange text format information has not been reached. - View Dependent Claims (248, 249, 250)
-
-
251. A machine-readable medium that provides instructions, which when executed by a machine, cause said machine to perform operations comprising:
-
selecting a subgroup of bits from one or more bytes of binary encrypted information, wherein the binary encrypted information is for tracking, locating, and disabling an electronic device;
passing the subgroup of bits to an encoding function that performs binary mapping operations on the subgroup of bits to generate an encoded byte; and
,encoding the next one or more bytes of binary encrypted information if the end of the binary encrypted information has not been reached. - View Dependent Claims (252, 253, 254, 255, 256, 257)
-
-
258. A machine-readable medium that provides instructions, which when executed by a machine, cause said machine to perform operations comprising:
-
selecting a byte of American Standard Code of Information Interchange text format information, wherein the American Standard Code of Information Interchange text format information byte is for tracking, locating, and disabling an electronic device;
passing the byte to a decoding function that returns a decoded Byte;
extracting the lower six bits of the decoded byte and discarding the upper two bits, wherein the lower six bits are appended to a stream of bits that form consecutive bytes; and
,decoding the next bytes of data from the American Standard Code of Information Interchange text format information if the end of the American Standard Code of Information Interchange text format information has not been reached. - View Dependent Claims (259, 260, 261)
-
-
262. A method for including an electronic device security and tracking system BIOS component into a system BIOS read-only-memory, comprising:
-
creating a data structure;
placing an address of the data structure into the system build file;
placing BIOS component into a system build file, wherein the BIOS component accesses the data structure using the address; and
,placing into the system build file a call to the BIOS component just before a call to the system BIOS. - View Dependent Claims (263)
-
Specification