Security monitor for PDA attached telephone
First Claim
1. A security system within a network of connected devices, comprising:
- a database containing contact information;
a server application for periodically monitoring unauthorized removal of at least one of said devices to said network and in the event of detecting unauthorized removal of said at least one device from the network then communicating said unauthorized removal in accordance with said contact information; and
a phone in the vicinity of said at least one device, said phone operating under control of said server application to generate a display for prompting entry of an access code upon detection of said unauthorized removal, whereby correct entry of said access code prevents communicating said unauthorized removal.
21 Assignments
0 Petitions
Accused Products
Abstract
A user enabled application for monitoring the presence of a PDA connected to a network via a cradle and, in response, ringing a phone in the vicinity of the PDA. The display on the telephone displays a message that asks the user to enter an access code via the telephone dialpad. If the user enters the correct access code then nothing happens and the phone continues to work as normal. If, however, the correct access code is not entered, the system communicates the unauthorized removal of the PDA to pre-selected phone numbers, pager numbers or email addresses. Appropriate steps can then be taken to try to and recover the missing device.
-
Citations
13 Claims
-
1. A security system within a network of connected devices, comprising:
-
a database containing contact information;
a server application for periodically monitoring unauthorized removal of at least one of said devices to said network and in the event of detecting unauthorized removal of said at least one device from the network then communicating said unauthorized removal in accordance with said contact information; and
a phone in the vicinity of said at least one device, said phone operating under control of said server application to generate a display for prompting entry of an access code upon detection of said unauthorized removal, whereby correct entry of said access code prevents communicating said unauthorized removal. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of monitoring devices connected to a network and implementing security measures in the event of disconnection therefrom, comprising:
-
storing contact information in a database; and
periodically monitoring unauthorized removal of at least one of said devices to said network; and
in the event of detecting unauthorized removal of said at least one device from the network then i) communicating said unauthorized removal in accordance with said contact information, and ii) generating a display at a phone in the vicinity of said at least one device for prompting entry of an access code upon detection of said unauthorized removal, whereby correct entry of said access code prevents communicating said unauthorized removal. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
Specification