Method for determining identification of an electronic device
-
0Associated
Cases -
0Associated
Defendants -
0Accused
Products -
69Forward
Citations -
0
Petitions -
1
Assignment
First Claim
1. . A method of determining identity of an electronic device, comprising:
- obtaining at least one attribute of the device;
searching existing records of a plurality of electronic devices, to identify based on the at least one attribute, a unique record corresponding to the device; and
determining the identity of the device from the unique record if it has been identified.
1 Assignment
0 Petitions

Accused Products

Abstract
A utility to determine identity of an electronic device electronically, by running a device attribute collection application that collects key data points of the electronic devices and a device identification application that uses these key data points to link the electronic device to a specific owner or entity. Data points of the device may change over time for reasons such as reconfiguration, repair or normal daily use. The device identification application intelligently and consistently tracks changes in key data points associated with the device, even if the data points change over its lifecycle. The device may be identified remotely with the device identification application (e.g., in the event of theft or loss of the device) based on the collected data points. The device identification application may be deployed in conjunction with services that may include asset tracking, asset recovery, data delete, software deployment, etc.
170 Citations
Computer Hardware Identity Tracking Using Characteristic Parameter-Derived Data | ||
Patent #
US 20110093503A1
Filed 10/13/2010
|
Current Assignee
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
Sponsoring Entity
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
System and Method for Device Authentication with Built-In Tolerance | ||
Patent #
US 20110093920A1
Filed 10/13/2010
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
Uniloc 2017 LLC
|
System and Method for Tracking Application Usage | ||
Patent #
US 20100325150A1
Filed 06/18/2010
|
Current Assignee
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
Sponsoring Entity
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
MANAGEMENT OF COMMUNICATIONS FROM STOLEN DEVICES | ||
Patent #
US 20100064046A1
Filed 09/10/2009
|
Current Assignee
Absolute Software
|
Sponsoring Entity
Absolute Software
|
DIGITAL CINEMA ASSET MANAGEMENT SYSTEM | ||
Patent #
US 20100104105A1
Filed 10/23/2008
|
Current Assignee
DIGITAL CINEMA IMPLEMENTATION PARTNERS LLC
|
Sponsoring Entity
DIGITAL CINEMA IMPLEMENTATION PARTNERS LLC
|
Systems and Methods for Auditing Software Usage Using a Covert Key | ||
Patent #
US 20100333207A1
Filed 06/18/2010
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
Uniloc 2017 LLC
|
License Auditing for Distributed Applications | ||
Patent #
US 20090217384A1
Filed 02/20/2009
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
Uniloc 2017 LLC
|
SYSTEM FOR MONITORING THE UNAUTHORIZED USE OF A DEVICE | ||
Patent #
US 20090247122A1
Filed 09/03/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Blancco Technology Group Ip Oy
|
METHOD FOR MITIGATING THE UNAUTHORIZED USE OF A DEVICE | ||
Patent #
US 20090253408A1
Filed 04/02/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Blancco Technology Group Ip Oy
|
METHOD FOR MITIGATING THE UNAUTHORIZED USE OF A DEVICE | ||
Patent #
US 20090253410A1
Filed 09/03/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Blancco Technology Group Ip Oy
|
SYSTEM FOR MITIGATING THE UNAUTHORIZED USE OF A DEVICE | ||
Patent #
US 20090253406A1
Filed 09/03/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Blancco Technology Group Ip Oy
|
SYSTEM FOR MONITORING THE UNAUTHORIZED USE OF A DEVICE | ||
Patent #
US 20090249460A1
Filed 04/01/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Blancco Technology Group Ip Oy
|
SYSTEM FOR MITIGATING THE UNAUTHORIZED USE OF A DEVICE | ||
Patent #
US 20090251282A1
Filed 04/02/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Blancco Technology Group Ip Oy
|
METHOD FOR MONITORING THE UNAUTHORIZED USE OF A DEVICE | ||
Patent #
US 20090249443A1
Filed 04/01/2008
|
Current Assignee
Inhance Technology
|
Sponsoring Entity
Inhance Technology
|
PRIVACY-PRESERVING LOCATION TRACKING FOR DEVICES | ||
Patent #
US 20090323972A1
Filed 11/24/2008
|
Current Assignee
University of Washington
|
Sponsoring Entity
University of Washington
|
OFFLINE DATA DELETE WITH FALSE TRIGGER PROTECTION | ||
Patent #
US 20080301820A1
Filed 05/29/2008
|
Current Assignee
Absolute Software
|
Sponsoring Entity
Absolute Software
|
COMPLEX SOFTWARE DEPLOYMENT | ||
Patent #
US 20080320109A1
Filed 06/22/2007
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Technology Licensing LLC
|
Method for launching an electronic wallet | ||
Patent #
US 8,126,806 B1
Filed 12/03/2007
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
Complex software deployment | ||
Patent #
US 8,150,948 B2
Filed 06/22/2007
|
Current Assignee
Microsoft Technology Licensing LLC
|
Sponsoring Entity
Microsoft Corporation
|
Mobile device password system | ||
Patent #
US 8,200,582 B1
Filed 01/05/2009
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
System and method for active jamming of confidential information transmitted at a point-of-sale reader | ||
Patent #
US 8,244,169 B1
Filed 08/11/2011
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
System for mitigating the unauthorized use of a device | ||
Patent #
US 8,248,237 B2
Filed 04/02/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Inhance Technology
|
Method and system for blocking confidential information at a point-of-sale reader from eavesdropping | ||
Patent #
US 8,249,935 B1
Filed 09/27/2007
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
Partially delegated over-the-air provisioning of a secure element | ||
Patent #
US 8,250,662 B1
Filed 10/10/2011
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
System and method for device authentication with built-in tolerance | ||
Patent #
US 8,316,421 B2
Filed 10/13/2010
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
DeviceAuthority Inc. fka NetAuthority Inc.
|
Identity protection | ||
Patent #
US 8,359,278 B2
Filed 08/28/2007
|
Current Assignee
Csidentity Corporation
|
Sponsoring Entity
Identitytruth Inc.
|
License auditing for distributed applications | ||
Patent #
US 8,374,968 B2
Filed 02/20/2009
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
Method for launching an electronic wallet | ||
Patent #
US 8,468,095 B1
Filed 01/04/2012
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
Control of secure elements through point-of-sale device | ||
Patent #
US 8,655,310 B1
Filed 04/08/2008
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
Device authentication using display device irregularity | ||
Patent #
US 8,695,068 B1
Filed 06/06/2013
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
System and method of provisioning confidential information via a mobile device | ||
Patent #
US 8,706,588 B1
Filed 10/20/2008
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
Method and system for blocking confidential information at a point-of-sale reader from eavesdropping | ||
Patent #
US 8,719,102 B1
Filed 06/27/2012
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
System for monitoring the unauthorized use of a device | ||
Patent #
US 8,719,909 B2
Filed 04/01/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Inhance Technology
|
Electronic wallet removal from mobile electronic devices | ||
Patent #
US 8,768,845 B1
Filed 02/16/2009
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
SYSTEMS AND METHODS FOR DYNAMICALLY ASSESSING AND MITIGATING RISK OF AN INSURED ENTITY | ||
Patent #
US 20140200929A1
Filed 03/17/2014
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Blancco Technology Group Ip Oy
|
Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository | ||
Patent #
US 8,819,793 B2
Filed 09/20/2011
|
Current Assignee
Csidentity Corporation
|
Sponsoring Entity
Csidentity Corporation
|
Privacy-preserving location tracking for devices | ||
Patent #
US 8,848,924 B2
Filed 11/24/2008
|
Current Assignee
University of Washington
|
Sponsoring Entity
University of Washington
|
DEVICE AUTHENTICATION USING DISPLAY DEVICE IRREGULARITY | ||
Patent #
US 20140366103A1
Filed 02/12/2014
|
Current Assignee
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
Sponsoring Entity
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
Mobility device security | ||
Patent #
US 8,923,817 B2
Filed 08/06/2012
|
Current Assignee
Google LLC
|
Sponsoring Entity
Google Inc.
|
Method for monitoring the unauthorized use of a device | ||
Patent #
US 8,932,368 B2
Filed 09/03/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Inhance Technology
|
Method for mitigating the unauthorized use of a device | ||
Patent #
US 9,031,536 B2
Filed 04/02/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Inhance Technology
|
Systems and methods for auditing software usage using a covert key | ||
Patent #
US 9,129,097 B2
Filed 06/18/2010
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
Offline data delete with false trigger protection | ||
Patent #
US 9,154,499 B2
Filed 05/29/2008
|
Current Assignee
Absolute Software
|
Sponsoring Entity
Absolute Software
|
System and methods for identifying compromised personally identifiable information on the internet | ||
Patent #
US 9,235,728 B2
Filed 02/16/2012
|
Current Assignee
Csidentity Corporation
|
Sponsoring Entity
Csidentity Corporation
|
Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository | ||
Patent #
US 9,237,152 B2
Filed 06/14/2014
|
Current Assignee
Csidentity Corporation
|
Sponsoring Entity
Csidentity Corporation
|
Portable computing device with data encryption and destruction | ||
Patent #
US 9,253,308 B2
Filed 05/05/2015
|
Current Assignee
Apogee Technology Consultants LLC
|
Sponsoring Entity
Apogee Technology Consultants LLC
|
Electromagnetic radiation emitter identification apparatus and associated methods | ||
Patent #
US 9,363,863 B2
Filed 06/12/2014
|
Current Assignee
BIOZONE SCIENTIFIC INTERNATIONAL INC.
|
Sponsoring Entity
BIOZONE SCIENTIFIC INTERNATIONAL INC.
|
Portable computing device with data encryption and destruction | ||
Patent #
US 9,369,836 B2
Filed 10/31/2013
|
Current Assignee
Apogee Technology Consultants LLC
|
Sponsoring Entity
Apogee Technology Consultants LLC
|
Portable computing device with data encryption and destruction | ||
Patent #
US 9,380,416 B2
Filed 07/31/2013
|
Current Assignee
Apogee Technology Consultants LLC
|
Sponsoring Entity
Apogee Technology Consultants LLC
|
Portable computing device with data encryption and destruction | ||
Patent #
US 9,392,401 B2
Filed 10/31/2013
|
Current Assignee
Apogee Technology Consultants LLC
|
Sponsoring Entity
Apogee Technology Consultants LLC
|
Device authentication using display device irregularity | ||
Patent #
US 9,444,802 B2
Filed 02/12/2014
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
System and methods for identifying compromised personally identifiable information on the internet | ||
Patent #
US 9,558,368 B2
Filed 11/02/2015
|
Current Assignee
Csidentity Corporation
|
Sponsoring Entity
Csidentity Corporation
|
Hardware identification through cookies | ||
Patent #
US 9,571,492 B2
Filed 09/17/2012
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
Method for mitigating the unauthorized use of a device | ||
Patent #
US 9,576,157 B2
Filed 09/03/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Inhance Technology
|
Device authentication using inter-person message metadata | ||
Patent #
US 9,578,502 B2
Filed 03/04/2014
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
Uniloc Luxembourg S. r.l. fka Uniloc Luxembourg S.A.
|
Portable computing device with data encryption and destruction | ||
Patent #
US 9,674,651 B2
Filed 07/31/2013
|
Current Assignee
Apogee Technology Consultants LLC
|
Sponsoring Entity
Apogee Technology Consultants LLC
|
Tracking location of portable computing device | ||
Patent #
US 9,679,154 B2
Filed 03/14/2015
|
Current Assignee
Apogee Technology Consultants LLC
|
Sponsoring Entity
Apogee Technology Consultants LLC
|
Telemetric tracking of a portable computing device | ||
Patent #
US 9,686,640 B2
Filed 07/31/2013
|
Current Assignee
Apogee Technology Consultants LLC
|
Sponsoring Entity
Apogee Technology Consultants LLC
|
Telemetric tracking of a portable computing device | ||
Patent #
US 9,699,604 B2
Filed 07/29/2016
|
Current Assignee
Apogee Technology Consultants LLC
|
Sponsoring Entity
Apogee Technology Consultants LLC
|
System and methods for identifying compromised personally identifiable information on the internet | ||
Patent #
US 9,710,868 B2
Filed 11/02/2016
|
Current Assignee
Csidentity Corporation
|
Sponsoring Entity
Csidentity Corporation
|
Systems and methods for dynamically assessing and mitigating risk of an insured entity | ||
Patent #
US 9,838,877 B2
Filed 07/22/2011
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Inhance Technology
|
System for monitoring the unauthorized use of a device | ||
Patent #
US 9,881,152 B2
Filed 09/03/2008
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Inhance Technology
|
Providing secure access to smart card applications | ||
Patent #
US 9,883,381 B1
Filed 10/02/2007
|
Current Assignee
Sprint Communications Company LP
|
Sponsoring Entity
Sprint Communications Company LP
|
Display of information through auxiliary user interface | ||
Patent #
US 9,886,599 B2
Filed 08/24/2009
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Inhance Technology
|
Systems and methods for mitigating the unauthorized use of a device | ||
Patent #
US 9,916,481 B2
Filed 08/13/2012
|
Current Assignee
Blancco Technology Group Ip Oy
|
Sponsoring Entity
Inhance Technology
|
Cryptographic security functions based on anticipated changes in dynamic minutiae | ||
Patent #
US 9,979,707 B2
Filed 06/28/2017
|
Current Assignee
mSIGNIA Inc.
|
Sponsoring Entity
mSIGNIA Inc.
|
Hardware identification through cookies | ||
Patent #
US 10,142,337 B2
Filed 01/26/2017
|
Current Assignee
Uniloc 2017 LLC
|
Sponsoring Entity
Uniloc 2017 LLC
|
Cryptographic security functions based on anticipated changes in dynamic minutiae | ||
Patent #
US 10,178,076 B2
Filed 04/23/2018
|
Current Assignee
mSIGNIA Inc.
|
Sponsoring Entity
mSIGNIA Inc.
|
System and architecture for electronic fraud detection | ||
Patent #
US 10,339,527 B1
Filed 10/30/2015
|
Current Assignee
Experian Information Solutions Incorporated
|
Sponsoring Entity
Experian Information Solutions Incorporated
|
Selective data exchange with a remotely configurable mobile unit | ||
Patent #
US 7,509,116 B2
Filed 03/30/2005
|
Current Assignee
GenX Mobile Incorporated
|
Sponsoring Entity
GenX Mobile Incorporated
|
System and method for recovering a lost or stolen wireless device | ||
Patent #
US 7,409,219 B2
Filed 09/29/2005
|
Current Assignee
Nextel Communications
|
Sponsoring Entity
Nextel Communications
|
System and method for recovering a lost or stolen wireless device | ||
Patent #
US 20070072620A1
Filed 09/29/2005
|
Current Assignee
Nextel Communications
|
Sponsoring Entity
Nextel Communications
|
Policy-based network security management | ||
Patent #
US 7,237,267 B2
Filed 10/16/2003
|
Current Assignee
Cisco Technology Incorporated
|
Sponsoring Entity
Cisco Technology Incorporated
|
Vehicle tracking system | ||
Patent #
US 5,218,367 A
Filed 06/01/1992
|
Current Assignee
COMCAST TM INC.
|
Sponsoring Entity
TRACKMOBILE A CA CORP.
|
System and method for processing telephone communication | ||
Patent #
US 5,077,788 A
Filed 09/28/1990
|
Current Assignee
Taro Inc.
|
Sponsoring Entity
Taro Inc.
|
Cellular mobile radio service telephone system | ||
Patent #
US 4,562,572 A
Filed 01/11/1983
|
Current Assignee
Alcatel SA
|
Sponsoring Entity
ITT Corporation
|
Method and apparatus for locating personnel and objects in response to telephone inquiries | ||
Patent #
US 5,548,637 A
Filed 06/07/1995
|
Current Assignee
Remote Locator Systems LLC
|
Sponsoring Entity
Precision Tracking FM Inc.
|
Vehicle location system | ||
Patent #
US 5,055,851 A
Filed 11/29/1989
|
Current Assignee
COMCAST TM INC.
|
Sponsoring Entity
TrackMobile Inc.
|
Hardware theft-protection architecture | ||
Patent #
US 6,032,257 A
Filed 08/29/1997
|
Current Assignee
Hewlett-Packard Development Company L.P.
|
Sponsoring Entity
Compaq Computer Corporation
|
System for inter packet community communication | ||
Patent #
US 5,363,369 A
Filed 03/31/1993
|
Current Assignee
American Telephone Telegraph
|
Sponsoring Entity
American Telephone Telegraph
|
System and method for monitoring computer environment and operation | ||
Patent #
US 5,566,339 A
Filed 10/23/1992
|
Current Assignee
Avocent Huntsville Corporation
|
Sponsoring Entity
FOX NETWORK SYSTEMS INC.
|
System identification in communications system | ||
Patent #
US 4,703,324 A
Filed 12/08/1986
|
Current Assignee
US Philips Corporation
|
Sponsoring Entity
US Philips Corporation
|
Vehicle location system | ||
Patent #
US 4,891,650 A
Filed 05/16/1988
|
Current Assignee
COMCAST TM INC.
|
Sponsoring Entity
TRACKMOBILE INC.
|
Method and apparatus for locating a stolen electronic device using automatic number identification | ||
Patent #
US 6,031,894 A
Filed 05/23/1997
|
Current Assignee
Micron Technology Inc.
|
Sponsoring Entity
Micro Electronics Incorporated
|
Handoff apparatus and method with interference reduction for a radio system | ||
Patent #
US 4,696,027 A
Filed 08/01/1986
|
Current Assignee
Motorola Inc.
|
Sponsoring Entity
Motorola Inc.
|
Cellular terminal for providing public emergency call location information | ||
Patent #
US 5,479,482 A
Filed 09/26/1994
|
Current Assignee
ATT Inc.
|
Sponsoring Entity
ATT Inc.
|
Security system using call display | ||
Patent #
US 5,511,109 A
Filed 10/01/1993
|
Current Assignee
Tyco Safety Products Canada Limited
|
Sponsoring Entity
SUR-GARD SECURITY SYSTEMS LTD.
|
Network system comprising a plurality of lans connected to an ISDN via a plurality of routers, each capable of automatically creating a table for storing router information | ||
Patent #
US 5,351,237 A
Filed 06/04/1993
|
Current Assignee
NEC Corporation
|
Sponsoring Entity
NEC Corporation
|
Security system | ||
Patent #
US 5,729,596 A
Filed 05/17/1994
|
Current Assignee
British Telecommunications PLC
|
Sponsoring Entity
British Telecommunications PLC
|
Method of tracking stolen mobile device connected to wireless or wired network | ||
Patent #
US 20060276175A1
Filed 12/05/2005
|
Current Assignee
Samsung Electronics Co. Ltd.
|
Sponsoring Entity
Samsung Electronics Co. Ltd.
|
Policy-based network security management | ||
Patent #
US 20050086502A1
Filed 10/16/2003
|
Current Assignee
Cisco Technology Incorporated
|
Sponsoring Entity
Cisco Technology Incorporated
|
Isolation approach for network users associated with elevated risk | ||
Patent #
US 20050204162A1
Filed 03/09/2004
|
Current Assignee
Cisco Technology Incorporated
|
Sponsoring Entity
Cisco Technology Incorporated
|
Discovering stolen or lost network-attachable computer systems | ||
Patent #
US 6,950,946 B1
Filed 03/30/2000
|
Current Assignee
Trend Micro America Inc.
|
Sponsoring Entity
International Business Machines Corporation
|
Signatures for facilitating hot upgrades of modular software components | ||
Patent #
US 20040031030A1
Filed 02/05/2001
|
Current Assignee
Ciena Corporation
|
Sponsoring Entity
Ciena Corporation
|
Remote computer capabilities querying and certification | ||
Patent #
US 20020112052A1
Filed 02/13/2001
|
Current Assignee
Educational Testing Service
|
Sponsoring Entity
Educational Testing Service
|
Apparatus and method for monitoring electronic devices via a global network | ||
Patent #
US 6,244,758 B1
Filed 03/24/1997
|
Current Assignee
Absolute Software
|
Sponsoring Entity
Absolute Software
|
Method and apparatus to monitor and locate an electronic device using a secured intelligent agent | ||
Patent #
US 6,269,392 B1
Filed 06/09/1997
|
Current Assignee
Absolute Software
|
Sponsoring Entity
Absolute Software
|
Method and apparatus to monitor and locate an electronic device using a secured intelligent agent via a global network | ||
Patent #
US 6,300,863 B1
Filed 03/24/1998
|
Current Assignee
Absolute Software
|
Sponsoring Entity
Absolute Software
|
Monitoring system for remote units | ||
Patent #
US 5,708,417 A
Filed 12/16/1993
|
Current Assignee
PHONEALERT CORP.
|
Sponsoring Entity
PHONEALERT CORP.
|
Security apparatus and method | ||
Patent #
US 5,715,174 A
Filed 11/15/1994
|
Current Assignee
Absolute Software
|
Sponsoring Entity
Absolute Software
|
Alarm system backup with cut line detector | ||
Patent #
US 5,737,391 A
Filed 09/06/1995
|
Current Assignee
Richard J. Dame
|
Sponsoring Entity
Richard J. Dame
|
Medical alerting system | ||
Patent #
US 5,754,111 A
Filed 09/20/1995
|
Current Assignee
Alfredo Garcia
|
Sponsoring Entity
Alfredo Garcia
|
Device security system | ||
Patent #
US 5,748,084 A
Filed 11/18/1996
|
Current Assignee
Jeremy M. Isikoff
|
Sponsoring Entity
Jeremy M. Isikoff
|
Multimedia messaging using the internet | ||
Patent #
US 5,768,513 A
Filed 06/27/1996
|
Current Assignee
ATT Inc.
|
Sponsoring Entity
ATT Inc.
|
Security apparatus and method | ||
Patent #
US 5,764,892 A
Filed 11/15/1995
|
Current Assignee
Absolute Software
|
Sponsoring Entity
Absolute Software
|
Automated positive control traffic system for weather | ||
Patent #
US 5,771,484 A
Filed 02/28/1996
|
Current Assignee
Oracle America Inc.
|
Sponsoring Entity
Sun Microsystems Incorporated
|
Automated on-line information service and directory, particularly for the world wide web | ||
Patent #
US 5,778,367 A
Filed 12/14/1995
|
Current Assignee
GraphOn Corporation
|
Sponsoring Entity
Scientific Research Management Corporation
|
Alarm sensor multiplexing | ||
Patent #
US 5,783,989 A
Filed 02/28/1995
|
Current Assignee
Directed LLC
|
Sponsoring Entity
DEI Holdings Incorporated
|
Integrated telephone, intercom, security and control system for a multi-unit building | ||
Patent #
US 5,598,456 A
Filed 04/28/1995
|
Current Assignee
David H. Feinberg
|
Sponsoring Entity
David H. Feinberg
|
Vehicle tracking system incorporating traffic signal preemption | ||
Patent #
US 5,602,739 A
Filed 11/22/1995
|
Current Assignee
Global Traffic Technologies LLC
|
Sponsoring Entity
3M Company
|
Travel route information monitor | ||
Patent #
US 5,635,924 A
Filed 03/29/1996
|
Current Assignee
Xylon LLC
|
Sponsoring Entity
Lockheed Martin Corporation
|
System with virtual update capable read-only memory | ||
Patent #
US 5,644,782 A
Filed 10/17/1994
|
Current Assignee
Motorola Inc.
|
Sponsoring Entity
Motorola Inc.
|
System for monitoring and managing computer resources and applications across a distributed computing environment using an intelligent autonomous agent architecture | ||
Patent #
US 5,655,081 A
Filed 03/08/1995
|
Current Assignee
BMC Software Incorporated
|
Sponsoring Entity
BMC Software Incorporated
|
Method and apparatus for controlling network and workstation access prior to workstation boot | ||
Patent #
US 5,680,547 A
Filed 08/08/1995
|
Current Assignee
TREND MICRO DEVICES INCORPORATED
|
Sponsoring Entity
TREND MICRO DEVICES INCORPORATED
|
Railcar location using mutter networks and locomotive transmitter during transit | ||
Patent #
US 5,682,139 A
Filed 06/07/1995
|
Current Assignee
General Electric Company
|
Sponsoring Entity
General Electric Company
|
Method and apparatus of determining location of an unauthorized communication unit | ||
Patent #
US 5,483,244 A
Filed 04/05/1994
|
Current Assignee
Motorola Inc.
|
Sponsoring Entity
Motorola Inc.
|
Tracking system and method for tracking a movable object carrying a cellular phone unit, and integrated personal protection system incorporating the tracking system | ||
Patent #
US 5,515,419 A
Filed 08/02/1994
|
Current Assignee
TRACKMOBILE
|
Sponsoring Entity
TRACKMOBILE
|
Method and apparatus for determining the precise location of a modified cellular telephone using registration messages and reverse control channel transmission | ||
Patent #
US 5,537,460 A
Filed 07/08/1994
|
Current Assignee
Jerry W. Howe, Robert O. Holliday Jr
|
Sponsoring Entity
Jerry W. Howe, Robert O. Holliday Jr
|
Owner oriented system for locating lost or stolen property | ||
Patent #
US 5,576,716 A
Filed 12/07/1994
|
Current Assignee
Kermit M. Sadler
|
Sponsoring Entity
Kermit M. Sadler
|
Protocol and mechanism for primary and mutter mode communication for asset tracking | ||
Patent #
US 5,588,005 A
Filed 06/07/1995
|
Current Assignee
General Electric Company
|
Sponsoring Entity
General Electric Company
|
Multi-path resistant frequency-hopped spread spectrum mobile location system | ||
Patent #
US 5,583,517 A
Filed 10/26/1994
|
Current Assignee
Nexus 1994 Limited
|
Sponsoring Entity
Nexus 1994 Limited
|
Method for connecting a mobile computer to a computer network by using an address server | ||
Patent #
US 5,410,543 A
Filed 07/05/1994
|
Current Assignee
Apple Computer Incorporated
|
Sponsoring Entity
Apple Computer Incorporated
|
Method and apparatus for the remote verification of the operation of electronic devices by standard transmission mediums | ||
Patent #
US 5,406,269 A
Filed 08/13/1993
|
Current Assignee
David Baran
|
Sponsoring Entity
David Baran
|
Network address managing method and system | ||
Patent #
US 5,465,330 A
Filed 02/28/1994
|
Current Assignee
Mitsubishi Electric Corporation
|
Sponsoring Entity
Mitsubishi Electric Corporation
|
On-line problem management of remote data processing systems, using local problem determination procedures and a centralized database | ||
Patent #
US 5,287,505 A
Filed 02/16/1993
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Multicast communication tree creation and control method and apparatus | ||
Patent #
US 5,355,371 A
Filed 06/18/1982
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Non-invasive trace-driven system and method for computer system profiling | ||
Patent #
US 5,355,487 A
Filed 07/23/1993
|
Current Assignee
International Business Machines Corporation
|
Sponsoring Entity
International Business Machines Corporation
|
Address filter unit for carrying out address filter processing among plurality of networks and method thereof | ||
Patent #
US 5,210,748 A
Filed 02/04/1991
|
Current Assignee
Hitachi Ltd.
|
Sponsoring Entity
Hitachi Ltd.
|
Vehicle tracking and security system | ||
Patent #
US 5,223,844 A
Filed 04/17/1992
|
Current Assignee
PJC Logistics LLC
|
Sponsoring Entity
Auto-Trac Inc.
|
Automatic alarm code converter | ||
Patent #
US 5,272,465 A
Filed 11/13/1991
|
Current Assignee
MRR. LIMITED LIABILITY COMPANY
|
Sponsoring Entity
TELEMESSAGING DEVICES INC.
|
Address information registering/searching system in network system | ||
Patent #
US 4,996,524 A
Filed 06/28/1989
|
Current Assignee
Kabushiki Kaisha Toshiba
|
Sponsoring Entity
Kabushiki Kaisha Toshiba
|
Stolen vehicle recovery system | ||
Patent #
US 5,003,317 A
Filed 07/11/1989
|
Current Assignee
METS INC. 10585 N. MERIDIAN STREET INDIANAPOLIS IN A CORP. OF INDIANA
|
Sponsoring Entity
METS INC. 10585 N. MERIDIAN STREET INDIANAPOLIS IN A CORP. OF INDIANA
|
Tone code identification system | ||
Patent #
US 4,999,621 A
Filed 07/27/1989
|
Current Assignee
Idx Technologies Inc.
|
Sponsoring Entity
Idx Technologies Inc.
|
Cellular position locating system | ||
Patent #
US 5,043,736 A
Filed 07/27/1990
|
Current Assignee
PRAV INTELLECTUAL PROPERTIES INC.
|
Sponsoring Entity
CAE-LINK CORPORATION
|
Apparatus for locating and/or tracking stolen or missing vehicles and the like | ||
Patent #
US 4,908,629 A
Filed 12/05/1988
|
Current Assignee
LoJack Operating Company LP
|
Sponsoring Entity
Lo-Jack Corporation
|
High security communication line monitor | ||
Patent #
US 4,926,162 A
Filed 10/28/1988
|
Current Assignee
Honeywell Incorporated
|
Sponsoring Entity
Honeywell Incorporated
|
Emergency telephone actuated signal light or the like device and method | ||
Patent #
US 4,935,951 A
Filed 11/27/1989
|
Current Assignee
EK-RIS ENTERPRISES INC. A CORP. OF CT
|
Sponsoring Entity
EK-RIS ENTERPRISES INC. A CORP. OF CT
|
Micro-programmable security system | ||
Patent #
US 4,951,029 A
Filed 02/16/1988
|
Current Assignee
GE Interlogix Incorporated
|
Sponsoring Entity
INTERACTIVE TECHNOLOGIES INC. A CORP. OF MINNESOTA
|
System for shared remote access of multiple application programs executing in one or more computers | ||
Patent #
US 4,949,248 A
Filed 07/15/1988
|
Current Assignee
Cantor Fitzgerald L.P.
|
Sponsoring Entity
Caro Marshall A.
|
System for generating unsolicited messages on high-tier communication link in response to changed states at station-level computers | ||
Patent #
US 4,972,367 A
Filed 10/23/1987
|
Current Assignee
ALLEN-BRADLEY COMPANY INC. MILWAUKEE WISCONSIN A WISCONSIN CORP.
|
Sponsoring Entity
ALLEN-BRADLEY COMPANY INC. MILWAUKEE WISCONSIN A WISCONSIN CORP.
|
Method of and system and apparatus for locating and/or tracking stolen or missing vehicles and the like | ||
Patent #
US 4,818,998 A
Filed 03/31/1986
|
Current Assignee
LO-JACK CORPORATION 85 EAST INDIA ROW BOSTON MA
|
Sponsoring Entity
LO-JACK CORPORATION 85 EAST INDIA ROW BOSTON MA
|
Single-point locating system | ||
Patent #
US 4,819,053 A
Filed 04/17/1987
|
Current Assignee
ENERGETICS INC. A CORP. OF DE
|
Sponsoring Entity
ENERGETICS INC. A CORP. OF DE
|
System for handling unsolicited messages from lower-tier controllers | ||
Patent #
US 4,855,906 A
Filed 10/23/1987
|
Current Assignee
UTI CHEMICALS INC. A NV CORPORATION
|
Sponsoring Entity
Allen-Bradley Company
|
Transmission method for control information in communication network | ||
Patent #
US 4,875,208 A
Filed 01/26/1988
|
Current Assignee
Hitachi Ltd.
|
Sponsoring Entity
Hitachi Ltd.
|
Integrity securing monitor and method for a security installation | ||
Patent #
US 4,728,935 A
Filed 04/11/1986
|
Current Assignee
Sentrol Incorporated
|
Sponsoring Entity
ADT Security Services Incorporated
|
Stolen object location system | ||
Patent #
US 4,742,357 A
Filed 09/17/1986
|
Current Assignee
RACKJACK LTD. A MI LIMITED PARTNERSHIP
|
Sponsoring Entity
Rackley Ernie C.
|
Security system | ||
Patent #
US 4,754,261 A
Filed 03/30/1987
|
Current Assignee
PITTWAY CORPORATION SYOSSET N.Y. A PA CORP.
|
Sponsoring Entity
PITTWAY CORPORATION SYOSSET N.Y. A PA CORP.
|
Alarm reporting system | ||
Patent #
US 4,652,859 A
Filed 04/22/1985
|
Current Assignee
NTC ELECTRONICS INC. A CORP OF ILLINOIS
|
Sponsoring Entity
NTC ELECTRONICS INC. A CORP OF ILLINOIS
|
Security monitoring and tracking system | ||
Patent #
US 4,651,157 A
Filed 05/07/1985
|
Current Assignee
Harris Corporation
|
Sponsoring Entity
METSS Corporation
|
Local area network with self assigned address method | ||
Patent #
US 4,689,786 A
Filed 03/21/1985
|
Current Assignee
Apple Computer Incorporated
|
Sponsoring Entity
Apple Computer Incorporated
|
Security system with correlated signalling to selected satellite stations | ||
Patent #
US 4,692,742 A
Filed 10/21/1985
|
Current Assignee
Richard A. Wilmot, David T. Raizen
|
Sponsoring Entity
Richard A. Wilmot, David T. Raizen
|
Alarm system | ||
Patent #
US 4,577,182 A
Filed 04/10/1984
|
Current Assignee
Miller Peter
|
Sponsoring Entity
Miller Peter
|
Remote controlled tracking transmitter and tracking support system | ||
Patent #
US 4,596,988 A
Filed 06/10/1983
|
Current Assignee
James T. Wanka
|
Sponsoring Entity
James T. Wanka
|
Programmable alarm system | ||
Patent #
US 4,465,904 A
Filed 06/08/1981
|
Current Assignee
John G. Pate, Ronald B. Gottsegen
|
Sponsoring Entity
Ronald B. Gottsegen
|
Integrated alarm, security, building management, and communications system | ||
Patent #
US 4,375,637 A
Filed 02/24/1981
|
Current Assignee
Firecom Incorporated
|
Sponsoring Entity
Firecom Incorporated
|
Stolen equipment recovery device | ||
Patent #
US 4,284,985 A
Filed 03/03/1980
|
Current Assignee
Vernon G. Heger
|
Sponsoring Entity
Vernon G. Heger
|
Portable vehicle alarm system | ||
Patent #
US 4,187,497 A
Filed 03/22/1978
|
Current Assignee
Steven G. Howell, Orville F. Harless
|
Sponsoring Entity
Steven G. Howell, Orville F. Harless
|
Central station alarm | ||
Patent #
US 4,228,424 A
Filed 10/16/1978
|
Current Assignee
BAKER INDUSTRIES INC. A CORP OF DELAWARE
|
Sponsoring Entity
Baker Protective Services Inc.
|
Central station system transmission apparatus | ||
Patent #
US 4,068,105 A
Filed 05/28/1976
|
Current Assignee
ADT Security Services Incorporated
|
Sponsoring Entity
American District Telegraph Company
|
Computer controlled security system | ||
Patent #
US 4,006,460 A
Filed 12/10/1974
|
Current Assignee
Westinghouse Electric Company LLC
|
Sponsoring Entity
Westinghouse Electric Company LLC
|
Radio central station alarm system | ||
Patent #
US 4,020,477 A
Filed 11/10/1975
|
Current Assignee
ADT Security Services Incorporated
|
Sponsoring Entity
American District Telegraph Company
|
High security alarm transmission system | ||
Patent #
US 4,023,163 A
Filed 09/19/1975
|
Current Assignee
Johnson Service Company
|
Sponsoring Entity
Johnson Controls International plc
|
Apparatus for automatically sending data over a telephone system from a remote station to a central station | ||
Patent #
US 3,987,246 A
Filed 05/19/1975
|
Current Assignee
Electromitor Inc.
|
Sponsoring Entity
Electromitor Inc.
|
SYSTEMS AND METHODS FOR FILE ACCESS AUDITING | ||
Patent #
US 20130198522A1
Filed 04/08/2011
|
Current Assignee
University of Washington
|
Sponsoring Entity
University of Washington
|
Security system | ||
Patent #
US 3,925,763 A
Filed 09/13/1973
|
Current Assignee
Krishnahadi Sikun Pribadi, Romesh Tekchand Wadhwani
|
Sponsoring Entity
Krishnahadi Sikun Pribadi, Romesh Tekchand Wadhwani
|
Method and apparatus for locating and visually indicating the position of a vehicle | ||
Patent #
US 3,357,020 A
Filed 04/04/1966
|
Current Assignee
William M. Jr. Slifter
|
Sponsoring Entity
William M. Jr. Slifter
|
EMERGENCY REPORTING DIGITAL COMMUNICATIONS SYSTEM | ||
Patent #
US 3,694,579 A
Filed 08/06/1971
|
Current Assignee
Peter H. Mcmurray
|
Sponsoring Entity
Peter H. Mcmurray
|
RADIO ALARM SYSTEM | ||
Patent #
US 3,665,312 A
Filed 10/06/1969
|
Current Assignee
Paul Goldman
|
Sponsoring Entity
Paul Goldman
|
COMPREHENSIVE AUTOMATIC VEHICLE COMMUNICATION, PAGING, AND POSITION LOCATION SYSTEM | ||
Patent #
US 3,824,469 A
Filed 06/16/1972
|
Current Assignee
Marlin Philip Ristenbatt
|
Sponsoring Entity
Marlin Philip Ristenbatt
|
VEHICLE LOCATOR SYSTEM | ||
Patent #
US 3,568,161 A
Filed 09/04/1968
|
Current Assignee
Knickel Elwyn Raymond
|
Sponsoring Entity
Knickel Elwyn Raymond
|
20 Claims
- 1. . A method of determining identity of an electronic device, comprising:
obtaining at least one attribute of the device;
searching existing records of a plurality of electronic devices, to identify based on the at least one attribute, a unique record corresponding to the device; and
determining the identity of the device from the unique record if it has been identified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
- 18. . An electronic device comprising an attribute collection application, which collects a plurality of attributes include data points relating to hardware and/or software deployed in the device, which attributes are used to identify a unique record corresponding to the device, wherein the identity of the device can be determined based on the unique record.
- 20. . A server for remotely identifying an electronic device connected to a network, comprising an identification application receiving a plurality of attributes including data points relating to hardware and/or software deployed in the device, and searching existing records of a plurality of electronic devices, to identify based on the attributes, a unique record corresponding to the device, and determine the identity of the device from the unique record if it has been identified.
1 Specification
This application claims the priority of U.S. Provisional Application No. 60/784,195, filed Mar. 20, 2006. This application is a continuation-in-part application of U.S. patent application Ser. No. 11/386,040, filed Mar. 20, 2006, which is a continuation-in-part application of U.S. patent application Ser. No. 11/093,180, filed Mar. 28, 2005. These documents and other publications referenced herein are fully incorporated by reference as if fully set forth herein.
1. Field of the Invention
The present invention relates to identification of an electronic device electronically by remote access.
2. Description of Related Art
In today'"'"'s competitive business environment, information technology (IT) is playing an increasingly important role in the exchange of knowledge in day-to-day business as well as personal functions. Individuals, systems, organizations, and other business assets are interconnected in this emerging economic web, and as this IT landscape grows increasingly complex, so does the need to efficiently manage IT assets, including both physical assets and data. As a result, individuals and organizations alike are now, more than ever, are recognizing the need to take control of, manage and secure their computer asset base, in order to preserve their IT investments. It becomes more challenging to protect IP assets with the increase in processing power for mobile computing devices, where more and more individuals have opted for mobile computing devices, either as replacements to their desktop units, or as additional devices for home or small business networks.
Most IT departments will support the statement that conventional asset management solutions can'"'"'t accurately account for the ever-increasing population of remote and mobile users. In fact, a typical organization will lose up to 15% of its PC assets over a two year period due to PC drift—where assets are not necessarily lost or stolen, but they simply cannot be accounted for due to the many times they'"'"'ve changed owners or departments since first being provisioned. On average, most organizations can only accurately identify 65% of their actual PC asset base when asked to do an inventory. Best practices demands that IT know where at least 90% of PC assets are located at all times. In a response to recent corporate accounting scandals, identity theft and malicious hacking, governments are establishing regulations that force businesses to protect and be accountable for all sensitive digital information. If organizations do not effectively identify and track all of their computing assets there could be severe regulatory concerns.
For an asset tracking and/or configuration management application to undertake its tracking function, not only should it be able to resist certain level of tampering by an unauthorized user, it must also be able to accurately identify the physical electronic asset being tracked. Attempts to identify, track, manage and update PC assets and their configurations are further challenged in view of the fact that during a PC'"'"'s lifecycle it will undergo hardware, software and image changes including: break/fix repairs, configuration changes, operating system reinstalls, hard-drive reformats/replacements, system crashes and user-driven configuration changes. Many of these changes will require a reinstallation of the operating system whereby the original footprint or identification of the PC asset can be disabled or removed. This change, if not diligently recorded and tracked, is the beginning of a PC asset drifting from a known state into an unknown state. These routine PC life cycle operating requirements can increase the complexity and challenge of identifying and tracking PC assets, especially those that are remote and mobile. The challenges in achieving reliable asset identification further create uncertainties in deployment of certain asset control operations, such as undertaking remote data deletion operation to remove sensitive data in a target mobile computer.
Heretofore, some computer assets have been identified by relying on firmware serial numbers. This approach is simple and relatively reliable, but hardware changes could cause misidentification. Other computer assets have been identified by software-assigned identifiers, such as serial numbers and/or names. While this approach is also relatively reliable and the identifiers can be easily assigned, it also creates opportunities for reassignment of the identifiers, such as when the device operating system is reinstalled and/or upon a hardware change, either by an authorized user or by tampering by an unauthorized user.
It is therefore desirable to develop a method for intelligently and accurately determining identification of electronic devices electronically.
The present invention provides a utility to determine identity of an electronic device electronically, by running a device attribute collection application that collects key attributes in the form of data points of the electronic devices and a device identification application that uses these key data points to link the electronic device to a specific owner or entity. Data points of the device may change over time for reasons such as reconfiguration, repair or normal daily use. The device identification application intelligently tracks changes in key data points associated with the device. Even if the data points change, the device identification application can still identify the device and associate it back to the original owner or entity. This enables consistent tracking of the device over its lifecycle. The device may be identified remotely with the device identification application (e.g., in the event of theft or loss of the device) based on collected data points of the device. The device identification application may be deployed in conjunction with services that may include asset tracking, asset recovery, data delete, software deployment, etc.
In one embodiment, the device attribute collection application and the identification application may be embodied in software, hardware, firmware, or a combination of such.
For a fuller understanding of the nature and advantages of the present invention, as well as the preferred mode of use, reference should be made to the following detailed description read in conjunction with the accompanying drawings. In the following drawings, like reference numerals designate like or similar parts throughout the drawings.
The present description is of the best presently contemplated mode of carrying out the invention. This description is made for the purpose of illustrating the general principles of the invention and should not be taken in a limiting sense. The scope of the invention is best determined by reference to the appended claims. The present invention can find utility in a variety of implementations without departing from the scope and spirit of the invention, as will be apparent from an understanding of the principles that underlie the invention. For purpose of illustrating the features of the device identification application of the present invention, reference is made to asset tracking as one example of the services in conjunction with which the present invention may be deployed. It is understood that the device identification application may be used for other services, such as computer management, backup and recovery applications, remote data deletion operations, etc., without departing from the scope and spirit of the present invention.
The detailed descriptions that follow are presented largely in terms of methods or processes, symbolic representations of operations, functionalities and features of the invention. These method descriptions and representations are the means used by those skilled in the art to most effectively convey the substance of their work to others skilled in the art. A software implemented method or process is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. These steps require physical manipulations of physical quantities. Often, but not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It will be further appreciated that the line between hardware and software is not always sharp, it being understood by those skilled in the art that software implemented processes may be embodied in hardware, firmware, or software, in the form of coded instructions such as in microcode and/or in stored programming instructions.
Device Identification Overview
The present invention determines identity of the client device by running a device attribute collection application that collects key data points of the electronic devices and a device identification application that uses these key data points to link the electronic device to a specific owner or entity. Data points of the device may change over time for reasons such as reconfiguration, repair or normal daily use. The device identification application intelligently tracks changes in key data points associated with the device. Even if the data points change, the device identification application can still identify the device and associate it back to the original owner or entity. This enables consistent tracking of the device over its lifecycle. The device may be identified remotely with the device identification application (e.g., in the event of theft or loss of the device) based on collected data points of the device. The device identification application may be deployed in conjunction with services that may include asset tracking, asset recovery, data delete, software deployment, etc.
In one embodiment, the device attribute collection application and the device identification application may be embodied in software, hardware, firmware, or a combination of such.
Overview of Embodiment of Deployment of Device Identification Utility
The device identification utility of the present invention may be deployed as a component of existing asset tracking applications. For example, the device identification utility may be deployed as a component of the AbsoluteTrack, a product developed by Absolute Software Corporation, the assignee of the present invention. Absolute Software has developed and is marketing Computrace, a product and service that securely tracks assets and recovers lost and stolen assets, and AbsoluteTrack, a secure asset tracking, and inventory management, solution powered by the Computrace technology platform. Computrace deploys a stealth agent, which is a software client that resides on the hard drive of client computers. Absolute Software Corporation further improved on the original agent platform by providing an improved tamper resistant servicing Agent for enabling, supporting and/or providing various services relating to management and protection of assets (including without limitation hardware, firmware, software, data, etc.), including services such as data delete, firewall protection, data encryption, location tracking, message notification, and software deployment and updates. The servicing functions can be controlled by a remote server. The technology underlying various Computrace products and services have been disclosed and patented in the U.S. and other countries, which patents had been commonly assigned to Absolute Software Corporation. See, for example, U.S. Pat. Nos. 5,715,174; 5,764,892; 5,802,280; 6,244,758; 6,269,392; 6,300,863; and 6,507,914; and related foreign patents. Details of the persistent agent are disclosed in co-pending U.S. patent application Ser. No. 11/093,180, filed Mar. 28, 2005 (now published U.S. Patent Publication No. US2005-0216757; which corresponds to PCT Application Publication No. WO 2006/102399) and U.S. patent application Ser. No. 11/386,040, filed Mar. 20, 2006 (now published U.S. Patent Publication No. US2006-0272020). Further information concerning AbsoluteTrack has been published by Absolute Software Corporation (e.g., AbsoluteTrack—Secure Computer Asset Tracking Solution, a white paper, published Apr. 25, 2003). These documents are fully incorporated by reference as if fully set forth herein.
In one embodiment of the present invention, device data collection and identification may take advantage of the persistent agent, to be deployed as a service by the persistent agent. The device attribute collection application of the present invention may be deployed by or made part of the Agent. Once installed, the device attribute collection application automatically contacts a monitoring center on a regular or scheduled basis transmitting location information and all auto-discovered asset data points. The device identification application of the present invention may be deployed as one of or part of the servicing functions at the remote server. For purpose of completeness, the device identification utility (i.e., data point collection and device identification) of the present invention will be described below in reference to asset tracking function, as elaborated below.
Tracking Function Overview
Asset tracking function is an example of the services that can be enabled with, supported by and/or provided with the device identification application of the present invention. Referring to
In accordance with the present invention, the host monitoring system C is implemented with the device identification application, which remotely determines the identity of the client devices being monitored, by evaluating the data points collected using the device attribute collection application residing in the client devices (e.g., either a separate application or part of the Agent). The client devices contact the monitoring server via the communication link B (e.g., an IP connection or via a dial-up telephone connection). The host monitoring system C may include a reporting and administration portal, which provides customers, administrators and asset tracking service providers the ability to view data and manage the functions of the monitoring server and the client devices.
With the exception of the device identification application, each of these components has been fully disclosed in the copending U.S. patent application Ser. No. 11/386,040, filed Mar. 20, 2006 (now U.S. Patent Application Publication No. US2006-0272020; which corresponds to PCT Application Publication No. WO 2006/102399).
Referring to
In the co-pending U.S. patent application Ser. No. 11/386,040, one of the important functions of the Agent is to contact the host monitoring system C to report information relating to its associated client device A. The present invention provides an improvement to the earlier embodiments. According to one embodiment disclosed therein, each client device A has attributes that are collected and delivered by the client device A to the host monitoring station C. The present invention provides a further means of identifying the identity of the tracked client device, without solely relying on the device identification number(s) assigned, by providing an application to determine identity of the client device electronically using such attributes.
Device Identification Utility
The general approach includes:
- 1) Attribute collection.
- 2) Collected attributes transmitted to the server (optionally with optimization to only upload them if the CRC for the XML document has changed), and inventory record maintained.
- 3) ESN (Electronic Serial Number) assignment process and storage of changed attributes.
- 4) Optionally storing the extended history of the attribute changes.
a. Device Attribute Collection Application
The present invention determines identity of the client device by running a device attribute collection application that collects key data points of the electronic devices. The device identification application (e.g., residing at a remote server) considers these key data points to link the electronic device to a specific owner or entity. For example, the device attribute collection application may be embodied as a service enabled and supported by the persistent agent, in accordance with one embodiment of the present invention. The device identification scheme according to the present invention would be less susceptible to malicious tampering attempts to mask the device identity.
In one embodiment, the data is gathered and delivered when the persistence agent calls the monitoring server. Referring to
The data points collected and applied to device identification may include the following:
- 1. Device'"'"'s Make, Model
- ii. Device'"'"'s Motherboard Serial Number
- iii. Device'"'"'s UUID (Universal Unique Identifier)
- iv. Hard drive Serial Number
- v. Mac address of multiple network cards
- vi. Ram serial number
- vii. Battery Serial number
The list above is an example of a subset of data points collected during the interaction with a device. An embodiment of a full list of data collected and to be stored as an inventory record by the device identification application at the server is included in Table 1 below, for a computer as an example of a device being tracked. Also listed in Table 1 are the respective mechanisms to collect these data by the device attribute collection application.
It is noted that MAPMEM driver (e.g., developed by Absolute) may only be required if serial number is less than a minimum number of characters (e.g., five characters,) or WMI call fails. Otherwise information from WMI may be used instead. Should S.M.A.R.T API fails (i.e., SN is returned empty), WMI may be used to get HDDSerialNumber. Some of the data points may be specific for certain makes and/or models of devices (e.g., GatewayString data is specific for GATEWAY brand of computers only).
b. Inventory Record for Device Identification
During each interaction with the persistent agent, an inventory record is created with this data by the device identification application. The inventory record is a record of all specific data points collected at one instance that constitutes a device'"'"'s unique identification or characteristics (e.g., an embodiment of an inventory record is show in Table 1). These inventory records are logged to create a history of the asset'"'"'s key data points. The function to identify the device would be enhanced by using these additional data points, as they provide a more comprehensive and dynamic profile of the device (i.e., accommodating continuous changes to the device over the life history of the device), which can be tracked over the device'"'"'s life history.
Referring to
The data point collection application is configured to use these key data points in the inventory records, match it with data that is reported during the agent call, and link the device to a specific owner or entity. Data points of the device change over time for reasons such as reconfiguration, repair or normal maintenance. The application intelligently handles changes in key data points. Even if the data points change, the application can still identify the device and link it back to the original owner or entity. This enables consistent tacking of the device over its lifecycle. In case of theft or loss, the device can be identified remotely with software. The details of the device identification application are described below.
c. Device Identification Application
- i. matching the key data points gathered from the device to the unique identifier number (e.g., Electronic Serial Number—ESN) assigned to the device.
- ii. handles new devices to create a baseline inventory record.
- iii. recognizing the device after subsequent changes in hardware components.
On an initial contact with a new device, an inventory record is created and a unique identifier (ESN) is assigned in the inventory record database 24 and also written on the device hard drive 14. On subsequent contacts, the ESN written on the device hard drive is matched to the inventory record in the inventory record database 24, and the other key data points are updated. When an agent contacts the monitoring server 20, the device attribute collection application 12 (e.g., an inventory DLL) is run to collect the inventory data, and an ESN, if that may have been previously written on the device hard drive 14, is retrieved. Below are possible scenarios.
1. ESN Assignment
If an ESN has not been assigned to the computer (i.e., the last 4 digits are 0'"'"'s), (or if an earlier assigned ESN is misidentified, e.g., as a result of tampering), it means that either it is a new installation, or the hard drive has been wiped and the persistence algorithm from BIOS has restored the agent. If ESN assignment is needed, the right hand side of the flow diagram in
- i. RealSerial+HDDSerial
- ii. Serial number (if the serial numbers for particular makes/models are poorly formatted, reformatting of the serial number may be undertaken)
- iii. RealSerial (SN˜SN˜SN; BIOS-motherboard-system enclosure serial number)
- iv. UUID
- v. HDD Serial
- vi. MAC address
- vii. RAM serial number
- viii. Battery serial number
Specifically, prior to matching the data points, an exception table is looked up to see if the data point is in the exception table. This is to ensure known non-unique data points are not used in ESN determination. Some generic no-name devices are known to have either blank serial numbers or a non-unique serial number that exists on multiple devices. A list of these known non-unique identifiers is maintained in the exception table. If there is an exception, the data point is ignored, and the next item of data point is matched. If a particular data point item is not on the exception list, a determination is made as to how many existing inventory records are found having such data point item. If instead no existing inventory record or multiple existing inventory records are found, that particular data point item is ignored and the next item matched. Any multiple records found in the process may be “cleaned” to remove or reduce issues for future inventory record validation. If only one existing inventory record is found, then the inventory record corresponding to the collected data point item is deemed to be found and a match of the device in relation to such existing inventory record is deemed to have been achieved. The ESN of the existing inventory record is checked to determine if it is in a holding account. If not in the holding account, such ESN is assigned to the device (e.g., written to the device hard-drive) and the inventory record for the device is updated. If in a holding account, and if it is an account that has been pre-designated to be monitored by a specific host monitoring center (e.g., an enterprise account managed by an associated monitoring center), the client device is instructed to call back to that monitoring center. If not an enterprise account, the current Parent (i.e., ID which can be used to identify the account into which an ESN should be assigned) and MID (i.e., media ID; unique identifier assigned when the installation media is created) are used to create a new ESN (i.e., “Parent”+MID become the prefix for the new ESN).
If instead no unique existing inventory record or multiple existing inventory records are found after all the device data point items had been checked during the inventory record validation process, then the most recently created inventory record (i.e., the one comprising the currently collected device attributes) for purpose of ESN assignment. The current Parent and MID are used to create a new ESN (i.e., “Parent”+MID become the prefix for the new ESN).
Once the new ESN has been created in accordance with either of the above logic flow, a new inventory record is created. If not an enterprise account, the new ESN is assigned to the device and the inventory record database is updated. If an enterprise account, the device is redirected to contact the associated or designated server for further handling.
2. Existing Device ESN—Validation
In the case where the calling agent provides an existing ESN (i.e., the last 4 digits are not 0'"'"'s) that was retrieved from the device (e.g., stored on the device hard drive), the device can already be uniquely identified (unless it is an invalid ESN, in which case it would be treated as though an ESN does not exist, and the earlier described ESN assignment process is undertaken). In this case, the application checks for validity of the ESN. The ESN on the hard drive can be invalid for a number of reasons, such as:
- i. The device has an image of another device on the hard drive. Some IT departments create a master system, create a software image of the master systems and deploy these images on multiple devices.
- ii. A hard disk has been swapped from one device to another, during normal maintenance activities. These problems can be automatically detected and resolved.
The application first checks if the calling agent has an activated (non zero) ESN. If yes, the ESN is searched to see if it is stolen. This is because the calling device'"'"'s ESN is not reassigned or changed if it is stolen, to retain the consistency and to keep the historical tracking history intact. If the ESN is not flagged stolen, then a known duplicate list is searched for automatic resolution. This may include assigning a new ESN to one or both of the duplicate records, for example using the ESN activation process earlier described.
3. Massive Change
If activated ESN is calling and the stolen/duplicate checks did not flag the device as being stolen, then the inventory record of the ESN in the inventory record database is matched with the inventory record created based on device data points collected during the current contact. (For enterprise ESN, the device is redirected, as noted above.) If less than a predetermined number of data points (e.g., two or less) have changed, then the inventory record in the inventory record database is updated for checks during subsequent contacts. This process distinguishes routine maintenance activities if the number of changes detected in a single contact is within the predetermined number, from massive changes if the number of changes in a single contact is more than the predetermined number. In this example, if three or more data points are different between the recorded inventory record and calling data points, then a ‘massive change’ situation is triggered, where the ESN is not considered valid. This is because enough data points are different that it cannot be considered the same device. It is assumed that either the ESN on the device was duplicated or otherwise tampered with, or substantial maintenance on the device took place, and the original constituent parts are considered to be the original device, and thus to be a new device.
In this scenario, the application treats it as a new device, and assigns it a new ESN from the same customers account. In this case, the application switches to the right hand side of the logic flow diagram, and the ESN activation process earlier described is undertaken.
4. Exit
At the logical exit of the processes illustrated in
5. Further Enhancements
The embodiment described above effectively and uniquely identifies a device. The logic described above can be extended to include more data points, to collect data points using different mechanism, and using varying matching mechanisms, not limited to the application processes and data described above, without departing from the scope and spirit of the present invention. Hence the device identification application of the present invention should be considered extensible and not bound by the specific algorithms, data points, data collection mechanism or usage of specific limited number of data points by the application.
Data points of the device may change over time for reasons such as reconfiguration, repair or normal daily use. The device identification application intelligently tracks changes in key data points associated with the device. Even if the data points change, the device identification application can still identify the device and associate it back to the original owner or entity. This enables consistent tracking of the device over its lifecycle. The device may be identified remotely with the device identification application (e.g., in the event of theft or loss of the device). The device identification application may be deployed in conjunction with services that may include asset tracking, asset recovery, data delete, software deployment, etc.
The process and system of the present invention has been described above in terms of functional modules in block diagram format. It is understood that unless otherwise stated to the contrary herein, one or more functions may be integrated in a single physical device or a software module in a software product, or one or more functions may be implemented in separate physical devices or software modules at a single location or distributed over a network, without departing from the scope and spirit of the present invention.
It is appreciated that detailed discussion of the actual implementation of each module is not necessary for an enabling understanding of the invention. The actual implementation is well within the routine skill of a programmer and system engineer, given the disclosure herein of the system attributes, functionality and inter-relationship of the various functional modules in the system. A person skilled in the art, applying ordinary skill can practice the present invention without undue experimentation.
While the invention has been described with respect to the described embodiments in accordance therewith, it will be apparent to those skilled in the art that various modifications and improvements may be made without departing from the scope and spirit of the invention. For example, the information extraction application can be easily modified to accommodate different or additional processes to provide the user additional flexibility for web browsing. Accordingly, it is to be understood that the invention is not to be limited by the specific illustrated embodiments, but only by the scope of the appended claims.