System and Method For Securing Portable Computers
First Claim
Patent Images
1. A method for laptop security, comprising:
- establishing a desired network topology with a plurality of laptops, wherein each of said plurality of laptops communicates with other laptops utilizing a wireless connection;
in response to establishing said desired network topology, causing a plurality of laptops to enter a lock down state; and
in response to detecting that a disruption in communication has occurred, issuing an alarm.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and computer-usable medium for laptop security. In a preferred embodiment of the present invention, a security manager establishes a desired network topology with a collection of laptops, wherein each of the collection of laptops communicates with other laptops within the collection of laptops utilizing a wireless connection. In response to establishing the desired network topology, the security manager causes the plurality of laptops to enter a lock down state. In response to detecting that a disruption in communication has occurred, the security manager issues an alarm.
4 Citations
12 Claims
-
1. A method for laptop security, comprising:
-
establishing a desired network topology with a plurality of laptops, wherein each of said plurality of laptops communicates with other laptops utilizing a wireless connection; in response to establishing said desired network topology, causing a plurality of laptops to enter a lock down state; and in response to detecting that a disruption in communication has occurred, issuing an alarm. - View Dependent Claims (2, 3, 4)
-
-
5. A system for laptop security comprising:
-
a processor; a databus coupled to said processor; and a computer-usable medium embodying computer program code, said computer-usable medium being coupled to said databus, said computer program code comprising instructions executable by said processor and configured for; establishing a desired network topology with a plurality of laptops, wherein each of said plurality of laptops communicates with other laptops utilizing a wireless connection; in response to establishing said desired network topology, causing a plurality of laptops to enter a lock down state; and in response to detecting that a disruption in communication has occurred, issuing an alarm. - View Dependent Claims (6, 7, 8)
-
-
9. A computer-usable medium embodying computer program code, said computer program code comprising computer-executable instructions configured for:
-
establishing a desired network topology with a plurality of laptops, wherein each of said plurality of laptops communicates with other laptops utilizing a wireless connection; in response to establishing said desired network topology, causing a plurality of laptops to enter a lock down state; and in response to detecting that a disruption in communication has occurred, issuing an alarm. - View Dependent Claims (10, 11, 12)
-
Specification