Theft-deterrence method and apparatus for processor based devices
First Claim
Patent Images
1. An article of manufacture comprising:
- computer readable storage medium;
a plurality of programming instructions stored in the storage medium, the programming instructions configured to configure a manageability engine of a processor based device and to provide a host theft-deterrence agent to the processor based device, to deter theft of the processor based device, the manageability engine and the host theft-deterrence agent being configured to cooperate with each other and a theft-deterrence server, remotely disposed from the client device, to implement a theft-deterrence protocol, the host theft-deterrence agent being configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine being configured to operate outside the application execution environment.
1 Assignment
0 Petitions
Accused Products
Abstract
A manageability engine of a processor based device and a host theft-deterrence agent of the processor based device, jointly implement a theft-deterrence protocol with a theft-deterrence service, remotely disposed from the processor based device, to deter theft of the processor based device. The host theft-deterrence agent is configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine is configured to operate outside the application execution environment.
37 Citations
20 Claims
-
1. An article of manufacture comprising:
-
computer readable storage medium; a plurality of programming instructions stored in the storage medium, the programming instructions configured to configure a manageability engine of a processor based device and to provide a host theft-deterrence agent to the processor based device, to deter theft of the processor based device, the manageability engine and the host theft-deterrence agent being configured to cooperate with each other and a theft-deterrence server, remotely disposed from the client device, to implement a theft-deterrence protocol, the host theft-deterrence agent being configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine being configured to operate outside the application execution environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a processor; a wire line based networking interface coupled to the processor to couple the system to a network; and a theft-deterrence service to be operated by the processor to deter theft of each of one or more remotely disposed processor based devices by jointly implementing a theft-deterrence protocol with a manageability engine of each of the processor based device, via the networking interface and a host theft-deterrence agent of the processor based device, the host theft-deterrence agent of each processor based device being configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine being configured to operate outside the application execution environment of the processor based device. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
a manageability engine of a processor based device determining whether a theft status of the processor based device is stolen, on expiration of a timer value; the manageability engine, on determining that the theft status of the processor based device is stolen, alerting a host theft-deterrence agent of the processor device, the host theft-deterrence agent being operated in a processor operated application execution environment of the processor based device, and the manageability engine being operated outside the application execution environment; the host theft-deterrence agent, on receipt of the alert, causing the processor based device to be re-booted; a boot process of the processor based device, on booting the processor based device, obtaining the theft status from the manageability engine, and in response, conditionally abort the boot process to enforce a theft-deterrence policy on the processor based device. - View Dependent Claims (18, 19, 20)
-
Specification