BURGLARPROOF METHOD AND SYSTEM FOR PORTABLE COMPUTER DEVICES
First Claim
Patent Images
1. A burglarproof method for portable computer devices, comprising:
- when a portable computer device is activated, detecting hardware components of the portable computer device using a BIOS thereof;
creating a first hardware data table based on detection results using an IC of the portable computer device;
the IC connecting to a data server via a network and uploading the first hardware data table to the data server which serves as a second hardware data table, wherein the first and second hardware data tables comprises an IP address respectively retrieved by the connection to the data server and the second hardware data tables further comprise a status field representing a use status of the portable computer device; and
when the status field represents “
stolen”
, enabling a stolen display function by the IC.
1 Assignment
0 Petitions
Accused Products
Abstract
A burglarproof method for portable computer devices is disclosed. When a portable computer device is activated, an IC thereof registers user data to a data server using an internal network device thereof and creates and uploads a hardware data table generated based on detection results by a BIOS to the data server. The hardware data table comprises an IP and a status field representing a use status of the portable computer device. When the status field represents “stolen”, the IC activates a stolen display function to lock a screen of the portable computer device to be incapable of performing any operations by users and performs a corresponding operation.
13 Citations
18 Claims
-
1. A burglarproof method for portable computer devices, comprising:
-
when a portable computer device is activated, detecting hardware components of the portable computer device using a BIOS thereof; creating a first hardware data table based on detection results using an IC of the portable computer device; the IC connecting to a data server via a network and uploading the first hardware data table to the data server which serves as a second hardware data table, wherein the first and second hardware data tables comprises an IP address respectively retrieved by the connection to the data server and the second hardware data tables further comprise a status field representing a use status of the portable computer device; and when the status field represents “
stolen”
, enabling a stolen display function by the IC. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A burglarproof system for portable computer devices, comprising:
-
a data server; and a portable computer device, further comprising; a BIOS, performing a hardware detection operation when the portable computer device is activated to detect plural hardware components of the portable computer device; a network device; and an IC, creating a first hardware data table based on detection results, connecting to the data server via a network using the network device, registering user data to the data server, and uploading the first hardware data table to the data server which serves as a second hardware data table of the data server, wherein the first and second hardware data tables comprise an IP address respectively retrieved by the connection to the data server and the second hardware data tables further comprise a status field representing a use status of the portable computer device, and, when the status field represents “
stolen”
, enabling a stolen display function. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable storage medium storing a computer program providing a burglarproof method for portable computer devices, comprising using a computer to perform the steps of:
-
when a portable computer device is activated, detecting hardware components of the portable computer device using a BIOS thereof; creating a first hardware data table based on detection results using an IC of the portable computer device; the IC connecting to a data server via a network and uploading the first hardware data table to the data server which serves as a second hardware data table, wherein the first and second hardware data tables comprise an IP address respectively retrieved by the connection to the data server and the second hardware data tables further comprise a status field representing a use status of the portable computer device; and when the status field represents “
stolen”
, enabling a stolen display function by the IC. - View Dependent Claims (16, 17, 18)
-
Specification