System and Method for Securing a Computer System
First Claim
1. A method for securing data stored on a computer system, comprising:
- activating an alarm sequence in response to detecting a security breach of the computer system; and
if the alarm sequence is not deactivated within a first time period, completing the alarm sequence, wherein the alarm sequence includes rendering at least a portion of data stored on the computer system unreadable.
1 Assignment
0 Petitions
Accused Products
Abstract
A secured computer system includes a communication interface and an intrusion detection module. The computer system may be portable and configured for wireless communication with a user of the system. The user may activate and configure an alarm monitor, which may be triggered by motion of the computer system. If the triggered alarm is not deactivated, an alarm sequence is activated. If the alarm sequence is not cancelled, then security measures for protecting sensitive data on the computer system from unauthorized access may be executed. The security measures may include removing data or rendering a storage device inaccessible.
-
Citations
29 Claims
-
1. A method for securing data stored on a computer system, comprising:
-
activating an alarm sequence in response to detecting a security breach of the computer system; and if the alarm sequence is not deactivated within a first time period, completing the alarm sequence, wherein the alarm sequence includes rendering at least a portion of data stored on the computer system unreadable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system configured to secure stored data, comprising:
-
a processor; a communication interface for communicating between the computer system and an authorized user of said computer system; a data storage device; an intrusion detection module; and a computer-readable medium accessible to the processor, storing program instructions which, when executed by the processor, define the steps of; initiating an alarm sequence in response to unauthorized intrusion of the computer system, and completing the alarm sequence if the alarm sequence is not terminated by the authorized user, wherein the alarm sequence includes removing at least some data stored on the data storage device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. Computer-readable medium comprising program instructions for execution on a processor, said instructions defining the steps of:
-
in response to detecting a triggered alarm indicating unauthorized intrusion of a computer system, execute an alarm sequence after a first time period has elapsed; and if the alarm sequence is not terminated by a registered user of the computer system prior to the elapse of a second time period, continue to execute the alarm sequence, wherein the alarm sequence includes instructions executable to irreversibly render selected data stored on the computer system inaccessible. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A system for securing data stored on a computer system, comprising:
-
first means for activating an alarm sequence in response to detecting a security breach of the computer system; and
methodsecond means for completing the alarm sequence if the alarm sequence is not deactivated within a first time period, wherein the alarm sequence includes rendering at least a portion of data stored on the computer system unreadable.
-
- 27. The system of claim 27, wherein the computer system is a portable computer.
-
29. The system of claim 29, wherein the alarm sequence further comprises:
-
third means for generating an audio alarm emanating from the computer system; and fourth means for sending an alarm message to a user of the computer system.
-
Specification