ENABLING A SERVICE TO RETURN LOST LAPTOPS
First Claim
Patent Images
1. A computing device comprising:
- a memory having an encrypted data region; and
a theft deterrence module to (i) generate a unique identifier for the computing device, (ii) receive a message from a service external to the computing device for display when the computing device is powered on, (iii) store the generated unique identifier and the message received from the service external to the computing device in the encrypted data region of the memory, (iv) provide the generated unique identifier and the message stored in the encrypted data region of the memory for display in response to receiving a request to display the generated unique identifier and the message, and (v) configure the computing device to restrict functionality of the computing device until the service authorizes restoration of full functionality of the computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.
-
Citations
20 Claims
-
1. A computing device comprising:
-
a memory having an encrypted data region; and a theft deterrence module to (i) generate a unique identifier for the computing device, (ii) receive a message from a service external to the computing device for display when the computing device is powered on, (iii) store the generated unique identifier and the message received from the service external to the computing device in the encrypted data region of the memory, (iv) provide the generated unique identifier and the message stored in the encrypted data region of the memory for display in response to receiving a request to display the generated unique identifier and the message, and (v) configure the computing device to restrict functionality of the computing device until the service authorizes restoration of full functionality of the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium comprising a plurality of instructions, that in response to be executed, result in a computing device:
-
generating a unique identifier for the computing device in a theft deterrence module of the computing device; receiving a message from a service external to the computing device for display when the computing device is powered on; storing the generated unique identifier and the message received from the service external to the computing device in an encrypted data region of memory of the computing device; providing the generated unique identifier and the message stored in the encrypted data region of memory for display in response to receiving a request to display the generated unique identifier and the message; and restricting functionality of the computing device until the service authorizes restoration of full functionality of the computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A server for providing theft deterrence services, the server comprising:
-
a processor; and a memory having stored therein a plurality of instructions, that when executed by the processor, cause the server to; receive notification over a network from a computing device that the computing device is at least one of lost and stolen, the notification comprises a unique identifier generated by a theft deterrence module of the computing device; retrieve, in response to receiving the notification, information associated with the computing device from a data repository using the unique identifier; and send (i) a message that comprises the retrieved information associated with the computing device and (ii) an instruction over the network to the theft deterrence module of the computing device, the message for display on the computing device and the instruction to restrict functionality of the computing device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification