SECURITY APPARATUS AND METHOD
First Claim
1. An apparatus with an integral computer tracing and security monitoring system comprising a transparent agent controlling means for sending signals to a host monitoring system via a telecommunication link, at spaced-apart intervals of time, said signals including identifying indicia for said device.
0 Assignments
0 Petitions
Accused Products
Abstract
A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.
-
Citations
6 Claims
- 1. An apparatus with an integral computer tracing and security monitoring system comprising a transparent agent controlling means for sending signals to a host monitoring system via a telecommunication link, at spaced-apart intervals of time, said signals including identifying indicia for said device.
-
4. A computer tracing and security monitoring system, comprising:
-
a computer; a telecommunication interface operatively connected to the computer, and means controlled by the computer for sending signals to the telecommunication interface including signals for contacting a host monitoring system, and for providing the host monitoring system with identification indicia. - View Dependent Claims (5)
-
-
6. A method for providing a computer with a Agent security system, comprising the steps of preparing software for the computer with instructions for dialing a host monitoring system number without visual or audible signals and transmitting identification indicia, and programming the software into addressable memory of the computer at a location not normally accessible to operating software for the computer.
Specification