SECURITY MODULE HAVING A SECONDARY AGENT IN COORDINATION WITH A HOST AGENT
First Claim
1. A method of tracking a device comprising:
- providing a host agent running on a host operating system in the device, said host agent accessing at least one network;
providing a secondary agent in the device wherein said secondary agent accesses said at least one network independently of the operating system; and
connecting, to said at least one network, a monitoring center configured to communicate with at least one of the host agent and the secondary agent;
wherein the secondary agent and the host agent interface and coordinate with each other to;
determine which is to access said at least one network to communicate attributes of one or more of the device and host operating system to the monitoring center; and
communicate said attributes to the monitoring center by the host agent in preference to the secondary agent.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention is directed to a security module deployed in a host device, which provides a secondary agent that operates in coordination with the host agent in the host device, but operates independent of the host operating system of the host device to independently access an existing communication network interface in the host device or a separate dedicated network interface, if available. In one aspect, the present invention enables robust theft recovery and asset tracking services. The system comprises a monitoring center; one or more monitored devices; a security module in the monitored devices; and one or more active communications networks. Monitored devices may be stand alone devices, such as computers (e.g., portable or desktop computers), or a device or a subsystem included in a system. A monitored device comprises a security module, a host agent and software to support the host agent that runs in the monitored device'"'"'s OS.
20 Citations
20 Claims
-
1. A method of tracking a device comprising:
-
providing a host agent running on a host operating system in the device, said host agent accessing at least one network; providing a secondary agent in the device wherein said secondary agent accesses said at least one network independently of the operating system; and connecting, to said at least one network, a monitoring center configured to communicate with at least one of the host agent and the secondary agent; wherein the secondary agent and the host agent interface and coordinate with each other to; determine which is to access said at least one network to communicate attributes of one or more of the device and host operating system to the monitoring center; and communicate said attributes to the monitoring center by the host agent in preference to the secondary agent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification