Methods, Systems and Apparatus to Secure Devices Via Physical and/or Virtual Locking
First Claim
Patent Images
1. An apparatus to secure a device, comprising:
- a platform detector to determine when the device is within a threshold proximity to a platform;
a device locking manager to initiate a locking service for the device when within the threshold proximity; and
a device tampering manager to initiate a tampering remedy in response to detecting an indication of tampering.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, apparatus and articles of manufacture are disclosed to secure devices. An example disclosed apparatus includes a platform detector to determine when the device is within a threshold proximity to a platform, a device locking manager to initiate a locking service for the device when within the threshold proximity, and a device tampering manager to initiate a tampering remedy in response to detecting an indication of tampering.
47 Citations
20 Claims
-
1. An apparatus to secure a device, comprising:
-
a platform detector to determine when the device is within a threshold proximity to a platform; a device locking manager to initiate a locking service for the device when within the threshold proximity; and a device tampering manager to initiate a tampering remedy in response to detecting an indication of tampering. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method to secure a device, comprising:
-
determining when the device is within a threshold proximity to a platform; initiating a locking service for the device when within the threshold proximity; and initiating a tampering remedy in response to detecting an indication of tampering. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A machine accessible storage device or storage disk having instructions stored thereon that, when executed, cause a machine to at least:
-
determine when the device is within a threshold proximity to a platform; initiate a locking service for the device when within the threshold proximity; and initiate a tampering remedy in response to detecting an indication of tampering. - View Dependent Claims (17, 18, 19, 20)
-
Specification