Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server
First Claim
1. A method for preventing unauthorized use of a device, said method comprising:
- a) receiving registration information for said device, wherein said registration information comprises a unique identity for said device;
b) receiving a signal upon use of said device, wherein said signal comprises said unique identity;
c) determining whether said use of said device is authorized based on said registration information and said unique identity; and
d) sending a signal to said device to enable operation of said device provided said use is authorized, wherein absent said signal at least a portion of said device is disabled.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method for preventing unauthorized use of a device (e.g., a portable computer system) and for recovering the device when, for example, the device has been lost or stolen and an attempt to use it is made by someone other than an authorized user. The authorized user registers the device in a database at a central site (e.g., a Web site) using a unique identifier such as the device'"'"'s serial number. If the device is lost or stolen, this information is entered into the Web site database by the authorized user. When the device is connected to the Internet using either a wireless or a landline connection, the device automatically communicates its unique identity to the Web site. The Web site performs a lookup and, if the database indicates that the device is lost or stolen, the device is so notified. In response, the device disables normal operation and instead will display, for example, the name and address of the authorized user. Other security measures can be used depending on the preferences of the authorized user; for example, the Web site can initiate a trace to locate the device. Thus, when a device is lost or stolen, it can be more readily recovered and, in the meantime, unauthorized use is prevented.
-
Citations
22 Claims
-
1. A method for preventing unauthorized use of a device, said method comprising:
-
a) receiving registration information for said device, wherein said registration information comprises a unique identity for said device;
b) receiving a signal upon use of said device, wherein said signal comprises said unique identity;
c) determining whether said use of said device is authorized based on said registration information and said unique identity; and
d) sending a signal to said device to enable operation of said device provided said use is authorized, wherein absent said signal at least a portion of said device is disabled. - View Dependent Claims (2, 3, 4, 5, 6, 7)
receiving an indication that said device is to be disabled when said signal of said step b) is received; and
indexing said indication using said unique identity for said device.
-
-
5. The method as recited in claim 1 wherein said step a) comprises:
-
receiving an indication that said device is to be enabled when said signal of said step b) is received; and
indexing said indication using said unique identity for said device.
-
-
6. The method as recited in claim 1 wherein said step c) comprises:
-
c1) indexing said registration information using said unique identity; and
c2) performing a lookup of said registration information using said unique identity.
-
-
7. The method as recited in claim 1 further comprising:
e) initiating a trace to determine a location of said device.
-
8. In a portable device, a method for preventing unauthorized use of said portable device, said method comprising:
-
a) sending a signal to a central device having a database comprising registration information for said portable device, wherein said signal comprises a unique identity for said portable device;
b) receiving in response an indication of whether use of said portable device is authorized, wherein authorization is determined based on said registration information and said unique identity; and
c) implementing an operating mode in response to said indication, wherein said step c) comprises;
c1) enabling operation of said portable device provided said use is authorized; and
c2) disabling operation of at least a portion of said portable device provided said use is not authorized. - View Dependent Claims (9, 10, 11, 12, 13)
displaying information for identifying and contacting an authorized user.
-
-
12. The method as recited in claim 8 wherein said registration information is indexed using said unique identity and wherein said step b) comprises:
performing a lookup of said registration information in said database using said unique identity.
-
13. The method as recited in claim 8 wherein further comprising the step of:
d) disabling operation of said portable device when said signal of said step a) is not sent to said central device before a specified time period expires.
-
14. A system for preventing unauthorized use of a device, said system comprising:
-
a central device having a database comprising registration information for said device; and
a device communicatively coupled to said central device;
wherein upon use of said device, said device operable to send to said central device a signal comprising a unique identity for said device;
wherein said central device is operable to determine whether said use of said device is authorized based on said registration information and said unique identity, and wherein said central device indicates to said device whether said use is authorized; and
wherein operation of said device is enabled provided said use is authorized and wherein at least a portion of said device is disabled provided said use is not authorized. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
Specification