Method and system for providing protection against theft and loss of a portable computer system
First Claim
1. A method for providing protection against theft and loss of a portable computer system, the method comprising:
- establishing boundary conditions within which the portable computer system is authorized for use;
tracking a position of the portable computer system with a global position system (GPS) unit in the portable computer system;
comparing the tracked position to the boundary conditions to identify whether the portable computer system has violated the boundary conditions;
performing anti-theft routines based on when the tracked position has violated the boundary conditions; and
utilizing a preset calling function at preset intervals to identify a location of the portable computer system based on GPS data from the GPS unit based on when the tracked position has not violated the boundary conditions.
2 Assignments
0 Petitions
Accused Products
Abstract
Aspects for providing protection against theft and loss of a portable computer system are described. The aspects include establishing boundary conditions within which the portable computer system is authorized for use and tracking a position of the portable computer system with a global position system (GPS) unit in the portable computer system. The position is compared to the boundary conditions to identify whether the portable computer system has violated the boundary conditions, and anti-theft routines are performed when the position has violated the boundary conditions. The anti-theft routines include calling a preset phone number with a cellular calling facility of the portable computer system.
-
Citations
20 Claims
-
1. A method for providing protection against theft and loss of a portable computer system, the method comprising:
-
establishing boundary conditions within which the portable computer system is authorized for use; tracking a position of the portable computer system with a global position system (GPS) unit in the portable computer system; comparing the tracked position to the boundary conditions to identify whether the portable computer system has violated the boundary conditions; performing anti-theft routines based on when the tracked position has violated the boundary conditions; and utilizing a preset calling function at preset intervals to identify a location of the portable computer system based on GPS data from the GPS unit based on when the tracked position has not violated the boundary conditions. - View Dependent Claims (2, 3, 4, 5, 18)
-
-
6. A method for providing protection against theft and loss of a portable computer system, the method comprising:
-
utilizing GPS (global position system) functionality within a portable computer system to track a position of the portable computer system; identifying when the position tracked by the GPS functionality violates preset boundary conditions of the portable computer system; utilizing cellular calling functionality within the portable computer system to report a potential theft of the portable computer system based on when the preset boundary conditions have been violated by the position tracked; and utilizing a preset calling function at preset intervals with the cellular calling functionality to identify a location of the portable computer system based on when the preset boundary conditions have not been violated by the position tracked. - View Dependent Claims (7, 8, 9, 10, 11, 12, 19)
-
-
13. A communication control system for providing built-in anti-theft capabilities in a portable computer system, the communication control system comprising:
-
a controller; a cellular unit for performing a calling function at preset intervals; a GPS (global position system) unit coupled to the controller for tracking a position of the portable computer system; and a storage unit, the storage unit coupled to the controller and storing preset boundary conditions and out-of-boundary actions, wherein the controller compares the tracked position to the boundary conditions and initiates the out-of-boundary actions based on when the comparison identifies a violation of the boundary conditions by the tracked position, and wherein the calling function provides for an identification of a location of the portable computer system based on when there is not a violation of the boundary conditions by the tracked position. - View Dependent Claims (14, 15, 16, 17, 20)
-
Specification