Deterring unauthorized use of electronic devices
First Claim
Patent Images
1. A method for deterring theft of an electronic device, comprising:
- installing security data in a protected storage area; and
installing a security routine operable during an activation process to check for the security data when the device is powered on, the security routine includingestablishing a network connection with a manufacturer of the electronic device during the activation process,prompting the manufacturer over the network connection for a network authorization in response to finding the security data,receiving the network authorization before permitting an initial use of the device, andcontinuing the activation process based on the manufacturer responding correctly.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for deterring unauthorized use of an electronic device is described. The method includes installing security data in a protected storage area, installing a security routine operable to check for the security data, and prompting a user for identity information if the security data is found, before permitting use of the device. In an implementation, the device is shut down if the identity information is incorrect, and manufacturer contact information may be displayed before shutting down. But if the user responds correctly, the activation process is continued to enable normal operation of the device.
-
Citations
22 Claims
-
1. A method for deterring theft of an electronic device, comprising:
-
installing security data in a protected storage area; and installing a security routine operable during an activation process to check for the security data when the device is powered on, the security routine including establishing a network connection with a manufacturer of the electronic device during the activation process, prompting the manufacturer over the network connection for a network authorization in response to finding the security data, receiving the network authorization before permitting an initial use of the device, and continuing the activation process based on the manufacturer responding correctly. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
installing a security routine in a basic input/output system (BIOS) of a personal computer (PC), the security routine operable during a boot-up process to check a protected storage area for security data, the boot-up process to ensure that components of the personal computer operate correctly, the security routine comprising; stopping the boot-up process, establishing a network connection, and prompting for a network authorization over the network connection in response to the security data being found; receiving the network authorization responsive to the prompting; maintaining the stop of the boot-up process based on the network authorization being unacceptable; proceeding with the boot-up process based on the network authorization being acceptable or in response to the security data not being found; and disabling the security routine after the acceptable network authorization is provided. - View Dependent Claims (9, 10, 11, 12)
-
13. Computer software embodied in a computer-readable medium, the software comprising instructions for causing an electronic device to:
-
before permitting use of the device, execute a security routine during a boot-up process to determine whether to permit a user to operate the electronic device, the security routine including establishing a network connection; enabling the user to operate the electronic device based on receiving an acceptable network authorization over the network connection; and preventing the user from operating the electronic device based on receiving an unacceptable network authorization over the network connection; and permanently deactivate the security routine after the acceptable network authorization is received. - View Dependent Claims (14, 15)
-
-
16. A method comprising:
starting a boot-up routine of an electronic device, the routine including checking a protected storage area for security data to identify an entity permitted to use the electronic device, in response to locating the security data and before permitting use of the device, establishing a network connection, transmitting information over the network for authentication, receiving data over the network to identify that the entity is permitted to use the electronic device based on the data satisfying a predetermined criterion, and disabling the security routine after the acceptable network authorization is provided, and in response to a failure to locate the security data, allowing the boot-up routine to continue so that the device becomes operable. - View Dependent Claims (17, 18, 19, 20)
-
21. A method for deterring theft of an electronic device, comprising:
-
installing security data in a protected storage area; and installing a security routine operable during an activation process to check for the security data when the device is powered on, the security routine including in response to a failure to find the security data, permitting use of the device, in response to finding the security data, establishing a network connection with a manufacturer of the electronic device during the activation process, prompting the manufacturer over the network connection for a network authorization in response to finding the security data, and receiving the network authorization before permitting an initial use of the device.
-
-
22. A method, comprising:
installing a security routine in a basic input/output system (BIOS) of a personal computer (PC), the security routine operable during a boot-up process to check a protected storage area for security data, the boot-up process to ensure that components of the personal computer operate correctly, the security routine comprising; stopping the boot-up process, establishing a network connection, and prompting for a network authorization over the network connection in response to the security data being found; receiving the network authorization responsive to the prompting; maintaining the stop of the boot-up process based on the network authorization being unacceptable; proceeding with the boot-up process based on the network authorization being acceptable or in response to the security data riot being found; and disabling the security data after the acceptable network authorization is provided.
Specification