Security monitor for PDA attached telephone
First Claim
Patent Images
1. A security system within a network of connected devices, comprising:
- a database containing contact information including at least one of a security phone number, user phone number, user pager number or email address;
a server application for periodically monitoring unauthorized removal of at least one of said devices to said network and in the event of detecting unauthorized removal of said at least one device from the network then communicating said unauthorized removal in accordance with said contact with said contact information; and
a phone in the vicinity of said at least one device, said phone operating under control of said server application to generate a display for prompting entry of an access code upon detection of said unauthorized removal, whereby correct entry of said access code prevents communicating said unauthorized removal.
21 Assignments
0 Petitions
Accused Products
Abstract
A user enabled application for monitoring the presence of a PDA connected to a network via a cradle and, in response, ringing a phone in the vicinity of the PDA. The display on the telephone displays a message that asks the user to enter an access code via the telephone dialpad. If the user enters the correct access code then nothing happens and the phone continues to work as normal. If, however, the correct access code is not entered, the system communicates the unauthorized removal of the PDA to pre-selected phone numbers, pager numbers or email addresses. Appropriate steps can then be taken to try to and recover the missing device.
105 Citations
11 Claims
-
1. A security system within a network of connected devices, comprising:
-
a database containing contact information including at least one of a security phone number, user phone number, user pager number or email address; a server application for periodically monitoring unauthorized removal of at least one of said devices to said network and in the event of detecting unauthorized removal of said at least one device from the network then communicating said unauthorized removal in accordance with said contact with said contact information; and a phone in the vicinity of said at least one device, said phone operating under control of said server application to generate a display for prompting entry of an access code upon detection of said unauthorized removal, whereby correct entry of said access code prevents communicating said unauthorized removal. - View Dependent Claims (2)
-
-
3. A security system within a network of connected devices, comprising;
-
a database containing contact information; a server application for periodically monitoring unauthorized removal of at least one of said devices to said network and in the event of detecting unauthorized removal of at least of said at least one device from the network then communicating said unauthorized removal in accordance with said contact information; a client application for registering a MAC address of at least one of said devices with said server application upon initial connection to the network, whereupon said server application monitors said unauthorized removal by pinging the network for MAC address and in the absence of a response renders said device inoperable; and a phone in the vicinity of at least one device, said phone operating under control of said server application to generate a display for prompting entry of an access code upon detection of said unauthorized removal, whereby correct entry of said access code prevents communicating said unauthorized removal. - View Dependent Claims (4, 5)
-
-
6. A method of monitoring devices connected to a network and implementing security measures in the event of disconnection therefrom, comprising:
-
storing contact information in database, said contact information includes at least one of a security phone number, user phone number, user pager number or email address; and periodically monitoring unauthorized removal of at least one of said devices to said network; and in the event of detecting unauthorized removal of said at least one device from the network the i) communicating said unauthorized removal in accordance with said contact information, and ii) generating a display at a phone in the vicinity of said at least one device for prompting entry of an access code upon detection of said unauthorized removal, whereby correct entry of said access code prevents communicating said unauthorized removal. - View Dependent Claims (7)
-
-
8. A method of monitoring devices connected to a network and implementing security measures in the event of disconnection therefrom, comprising:
-
storing contact information in a database; periodically monitoring unauthorized removal of at least one of the devices to the network; and registering a MAC address of the at least one device upon an initial connection to the network, and subsequently monitoring the connection by pinging the network for the MAC address and in the event of detecting unauthorized removal of the at least one device from the network then i) communicating the unauthorized removal in accordance with the contact information, and ii) generating a display at a phone in the vicinity of the at least one device for prompting entry of an access code upon detection of the unauthorized removal, whereby correct entry of the access code prevents communicating the unauthorized removal. - View Dependent Claims (9, 10, 11)
-
Specification