Electronic device security system and method
DCFirst Claim
Patent Images
1. A method for providing security for an electronic device, by an electronic device security system, the method comprising:
- accepting, at a central server, a selection of a data destruction service for the electronic device, the data destruction service to cause erasure of a non-volatile storage device in the electronic device after the electronic device has been reported stolen;
after accepting the selection of the data destruction service for the electronic device, receiving, at the central server, a report that the electronic device has been stolen;
after receiving the report that the electronic device has been stolen, recording in the central server that the electronic device has been reported stolen;
causing to be presented, by a device other than the electronic device, an option to confirm that the non-volatile storage device of the electronic device is to be erased;
accepting, from the device other than the electronic device, input to confirm that the non-volatile storage device is to be erased; and
after receiving the report that the electronic device has been stolen, causing the electronic device to erase the non-volatile storage device,wherein the system includes (a) a non-viewable component, (b) an application component that is connected to the non-viewable component, that is capable of communicating with the non-viewable component, and that executes within an operating system environment, (c) a Basic Input/Output System (BIOS) component connected to the non-viewable component, and (d) a server system capable of communicating through a secure medium with the application component,wherein the BIOS component is configured to determine whether the non-viewable component is present and whether the non-viewable component has been tampered with,wherein the BIOS component is configured to check integrity of the application component during a boot process for the electronic device,wherein the BIOS component is configured to automatically cause the electronic device to restore the integrity of the application component, in response to a negative integrity check of the application component,wherein the application component is substantially distinct from the BIOS component and the non-viewable component, andwherein the non-viewable component is configured to determine whether the application component is present and whether the application component has been tampered with.
3 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system and method for securing and tracking an electronic device. A method includes but is not limited to accepting a selection of a service to erase a hard disk drive in the electronic device; recording that the electronic device has been reported stolen; and erasing the hard disk drive.
43 Citations
23 Claims
-
1. A method for providing security for an electronic device, by an electronic device security system, the method comprising:
-
accepting, at a central server, a selection of a data destruction service for the electronic device, the data destruction service to cause erasure of a non-volatile storage device in the electronic device after the electronic device has been reported stolen; after accepting the selection of the data destruction service for the electronic device, receiving, at the central server, a report that the electronic device has been stolen; after receiving the report that the electronic device has been stolen, recording in the central server that the electronic device has been reported stolen; causing to be presented, by a device other than the electronic device, an option to confirm that the non-volatile storage device of the electronic device is to be erased; accepting, from the device other than the electronic device, input to confirm that the non-volatile storage device is to be erased; and after receiving the report that the electronic device has been stolen, causing the electronic device to erase the non-volatile storage device, wherein the system includes (a) a non-viewable component, (b) an application component that is connected to the non-viewable component, that is capable of communicating with the non-viewable component, and that executes within an operating system environment, (c) a Basic Input/Output System (BIOS) component connected to the non-viewable component, and (d) a server system capable of communicating through a secure medium with the application component, wherein the BIOS component is configured to determine whether the non-viewable component is present and whether the non-viewable component has been tampered with, wherein the BIOS component is configured to check integrity of the application component during a boot process for the electronic device, wherein the BIOS component is configured to automatically cause the electronic device to restore the integrity of the application component, in response to a negative integrity check of the application component, wherein the application component is substantially distinct from the BIOS component and the non-viewable component, and wherein the non-viewable component is configured to determine whether the application component is present and whether the application component has been tampered with. - View Dependent Claims (3, 4, 5, 6)
-
-
2. A system for providing security for an electronic device, comprising:
-
a non-viewable component; an application component that is connected to the non-viewable component, that is capable of communicating with the non-viewable component, and that executes within an operating system environment; a Basic Input/Output System (BIOS) component connected to the non-viewable component; and a server system capable of communicating through a secure medium with the application component, wherein the system is operable to perform operations comprising; accepting a selection of a data destruction service for an electronic device, the data destruction service to cause erasure of a non-volatile storage device in the electronic device after the electronic device has been reported stolen; after accepting the selection of the data destruction service for the electronic device, receiving a report that the electronic device has been stolen; after receiving the report that the electronic device has been stolen, recording that the electronic device has been reported stolen; causing to be presented, by a device other than the electronic device, an option to confirm that the non-volatile storage device of the electronic device is to be erased; accepting, from the device other than the electronic device, input to confirm that the non-volatile storage device is to be erased; and after receiving the report that the electronic device has been stolen, causing the electronic device to erase the non-volatile storage device, wherein the BIOS component is configured to determine whether the non-viewable component is present and whether the non-viewable component has been tampered with, wherein the BIOS component is configured to check integrity of the application component during a boot process for the electronic device, wherein the BIOS component is configured to automatically cause the electronic device to restore the integrity of the application component, in response to a negative integrity check of the application component, wherein the application component is substantially distinct from the BIOS component and the non-viewable component, and wherein the non-viewable component is configured to determine whether the application component is present and whether the application component has been tampered with. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An article of manufacture, comprising:
-
a non-transitory machine accessible storage medium; and instructions stored in the non-transitory machine accessible storage medium, wherein the instructions, when executed by a computer system, cause the computer system to perform operations comprising; accepting a selection of a data destruction service for an electronic device, the data destruction service to cause erasure of a non-volatile storage device in the electronic device after the electronic device has been reported stolen; after accepting the selection of the data destruction service for the electronic device, receiving a report that the electronic device has been stolen; after receiving the report that the electronic device has been stolen, recording that the electronic device has been reported stolen; causing to be presented, by a device other than the electronic device, an option to confirm that the non-volatile storage device of the electronic device is to be erased; accepting, from the device other than the electronic device, input to confirm that the non-volatile storage device is to be erased; and after receiving the report that the electronic device has been stolen, causing the electronic device to erase the non-volatile storage device, wherein the computer system includes (a) a non-viewable component, (b) an application component that is connected to the non-viewable component, that is capable of communicating with the non-viewable component, and that executes within an operating system environment, (c) a Basic Input/Output System (BIOS) component connected to the non-viewable component, and (d) a server system capable of communicating through a secure medium with the application component, wherein the BIOS component is configured to determine whether the non-viewable component is present and whether the non-viewable component has been tampered with, wherein the BIOS component is configured to check integrity of the application component during a boot process for the electronic device, wherein the BIOS component is configured to automatically cause the electronic device to restore the integrity of the application component, in response to a negative integrity check of the application component, wherein the application component is substantially distinct from the BIOS component and the non-viewable component, and wherein the non-viewable component is configured to determine whether the application component is present and whether the application component has been tampered with. - View Dependent Claims (20, 21, 22, 23)
-
Specification