Enabling a service to return lost laptops
First Claim
Patent Images
1. A method comprising:
- generating, by a manageability engine of a computer system, a unique identifier for the computer system;
receiving, by the manageability engine, a message from a service external to the computer system for display when the computer system is powered on;
storing, by the manageability engine, the generated unique identifier and the message received from the service external to the computer system in an encrypted data region of memory of the computer system accessible to the manageability engine, the encrypted data region of memory being inaccessible to other components of the computer system;
providing, by the manageability engine, the generated unique identifier and the message stored in the encrypted data region of memory for display in response to receiving a request to display the generated unique identifier and the message; and
configuring the computer system to restrict functionality of the computer system until the service authorizes restoration of full functionality of the computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.
32 Citations
21 Claims
-
1. A method comprising:
-
generating, by a manageability engine of a computer system, a unique identifier for the computer system; receiving, by the manageability engine, a message from a service external to the computer system for display when the computer system is powered on; storing, by the manageability engine, the generated unique identifier and the message received from the service external to the computer system in an encrypted data region of memory of the computer system accessible to the manageability engine, the encrypted data region of memory being inaccessible to other components of the computer system; providing, by the manageability engine, the generated unique identifier and the message stored in the encrypted data region of memory for display in response to receiving a request to display the generated unique identifier and the message; and configuring the computer system to restrict functionality of the computer system until the service authorizes restoration of full functionality of the computer system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, by a service, a notification over a network from a manageability engine of a computer system that the computer system is at least one of lost and stolen, the notification comprises a unique identifier generated by the manageability engine of the computer system; retrieving, by the service, information associated with the computer system from a data repository of the service with the unique identifier in response to receiving the notification; and sending, by the service, (i) a message that comprises the retrieved information associated with the computer system and (ii) an instruction over the network to the manageability engine of the computer system, the message for display and the instruction to restrict functionality of the computer system prior to loading an operating system on the computer system. - View Dependent Claims (8, 9)
-
-
10. A system comprising:
-
a first processor; a memory; and a chipset module that comprises a second processor that operates independently of the first processor, the chipset module to (i) generate a unique identifier for the system, (ii) receive a message from a service external to the system for display when the system is powered on, (iii) store the generated unique identifier and the message received from the service external to the system in an encrypted data region of the memory accessible to the chipset module and inaccessible to other components of the system, (iv) provide the generated unique identifier and the message stored in the encrypted data region for display in response to a request to display the generated unique identifier and the message, and (v) configure the system to restrict functionality of the system until the service authorizes restoration of full functionality of the system. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium comprising a plurality of instructions, that in response to be executed, result in a computer system;
-
generating a unique identifier for the computer system in a manageability engine of the computer system; receiving a message from a service external to the computer system for display when the computer system is powered on; storing the generated unique identifier and the message received from the service external to the computer system in an encrypted data region of memory of the computer system accessible to the manageability engine of the computer system, the encrypted data region of memory being inaccessible to other components of the computer system; providing the generated unique identifier and the message stored in the encrypted data region of memory for display in response to receiving a request to display the generated unique identifier and the message; and restricting functionality of the computer system until the service authorizes restoration of full functionality of the computer system. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification