Techniques for capturing identifying information on a device user
First Claim
Patent Images
1. A method for associating an unauthorized user with a stolen computer system, said method comprising:
- in response to a receipt of a tracking mechanism trigger by a computer system via a wireless network, wherein said tracking mechanism trigger is received in response to a reported theft of said computer system,capturing identifying information on an unauthorized user of said computer system under control of a basic input/output system (BIOS), and storing said identifying information in a non-volatile storage device that is only accessible by said BIOS of said computer system;
capturing data entered into said computer system from a keyboard by said unauthorized user under the control of said BIOS, and storing said data in said non-volatile storage device; and
wirelessly transmitting said data and said identifying information to a device recovery service provider.
3 Assignments
0 Petitions
Accused Products
Abstract
A technique for identifying a user of a device includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger.
-
Citations
9 Claims
-
1. A method for associating an unauthorized user with a stolen computer system, said method comprising:
-
in response to a receipt of a tracking mechanism trigger by a computer system via a wireless network, wherein said tracking mechanism trigger is received in response to a reported theft of said computer system, capturing identifying information on an unauthorized user of said computer system under control of a basic input/output system (BIOS), and storing said identifying information in a non-volatile storage device that is only accessible by said BIOS of said computer system; capturing data entered into said computer system from a keyboard by said unauthorized user under the control of said BIOS, and storing said data in said non-volatile storage device; and wirelessly transmitting said data and said identifying information to a device recovery service provider. - View Dependent Claims (2, 3)
-
-
4. A computer-readable storage device having a computer program product for associating an unauthorized user with a stolen computer system, said computer-readable storage device comprising:
-
program code for, in response to a receipt of a tracking mechanism trigger by a computer system via a wireless network, wherein said tracking mechanism trigger is received in response to a reported theft of said computer system, capturing identifying information on an unauthorized user of said computer system under control of a basic input/output system (BIOS), and storing said identifying information in a non-volatile storage device that is only accessible by said BIOS of said computer system; capturing data entered into said computer system from a keyboard by said unauthorized user under the control of said BIOS, and storing said data in said non-volatile storage device; and program code for wirelessly transmitting said data and said identifying information to a device recovery service provider. - View Dependent Claims (5, 6)
-
-
7. A computer system, comprising:
-
a keyboard; a non-volatile storage device; and a processor, coupled to said non-volatile storage device and said keyboard, wherein said processor, in response to a receipt of a tracking mechanism trigger by said computer system via a wireless network, wherein said tracking mechanism trigger is received in response to a reported theft of said computer system, captures identifying information on an unauthorized user of said computer system under the control of a basic input/output system (BIOS), and storing said identifying information in a non-volatile storage device that is only accessible by said BIOS of said computer system; captures data entered into said computer system from a keyboard by said unauthorized user under the control of said BIOS, and storing said data in said non-volatile storage device; and a network interface card for wirelessly transmitting said data and said identifying information to a device recovery service provider. - View Dependent Claims (8, 9)
-
Specification