×

Techniques for capturing identifying information on a device user

  • US 8,490,200 B2
  • Filed: 03/25/2008
  • Issued: 07/16/2013
  • Est. Priority Date: 03/25/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for associating an unauthorized user with a stolen computer system, said method comprising:

  • in response to a receipt of a tracking mechanism trigger by a computer system via a wireless network, wherein said tracking mechanism trigger is received in response to a reported theft of said computer system,capturing identifying information on an unauthorized user of said computer system under control of a basic input/output system (BIOS), and storing said identifying information in a non-volatile storage device that is only accessible by said BIOS of said computer system;

    capturing data entered into said computer system from a keyboard by said unauthorized user under the control of said BIOS, and storing said data in said non-volatile storage device; and

    wirelessly transmitting said data and said identifying information to a device recovery service provider.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×