×

System and method for securing a computer system

  • US 8,685,110 B2
  • Filed: 11/25/2008
  • Issued: 04/01/2014
  • Est. Priority Date: 11/25/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for securing data stored on a logical volume of a portable computer system, comprising:

  • configuring, at the portable computer system, a security monitor by selecting data for securing, and entering parameters, the parameters comprising wait times, message addresses, audio features and visual features;

    activating, via a wireless network, the security monitor in response to receiving user input via the wireless network;

    activating a power lock to lock a power supply of the portable computer system and secure the power supply from undesired access;

    determining an alarm has been triggered in response detecting a physical movement of the portable computer system;

    determining whether the alarm has been deactivated;

    if an alarm trigger time has elapsed and the alarm has not been deactivated, activating an alarm sequence in response to the detecting a physical movement of the portable computer system;

    generating an audio alarm, based on the alarm sequence;

    sending an alarm triggered message to a user of the portable computer system, wherein the alarm triggered message comprises a notification that the alarm sequence has been activated and an email comprising instructions for deactivating the alarm sequence;

    in response to receiving a response to the alarm triggered message confirming the alarm sequence by the user, accelerating the alarm sequence to eliminate further delays;

    if a deactivation message is received from the user during a first time period, deactivating the alarm sequence;

    if the alarm sequence is not cancelled within the first time period, determining whether a timer has elapsed; and

    if the timer has elapsed, completing the alarm sequence, wherein completing the alarm sequence comprises;

    reformatting the logical volume and overwriting all sectors of the logical volume to render all data stored on the portable computer system unreadable.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×