System and method for securing a computer system
First Claim
Patent Images
1. A method for securing data stored on a logical volume of a portable computer system, comprising:
- configuring, at the portable computer system, a security monitor by selecting data for securing, and entering parameters, the parameters comprising wait times, message addresses, audio features and visual features;
activating, via a wireless network, the security monitor in response to receiving user input via the wireless network;
activating a power lock to lock a power supply of the portable computer system and secure the power supply from undesired access;
determining an alarm has been triggered in response detecting a physical movement of the portable computer system;
determining whether the alarm has been deactivated;
if an alarm trigger time has elapsed and the alarm has not been deactivated, activating an alarm sequence in response to the detecting a physical movement of the portable computer system;
generating an audio alarm, based on the alarm sequence;
sending an alarm triggered message to a user of the portable computer system, wherein the alarm triggered message comprises a notification that the alarm sequence has been activated and an email comprising instructions for deactivating the alarm sequence;
in response to receiving a response to the alarm triggered message confirming the alarm sequence by the user, accelerating the alarm sequence to eliminate further delays;
if a deactivation message is received from the user during a first time period, deactivating the alarm sequence;
if the alarm sequence is not cancelled within the first time period, determining whether a timer has elapsed; and
if the timer has elapsed, completing the alarm sequence, wherein completing the alarm sequence comprises;
reformatting the logical volume and overwriting all sectors of the logical volume to render all data stored on the portable computer system unreadable.
1 Assignment
0 Petitions
Accused Products
Abstract
A secured computer system includes a communication interface and an intrusion detection module. The computer system may be portable and configured for wireless communication with a user of the system. The user may activate and configure an alarm monitor, which may be triggered by motion of the computer system. If the triggered alarm is not deactivated, an alarm sequence is activated. If the alarm sequence is not cancelled, then security measures for protecting sensitive data on the computer system from unauthorized access may be executed. The security measures may include removing data or rendering a storage device inaccessible.
11 Citations
17 Claims
-
1. A method for securing data stored on a logical volume of a portable computer system, comprising:
-
configuring, at the portable computer system, a security monitor by selecting data for securing, and entering parameters, the parameters comprising wait times, message addresses, audio features and visual features; activating, via a wireless network, the security monitor in response to receiving user input via the wireless network; activating a power lock to lock a power supply of the portable computer system and secure the power supply from undesired access; determining an alarm has been triggered in response detecting a physical movement of the portable computer system; determining whether the alarm has been deactivated; if an alarm trigger time has elapsed and the alarm has not been deactivated, activating an alarm sequence in response to the detecting a physical movement of the portable computer system; generating an audio alarm, based on the alarm sequence; sending an alarm triggered message to a user of the portable computer system, wherein the alarm triggered message comprises a notification that the alarm sequence has been activated and an email comprising instructions for deactivating the alarm sequence; in response to receiving a response to the alarm triggered message confirming the alarm sequence by the user, accelerating the alarm sequence to eliminate further delays; if a deactivation message is received from the user during a first time period, deactivating the alarm sequence; if the alarm sequence is not cancelled within the first time period, determining whether a timer has elapsed; and if the timer has elapsed, completing the alarm sequence, wherein completing the alarm sequence comprises; reformatting the logical volume and overwriting all sectors of the logical volume to render all data stored on the portable computer system unreadable. - View Dependent Claims (2, 3)
-
-
4. A portable computer system to secure data stored on a logical volume, comprising:
-
a processor; a communication interface for communicating between the computer portable system and an authorized user of the portable computer system; a data storage device; an intrusion detection module; and a memory to store computer program instructions, the computer program instructions when executed by the processor, cause the processor to perform operations comprising; configuring a security monitor by selecting data for securing, and entering parameters, the parameters comprising wait times, message addresses, audio features and visual features; activating, via a wireless network, the security monitor in response to receiving user input via the wireless network; activating a power lock to lock a power supply of the portable computer system and secure the power supply from undesired access; determining an alarm has been triggered in response detecting a physical movement of the portable computer system; determining whether the alarm has been deactivated; if an alarm trigger time has elapsed and the alarm has not been deactivated, initiating an alarm sequence in response to the detecting a physical movement of the portable computer system; generating an audio alarm, based on the alarm sequence; sending an alarm triggered message to the authorized user of the portable computer system, wherein the alarm triggered message comprises a notification that the alarm sequence has been activated and an email comprising instructions for deactivating the alarm sequence; in response to receiving a response to the alarm triggered message confirming the alarm sequence by the user, accelerating the alarm sequence to eliminate further delays; if a deactivation message is received from the user during a first time period, deactivating the alarm sequence; if the alarm sequence is not cancelled within the first time period, determining whether a timer has elapsed; and if the timer has elapsed, completing the alarm sequence, wherein completing the alarm sequence comprises; reformatting the logical volume and overwriting all sectors of the logical volume to render all data stored on the data storage device unreadable. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium storing program instructions, which, when executed on a processor, cause the processor to perform operations comprising:
-
configuring a security monitor by selecting data for securing, and entering parameters, the parameters comprising wait times, message addresses, audio features and visual features activating, via a wireless network, the security monitor in response to receiving user input via the wireless network; activating a power lock to lock a power supply of the portable computer system and secure the power supply from undesired access; determining an alarm has been triggered in response detecting a physical movement of the portable computer system; determining whether the alarm has been deactivated; detecting a triggered alarm indicating physical movement of a portable computer system; if an alarm trigger time has elapsed and the alarm has not been deactivated, activating an alarm sequence in response to the detecting a physical movement of the portable computer system; executing an alarm sequence based on the triggered alarm after a first time period has elapsed; generating an audio alarm, based on the alarm sequence; sending an alarm triggered message to a user of the portable computer system, wherein the alarm triggered message comprises a notification that the alarm sequence has been activated and an email comprising instructions for deactivating the alarm sequence; in response to receiving a response to the alarm triggered message confirming the alarm sequence by the user, accelerating the alarm sequence to eliminate further delays; if a deactivation message is received from the user during the first time period, deactivating the alarm sequence; and if the alarm sequence is not cancelled by the user of the portable computer system prior to the elapse of a second time period, complete the alarm sequence, wherein the instructions to complete the alarm sequence are executable to reformat a particular logical volume of data stored on the portable computer system and overwrite all sectors of the logical volume to irreversibly render the data stored on the portable computer system inaccessible. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system for securing data stored on a logical volume of a computer system, comprising:
-
a processor; a memory to store computer program instructions, the computer program instructions when executed on the processor cause the processor to perform operations comprising; configuring, at the portable computer system, a security monitor by selecting data for securing, and entering parameters, the parameters comprising wait times, message addresses, audio features and visual features activating, via a wireless network, the security monitor in response to receiving user input via the wireless network; activating a power lock to lock a power supply of the portable computer system and secure the power supply from undesired access; determining an alarm has been triggered in response detecting a physical movement of the portable computer system; determining whether the alarm has been deactivated; if the alarm trigger time has elapsed and the alarm has not been deactivated, activating an alarm sequence in response to detecting a physical movement of the portable computer system; generating an audio alarm, based on the alarm sequence; sending an alarm triggered message to a user of the portable computer system, wherein the alarm triggered message comprises a notification that the alarm sequence has been activated and an email comprising instructions for deactivating the alarm sequence; receiving a response to the alarm triggered message confirming the alarm sequence by the user; in response to the receiving a response to the alarm triggered message confirming the alarm sequence by the user, accelerating the alarm sequence to eliminate further delays; deactivating the alarm sequence, if a deactivation message is received from the user during a first time period; if the alarm sequence is not cancelled within the first time period, determining whether a timer has elapsed; and if the timer has elapsed, completing the alarm sequence if the alarm sequence is not deactivated within the first time period, wherein completing the alarm sequence comprises; reformatting the logical volume and overwriting all sectors of the logical volume to render all data stored on the portable computer system unreadable.
-
Specification