Always-available embedded theft reaction subsystem
First Claim
Patent Images
1. A system comprising:
- an arming mechanism to automatically arm the system in response to an automatic arming policy, the automatic arming policy being selected from among multiple arming policies, including location, time of day, disconnection from a network, loss of Bluetooth proximity, loss of user via camera, closing of the lid, device idleness, and a timer;
a risk behavior logic to detect a potential problem by analyzing interface data received from interfaces;
a core logic component to analyze the potential problem and to trigger a security action logic to perform a security action when the system is armed and the potential problem indicates a theft suspicion;
the security action logic to utilize one of a self-kill pill and a remote kill pill to disable the system by deleting data, wherein the security action logic to send a notification of the theft suspicion to an owner of the system and to an external security service and to;
initialize a self-kill pill when no response to the notification is received within a specified period of time;
initialize a remote kill pill received from the external security service; and
resume normal functionality when a response is received from the owner.
1 Assignment
0 Petitions
Accused Products
Abstract
A platform protected by a system, the platform including a power source, is described. The system in one embodiment comprises a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to trigger a security action logic to perform a security action, when the potential problem indicates a theft suspicion, and the security action logic to utilize a kill pill to disable the platform, when the platform has set a high security status authorizing use of a self-kill pill or the platform sends an alert and receives a remote instruction to utilize a remote kill pill.
-
Citations
20 Claims
-
1. A system comprising:
-
an arming mechanism to automatically arm the system in response to an automatic arming policy, the automatic arming policy being selected from among multiple arming policies, including location, time of day, disconnection from a network, loss of Bluetooth proximity, loss of user via camera, closing of the lid, device idleness, and a timer; a risk behavior logic to detect a potential problem by analyzing interface data received from interfaces; a core logic component to analyze the potential problem and to trigger a security action logic to perform a security action when the system is armed and the potential problem indicates a theft suspicion; the security action logic to utilize one of a self-kill pill and a remote kill pill to disable the system by deleting data, wherein the security action logic to send a notification of the theft suspicion to an owner of the system and to an external security service and to; initialize a self-kill pill when no response to the notification is received within a specified period of time; initialize a remote kill pill received from the external security service; and resume normal functionality when a response is received from the owner. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
an arming mechanism to automatically arm the system in response to an automatic arming policy, the automatic arming policy being selected from among multiple arming policies, including location, time of day, disconnection from a network, loss of Bluetooth proximity, loss of user via camera, closing of the lid, device idleness, and a timer; a risk behavior logic to detect a potential problem by analyzing interface data received from interfaces; a core logic component to analyze the potential problem and to trigger a security action logic to perform a security action when the potential problem indicates a theft suspicion and the system is armed; storage to store a self-kill pill which when executed is to disable the system; and security action logic to utilize one of the self-kill pill and a remote kill pill to disable the system by deleting data, wherein the security action logic to send a notification of the theft suspicion to an owner of the system and to an external security service and to; initialize a self-kill pill when no response to the notification is received within a specified period of time; initialize a remote kill pill received from the external security service; and resume normal functionality when a response is received from the owner. - View Dependent Claims (13, 14)
-
-
15. A method comprising:
-
automatically arming the system in response to an automatic arming policy, the automatic arming policy being selected from among multiple arming policies, including location, time of day, disconnection from a network, loss of Bluetooth proximity, loss of user via camera, closing of the lid, device idleness, and a timer; detecting a potential problem by analyzing interface data received from interfaces; determining that the potential problem is an indication of a theft; and triggering a security action, in response to the indication of a theft and the system being armed, the security action including sending a notification of the theft suspicion to an owner of the system and to an external security service and executing a kill pill to disable the system by deleting data, wherein a self-kill pill is executed when no response to the notification is received within a specified period of time, and a remote kill pill is executed when received from the external security service is executed. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification