Always-available embedded theft reaction subsystem
First Claim
1. A method of setting configuration for a theft protection system of a platform, the method comprising:
- receiving a configuration setting request from a user, wherein the configuration setting request is one of requests to alter a configuration setting related to a pairing of a device with a platform, a removal of a paired device, a change of a timing of an alert, an addition of a kill pill, and a removal of a kill pill;
determining whether the configuration setting request is a direct user request, and if so, accepting and recording the configuration setting request when the user'"'"'s physical presence at the platform is verified by receiving a verifiable code from the user as input at the platform;
applying a value to alter the configuration setting of the theft protection system of the platform to track the platform location;
when the configuration setting request is from another party, determining whether the another party is provisioned to provide configuration settings;
authenticating the configuration setting request from the another party, and applying the configuration setting that was authenticated;
determining whether the platform has been reset to a baseline setting, the baseline setting not permitting configuration by the another party; and
when the platform has been reset to the baseline setting, rejecting the configuration setting request from the another party.
1 Assignment
0 Petitions
Accused Products
Abstract
A platform including an always-available theft protection system is described. In one embodiment, the system comprises an arming logic to arm the platform, when an arming command is received, a risk behavior logic to detect a potential problem when the platform is armed, and a core logic component to provide logic to analyze the potential problem, and to move the platform to a suspecting mode, when the potential problem indicates a theft suspicion. The system, in one embodiment, further comprises configuration logic to configure settings for the system when the platform is in an unarmed mode, the configuration logic including a user logic enabling an authorized user to alter settings and an administrator logic enabling an administrator to alter the settings using an authenticated set request.
144 Citations
8 Claims
-
1. A method of setting configuration for a theft protection system of a platform, the method comprising:
-
receiving a configuration setting request from a user, wherein the configuration setting request is one of requests to alter a configuration setting related to a pairing of a device with a platform, a removal of a paired device, a change of a timing of an alert, an addition of a kill pill, and a removal of a kill pill; determining whether the configuration setting request is a direct user request, and if so, accepting and recording the configuration setting request when the user'"'"'s physical presence at the platform is verified by receiving a verifiable code from the user as input at the platform; applying a value to alter the configuration setting of the theft protection system of the platform to track the platform location; when the configuration setting request is from another party, determining whether the another party is provisioned to provide configuration settings; authenticating the configuration setting request from the another party, and applying the configuration setting that was authenticated; determining whether the platform has been reset to a baseline setting, the baseline setting not permitting configuration by the another party; and when the platform has been reset to the baseline setting, rejecting the configuration setting request from the another party. - View Dependent Claims (2, 3, 4)
-
-
5. A platform comprising:
-
a core logic hardware to provide logic to analyze a potential problem in a platform; a configuration logic hardware to configure settings for a theft detection system of the platform when the platform is in an unarmed mode, the configuration logic hardware to; receive a configuration setting request from a user, wherein the configuration setting request is one of requests to alter a configuration setting related to a pairing of a device with a platform, a removal of a paired device, a change of a timing of an alert, an addition of a kill pill, and a removal of a kill pill; determine the configuration setting request is a direct user request; record the configuration setting request when a user'"'"'s physical presence at the platform is verified by receiving a verifiable code from the user as input at the platform; apply a value to alter the configuration setting of the theft detection system of the platform to track the platform location; when the configuration setting request is from another party other than the user, the configuration logic hardware to determine that the another party is provisioned to provide configuration settings, authenticate the configuration setting request from the another party, and apply the configuration setting; and the configuration logic hardware to determine that the platform has been reset to a baseline setting, the baseline setting not permitting configuration by the another party, and when the platform has been reset to the baseline setting, to reject the configuration setting request from the another party. - View Dependent Claims (6, 7, 8)
-
Specification