Electronic device security and tracking system and method
DCFirst Claim
1. An electronic device security and tracking system, comprising:
- an electronic device operable to support an operating system (OS) environment and operable to communicate with a server system;
an application component to execute within the OS environment,wherein said application component is configured to cause the electronic device to send, to the server system, a message that contains location information for the electronic device, andwherein said application component is configured to determine whether the electronic device has been reported stolen, based on information received from the server system;
a non-viewable security component in the electronic device, wherein the non-viewable security component comprises a validator module capable of determining whether the application component is present and whether the application component has been tampered with;
a non-volatile storage device comprising a secure area; and
a basic input/output system (BIOS) security component stored in the secure area, the BIOS security component configured to check integrity of the application component during a boot process for the electronic device;
wherein the BIOS security component is configured to determine whether the non-viewable security component is present and whether the non-viewable security component has been tampered with;
wherein the BIOS security component is configured to automatically cause the electronic device to restore the integrity of the application component, in response to a negative integrity check for the application component;
wherein the BIOS security component is configured to prevent the electronic device from booting to the OS, in response to receiving notification that the electronic device has been reported stolen;
wherein the application component is configured to notify the BIOS security component that the electronic device has been reported stolen, in response to determining that the electronic device has been reported stolen; and
wherein the application component is substantially distinct from the BIOS security component and the validator module.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system and method for securing and tracking an electronic device. The system includes hardware, software and firmware components that cooperate to allow tracking, disabling, and other interaction with the stolen electronic device. The system includes an application component, non-viewable component and Basic Input/Output Subsystem (BIOS) component that are present on the electronic device. The BIOS component maintains the secured environment of the application and non-viewable components. If only the application component was provided, a simple low level format of the hard disk drive would remove the application and bypass the security features. The system implements an “application and BIOS” based solution to electronic device security.
73 Citations
27 Claims
-
1. An electronic device security and tracking system, comprising:
-
an electronic device operable to support an operating system (OS) environment and operable to communicate with a server system; an application component to execute within the OS environment, wherein said application component is configured to cause the electronic device to send, to the server system, a message that contains location information for the electronic device, and wherein said application component is configured to determine whether the electronic device has been reported stolen, based on information received from the server system; a non-viewable security component in the electronic device, wherein the non-viewable security component comprises a validator module capable of determining whether the application component is present and whether the application component has been tampered with; a non-volatile storage device comprising a secure area; and a basic input/output system (BIOS) security component stored in the secure area, the BIOS security component configured to check integrity of the application component during a boot process for the electronic device; wherein the BIOS security component is configured to determine whether the non-viewable security component is present and whether the non-viewable security component has been tampered with; wherein the BIOS security component is configured to automatically cause the electronic device to restore the integrity of the application component, in response to a negative integrity check for the application component; wherein the BIOS security component is configured to prevent the electronic device from booting to the OS, in response to receiving notification that the electronic device has been reported stolen; wherein the application component is configured to notify the BIOS security component that the electronic device has been reported stolen, in response to determining that the electronic device has been reported stolen; and wherein the application component is substantially distinct from the BIOS security component and the validator module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An electronic device security and tracking system, comprising:
-
an electronic device operable to support an operating system (OS) environment and operable to communicate with a server system; an application component to execute within the OS environment, wherein said application component is configured to cause the electronic device to send, to the server system, a message that contains location information for the electronic device, and wherein said application component is capable of determining whether the electronic device has been reported stolen, based on information received from the server system; a non-viewable security component in the electronic device, wherein the non-viewable security component comprises a validator module configured to determine whether the application component is present and whether the application component has been tampered with; a non-volatile storage device comprising a secure area; and a basic input/output system (BIOS) security component stored in the secure area, the BIOS security component configured to check integrity of the application component during a boot process for the electronic device; wherein the BIOS security component is configured to determine whether the non-viewable security component is present and whether the non-viewable security component has been tampered with wherein the BIOS security component is configured to automatically cause the electronic device to restore the integrity of the application component, in response to a negative integrity check for the application component; wherein the electronic device security and tracking system allows a user to select whether the electronic device is to be disabled after the electronic device has been reported stolen; wherein the BIOS security component is operable to prevent the electronic device from booting to the OS, in response to receiving notification that the electronic device is to be disabled; and wherein the application component is substantially distinct from the BIOS security component and the validator module. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer system, comprising:
-
an electronic device operable to support an operating system (OS) environment and operable to communicate with a server system, said electronic device comprising; a central processing unit; a memory array coupled to said central processing unit; an expansion bus coupled to said central processing unit and said memory array, said expansion bus capable of interfacing peripheral devices; a basic input/output system (BIOS) memory coupled to said expansion bus, comprising a BIOS security component; a non-viewable security component in the electronic device; and a hard disk drive coupled to said expansion bus, comprising; an application component to execute within the OS environment, wherein said application component is configured to cause the electronic device to send, to the server system, a message that contains location information for the electronic device, and wherein said application component is capable of determining whether the electronic device has been reported stolen, based on information received from the server system; wherein the BIOS security component is configured to check integrity of the application component during a boot process for the electronic device; wherein the BIOS security component is configured to automatically cause the electronic device to restore the integrity of the application component, in response to a negative integrity check for the application component; wherein the non-viewable security component comprises a validator module capable of determining whether the application component is present and whether the application component has been tampered with; wherein the BIOS security component is configured to determine whether the non-viewable security component is present and whether the non-viewable security component has been tampered with; and wherein the application component is substantially distinct from the BIOS security component and the validator module. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
Specification