Movatterモバイル変換


[0]ホーム

URL:


US20160328580A1 - Systems, apparatuses and methods for computer security in a computer network - Google Patents

Systems, apparatuses and methods for computer security in a computer network
Download PDF

Info

Publication number
US20160328580A1
US20160328580A1US15/150,375US201615150375AUS2016328580A1US 20160328580 A1US20160328580 A1US 20160328580A1US 201615150375 AUS201615150375 AUS 201615150375AUS 2016328580 A1US2016328580 A1US 2016328580A1
Authority
US
United States
Prior art keywords
electronic device
estsm
client electronic
user
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/150,375
Inventor
Apurva M. Bhansali
Kamal M. Dhanani
Ranjit Kapila
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Softex LLC
Original Assignee
Softex Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/925,161external-prioritypatent/US7590837B2/en
Application filed by Softex IncfiledCriticalSoftex Inc
Priority to US15/150,375priorityCriticalpatent/US20160328580A1/en
Publication of US20160328580A1publicationCriticalpatent/US20160328580A1/en
Assigned to SOFTEX LLCreassignmentSOFTEX LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SOFTEX, INC.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A computer network includes a server and client electronic devices. Registration with a security server permits security operations to be performed on a client electronic device. Security operations may include disabling functionality of the client electronic device or other operations to prevent illegitimate access to or use of the device or data stored thereon. Security operations may be performed in various modes, e.g., remotely, subject to a condition, or on the basis of user instruction. Other embodiments, including systems, apparatuses, and methods, are disclosed.

Description

Claims (30)

What is claimed is:
1. A method of causing an action to be performed on a client electronic device, comprising:
registering with a service;
upon completion of registration with the service, periodically communicating with the service;
receiving an instruction to perform a specified action with respect to the client electronic device; and
upon receipt of the instruction, performing the specified action with respect to the client electronic device.
2. The method ofclaim 1,
wherein the specified action comprises disabling at least some functionality of the client electronic device, and
wherein the method further comprises:
upon receipt of an instruction from a user to perform a function, refraining from performing the function, wherein the function is included in the at least some functionality.
3. The method ofclaim 1, wherein the specified action comprises deleting at least some data that is stored on the client electronic device.
4. The method ofclaim 1, wherein the specified action comprises denying access to at least some data that is stored on the client electronic device.
5. The method ofclaim 1, wherein the specified action comprises keeping encrypted at least some data that is stored on the client electronic device.
6. The method ofclaim 1, wherein the specified action comprises backing up at least some data that is stored on the client electronic device, by transmitting the at least some data to another device.
7. The method ofclaim 6,
wherein the other device is a remote server associated with the service, and
wherein the at least some data comprises data previously designated as critical data or as data to be backed up.
8. The method ofclaim 1, wherein the specified action comprises restoring at least some data to the client electronic device, the restoring at least some data to the client electronic device comprising receiving, by the client electronic device, the at least some data, the at least some data having been previously (i) stored on the client electronic device, (ii) transmitted to another device, and (iii) deleted from the client electronic device.
9. The method ofclaim 1,
wherein the specified action comprises restoring at least some data to the client electronic device, the restoring at least some data to the client electronic device comprising receiving, by the client electronic device, the at least some data, the at least some data having been previously (i) stored on a second client electronic device, (ii) transmitted to a third device, and (iii) deleted from the second client electronic device,
wherein the second client electronic device is not the same device as the third device.
10. The method ofclaim 1,
wherein the specified action comprises being tracked, wherein the being tracked comprises having a location of the client electronic device be tracked, and
wherein the method further comprises:
disabling at least some functionality of the client electronic device.
11. The method ofclaim 1,
wherein the specified action is overridden by authentication, on the client electronic device, of a user of the client electronic device, the user having previously inputted authentication credentials in the client electronic device.
12. The method ofclaim 1,
wherein the instruction is caused to be transmitted to the client electronic device from a remote location.
13. The method ofclaim 1,
wherein the instruction is caused to be transmitted to the client electronic device by the service.
14. The method ofclaim 13,
wherein the causing of transmission of the instruction is triggered by an act of a user of the client electronic device, the user having previously inputted authentication credentials in the client electronic device, and
wherein the act of the user of the client electronic device comprises issuing a user instruction to perform the action with respect to the client electronic device.
15. The method ofclaim 14,
wherein the user instruction to perform the action with respect to the client electronic device is conditioned on the client electronic device having been reported lost or stolen.
16. The method ofclaim 1,
wherein the periodically communicating with the service comprises periodically communicating with a server associated with the service.
17. The method ofclaim 16, wherein the server is remote from the client electronic device.
18. The method ofclaim 1, wherein the periodically communicating with the service comprises periodic transmission of data between the service and the client electronic device.
19. The method ofclaim 18,
wherein the periodic transmission comprises multiple transmissions of data at different respective times, and
wherein the data is updated between a given one of the transmissions and a subsequent one of the transmissions.
20. The method ofclaim 18,
wherein the periodic transmission comprises multiple transmissions of data at different respective times, and
wherein a given one of the transmissions of data causes given data to be transmitted to and stored on one of (i) the client electronic device and (ii) a server associated with the service, and
wherein the given data, prior to a time of the given one of the transmissions, was not stored on the one of (i) the client electronic device and (ii) the server associated with the service, and was stored on the other one of (i) the client electronic device and (ii) the server associated with the service.
21. The method ofclaim 1,
wherein the periodically communicating with the service comprises periodically sending, to the service, a message.
wherein the message comprises one or more of the following: (i) a request for information; (ii) a query; and (iii) a request to check a status.
22. The method ofclaim 21, further comprising:
in response to the periodically sending the message to the service, receiving a message from the service.
23. The method ofclaim 21,
wherein the receiving of the instruction to perform a specified action with respect to the client electronic device occurs in response to an instance of the periodically sending of the message to the service.
24. The method ofclaim 1,
wherein the periodically communicating with the service comprises periodically receiving, from the service, a message, and
wherein the message comprises one or more of the following: (i) a request for information; and (ii) updated information.
25. The method ofclaim 1, further comprising:
preventing a first given user from accessing the client electronic device, the first given user having previously been assigned to or authenticated on the client electronic device;
permitting an administrator user to access the client electronic device upon receipt by the client electronic device of credentials of the administrator user, the client electronic device being assigned to a different user; and
permitting a second given user to access additional functionality of the client electronic device, the second given user having previously been assigned to or authenticated on the client electronic device, but not having previously been permitted access to the additional functionality of the client electronic device.
26. A method of causing an action to be performed on a client electronic device, comprising:
registering a client electronic device with a service;
upon completion of registration with the service, periodically communicating with the client electronic device; and
sending an instruction to perform a specified action with respect to the client electronic device.
27. A client electronic device, comprising:
a processor;
a non-transitory machine-readable storage medium responsive to the processor; and
instructions in the non-transitory machine-readable storage medium which, when executed by the client electronic device, cause the client electronic device to perform operations comprising:
registering with a service;
upon completion of registration with the service, periodically communicating with the service;
receiving an instruction to perform a specified action with respect to the client electronic device; and
upon receipt of the instruction, performing the specified action with respect to the client electronic device.
28. A system, comprising:
a server comprising:
a processor configured for executing software;
a network interface configured for communicating with a plurality of client devices via a communication network;
a memory configured for storing software and information; and
software, wherein the software, when executed by the processor, is operable to perform operations comprising:
registering a client electronic device with a service;
upon completion of registration with the service, periodically communicating with the client electronic device; and
sending an instruction to perform a specified action with respect to the client electronic device.
29. An article of manufacture, comprising:
a non-transitory machine-readable storage medium; and
instructions in the non-transitory machine-readable storage medium which, when executed by a client electronic device, cause the client electronic device to perform operations comprising:
registering with a service;
upon completion of registration with the service, periodically communicating with the service;
receiving an instruction to perform a specified action with respect to the client electronic device; and
upon receipt of the instruction, performing the specified action with respect to the client electronic device.
30. An article of manufacture, comprising:
a non-transitory machine-readable storage medium; and
instructions in the non-transitory machine-readable storage medium which, when executed by a server, cause the server to perform operations comprising:
registering a client electronic device with a service;
upon completion of registration with the service, periodically communicating with the client electronic device; and
sending an instruction to perform a specified action with respect to the client electronic device.
US15/150,3752003-08-232016-05-09Systems, apparatuses and methods for computer security in a computer networkAbandonedUS20160328580A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/150,375US20160328580A1 (en)2003-08-232016-05-09Systems, apparatuses and methods for computer security in a computer network

Applications Claiming Priority (5)

Application NumberPriority DateFiling DateTitle
US49718203P2003-08-232003-08-23
US10/925,161US7590837B2 (en)2003-08-232004-08-23Electronic device security and tracking system and method
US11/484,098US8529635B2 (en)2003-08-232006-07-11Electronic device security and tracking system and method
US12/903,045US9336393B2 (en)2003-08-232010-10-12System and method for protecting files stored on an electronic device
US15/150,375US20160328580A1 (en)2003-08-232016-05-09Systems, apparatuses and methods for computer security in a computer network

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US12/903,045ContinuationUS9336393B2 (en)2003-08-232010-10-12System and method for protecting files stored on an electronic device

Publications (1)

Publication NumberPublication Date
US20160328580A1true US20160328580A1 (en)2016-11-10

Family

ID=43757795

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US12/903,045Active - Reinstated2026-06-10US9336393B2 (en)2003-08-232010-10-12System and method for protecting files stored on an electronic device
US15/150,375AbandonedUS20160328580A1 (en)2003-08-232016-05-09Systems, apparatuses and methods for computer security in a computer network

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US12/903,045Active - Reinstated2026-06-10US9336393B2 (en)2003-08-232010-10-12System and method for protecting files stored on an electronic device

Country Status (1)

CountryLink
US (2)US9336393B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2022035426A1 (en)*2020-08-112022-02-17Hewlett-Packard Development Company, L.P.Application status reporting via platform binary tables
US12008002B2 (en)2016-12-072024-06-11MyFitnessPal, Inc.System and method for associating user-entered text to database entries

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9501669B2 (en)*2004-12-172016-11-22Intel CorporationMethod and apparatus for location-based recovery of stolen mobile devices
US8977294B2 (en)2007-10-102015-03-10Apple Inc.Securely locating a device
US8660530B2 (en)2009-05-012014-02-25Apple Inc.Remotely receiving and communicating commands to a mobile device for execution by the mobile device
US8666367B2 (en)2009-05-012014-03-04Apple Inc.Remotely locating and commanding a mobile device
US8670748B2 (en)2009-05-012014-03-11Apple Inc.Remotely locating and commanding a mobile device
WO2012023050A2 (en)2010-08-202012-02-23Overtis Group LimitedSecure cloud computing system and method
US9202059B2 (en)2011-03-012015-12-01Apurva M. BhansaliMethods, systems, and apparatuses for managing a hard drive security system
US8971924B2 (en)2011-05-232015-03-03Apple Inc.Identifying and locating users on a mobile network
US10715380B2 (en)2011-05-232020-07-14Apple Inc.Setting a reminder that is triggered by a target user device
KR101873739B1 (en)*2011-09-232018-07-03엘지전자 주식회사Mobile terminal and method for providing security thereto
KR101871715B1 (en)*2012-04-182018-06-27엘지전자 주식회사Mobile terminal and method for providing security thereto
US8892072B2 (en)2011-09-232014-11-18Lg Electronics Inc.Mobile terminal and method of providing security thereto
US9767296B2 (en)*2012-04-022017-09-19Varonis Systems, IncRequesting access to restricted objects by a remote computer
US9104896B2 (en)*2012-06-042015-08-11Apple Inc.System and method for remotely initiating lost mode on a computing device
AT512993B1 (en)*2012-06-122017-08-15Fronius Int Gmbh Inverter of a photovoltaic system and method of operating the same
CN103577280A (en)*2012-07-302014-02-12北京网秦天下科技有限公司Method and system for duplicating data
CN103577281A (en)*2012-07-302014-02-12北京网秦天下科技有限公司Method and system for recovering data
US9710678B2 (en)*2013-04-022017-07-18Dropbox, Inc.Techniques for recovering missing devices
US9749408B2 (en)*2013-07-302017-08-29Dropbox, Inc.Techniques for managing unsynchronized content items at unlinked devices
US9396359B2 (en)*2013-09-092016-07-19Whitecanyon Software, Inc.System and method for encrypted disk drive sanitizing
TWI507913B (en)*2014-01-292015-11-11Wistron CorpPersonal electronic device and data loss prevention system and method thereof
US10162565B2 (en)2014-01-302018-12-25Hewlett-Packard Development Company, L.P.Data erasure of a target device
US9330273B2 (en)*2014-03-192016-05-03Symantec CorporationSystems and methods for increasing compliance with data loss prevention policies
EP2981148B1 (en)*2014-06-242020-02-26Huawei Technologies Co., Ltd.Device management method, apparatus and system
AU2014415965A1 (en)*2014-12-302017-08-17Huawei Technologies Co., Ltd.Document protection method and device
TWI647584B (en)*2016-04-122019-01-11速博思股份有限公司Method of enabling/disabling operating-authority of handheld device
CA2997609A1 (en)*2017-03-072018-09-07Sennco Solutions, Inc.Integrated, persistent security monitoring of electronic merchandise
CN107403098A (en)*2017-06-132017-11-28北京溢思得瑞智能科技研究院有限公司The active safety means of defence and credible industrial control computer of credible industrial control computer startup stage
US11308195B2 (en)*2019-01-162022-04-19Assurant, Inc.Apparatus, method, and computer program product for claim management device lockout
CN111083134A (en)*2019-12-112020-04-28哈尔滨安天科技集团股份有限公司Industrial control system communication encryption method and device, electronic equipment and storage medium
CN111542047A (en)*2020-03-302020-08-14宇龙计算机通信科技(深圳)有限公司Data uploading method and device, storage medium and related equipment
CN111563258B (en)*2020-07-152020-11-10北京东方通软件有限公司Safe operation method of non-executable file
US11270603B1 (en)2020-09-112022-03-08Bank Of America CorporationReal-time disability identification and preferential interaction modification

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5552776A (en)*1991-09-231996-09-03Z-MicrosystemsEnhanced security system for computing devices
US20020022462A1 (en)*2000-08-182002-02-21Dietmar SchillBroadcast receiver
US20020066033A1 (en)*2000-07-312002-05-30Dobbins Kurt A.Managing content resources
US20030023874A1 (en)*2001-07-162003-01-30Rudy ProkupetsSystem for integrating security and access for facilities and information systems
US20030087627A1 (en)*2001-11-022003-05-08Cannon Joseph MWireless device temporary recovery mode services and functionality
US20030117316A1 (en)*2001-12-212003-06-26Steve TischerSystems and methods for locating and tracking a wireless device
US6662023B1 (en)*2000-07-062003-12-09Nokia Mobile Phones Ltd.Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
US20040137893A1 (en)*2003-01-152004-07-15Sivakumar MuthuswamyCommunication system for information security and recovery and method therfor
US20040203895A1 (en)*2002-12-162004-10-14Senaka BalasuriyaLocking of communication device based on proximity
US20040268154A1 (en)*2003-06-272004-12-30Ullrich Kai OAuthentication scheme system and method
US7047426B1 (en)*2000-04-272006-05-16Warranty Corporation Of AmericaPortable computing device communication system and method

Family Cites Families (63)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5128995A (en)*1990-07-231992-07-07International Business Machines Corp.Apparatus and method for loading a system reference diskette image from a system partition in a personal computer system
US5230052A (en)*1990-10-011993-07-20International Business Machines Corp.Apparatus and method for loading bios into a computer system from a remote storage location
US5421006A (en)*1992-05-071995-05-30Compaq Computer Corp.Method and apparatus for assessing integrity of computer system software
US6523079B2 (en)*1993-02-192003-02-18Elonex Ip Holdings LtdMicropersonal digital assistant
US5444850A (en)*1993-08-041995-08-22Trend Micro Devices IncorporatedMethod and apparatus for controlling network and workstation access prior to workstation boot
US6269392B1 (en)*1994-11-152001-07-31Christian CotichiniMethod and apparatus to monitor and locate an electronic device using a secured intelligent agent
US5715174A (en)*1994-11-151998-02-03Absolute Software CorporationSecurity apparatus and method
US6244758B1 (en)*1994-11-152001-06-12Absolute Software Corp.Apparatus and method for monitoring electronic devices via a global network
US6300863B1 (en)*1994-11-152001-10-09Absolute Software CorporationMethod and apparatus to monitor and locate an electronic device using a secured intelligent agent via a global network
US5710883A (en)*1995-03-101998-01-20Stanford UniversityHypertext document transport mechanism for firewall-compatible distributed world-wide web publishing
US5799090A (en)*1995-09-251998-08-25Angert; Joseph C.pad encryption method and software
US5870610A (en)*1996-06-281999-02-09Siemens Business Communication Systems, Inc.Autoconfigurable method and system having automated downloading
US6005943A (en)*1996-10-291999-12-21Lucent Technologies Inc.Electronic identifiers for network terminal devices
US5748084A (en)*1996-11-181998-05-05Isikoff; Jeremy M.Device security system
US8225089B2 (en)*1996-12-042012-07-17Otomaku Properties Ltd., L.L.C.Electronic transaction systems utilizing a PEAD and a private key
US6370649B1 (en)*1998-03-022002-04-09Compaq Computer CorporationComputer access via a single-use password
US7017188B1 (en)*1998-11-162006-03-21Softricity, Inc.Method and apparatus for secure content delivery over broadband access networks
GB2346039A (en)*1999-01-232000-07-26IbmWireless connection for portable systems
JP3545627B2 (en)*1999-02-082004-07-21株式会社東芝 Portable electronic devices
EP1041483A1 (en)*1999-03-302000-10-04International Business Machines CorporationDiscovering stolen or lost network-attachable computer systems
US6684326B1 (en)*1999-03-312004-01-27International Business Machines CorporationMethod and system for authenticated boot operations in a computer system of a networked computing environment
JP4127587B2 (en)*1999-07-092008-07-30株式会社東芝 Content management method, content management apparatus, and recording medium
US6715074B1 (en)*1999-07-272004-03-30Hewlett-Packard Development Company, L.P.Virus resistant and hardware independent method of flashing system bios
US7239346B1 (en)*1999-10-182007-07-03Priddy Dennis GSystem and architecture that supports a multi-function semiconductor device between networks and portable wireless communications products
GB0007942D0 (en)*2000-04-012000-05-17Hewlett Packard CoDistributed search method
US20030159070A1 (en)*2001-05-282003-08-21Yaron MayerSystem and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
US20020045437A1 (en)*2000-08-182002-04-18Alexander KeslerTracing a location of a mobile device
EP1316189A2 (en)*2000-09-012003-06-04Max MühlhäuserSystem and method for the wireless access of computer-based services in an attributable manner
AU2001288842A1 (en)*2000-09-082002-03-22United States Postal ServiceSystems and methods for providing electronic archiving
US6879996B1 (en)*2000-09-132005-04-12Edward W. LavesMethod and apparatus for displaying personal digital assistant synchronization data using primary and subordinate data fields
US6892305B1 (en)*2000-10-122005-05-10International Business Machines CorporationMethod and system for booting up a computer system in a secure fashion
US7099699B2 (en)*2000-11-142006-08-29Lg Electronics Inc.Method for preventing illegal use of mobile communication terminal
US20020112047A1 (en)*2000-12-052002-08-15Rakesh KushwahaSystem and method for wireless data terminal management using general packet radio service network
US6839721B2 (en)*2001-01-122005-01-04Hewlett-Packard Development Company, L.P.Integration of a database into file management software for protecting, tracking, and retrieving data
US6480932B1 (en)*2001-01-312002-11-12Western Digital Technologies, Inc.Computer system having a host computer coupled to a disk drive with a drive-selected-application partition for storing data for execution by the host computer in response to drive-determined conditions
US6433685B1 (en)*2001-03-022002-08-13Hewlett-Packard CompanySystem and method for locating lost or stolen articles
US7674298B1 (en)*2001-03-302010-03-09Mcafee, Inc.Method and apparatus for implementing a handheld security system
US7024698B2 (en)*2001-04-272006-04-04Matsushita Electric Industrial Co., Ltd.Portable information processing device having data evacuation function and method thereof
US7260835B2 (en)*2001-06-192007-08-21Intel CorporationBluetooth™ based security system
US20030005316A1 (en)*2001-06-282003-01-02Intel CorporationRadio location based theft recovery mechanism
US7484105B2 (en)*2001-08-162009-01-27Lenovo (Singapore) Ptd. Ltd.Flash update using a trusted platform module
EP1446741A2 (en)*2001-08-282004-08-18Koninklijke Philips Electronics N.V.Consumer and revocation of their equipment
US7111292B2 (en)*2001-09-102006-09-19Texas Instruments IncorporatedApparatus and method for secure program upgrade
US7159120B2 (en)*2001-11-192007-01-02Good Technology, Inc.Method and system for protecting data within portable electronic devices
US7404202B2 (en)*2001-11-212008-07-22Line 6, Inc.System, device, and method for providing secure electronic commerce transactions
US6760827B2 (en)*2001-11-302004-07-06Lsi Logic CorporationMethod and apparatus for accessing ROM PCI memory above 64 K
US7076796B2 (en)*2002-01-042006-07-11Reeves Drue AVirtual media from a directory service
US20040204070A1 (en)*2002-04-192004-10-14August Katherine G.Wireless service provider functionality to transfer designated configuration information
US20040003282A1 (en)*2002-06-282004-01-01Smith Alrick LockhartMethod of storing data
GB2391341A (en)*2002-07-312004-02-04Hewlett Packard CoA method of validating the rights of a user to participate in an interactive computer environment
JP4612416B2 (en)*2002-08-092011-01-12ヴィスト・コーポレーション System and method for preventing access to data on compromised remote devices
US20040034624A1 (en)*2002-08-142004-02-19Kenneth Deh-LeeMethod and system of managing repository for a mobile workforce
US20040192303A1 (en)*2002-09-062004-09-30Puthenkulam Jose P.Securing data of a mobile device after losing physical control of the mobile device
US7761904B2 (en)*2002-09-302010-07-20Harris CorporationRemovable cryptographic ignition key system and method
US20040103298A1 (en)*2002-11-252004-05-27Hafeman Carolyn W.Computer recovery or return
US7134006B2 (en)*2003-06-032006-11-07Gateway Inc.Method and system for changing software access level within or outside a host protected area
US7448080B2 (en)*2003-06-302008-11-04Nokia, Inc.Method for implementing secure corporate communication
US7590837B2 (en)*2003-08-232009-09-15Softex IncorporatedElectronic device security and tracking system and method
EP1733294A1 (en)*2004-03-262006-12-20Absolute Software CorporationPersistent servicing agent
US20100005509A1 (en)*2005-03-162010-01-07Dt Labs, LlcSystem, method and apparatus for electronically protecting data and digital content
US7743424B2 (en)*2007-02-222010-06-22Inventec CorporationMethod for protecting data in a hard disk
US20080284561A1 (en)*2007-05-142008-11-20Inventec CorporationMethod for protecting data
US8639941B2 (en)*2007-12-052014-01-28Bruce BuchananData security in mobile devices

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5552776A (en)*1991-09-231996-09-03Z-MicrosystemsEnhanced security system for computing devices
US7047426B1 (en)*2000-04-272006-05-16Warranty Corporation Of AmericaPortable computing device communication system and method
US6662023B1 (en)*2000-07-062003-12-09Nokia Mobile Phones Ltd.Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
US20020066033A1 (en)*2000-07-312002-05-30Dobbins Kurt A.Managing content resources
US20020022462A1 (en)*2000-08-182002-02-21Dietmar SchillBroadcast receiver
US20030023874A1 (en)*2001-07-162003-01-30Rudy ProkupetsSystem for integrating security and access for facilities and information systems
US20030087627A1 (en)*2001-11-022003-05-08Cannon Joseph MWireless device temporary recovery mode services and functionality
US20030117316A1 (en)*2001-12-212003-06-26Steve TischerSystems and methods for locating and tracking a wireless device
US20040203895A1 (en)*2002-12-162004-10-14Senaka BalasuriyaLocking of communication device based on proximity
US20040137893A1 (en)*2003-01-152004-07-15Sivakumar MuthuswamyCommunication system for information security and recovery and method therfor
US20040268154A1 (en)*2003-06-272004-12-30Ullrich Kai OAuthentication scheme system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12008002B2 (en)2016-12-072024-06-11MyFitnessPal, Inc.System and method for associating user-entered text to database entries
WO2022035426A1 (en)*2020-08-112022-02-17Hewlett-Packard Development Company, L.P.Application status reporting via platform binary tables
US12118345B2 (en)2020-08-112024-10-15Hewlett-Packard Development Company, L.P.Application status reporting via platform binary tables

Also Published As

Publication numberPublication date
US20110072520A1 (en)2011-03-24
US9336393B2 (en)2016-05-10

Similar Documents

PublicationPublication DateTitle
US9336393B2 (en)System and method for protecting files stored on an electronic device
US8529635B2 (en)Electronic device security and tracking system and method
CA2732830C (en)Secure computing environment to address theft and unauthorized access
US8244678B1 (en)Method and apparatus for managing backup data
JP5508502B2 (en) Persistent service agent
JP2008243213A (en)Storing and accessing data in mobile device and user module

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

ASAssignment

Owner name:SOFTEX LLC, NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SOFTEX, INC.;REEL/FRAME:060760/0082

Effective date:20220805

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp