WO2009122296A3 - System for mitigating the unauthorized use of a device - Google Patents
System for mitigating the unauthorized use of a device Download PDFInfo
- Publication number
- WO2009122296A3 WO2009122296A3 PCT/IB2009/005548 IB2009005548W WO2009122296A3 WO 2009122296 A3 WO2009122296 A3 WO 2009122296A3 IB 2009005548 W IB2009005548 W IB 2009005548W WO 2009122296 A3 WO2009122296 A3 WO 2009122296A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- unauthorized
- functionality
- systems
- user
- unauthorized use
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/082—Access security using revocation of authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/65—Environment-dependent, e.g. using captured environmental data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Abstract
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2757484A CA2757484A1 (en) | 2008-04-02 | 2009-04-01 | System for mitigating the unauthorized use of a device |
EP09727999.6A EP2266071B1 (en) | 2008-04-02 | 2009-04-01 | System for mitigating the unauthorized use of a device |
CN2009801212508A CN102084370A (en) | 2008-04-02 | 2009-04-01 | System for mitigating the unauthorized use of a device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/060,865 | 2008-04-02 | ||
US12/060,865 US8248237B2 (en) | 2008-04-02 | 2008-04-02 | System for mitigating the unauthorized use of a device |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2009122296A2 WO2009122296A2 (en) | 2009-10-08 |
WO2009122296A3 true WO2009122296A3 (en) | 2010-03-11 |
Family
ID=41132725
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2009/005548 WO2009122296A2 (en) | 2008-04-02 | 2009-04-01 | System for mitigating the unauthorized use of a device |
Country Status (5)
Country | Link |
---|---|
US (1) | US8248237B2 (en) |
EP (1) | EP2266071B1 (en) |
CN (1) | CN102084370A (en) |
CA (1) | CA2757484A1 (en) |
WO (1) | WO2009122296A2 (en) |
Families Citing this family (91)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9548973B2 (en) * | 2007-08-24 | 2017-01-17 | Assa Abloy Ab | Detecting and responding to an atypical behavior |
US9881152B2 (en) * | 2008-04-01 | 2018-01-30 | Yougetitback Limited | System for monitoring the unauthorized use of a device |
US20090253406A1 (en) * | 2008-04-02 | 2009-10-08 | William Fitzgerald | System for mitigating the unauthorized use of a device |
US9838877B2 (en) * | 2008-04-02 | 2017-12-05 | Yougetitback Limited | Systems and methods for dynamically assessing and mitigating risk of an insured entity |
US9886599B2 (en) | 2008-04-02 | 2018-02-06 | Yougetitback Limited | Display of information through auxiliary user interface |
US8600405B2 (en) | 2008-08-12 | 2013-12-03 | Apogee Technology Consultants, Llc | Location-based recovery device and risk management system for portable computing devices and data |
US8789136B2 (en) * | 2008-09-02 | 2014-07-22 | Avaya Inc. | Securing a device based on atypical user behavior |
US9047494B1 (en) * | 2008-09-08 | 2015-06-02 | United Services Automobile Association | System and method for disabling and/or enabling a device |
US8406736B2 (en) * | 2008-12-30 | 2013-03-26 | Symbol Technologies, Inc. | System and method for identifying and locating wireless devices that are being operated by unauthorized users |
US8961619B2 (en) | 2009-01-06 | 2015-02-24 | Qualcomm Incorporated | Location-based system permissions and adjustments at an electronic device |
US8289130B2 (en) | 2009-02-19 | 2012-10-16 | Apple Inc. | Systems and methods for identifying unauthorized users of an electronic device |
US8280436B2 (en) * | 2009-03-13 | 2012-10-02 | Harris Jr Patrick G | Wireless telephony device with breath analysis sensor and methods for use therewith |
US8781493B2 (en) * | 2009-10-22 | 2014-07-15 | Padmanabhan Mahalingam | Security tracking device |
US8745747B2 (en) | 2009-12-31 | 2014-06-03 | Fujitsu Limited | Data protecting device |
US8839453B2 (en) * | 2010-04-12 | 2014-09-16 | Cellco Partnership | Authenticating a mobile device based on geolocation and user credential |
US8477028B2 (en) * | 2010-09-24 | 2013-07-02 | T-Mobile Usa, Inc. | Misplaced device recovery |
US8295812B1 (en) * | 2010-10-15 | 2012-10-23 | Sprint Communications Company L.P. | Reducing mobile-phone fraud |
US9268956B2 (en) | 2010-12-09 | 2016-02-23 | Location Labs, Inc. | Online-monitoring agent, system, and method for improved detection and monitoring of online accounts |
US9460299B2 (en) | 2010-12-09 | 2016-10-04 | Location Labs, Inc. | System and method for monitoring and reporting peer communications |
JP5917805B2 (en) * | 2011-01-05 | 2016-05-18 | ソニー株式会社 | Information processing apparatus, information processing method, and computer program |
US8803659B2 (en) * | 2011-02-28 | 2014-08-12 | Blackberry Limited | Methods and apparatus to support personal information management |
JP5632315B2 (en) * | 2011-03-17 | 2014-11-26 | 株式会社オプティム | Terminal remote operation system and remote operation method |
US20120259633A1 (en) * | 2011-04-07 | 2012-10-11 | Microsoft Corporation | Audio-interactive message exchange |
US9146881B2 (en) * | 2011-06-03 | 2015-09-29 | Commandhub, Inc. | Mobile data vault |
CN102289626A (en) * | 2011-08-18 | 2011-12-21 | 韦春 | Control method, device, electric device and system for active security protection |
US20130086635A1 (en) * | 2011-09-30 | 2013-04-04 | General Electric Company | System and method for communication in a network |
CN102355356A (en) * | 2011-10-13 | 2012-02-15 | 国电南京自动化股份有限公司 | Asymmetric encryption method suitable for ZIGBEE wireless meter reading |
US8942692B2 (en) | 2011-12-02 | 2015-01-27 | Text Safe Teens, Llc | Remote mobile device management |
US9148741B2 (en) * | 2011-12-05 | 2015-09-29 | Microsoft Technology Licensing, Llc | Action generation based on voice data |
US8601597B2 (en) | 2011-12-29 | 2013-12-03 | Elwha Llc | System and method for protecting data stored on a removable data storage device |
US8621644B2 (en) | 2011-12-29 | 2013-12-31 | Elwha Llc | System and method for protecting data stored on a removable data storage device |
US8326231B1 (en) * | 2012-02-02 | 2012-12-04 | Google, Inc. | Preserving cell phone battery life |
WO2013116810A1 (en) * | 2012-02-03 | 2013-08-08 | H4 Engineering, Inc. | Apparatus and method for securing a portable electronic device |
US8953797B2 (en) * | 2012-02-27 | 2015-02-10 | Gvbb Holdings S.A.R.L. | Configuring audiovisual systems |
US9489531B2 (en) | 2012-05-13 | 2016-11-08 | Location Labs, Inc. | System and method for controlling access to electronic devices |
US8756669B2 (en) * | 2012-06-20 | 2014-06-17 | Futurewei Technologies, Inc. | Security mode for mobile communications devices |
KR101971008B1 (en) | 2012-06-29 | 2019-04-22 | 삼성전자주식회사 | Control method for terminal using context-aware and terminal thereof |
MA38030B1 (en) * | 2012-09-24 | 2019-11-29 | Claremont Speede | Access to data controlled by a mobile sender, and method and system for deleting data |
US20140108804A1 (en) * | 2012-10-11 | 2014-04-17 | Sling Media Inc. | System and method for verifying the authenticity of an electronic device |
US9275223B2 (en) * | 2012-10-19 | 2016-03-01 | Mcafee, Inc. | Real-time module protection |
US9459755B2 (en) * | 2012-11-13 | 2016-10-04 | Peter M. Curtis | Facility operations management and mobile systems |
US9591452B2 (en) | 2012-11-28 | 2017-03-07 | Location Labs, Inc. | System and method for enabling mobile device applications and functional components |
EP2929670B1 (en) | 2012-12-10 | 2019-07-03 | Koninklijke KPN N.V. | System to protect a mobile network |
US9554190B2 (en) | 2012-12-20 | 2017-01-24 | Location Labs, Inc. | System and method for controlling communication device use |
US9763098B2 (en) | 2013-01-11 | 2017-09-12 | Apple Inc. | Bypassing security authentication scheme on a lost device to return the device to the owner |
DE102013200798B3 (en) | 2013-01-18 | 2014-08-07 | Trumpf Werkzeugmaschinen Gmbh + Co. Kg | Machine control, engine control maintenance system and engine control maintenance procedure |
US20150234889A1 (en) * | 2013-02-06 | 2015-08-20 | Google Inc. | Systems and Methods for Selecting Geographic Locations for Use in Biasing Search Results |
US10560324B2 (en) | 2013-03-15 | 2020-02-11 | Location Labs, Inc. | System and method for enabling user device control |
CN103150869A (en) * | 2013-03-18 | 2013-06-12 | 苏州诺特丹信息技术有限公司 | Children tracking protection system |
US9665913B2 (en) * | 2013-05-03 | 2017-05-30 | Consumer Product Recovery And Finance Company, Inc. | Apparatus and method for finding and reporting lost items |
US9741008B2 (en) * | 2013-05-03 | 2017-08-22 | Consumer Product Recovery And Finance Company, Inc. | Apparatus and method for finding and reporting lost items |
US9706032B2 (en) * | 2013-06-06 | 2017-07-11 | Apple Inc. | Device locator disable authentication |
US10354251B1 (en) | 2013-07-26 | 2019-07-16 | Sprint Communications Company L.P. | Assigning risk levels to electronic commerce transactions |
JP6313014B2 (en) * | 2013-08-27 | 2018-04-18 | 東芝ライフスタイル株式会社 | Camera system, refrigerator |
CN104750382A (en) * | 2013-12-31 | 2015-07-01 | 环达电脑(上海)有限公司 | Automatic mobile device unlocking/locking system and method |
US9275219B2 (en) * | 2014-02-25 | 2016-03-01 | International Business Machines Corporation | Unauthorized account access lockout reduction |
US10560439B2 (en) | 2014-03-27 | 2020-02-11 | Arris Enterprises, Inc. | System and method for device authorization and remediation |
US9496922B2 (en) | 2014-04-21 | 2016-11-15 | Sony Corporation | Presentation of content on companion display device based on content presented on primary display device |
CN104010081A (en) * | 2014-05-23 | 2014-08-27 | 可牛网络技术(北京)有限公司 | Method for locking local mobile phone and mobile phone |
US10148805B2 (en) | 2014-05-30 | 2018-12-04 | Location Labs, Inc. | System and method for mobile device control delegation |
US10372937B2 (en) | 2014-06-27 | 2019-08-06 | Microsoft Technology Licensing, Llc | Data protection based on user input during device boot-up, user login, and device shut-down states |
CN105493094A (en) | 2014-06-27 | 2016-04-13 | 微软技术许可有限责任公司 | Data protection system based on user input patterns on device |
US10192039B2 (en) | 2014-06-27 | 2019-01-29 | Microsoft Technology Licensing, Llc | System for context-based data protection |
WO2015196450A1 (en) | 2014-06-27 | 2015-12-30 | Microsoft Technology Licensing, Llc | System for data protection in power off mode |
US9996999B2 (en) * | 2014-07-30 | 2018-06-12 | Master Lock Company Llc | Location tracking for locking device |
US9894066B2 (en) | 2014-07-30 | 2018-02-13 | Master Lock Company Llc | Wireless firmware updates |
US9600949B2 (en) | 2014-07-30 | 2017-03-21 | Master Lock Company Llc | Wireless key management for authentication |
US10170018B2 (en) | 2014-07-31 | 2019-01-01 | Peter M. Curtis | Cloud based server to support facility operations management |
US10769315B2 (en) * | 2014-12-01 | 2020-09-08 | T-Mobile Usa, Inc. | Anti-theft recovery tool |
US9792542B2 (en) | 2014-12-09 | 2017-10-17 | Peter M. Curtis | Facility walkthrough and maintenance guided by scannable tags or data |
CN104853313A (en) * | 2015-04-02 | 2015-08-19 | 吴爱好 | Child location tracking method and system |
US9477825B1 (en) | 2015-07-10 | 2016-10-25 | Trusted Mobile, Llc | System for transparent authentication across installed applications |
US9538335B1 (en) | 2015-07-22 | 2017-01-03 | International Business Machines Corporation | Inferring device theft based on historical location data |
US9807615B2 (en) | 2016-03-17 | 2017-10-31 | International Business Machines Corporation | Disabling a mobile device that has stolen hardware components |
US10115292B2 (en) * | 2016-05-19 | 2018-10-30 | Richard Abramson | System and method for automatic loss prevention of mobile communication devices |
KR102004680B1 (en) | 2016-08-11 | 2019-07-26 | 킴벌리-클라크 월드와이드, 인크. | USB bait method and design |
CN106385470A (en) * | 2016-09-26 | 2017-02-08 | 北京小米移动软件有限公司 | Information push method and device |
US11095678B2 (en) * | 2017-07-12 | 2021-08-17 | The Boeing Company | Mobile security countermeasures |
DE102017008051A1 (en) * | 2017-08-27 | 2019-02-28 | Tobias Rückert | Method for deactivating control channels and communication system for communication of a user with groups of target devices |
CN107733872B (en) * | 2017-09-18 | 2022-03-25 | 北京小米移动软件有限公司 | Information printing method and device |
US10652249B2 (en) | 2017-10-31 | 2020-05-12 | Microsoft Technology Licensing, Llc | Remote locking a multi-user device to a set of users |
US11055800B2 (en) | 2017-12-04 | 2021-07-06 | Telcom Ventures, Llc | Methods of verifying the onboard presence of a passenger, and related wireless electronic devices |
US10003688B1 (en) | 2018-02-08 | 2018-06-19 | Capital One Services, Llc | Systems and methods for cluster-based voice verification |
CN108305438B (en) * | 2018-02-27 | 2020-11-27 | 北京小米移动软件有限公司 | Anti-lost early warning method and device, storage medium and intelligent baby crib |
US10891703B2 (en) | 2018-06-12 | 2021-01-12 | International Business Machines Corporation | Preventing unauthorized use of protected equipment in violation of export regulations |
US11436215B2 (en) | 2018-08-20 | 2022-09-06 | Samsung Electronics Co., Ltd. | Server and control method thereof |
KR102551358B1 (en) * | 2018-09-21 | 2023-07-04 | 삼성전자주식회사 | Method and system for providing information related to a status of an object in a refrigerator |
CN110784448A (en) * | 2019-09-20 | 2020-02-11 | 苏州浪潮智能科技有限公司 | Equipment safety protection method, device, system and computer readable storage medium |
US10943448B1 (en) | 2019-11-22 | 2021-03-09 | Honeywell International Inc. | Geo-locked field device |
US11200306B1 (en) | 2021-02-25 | 2021-12-14 | Telcom Ventures, Llc | Methods, devices, and systems for authenticating user identity for location-based deliveries |
CN115103055B (en) * | 2022-06-17 | 2023-10-03 | 度小满科技(北京)有限公司 | Loss processing method, loss processing device, mobile terminal and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001084455A1 (en) * | 2000-04-27 | 2001-11-08 | Solagent, Inc. | Portable computing device communication system and method |
WO2006102399A1 (en) * | 2005-03-18 | 2006-09-28 | Absolute Software Corporation | Persistent servicing agent |
Family Cites Families (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4132560C1 (en) | 1991-09-30 | 1993-04-22 | Siemens Ag, 8000 Muenchen, De | Plasma-aided deposition of film for integrated semiconductor circuit - using neutral particles, activated by microwave in separate chamber, and non-excited reaction gas, etc. |
US5345823A (en) | 1991-11-12 | 1994-09-13 | Texas Instruments Incorporated | Accelerometer |
FR2718310B1 (en) * | 1994-03-29 | 1996-04-26 | Alcatel Mobile Comm France | Self-invalidation device of a portable terminal of the mobile radiotelephone type. |
US6300863B1 (en) * | 1994-11-15 | 2001-10-09 | Absolute Software Corporation | Method and apparatus to monitor and locate an electronic device using a secured intelligent agent via a global network |
US5715174A (en) * | 1994-11-15 | 1998-02-03 | Absolute Software Corporation | Security apparatus and method |
US6269392B1 (en) | 1994-11-15 | 2001-07-31 | Christian Cotichini | Method and apparatus to monitor and locate an electronic device using a secured intelligent agent |
US7143290B1 (en) * | 1995-02-13 | 2006-11-28 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
GB2298302B (en) * | 1995-02-25 | 1998-04-01 | Accupage Ltd | Security device |
KR19980703082A (en) * | 1995-03-17 | 1998-09-05 | 할베르크 요한 | Alarm system for networked computer devices |
US6108704A (en) * | 1995-09-25 | 2000-08-22 | Netspeak Corporation | Point-to-point internet protocol |
US6131067A (en) * | 1995-10-09 | 2000-10-10 | Snaptrack, Inc. | Client-server based remote locator device |
US5905949A (en) * | 1995-12-21 | 1999-05-18 | Corsair Communications, Inc. | Cellular telephone fraud prevention system using RF signature analysis |
US6594254B1 (en) * | 1996-08-16 | 2003-07-15 | Netspeak Corporation | Domain name server architecture for translating telephone number domain names into network protocol addresses |
US6145004A (en) * | 1996-12-02 | 2000-11-07 | Walsh; Stephen Kelly | Intranet network system |
US6493338B1 (en) * | 1997-05-19 | 2002-12-10 | Airbiquity Inc. | Multichannel in-band signaling for data communications over digital wireless telecommunications networks |
US6606662B2 (en) * | 1997-06-11 | 2003-08-12 | Canon Kabushiki Kaisha | Portable terminal apparatus and communication method thereof |
US6032257A (en) * | 1997-08-29 | 2000-02-29 | Compaq Computer Corporation | Hardware theft-protection architecture |
US5945915A (en) * | 1997-11-06 | 1999-08-31 | International Business Machines Corporation | Computer system for sending an alert signal over a network when a cover of said system has been opened |
US6011473A (en) * | 1998-01-13 | 2000-01-04 | Micron Electronics, Inc. | Method for generating an alarm in a portable computer system |
WO1999053627A1 (en) * | 1998-04-10 | 1999-10-21 | Chrimar Systems, Inc. Doing Business As Cms Technologies | System for communicating with electronic equipment on a network |
GB9811641D0 (en) * | 1998-05-29 | 1998-07-29 | 3Com Technologies Ltd | Network security |
US6154790A (en) * | 1998-07-10 | 2000-11-28 | International Business Machines | Monitoring and reporting hard disk drives identification using radio frequency |
US6172606B1 (en) * | 1998-07-10 | 2001-01-09 | 3Com Technologies | Network security |
US6263440B1 (en) * | 1998-07-10 | 2001-07-17 | International Business Machines Corporation | Tracking and protection of display monitors by reporting their identity |
FR2781952B1 (en) * | 1998-07-28 | 2000-09-08 | Cegelec | METHOD FOR ALLOCATING COMPUTER ADDRESSES BETWEEN UNITS OF AN INDUSTRIAL INSTALLATION CONDUCT SYSTEM |
US6311291B1 (en) * | 1998-08-12 | 2001-10-30 | Pc-Tel, Inc. | Remote modem control and diagnostic system and method |
US7216348B1 (en) * | 1999-01-05 | 2007-05-08 | Net2Phone, Inc. | Method and apparatus for dynamically balancing call flow workloads in a telecommunications system |
JP2000270376A (en) * | 1999-03-17 | 2000-09-29 | Fujitsu Ltd | Mobile phone maintenance service system and method for maintenance service |
US6553497B1 (en) * | 1999-03-25 | 2003-04-22 | International Business Machines Corporation | Electromagnetic field tamper alarm |
US6954147B1 (en) * | 1999-03-31 | 2005-10-11 | Lenovo Pte. Ltd. | Method and system for providing protection against theft and loss of a portable computer system |
US6453461B1 (en) * | 1999-06-09 | 2002-09-17 | Compaq Information Technologies Group, L.P. | Method and apparatus for testing ASL plug and play code in an ACPI operating system |
WO2000078057A1 (en) | 1999-06-15 | 2000-12-21 | Kline & Walker, Llc | Secure, accountable, modular and programmable software trac |
US7089591B1 (en) * | 1999-07-30 | 2006-08-08 | Symantec Corporation | Generic detection and elimination of marco viruses |
US6725379B1 (en) * | 1999-08-11 | 2004-04-20 | Dell Products L.P. | Stolen computer detection and protection |
GB2356111B (en) * | 1999-11-03 | 2001-11-14 | 3Com Corp | Allocation of IP address by proxy to device in a local area network |
US6614349B1 (en) * | 1999-12-03 | 2003-09-02 | Airbiquity Inc. | Facility and method for tracking physical assets |
GB0007942D0 (en) * | 2000-04-01 | 2000-05-17 | Hewlett Packard Co | Distributed search method |
US6721403B1 (en) * | 2000-06-02 | 2004-04-13 | International Business Machines Corporation | Global delivery of radio broadcasts via public telephone networks |
US6804699B1 (en) * | 2000-07-18 | 2004-10-12 | Palmone, Inc. | Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server |
US6728767B1 (en) * | 2000-08-18 | 2004-04-27 | Cisco Technology, Inc. | Remote identification of client and DNS proxy IP addresses |
AU2001287225A1 (en) * | 2000-09-01 | 2002-03-13 | Lucira Technologies, Inc. | Method and system for tracking and controlling a remote device |
GB2366965A (en) * | 2000-09-01 | 2002-03-20 | Ncr Int Inc | Downloading data to a requesting client form the local cache of another client |
GB2366406A (en) * | 2000-09-01 | 2002-03-06 | Ncr Int Inc | Downloading and uploading data in information networks |
US6813487B1 (en) * | 2000-10-18 | 2004-11-02 | David Alan Trommelen | Method and apparatus for securing data stored in a remote electronic device |
US6820562B2 (en) * | 2000-11-29 | 2004-11-23 | Accelerated Performance, Inc. | Plastic desk with integral computer |
US6868265B2 (en) * | 2001-01-29 | 2005-03-15 | Accelerated Performance, Inc. | Locator for physically locating an electronic device in a communication network |
US6774811B2 (en) * | 2001-02-02 | 2004-08-10 | International Business Machines Corporation | Designation and opportunistic tracking of valuables |
US6433685B1 (en) * | 2001-03-02 | 2002-08-13 | Hewlett-Packard Company | System and method for locating lost or stolen articles |
US20030005316A1 (en) * | 2001-06-28 | 2003-01-02 | Intel Corporation | Radio location based theft recovery mechanism |
US7200652B2 (en) * | 2001-07-16 | 2007-04-03 | International Business Machines Corporation | Method and system for providing automatic notification of end of lease of computers and their locations |
US7181195B2 (en) * | 2002-02-14 | 2007-02-20 | International Business Machines Corporation | Method and system for tracing missing network devices using hardware fingerprints |
US7054624B2 (en) * | 2002-04-02 | 2006-05-30 | X-Cyte, Inc. | Safeguarding user data stored in mobile communications devices |
US7155742B1 (en) * | 2002-05-16 | 2006-12-26 | Symantec Corporation | Countering infections to communications modules |
US6975204B1 (en) * | 2002-07-11 | 2005-12-13 | Raytheon Company | Method and apparatus for preventing unauthorized use of equipment |
EP1523604A2 (en) | 2002-07-13 | 2005-04-20 | Roger Marcel Humbel | Authorisation, regulation, characterisation, localisation, locking and theft security system (here also referred to as lock-loop dss) |
AU2003264914A1 (en) * | 2002-07-13 | 2004-02-02 | Roger Humbel | Authorisation, regulation, characterisation, localisation, locking and theft security system (here also referred to as lock-loop dss) |
US7167912B1 (en) * | 2002-08-09 | 2007-01-23 | Cisco Technology, Inc. | Method and apparatus for detecting failures in network components |
US6782251B2 (en) * | 2002-09-26 | 2004-08-24 | Motorola Inc. | Method and apparatus for operating a lost mobile communication device |
US7159149B2 (en) * | 2002-10-24 | 2007-01-02 | Symantec Corporation | Heuristic detection and termination of fast spreading network worm attacks |
US7249187B2 (en) * | 2002-11-27 | 2007-07-24 | Symantec Corporation | Enforcement of compliance with network security policies |
US8343235B2 (en) * | 2002-12-11 | 2013-01-01 | Broadcom Corporation | Theft prevention of media peripherals in a media exchange network |
US7296293B2 (en) * | 2002-12-31 | 2007-11-13 | Symantec Corporation | Using a benevolent worm to assess and correct computer security vulnerabilities |
US7203959B2 (en) * | 2003-03-14 | 2007-04-10 | Symantec Corporation | Stream scanning through network proxy servers |
US7590837B2 (en) * | 2003-08-23 | 2009-09-15 | Softex Incorporated | Electronic device security and tracking system and method |
US20050149752A1 (en) * | 2003-12-29 | 2005-07-07 | Johnson Robert K. | System and method for tracking laptop computers |
US20060075263A1 (en) * | 2004-03-15 | 2006-04-06 | Jesse Taylor | System and method for security and file retrieval from remote computer |
US7540016B2 (en) * | 2004-07-21 | 2009-05-26 | Beachhead Solutions, Inc. | System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall |
US7194321B2 (en) * | 2004-10-29 | 2007-03-20 | Dynacity Technology (Hk) Limited | Modular multi-axis motion control and driving system and method thereof |
US7068168B2 (en) * | 2004-11-12 | 2006-06-27 | Simon Girshovich | Wireless anti-theft system for computer and other electronic and electrical equipment |
US8392554B2 (en) * | 2005-01-14 | 2013-03-05 | Research In Motion Limited | System and method of remotely locating a lost mobile communication device |
US8418226B2 (en) * | 2005-03-18 | 2013-04-09 | Absolute Software Corporation | Persistent servicing agent |
US9547780B2 (en) * | 2005-03-28 | 2017-01-17 | Absolute Software Corporation | Method for determining identification of an electronic device |
US7358506B2 (en) * | 2005-12-15 | 2008-04-15 | Palo Alto Research Center Incorporated | Structured X-ray conversion screen fabricated with molded layers |
US8046588B2 (en) * | 2006-02-23 | 2011-10-25 | Rockwell Automation Technologies, Inc. | Audit trail in a programmable safety instrumented system via biometric signature(s) |
-
2008
- 2008-04-02 US US12/060,865 patent/US8248237B2/en active Active
-
2009
- 2009-04-01 WO PCT/IB2009/005548 patent/WO2009122296A2/en active Application Filing
- 2009-04-01 CA CA2757484A patent/CA2757484A1/en not_active Abandoned
- 2009-04-01 EP EP09727999.6A patent/EP2266071B1/en active Active
- 2009-04-01 CN CN2009801212508A patent/CN102084370A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001084455A1 (en) * | 2000-04-27 | 2001-11-08 | Solagent, Inc. | Portable computing device communication system and method |
WO2006102399A1 (en) * | 2005-03-18 | 2006-09-28 | Absolute Software Corporation | Persistent servicing agent |
Also Published As
Publication number | Publication date |
---|---|
US20090251282A1 (en) | 2009-10-08 |
EP2266071A2 (en) | 2010-12-29 |
EP2266071B1 (en) | 2014-11-26 |
CA2757484A1 (en) | 2009-10-08 |
WO2009122296A2 (en) | 2009-10-08 |
CN102084370A (en) | 2011-06-01 |
US8248237B2 (en) | 2012-08-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009122296A3 (en) | System for mitigating the unauthorized use of a device | |
WO2009122290A3 (en) | System for mitigating the unauthorized use of a device | |
WO2009122306A3 (en) | Method for mitigating the unauthorized use of a device | |
WO2009122297A3 (en) | System for monitoring the unauthorized use of a device | |
WO2009122293A3 (en) | System for monitoring the unauthorized use of a device | |
WO2009122291A3 (en) | Method for mitigating the unauthorized use of a device | |
WO2009122295A3 (en) | Method for monitoring the unauthorized use of a device | |
WO2009122309A3 (en) | Method for monitoring the unauthorized use of a device | |
WO2007096871A3 (en) | Device, system and method of accessing a security token | |
WO2008065333A3 (en) | Secure access to a protected network resource within a restricted area | |
WO2010048031A3 (en) | Network location determination for direct access networks | |
WO2008067173A3 (en) | Security system and related devices and methods | |
WO2007083300A3 (en) | Securing data in a networked environment | |
WO2006068969A3 (en) | Method and device for publishing cross-network user behavioral data | |
WO2008058093A3 (en) | Content management system | |
WO2010011731A3 (en) | Methods and systems for secure key entry via communication networks | |
MXPA05007150A (en) | Policy engine and methods and systems for protecting data. | |
WO2007084947A3 (en) | Systems and methods for neutralizing unauthorized attempts to monitor user activity | |
WO2007149977A3 (en) | Location-based security, privacy, access control and monitoring system | |
WO2007024366A3 (en) | System and method for controlling access to mobile devices | |
WO2008129765A1 (en) | Monitoring unit control system | |
WO2007076340A3 (en) | Methods and systems to restrict usage of a dma channel | |
WO2009031453A1 (en) | Network security monitor apparatus and network security monitor system | |
WO2007089237A3 (en) | Vacation mode security system and method | |
TW200711432A (en) | Anti-hack protection to restrict installation of operating systems and other software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980121250.8 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09727999 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009727999 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2757484 Country of ref document: CA |