Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server

Inactive Publication Date: 2012-01-03
QUALCOMM INC
View PDF171 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]Accordingly, what is needed is a system and / or method that can discourage theft of a device such as a palmtop computer system or personal digital assistant (PDA), and that can encourage return of the device to the rightful owner if it is lost or stolen. What is also needed is a system and / or method that can satisfy the above need and that can prevent use of the device and unauthorized access to information stored on the device if it is not in the possession of an authorized user. In addition, what is needed is a system and / or method that can satisfy the above needs and that is user-friendly and convenient. The present invention provides these advantages and others not specifically mentioned above but described in the sections to follow.
[0010]A method and system are described for preventing unauthorized use of a device (e.g., a palmtop computer system or PDA) and for facilitating recovery of the device when, for example, the device has been lost or stolen and an attempt to use it is made by someone other than an authorized user. The authorized user registers the device in a database at a central site using a unique identifier for the device. If the device is lost or stolen, the authorized user records this in the central site database. When the device is connected to the central site using either a wireless or a landline connection, the device automatically communicates its unique identity to the site. The central site performs a lookup based on the unique identity and, if the database indicates that the device is lost or stolen, the device is so notified. In response, the device automatically disables normal operation.
[0014]Thus, in accordance with the present invention, when a device is lost or stolen, it can be more readily recovered and, in the meantime, unauthorized use of the device is prevented. Each time the device is connected to the Internet, the device automatically checks a Web site to determine if it is lost or stolen. If the device is reported as lost or stolen, the device will be disabled to prevent normal operation. While in the disabled mode, the device can display information on how to contact the authorized user, or the Web site can initiate a trace to find the location of the device.
[0015]In accordance with the present embodiment of the present invention, these security measures can be automatically implemented in the background without a user knowing they are occurring, and thus they are convenient and user-friendly. In addition, once it is understood that unauthorized use will cause the device to be disabled and thus of little use to an unauthorized user, the likelihood of theft of the device is expected to decrease, and the likelihood of its return to the rightful owner is expected to increase.

Problems solved by technology

On the other hand, because they are relatively small, palmtop computer systems can be easily lost or stolen.
Although they are not extremely expensive, palmtops are expensive enough to make them attractive to thieves.
To the owner of a palmtop, not only is there a monetary loss if the device is lost or stolen, but the information stored on the palmtop may be very valuable and possibly irreplaceable.
However, passwords are considered by many users to be vexing and inconvenient, passwords can lock out even an authorized user, and experience shows that passwords can be defeated by unauthorized users.
In addition, while a password may prevent access to applications and information already existing on the palmtop, it will generally not prevent an unauthorized user from adding new applications and information.
Thus, an unauthorized user can simply assume ownership of the palmtop and ignore the password-protected information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server
  • Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server
  • Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027]In the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will he recognized by one skilled in the art that the present invention may be practiced without these specific details or with equivalents thereof. In other instances, well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.

Notation and Nomenclature

[0028]Some portions of the detailed descriptions, which follow, are presented in terms of procedures, steps, logic blocks, processing, and other symbolic representations of operations on data bits that can be performed on computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. A procedure, computer execu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for preventing unauthorized use of a device (e.g., a portable computer system) and for recovering the device when, for example, the device has been lost or stolen and an attempt to use it is made by someone other than an authorized user. The authorized user registers the device in a database at a central site (e.g., a Web site) using a unique identifier such as the device's serial number. If the device is lost or stolen, this information is entered into the Web site database by the authorized user. When the device is connected to the Internet using either a wireless or a landline connection, the device automatically communicates its unique identity to the Web site. The Web site performs a lookup and, if the database indicates that the device is lost or stolen, the device is so notified. In response, the device disables normal operation and instead will display, for example, the name and address of the authorized user. Other security measures can be used depending on the preferences of the authorized user; for example, the Web site can initiate a trace to locate the device. Thus, when a device is lost or stolen, it can be more readily recovered and, in the meantime, unauthorized use is prevented.

Description

[0001]Notice: More than one reissue application has been filed for the reissue of U.S. Pat. No. 6,804,699. The reissue applications are application Ser. No. 11 / 546,488 (the present application), filed Oct. 10, 2006, which is a reissue application of U.S. Pat. No. 6,804,699; and application Ser. No. 11 / 635,062, filed Dec. 5, 2006, which is a reissue application of U.S. Pat. No. 6,804,699 and a continuation reissue application of application Ser. No. 11 / 546,488.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates to the field of portable devices such as personal digital assistants or palmtop computer systems. Specifically, the present invention relates to a method and system for preventing unauthorized use of a portable device and for facilitating recovery of the portable device if it is lost or stolen.[0004]2. Related Art[0005]As the components required to build a computer system have reduced in size, new categories of computer systems have em...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F15/16G06F21/00H04L29/06
CPCG06F21/31G06F21/88H04L63/0876H04L63/10
Inventor HENRIE, JAMES B.
Owner QUALCOMM INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products