|Numéro de publication||USRE43070 E1|
|Type de publication||Octroi|
|Numéro de demande||US 11/546,488|
|Date de publication||3 janv. 2012|
|Date de dépôt||10 oct. 2006|
|Date de priorité||18 juil. 2000|
|État de paiement des frais||Payé|
|Autre référence de publication||US6804699|
|Numéro de publication||11546488, 546488, US RE43070 E1, US RE43070E1, US-E1-RE43070, USRE43070 E1, USRE43070E1|
|Inventeurs||James B. Henrie|
|Cessionnaire d'origine||Hewlett-Packard Development Company, L.P.|
|Exporter la citation||BiBTeX, EndNote, RefMan|
|Citations de brevets (125), Citations hors brevets (13), Référencé par (4), Classifications (15), Événements juridiques (10)|
|Liens externes: USPTO, Cession USPTO, Espacenet|
Notice: More than one reissue application has been filed for the reissue of U.S. Pat. No. 6,804,699. The reissue applications are application Ser. No. 11/546,488 (the present application), filed Oct. 10, 2006, which is a reissue application of U.S. Pat. No. 6,804,699; and application Ser. No. 11/635,062, filed Dec. 5, 2006, which is a reissue application of U.S. Pat. No. 6,804,699 and a continuation reissue application of application Ser. No. 11/546,488.
1. Field of the Invention
The present invention relates to the field of portable devices such as personal digital assistants or palmtop computer systems. Specifically, the present invention relates to a method and system for preventing unauthorized use of a portable device and for facilitating recovery of the portable device if it is lost or stolen.
2. Related Art
As the components required to build a computer system have reduced in size, new categories of computer systems have emerged. One of the more recent categories of computer systems is the portable or “palmtop” computer system, or personal digital assistant (PDA). A palmtop computer system is a computer that is small enough to be held in the hand of a user and is thus “palm-sized.” As a result, palmtops are readily carried about in a briefcase or purse, and some palmtops are compact enough to fit into a person's pocket. By virtue of their size, palmtop computer systems are also lightweight and so are exceptionally portable and convenient.
On the other hand, because they are relatively small, palmtop computer systems can be easily lost or stolen. Although they are not extremely expensive, palmtops are expensive enough to make them attractive to thieves. To the owner of a palmtop, not only is there a monetary loss if the device is lost or stolen, but the information stored on the palmtop may be very valuable and possibly irreplaceable. Consequently, it is desirable to discourage theft of palmtop computer systems and to encourage their return to their rightful owners when they are lost or stolen.
In addition, it is desirable to prevent use of the palmtop if it is not in the possession of an authorized user. Importantly, this may discourage deliberate acts such as theft if it is known beforehand that the palmtop can only be used by an authorized user. Of further importance, this can prevent information stored on the palmtop from being accessed by someone other than an authorized user.
In the prior art, one method for protecting against unauthorized use of a computer system or against unauthorized access to information stored in a computer system is to use a password. However, passwords are considered by many users to be vexing and inconvenient, passwords can lock out even an authorized user, and experience shows that passwords can be defeated by unauthorized users. In addition, while a password may prevent access to applications and information already existing on the palmtop, it will generally not prevent an unauthorized user from adding new applications and information. Thus, an unauthorized user can simply assume ownership of the palmtop and ignore the password-protected information.
Accordingly, what is needed is a system and/or method that can discourage theft of a device such as a palmtop computer system or personal digital assistant (PDA), and that can encourage return of the device to the rightful owner if it is lost or stolen. What is also needed is a system and/or method that can satisfy the above need and that can prevent use of the device and unauthorized access to information stored on the device if it is not in the possession of an authorized user. In addition, what is needed is a system and/or method that can satisfy the above needs and that is user-friendly and convenient. The present invention provides these advantages and others not specifically mentioned above but described in the sections to follow.
A method and system are described for preventing unauthorized use of a device (e.g., a palmtop computer system or PDA) and for facilitating recovery of the device when, for example, the device has been lost or stolen and an attempt to use it is made by someone other than an authorized user. The authorized user registers the device in a database at a central site using a unique identifier for the device. If the device is lost or stolen, the authorized user records this in the central site database. When the device is connected to the central site using either a wireless or a landline connection, the device automatically communicates its unique identity to the site. The central site performs a lookup based on the unique identity and, if the database indicates that the device is lost or stolen, the device is so notified. In response, the device automatically disables normal operation.
In another embodiment, instead of notifying the device that it is lost or stolen, the device is notified that it is not lost or stolen and its use is authorized. In this embodiment, operation of the device is automatically enabled when the central site indicates that use of the device is authorized. This feature can also be used to re-enable a device that was reported as lost or stolen and disabled as a result, and then was recovered by its authorized user.
In one embodiment, the central site is a World Wide Web site residing on a server computer system in a computer system network (e.g., the Internet).
In one embodiment, when disabled, the device displays information that can be used to identify and contact the authorized user, such as the user's name and address. In other embodiments, other security measures can be used depending on the preferences of the authorized user. In one of these embodiments, the Web site can initiate a trace to locate the device. In another embodiment, if the device does not make contact with the central site for a specified period of time, operation of the device is automatically disabled.
Thus, in accordance with the present invention, when a device is lost or stolen, it can be more readily recovered and, in the meantime, unauthorized use of the device is prevented. Each time the device is connected to the Internet, the device automatically checks a Web site to determine if it is lost or stolen. If the device is reported as lost or stolen, the device will be disabled to prevent normal operation. While in the disabled mode, the device can display information on how to contact the authorized user, or the Web site can initiate a trace to find the location of the device.
In accordance with the present embodiment of the present invention, these security measures can be automatically implemented in the background without a user knowing they are occurring, and thus they are convenient and user-friendly. In addition, once it is understood that unauthorized use will cause the device to be disabled and thus of little use to an unauthorized user, the likelihood of theft of the device is expected to decrease, and the likelihood of its return to the rightful owner is expected to increase.
In the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will he recognized by one skilled in the art that the present invention may be practiced without these specific details or with equivalents thereof. In other instances, well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.
Some portions of the detailed descriptions, which follow, are presented in terms of procedures, steps, logic blocks, processing, and other symbolic representations of operations on data bits that can be performed on computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. A procedure, computer executed step, logic block, process, etc., is here, and generally, conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the present invention, discussions utilizing terms such as “determining” or “indicating” or “indexing” or “receiving” or “performing” or “initiating” or “sending” or “implementing” or “disabling” or “enabling” or “displaying” or the like, refer to the action and processes of a computer system (e.g., process 900 of
The present invention is discussed primarily in the context of a portable computer system, such as a palmtop or personal digital assistant, with the capability to access via the Internet a World Wide Web (“Web”) site residing on a server computer system. However, it is appreciated that the present invention can be used with other types of devices that have the capability to access some type of central device or central site, including but not limited to laptop computer systems.
In the present embodiment, base station 32 is both a transmitter and receiver base station, which can be implemented by coupling it into an existing public telephone network 34. Implemented in this manner, base station 32 enables portable computer system 100 to communicate with a proxy server computer system 36, which is coupled by wire to the existing public telephone network 34. Furthermore, proxy server computer system 36 is coupled to the Internet 52, thereby enabling portable computer system 100 to communicate with the Internet 52.
Coupled with Internet 52 are multiple servers exemplified by server 30. Residing on server 30 is a Web site 40. When communicating with a Web site over Internet 52, protocols such as CTP (Compact Transport Protocol) and CML (Compact Markup Language) can be used by portable computer system 100 in the present embodiment.
It should be appreciated that within the present embodiment, one of the functions of proxy server 36 is to perform operations over the Internet 52 on behalf of portable computer system 100. For example, proxy server 36 has a particular Internet address and acts as a proxy device for portable computer system 100 over the Internet 52.
It should be further appreciated that other embodiments of a communications network, planned or envisioned, may be utilized in accordance with the present invention. For example, a wireless connection may be made from portable computer system 100 directly to the Internet 52.
The data and information which are communicated between base station 32 and portable computer system 100 are the same type of information and data that can conventionally be transferred and received over a public telephone wire network system. However, a wireless communication interface is utilized to communicate data and information between portable computer system 100 and base station 32. It should be appreciated that one embodiment of a wireless communication system in accordance with the present invention is the Mobitex wireless communication system.
With reference first to
Importantly, in the present embodiment, host computer system 56 is also coupled via connector cable 68 to a cradle 60 for receiving and initiating communication with portable computer system 100 (“handheld computer”) of the present invention. Connector cable 68 can be a serial bus (e.g., RS232), a parallel bus, a Universal Serial Bus (USB), or any other type of workable connection. Cradle 60 provides an electrical and mechanical communication interface between connector cable 68 and portable computer system 100 for two-way communications with host computer system 56. Portable computer system 100 also contains a wireless infrared communication mechanism 64 for sending and receiving information from other devices.
With reference next to
With reference to
Infrared communication mechanism 64 (e.g., an infrared emitter and detector device) is for sending and receiving information from other similarly equipped devices (see
With reference still to
In one embodiment, computer system 100 includes a communication circuit 109 coupled to bus 110. Communication circuit 109 includes an optional digital signal processor (DSP) 120 for processing data to be transmitted or data that are received via signal transmitter/receiver device 108. Alternatively, processor 101 can perform some or all of the functions performed by DSP 120.
Also included in computer system 100 of
Refer now to
Continuing with reference to
Continuing with reference to
With reference still to
In step 910 of
With reference still to
In the present embodiment, the account is indexed using the unique identifier so that the account can be readily accessed using the unique identifier. The user can then enter preferences into the account pertaining to the security features of the present invention. For example, the security features can be enabled or disabled depending on user preferences.
In one embodiment, the user accesses Web site 40 to set up the account using portable computer system 100. For example, portable computer system 100 can be registered using the synchronization process described in conjunction with
In the present embodiment, Web site 40 is set up to support the features of the present invention. In one embodiment, in which portable computer system 100 is a palmtop computer such as a Palm III, a Palm V, or a Palm VII (or other such devices), Web site 40 can be a site such as Palm.net. In another embodiment, Web site 40 can be an Internet access conduit that is commonly available to users of portable devices, such as the AvantGo site. It is appreciated that the security features of the present invention will be desirable to users of portable devices, and as such a number of Web sites may find it advantageous to add such security features to the services they provide.
In step 915 of
In one embodiment, when the device is lost or stolen, the user accesses the account set up for portable computer system 100 at Web site 40 and enables the security features of the present invention by clicking on an input box to indicate that portable computer system 100 is lost or stolen. When the device is recovered, the user accesses the account at Web site 40 and disables the security features of the present invention by clicking on the input box, thereby indicating that portable computer system 100 is no longer lost or stolen.
In step 930 of
In step 940 of
In step 945, based on the account information, a determination is made with regard to whether or not portable computer system 100 is lost or stolen (based on the user input provided in step 920). If portable computer system 100 is not reported as lost or stolen, then Web site 40 sends a signal to the device indicating normal operation of the device is enabled (step 950), and normal operation of the device continues (step 955). It is understood that enabling normal operation can be a default setting such that, if no response is received to the signal of step 930, then portable computer system 100 will continue to operate normally.
Alternatively, Web site 40 can respond to portable computer system 100 with an indication that the device is not lost or stolen, where this indication is necessary in order for portable computer system 100 to operate normally. In one embodiment, the user can configure portable computer system 100 such that it is necessary for the device to make contact with Web site 40 on a periodic basis, at an interval specified according to user preferences. If the specified time period expires before portable computer system 100 connects with Web site 40, then the device is automatically disabled. For example, the authorized user could specify that portable computer system 100 is to connect with Web site 40 once per week, and if a week goes by without such a connection, then portable computer system 100 is disabled. If, at a later time, the authorized user attempts to use portable computer system 100, then portable computer system 100 can still be connected to Web site 40 (this capability remains even if the device is in the disabled or locked mode). After looking up the account information based on the unique identity of portable computer system 100 (step 945) to determine whether the device has been lost or stolen, Web site 40 sends a signal to the device that unlocks the device and enables normal operation. It is appreciated that other actions may need to be performed in order to re-enable operation of the device.
In step 960, if portable computer system 100 is reported as lost or stolen, then Web site 40 sends a signal to the device indicating that normal operation of the device is disabled. As described above, disabling operability of the device can be the result of a signal received from Web site 40 or it can be a default setting if no response is received to the signal of step 930. In addition, if portable computer system 100 has been reported as lost or stolen and has already been disabled in accordance with the present invention, it will continue to remain disabled as a result of this step. For example, if portable computer system 100 is in the locked mode, and no response is received in step 960, then it will continue to remain in the locked mode.
In step 965, in the disabled mode of operation (e.g. a locked mode), many (almost all) functions of portable computer system 100 cannot be used. In one embodiment, portable computer system 100 changes the configuration stored in flash memory (e.g., ROM 103 of
In one embodiment, information for identifying and contacting the authorized owner or user is displayed on display device 105 (
Once portable computer system 100 is recovered by the authorized user or rightful owner, it can be reset for normal operation. In one embodiment, a bootstrap reset would be required in order to allow the flash memory to be overwritten with the normal configuration information. In another embodiment, as described in conjunction with step 915, the authorized user can change the account information to indicate that the device is no longer lost or stolen. Accordingly, when portable computer system 100 is subsequently synchronized (per
In summary, in accordance with the present invention, when a device (e.g., a portable device such as portable computer system 100) is lost or stolen, it can be more readily recovered and, in the meantime, unauthorized use of the device is prevented. Each time the device is connected to the Internet, the device automatically checks a Web site to determine if it is lost or stolen. If the device is reported as lost or stolen, the device will be disabled to prevent normal operation. While in the disabled mode, the device can display contact information for the authorized user, or the Web site can initiate a trace to find the location of the device.
In accordance with the present embodiment of the present invention, these security measures can be automatically implemented in the background without a user knowing they are occurring, and thus they are convenient and user-friendly. In addition, once it is understood that unauthorized use will cause the device to be disabled and thus of little use to an unauthorized user, the likelihood of theft will probably decrease and the likelihood of return to the rightful owner will probably increase.
Thus, the present invention provides a system and method that can discourage theft of a device such as a portable (palmtop) computer system, PDA, laptop or other types of device, and that can encourage return of the device to the rightful owner if it is lost or stolen. The present invention also provides a system and method that can prevent use of the device if it is not in the possession of an authorized user and that can prevent unauthorized access to information stored on the device. In addition, the present invention provides a system and method that is user-friendly and convenient.
The preferred embodiment of the present invention, identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server, is thus described. While the present invention has been described in particular embodiments, it should be appreciated that the present invention should not be construed as limited by such embodiments, but rather construed according to the below claims.
|Brevet cité||Date de dépôt||Date de publication||Déposant||Titre|
|US4956769||16 mai 1988||11 sept. 1990||Sysmith, Inc.||Occurence and value based security system for computer databases|
|US5010547||10 juil. 1989||23 avr. 1991||Motorola, Inc.||Multiple messaging using a single selective call address|
|US5012219||13 oct. 1989||30 avr. 1991||Motorola, Inc.||Message reminder alert for selective call receiver|
|US5075684||6 oct. 1989||24 déc. 1991||Motorola, Inc.||Selective call message management|
|US5359317||9 oct. 1992||25 oct. 1994||Motorola, Inc.||Method and apparatus for selectively storing a portion of a received message in a selective call receiver|
|US5394140||23 nov. 1992||28 févr. 1995||Motorola, Inc.||Method and apparatus for pre-programmed call-back-number-determined alert|
|US5430436||22 juil. 1994||4 juil. 1995||Motorola, Inc.||Method and apparatus for displaying a keypad arrangement on a selective call receiver|
|US5561836||2 mai 1994||1 oct. 1996||Motorola, Inc.||Method and apparatus for qualifying access to communication system services based on subscriber unit location|
|US5612682||30 mai 1995||18 mars 1997||Motorola, Inc.||Method and apparatus for controlling utilization of a process added to a portable communication device|
|US5640452||28 avr. 1995||17 juin 1997||Trimble Navigation Limited||Location-sensitive decryption of an encrypted message|
|US5650776||8 mai 1995||22 juil. 1997||Motorola, Inc.||Communication receiver having user configuration control functions|
|US5705995||7 avr. 1997||6 janv. 1998||Motorola, Inc.||Selective call receiver and method of storing messages therein|
|US5757271||12 nov. 1996||26 mai 1998||International Business Machines Corporation||Portable computer and method of providing security for an electronic device|
|US5809413 *||19 déc. 1996||15 sept. 1998||Nokia Mobile Phones Limited||Over the air locking of user identity modules for mobile telephones|
|US5898783 *||14 nov. 1996||27 avr. 1999||Lucent Technologies, Inc.||System and method for employing a telecommunications network to remotely disable a SIM or smartcard|
|US5903852||10 sept. 1996||11 mai 1999||Motorola, Inc.||Radiotelephone operating technique|
|US5922073||27 déc. 1996||13 juil. 1999||Canon Kabushiki Kaisha||System and method for controlling access to subject data using location data associated with the subject data and a requesting device|
|US5930801||30 oct. 1997||27 juil. 1999||Xerox Corporation||Shared-data environment in which each file has independent security properties|
|US5958006||19 déc. 1995||28 sept. 1999||Motorola, Inc.||Method and apparatus for communicating summarized data|
|US5961590||22 juil. 1997||5 oct. 1999||Roampage, Inc.||System and method for synchronizing electronic mail between a client site and a central site|
|US5968131||26 oct. 1998||19 oct. 1999||Roampage, Inc.||System and method for securely synchronizing multiple copies of a workspace element in a network|
|US5991405||27 janv. 1998||23 nov. 1999||Dsc Telecom, L.P.||Method for dynamically updating cellular phone unique encryption keys|
|US6023708||29 mai 1997||8 févr. 2000||Visto Corporation||System and method for using a global translator to synchronize workspace elements across a network|
|US6084968||29 oct. 1997||4 juil. 2000||Motorola, Inc.||Security token and method for wireless applications|
|US6085192||11 avr. 1997||4 juil. 2000||Roampage, Inc.||System and method for securely synchronizing multiple copies of a workspace element in a network|
|US6130947||31 déc. 1997||10 oct. 2000||Mizobe; Tatsuji||Method of configuring access and security code|
|US6131096||5 oct. 1998||10 oct. 2000||Visto Corporation||System and method for updating a remote database in a network|
|US6131116||13 déc. 1996||10 oct. 2000||Visto Corporation||System and method for globally accessing computer services|
|US6151606||16 janv. 1998||21 nov. 2000||Visto Corporation||System and method for using a workspace data manager to access, manipulate and synchronize network data|
|US6157630||26 janv. 1998||5 déc. 2000||Motorola, Inc.||Communications system with radio device and server|
|US6202070||31 déc. 1997||13 mars 2001||Compaq Computer Corporation||Computer manufacturing system architecture with enhanced software distribution functions|
|US6208991||26 août 1998||27 mars 2001||International Business Machines Corporation||Dynamic file mapping for network computers|
|US6233341||19 mai 1998||15 mai 2001||Visto Corporation||System and method for installing and using a temporary certificate at a remote site|
|US6246376||28 juin 2000||12 juin 2001||Texas Instruments Incorporated||Wireless location and direction indicator for multiple devices|
|US6269456||11 janv. 2000||31 juil. 2001||Network Associates, Inc.||Method and system for providing automated updating and upgrading of antivirus applications using a computer network|
|US6300863||24 mars 1998||9 oct. 2001||Absolute Software Corporation||Method and apparatus to monitor and locate an electronic device using a secured intelligent agent via a global network|
|US6308273||12 juin 1998||23 oct. 2001||Microsoft Corporation||Method and system of security location discrimination|
|US6327584||30 juil. 1999||4 déc. 2001||Hewlett-Packard Company||Apparatus and method for using version control to dynamically update files while the files are available for access|
|US6333684||31 déc. 1998||25 déc. 2001||Samsung Electronics Co., Ltd.||Security device for portable computer and method thereof|
|US6360252||31 août 2000||19 mars 2002||Fusionone, Inc.||Managing the transfer of e-mail attachments to rendering devices other than an original e-mail recipient|
|US6362736||4 janv. 2000||26 mars 2002||Lucent Technologies Inc.||Method and apparatus for automatic recovery of a stolen object|
|US6366912||6 avr. 1998||2 avr. 2002||Microsoft Corporation||Network security zones|
|US6370629||29 oct. 1998||9 avr. 2002||Datum, Inc.||Controlling access to stored information based on geographical location and date and time|
|US6504480||9 août 2001||7 janv. 2003||Hewlett-Packard Company||Electronic device security|
|US6542729||27 avr. 1999||1 avr. 2003||Qualcomm Inc.||System and method for minimizing fraudulent usage of a mobile telephone|
|US6587684||28 juil. 1998||1 juil. 2003||Bell Atlantic Nynex Mobile||Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol|
|US6636175||14 sept. 2001||21 oct. 2003||Paul Grady Russell||Method and apparatus for acquiring a remote position|
|US6662023 *||6 juil. 2000||9 déc. 2003||Nokia Mobile Phones Ltd.||Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused|
|US6671757||26 janv. 2000||30 déc. 2003||Fusionone, Inc.||Data transfer and synchronization system|
|US6677858 *||30 mai 2000||13 janv. 2004||Reveo, Inc.||Internet-based method of and system for monitoring space-time coordinate information and biophysiological state information collected from an animate object along a course through the space-time continuum|
|US6694336||25 janv. 2000||17 févr. 2004||Fusionone, Inc.||Data transfer and synchronization system|
|US6708221||20 sept. 2000||16 mars 2004||Visto Corporation||System and method for globally and securely accessing unified information in a computer network|
|US6732176||18 avr. 2000||4 mai 2004||Wayport, Inc.||Distributed network communication system which enables multiple network providers to use a common distributed network infrastructure|
|US6738789||2 janv. 2001||18 mai 2004||Fusionone, Inc.||Data package including synchronization data|
|US6757696||2 janv. 2001||29 juin 2004||Fusionone, Inc.||Management server for synchronization system|
|US6766454||23 juil. 1997||20 juil. 2004||Visto Corporation||System and method for using an authentication applet to identify and authenticate a user in a computer network|
|US6778837||22 mars 2001||17 août 2004||International Business Machines Corporation||System and method for providing access to mobile devices based on positional data|
|US6801777||27 nov. 2001||5 oct. 2004||Intel Corporation||Device and method for intelligent wireless communication selection|
|US6804699||18 juil. 2000||12 oct. 2004||Palmone, Inc.||Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server|
|US6813503||31 août 2000||2 nov. 2004||Nokia Corporation||Wireless communication terminal for accessing location information from a server|
|US6842695||17 avr. 2001||11 janv. 2005||Fusionone, Inc.||Mapping and addressing system for a secure remote access system|
|US6892225||19 juil. 2000||10 mai 2005||Fusionone, Inc.||Agent system for a secure remote access system|
|US6898628||22 mars 2001||24 mai 2005||International Business Machines Corporation||System and method for providing positional authentication for client-server systems|
|US6925476||17 août 2000||2 août 2005||Fusionone, Inc.||Updating application data including adding first change log to aggreagate change log comprising summary of changes|
|US6931130||7 oct. 1999||16 août 2005||International Business Machines Corporation||Dynamically adjustable software encryption|
|US6934767||19 sept. 2000||23 août 2005||Fusionone, Inc.||Automatically expanding abbreviated character substrings|
|US6944651||17 mai 2001||13 sept. 2005||Fusionone, Inc.||Single click synchronization of data from a public information store to a private information store|
|US6961567||7 déc. 2000||1 nov. 2005||Palm, Inc.||Generic activation and registration framework for wireless devices|
|US6970418||9 mars 2004||29 nov. 2005||Palm, Inc.||Swapping a nonoperational networked electronic system for an operational networked electronic system|
|US6970927||6 nov. 2000||29 nov. 2005||Wayport, Inc.||Distributed network communication system which provides different network access features|
|US7003668||2 nov. 2001||21 févr. 2006||Fusionone, Inc.||Secure authentication of users via intermediate parties|
|US7007041||2 janv. 2001||28 févr. 2006||Fusionone, Inc.||Synchronization system application object interface|
|US7035878||17 août 2000||25 avr. 2006||Fusionone, Inc.||Base rolling engine for data transfer and synchronization system|
|US7039679||19 déc. 2003||2 mai 2006||Visto Corporation||System and method for globally and securely accessing unified information in a computer network|
|US7051196||5 déc. 2001||23 mai 2006||Hewlett-Packard Development Company, L.P.||Location-based security for a portable computer|
|US7080402||12 mars 2001||18 juil. 2006||International Business Machines Corporation||Access to applications of an electronic processing device solely based on geographic location|
|US7116977||19 déc. 2000||3 oct. 2006||Bellsouth Intellectual Property Corporation||System and method for using location information to execute an action|
|US7239346 *||18 oct. 1999||3 juil. 2007||Priddy Dennis G||System and architecture that supports a multi-function semiconductor device between networks and portable wireless communications products|
|US7343165||11 avr. 2001||11 mars 2008||American Calcar Inc.||GPS publication application server|
|US7591020||18 janv. 2002||15 sept. 2009||Palm, Inc.||Location based security modification system and method|
|US7603435||15 nov. 2006||13 oct. 2009||Palm, Inc.||Over-the-air device kill pill and lock|
|US20010013098 *||29 août 1997||9 août 2001||Michael F. Angelo||Remote security technology|
|US20010047272||28 févr. 2001||29 nov. 2001||Frietas Nathanial X.||Flexible wireless advertisement integration in wireless software applications|
|US20020065074||23 oct. 2001||30 mai 2002||Sorin Cohn||Methods, systems, and devices for wireless delivery, storage, and playback of multimedia content on mobile devices|
|US20020138632||22 mars 2001||26 sept. 2002||International Business Machines Corporation||System and method for providing positional authentication for client-server systems|
|US20020141095||8 févr. 2002||3 oct. 2002||Kabushiki Kaisha Toshiba||Wireless communication device|
|US20020176579||24 mai 2001||28 nov. 2002||Deshpande Nikhil M.||Location-based services using wireless hotspot technology|
|US20020183038||31 mai 2001||5 déc. 2002||Palm, Inc.||System and method for crediting an account associated with a network access node|
|US20030061166||29 janv. 2002||27 mars 2003||Masahiro Saito||Security management apparatus, security management method, and security management program|
|US20030084005||1 nov. 2001||1 mai 2003||Palm, Inc.||Product selling and pricing system and method|
|US20030097586||19 nov. 2001||22 mai 2003||Mok Steven Siong Cheak||Security system|
|US20030103464||30 nov. 2001||5 juin 2003||Palm Inc.||Network connectivity system and method|
|US20030139175||20 sept. 2002||24 juil. 2003||Samsung Electronics Co., Ltd.||System and method for remotely controlling a mobile terminal|
|US20030157947||8 janv. 2003||21 août 2003||Fiatal Trevor A.||Connection architecture for a mobile network|
|US20040003266||20 mars 2003||1 janv. 2004||Patchlink Corporation||Non-invasive automatic offsite patch fingerprinting and updating system and method|
|US20040044791||22 mai 2001||4 mars 2004||Pouzzner Daniel G.||Internationalized domain name system with iterative conversion|
|US20040250069||25 sept. 2001||9 déc. 2004||Rauno Kosamo||Adapting securityparameters of services provided for a user terminal in a communication network and correspondingly secured data communication|
|US20050005131||17 juin 2004||6 janv. 2005||Renesas Technology Corp.||Memory card|
|US20050073389||1 oct. 2003||7 avr. 2005||Chandley Adrian Mark||Systems and methods for deterring theft of electronic devices|
|US20050102257||7 nov. 2003||12 mai 2005||Onyon Richard M.||Personal information space management system and method|
|US20050191998||27 févr. 2004||1 sept. 2005||Onyon Richard M.||Wireless telephone data backup system|
|US20060025071||6 nov. 2003||2 févr. 2006||Cannon Kabushiki Kaisha||Communication device, image storage device, image pickup device, and control method thereof|
|US20060031541||30 juin 2004||9 févr. 2006||Bellsouth Intellectual Property Corporation||System and methods for remotely recovering and purging data from a wireless device in a communications network|
|US20060059253||29 sept. 2005||16 mars 2006||Accenture Llp.||Architectures for netcentric computing systems|
|US20060084410||19 oct. 2005||20 avr. 2006||Jay Sutaria||Flexible billing architecture|
|US20060149794||8 déc. 2005||6 juil. 2006||Seven Networks International Oy||Database synchronization|
|US20060173954||6 janv. 2006||3 août 2006||Ntt Docomo, Inc.||Mobile device and content transmission method|
|US20060184591||28 déc. 2005||17 août 2006||Seven Networks International Oy||Database synchronization via a mobile network|
|US20060234679||18 avr. 2006||19 oct. 2006||Sharp Kabushiki Kaisha||Information protection system for mobile terminal device, information protection method for mobile terminal device, control program, computer-readable medium and electronic information device|
|US20070129058||1 déc. 2005||7 juin 2007||Agere Systems Incorporated||Memory management system and method for camera-equipped mobile communication devices|
|US20070157319||5 déc. 2006||5 juil. 2007||Palm, Inc.||Location based security modification system and method|
|US20070238443||7 avr. 2006||11 oct. 2007||Richardson Roger D||Method and device for restricted access contact information datum|
|US20080114855||15 nov. 2006||15 mai 2008||Bharat Welingkar||Over-the-air device services and management|
|US20080115152||15 nov. 2006||15 mai 2008||Bharat Welingkar||Server-controlled heartbeats|
|US20080115226||15 nov. 2006||15 mai 2008||Bharat Welingkar||Over-the-air device kill pill and lock|
|US20080125102||19 sept. 2006||29 mai 2008||Microsoft Corporation||Mobile device manners propagation and compliance|
|EP0996905B1||21 juil. 1998||24 mai 2006||Visto Corporation||System and method for synchronizing electronic mail across a network|
|EP1130511A2||25 janv. 2001||5 sept. 2001||FusionOne, Inc.||Data transfer and synchronization system|
|EP1130512A2||25 janv. 2001||5 sept. 2001||FusionOne, Inc.||Data transfer and synchronization system|
|EP1130513A2||25 janv. 2001||5 sept. 2001||FusionOne, Inc.||Data transfer and synchronization system|
|EP1158438A2||18 mai 2001||28 nov. 2001||FusionOne, Inc.||Single click data synchronization of public and private data|
|EP1180890A2||17 août 2001||20 févr. 2002||FusionOne, Inc.||Change log aggregation and optimization|
|EP1187421A2||17 août 2001||13 mars 2002||FusionOne, Inc.||Base rolling engine for data transfer and synchronization system|
|EP1215597A2||14 déc. 2001||19 juin 2002||FusionOne, Inc.||Reverse proxy mechanism|
|EP1667042A2||21 juil. 1998||7 juin 2006||Visto Corporation||System and method for synchronizing electronic mail across a network|
|1||Advisory Action for U.S. Appl. No. 11/634,371, mail date Jun. 18, 2010, 4 pages.|
|2||International Search Report and Written Opinion for International Application No. PCT/US2007/083943, mail date Aug. 19, 2008, 7 pages.|
|3||Office Action for U.S. Appl. No. 11/560,040, mail date May 24, 2010, 24 pages.|
|4||Office Action for U.S. Appl. No. 11/560,048, date mailed Mar. 6, 2009, 9 pages.|
|5||Office Action for U.S. Appl. No. 11/634,371, mail date Mar. 25, 2010, 16 pages.|
|6||Office Action for U.S. Appl. No. 11/634,371, mail date Sep. 16, 2009, 17 pages.|
|7||Office Action for U.S. Appl. No. 11/635,062, mail date Apr. 22, 2010, 6 pages.|
|8||Response to Office Action for U.S. Appl. No. 11/560,048, date mailed Jun. 8, 2009, 11 pages.|
|9||Response to Office Action for U.S. Appl. No. 11/635,062, date mailed Dec. 5, 2006, 7 pages.|
|10||U.S. Appl. No. 11/635,062, filed Dec. 5, 2006, Henrie.|
|11||US Notice of Allowance for U.S. Appl. No. 11/560,048, mail date Jul. 28, 2009, 4 pages.|
|12||US Office Action for U.S. Appl. No. 11/560,040, mail date Jan. 8, 2010, 20 pages.|
|13||US Office Action for U.S. Appl. No. 11/560,040, mail date May 8, 2009, 24 pages.|
|Brevet citant||Date de dépôt||Date de publication||Déposant||Titre|
|US8911507 *||22 nov. 2011||16 déc. 2014||Symantec Corporation||Systems and methods for mitigating mobile device loss|
|US8961619 *||6 janv. 2009||24 févr. 2015||Qualcomm Incorporated||Location-based system permissions and adjustments at an electronic device|
|US20100175116 *||8 juil. 2010||Qualcomm Incorporated||Location-based system permissions and adjustments at an electronic device|
|US20140364099 *||6 juin 2013||11 déc. 2014||Apple Inc.||Device locator disable authentication|
|Classification aux États-Unis||709/224, 726/2, 455/410, 709/203|
|Classification internationale||G06F21/00, G06F15/16, H04L29/06|
|Classification coopérative||G06F21/88, H04L63/10, H04L63/0876, G06F21/31|
|Classification européenne||H04L63/08H, G06F21/31, G06F21/88, H04L63/10|
|5 déc. 2006||AS||Assignment|
Owner name: PALM, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HENRIE, JAMES B.;REEL/FRAME:018649/0493
Effective date: 20000713
|3 janv. 2007||AS||Assignment|
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HENRIE, JAMES B.;REEL/FRAME:018703/0197
Effective date: 20000713
Owner name: PALM, INC., CALIFORNIA
|9 janv. 2008||AS||Assignment|
Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK
Effective date: 20071219
Free format text: SECURITY AGREEMENT;ASSIGNOR:PALM, INC.;REEL/FRAME:020341/0285
|8 sept. 2009||CC||Certificate of correction|
|6 juil. 2010||AS||Assignment|
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:024630/0474
Owner name: PALM, INC., CALIFORNIA
Effective date: 20100701
|28 oct. 2010||AS||Assignment|
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALM, INC.;REEL/FRAME:025204/0809
Effective date: 20101027
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS
|12 avr. 2012||FPAY||Fee payment|
Year of fee payment: 8
|3 mai 2013||AS||Assignment|
Owner name: PALM, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:030341/0459
Effective date: 20130430
|18 déc. 2013||AS||Assignment|
Effective date: 20131218
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALM, INC.;REEL/FRAME:031837/0239
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:031837/0544
Owner name: PALM, INC., CALIFORNIA
Effective date: 20131218
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS
Effective date: 20131218
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PALM, INC.;REEL/FRAME:031837/0659
|28 janv. 2014||AS||Assignment|
Effective date: 20140123
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HEWLETT-PACKARD COMPANY;HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;PALM, INC.;REEL/FRAME:032177/0210
Owner name: QUALCOMM INCORPORATED, CALIFORNIA