Computer recovery or return

ABSTRACT

A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus includes a return screen that the processor automatically causes to appear during or after boot-up of the processor on the display, that displays information concerning an owner who owns the computer, concerning user information about who the user is who the computer is assigned to for use, and return information for returning the computer to the owner from data stored in the memory. A method for displaying information to assist with returning a computer to its owner.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation of U.S. patent application Ser. No. 10/945,332filed Sep. 20, 2004, now U.S. Pat. No. 8,601,606, which is acontinuation-in-part of U.S. patent application Ser. No. 10/304,827filed Nov. 25, 2002, which is now abandoned, all of which areincorporated by reference herein.

FIELD OF THE INVENTION

The present invention is related to the return of lost or stolencomputers. More specifically, the present invention is related to thereturn of lost or stolen computers using a recovery screen that appearsduring or after boot-up of the computer.

BACKGROUND OF THE INVENTION

Current methods of computer return or recovery products include:

-   -   (1) Physical labels that attach to the outside hardware of the        computer equipment.        -   These hardware labels can contain custom recovery            information, but because they are hardware based, they can            not be interactively changed by the owner. Also, since they            do not have any ability to affect the computer boot-up            process, they can do nothing to help protect the            confidential owner information on the hard drive. An example            of a well known physical hardware/recovery label is the STOP            Tag by Security Tracking of Office Property in Connecticut.            This labeling system has been patented in France, the US,            and other countries. The product can be easily defeated by            removing the physical label. In the case of STOP Tag which            includes a ‘recovery mark’ which states “STOLEN PROPERTY”            underneath the label, a new label can be simply added over            the ‘recovery mark’ to hide the STOLEN PROPERTY sign. (The            Security Tracking of Office Property equipment recovery            patent is U.S. Pat. No. 5,163,711 This patent actually            refers to how the labels adhere to the equipment—but this is            their patent).        -   The computer security recovery/return program of the present            invention utilizes this type of hardware recovery approach            to a small degree, but is greatly different from this            system, because this is a software program rather than a            hardware solution. Additionally, the present invention is            greatly superior, since the owner can interactively            customize the return/recovery information displayed at any            time, and the present invention also helps protect the            important, confidential owner information on the hard drive,            by the positioning of the program layer in the equipment            boot-up process.    -   (2) Computer Software Programs that attempt recovery through the        use of the modem.        -   There are several patented computer security software            products on the market today that are designed for the            purpose of recovering lost or stolen equipment. These            programs use the computer's modem to regularly call a            recovery center. Then once a computer is stolen, the            recovery center waits for the stolen computer to call in.            When the computer modem calls in, the recovery centers use            something similar to the reverse 911 system to get the phone            number that the stolen equipment is accessing. Using the            phone number, the recovery system then can try to get a map            of where the computer is. Some of these computer security            recovery programs can also attempt to locate stolen            computers through an IP address. Some of these computer            security recovery software programs, can actually attempt to            seize the communication between the stolen computer and the            recovery center and delete selected files to help protect            the owner's confidential information. Products like these            include CompuTrace, PC Phone Home, CyberAngel, LapTrak and            Luceria.        -   The present invention is also designed for the purpose of            recovering lost or stolen equipment, but the method is            distinctively different and unique from the current methods.            The present invention does not rely on the use of the            computer modem. The present invention uses a layered program            in the boot-up process to provide a display of the proper            owner recovery and return information using the computer's            own monitor or screen. The present invention is also            different and superior to the above software tracking            products, in helping to accomplish international recovery.            None of the above products to date have been able to use the            modem phone or IP system to track stolen equipment            internationally. The present invention provides            international recovery by displaying owner email information            as well as providing recovery help through an international            recovery internet web site.        -   There are other differences as well in how these programs            try to also protect the information on the hard drive. The            present invention automatically initiates during the boot-up            process of the equipment, in order to display the            recovery/return information before a security prompt screen            to always help protect the owner's confidential information            on the hard drive. Some of the programs above do nothing to            protect the user information. Others like LapTrak include a            Hide-A-File feature that an owner can access after the user            enters the operating system. CyberAngel includes an            encryption feature. Luceria includes the ability to delete            pre-selected files from the recovery center. By layering            this computer security application strategically before or            during a security prompt in the boot-up process, this            application provides a unique and different method to help            protect owner information.        -   (An example of patents for these types of products would be            the CompuTrace U.S. Pat. Nos. 5,715,174, 5,764,892, and            5,802,280).    -   (3) Bios Based Password Identification systems.        -   There are some computers that are sold with Bios based            identification systems included. These products activate            immediately when a computer is turned on, and prompt the            user for a password before accessing the data on the            computer.        -   The present invention is very different and unique from the            Bios based program, for many reasons. Most importantly the            bios based password identification products are built into            the hardware of the computer equipment—not the hard drive.            In other words, if you removed the hard drive from a stolen            or lost laptop, and inserted the stolen hard drive into a            different laptop, you would bypass the bios based password            identification system, and the bios based password            identification system would remain with the original            equipment. Thus, the Bios Based Password Identification            system can identify the computer hardware, but not the hard            drive (the most important part of the computer equipment).        -   In addition, the Bios Based Password Identification systems            are designed as a unique method for providing an additional            layer of password protection to the equipment hardware, but            are not designed for recovery or return. There is no design            for including complete owner information, no recovery            information displayed, no effective protection of the            information on the hard drive, no effective method for the            recovery or return of the hard drive—the most important item            that a consumer would want back. In fact the Bios Password            Identification product occurs before allowing the hard drive            to boot up. The present invention is unique because it is an            application software program that provides its layer of            protection during the boot-up process (not before), and thus            allows the security product to move with the hard drive, the            most critical part of the computer.

SUMMARY OF THE INVENTION

The present invention pertains to a computer return apparatus. Theapparatus comprises a processor. The apparatus comprises a memoryconnected to the processor. The apparatus comprises a display. Theapparatus comprises a return screen that the processor automaticallycauses to appear during or after boot-up of the processor on thedisplay, that displays ownership information concerning who owns thecomputer and return information for returning the computer to the ownerfrom data stored in the memory.

The present invention pertains to a method for returning a computer toits owner. The method comprises the steps of activating a computer. Thenthere is the step of displaying automatically a return screen on adisplay of the computer during or after boot-up of the computer, whichdisplays information concerning owner information about who owns thecomputer and return information for returning the computer to the ownerfrom data stored in the memory of the computer.

The present invention pertains to a computer readable medium whosecontents cause a computer to show who is its owner by performing thesteps of activating a computer. Then there is the step of displayingautomatically a return screen on a display of the computer during orafter boot-up of the computer, which displays information concerningowner information about who owns the computer and return information forreturning the computer to the owner from data stored in the memory ofthe computer.

The present invention pertains to a computer return apparatus. Theapparatus comprises a processor. The apparatus comprises a memoryconnected to the processor. The apparatus comprises a display. Theapparatus comprises a return screen that the processor automaticallycauses to appear during or after boot-up of the processor on thedisplay, that displays information concerning an owner who owns thecomputer, concerning user information about who the user is who thecomputer is assigned to for use, and return information for returningthe computer to the owner from data stored in the memory.

The present invention pertains to a method for displaying information toassist with returning a computer to its owner. The method comprises thesteps of activating a computer. There is the step of displayingautomatically a return screen on a display of the computer during orafter boot-up which displays information concerning owner informationabout who owns the computer, concerning user information about who theuser is who the computer is assigned to for use, and return informationfor returning the computer to the owner from data stored in a memory ofthe computer.

BRIEF DESCRIPTION OF THE DRAWINGS

In the accompanying drawings, the preferred embodiment of the inventionand preferred methods of practicing the invention are illustrated inwhich:

FIG. 1 is a schematic representation of the apparatus of the presentinvention.

FIG. 2 is a representation of a return/recovery dialog box of anembodiment of the present invention.

FIG. 3 is a flow chart regarding an embodiment of the present invention.

FIG. 4 is a flow chart regarding a second embodiment of the presentinvention.

FIG. 5 is a representation of an administration program section of thepresent invention.

FIG. 6 is a representation of a return screen of the present invention.

FIG. 7 is an example of a password screen utilized by the presentinvention.

FIG. 8 is a return administration screen of the present invention.

FIG. 9 is a second return administration screen of the presentinvention.

FIG. 10 is a third return administration screen of the presentinvention.

FIG. 11 is a fourth return administration screen of the presentinvention.

DETAILED DESCRIPTION

Referring now to the drawings wherein like reference numerals refer tosimilar or identical parts throughout the several views, and morespecifically to FIG. 1 thereof, there is shown a computer 12 returnapparatus 10. The apparatus 10 comprises a processor 14. The apparatus10 comprises a memory 16 connected to the processor 14. The apparatus 10comprises a display 18. The apparatus 10 comprises a return screen 20that the processor 14 automatically causes to appear during or afterboot-up of the processor 14 on the display 18, that displays ownershipinformation concerning who owns the computer 12 and return informationfor returning the computer 12 to the owner from data stored in thememory 16. The Owner is defined as the person or entity that owns,rents, or licenses the Retriever, and/or the person or entity whocontrols the recovery service. The Owner has greater control over thecomputer 12 than the user. This could include, but not be limited to, anemployee of a company that owns the computer 12, or an agent of theowner or a friend that has the permission of the owner to use or have orrecover the computer 12.

Preferably, the apparatus 10 includes means for causing the screen toappear on the display 18 with the owner and return information. Thecausing means 22 is stored in the memory 16. The causing means 22preferably is a software program 24. Preferably, the memory 16 includesa primary operating system having an operating screen 26 for thecomputer 12, and the return screen 20 appears on the display 18 beforethe operating screen 26 of the operating system appears on the display18.

The software program 24 preferably appears before a security prompt suchas a password to be entered to obtain access to the primary operatingsystem of the computer 12. Preferably, the software program 24 allowsthe owner to change the return information and the owner information,after the password or security prompt is satisfied for the computer 12.The software program 24 is preferably able to communicate through amodem (or wireless) to a predetermined location to transfer the returninformation to the location to facilitate return of the computer 12 ifit becomes lost by the owner.

The present invention pertains to a method for returning a computer 12to its owner. The method comprises the steps of activating a computer12. Then there is the step of displaying automatically a return screen20 on a display 18 of the computer 12 during or after boot-up of thecomputer 12, which displays information concerning owner informationabout who owns the computer 12 and return information for returning thecomputer 12 to the owner from data stored in the memory 16 of thecomputer 12.

Preferably, the displaying step includes the step of displayingautomatically the return screen 20 before an operating screen 26 of theprimary operating system of the computer 12. There is preferably thestep of displaying the return screen 20 before satisfying a securityprompt such as entering a password into the computer 12 to access theprimary operating system. Preferably, there is the step of changing thereturn information, and the owner information after the step ofsatisfying a security prompt such as entering the password into thecomputer 12.

The present invention pertains to a computer 12 readable medium whosecontents cause a computer 12 to show who is its owner by performing thesteps of activating a computer 12. Then there is the step of displayingautomatically a return screen 20 on a display 18 of the computer 12during or after boot-up of the computer 12, which displays informationconcerning owner information about who owns the computer 12 and returninformation for returning the computer 12 to the owner from data storedin the memory 16 of the computer 12.

Preferably, the displaying step includes the step of displayingautomatically the return screen 20 before an operating screen 26 of theprimary operating system of the computer 12. There is preferably thestep of displaying the return screen 20 before satisfying a securityprompt such as entering a password into the computer 12 to access theprimary operating system. Preferably, there is the step of changing thereturn information and the owner information after the step ofsatisfying a security prompt such as entering a password into thecomputer 12.

In the operation of the invention, first, the owner of the computer 12would install the computer 12 security recovery/return software program24 application. The program could be installed to work on any type ofcomputer 12 screen including but not limited to, PC's, laptops, handheldcomputers (such as blackberries, palm pilots), UPS computerized handheldtracking display units, and even cell phone displays. The uniquerecovery/return computer 12 security program could in fact, be installedand used by any type of computer 12 that utilized a monitor displayscreen. The software application program provides an additional layer tothe existing operating system of each computer 12. The coding languageused for the software program 24 could and would vary depending upon thecomputer 12 equipment, but the core structure of how the programoperates would be similar in all items.

Once the computer 12 security software program 24 is installed, themonitor of the computer 12 will display the complete and currentrecovery/return information that the program has allowed the owner ofthe equipment to interactively enter, change and update at anytime.

This “on the fly” ability to change owner recovery information to aidreturn of equipment is an important feature for anyone, includingcollege students who travel from home to college during different partsof the year, people who move, and particularly business people whotravel throughout the world. The recovery/return information would notonly allow the display 18 of physical address return information, andowner contact telephone information, but would also provide forinternational internet based recovery through the added display 18 ofowner email information, as well as the ability to display aninternational recovery center web site.

In addition to increasing chances of return and recovery of the stolenor lost equipment by using the computer's 12 display 18 monitor, theprogram is an additional programming layer added into the initial startup program of the computer 12, so that the recovery/return display 18information occurs during or before a password or security promptscreen. This is an important feature that helps create an environmentwhereby the individual that happens upon a stolen or lost piece ofequipment will see the owner recovery/return information displayedbefore a password or security prompt screen. By automatically initiatingthis program during or before a user's security prompt, such as apassword screen program, the recovery/return program will not onlyincrease chances of recovery, but will also increase chances that thecomputer 12 information on the hard drive is protected while thecomputer 12 is not in the owner's possession.

For example, the actual step by step operation of the program is asfollows:

-   -   (1) Someone finds a lost or stolen computer 12. The person who        finds the computer 12, turns the computer 12 on.        -   (The software program 24 could be provided with a warning            sticker that will be placed on the outside of the equipment            telling anyone finding the equipment, about the program and            the display recovery screen.)    -   (2) The computer 12 display 18 screen turns on. The computer 12        security software return/recovery program automatically        initiates during the computer's 12 boot-up process.    -   (3) As the computer 12 booting up process moves the user to a        password or security prompt screen, the computer 12 security        software program 24 displays a dialog box which includes owner        recovery and return information, so that the person finding the        equipment can return the equipment either directly or through        the international web site recovery center. The information        screen can include any of the following items of information        that the owner would like displayed including but not limited        to: contact name, organization name, owner address, owner        telephone number, owner email, international web site recovery        site, international recovery email information, unique program        serial/registration number. (See FIG. 2).        -   Virtually all of this information would have been            interactively inputted by the owner, and the owner would            have control over how much recovery information is            displayed. (This is important, because some owners would            like all the available information displayed, and others            would not. For example, a U.S. secret service agent,            accountant, or military personnel, might only want his name            and phone number displayed, and would not like the            organization name displayed for fear that would encourage a            thief to try harder to break into the system rather than            return the equipment.)    -   (4) The individual who has found the lost or stolen computer 12,        is now able to easily return the equipment to the rightful        owner. Because the display 18 screen showing the owner        information is before, or during a password or security prompt        screen that occurs before allowing the user to access the full        operating system, the person recovering the equipment is blocked        by the password or security prompt screen from accessing the        data, and is unable to avoid seeing the recovery information        screen.

It is important to note only that the computer 12 security softwarerecovery/return program be displayed on the computer 12 screen monitorbefore, or during a password or security prompt display screen, becausethe operating system password screen creates a ‘wall’ before taking thecomputer 12 user to the computer 12 operating system. (See FIG. 3). Thishelps not only protect the owner's information on the hard drive, butalso ensures that the person finding the equipment will see the ownerrecovery/return information. If the program initiated after the passwordor security prompt screen, the person finding the lost or stolenequipment would have difficulty ever seeing the recovery/return display20.

It is also important to note that even through the recovery screendialog box would ideally be the first screen, this may not be possibledue to the wide variety of software operating systems used by computer12 systems. Each computer 12 security program will attempt to displaythe recovery information on the initial screen when possible. However,for one of the Window operating systems for example, the first boot-updefault screen is a CTR+ALT+DEL screen, and then the program can move toa password screen. In this case, the recovery/return program couldprovide a display 18 dialog screen that would be an additional layerbetween the CTR+ALT+DEL dialog box and the password dialog box. (SeeFIG. 4). Other operating systems could allow the program to display therecovery dialog box, with the password or security prompt at the bottomof the dialog box (so that even though the recovery dialog applicationis an additional layer during the boot-up, it would appear that thepassword or security prompt is included within the same dialog box).(See FIGS. 2 and 3). The recovery dialog box would occur before orduring the password or security dialog box that ‘blocks’ the user fromaccessing the operating system.

Operation Administration Feature:

The computer 12 security software recovery/return program would alsoinclude an administration section to the program through hard drive orremote. The operation of the administration section features could worklike this:

-   -   (1) The owner of the computer 12 would turn their machine on.    -   (2) As the boot-up begins, the owner sees the recovery/return        display 18 dialog box appear.    -   (3) The owner then may see a password or security prompt to        allow the owner into the operating system.    -   (4) In the event that there is a security prompt, the owner        types in the correct password or satisfies the security prompt        to access the hard drive's operating system and programs.    -   (5) Once the owner gains access to the primary operating system,        the owner will have the ability to select an administration        section for the computer 12 security software recovery/return        program through the Start Up button or a shortcut icon on the        display 18 screen. (See FIG. 5). The administration dialog box        will allow the owner to interactively change the recovery/return        display 18 information that appears in the recovery/return        dialog box displayed during the boot-up process.    -   (6) There are additional features to the administration dialog        box that may be added. Some of the features include:        -   a) added password or security protection prompt to allow the            owner to access the administrative part of the program in            order to change the recovery/return dialog display            information,        -   b) interactive email based registration capability that            would export owner information to an international recovery            center using the interne,        -   c) a ‘where to order more licenses’ information screen (that            could be tailored to allow dealer/distributor contact            information),        -   d) screen saver lock feature, and        -   e) possible audit log to track user activity.

There are at least 3 important features that are critical and unique tothe program, and make this program vastly different from other equipmentsecurity recovery products:

-   -   (1) The ability to display recovery/return information on the        computer's 12 monitor screen.    -   (2) The ability to make sure that the display 18 occurs before        or during a password or security prompt stopping the user from        accessing the full operating system and hard drive information.    -   (3) The ability using an administrative program feature to allow        the owner to interactively change the recovery/return        information at any time.

Installation of the program is simple. The owner would load aninstallation CD into the computer 12 equipment or download the programfrom the interne. During the installation process, the owner will beprompted to provide some recovery/return information that the ownerwould like displayed; for example, contact name, phone and emailinformation. The installation process will create the recovery/returndisplay 18 screen, input the owner information, and create anadministration section that can be accessed by the owner to be able tochange recovery information at any time. After installation is complete,the computer 12 will be rebooted, and the program installation will becomplete.

The program is essentially a recovery/return information screen that isdisplayed, and does not attempt to duplicate or replace moresophisticated access security programs already on the system. In theevent that there is a security access program on the system using apassword, security card, or biometric recognition device, therecovery/return screen 20 is ideally layered before the security screen(otherwise the recovery/return information would never be displayedexcept to the owner since the person finding the equipment would not beable to enter the correct security information to get to the returnscreen 20). In operation:

-   -   1) The equipment is turned on.    -   2) The equipment processor 14 begins to go through the steps        necessary to open up and allow access to the equipment's        operating system. These steps may involve displaying various        visual screens, depending upon the equipment.        -   a) For example, a typical Gateway computer may have the            following series of displays:

At minimum needs to display before Operating System and Ideal ReturnDialog Display Spots should appear before security prompt. Monitorself-test Gateway & Copyright Promise MS Windows Microsoft PasswordMain/Primary display Gateway logo Technology display 98 Logo displaySecurity Prompt Operating System display where user can begin usingequip. & programs

In this example, the recovery/return program would display before orwith the Microsoft password or security prompt.

-   -   b) Another example is with a Dell computer, which may have the        following series of displays:

At minimum needs to display Ideal Return before Operating System andDialog Display should appear before security Spots prompt. Dell Name MSWindows Copyright MS Ctr + Security Network Main and Logo 98 Logo ESSTech- Alt + Del Program that Prompts if Operating display ology displayPrompt Logon display uses a not connected System Windows where userpassword and can begin a physical using access card equip. & programs

-   -   c) Another example is with an AT&T Cellular phone, which may        have the following series of displays:

Ideal Display Spots for Return At minimum needs to display DisplayProgram using OK prompt before operating system AT&T Name DisplayMain/Primary Operating System & Logo showing where user can begindisplay phone number using equip. & programs

-   -   3) The Return/Recovery owner information display screen is        displayed before the main operating system. The Return/Recovery        owner information screen has been customized by the owner (and        can be interactively changed using an administrative program        that can be accessed when the user gets to the operating        system).    -   4) Once the owner information dialog box is displayed, it        remains displayed until the user satisfies a security prompt        and/or pushes an OK button or says “OK”. The security program        prompt could include a password that might need to be entered, a        card access card that might need to be used, or a biometric        impression that might need to be used, such as fingerprint,        face, eye, or voice recognition system. Once the security        program is satisfied, the computer 12 program continues to the        main operating system.

The definition of the “boot-up” process includes a series of steps thatthe computer 12 is taking (including the series of displays that theprograms are automatically displaying) in order to move the user togaining access to the main operating system. And, as can be seen fromthe 3 examples above, the booting up process entails different steps anddifferent display 18 screens on its way to the operating system.

It is important that

-   -   1) the Recovery/Return screen 20 be displayed before the        operating system, and    -   2) that the display remains displayed until the user does        something (like pushes an OK button on the screen, or says OK        for future voice activation programs, or satisfies a security        prompt).

This software application:

-   -   should be layered before the main operating system,    -   and in the event that a security program exists,    -   should be layered before or during the security program prompt        (otherwise the recovery screen would only be seen by the        authorized owner).

Security programs that currently exist could include:

-   -   a) entering a correct password (in the example of the current        computers that have a Microsoft password system already built in        and available).    -   b) entering another type of security prompt such as future        security applications with a voice activated security prompt, an        access card which needs to be within the vicinity of the        computer 12, or even a fingerprint or eye recognition security        program (which are currently available).

The basic Recovery/Return computer 12 security software program 24 mayor may not include a security prompt feature as an option. The point ofthe program is that the recovery information can be customized,interactively changed, and displayed using the computer's 12 screen, andlayered at the correct point (before the operating system, and before orduring a security program prompt if a security program exists).

The present invention pertains to a computer 12 return apparatus 10, asshown in FIG. 1. The apparatus 10 comprises a processor 14. Theapparatus 10 comprises a memory 16 connected to the processor 14. Theapparatus 10 comprises a display 18. The apparatus 10 comprises a returnscreen 20 that the processor 14 automatically causes to appear during orafter boot-up of the processor 14 on the display 18, that displaysinformation concerning an owner who owns the computer, concerning userinformation about who the user is who the computer 12 is assigned to foruse, and return information for returning the computer 12 to the ownerfrom data stored in the memory 16.

Preferably, the apparatus 10 includes means 22 for causing the screen toappear on the display 18 with the owner, user and return information.The causing means 22 is stored in the memory 16. The apparatus 10preferably includes means for changing the return information by theuser through remote communication with the computer 12. Preferably, thechanging means changes a security prompt by the owner, overriding anysecurity prompt entered into the computer 12 by the user. The apparatus10 preferably includes means for changing recovery information ofadditional computers 12 owned by the owner through remote communicationby the owner with the additional computers 12.

The present invention pertains to a method for displaying information toassist with returning a computer 12 to its owner. The method comprisesthe steps of activating a computer 12. There is the step of displayingautomatically a return screen 20 on a display 18 of the computer 12during or after boot-up which displays information concerning ownerinformation about who owns the computer 12, concerning user informationabout who the user is who the computer 12 is assigned to for use, andreturn information for returning the computer 12 to the owner from datastored in a memory 16 of the computer 12.

Preferably, the displaying step includes the step of changing the returninformation by the user. The changing step preferably includes the stepof changing the return information by the user through remotecommunication with the computer 12. Preferably, there is the step ofchanging a security prompt by the owner, overriding any security promptentered into the computer 12 by the user. There is preferably the stepof the owner changing recovery information of additional computers 12owned by the owner through remote communication by the owner with theadditional computers 12.

The Retriever is preferably a software program 24 that is disposed in amemory 16 of a computer 12 and at a remote station to allow an owner tocommunicate and control the computer 12, as needed.

The Retriever clearly distinguishes between the “Owner” of the equipmentand the person(s) “Assigned To” the equipment. See FIGS. 9 and 10.

The Owner is defined as the person or entity that owns, rents, orlicenses the Retriever, and/or the person or entity who controls therecovery service. The Owner has greater control over the computer 12than the user.

The Retriever allows the ability to distinguish between the ‘owner’ andthe ‘assigned to’ person who may be allowed possession of the equipment.These two entities can be the same, but very often are not. For example,a bank may be the owner of 5,000 laptops, and then issue them out to5,000 different employees. The Bank owns the laptops, and the employeesare the “assigned to” persons. Another example would be a company thatmay provide a recovery security service to equipment owners, and wouldalso be able to control the recovery screen information and displaythrough their recovery service.

The Retriever allows the ‘owner’ of the protected equipment toultimately control the recovery information displayed on the protectedequipment, not the user.

The current PDA recovery programs, for example, are all completelycontrolled by the equipment user. Again the ‘owner’ and ‘assigned to’user of the equipment may or may not be the same people, but theRetriever is unique because it allows the ability to distinguish betweenthe ‘owner’ and the ‘assigned to’ person. The Retriever allows the‘owner’ to have control over both the ‘owner’ recovery informationdisplayed AND the ‘assigned to’ recovery information displayed. The‘assigned to’ person(s) can only change or control the ‘assigned to’recovery information.

The Retriever also allows the owner ultimate control over the securityprompt, not the user.

The current PDA software recovery program gives ultimate control overthe security prompt to the user or ‘assigned to’ individual(s). The‘owner’ would want the ability to reassign the equipment to a newperson. The current PDA recovery program does not satisfy this need. Ifa disgruntled employee quits or gets fired and hands back their PDA witha unique secret password prompt and says they cannot remember thepassword, the current PDA recovery program makes it very difficult forthe owner to be able to regain control over the password prompt andassign the equipment to someone new.

Both the pocket PC, Palm and other handhelds do have the ability tocreate a screen on the monitor in conjunction with a password prompt.However, the design of these current programs are flawed, as evidencedby the fact that the program feature is rarely used, even thoughavailable.

The Retriever satisfies a need that the pocket PC, Palm and other PDArecovery programs do not. It is the ‘owner’ of the equipment that needsto have ultimate control of (1) the program, (2) the recovery screen and(3) the password—not the person who is using the equipment. There aremany reasons why this is important.

Examples. There is a school district in Virginia that issued 25,000laptops to students at the high school and middle school level lastyear. The school district owns the laptops—not the students assigned tothe equipment. The students are unlikely to care as much as the schooldistrict as to the loss of the equipment.

If the current PDA recovery software program 24 was loaded onto theselaptops, the kids could easily (and more than likely would) disable thesecurity prompt since it would be inconvenient to continually have tosatisfy a password prompt every time the computer 12 was turned on ortimed out. In addition, with the current PDA recovery system the ownerof the equipment (the school district) would loose control of not onlythe recovery information displayed on the monitor, but the password thatallows access to the equipment. The Retriever is unique since itdistinguishes between the ‘owner’ and the ‘assigned to’ person, allowsthe owner to have ultimate control over the display 18 screen, allowsthe ‘owner’ to override recovery information displayed by the ‘assignedto’ person if necessary, and allows the ‘owner’ to have ultimate controlof the password to access the equipment.

Individuals who are ‘assigned to’ equipment have inherently lessliability and concern if the equipment is lost or stolen than ‘theowner’. This is true for not only students, but employees at salesfirms, banks, accounting firms, corporations, healthcare facilities,high school students, university personnel, people who rent or leaseequipment, etc.

It is the ‘owner’ who should have ultimate control over securitydecisions regarding the equipment, not necessarily the person whohappens to be in possession of or assigned to the equipment. The currentPDA design causes an ‘inconvenience’ by creating an extra logon screen,and therefore, is not likely to be used by the equipment holder,especially if the equipment holder is not the owner. The owner needs theability to control whether the program is enabled, and thus ensure thatthe ‘assigned to’ person use the program if the owner desires for themto use it.

The current PDA recovery system design is indeed flawed. With thecurrent PDA recovery program, the user or person assigned to theequipment has complete and sole control over recovery information,complete and sole control over the security password, and complete andsole control over whether the security program is even enabled or not.These are some of the reasons that help explain why people that do havea PDA rarely use the recovery security feature available.

As further proof as to the inadequacy of this current program, is thefact that The World Computer Security Company of Colorado has sold“outside” glue on recovery labels to customers to protect hundreds ofPDAs, Palms, etc. that indeed already have the PDA recovery programmentioned by the patent office. In fact, this company recently sold acouple hundred of these glue-on security STOP Tag recovery labels thatwere PDA size this month to Bertek Pharmaceuticals and WashingtonUniversity St. Louis (June 2004). This is further proof that the currentprogram design is flawed and not commercially viable.

Most alarmingly, the current program does not take into account thatmany crime statistics suggest that 90% of all theft is internal(committed by those non-owners allowed access to property)!

Perhaps one of the most important and critical differences between theRetriever and the existing programs is the type of communicationpossible made possible with the Retriever. The Retriever is designed toenable communication of the recovery display information back and forthfrom the recovery administration center to the equipment being protectedto control changes to the recovery display 18 screen, and thiscommunication from the recovery administration center is not limited toonly the hard drive of the equipment being protected or the computer 12that the equipment is synchronized with.

The recovery administration update center for the current PDA recoveryprogram is limited to the user updating the owner information directlyon the PDA, or directly on the computer 12 the PDA is set up tosynchronize with when accessing the PDA program on the main computer 12.This recovery display information can then be synchronized using the PDAsynchronize capability.

The Retriever's recovery administration update center can be anadministration program located on the hard drive of the protectedequipment, an administration program located on a server on a networkand/or an administration program located on a hard drive of a computer12 that is completely remote from the protected equipment, for example,a web based recovery center. This is an very unique and importantfeature.

The program design feature allows the ‘owner’ to access the recoverycenter administration program, initiate a download of changes to theprotected equipment, control the entire recovery screen displayed, andeven override the ‘assigned to’ person's input. This is an importantfeature, in case the ‘assigned to’ person is a disgruntled employee whosimply reports equipment as stolen and is still using the equipment orhas sold it. The Retriever program design allows the owner to makechanges at the recovery center level, have the recovery center attemptto communicate those changes to the ‘stolen equipment’ via phone line(or cable, bluetooth, satellite etc. in the future). This allows theowner to eliminate erroneous or misleading ‘assigned to’ recoveryinformation that might have been created by the rogue “assigned to”individual, replace the display 18 screen with correct owner recoveryinformation and even change or delete the ‘assigned to’ password to stopaccess to the equipment information. By attempting to disable the‘assigned to’ password from remote, the equipment becomes extremelydifficult if not impossible to use, the information on the hard drive isbetter protected, and the chances of a quick recovery of the stolenequipment are dramatically enhanced. This remote communication abilitymakes the Retriever design completely unique and very different from thecurrent PDA recovery software programs.

It is this remote communication ability in the design of the Retrieversoftware recovery program that helps better meet the challenges ofinternal theft (again many statistics suggest that it is internal theftthat comprises 90% of all theft). With the current PDA recovery program,the owner′ is limited to only making changes directly on the ‘assignedto’ person's equipment and/or the ‘assigned to’ person's computer 12 orover a limited network that the assigned to person may never accessagain. With the Retriever's recovery software design, the ‘owner’ canalso attempt to access the ‘assigned to’ person's equipment byadditional ways, such as over the Internet, phone lines, cable, etc.thereby having a more effective ability to try to locate the equipmentand control the recovery information displayed by remote.

The “assigned to” person can only control the “assigned to” recoveryinformation and password. The “owner” can control both the ownerinformation and all the “assigned to” recovery information at therecovery center level, and then attempt to communicate this to theprotected equipment using the Retriever licensed security recoveryprogram.

Using this unique communication power, both ‘owner’ and “assigned to”information can be uploaded to the recovery center and/or downloaded tothe protected equipment in order to synchronize the internationalrecovery center information and the recovery information displayed onthe initial display 18 screen. (This is a combination of the PDA type ofsynchronization between the main computer 12 and the PDA, and the McAfeeanti-virus software interne updating capability where every time you goon-line, your computer 12 automatically checks to make sure that youhave the most current anti-virus software and automatically updates yourcomputer 12 with the latest changes.) Nobody has ever before consideredor designed a product combining this type of communication ability withthis type of recovery security program that seizes control of thedisplay 18 monitor until a security prompt is satisfied. The Retrieverdesign allows an equipment recovery capability that just does not existon today's market, and is completely unique from all current products onthe market.

Current PDA Communication is limited:

User input/update PDA<--->User input/update Host Computer w/PDA program

The Retriever Design Communication is much broader:

The Retriever design has both a stand-alone and a network based program.This allows an owner to handle multiple machines easily fororganizations or entities with more than one equipment.

Each program license has a unique program registration license numberthat is unique. This is extremely important feature that allows manyfeatures that owners would need in handling the protection of multiplemachines. From looking at the current PDA security recovery software,the program appears to be only to have ‘single license’ capability.

The Retriever program design can also allow global changes by the ownerwho might handle multiple computers.

This is a very important feature for organizations who are in charge oflarge numbers of computers. For example, let's say that Sgt. Cody is thecrime prevention officer at Georgetown University and then retires.Let's say that Sgt. Grier is the contact person currently listed on 700university owned computers. Now Sgt. Smith is in charge. The Retrieverprogram design allows Sgt. Smith (assuming she uses the correctpassword), to access the recovery center and globally change all thecomputers that she wants to change and display her phone number and nameto help with recovery. This ability to allow the owner to globally makechanges to certain display information over multiple licensed computersis also extremely useful if a phone number changes, a corporate name orlogo changes, a recovery contact name changes or a phone number areacode changes.

The program also allows owners to easily tag or mark equipment that isready or available to be sold making it easy for new owners tore-register under the initial security software license registrationnumber. Let's say for example that ABC Telecommunications decided tosell 100 laptops that they are replacing with new ones. The owner orauthorized person representing the owner (the IT director for example)can preset the 100 serial license numbers as for sale to allow easiersales to new owners using organizations such as Ebay. New owners caneasily be allowed to re-register under the released registration numberthat is associated with the Retriever recovery license.

The program also allows owners to easily report equipment as stolen overthe internet. Owners can go to the recovery administration center, findthe license number of the equipment they believe might be lost orstolen, update the information for this specific license number andreport the information over the internet for all to see. This is veryhelpful resource for both owners and authorities to facilitate recoveryof lost or stolen items.

The security program can also not only display ‘owner’ and ‘assigned to’information but also display organization logos and/or other pictures ordesigns. This is another extremely important feature. The Retrieverprogram seizes control of the entire display 18 screen.

Many, many customers currently desire to customize their physicalsecurity tags with owner and logo information. This is often difficult,since the security label manufacturer has to get art design approval,fit corporate and logo information on an often limited space, and thenset the tool to run the special labels at the manufacturing plant. Leadtimes can often go over 3 weeks, and once the customer has their specialcustomized tag, they must often order a minimum amount (STOP Tag has aminimum order of 200 tags for customization for example). If the companychanges names, logos or phone numbers the physical security labelsuddenly becomes incorrect. And, when these customized security tagcustomers want to sell their equipment, it becomes difficult, since thesecurity label can permanently read ‘Property of ABC Corp”.

Let's say the company wants to donate 25 laptops to the church. A nun orother church personnel would not really want to be carrying aroundlaptops where the cover of the laptops state “Property of the US Army”,“Property of Waste Management Company”, or “Property of XYZ University”.This becomes awkward for the new owner who actually is the new rightfulowner, and cannot always easily remove the existing security label.

The Retriever provides an interactive method of designing and changingthe entire recovery screen ‘on the fly’ that eliminates all of thesecurrent problems. Organization logos or ads can be easily and quicklydownloaded onto the recovery screens of protected equipment. The currentPDA system does not allow this.

The Retriever creates an audit trail of changes. Time and Date fieldsregistering changes are logged and maintained at the recovery center toprovide the customer with a security audit trail of changes.

The Retriever display not only appears during the initial boot-up, butthe Retriever program security recovery display screen can also bemanually initiated by the computer 12 user. This would be theWorkstation Locked display. (FIG. 10). This allows the computer 12 userto manually lock the computer 12 screen and protect the computer 12 ifthey need to leave their computer 12 for a few minutes. This feature ishandy for all types of situations, like emergency room laptops athospitals, etc.

The Retriever display not only appears during the initial boot-up orwith a manual activation by the computer 12 user; the Retrieverworkstation locked recovery screen can also be initiated automaticallyusing a screen saver timer feature that can be changed by the Owner orthe Assigned To person. For example, let's say the computer 12 screensaver time feature has a 10 minute timer. If there is no activity on thecomputer 12, the Workstation Locked security Recovery screen willdisplay and stay displayed until the password prompt is satisfied.

The owner can browse the entire database of there own licensed Retrieversecurity software licenses. The owner can look at an individual licenserecord, or browse the entire database and use features such as EDIT,SORT, SEARCH/FIND, and EXPORT when working with the licensed records.

The Retriever provides the owner with extra data information fields thatowners can assign their own values to. These data fields are not reallyrelated to recovery information displayed, but this is a handyconvenience for owners who would like to correlate their own inventorynumbers to Retriever license numbers, search by lease dates onequipment, etc.

It should be noted that the communication ability is not limited tointernet communication. Satellite, WI-FI, cable, bluetooth, or any othertype of remote communication can be used.

Although the invention has been described in detail in the foregoingembodiments for the purpose of illustration, it is to be understood thatsuch detail is solely for that purpose and that variations can be madetherein by those skilled in the art without departing from the spiritand scope of the invention except as it may be described by thefollowing claims.

What is claimed is:
 1. A method for displaying information to assistwith returning a computer to its owner comprising the steps of:displaying by a processor automatically an ownership recovery screen ona display of the computer which displays information concerning returninformation for returning the computer to the owner from data stored ina memory of the computer, the ownership recovery screen displayingrecovery information before or with a lock screen, to facilitate returnof the computer and which is maintained on or with the lock screen sothe return information is visible to anyone viewing the ownershiprecovery screen or lock screen until a security prompt is accepted bythe processor, when security information associated with the securityprompt is accepted by the processor allowing the user to access thecomputer, the ownership recovery screen or lock screen showingadditional information which includes advertisements, logos, pictures,or designs; initiating and changing recovery information by the owner ora party authorized by the owner of the computer through remotecommunication by the owner without assistance by the user with thecomputer; and initiating and changing the additional information whichincludes advertisements, logos, pictures, or designs, through remotecommunication without assistance by the user with the computer, whereinthe changing of the recovery information and the additional informationis done through an interactive program stored in the memory of thecomputer and is remotely accessed only by the owner of the computer orthe party authorized by the owner to enable the designing and changingof the ownership recovery screen.
 2. The method as described in claim 1including the step of selecting by the owner or user an Internet link onthe ownership recovery screen, an Internet location associated with theInternet link stored in the memory of the computer until the securityprompt is accepted by the processor, when the security prompt isaccepted by the processor, the owner or user is automatically able toaccess the computer and the Internet location associated with theInternet link.
 3. The method of claim 1 when the security informationassociated with the security prompt is accepted by the processorallowing the user to access the computer, the ownership recovery screenhaving an active link allowing remote communication to a remote serverwhich provides recovery information to facilitate return of thecomputer.
 4. A system for displaying information at a computer owned byan owner which is used by a user, the system comprising: a computercomprising; a processor; a memory connected to the process; a display; alock screen through which the computer can be locked to prevent use ofthe computer; an ownership recovery screen that the processor causes toappear automatically on the display, the ownership recovery screendisplays return information for returning the computer to the owner fromdata stored in the memory of the computer, the ownership recovery screendisplaying return information before or with the lock screen tofacilitate return of the computer and which is maintained on theownership recovery screen or the lock screen so the return informationis visible to anyone viewing the ownership recovery screen or lockscreen until a security prompt is accepted by the processor, whensecurity information associated with the security prompt is accepted bythe processor, allowing the user to access the computer, the ownershiprecovery screen or lock screen showing additional information whichincludes advertisements, logos, pictures, or designs; and a serverremote from the computer for communicating with the computer forallowing the owner of the computer or a party authorized by the owner ofthe computer to control the screen display without assistance by theuser to change the return information and the additional information toassist with returning the computer to the owner, wherein the changing ofthe return information and the additional information is done through aninteractive program stored in the memory of the computer and is remotelyaccessed only by the owner of the computer or a party authorized by theowner to enable the designing and changing of the ownership recoveryscreen.
 5. The system of claim 4 wherein the ownership recovery screenincludes an internet link that can be selected by the owner or user, anInternet location associated with the Internet link stored in the memoryof the computer until the security prompt is accepted by the processor,when the security prompt is accepted by the processor, the owner or useris automatically able to access the computer and the Internet locationassociated with the Internet link.
 6. The system of claim 4 wherein theownership recovery screen having an active link to allow remotecommunication to the remote server which provides recovery informationto facilitate return of the computer.
 7. A computer program stored in anon-transient memory for displaying information to assist with returninga computer to its owner comprising the computer generated steps of:displaying by a processor automatically an ownership recovery screen ona display of the computer which displays information concerning returninformation for returning the computer to the owner from data stored ina memory of the computer, the ownership recovery screen displayingrecovery information before or with a lock screen, to facilitate returnof the computer and which is maintained on or with the lock screen sothe return information is visible to anyone viewing the ownershiprecovery screen or lock screen until a security prompt is accepted bythe processor, when security information associated with the securityprompt is accepted by the processor allowing the user to access thecomputer, the ownership recovery screen or lock screen showingadditional information which includes advertisements, logos, pictures,or designs; initiating and changing recovery information by the owner ora party authorized by the owner of the computer through remotecommunication by the owner without assistance by the user with thecomputer; and initiating and changing the additional information whichincludes advertisements, logos, pictures, or designs, through remotecommunication without assistance by the user with the computer, whereinthe changing of the recovery information and the additional informationis done through an interactive program stored in the memory of thecomputer and is remotely accessed only by the owner of the computer orthe party authorized by the owner to enable the designing and changingof the ownership recovery screen.