Tracking location of portable computing device

ABSTRACT

A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and system for acquiring such devices, protecting data on such devices, and for compensating owners of devices. A GPS mechanism of the invention provides real time tracking of missing devices that may be coordinated with security agencies to intercept and recover missing computing devices. When a stolen device is unrecoverable, the invention may receive a signal to initiate data recovery where a wireless network is available to recover data for the owner. Alternatively, the GPS mechanism instructs the device to encrypt or destroy stored data files to prevent commercial espionage or privacy violations. The invention discloses a software system and method for computing a purchase price of the GPS mechanism, computing compensation for loss of the device and lost data.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. Ser. No. 14/447,585, filed onJul. 30, 2014, which is a continuation of U.S. Ser. No. 13/644,537,filed Oct. 4, 2012 and issued as U.S. Pate No. 8,600,405 on Dec. 3,2013, which is a continuation-in-part of U.S. Ser. No. 12/461,482, filedAug. 12, 2009 and issued as Pat. No. 8,427,305 on Apr. 23, 2013, whichclaims under 35 U.S.C. §119(e) the benefit of U.S. provisional patentapplication No. 61/188,727, filed Aug. 12, 2008, the contents of all ofwhich are hereby incorporated by reference.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.12/461,482, filed Aug. 12, 2009, which claims priority to U.S.Provisional Patent Application No. 61/188,727, filed Aug. 12, 2008.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates to a location-based recovery device and riskmanagement system for portable computing devices and data.

2. Related Art

With the advent of telecommunications, it has become useful anddesirable for enterprises and individuals to employ various forms ofsensors and communications devices to monitor the condition and locationof certain assets such as portable computing devices. Advances indigital, electronic and wireless communication devices have extended therange and convenience of portable asset monitoring. Global PositioningSatellites (GPS) such as Inmarstat, Iridium, Globalstar, or Msat nowincrease the accuracy of portable asset location and movement. Suchtechnologies are significant in improving efficiency and economicmanagement of portable assets. Such devices and business practices arewell known in the prior art.

There are approximately a dozen disclosures describing GPS features thatrelate to portable device theft and recovery that constitutes the knownprior art relating to the present invention. The present inventionprovides novel and useful improvements, methods and processes forreducing economic and property losses related to the theft or loss ofportable computing devices which, without limitation, is distinguishedfrom the prior art in the following discussion.

In U.S. Patent Publication No. 2006/0007039, a method and system aredisclosed for expanding law enforcement recovery efforts for missingvehicles using VHF enabled networks and concealed GPS receivers. Thepresent invention application is distinguished in that its hardwareelements are novel and unique to the small dimensions of a portablecomputing device. A further limitation of the prior art is that itsubstantially provides only passive tracking capabilities. Animprovement of this invention over the prior art is the novel enablementof the tracking device to receive and initiate certain limited anduseful operations of the stolen or missing computing assets to preventunauthorized use of its digital content.

U.S. Patent Publication No. 2004/0198309 discloses a stolen vehicletracking and recovering method that utilizes cellular telecommunicationnetworks for providing location guidance information to improve vehiclerecovery. An improvement of the present invention over the prior art isits use of an implanted GPS device within a portable computing devicethat communicates directly with a global positioning satellite networkand independently of the operating system of the portable computingdevice.

In U.S. Patent Publication No. 2003/0005316, the prior art teaches amobile system that is provided with a theft recovery mechanismcomprising a host chipset and a locator subsystem connected to the hostchipset that is arranged to determine a current location of the mobilesystem; and a main storage connected to the host chipset and arranged tostore an operating system (OS) and contain an OS-Present applicationand/or a Pre-OS application configured to enforce security policiesduring user authentication and determine whether the mobile system mayhave been stolen or used inappropriately to based on the securitypolicies. A novel improvement of the present invention is its use of animplanted autonomous device that coordinates theft and trackingfunctions separate from an existing computing operating system. Thisimprovement provides a measure of security from programming interferenceor compromise by software viruses that can attack and compromise mobiledevice operating systems.

In U.S. Pat. No. 5,793,283, titled “Pager Vehicle Theft Prevention andRecovery System”, the prior art teaches a theft prevention and recoverysystem using pager network for vehicles, which transmits a designatedelectronic alarm signal via free space through an electronic transceiverwhen a remote alarm activation signal is received. The user instructsthe transceiver to transmit a continuous pager signal containinglongitudinal and latitudinal coordinates generated by the GPS. Thelongitudinal and latitudinal coordinates allow the car to be traced andrecovered. The present invention is distinguished from this prior artbecause its mode of operation configures to the unique parameters of apersonal computing system, which contains data files. In the event of aloss or theft of the personal computing system, a novel improvement ofthe present invention is that it can determine and activate procedureson the data files if such data files must be cordoned off, destroyed,encrypted or transmitted to a remote and secure location.

Other prior art is disclosed in U.S. Patent Publication No.2007/0180207, which involves secure radio frequency identification(RFID) backup/restore for computing/pervasive devices. This prior artuses an automated RFID based data backup and recovery system for acomputing device to invoke logic to initiate physical copying andtransmission of digital storage device content to remote storage device.The present invention is distinguished by its separate universal GPSdevice that is installed in a portable computing device. Further thepresent invention requires positive activation by the user and cantrigger disablement of the host computing device to prevent economicloss related to a potential disclosure breach of proprietary, personalor commercial data.

In U.S. Patent Publication No. 2006/0033616, titled “Smart ContainerGateway”, the prior art comprises a smart container gateway thatprovides communication with global and local networks, container andcargo security sensors and cargo identification tags. The smartcontainer gateway communicates with one or more networks by means of anintegrated structural RF antenna, power generator and radio controlsubsystem. The present invention is distinguished in that itsapplication requires insertion of a compact and covert device into theinterior space of the portable computing device and requires externalpower from the host device and external activation prior to performingor activating to perform any function.

In U.S. Patent Publication No. 2005/0017900, titled “Tracking Unit”, theprior art describes a tracking unit for assisting in the recovery ofstolen monies or other property includes a housing containing a GPSreceiver for receiving GPS signals from overhead satellites, a cellularphone transceiver, a microprocessor, and a battery. Following a theft,the microprocessor activates the cellular phone transceiver to dial thetelephone number of a central monitoring station. The present inventionis distinguished in that it is directly installed into the theft risk(i.e. the portable computing device) in which it is installed.

In U.S. Patent Publication No. 2004/0075539, titled “Vehicle MonitoringSystem”, the prior art discloses “remote theft monitoring for vehicle bysensing vehicle displacement, engine operation and key entry.” When apossible theft condition is determined, the service provider server willgenerate a message to alert a security agency. The present inventiondisclosure is distinguished by its use in portable computing devices andits requirement for active external activation by an owner to operateits novel features and benefits.

In U.S. Pat. No. 6,049,269, titled “Wide Area Wireless System for AccessInto Vehicles and Fleets for Control, Security, Messaging, Reporting andTracking”, the prior art invention uses a paging signal initiated byowner if his or her vehicle is stolen, on-board paging receiver,decoder, controller, alarm and ultimate disablement of vehicle. Thepresent invention is an improvement in its use of a novel software basedmethod that employs au insertable GPS device into portable computingdevices. In the present invention, a novel software based methodcomputes a GPS system purchase price related to the savings fromeconomic loss by recovery or by cash compensation in the event of anunrecoverable loss of said portable computing device.

Notwithstanding the prior art discussed herein, the invention is novelbecause none of the prior disclosures either alone or in combination aresufficient to disclose the invention set forth in this application. As aresult, the present invention offers numerous advantages over the priorart, including, without limitation:

a) The claimed invention discloses a novel and useful GPS device andantennae system that may be covertly and efficiently installed into aportable computing device.

b) The invention is a novel means to employ software in the GPS devicethat may instruct the portable computing device to transmit, alter ordestroy data files in the portable computing device to prevent loss ofeconomic value or personal privacy.

c) The invention is a novel software based method and financial systemto acquire and install such a GPS device and software and to provide aninsurance product to compensate for loss by the theft of or accidentalloss of portable computing devices.

From the discussion that follows, it will become apparent that thepresent invention addresses the deficiencies associated with the priorart while providing numerous additional advantages and benefits notcontemplated or possible with prior art constructions.

SUMMARY OF THE INVENTION

A location-based recovery device and risk management system for portablecomputing devices and data is disclosed herein. The location-basedrecovery device and risk management system both protects data stored onportable computing devices and assists in the location and recovery ofportable computing devices that have been stolen or otherwise lost. Thestored data may be overwritten or encrypted for later decryption whenthe portable computing device is recovered. In this manner, such data isprotected even when the portable computing device is lost.

Various embodiments of the location-based recovery device and riskmanagement system are disclosed herein. For instance, in one exemplaryembodiment, the location-based recovery device and risk managementsystem may be a portable computing device comprising a power sourceconfigured to allow operation of the portable computing device withoutbeing connected to an electrical outlet, a data storage assemblyconfigured to store one or more data files on the portable computingdevice, and a wireless communication assembly.

The wireless communication assembly may be configured to receive one ormore wireless signals to determine a geographic location of the portablecomputing device, receive input indicating the theft or loss of theportable computing device, and transmit the geographic location of theportable computing device after receiving the input indicating the theftor loss of the portable computing device.

Upon receiving one or more particular wireless transmissions, the datastorage assembly modifies the data files utilizing a random binary fillor encryption that is capable of decryption if the portable computingdevice is recovered. This protects the data files on the portablecomputing device. It is contemplated that the particular wirelesstransmissions may only be transmitted by an authorized user of theportable computing device.

It is noted that the wireless communication assembly may have variousconfigurations. For example, the wireless communication assembly maycomprise a GPS device, a cellular data transceiver, a Wi-Fi datatransceiver, or various combinations thereof in one or more embodiments.

In another exemplary embodiment, the location-based recovery device andrisk management system may be a data protection and recovery system fora portable computing device (e.g., a laptop, tablet, or smartphone).Such system may comprise one or more communication devices configured tosend one or more transmissions to the portable computing deviceindicating the theft or loss of the portable computing device, whereinthe portable computing device is configured to, upon receipt of one ormore is particular transmissions, modify data stored thereon utilizing arandom binary fill or encryption that is capable of decryption if theportable computing device is recovered. The communication devices willtypically also be configured to receive a response from the portablecomputing device indicating the geographic location of the portablecomputing device.

A user interface of the system may query a user whether to activate datafile management on the portable computing device. Upon receiving userinput activating data file management, the communication devicestransmit the particular transmissions thereby causing the portablecomputing device to modify the data stored thereon utilizing a randombinary fill or encryption that is capable of decryption if the portablecomputing device is recovered. The particular transmissions may bereceived wirelessly by the portable computing device. It is noted thatthe communication devices may be further configured to transmit one ormore instructions to the portable computing device to decrypt encrypteddata store thereon.

The user interface may be further configured to query the user whetherto activate file management comprising the random binary fill orencryption that is capable of decryption if the portable computingdevice is recovered. In addition, it is contemplated that the user mustbe an authorized user of the data protection and recovery system inorder to utilize the system's capabilities.

Various methods for data protection and recovery for a portable deviceare disclosed herein as part of the location-based recovery device andrisk management system as well. For instance, in one exemplaryembodiment, a method for data protection and recovery for a portabledevice may comprise providing a data storage device configured to storedata on the portable device and to modify the stored data utilizing arandom binary fill or encryption that is capable of decryption and datarecovery if the portable device is recovered, and wirelessly receivinginput indicating the theft or loss of the portable computing device viaa signal reception and transmission. assembly of the portable computingdevice. Upon receiving the particular wireless transmissions, ageographic location of the portable computing device is determined andreported to a user via the signal reception and transmission assembly.

In the method, modification of the stored data utilizing a random binaryfill or encryption that is capable of decryption and data recovery ifthe portable device is recovered is conditioned upon receipt of one ormore particular wireless transmissions by the signal reception andtransmission assembly.

It is noted that the method may further comprise installing a GPSdevice, cellular data transceiver, Wi-Fi data transceiver, or variouscombinations thereof in the portable device as part of the signalreception and transmission assembly. Similar to above, it iscontemplated that the particular wireless transmissions may only betransmitted by an authorized user of the portable device.

Other systems, methods, features and advantages of the invention will beor will become apparent to one with skill in the art upon examination ofthe following figures and detailed description, It is intended that allsuch additional systems, methods, features and advantages be includedwithin this description, be within the scope of the invention, and beprotected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The components in the figures are not necessarily to scale, emphasisinstead being placed upon illustrating the principles of the invention.In the figures, like reference numerals designate corresponding partsthroughout the different views.

FIGS. 1A-1C are exemplary schematics illustrating the elements of theinvention device in various view planes that demonstrate the compositionof electrical and structural elements necessary for installation into aportable computing device.

FIG. 1A is a frontal plane view of said exemplary device.

FIG. 1B is a back plane view of said exemplary device.

FIG. 1C is a side view of said exemplary device.

FIG. 2 is an exemplary process and software block flow diagram for useof the installed exemplary device of FIGS. 1A-C in the event of theft orloss of the portable computing device to which the device is covertlyaffixed.

FIG. 3 is a block diagram illustrating a preferred embodiment of themethod and system disclosed by the present invention which respects to,purchase, registration, signal generation, tracking and control of theinstalled exemplary device of FIGS. 1A-1C.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

In the following description, numerous specific details are set forth inorder to provide a more thorough description of the present invention.It will be apparent, however, to one skilled in the art, that thepresent invention may be practiced without these specific details. Inother instances, well-known features have not been described in detailso as not to obscure the invention.

Due to the growth of the Information Technology (IT) infrastructure andgeneral decrease in costs and sizes of GPS device components, there hasbeen a growing demand for GPS implementation within portable assets,such as portable computing devices. As individuals and enterprisesexpand the use of portable computing devices such as with laptop,tablet, and handheld computers (e.g., smartphones), there has been anincreasing recognition of the vulnerability such devices have for theftor loss and the corresponding increase in economic value andcorresponding loss when theft or loss occurs. For example, of the morethan 10,000 laptops that go missing every month at Chicago O'HareAirport, approximately only 22% are ever recovered.

A problem in the prior art has been an inability to configure andfabricate GPS devices that were compact enough to conveniently installon portable computing devices. A further problem is the inability toconfigure an embedded antennae configuration with such a compact GPSdevice that will reliably transmit such signals usable by a GPS trackingnetwork for device recovery in the event of theft or loss. A stillfurther problem has been a lack of means to configure such GPS devicesfor simple, rapid and covert installation into existing portablecomputing devices that will be both efficacious yet difficult to detectand disable by thieves. A still further problem in the prior art is thelack of an enabling system to instruct the installed GPS device in aportable computing device to instruct the computing device to transmit,alter or destroy stored data files to prevent economic loss or breach ofprivacy rights. A still further problem is the lack of a suitablebusiness method and process to price, acquire and install such GPSdevices, concurrent with a method to price and provide a risk managementfinancial instrument to compensate a purchaser for potential the risk oftoss and impairments occasioned by the irrecoverable or partial recoveryof portable computing devices and data therein installed.

Currently, GPS is a fast-growing field. For instance, cell phonescurrently have the ability to have GPS on them, as do automobiles,thereby giving GPS products off-the-shelf availability. However, in thepresent invention, the device's solutions and implementation, and thesize of the unit make it unique. In addition, the present inventionincludes a novel, computationally based recovery replacement programthat utilizes a generated insurance service to mitigate the risks andcosts associated with theft and loss of portable computing devices.

Therefore, a first object of the present invention is to disclose anovel and useful GPS device and antennae system that may be covertly andefficiently installed into a portable computing device through thememory slots on the motherboard.

A second further object of the invention is to disclose a novel means toemploy specific software (referred to herein as “Silver Bulletsoftware”) in the GPS device that may independently instruct theportable computing device to transmit, alter or destroy data files inthe portable computing device to prevent loss of economic value orpersonal privacy through the unique coding of the Silver Bullet softwareapplication.

A third further object of the present invention is to disclose a novelcomputerized and enabled method to acquire and install such a GPS deviceand software and to provide a computer generated insurance product tocompensate for accidental loss or theft of such portable computingdevices.

The present invention is embedded into the portable computing device viaau open card slot on the motherboard of said portable computing device,which is respectively illustrated in the diagrams of FIGS. 1A, 1B, and1C. In a preferred embodiment, the device is always powered on, evenwhen the portable computing device is not plugged in. The power drain isminimal due to the fact the device is in “sleep mode” and allows for aSMS message to be sent to the device on demand and therefore locatingthe portable computing device with accuracy within 5 meters.

Unlike prior art products that are required to be connected to theInternet, the present invention can be located on demand regardless ofwhether or not the portable computing device is plugged in or connectedto the Internet. A SMS text message is sent to the device and itresponds with longitude/latitude parameters of its locations. Theseparameters are entered into a mapping software system and locate thedevice and display its location on a map of the area within 5 meters ofaccuracy.

In contrast, prior art devices are typically embedded into the systemsBIOS and can only be located from Internet “hotspots” such as Starbuckscoffee, bookstores and other wired locations, etc. This means theportable computing device can only be located from an internetconnection in which it is connected therefore no on demand capabilityexist with the prior art products and, therefore, are less accurate.

The present invention incorporates other novel features as well. Forexample, if desired by the owner, a transmitted message to the SilverBullet software can be sent to and through the present invention todestroy the data contained on the hard drive rendering the portablecomputing device useless. The Silver Bullet software function will issuea command to the present invention that will activate a binary overwritecommand that will fill the entire hard drive with 1's and 0's renderingthe portable computing device useless and even unable to boot up sincethe operating system will also be overwritten. Prior art products do notoffer or anticipate this capability.

Furthermore, in the unlikely event the portable computing device is notrecovered within a definite time (e.g., 15 calendar days), the riskmanagement process of the present invention will electronically commencean order, payment and shipment process to replace the portable computingdevice with a comparable product of like, kind and quality or better.Additionally the risk management process can also electronically providecompensation to the owner for the lost economic value of the data filesstored on the unrecovered portable computing device.

It will be obvious to one skilled in the art that the invention may takenumerous forms of device and system configurations that will accommodatea diversity of covert GPS tracking devices, portable computing devices,and electronically implemented, software-based insurance and purchasebusiness systems. What follows is a preferred embodiment of the usefulnovelties of the present invention. However, for one skilled in the artit will be obvious that the novel features disclosed herein may beemployed with equal utility to alternate configurations of the inventionelements.

The disclosed invention is the GPS personal tracking and recovery deviceused inside of laptops and other types of portable computing devices. Ina preferred embodiment with this type of system, a battery or powersource is required. If the device is charged using its internal batteryit typically has four hours of run time and three days of standby time.However, if the invention device is charged using the laptop powersource in which the invention device was installed, that device canoperate efficiently using inside power as long as that power isavailable. In some cases, people will disconnect the power and/orrepackage. However, when it becomes time to re-engage power, theinvention device will begin transmitting again and has been set on aprotocol that allows the user to continue to transmit immediately. Ifsomebody attempts to change the exterior of the portable computingdevice, the invention's embedded chip will still react.

Referring now to FIG. 1A, the exemplary invention is shown in frontalplane view. At 100 the flexible antenna for GMS transmission isdisplayed. At 102, a GPS antenna is displayed. A telephone modern 104provides for reception and transmission of software enabled data andinstructions between the invention device and a remote invention user. AGPS transmitter 106 enables the invention device to transmit and obtainlocation signals from a GPS/GSM array. A SIMM card housing and apparatus108 together with the modem 104, antennae 102, 100 and the GPStransmitter 106 are affixed and communicate with a circuit board 110. Inthe present embodiment, the circuit board 100 is in signal communicationwith the computing element of portable computing device through aconnector rail 112, The circuit board 110 has an electric powerconnection with the portable computing device at 114.

Referring now to FIG. 1B is a back plane “through view” of the exemplaryinvention which was previously referenced in FIG. 1A. The inventionillustrated in FIG. 1B maintains the same orientation as FIG. 1A and theobserver views the back plane view through the front plane orientation.The conspicuous feature of FIG. 1B is a rechargeable battery element118, affixed to the circuit board 110, which communicates with externalrecharging power through the battery recharge port at 114.

Referring now to FIG. 1C is an alternative side view of the inventiondevice illustrating an alternative positioning of some of the inventiondevice elements. More specifically, the circuit board 110 is shownhousing various communication circuit elements 120 within the circuitboard 110 itself. The flexible antenna 100 is mechanically affixed tothe rechargeable battery 118. The connector rail 112 and batteryrecharge port elements are deliberately omitted in the plane view tohighlight other invention elements. However, for one skilled in the artsuch alternate assemblies are well understood and frequently used tominimize overall device size and/or connection compatibility to theportable computing device. Further, flexibility in the invention deviceelement assembly lends itself to covert design in either imitation ofother circuit elements or compact size. Either option is novel anduseful in preventing invention device tampering or detection.

For this exemplary application, the invention tracking device will beused inside of a laptop computing device, deriving its power sourcedirectly from said computer's battery source as shown at 114 in FIGS. 1Aand 1B respectively. The invention device allows the laptop owner to useeither a desktop computer, a third party tracking service and/or acellular phone for immediate tracking capability. Additionally, once theinvention device registers the laptop as missing, an owner has theability to initiate regular monitoring whereby, for example, theinstalled device can transmit a location, based upon plain sight, everytwo minutes up to every 24 hours.

This invention's tracking device is useful because of the fact thatthere is a high theft and low recovery rate of laptops, An additionalnovel benefit is that this invention device can be used in almost anytype of device which utilizes an AC/DC power source to and which can beconverted to the 12-volt standard typically required, The usefulness ofthis device is self-evident with the ability to recover misplaced orstolen products through the ability to have immediate real-time accessbased upon GPS satellite transmission.

FIG. 2 is a block diagram indicating an exemplary software enabledprocess utilizing the tracking device. Such a process starts 200 withphysical installation of the device at a step 205, referenced in FIGS.1A-C. Concurrently at step 205, the software components are installed inthe invention device and a covert tracker device 225 such as a desktopcomputer, cellular phone or a telecommunications service providersystem. The enabled covert tracking device system remains dormant at astep 210 until activation by a transmitted request from the owner orauthorized user to an operational covert tracker device. An activationof the installed device at a step 215 results in a query at a decisionstep 220 on whether to activate the tracking program routine. A “no”response at decision step 220 returns the installed device to a dormantmode at step 210. A “yes” at decision step 220 requires manualactivation of the software elements to activate tracking operations at astep 225 through transmission and detection of GPS location coordinatesat a step 230. Upon activation, the owner or authorized user is queriedas to whether to commence data file management via the installed trackerdevice at a decision step 235. A “no” at decision step 235 returnseither to the decision step 220 tracker query option or to automatedtracking at step 225 that continues periodic detection and transmissionof GPS location coordinates. A “yes” at decision step 235 is indicativeof a threat that data on the portable computing device is at risk ofunauthorized use or unacceptable loss. A “yes” at decision step 235 thusqueries the owner or authorized user to encrypt or destroy portablecomputing device data files at a decision step 240. If the “destroy”option is authorized, the invention initiates its Silver Bullet softwareroutine to overwrite and destroy portable computing device data files.It will be obvious to one skilled in the art that the Silver Bulletsoftware may also be used to uninstall or disable stored softwareprograms, protocols or operating systems deemed proprietary and a causeof economic loss in the event of loss or imminent unauthorized use ofthe portable computing device. If the encrypt option is selected atdecision step 240 then the owner/authorized user is queried whether totransmit such data files at a decision step 245. If a “yes” occurs atdecision step 245 then the installed tracking device uploads and sendssuch files to the activation location at a step 250. If an ownersuccessfully recovers the portable computing device at a decision step260, the tracking routine ends and the system is returned to its initialsettings of the dormant state at step 210. If the laptop or data are notrecovered within a definite time at decision step 260, the owner thenelectronically files an insurance claim at a step 265, which makescompensation to the owner for loss. Upon replacement of the losthardware, the user process returns to step 205 for installation andprotection of the replacement device.

Referring now to FIG. 3, a preferred embodiment of the method of thepresent invention is shown. A laptop computer owner 360 who will own orowns a portable laptop 330 will procure the covert GPS device 320 inconnection with a purchase agreement that incorporates an insurancepolicy related to a future event involving theft or loss of laptop 330.The policy will be produced using a novels series of software algorithmsthat utilize, without limitation, a plurality of data inputs; the costof GPS in device 320, the cost of installation of GPS device, the costof monitoring service 340, the cost of communications from monitoringservice to GPS satellite array 310, the cost of communication of the UPSsatellite with covert GPS device 320, a future time based value ofinformation and data maintained or to be maintained on laptop 330 forwhich owner 360 will be compensated in the event of theft or loss oflaptop. The payments is made by laptop owner 360 to insurer 350 may be alump sum or a series of fixed or variable payments. The covert GPSdevice 320 will be installed by a certified contractor and will placethe covert device into laptop 330 in a manner that makes it difficult torecognize the covert device as other than the normal hardware of laptop.The contractor will also connect the covert device power receptacle tothe power system of laptop 330. The contactor will enable an antitampering feature of covert GPS device 320 to trigger an alarm orautomatic transmission signal as part of the security protectionfeatures of the invention. The covert GPS device 320 will beelectronically enabled using embedded software algorithms that may alsobe encrypted to provide security to the owner 360 and an identifier codefor monitoring service 340 and GPS satellite array 310. In the event ofa theft or loss of laptop 330, owner 360 will communicate the event toinsurer 350. Insurer 350 will communicate with service 340 to initiate atracking algorithm to locate laptop 330. Alternately, the owner 360 callreport will be automatically forwarded to monitoring service 340. GPSdevice 320 will receive an enabling transmission from GPS Satellite 310and commence periodic GPS location emissions using power derived fromlaptop 330 power source.

In a further variation of the invention, the monitoring service 340 willmanually or automatically transmit to the GPS satellite array 310 anauthorization for covert device 320 to initiate a wireless datatransmission of files stored on laptop 330 to secure files managed bythe monitoring service 340. These files will be forwarded under securetransmission or recorded on to a suitable data storage medium forphysical delivery of such data files stored on laptop 330 to owner 360.In a still further variation of the invention the instructions regardingdata stored on laptop 330 may instruct the laptop to alter or eradicatesuch stored files.

In summary and without limitation, the invention is comprised of thefollowing elements:

A first element consisting of fabricating an installed covert trackingdevice further comprised of circuit, electronic and power elements asshown in FIGS. 1A, 1B, and 1C that is compatible with the portablecomputing device into which it is installed;

A second element where said covert tracking device is acquired inconjunction with a software generated insurance policy and trackingsystem to mitigate the risk of loss of a portable computing device intowhich said covert tracking device is installed;

A third element of installing the covert tracking device covertly insidethe portable computing device and further attaching it to the powersource and/or battery of said portable computing device where saidtracking device itself does not rely on any functions from the portablecomputing device and is stand-alone other than the power source;

A fourth element where, once the tracking device is installed in theportable computing device, and in the event for whatever reason theportable computing device is misplaced and or stolen, an owner of thelost portable computing device will have the ability to telecommunicateto activate a recovery protocol utilizing the tracking features of thecovert tracking device;

A fifth element where recovery of all portable computing devices usingthis tracking device invention is based upon real-time GPS locationsand, in the event recovery is not immediate, the tracking device itselfreceives a communication that allows the tracking device to power on andregularly source and transmit GPS location data until actual recovery ordetermination of an unrecoverable loss of said portable computingdevice.

A sixth element where a portable computing device being misplaced orstolen, a certain minimum time must lapse (e.g., 5 days) before it isdeemed unrecoverable. If the portable computing device is not recoveredwithin the lapsed period, a risk management underwriter will beobligated, through said insurance policy, to replace the unrecoveredportable computing device together with a compensable sum for theeconomic loss of proprietary data files.

It will be obvious to one skilled in the art that this invention device,method and process apply to numerous other types of portable computingdevices. The immediate invention opportunity appears to be with laptops,as there is apparently a unique and unmet need to mitigate sensitive andvaluable data storage and restriction issues in the event of loss ortheft of the portable computing device.

While various embodiments of the invention have been described, it willbe apparent to those of ordinary skill in the art that many moreembodiments and implementations are possible that are within the scopeof this invention. In addition, the various features, elements, andembodiments described herein may be claimed or combined in anycombination or arrangement.

What is claimed is:
 1. A method for tracking a portable computingdevice, the method comprising: receiving an alert signal at a wirelesscommunication assembly of the portable computing device, the alertsignal indicative of loss of the portable computing device; identifyinga location of the portable computing device by way of a positioningdevice of the portable computing device; transmitting a tracking signalusing the wireless communication assembly, the tracking signal includingtracking data corresponding to the location of the portable computingdevice as identified by the positioning device; and disabling use of aWi-Fi data protocol by the portable computing device in response toreceipt of the alert signal.
 2. The method of claim 1, wherein thepositioning device identifies the location of the portable computingdevice based on Global Positioning System (GPS) information.
 3. Themethod of claim 1, wherein the positioning device identifies thelocation of the portable computing device based on at least one ofinternet “hotspot” information or cellular array information.
 4. Themethod of claim 1, wherein the wireless communication assembly includesa Wi-Fi data transceiver, a cellular data transceiver, or somecombination thereof.
 5. The method of claim 1, wherein the trackingsignal is transmitted using a messaging protocol.
 6. The method of claim1, further comprising: updating the location of the portable computingdevice by way of the positioning device; and transmitting the trackingsignal again using the wireless communication assembly after apredetermined duration of time has passed from the last transmission ofthe tracking signal, the tracking signal including data corresponding tothe updated location of the portable computing device as identified bythe positioning device.
 7. The method of claim 1, further comprisingprotecting data stored at the portable computing device from beingaccessed via the portable computing device following receipt of thealert signal.
 8. The method of claim 7, wherein protecting data storedat the portable computing device from being accessed via the portablecomputing device includes encrypting the data.
 9. The method of claim 7,wherein protecting data stored at the portable computing device frombeing accessed via the portable computing device includes one ofdeleting the data, altering the data, overwriting the data, or somecombination thereof.
 10. The method of claim 7, further comprisingtransmitting the data stored at the portable computing device.
 11. Themethod of claim 1, further comprising triggering an alarm.
 12. A systemfor tracking a portable computing device, the system comprising: apositioning device of the portable computing device; a wirelesscommunication assembly of the portable computing device, wherein thewireless communication assembly receives an alert signal indicative ofloss of the portable computing device; a memory that storesinstructions; and a processor coupled to the memory, wherein executionof the instructions causes the processor to: identify a location of theportable computing device using the positioning device, transmit atracking signal using the wireless communication assembly, the trackingsignal including tracking data corresponding to the location of theportable computing device as identified by the positioning device, anddisable use of a Wi-Fi data protocol by the portable computing device inresponse to receipt of the alert signal.
 13. The system of claim 12,wherein the positioning device identifies the location of the portablecomputing device based on at least one of Global Positioning System(GPS) information, internet “hotspot” information, or cellular arrayinformation.
 14. The system of claim 12, wherein the wirelesscommunication assembly includes a Wi-Fi data transceiver, a cellulardata transceiver, or some combination thereof.
 15. The system of claim12, wherein execution of the instructions causes the processor to:update the location of the portable computing device using thepositioning device, and transmit the tracking signal again after apredetermined duration of time has passed from a previous transmissionof the tracking signal, the tracking signal including data correspondingto the location of the portable computing device as updated using thepositioning device.
 16. The system of claim 12, further comprising adata storage medium of the portable computing device, wherein datastored at the data storage medium is protected from access via theportable computing device following receipt of the alert signal at thewireless communication assembly.
 17. The system of claim 16, wherein thedata stored at the data storage medium is protected from being accessedvia the portable computing device via encryption of the data stored atthe data storage medium.
 18. The system of claim 16, wherein the datastored at the data storage medium is protected from being accessed viathe portable computing device via one of deletion, alteration, oroverwriting of the data stored at the data storage medium.
 19. Thesystem of claim 16, further comprising an authorized user device,wherein execution of the instructions causes the processor to transmitthe data stored at the data storage medium to the authorized user devicevia the wireless communication assembly.
 20. The system of claim 12,further comprising an authorized user device, wherein the alert signaloriginates from the authorized user device.
 21. A non-transitorycomputer-readable storage medium having embodied thereon a programexecutable by a processor to perform a method for tracking a portablecomputing device, the method comprising: receiving an alert signal at awireless communication assembly of the portable computing device, thealert signal indicative of loss of the portable computing device;identifying a location of the portable computing device by way of apositioning device of the portable computing device; transmitting atracking signal using the wireless communication assembly, the trackingsignal including tracking data corresponding to the location of theportable computing device as identified by the positioning device; anddisabling use of a Wi-Fi data protocol by the portable computing devicein response to receipt of the alert signal.
 22. The method of claim 1,further comprising disabling use of a cellular data protocol by theportable computing device.
 23. The method of claim 1, further comprisingdisabling use of a software program at the portable computing device,the software program stored in a memory of the portable computingdevice.
 24. The method of claim 1, further comprising uninstalling asoftware program at the portable computing device, the software programstored in a memory of the portable computing device.
 25. The method ofclaim 1, further comprising disabling an operating system of theportable computing device.
 26. The method of claim 1, further comprisinguninstalling an operating system of the portable computing device. 27.The method of claim 1, further comprising maintaining the portablecomputing device in a dormant state prior to receipt of the alertsignal.
 28. The method of claim 1, further comprising maintaining theportable computing device in a sleep mode prior to receipt of the alertsignal, wherein the sleep mode minimizes power drained by the portablecomputing device while still allowing receipt of the alert signal. 29.The method of claim 1, wherein the alert signal includes a Short MessageService (SMS) message.
 30. The system of claim 12, wherein the memorystores a software program, and wherein execution of the instructionscauses the processor to disable use of the software program at theportable computing device in response to receipt of the alert signal.31. The system of claim 12, wherein the memory stores a softwareprogram, and wherein execution of the instructions causes the processorto uninstall the software program in response to receipt of the alertsignal.