Telemetric tracking of a portable computing device

ABSTRACT

A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and system for acquiring such devices, protecting data on such devices, and for compensating owners of devices. A GPS mechanism of the invention provides real time tracking of missing devices that may be coordinated with security agencies to intercept and recover missing computing devices. When a stolen device is unrecoverable, the invention may receive a signal to initiate data recovery where a wireless network is available to recover data for the owner. Alternatively, the GPS mechanism instructs the device to encrypt or destroy stored data files to prevent commercial espionage or privacy violations. The invention discloses a software system and method for computing a purchase price of the GPS mechanism, computing compensation for loss of the device and lost data.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/644,537, filed Oct. 4, 2012, which is a continuation-in-part of U.S.patent application Ser. No. 12/461,482, filed Aug. 12, 2009, now issuedU.S. Pat. No. 8,427,305, issued Apr. 23, 2013, which claims priority toU.S. Provisional Patent Application No. 61/188,727, filed Aug. 12, 2008,the entire contents of the aforementioned applications are herebyincorporated herein by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates to a location-based recovery device and riskmanagement system for portable computing devices and data.

2. Related Art

With the advent of telecommunications, it has become useful anddesirable for enterprises and individuals to employ various forms ofsensors and communications devices to monitor the condition and locationof certain assets such as portable computing devices. Advances indigital, electronic and wireless communication devices have extended therange and convenience of portable asset monitoring. Global PositioningSatellites (GPS) such as Inmarstat, Iridium, Globalstar, or Msat nowincrease the accuracy of portable asset location and movement. Suchtechnologies are significant in improving efficiency and economicmanagement of portable assets. Such devices and business practices arewell known in the prior art.

There are approximately a dozen disclosures describing GPS features thatrelate to portable device theft and recovery that constitutes the knownprior art relating to the present invention. The present inventionprovides novel and useful improvements, methods and processes forreducing economic and property losses related to the theft or loss ofportable computing devices which, without limitation, is distinguishedfrom the prior art in the following discussion.

In U.S. Patent Publication No. 2006/0007039, a method and system arcdisclosed for expanding law enforcement recovery efforts for missingvehicles using VHF enabled networks and concealed GPS receivers. Thepresent invention application is distinguished in that its hardwareelements are novel and unique to the small dimensions of a portablecomputing device. A further limitation of the prior art is that itsubstantially provides only passive tracking capabilities. Animprovement of this invention over the prior art is the novel enablementof the tracking device to receive and initiate certain limited anduseful operations of the stolen or missing computing assets to preventunauthorized use of its digital content.

U.S. Patent Publication No. 2004/0198309 discloses a stolen vehicletracking and recovering method that utilizes cellular telecommunicationnetworks for providing location guidance information to improve vehiclerecovery. An improvement of the present invention over the prior art isits use of an implanted GPS device within a portable computing devicethat communicates directly with a global positioning satellite networkand independently of the operating system of the portable computingdevice.

In U.S. Patent Publication No. 2003/0005316, the prior art teaches amobile system that is provided with a theft recovery mechanismcomprising a host chipset and a locator subsystem connected to the hostchipset that is arranged to determine a current location of the mobilesystem; and a main storage connected to the host chipset and arranged tostore an operating system (OS) and contain an OS-Present applicationand/or a Pre-OS application configured to enforce security policiesduring user authentication and determine whether the mobile system mayhave been stolen or used inappropriately based on the security policies.A novel improvement of the present invention is its use of an implantedautonomous device that coordinates theft and tracking functions separatefrom an existing computing operating system. This improvement provides ameasure of security from programming interference or compromise bysoftware viruses that can attack and compromise mobile device operatingsystems.

In U.S. Pat. No. 5,793,283, titled “Pager Vehicle Theft Prevention andRecovery System”, the prior art teaches a theft prevention and recoverysystem using pager network for vehicles, which transmits a designatedelectronic alarm signal via free space through an electronic transceiverwhen a remote alarm activation signal is received. The user instructsthe transceiver to transmit a continuous pager signal containinglongitudinal and latitudinal coordinates generated by the GPS. Thelongitudinal and latitudinal coordinates allow the car to be traced andrecovered. The present invention is distinguished from this prior artbecause its mode of operation configures to the unique parameters of apersonal computing system, which contains data files. In the event of aloss or theft of the personal computing system, a novel improvement ofthe present invention is that it can determine and activate procedureson the data files if such data files must be cordoned off, destroyed,encrypted or transmitted to a remote and secure location.

Other prior art is disclosed in U.S. Patent Publication No.2007/0180207, which involves secure radio frequency identification(RFID) backup/restore for computing/pervasive devices. This prior artuses an automated RFID based data backup and recovery system for acomputing device to invoke logic to initiate physical copying andtransmission of digital storage device content to remote storage device.The present invention is distinguished by its separate universal GPSdevice that is installed in a portable computing device. Further thepresent invention requires positive activation by the user and cantrigger disablement of the host computing device to prevent economicloss related to a potential disclosure breach of proprietary, personalor commercial data.

In U.S. Patent Publication No. 2006/0033616, titled “Smart ContainerGateway”, the prior art comprises a smart container gateway thatprovides communication with global and local networks, container andcargo security sensors and cargo identification tags. The smartcontainer gateway communicates with one or more networks by means of anintegrated structural RF antenna, power generator and radio controlsubsystem. The present invention is distinguished in that itsapplication requires insertion of a compact and covert device into theinterior space of the portable computing device and requires externalpower from the host device and external activation prior to performingor activating to perform any function.

In U.S. Patent Publication No. 2005/0017900, titled “Tracking Unit”, theprior art describes a tracking unit for assisting in the recovery ofstolen monies or other property includes a housing containing a GPSreceiver for receiving GPS signals from overhead satellites, a cellularphone transceiver, a microprocessor, and a battery. Following a theft,the microprocessor activates the cellular phone transceiver to dial thetelephone number of a central monitoring station. The present inventionis distinguished in that it is directly installed into the theft risk(i.e. the portable computing device) in which it is installed.

In U.S. Patent Publication No. 2004/0075539, titled “Vehicle MonitoringSystem”, the prior art discloses “remote theft monitoring for vehicle bysensing vehicle displacement, engine operation and key entry.” When apossible theft condition is determined, the service provider server willgenerate a message to alert a security agency. The present inventiondisclosure is distinguished by its use in portable computing devices andits requirement for active external activation by an owner to operateits novel features and benefits.

In U.S. Pat. No. 6,049,269, titled “Wide Area Wireless System for AccessInto Vehicles and Fleets for Control, Security, Messaging, Reporting andTracking”, the prior art invention uses a paging signal initiated byowner if his or her vehicle is stolen, on-board paging receiver,decoder, controller, alarm and ultimate disablement of vehicle. Thepresent invention is an improvement in its use of a novel software basedmethod that employs an insertable GPS device into portable computingdevices. In the present invention, a novel software based methodcomputes a GPS system purchase price related to the savings fromeconomic loss by recovery or by cash compensation in the event of anunrecoverable loss of said portable computing device.

Notwithstanding the prior art discussed herein, the invention is novelbecause none of the prior disclosures either alone or in combination aresufficient to disclose the invention set forth in this application. As aresult, the present invention offers numerous advantages over the priorart, including, without limitation:

a) The claimed invention discloses a novel and useful GPS device andantennae system that may be covertly and efficiently installed into aportable computing device.

b) The invention is a novel means to employ software in the GPS devicethat may instruct the portable computing device to transmit, alter ordestroy data files in the portable computing device to prevent loss ofeconomic value or personal privacy.

c) The invention is a novel software based method and financial systemto acquire and install such a GPS device and software and to provide aninsurance product to compensate for loss by the theft of or accidentalloss of portable computing devices. From the discussion that follows, itwill become apparent that the present invention addresses thedeficiencies associated with the prior art while providing numerousadditional advantages and benefits not contemplated or possible withprior art constructions.

SUMMARY OF THE INVENTION

A location-based recovery device and risk management system for portablecomputing devices and data is disclosed herein. The location-basedrecovery device and risk management system both protects data stored onportable computing devices and assists in the location and recovery ofportable computing devices that have been stolen or otherwise lost. Thestored data may be overwritten or encrypted for later decryption whenthe portable computing device is recovered. In this manner, such data isprotected even when the portable computing device is lost.

Various embodiments of the location-based recovery device and riskmanagement system are disclosed herein. For instance, in one exemplaryembodiment, the location-based recovery device and risk managementsystem may be a portable computing device comprising a power sourceconfigured to allow operation of the portable computing device withoutbeing connected to an electrical outlet, a data storage assemblyconfigured to store one or more data files on the portable computingdevice, and a wireless communication assembly.

The wireless communication assembly may be configured to receive one ormore wireless signals to determine a geographic location of the portablecomputing device, receive input indicating the theft or loss of theportable computing device, and transmit the geographic location of theportable computing device after receiving the input indicating the theftor loss of the portable computing device.

Upon receiving one or more particular wireless transmissions, the datastorage assembly modifies the data files utilizing a random binary fillor encryption that is capable of decryption if the portable computingdevice is recovered. This protects the data files on the portablecomputing device. It is contemplated that the particular wirelesstransmissions may only be transmitted by an authorized user of theportable computing device.

It is noted that the wireless communication assembly may have variousconfigurations. For example, the wireless communication assembly maycomprise a GPS device, a cellular data transceiver, a Wi-Fi datatransceiver, or various combinations thereof in one or more embodiments.

In another exemplary embodiment, the location-based recovery device andrisk to management system may be a data protection and recovery systemfor a portable computing device (e.g., a laptop, tablet, or smartphone).Such system may comprise one or more communication devices configured tosend one or more transmissions to the portable computing deviceindicating the theft or loss of the portable computing device, whereinthe portable computing device is configured to, upon receipt of one ormore particular transmissions, modify data stored thereon utilizing arandom binary fill or encryption that is capable of decryption if theportable computing device is recovered. The communication devices willtypically also be configured to receive a response from the portablecomputing device indicating the geographic location of the portablecomputing device.

A user interface of the system may query a user whether to activate datafile management on the portable computing device. Upon receiving userinput activating data file management, the communication devicestransmit the particular transmissions thereby causing the portablecomputing device to modify the data stored thereon utilizing a randombinary fill or encryption that is capable of decryption if the portablecomputing device is recovered. The particular transmissions may bereceived wirelessly by the portable computing device. It is noted thatthe communication devices may be further configured to transmit one ormore instructions to the portable computing device to decrypt encrypteddata store thereon.

The user interface may be further configured to query the user whetherto activate file management comprising the random binary fill orencryption that is capable of decryption if the portable computingdevice is recovered. In addition, it is contemplated that the user mustbe an authorized user of the data protection and recovery system inorder to utilize the system's capabilities.

Various methods for data protection and recovery for a portable deviceare disclosed herein as part of the location-based recovery device andrisk management system as well. For instance, in one exemplaryembodiment, a method for data protection and recovery for a portabledevice may comprise providing a data storage device configured to storedata on the portable device and to modify the stored data utilizing arandom binary fill or encryption that is capable of decryption and datarecovery if the portable device is recovered, and wirelessly receivinginput indicating the theft or loss of the portable computing device viaa signal reception and transmission assembly of the portable computingdevice. Upon receiving the particular wireless transmissions, ageographic location of the portable computing device is determined andreported to a user via the signal reception and transmission assembly.

In the method, modification of the stored data utilizing a random binaryfill or encryption that is capable of decryption and data recovery ifthe portable device is recovered is conditioned upon receipt of one ormore particular wireless transmissions by the signal reception andtransmission assembly.

It is noted that the method may further comprise installing a GPSdevice, cellular data transceiver, Wi-Fi data transceiver, or variouscombinations thereof in the portable device as part of the signalreception and transmission assembly. Similar to above, it iscontemplated that the particular wireless transmissions may only betransmitted by an authorized user of the portable device.

Other systems, methods, features and advantages of the invention will beor will become apparent to one with skill in the art upon examination ofthe following figures and detailed description. It is intended that allsuch additional systems, methods, features and advantages be includedwithin this description, be within the scope of the invention, and beprotected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The components in the figures are not necessarily to scale, emphasisinstead being placed upon illustrating the principles of the invention.In the figures, like reference numerals designate corresponding partsthroughout the different views.

FIGS. 1A-1C are exemplary schematics illustrating the elements of theinvention device in various view planes that demonstrate the compositionof electrical and structural elements necessary for installation into aportable computing device.

FIG. 1A is a frontal plane view of GPS tracking device to be installedin a portable computing device;

FIG. 1B is a back plane view of a GPS tracking device to be installed ina portable computing device;

FIG. 1C is a side plane view of a GPS tracking device to be installed ina portable computing device.

FIG. 2 is an exemplary process and software block flow diagram for useof the installed exemplary device of FIGS. 1A-C in the event of theft orloss of the portable computing device to which the device is covertlyaffixed.

FIG. 3 is a block diagram illustrating a preferred embodiment of themethod and system disclosed by the present invention which respects to,purchase, registration, signal generation, tracking and control of theinstalled exemplary device of FIGS. 1A-1C.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

In the following description, numerous specific details are set forth inorder to provide a more thorough description of the present invention.It will be apparent, however, to one skilled in the art, that thepresent invention may be practiced without these specific details. Inother instances, well-known features have not been described in detailso as not to obscure the invention.

Due to the growth of the Information Technology (IT) infrastructure andgeneral decrease in costs and sizes of GPS device components, there hasbeen a growing demand for GPS implementation within portable assets,such as portable computing devices. As individuals and enterprisesexpand the use of portable computing devices such as with laptop,tablet, and handheld computers (e.g., smartphones), there has been anincreasing recognition of the vulnerability such devices have for theftor loss and the corresponding increase in economic value andcorresponding loss when theft or loss occurs. For example, of the morethan 10,000 laptops that go missing every month at Chicago O'HareAirport, approximately only 22% are ever recovered.

A problem in the prior art has been an inability to configure andfabricate GPS devices that were compact enough to conveniently installon portable computing devices. A further problem is the inability toconfigure an embedded antennae configuration with such a compact GPSdevice that will reliably transmit such signals usable by a GPS trackingnetwork for device recovery in the event of theft or loss. A stillfurther problem has been a lack of means to configure such GPS devicesfor simple, rapid and covert installation into existing portablecomputing devices that will be both efficacious yet difficult to detectand disable by thieves. A still further problem in the prior art is thelack of an enabling system to instruct the installed GPS device in aportable computing device to instruct the computing device to transmit,alter or destroy stored data files to prevent economic loss or breach ofprivacy rights. A still further problem is the lack of a suitablebusiness method and process to price, acquire and install such GPSdevices, concurrent with a method to price and provide a risk managementfinancial instrument to compensate a purchaser for potential the risk ofloss and impairments occasioned by the irrecoverable or partial recoveryof portable computing devices and data therein installed.

Currently, GPS is a fast-growing field. For instance, cell phonescurrently have the ability to have GPS on them, as do automobiles,thereby giving GPS products off-the-shelf availability. However, in thepresent invention, the device's solutions and implementation, and thesize of the unit make it unique. In addition, the present inventionincludes a novel, computationally based recovery replacement programthat utilizes a generated insurance service to mitigate the risks andcosts associated with theft and loss of portable computing devices.

Therefore, a first object of the present invention is to disclose anovel and useful GPS device and antennae system that may be covertly andefficiently installed into a portable computing device through thememory slots on the motherboard.

A second further object of the invention is to disclose a novel means toemploy specific software (referred to herein as “Silver Bulletsoftware”) in the GPS device that may independently instruct theportable computing device to transmit, alter or destroy data files inthe portable computing device to prevent loss of economic value orpersonal privacy through the unique coding of the Silver Bullet softwareapplication.

A third further object of the present invention is to disclose a novelcomputerized and enabled method to acquire and install such a GPS deviceand software and to provide a computer generated insurance product tocompensate for accidental loss or theft of such portable computingdevices.

The present invention is embedded into the portable computing device viaau open card slot on the motherboard of said portable computing device,which is respectively illustrated in the diagrams of FIGS. 1A, 1B, and1C. In a preferred embodiment, the device is always powered on, evenwhen the portable computing device is not plugged in. The power drain isminimal due to the fact the device is in “sleep mode” and allows for aSMS message to be sent to the device on demand and therefore locatingthe portable computing device with accuracy within 5 meters.

Unlike prior art products that are required to be connected to theInternet, the present invention can be located on demand regardless ofwhether or not the portable computing device is plugged in or connectedto the Internet. A SMS text message is sent to the device and itresponds with longitude/latitude parameters of its locations. Theseparameters are entered into a mapping software system and locate thedevice and display its location on a map of the area within 5 meters ofaccuracy.

In contrast, prior art devices are typically embedded into the systemsBIOS and can only be located from internet “hotspots” such as Starbuckscoffee, bookstores and other wired locations, etc. This means theportable computing device can only be located from an internetconnection in which it is connected therefore no on demand capabilityexist with the prior art products and, therefore, are less accurate.

The present invention incorporates other novel features as well. Forexample, if desired by the owner, a transmitted message to the SilverBullet software can be sent to and through the present invention todestroy the data contained on the hard drive rendering the portablecomputing device useless. The Silver Bullet software function will issuea command to the present invention that will activate a binary overwritecommand that will fill the entire hard drive with 1's and 0's renderingthe portable computing device useless and even unable to boot up sincethe operating system will also be overwritten. Prior art products do notoffer or anticipate this capability.

Furthermore, in the unlikely event the portable computing device is notrecovered within a definite time (e.g., 15 calendar days), the riskmanagement process of the present invention will electronically commencean order, payment and shipment process to replace the portable computingdevice with a comparable product of like, kind and quality or better.Additionally the risk management process can also electronically providecompensation to the owner for the lost economic value of the data filesstored on the unrecovered portable computing device.

It will be obvious to one skilled in the art that the invention may takenumerous forms of device and system configurations that will accommodatea diversity of covert GPS tracking devices, portable computing devices,and electronically implemented, software-based insurance and purchasebusiness systems. What follows is a preferred embodiment of the usefulnovelties of the present invention. However, for one skilled in the artit will be obvious that the novel features disclosed herein may beemployed with equal utility to alternate configurations of the inventionelements.

The disclosed invention is the GPS personal tracking and recovery deviceused inside of laptops and other types of portable computing devices. Ina preferred embodiment with this type of system, a battery or powersource is required. If the device is charged using its internal batteryit typically has four hours of run time and three days of standby time.However, if the invention device is charged using the laptop powersource in which the invention device was installed, that device canoperate efficiently using inside power as long as that power isavailable. In some cases, people will disconnect the power and/orrepackage. However, when it becomes time to re-engage power, theinvention device will begin transmitting again and has been set on aprotocol that allows the user to continue to transmit immediately. Ifsomebody attempts to change the exterior of the portable computingdevice, the invention's embedded chip will still react.

Referring now to FIG. 1A, the exemplary invention is shown in frontalplane view. At 100 the flexible antenna for GMS transmission isdisplayed. At 102, a GPS antenna is displayed. A telephone modem 104provides for reception and transmission of software enabled data andinstructions between the invention device and a remote invention user. AGPS transmitter 106 enables the invention device to transmit and obtainlocation signals from a GPS/GSM array. A SIMM card housing and apparatus108 together with the modem 104, antennae 102, 100 and the GPStransmitter 106 are affixed and communicate with a circuit board 110. Inthe present embodiment, the circuit board 100 is in signal communicationwith the computing element of portable computing device through aconnector rail 112. The circuit board 110 has an electric powerconnection with the portable computing device at 114.

Referring now to FIG. 1B is a back plane “through view” of the exemplaryinvention which was previously referenced in FIG. 1A. The inventionillustrated in FIG. 1B maintains the same orientation as FIG. 1A and theobserver views the back plane view through the front plane orientation.The conspicuous feature of FIG. 1B is a rechargeable battery element118, affixed to the circuit board 110, which communicates with externalrecharging power through the battery recharge port at 114.

Referring now to FIG. 1C is an alternative side view of the inventiondevice illustrating an alternative positioning of some of the inventiondevice elements. More specifically, the circuit board 110 is shownhousing various communication circuit elements 120 within the circuitboard 110 itself. The flexible antenna 100 is mechanically affixed tothe rechargeable battery 118. The connector rail 112 and batteryrecharge port elements are deliberately omitted in the plane view tohighlight other invention elements. However, for one skilled in the artsuch alternate assemblies are well understood and frequently used tominimize overall device size and/or connection compatibility to theportable computing device. Further, flexibility in the invention deviceelement assembly lends itself to covert design in either imitation ofother circuit elements or compact size. Either option is novel anduseful in preventing invention device tampering or detection.

For this exemplary application, the invention tracking device will beused inside of a laptop computing device, deriving its power sourcedirectly from said computer's battery source as shown at 114 in FIGS. 1Aand 1B respectively. The invention device allows the laptop owner to useeither a desktop computer, a third party tracking service and/or acellular phone for immediate tracking capability. Additionally, once theinvention device registers the laptop as missing, an owner has theability to initiate regular monitoring whereby, for example, theinstalled device can transmit a location, based upon plain sight, everytwo minutes up to every 24 hours.

This invention's tracking device is useful because of the fact thatthere is a high theft and low recovery rate of laptops. An additionalnovel benefit is that this invention device can be used in almost anytype of device which utilizes an AC/DC power source and which can beconverted to the 12-volt standard typically required. The usefulness ofthis device is self-evident with the ability to recover misplaced orstolen products through the ability to have immediate real-time accessbased upon GPS satellite transmission.

FIG. 2 is a block diagram indicating an exemplary software enabledprocess utilizing the tracking device. Such a process starts 200 withphysical installation of the device at a step 205, referenced in FIGS.1A-C. Concurrently at step 205, the software components are installed inthe invention device and a covert tracker device 225 such as a desktopcomputer, cellular phone or a telecommunications service providersystem. The enabled covert tracking device system remains dormant at astep 210 until activation by a transmitted request from the owner orauthorized user to an operational covert tracker device. An activationof the installed device at a step 215 results in a query at a decisionstep 220 on whether to activate the tracking program routine. A “no”response at decision step 220 returns the installed device to a dormantmode at step 210. A “yes” at decision step 220 requires manualactivation of the software elements to activate tracking operations at astep 225 through transmission and detection of GPS location coordinatesat a step 230. Upon activation, the owner or authorized user is queriedas to whether to commence data file management via the installed trackerdevice at a decision step 235. A “no” at decision step 235 returnseither to the decision step 220 tracker query option or to automatedtracking at step 225 that continues periodic detection and transmissionof GPS location coordinates. A “yes” at decision step 235 is indicativeof a threat that data on the portable computing device is at risk ofunauthorized use or unacceptable loss. A “yes” at decision step 235 thusqueries the owner or authorized user to encrypt or destroy portablecomputing device data files at a decision step 240. If the “destroy”option is authorized, the invention initiates its Silver Bullet softwareroutine to overwrite and destroy portable computing device data files.It will be obvious to one skilled in the art that the Silver Bulletsoftware may also be used to uninstall or disable stored softwareprograms, protocols or operating systems deemed proprietary and a causeof economic loss in the event of loss or imminent unauthorized use ofthe portable computing device. If the encrypt option is selected atdecision step 240 then the owner/authorized user is queried whether totransmit such data files at a decision step 245. If a “yes” occurs atdecision step 245 then the installed tracking device uploads and sendssuch files to the activation location at a step 250. If an ownersuccessfully recovers the portable computing device at a decision step260, the tracking routine ends and the system is returned to its initialsettings of the dormant state at step 210. If the laptop or data are notrecovered within a definite time at decision step 260, the owner thenelectronically files an insurance claim at a step 265, which makescompensation to the owner for loss. Upon replacement of the losthardware, the user process returns to step 205 for installation andprotection of the replacement device.

Referring now to FIG. 3, a preferred embodiment of the method of thepresent invention is shown. A laptop computer owner 360 who will own orowns a portable laptop 330 will procure the covert GPS device 320 inconnection with a purchase agreement that incorporates an insurancepolicy related to a future event involving theft or loss of laptop 330.The policy will be produced using a novels series of software algorithmsthat utilize, without limitation, a plurality of data inputs; the costof GPS device 320, the cost of installation of GPS device, the cost ofmonitoring service 340, the cost of communications from monitoringservice to GPS satellite array 310, the cost of communication of the GPSsatellite with covert GPS device 320, a future time based value ofinformation and data maintained or to be maintained on laptop 330 forwhich owner 360 will be compensated in the event of theft or loss oflaptop. The payments made by laptop owner 360 to insurer 350 may be alump sum or a series of fixed or variable payments. The covert GPSdevice 320 will be installed by a certified contractor and will placethe covert device into laptop 330 in a manner that makes it difficult torecognize the covert device as other than the normal hardware of laptop.The contractor will also connect the covert device power receptacle tothe power system of laptop 330. The contactor will enable an antitampering feature of covert GPS device 320 to trigger an alarm orautomatic transmission signal as part of the security protectionfeatures of the invention. The covert GPS device 320 will beelectronically enabled using embedded software algorithms that may alsobe encrypted to provide security to the owner 360 and an identifier codefor monitoring service 340 and GPS satellite array 310. In the event ofa theft or loss of laptop 330, owner 360 will communicate the event toinsurer 350. Insurer 350 will communicate with service 340 to initiate atracking algorithm to locate laptop 330. Alternately, the owner 360 callreport will be automatically forwarded to monitoring service 340. GPSdevice 320 will receive an enabling transmission from GPS Satellite 310and commence periodic GPS location emissions using power derived fromlaptop 330 power source.

In a further variation of the invention, the monitoring service 340 willmanually or automatically transmit to the GPS satellite array 310 anauthorization for covert device 320 to initiate a wireless datatransmission of files stored on laptop 330 to secure files managed bythe monitoring service 340. These files will be forwarded under securetransmission or recorded on to a suitable data storage medium forphysical delivery of such data files stored on laptop 330 to owner 360.In a still further variation of the invention the instructions regardingdata stored on laptop 330 may instruct the laptop to alter or eradicatesuch stored files.

In summary and without limitation, the invention is comprised of thefollowing elements:

A first element consisting of fabricating an installed covert trackingdevice further comprised of circuit, electronic and power elements asshown in FIGS. 1A, 1B, and 1C that is compatible with the portablecomputing device into which it is installed;

A second element where said covert tracking device is acquired inconjunction with a software generated insurance policy and trackingsystem to mitigate the risk of loss of a portable computing device intowhich said covert tracking device is installed;

A third element of installing the covert tracking device covertly insidethe portable computing device and further attaching it to the powersource and/or battery of said portable computing device where saidtracking device itself does not rely on any functions from the portablecomputing device and is stand-alone other than the power source;

A fourth element where, once the tracking device is installed in theportable computing device, and in the event for whatever reason theportable computing device is misplaced and or stolen, an owner of thelost portable computing device will have the ability to telecommunicateto activate a recovery protocol utilizing the tracking features of thecovert tracking device;

A fifth element where recovery of all portable computing devices usingthis tracking device invention is based upon real-time GPS locationsand, in the event recovery is not immediate, the tracking device itselfreceives a communication that allows the tracking device to power on andregularly source and transmit GPS location data until actual recovery ordetermination of an unrecoverable loss of said portable computingdevice.

A sixth element where a portable computing device being misplaced orstolen, a certain minimum time must lapse (e.g., 5 days) before it isdeemed unrecoverable. If the portable computing device is not recoveredwithin the lapsed period, a risk management underwriter will beobligated, through said insurance policy, to replace the unrecoveredportable computing device together with a compensable sum for theeconomic loss of proprietary data files.

It will be obvious to one skilled in the art that this invention device,method and process apply to numerous other types of portable computingdevices. The immediate invention opportunity appears to be with laptops,as there is apparently a unique and unmet need to mitigate sensitive andvaluable data storage and restriction issues in the event of loss ortheft of the portable computing device.

While various embodiments of the invention have been described, it willbe apparent to those of ordinary skill in the art that many moreembodiments and implementations are possible that are within the scopeof this invention. In addition, the various features, elements, andembodiments described herein may be claimed or combined in anycombination or arrangement.

What is claimed is:
 1. A method for telemetric tracking of a portablecomputing device, the method comprising: receiving, from a usercomputing device associated with an authorized user of the portablecomputing device, one or more wireless transmissions that indicate thatthe portable computing device is lost and that request initiation ofperiodic monitoring of the portable computing device based on a timeperiod interval identified in the one or more wireless transmissions;modifying data stored in memory of the portable computing device inresponse to receipt of the one or more wireless transmissions, therebypreventing access to the data; periodically determining in accordancewith the time period interval a geographic location of the portablecomputing device in response to receipt of the one or more wirelesstransmissions and based on communications received from one or moreglobal positioning satellites by the portable computing device; andperiodically transmitting in accordance with the time period interval,from the portable computing device to the user computing device, thegeographic location of the portable computing device.
 2. The method ofclaim 1, wherein the one or more wireless transmissions received at theportable computing device include a Short Message Service (SMS)text-based message.
 3. The method of claim 1, further comprisingtransmitting at least a portion of the data stored in the memory of theportable computing device to the authorized user in response to receiptof the one or more wireless transmissions.
 4. The method of claim 1,wherein the one or more wireless transmissions received at the portablecomputing device are wireless cellular signals.
 5. The method of claim1, wherein the one or more wireless transmissions received at theportable computing device are Wi-Fi signals.
 6. The method of claim 1,further comprising determining that the one or more wirelesstransmissions are associated with the authorized user.
 7. The method ofclaim 1, further comprising: determining at the portable computingdevice that tampering with electronic circuitry of the portablecomputing device has occurred; and transmitting a message from theportable computing device to the authorized user, the message indicatingthat tampering with the electronic circuitry of the portable computingdevice has occurred.
 8. The method of claim 1, further comprisingexecuting a tracking program stored in the memory of the portablecomputing device in response to receipt of the one or more wirelesstransmissions, the tracking program determining the geographic locationof the portable computing device.
 9. The method of claim 1, whereinmodifying the data stored in the memory of the portable computing deviceincludes overwriting the data with random binary fill.
 10. The method ofclaim 1, wherein modifying the data stored in the memory of the portablecomputing device includes encrypting the data.
 11. A method fortelemetric tracking of a portable computing device, the methodcomprising: receiving, from a user computing device associated with anauthorized user of the portable computing device, one or more wirelesstransmissions that indicate that the portable computing device is lostand that request initiation of periodic monitoring of the portablecomputing device based on a time period interval identified in the oneor more wireless transmissions; modifying data stored in memory of theportable computing device in response to receipt of the one or morewireless transmissions, thereby preventing access to the data;periodically determining in accordance with the time period interval ageographic location of the portable computing device in response toreceipt of the one or more wireless transmissions and based oncommunications received from one or more global positioning satellitesby the portable computing device; and transmitting, from the portablecomputing device to the user computing device, at least a portion of thedata stored in the memory of the portable computing device; andperiodically transmitting in accordance with the time period interval,from the portable computing device to the user computing device, thegeographic location of the portable computing device.
 12. A portablecomputing device with telemetric tracking functionality, the devicecomprising: one or more network interfaces that wirelessly communicateover a network; a processor that executes one or more processes, theprocessor coupled to the one or more network interfaces; and a memorythat stores instructions executable by the processor, wherein executionof the instructions by the processor: receives, from a user computingdevice associated with an authorized user of the portable computingdevice, one or more wireless transmissions that indicate that theportable computing device is lost and that request initiation ofperiodic monitoring of the portable computing device based on a timeperiod interval identified in the one or more wireless transmissions,modifies data stored in memory of the portable computing deviceresponsive to receipt of the one or more wireless transmissions, therebypreventing access to the data, periodically determines in accordancewith the time period interval a geographic location of the portablecomputing device based on communications received from one or moreglobal positioning satellites, and periodically transmits in accordancewith the time period interval, to the user computing device, thegeographic location of the portable computing device.
 13. The portablecomputing device of claim 12, further comprising a global positioningsystem (GPS) electronic circuitry that receives the communications fromthe one or more global positioning satellites.
 14. The portablecomputing device of claim 12, wherein execution of the instructions bythe processor further transmits, to the user computing device, at leasta portion of the data stored in the memory of the portable computingdevice.
 15. The portable computing device of claim 12, wherein theportable computing device is a laptop.
 16. The portable computing deviceof claim 12, wherein the portable computing device is a tablet.
 17. Theportable computing device of claim 12, wherein the portable computingdevice is a smartphone.
 18. A system for telemetric tracking of aportable computing device, the system comprising: the portable computingdevice that: receives, from a user computing device associated with anauthorized user of the portable computing device, one or more wirelesstransmissions that indicate that the portable computing device is lostand that request initiation of periodic monitoring of the portablecomputing device based on a time period interval identified in the oneor more wireless transmissions, modifies data stored in memory of theportable computing device in response to receipt of the one or morewireless transmissions, thereby preventing access to the data, andperiodically determines in accordance with the time period interval ageographic location of the portable computing device based oncommunications received from one or more global positioning satellites;and the user computing device associated with the authorized user andthat is both physically distinct from the portable computing device andgeographically distant from the portable computing device, the computingdevice: generates a user interface operated by the authorized user,initiates transmission of the one or more wireless transmissions to theportable computing device in response to operation of the user interfaceby the authorized user, and periodically receives in accordance with thetime period interval the geographic location of the portable computingdevice at the user interface.
 19. The system of claim 18, wherein theone or more wireless signals include a backup command that causes theportable computing device to transmit at least a portion the data storedin its memory to remote storage.