Computer recovery or return

ABSTRACT

A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus includes a return screen that the processor automatically causes to appear during or after boot-up of the processor on the display, that displays information concerning an owner who owns the computer, concerning user information about who the user is who the computer is assigned to for use, and return information for returning the computer to the owner from data stored in the memory. A method for displaying information to assist with returning a computer to its owner.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation of U.S. patent application Ser. No. 15/864,749filed Jan. 8, 2018, which is a continuation of U.S. patent applicationSer. No. 15/601,645 filed May 22, 2017, which is a continuation of U.S.patent application Ser. No. 15/199,316 filed Jun. 30, 2016, now U.S.Pat. No. 9,672,388 issued Jun. 6, 2017, which is a continuation of U.S.patent application Ser. No. 14/691,222 filed Apr. 20, 2015, now U.S.Pat. No. 9,390,296 issued Jul. 12, 2016, which is a continuation of U.S.patent application Ser. No. 14/087,866 filed Nov. 22, 2013, now U.S.Pat. No. 9,021,610 issued Apr. 28, 2015, which is a continuation of U.S.patent application Ser. No. 10/945,332 filed Sep. 20, 2004, now U.S.Pat. No. 8,601,606 issued Dec. 3, 2013, which is a continuation-in-partof U.S. patent application Ser. No. 10/304,827 filed Nov. 25, 2002, allof which are incorporated by reference herein.

FIELD OF THE INVENTION

The present invention is related to the return of lost or stolencomputers. More specifically, the present invention is related to thereturn of lost or stolen computers using a recovery screen that appearsduring or after boot-up of the computer.

BACKGROUND OF THE INVENTION

Current methods of computer return or recovery products include:

(1) Physical Labels That Attach to the Outside Hardware of the ComputerEquipment.

These hardware labels can contain custom recovery information, butbecause they are hardware based, they can not be interactively changedby the owner. Also, since they do not have any ability to affect thecomputer boot-up process, they can do nothing to help protect theconfidential owner information on the hard drive. An example of a wellknown physical hardware/recovery label is the STOP Tag by SecurityTracking of Office Property in Connecticut. This labeling system hasbeen patented in France, the U.S., and other countries. The product canbe easily defeated by removing the physical label. In the case of STOPTag which includes a ‘recovery mark’ which states “STOLEN PROPERTY”underneath the label, a new label can be simply added over the ‘recoverymark’ to hide the STOLEN PROPERTY sign. (The Security Tracking of OfficeProperty equipment recovery patent is U.S. Pat. No. 5,163,711 Thispatent actually refers to how the labels adhere to the equipment—butthis is their patent).

The computer security recovery/return program of the present inventionutilizes this type of hardware recovery approach to a small degree, butis greatly different from this system, because this is a softwareprogram rather than a hardware solution. Additionally, the presentinvention is greatly superior, since the owner can interactivelycustomize the return/recovery information displayed at any time, and thepresent invention also helps protect the important, confidential ownerinformation on the hard drive, by the positioning of the program layerin the equipment boot-up process.

(2) Computer Software Programs That Attempt Recovery Through the Use ofthe Modem.

There are several patented computer security software products on themarket today that are designed for the purpose of recovering lost orstolen equipment. These programs use the computer's modem to regularlycall a recovery center. Then once a computer is stolen, the recoverycenter waits for the stolen computer to call in. When the computer modemcalls in, the recovery centers use something similar to the reverse 911system to get the phone number that the stolen equipment is accessing.Using the phone number, the recovery system then can try to get a map ofwhere the computer is. Some of these computer security recovery programscan also attempt to locate stolen computers through an IP address. Someof these computer security recovery software programs, can actuallyattempt to seize the communication between the stolen computer and therecovery center and delete selected files to help protect the owner'sconfidential information. Products like these include CompuTrace, PCPhone Home, CyberAngel, LapTrak and Luceria.

The present invention is also designed for the purpose of recoveringlost or stolen equipment, but the method is distinctively different andunique from the current methods. The present invention does not rely onthe use of the computer modem. The present invention uses a layeredprogram in the boot-up process to provide a display of the proper ownerrecovery and return information using the computer's own monitor orscreen. The present invention is also different and superior to theabove software tracking products, in helping to accomplish internationalrecovery. None of the above products to date have been able to use themodem phone or IP system to track stolen equipment internationally. Thepresent invention provides international recovery by displaying owneremail information as well as providing recovery help through aninternational recovery internet web site.

There are other differences as well in how these programs try to alsoprotect the information on the hard drive. The present inventionautomatically initiates during the boot-up process of the equipment, inorder to display the recovery/return information before a securityprompt screen to always help protect the owner's confidentialinformation on the hard drive. Some of the programs above do nothing toprotect the user information. Others like LapTrak include a Hide-A-Filefeature that an owner can access after the user enters the operatingsystem. CyberAngel includes an encryption feature. Luceria includes theability to delete pre-selected files from the recovery center. Bylayering this computer security application strategically before orduring a security prompt in the boot-up process, this applicationprovides a unique and different method to help protect ownerinformation.

(An example of patents for these types of products would be theCompuTrace U.S. Pat. Nos. 5,715,174, 5,764,892, and 5,802,280).

(3) Bios Based Password Identification Systems.

There are some computers that are sold with Bios based identificationsystems included. These products activate immediately when a computer isturned on, and prompt the user for a password before accessing the dataon the computer.

The present invention is very different and unique from the Bios basedprogram, for many reasons. Most importantly the bios based passwordidentification products are built into the hardware of the computerequipment—not the hard drive. In other words, if you removed the harddrive from a stolen or lost laptop, and inserted the stolen hard driveinto a different laptop, you would bypass the bios based passwordidentification system, and the bios based password identification systemwould remain with the original equipment. Thus, the Bios Based PasswordIdentification system can identify the computer hardware, but not thehard drive (the most important part of the computer equipment).

In addition, the Bios Based Password Identification systems are designedas a unique method for providing an additional layer of passwordprotection to the equipment hardware, but are not designed for recoveryor return. There is no design for including complete owner information,no recovery information displayed, no effective protection of theinformation on the hard drive, no effective method for the recovery orreturn of the hard drive—the most important item that a consumer wouldwant back. In fact the Bios Password Identification product occursbefore allowing the hard drive to boot up. The present invention isunique because it is an application software program that provides itslayer of protection during the boot-up process (not before), and thusallows the security product to move, with the hard drive, the mostcritical part of the computer.

SUMMARY OF THE INVENTION

The present invention pertains to a computer return apparatus. Theapparatus comprises a processor. The apparatus comprises a memoryconnected to the processor. The apparatus comprises a display. Theapparatus comprises a return screen that the processor automaticallycauses to appear during or after boot-up of the processor on thedisplay, that displays ownership information concerning who owns thecomputer and return information for returning the computer to the ownerfrom data stored in the memory.

The present invention pertains to a method for returning a computer toits owner. The method comprises the steps of activating a computer. Thenthere is the step of displaying automatically a return screen on adisplay of the computer during or after boot-up of the computer, whichdisplays information concerning owner information about who owns thecomputer and return information for returning the computer to the ownerfrom data stored in the memory of the computer.

The present invention pertains to a computer readable medium whosecontents cause a computer to show who is its owner by performing thesteps of activating a computer. Then there is the step of displayingautomatically a return screen on a display of the computer during orafter boot-up of the computer, which displays information concerningowner information about who owns the computer and return information forreturning the computer to the owner from data stored in the memory ofthe computer.

The present invention pertains to a computer return apparatus. Theapparatus comprises a processor. The apparatus comprises a memoryconnected to the processor. The apparatus comprises a display. Theapparatus comprises a return screen that the processor automaticallycauses to appear during or after boot-up of the processor on thedisplay, that displays information concerning an owner who owns thecomputer, concerning user information about who the user is who thecomputer is assigned to for use, and return information for returningthe computer to the owner from data stored in the memory.

The present invention pertains to a method for displaying information toassist with returning a computer to its owner. The method comprises thesteps of activating a computer. There is the step of displayingautomatically a return screen on a display of the computer during orafter boot-up which displays information concerning owner informationabout who owns the computer, concerning user information about who theuser is who the computer is assigned to for use, and return informationfor returning the computer to the owner from data stored in a memory ofthe computer.

BRIEF DESCRIPTION OF THE DRAWINGS

In the accompanying drawings, the preferred embodiment of the inventionand preferred methods of practicing the invention are illustrated inwhich:

FIG. 1 is a schematic representation of the apparatus of the presentinvention.

FIG. 2 is a representation of a return/recovery dialog box of anembodiment of the present invention.

FIG. 3 is a flow chart regarding an embodiment of the present invention.

FIG. 4 is a flow chart regarding a second embodiment of the presentinvention.

FIG. 5 is a representation of an administration program section of thepresent invention.

FIG. 6 is a representation of a return screen of the present invention.

FIG. 7 is an example of a password screen utilized by the presentinvention.

FIG. 8 is a return administration screen of the present invention.

FIG. 9 is a second return administration screen of the presentinvention.

FIG. 10 is a third return administration screen of the presentinvention.

FIG. 11 is a fourth return administration screen of the presentinvention.

DETAILED DESCRIPTION

Referring now to the drawings wherein like reference numerals refer tosimilar or identical parts throughout the several views, and morespecifically to FIG. 1 thereof, there is shown a computer 12 returnapparatus 10. The apparatus 10 comprises a processor 14. The apparatus10 comprises a memory 16 connected to the processor 14. The apparatus 10comprises a display 18. The apparatus 10 comprises a return screen 20that the processor 14 automatically causes to appear during or afterboot-up of the processor 14 on the display 18, that displays ownershipinformation concerning who owns the computer 12 and return informationfor returning the computer 12 to the owner from data stored in thememory 16. The Owner is defined as the person or entity that owns,rents, or licenses the Retriever, and/or the person or entity whocontrols the recovery service. The Owner has greater control over thecomputer 12 than the user. This could include, but not be limited to, anemployee of a company that owns the computer 12, or an agent of theowner or a friend that has the permission of the owner to use or have orrecover the computer 12.

Preferably, the apparatus 10 includes means for causing the screen toappear on the display 18 with the owner and return information. Thecausing means 22 is stored in the memory 16. The causing means 22preferably is a software program 24. Preferably, the memory 16 includesa primary operating system having an operating screen 26 for thecomputer 12, and the return screen 20 appears on the display 18 beforethe operating screen 26 of the operating system appears on the display18.

The software program 24 preferably appears before a security prompt suchas a password to be entered to obtain access to the primary operatingsystem of the computer 12. Preferably, the software program 24 allowsthe owner to change the return information and the owner information,after the password or security prompt is satisfied for the computer 12.The software program 24 is preferably able to communicate through amodem (or wireless) to a predetermined location to transfer the returninformation to the location to facilitate return of the computer 12 ifit becomes lost by the owner.

The present invention pertains to a method for returning a computer 12to its owner. The method comprises the steps of activating a computer12. Then there is the step of displaying automatically a return screen20 on a display 18 of the computer 12 during or after boot-up of thecomputer 12, which displays information concerning owner informationabout who owns the computer 12 and return information for returning thecomputer 12 to the owner from data stored in the memory 16 of thecomputer 12.

Preferably, the displaying step includes the step of displayingautomatically the return screen 20 before an operating screen 26 of theprimary operating system of the computer 12. There is preferably thestep of displaying the return screen 20 before satisfying a securityprompt such as entering a password into the computer 12 to access theprimary operating system. Preferably, there is the step of changing thereturn information, and the owner information after the step ofsatisfying a security prompt such as entering the password into thecomputer 12.

The present invention pertains to a computer 12 readable medium whosecontents cause a computer 12 to show who is its owner by performing thesteps of activating a computer 12. Then there is the step of displayingautomatically a return screen 20 on a display 18 of the computer 12during or after boot-up of the computer 12, which displays informationconcerning owner information about who owns the computer 12 and returninformation for returning the computer 12 to the owner from data storedin the memory 16 of the computer 12.

Preferably, the displaying step includes the step of displayingautomatically the return screen 20 before an operating screen 26 of theprimary operating system of the computer 12. There is preferably thestep of displaying the return screen 20 before satisfying a securityprompt such as entering a password into the computer 12 to access theprimary operating system. Preferably, there is the step of changing thereturn information and the owner information after the step ofsatisfying a security prompt such as entering a password into thecomputer 12.

In the operation of the invention, first, the owner of the computer 12would install the computer 12 security recovery/return software program24 application. The program could be installed to work on any type ofcomputer 12 screen including but not limited to, PC's, laptops, handheldcomputers (such as blackberries, palm pilots), UPS computerized handheldtracking display units, and even cell phone displays. The uniquerecovery/return computer 12 security program could in fact, be installedand used by any type of computer 12 that utilized a monitor displayscreen. The software application program provides an additional layer tothe existing operating system of each computer 12. The coding languageused for the software program 24 could and would vary depending upon thecomputer 12 equipment, but the core structure of how the programoperates would be similar in all items.

Once the computer 12 security software program 24 is installed, themonitor of the computer 12 will display the complete and currentrecovery/return information that the program has allowed the owner ofthe equipment to interactively enter, change and update at anytime.

This “on the fly” ability to change owner recovery information to aidreturn of equipment is an important feature for anyone, includingcollege students who travel from home to college during different partsof the year, people who move, and particularly business people whotravel throughout the world. The recovery/return information would notonly allow the display 18 of physical address return information, andowner contact telephone information, but would also provide forinternational internet based recovery through the added display 18 ofowner email information, as well as the ability to display aninternational recovery center web site.

In addition to increasing chances of return and recovery of the stolenor lost equipment by using the computer's 12 display 18 monitor, theprogram is an additional programming layer added into the initial startup program of the computer 12, so that the recovery/return display 18information occurs during or before a password or security promptscreen. This is an important feature that helps create an environmentwhereby the individual that happens upon a stolen or lost piece ofequipment will see the owner recovery/return information displayedbefore a password or security prompt screen. By automatically initiatingthis program during or before a user's security prompt, such as apassword screen program, the recovery/return program will not onlyincrease chances of recovery, but will also increase chances that thecomputer 12 information on the hard drive is protected while thecomputer 12 is not in the owner's possession.

For example, the actual step by step operation of the program is asfollows:

(1) Someone finds a lost or stolen computer 12. The person who finds thecomputer 12, turns the computer 12 on.

(The software program 24 could be provided with a warning sticker thatwill be placed on the outside of the equipment telling anyone findingthe equipment, about the program and the display recovery screen.)

(2) The computer 12 display 18 screen turns on. The computer 12 securitysoftware return/recovery program automatically initiates during thecomputer's 12 boot-up process.

(3) As the computer 12 booting up process moves the user to a passwordor security prompt screen, the computer 12 security software program 24displays a dialog box which includes owner recovery and returninformation, so that the person finding the equipment can return theequipment either directly or through the international web site recoverycenter. The information screen can include any of the following items ofinformation that the owner would like displayed including but notlimited to: contact name, organization name, owner address, ownertelephone number, owner email, international web site recovery site,international recovery email information, unique programserial/registration number. (See FIG. 2).

Virtually all of this information would have been interactively inputtedby the owner, and the owner would have control over how much recoveryinformation is displayed. (This is important, because some owners wouldlike all the available information displayed, and others would not. Forexample, a U.S. secret service agent, accountant, or military personnel,might only want his name and phone number displayed, and would not likethe organization name displayed for fear that would encourage a thief totry harder to break into the system rather than return the equipment.)

(4) The individual who has found the lost or stolen computer 12, is nowable to easily return the equipment to the rightful owner. Because thedisplay 18 screen showing the owner information is before, or during apassword or security prompt screen that occurs before allowing the userto access the full operating system, the person recovering the equipmentis blocked by the password or security prompt screen from accessing thedata, and is unable to avoid seeing the recovery information screen.

It is important to note only that the computer 12 security softwarerecovery/return program be displayed on the computer 12 screen monitorbefore, or during a password or security prompt display screen, becausethe operating system password screen creates a ‘wall’ before taking thecomputer 12 user to the computer 12 operating system. (See FIG. 3). Thishelps not only protect the owner's information on the hard drive, butalso ensures that the person finding the equipment will see the ownerrecovery/return information. If the program initiated after the passwordor security prompt screen, the person finding the lost or stolenequipment would have difficulty ever seeing the recovery/return display20.

It is also important to note that even through the recovery screendialog box would ideally be the first screen, this may not be possibledue to the wide variety of software operating systems used by computer12 systems. Each computer 12 security program will attempt to displaythe recovery information on the initial screen when possible. However,for one of the Window operating systems for example, the first boot-updefault screen is a CTR+ALT+DEL screen, and then the program can move toa password screen. In this case, the recovery/return program couldprovide a display 18 dialog screen that would be an additional layerbetween the CTR+ALT+DEL dialog box and the password dialog box. (SeeFIG. 4). Other operating systems could allow the program to display therecovery dialog box, with the password or security prompt at the bottomof the dialog box (so that even though the recovery dialog applicationis an additional layer during the boot-up, it would appear that thepassword or security prompt is included within the same dialog box).(See FIGS. 2 and 3). The recovery dialog box would occur before orduring the password or security dialog box that ‘blocks’ the user fromaccessing the operating system.

Operation Administration Feature:

The computer 12 security software recovery/return program would alsoinclude an administration section to the program through hard drive orremote. The operation of the administration section features could worklike this:

(1) The owner of the computer 12 would turn their machine on.

(2) As the boot-up begins, the owner sees the recovery/return display 18dialog box appear.

(3) The owner then may see a password or security prompt to allow theowner into the operating system.

(4) In the event that there is a security prompt, the owner types in thecorrect password or satisfies the security prompt to access the harddrive's operating system and programs.

(5) Once the owner gains access to the primary operating system, theowner will have the ability to select an administration section for thecomputer 12 security software recovery/return program through the StartUp button or a shortcut icon on the display 18 screen. (See FIG. 5). Theadministration dialog box will allow the owner to interactively changethe recovery/return display 18 information that appears in therecovery/return dialog box displayed during the boot-up process.

(6) There are additional features to the administration dialog box thatmay be added. Some of the features include:

a) added password or security protection prompt to allow the owner toaccess the administrative part of the program in order to change therecovery/return dialog display information,

b) interactive email based registration capability that would exportowner information to an international recovery center using theinternet,

c) a ‘where to order more licenses’ information screen (that could betailored to allow dealer/distributor contact information),

d) screen saver lock feature, and

e) possible audit log to track user activity.

There are at least 3 important features that are critical and unique tothe program, and make this program vastly different from other equipmentsecurity recovery products:

(1) The ability to display recovery/return information on the computer's12 monitor screen.

(2) The ability to make sure that the display 18 occurs before or duringa password or security prompt stopping the user from accessing the fulloperating system and hard drive information.

(3) The ability using an administrative program feature to allow theowner to interactively change the recovery/return information at anytime.

Installation of the program is simple. The owner would load aninstallation CD into the computer 12 equipment or download the programfrom the internet. During the installation process, the owner will beprompted to provide some recovery/return information that the ownerwould like displayed; for example, contact name, phone and emailinformation. The installation process will create the recovery/returndisplay 18 screen, input the owner information, and create anadministration section that can be accessed by the owner to be able tochange recovery information at any time. After installation is complete,the computer 12 will be rebooted, and the program installation will becomplete.

The program is essentially a recovery/return information screen that isdisplayed, and does not attempt to duplicate or replace moresophisticated access security programs already on the system. In theevent that there is a security access program on the system using apassword, security card, or biometric recognition device, therecovery/return screen 20 is ideally layered before the security screen(otherwise the recovery/return information would never bedisplayed—except to the owner since the person finding the equipmentwould not be able to enter the correct security information to get tothe return screen 20). In operation:

1) The equipment is turned on.

2) The equipment processor 14 begins to go through the steps necessaryto open up and allow access to the equipment's operating system. Thesesteps may involve displaying various visual screens, depending upon theequipment.

-   -   a) For example, a typical Gateway computer may have the        following series of displays:

At minimum needs to display before Operating System and should appearIdeal Return Dialog Display Spots before security prompt. MonitorGateway & Copyright MS Windows Microsoft Main self-test Gateway Promise98 Logo Password Primary display logo Technology display SecurityOperating display display Prompt System where user can begin using equip& programs

In this example, the recovery/return program would display before orwith the Microsoft password or security prompt.

-   -   b) Another example is with a Dell computer, which may have the        following series of displays:

At minimum needs to display before Operating System and should appearIdeal Return Dialog Display Spots before security prompt Dell Name MSWindows Copyright MS Ctr + Security Network Main and Logo 98 Logo ESSTech- Alt + Del Program that Prompts if Operating display ology displayPrompt Logon display uses a not connected System Windows where userpassword and can begin a physical using equip. access card & programs

-   -   c) Another example is with an AT&T Cellular phone, which may        have the following series of displays:

Ideal Display Spots for Return Display Program At minimum needs todisplay using OK prompt before operating system AT&T Name DisplayMain/Primary Operating System & Logo showing where user can begindisplay phone number using equip. & programs

3) The Return/Recovery owner information display screen is displayedbefore the main operating system. The Return/Recovery owner informationscreen has been customized by the owner (and can be interactivelychanged using an administrative program that can be accessed when theuser gets to the operating system).

4) Once the owner information dialog box is displayed, it remainsdisplayed until the user satisfies a security prompt and/or pushes an OKbutton or says “OK”. The security program prompt could include apassword that might need to be entered, a card access card that mightneed to be used, or a biometric impression that might need to be used,such as fingerprint, face, eye, or voice recognition system. Once thesecurity program is satisfied, the computer 12 program continues to themain operating system.

The definition of the “boot-up” process includes a series of steps thatthe computer 12 is taking (including the series of displays that theprograms are automatically displaying) in order to move the user togaining access to the main operating system. And, as can be seen fromthe 3 examples above, the booting up process entails different steps anddifferent display 18 screens on its way to the operating system.

It is important that

1) the Recovery/Return screen 20 be displayed before the operatingsystem, and

2) that the display remains displayed until the user does something(like pushes an OK button on the screen, or says OK for future voiceactivation programs, or satisfies a security prompt).

This software application:

should be layered before the main operating system,

and in the event that a security program exists,

should be layered before or during the security program prompt(otherwise the recovery screen would only be seen by the authorizedowner).

Security programs that currently exist could include:

a) entering a correct password (in the example of the current computersthat have a Microsoft password system already built in and available).

b) entering another type of security prompt such as future securityapplications with a voice activated security prompt, an access cardwhich needs to be within the vicinity of the computer 12, or even afingerprint or eye recognition security program (which are currentlyavailable).

The basic Recovery/Return computer 12 security software program 24 mayor may not include a security prompt feature as an option. The point ofthe program is that the recovery information can be customized,interactively changed, and displayed using the computer's 12 screen, andlayered at the correct point (before the operating system, and before orduring a security program prompt if a security program exists).

The present invention pertains to a computer 12 return apparatus 10, asshown in FIG. 1. The apparatus 10 comprises a processor 14. Theapparatus 10 comprises a memory 16 connected to the processor 14. Theapparatus 10 comprises a display 18. The apparatus 10 comprises a returnscreen 20 that the processor 14 automatically causes to appear during orafter boot-up of the processor 14 on the display 18, that displaysinformation concerning an owner who owns the computer, concerning userinformation about who the user is who the computer 12 is assigned to foruse, and return information for returning the computer 12 to the ownerfrom data-stored in the memory 16.

Preferably, the apparatus 10 includes means 22 for causing the screen toappear on the display 18 with the owner, user and return information.The causing means 22 is stored in the memory 16. The apparatus 10preferably includes means for changing the return information by theuser through remote communication with the computer 12. Preferably, thechanging means changes a security prompt by the owner, overriding anysecurity prompt entered into the computer 12 by the user. The apparatus10 preferably includes means for changing recovery information ofadditional computers 12 owned by the owner through remote communicationby the owner with the additional computers 12.

The present invention pertains to a method for displaying information toassist with returning a computer 12 to its owner. The method comprisesthe steps of activating a computer 12. There is the step of displayingautomatically a return screen 20 on a display 18 of the computer 12during or after boot-up which displays information concerning ownerinformation about who owns the computer 12, concerning user informationabout who the user is who the computer 12 is assigned to for use, andreturn information for returning the computer 12 to the owner from datastored in a memory 16 of the computer 12.

Preferably, the displaying step includes the step of changing the returninformation by the user. The changing step preferably includes the stepof changing the return information by the user through remotecommunication with the computer 12. Preferably, there is the step ofchanging a security prompt by the owner, overriding any security promptentered into the computer 12 by the user. There is preferably the stepof the owner changing recovery information of additional computers 12owned by the owner through remote communication by the owner with theadditional computers 12.

The Retriever is preferably a software program 24 that is disposed in amemory 16 of a computer 12 and at a remote station to allow an owner tocommunicate and control the computer 12, as needed.

The Retriever clearly distinguishes between the “Owner” of the equipmentand the person(s) “Assigned To” the equipment. See FIGS. 9 and 10.

The Owner is defined as the person or entity that owns, rents, orlicenses the Retriever, and/or the person or entity who controls therecovery service. The Owner has greater control over the computer 12than the user.

The Retriever allows the ability to distinguish between the ‘owner’ andthe ‘assigned to’ person who may be allowed possession of the equipment.These two entities can be the same, but very often are not. For example,a bank may be the owner of 5,000 laptops, and then issue them out to5,000 different employees. The Bank owns the laptops, and the employeesare the “assigned to” persons. Another example would be a company thatmay provide a recovery security service to equipment owners, and wouldalso be able to control the recovery screen information and displaythrough their recovery service.

The Retriever allows the ‘owner’ of the protected equipment toultimately control the recovery information displayed on the protectedequipment, not the user.

The current PDA recovery programs, for example, are all completelycontrolled by the equipment user. Again the ‘owner’ and ‘assigned to’user of the equipment may or may not be the same people, but theRetriever is unique because it allows the ability to distinguish betweenthe ‘owner’ and the ‘assigned to’ person. The Retriever allows the‘owner’ to have control over both the ‘owner’ recovery informationdisplayed AND the ‘assigned to’ recovery information displayed. The‘assigned to’ person(s) can only change or control the ‘assigned to’recovery information.

The Retriever also allows the owner ultimate control over the securityprompt, not the user.

The current PDA software recovery program gives ultimate control overthe security prompt to the user or ‘assigned to’ individual(s). The‘owner’ would want the ability to reassign the equipment to a newperson. The current PDA recovery program does not satisfy this need. Ifa disgruntled employee quits or gets fired and hands back their PDA witha unique secret password prompt and says they cannot remember thepassword, the current PDA recovery program makes it very difficult forthe owner to be able to regain control over the password prompt andassign the equipment to someone new.

Both the pocket PC, Palm and other handhelds do have the ability tocreate a screen on the monitor in conjunction with a password prompt.However, the design of these current programs are flawed, as evidencedby the fact that the program feature is rarely used, even thoughavailable.

The Retriever satisfies a need that the pocket PC, Palm and other PDArecovery programs do not. It is the ‘owner’ of the equipment that needsto have ultimate control of (1) the program, (2) the recovery screen and(3) the password—not the person who is using the equipment. There aremany reasons why this is important.

Examples. There is a school district in Virginia that issued 25,000laptops to students at the high school and middle school level lastyear. The school district owns the laptops—not the students assigned tothe equipment. The students are unlikely to care as much as the schooldistrict as to the loss of the equipment.

If the current PDA recovery software program 24 was loaded onto theselaptops, the kids could easily (and more than likely would) disable thesecurity prompt since it would be inconvenient to continually have tosatisfy a password prompt every time the computer 12 was turned on ortimed out. In addition, with the current PDA recovery system the ownerof the equipment (the school district) would loose control of not onlythe recovery information displayed on the monitor, but the password thatallows access to the equipment. The Retriever is unique since itdistinguishes between the ‘owner’ and the ‘assigned to’ person, allowsthe owner to have ultimate control over the display 18 screen, allowsthe ‘owner’ to override recovery information displayed by the ‘assignedto’ person if necessary, and allows the ‘owner’ to have ultimate controlof the password to access the equipment.

Individuals who are ‘assigned to’ equipment have inherently lessliability and concern if the equipment is lost or stolen than ‘theowner’. This is true for not only students, but employees at salesfirms, banks, accounting firms, corporations, healthcare facilities,high school students, university personnel, people who rent or leaseequipment, etc.

It is the ‘owner’ who should have ultimate control over securitydecisions regarding the equipment, not necessarily the person whohappens to be in possession of or assigned to the equipment. The currentPDA design causes an ‘inconvenience’ by creating an extra logon screen,and therefore, is not likely to be used by the equipment holder,especially if the equipment holder is not the owner. The owner needs theability to control whether the program is enabled, and thus ensure thatthe ‘assigned to’ person use the program if the owner desires for themto use it.

The current PDA recovery system design is indeed flawed. With thecurrent PDA recovery program, the user or person assigned to theequipment has complete and sole control over recovery information,complete and sole control over the security password, and complete andsole control over whether the security program is even enabled or not.These are some of the reasons that help explain why people that do havea PDA rarely use the recovery security feature available.

As further proof as to the inadequacy of this current program, is thefact that The World Computer Security Company of Colorado has sold“outside” glue on recovery labels to customers to protect hundreds ofPDAs, Palms, etc. that indeed already have the PDA recovery programmentioned by the patent office. In fact, this company recently sold acouple hundred of these glue-on security STOP Tag recovery labels thatwere PDA size this month to Bertek Pharmaceuticals and WashingtonUniversity St. Louis (June 2004). This is further proof that the currentprogram design is flawed and not commercially viable.

Most alarmingly, the current program does not take into account thatmany crime statistics suggest that 90% of all theft is internal(committed by those non-owners allowed access to property)!

Perhaps one of the most important and critical differences between the.Retriever and the existing programs is the type of communicationpossible made possible with the Retriever. The Retriever is designed toenable communication of the recovery display information back and forthfrom the recovery administration center to the equipment being protectedto control changes to the recovery display 18 screen, and thiscommunication from the recovery administration center is not limited toonly the hard drive of the equipment being protected or the computer 12that the equipment is synchronized with.

The recovery administration update center for the current PDA recoveryprogram is limited to the user updating the owner information directlyon the PDA, or directly on the computer 12 the PDA is set up tosynchronize with when accessing the PDA program on the main computer 12.This recovery display information can then be synchronized using the PDAsynchronize capability.

The Retriever's recovery administration update center can be anadministration program located on the hard drive of the protectedequipment, an administration program located on a server on a networkand/or an administration program located on a hard drive of a computer12 that is completely remote from the protected equipment, for example,a web based recovery center. This is an very unique and importantfeature.

The program design feature allows the ‘owner’ to access the recoverycenter administration program, initiate a download of changes to theprotected equipment, control the entire recovery screen displayed, andeven override the ‘assigned to’ person's input. This is an importantfeature, in case the ‘assigned to’ person is a disgruntled employee whosimply reports equipment as stolen and is still using the equipment orhas sold it. The Retriever program design allows the owner to makechanges at the recovery center level, have the recovery center attemptto communicate those changes to the ‘stolen equipment’ via phone line(or cable, wi-fi, bluetooth, satellite etc. in the future). This allowsthe owner to eliminate erroneous or misleading ‘assigned to’ recoveryinformation that might have been created by the rogue “assigned to”individual, replace the display 18 screen with correct owner recoveryinformation and even change or delete the ‘assigned to’ password to stopaccess to the equipment information. By attempting to disable the‘assigned to’ password from remote, the equipment becomes extremelydifficult if not impossible to use, the information on the hard drive isbetter protected, and the chances of a quick recovery of the stolenequipment are dramatically enhanced. This remote communication abilitymakes the Retriever design completely unique and very different from thecurrent PDA recovery software programs.

It is this remote communication ability in the design of the Retrieversoftware recovery program that helps better meet the challenges ofinternal theft (again many statistics suggest that it is internal theftthat comprises 90% of all theft). With the current PDA recovery program,the ‘owner’ is limited to only making changes directly on the ‘assignedto’ person's equipment and/or the ‘assigned to’ person's computer 12 orover a limited network that the assigned to person may never accessagain. With the Retriever's recovery software design, the ‘owner’ canalso attempt to access the ‘assigned to’ person's equipment byadditional ways, such as over the internet, phone lines, cable, etc.thereby having a more effective ability to try to locate the equipmentand control the recovery information displayed by remote.

The “assigned to” person can only control the “assigned to” recoveryinformation and password. The “owner” can control both the ownerinformation and all the “assigned to” recovery information at therecovery center level, and then attempt to communicate this to theprotected equipment using the Retriever licensed security recoveryprogram.

Using this unique communication power, both ‘owner’ and “assigned to”information can be uploaded to the recovery center and/or downloaded tothe protected equipment in order to synchronize the internationalrecovery center information and the recovery information displayed onthe initial display 18 screen. (This is a combination of the PDA type ofsynchronization between the main computer 12 and the PDA, and the McAfeeanti-virus software internet updating capability where every time you goon-line, your computer 12 automatically checks to make sure that youhave the most current anti-virus software and automatically updates yourcomputer 12 with the latest changes.) Nobody has ever before consideredor designed a product combining this type of communication ability withthis type of recovery security program that seizes control of thedisplay 18 monitor until a security prompt is satisfied. The Retrieverdesign allows an equipment recovery capability that just does not existon today's market, and is completely unique from all current products onthe market.

Current PDA Communication is limited:

User input/update PDA <---> User input/update Host Computer w/PDAprogram

The Retriever Design Communication is much broader:

Outside communication via phone line < ---- > Protected Computer < --- >Network Server cable, wireless, internet etc. user user input/updateinput/update  |  | User input/update on equip

The Retriever design has both a stand-alone and a network based program.This allows an owner to handle multiple machines easily fororganizations or entities with more than one equipment.

Each program license has a unique program registration license numberthat is unique. This is extremely important feature that allows manyfeatures that owners would need in handling the protection of multiplemachines. From looking at the current PDA security recovery software,the program appears to be only to have ‘single license’ capability.

The Retriever program design can also allow global changes by the ownerwho might handle multiple computers.

This is a very important feature for organizations who are in charge oflarge numbers of computers. For example, let's say that Sgt. Cody is thecrime prevention officer at Georgetown University and then retires.Let's say that Sgt. Grier is the contact person currently listed on 700university owned computers. Now Sgt. Smith is in charge. The Retrieverprogram design allows Sgt. Smith (assuming she uses the correctpassword), to access the recovery center and globally change all thecomputers that she wants to change and display her phone number and nameto help with recovery. This ability to allow the owner to globally makechanges to certain display information over multiple licensed computersis also extremely useful if a phone number changes, a corporate name orlogo changes, a recovery contact name changes or a phone number areacode changes.

The program also allows owners to easily tag or mark equipment that isready or available to be sold making it easy for new owners tore-register under the initial security software license registrationnumber. Let's say for example that ABC Telecommunications decided tosell 100 laptops that they are replacing with new ones. The owner orauthorized person representing the owner (the IT director for example)can preset the 100 serial license numbers as for sale to allow easiersales to new owners using organizations such as Ebay. New owners caneasily be allowed to re-register under the released registration numberthat is associated with the Retriever recovery license.

The program also allows owners to easily report equipment as stolen overthe internet. Owners can go to the recovery administration center, findthe license number of the equipment they believe might be lost orstolen, update the information for this specific license number andreport the information over the internet for all to see. This is veryhelpful resource for both owners and authorities to facilitate recoveryof lost or stolen items.

The security program can also not only display ‘owner’ and ‘assigned to’information but also display organization logos and/or other pictures ordesigns. This is another extremely important feature. The Retrieverprogram seizes control of the entire display 18 screen.

Many, many customers currently desire to customize their physicalsecurity tags with owner and logo information. This is often difficult,since the security label manufacturer has to get art design approval,fit corporate and logo information on an often limited space, and thenset the tool to run the special labels at the manufacturing plant. Leadtimes can often go over 3 weeks, and once the customer has their specialcustomized tag, they must often order a minimum amount (STOP Tag has aminimum order of 200 tags for customization for example). If the companychanges names, logos or phone numbers the physical security labelsuddenly becomes incorrect. And, when these customized security tagcustomers want to sell their equipment, it becomes difficult, since thesecurity label can permanently read ‘Property of ABC Corp”.

Let's say the company wants to donate 25 laptops to the church. A nun orother church personnel would not really want to be carrying aroundlaptops where the cover of the laptops state “Property of the US Army”,“Property of Waste Management Company”, or “Property of XYZ University”.This becomes awkward for the new owner who actually is the new rightfulowner, and cannot always easily remove the existing security label.

The Retriever provides an interactive method of designing and changingthe entire recovery screen ‘on the fly’ that eliminates all of thesecurrent problems. Organization logos or ads can be easily and quicklydownloaded onto the recovery screens of protected equipment. The currentPDA system does not allow this.

The Retriever creates an audit trail of changes. Time and Date fieldsregistering changes are logged and maintained at the recovery center toprovide the customer with a security audit trail of changes.

The Retriever display not only appears during the initial boot-up, butthe Retriever program security recovery display screen can also bemanually initiated by the computer 12 user. This would be theWorkstation Locked display. (FIG. 10). This allows the computer 12 userto manually lock the computer 12 screen and protect the computer 12 ifthey need to leave their computer 12 for a few minutes. This feature ishandy for all types of situations, like emergency room laptops athospitals, etc.

The Retriever display not only appears during the initial boot-up orwith a manual activation by the computer 12 user; the Retrieverworkstation locked recovery screen can also be initiated automaticallyusing a screen saver timer feature that can be changed by the Owner orthe Assigned To person. For example, let's say the computer 12 screensaver time feature has a 10 minute timer. If there is no activity on thecomputer 12, the Workstation Locked security Recovery screen willdisplay and stay displayed until the password prompt is satisfied.

The owner can browse the entire database of there own licensed Retrieversecurity software licenses. The owner can look at an individual licenserecord, or browse the entire database and use features such as EDIT,SORT, SEARCH/FIND, and EXPORT when working with the licensed records.

The Retriever provides the owner with extra data information fields thatowners can assign their own values to. These data fields are not reallyrelated to recovery information displayed, but this is a handyconvenience for owners who would like to correlate their own inventorynumbers to Retriever license numbers, search by lease dates onequipment, etc.

It should be noted that the communication ability is not limited tointernet communication. Satellite, WI-FI, cable, bluetooth, or any othertype of remote communication can be used.

Although the invention has been described in detail in the foregoingembodiments for the purpose of illustration, it is to be understood thatsuch detail is solely for that purpose and that variations can be madetherein by those skilled in the art without departing from the spiritand scope of the invention except as it may be described by thefollowing claims.

What is claimed is:
 1. A method for displaying information to assist with returning a computer comprising the steps of: activating a processor to display on a display screen on the computer which displays information concerning return information for returning the computer to an owner from data stored in a memory of the computer; initiating or changing return information which appears on the display through remote communication without assistance by a user with the computer, wherein the initiating or changing of the return information is done through an interactive program stored in the memory of the computer which is remotely accessed only by the owner of the computer or the party authorized by the owner to enable the initiating or changing of the display screen; displaying the screen before or with a security prompt which prevents the user from accessing operatively the computer; and activating the processor to allow a message to the user.
 2. The method as described in claim 1 including the step of selecting by the owner or user an Internet link on the screen, an Internet location associated with the Internet link stored in the memory of the computer, the owner or user is automatically able to access the computer and the Internet location associated with the Internet link.
 3. The method as described in claim 1 wherein the screen having an active link allowing remote communication to a remote server which provides return information to facilitate return of the computer.
 4. An apparatus for displaying information at a computer owned by an owner which can be used by an owner or user, the apparatus comprising: a computer comprising; a memory; a display; and a processor in communication with the display and the memory which displays on the display with the computer recovery information for returning the computer to an owner from data stored in the memory of the computer to facilitate return of the computer so the recovery information is visible to anyone viewing the display, the processor initiating or changing the recovery information through remote communication without assistance by the user with the computer, wherein the initiating or changing of the recovery information is done through an interactive program stored in the memory of the computer and which is remotely accessed only by the owner of the computer or the party authorized by the owner to enable the initiating or changing of the recovery information on the display.
 5. The apparatus as described in claim 4 wherein the display includes an Internet link that can be selected by the owner or user, an Internet location associated with the Internet link stored in the memory of the computer, the owner or user is able to access the computer and the Internet location associated with the Internet link.
 6. The system as described in claim 4 wherein the display having an active link to allow remote communication to the remote server which provides recovery information to facilitate return of the computer.
 7. A computer program stored in a non-transient memory for displaying information to assist with returning a computer to its owner comprising the computer generated steps of: displaying by a processor on a display of the computer which displays recovery information for returning the computer to an owner from data stored in a memory of the computer to facilitate return of the computer and which is maintained on or before or with the lock screen so the recovery information is visible to anyone viewing the display; and initiating or changing the recovery information through remote communication without assistance by the user with the computer, wherein the initiating or changing of the recovery information is done through an interactive program stored in the memory of the computer and is remotely accessed only by the owner of the computer or the party authorized by the owner to enable the initiating or changing of the recovery information. 