Portable computer supporting paging instructions

ABSTRACT

A portable computer is described that contains a circuit for receiving pages and performing security functions based on the received page. Once a page has been received by the portable computer, the computer&#39;s hard drive can be automatically reformatted, or the portable computer can be prevented from booting. In addition, the portable computer can be programmed to use a modem to automatically dial a security center and transmit security information such as the Caller ID Tag of the current telephone number.

RELATED APPLICATIONS

[0001] This application is a continuation of, and incorporates byreference. in their entireties, U.S. patent application Ser. No.10/349,516 entitled “PORTABLE COMPUTER SUPPORTING PAGING FUNCTIONS,”filed on Jan. 21, 2003, which is a continuation of U.S. Pat. No.6,518,874, issued on Feb. 11, 2003 entitled “PORTABLE COMPUTERSUPPORTING PAGING FUNCTIONS” and U.S. Pat. No. 6,522,242, issued on Feb.18, 2003 entitled “METHOD FOR INFORMATION RECEPTION IN A PORTABLECOMPUTER,” both of which were filed on Jun. 17, 1998.

FIELD OF THE INVENTION

[0002] This invention relates to portable computer systems.Specifically, this invention relates to portable computer systems havingintegrated circuits for receiving and processing paging messages.

BACKGROUND OF THE INVENTION

[0003] Over the past several years, personal communication devices suchas pagers and cellular telephones have become widely used in bothbusiness and personal environments. Fast and reliable communication hasmade it much easier for people to travel from their home or officewithout becoming unavailable to co-workers or others. The advent ofportable computers has also encouraged this trend, as many peopleperform a large amount of their duties using computing devices, and theportable or “laptop” computer further enhances the ability of people toremain productive while traveling.

[0004] More recently, pagers have been introduced into the market withincreased data handling capabilities. As one example, the PageWriter™2000 manufactured by Motorola is a two-way pager with a keyboard andgraphical display which sends Internet e-mail and has automated messagehandling capability. In addition, computing devices have been enhancedwith additional communication capabilities. U.S. Pat. No. 5,550,861 toChan et al. for example, describes a PCMCIA format card for laptopcomputing applications which includes an onboard modem and pager unit.

[0005] Despite these trends in combining communication and dataprocessing capabilities, little progress has been made in takingadvantage of the available benefits of the combined implementation ofsuch devices. The current state of the art consists essentially ofconventional communication functions coupled to conventional dataprocessing functions, thereby producing one device which may combinepreviously available features but which does nothing to provideadditional functionality. In addition, advantageous hardwareimplementations of such combinations have not been explored.

SUMMARY OF THE INVENTION

[0006] The invention comprises a portable computer which includes awireless receiver. The wireless receiver may be adapted for receivingpages. In some embodiments, the portable computer includes a pageinterpreter coupled to the page receiver so as to translate selectedpage messages into commands to be executed by the portable computer.

[0007] Another embodiment of the invention comprises a computing devicewhich includes a microprocessor, a microcontroller coupled to themicroprocessor; and a wireless receiver coupled to the microcontroller.The computing device may further include a battery, coupled to themicrocontroller and the wireless receiver such that the microcontrollerand the wireless receiver are operative to receive and store messageswhen the microprocessor is in an off state.

[0008] Messages received via a page receiving circuit may in someembodiments of the invention be classified into two groups. A volatilememory circuit may store messages of a first group, and a non-volatilememory may store information concerning message content for messages ofa second group. Messages of the second group may comprise commands tothe portable computer.

BRIEF DESCRIPTION OF THE DRAWINGS

[0009]FIG. 1 is a block diagram illustrating a portable computer systemincluding a processor, bridge chipset, microcontroller and pager unit.

[0010]FIG. 2 is a flow diagram illustrating the process of receiving apage and activating a user notification.

[0011]FIG. 3 is a flow diagram illustrating the process of receiving apager command and performing a security function.

[0012]FIG. 4 is a flow diagram of a process of locking a computer once asecurity code has been received.

DETAILED DESCRIPTION OF THE INVENTION

[0013] The invention will now be described with reference to theaccompanying Figures, wherein like numerals refer to like elementsthroughout. It may initially be noted that the terminology used in thedescription presented herein is intended to be interpreted in itsbroadest reasonable manner, even though it is being utilized inconjunction with a detailed description of certain specific embodimentsof the invention.

[0014] Embodiments of the invention include portable computers havingintegrated pager circuitry for receiving messages through a wirelesscommunication network. Although a wireless receiver is a generic circuitprovided in any type of wireless communication device including radios,cellular telephones, televisions, etc., a pager is a specific type ofwireless communication device which is adapted to receive (and sometimestransmit) numerical or alpha-numerical data over a dedicated pagerfrequency band, such as 940-941 MHz for example. As used herein, theterm “pager” refers to any wireless receiver with the capability toreceive transmissions of numerical or alpha-numerical data over adedicated paging system, whether public or private, and which may beimplemented in whole or in part through the public telephone network,satellite systems, base stations, etc. In the embodiments describedbelow, a wireless receiver which may advantageously comprise a pagerunit is integrated into a portable computer so that numerical oralpha-numerical codes can be sent to the portable computer for furtherprocessing by the portable computer.

[0015] Referring now to FIG. 1, a portable computer 10 includes aprocessor 20 in communication with a host bus 22. The processor 20 maybe any conventional microprocessor such as an Intel Pentium, IntelPentium II, Digital Equipment Corporation Alpha or Motorolamicroprocessor. The host bus 22 communicates data between the processor20 and a bridge circuit 24. The bridge circuit 24 can include one ormore discreet components that provide data communication between theprocessor 20 and other components within the personal computer 10.Bridge circuits 24 incorporating the functionality shown in FIG. 1 areknown in the art, and are commercially available from, for example,Intel Corp., as the 430TX chipset. The bridge circuit 24 is linked to acache memory system 30 and a main memory system 32. The cache memorysystem 30 provides conventional cache functions for buffering data readsand writes to the main memory system 32.

[0016] In addition, the bridge circuit 24 is linked to a systemmanagement bus (SMBUS) 38 and a peripheral component interconnect (PCI)bus 40. In conventional computers, the PCI bus transfers data betweenperipheral devices and the bridge chip set 24. The SMBUS 38 providescontrol signals for managing several high-level functions within theportable computer 10. For example, the SMBUS 38 may communicate signalsindicative of the remaining battery power in the portable computer froma battery to the processor 20. In addition, the SMBUS 38 might providesignals relating to power management features within the portablecomputers such as screen blanking, hard disk powering, and otherfeatures that allow a portable computer to extend its battery life. Mostcommercially available laptop computers include a standard format systemmanagement bus, and further description of its structure andcommunication protocol is not required to understand the presentinvention.

[0017] In one embodiment of the invention, the system management bus 38is linked to a microcontroller 50. The microcontroller can be anyconventional microcontroller available from several commercial sources.One suitable commercially available microcontroller is the model 68HC11from Motorola Corporation. The microcontroller 50 can store and retrievedata from a memory 52. The memory 52 can be any type of data storagedevice including Dynamic Random Access Memory (DRAM), Static RandomAccess Memory (SRAM), Erasable Programmable Read Only Memory (EPROM) orElectrically Erasable Programmable Read Only Memory (EEPROM). As will beexplained more fully below, the memory advantageously comprises abattery powered SRAM portion and a EEPROM portion. Furthermore, althoughillustrated in FIG. 1 as separate components, some or all of the memory52 may be incorporated into the microcontroller 50. The Motorola 68HC11mentioned above, for example, includes internal EEPROM. In oneembodiment, the memory 52 stores security codes that, when received bythe microcontroller 50, will be translated into a signal on the SMBUS38.

[0018] As shown in FIG. 1, the microcontroller 50 communicates with apager unit 56 having a receiving antenna 58. The pager unit 56 itselfmay comprise a conventional wireless receiver circuit with the abilityto receive numeric or alpha-numeric data and transmit that data to themicrocontroller 50. These circuits are well known to those of skill inthe art, and are not described further herein.

[0019] The pager unit 56, microcontroller 50, and memory 52 may all beconnected to a dedicated battery supply 60, which is advantageouslyseparate from the battery which powers the remainder of the portablecomputer. With a separate battery supply 60, not only can pages bereceived and processed when the portable computer 10 is turned off, butpages can be received and processed even if the battery pack provided topower the portable computer as a whole is removed entirely. This featureis significant with reference to several security functions implementedas described in more detail below.

[0020] When the portable computer is paged, the pager unit answers thepage, receives the message contained in the page, and sends this messageto the microcontroller 50. The microcontroller 50 stores the message inthe memory 52. Due to the presence of the battery backup 60, thisprocess can be performed while the computer is off, or even when themain battery pack for the computer is removed. If several pages arereceived when the computer is off, the messages will continue to queuein the memory 52 until the microprocessor is available to retrieve andprocess them.

[0021] It is one advantageous aspect of the invention that the messagesreceived by the pager and acted upon by the portable computer may beclassified into two distinct groups. A first group of messages comprisesinformation sent to the portable computer for viewing by the portablecomputer user. This class of page corresponds to many conventionalpaging alphanumeric messages which include telephone numbers to returnphone calls to, short textual messages from the paging party, etc. Thisclass of page also corresponds to existing “global” pages, includingstock or weather reports, or other information which is broadcast tolarge number of subscribers at approximately the same time. A secondgroup of messages comprise commands which instruct the computer toperform a function specified in the page. As will be explained below,advantageous functions performed in response to pages include securityfunctions which may be initiated by the portable computer user with apage if the computer has been stolen.

[0022] Referring now to FIG. 2, a specific embodiment of a process 100of servicing pager messages is described. The process illustrated inFIG. 2 is especially adapted to the reception and processing of pagermessages of the first group described above, although it will beappreciated by those of skill in the art that many of the stepsperformed will be the same for page processing of messages of bothgroups. The process 100 begins at a start state 102 and then moves to adecision state 104 to determine whether a page message has been receivedby the portable computer 10. When implemented with the hardware of FIG.1, this step may be accomplished by periodically evaluating one or morestatus flags in the microcontroller 50 which are set if page messageinformation which has not previously been forwarded to themicroprocessor is resident in the memory 52. If a page message has notbeen received, the process 100 continues looping at the decision state104 until a message is received. If a message has been received, theprocess 100 moves to a state 106 wherein the microcontroller 50 forwardsan interrupt on the SMBUS 38 to the processor 20. The SMBUS interruptindicates to the processor 20 that the microcontroller 50 has data thatneeds to be retrieved, and causes the microprocessor to perform a pageservice subroutine.

[0023] The processor 20 then services the request made by the pagermicrocontroller 50. The process 100 moves to a state 110 wherein themessage received by the pager unit 56 and stored in the memory 52 isretrieved by the processor 20 and stored on, for example, the hard diskdrive of the portable computer. A determination is then made at adecision state 112 whether additional messages have been stored in thememory 52 which have not been retrieved by the processor 20.

[0024] If a determination is made that more messages have been received,they are retrieved and stored at the state 110 as before. However, ifmore messages have not been received the process 100 moves to a state116 wherein the user is notified that one or more pages have beenreceived. The pages may be displayed and read with a simple text editorprogram or other user application software. It should be noted, however,that in some embodiments the user may not be notified of the page. Forexample, some types of security programs may be designed to bypass theuser notification.

[0025] Once a user notification has been activated at the state 116, theprocess 100 returns to the decision state 104 and waits for additionalpage messages to be received. It will be appreciated by those of skillin the art that many different hardware and software implementations ofthe above described procedure are possible. One alternativeimplementation may involve a memory resident page servicing programwhich automatically retrieves queued messages received since thecomputer was last powered up, and when the computer is on, periodicallypolls the microcontroller for additional page messages.

[0026] As mentioned above, it is one aspect of the invention that theportable computer not only receives and displays standard personal andglobal pages for the computer user, but may also evaluate the content ofthe page so as to interpret the page as a command to perform aparticular function. Computer activity based on page content has notbeen performed prior to the present invention. Thus, a portable computerin accordance with the present invention may include not just pagereception and display circuitry, but may additionally include a pagecontent interpreter.

[0027] One advantageous application of this feature of the inventionincreases the security of portable computing platforms. This provides asubstantial improvement over existing laptop computers as some of theadvantages of portable computers, such as their small size and lightweight are also disadvantages in that they can be easily stolen.Increases in laptop security is one example of enhanced functionalityprovided by a computer/pager in accordance with the invention.

[0028] Specific implementations of processes by which the computerperforms functions in response to pages are explained with reference toFIGS. 3 and 4 below. Advantageously, some of these functions may berelated to computer security. Referring now to FIG. 3, a general pageimplemented computer command procedure is described. This process beginsat a start state 140 and moves to a state 142 wherein the processor 20retrieves a page from the microcontroller 50. In contrast to theprocedure described in conjunction with FIG. 2, however, the content ofthe page retrieved in this case is not merely a message for the portablecomputer user, but is actually a command to be performed by the portablecomputer. Thus, in conjunction with retrieving and storing receivedpages, the page servicing routing performed by the processor 20 maysearch the alphanumeric contents of the received pages for particularstrings of characters, wherein selected strings are respectivelyassociated with selected commands to be performed by the processor 20.If a match is found, the process then moves to a state 146 wherein theprocessor performs the function requested by the page. The process thenterminates at an end state 148.

[0029] Although it will be appreciated that a wide variety of commandsmay be issued to the computer in this way, some specific advantageouscommands include commands to perform security functions in the event theportable computer is stolen. In one embodiment, the received page caninitiate an audible alarm from the internal speaker. In otherembodiments, the owner can send a numerical page to the portablecomputer, which, when received, runs a more complicated securityprogram. For example, the portable computer may, in response to a givenpage code, reset or reformat the hard disk drive, check the hard diskdrive geometry, and/or write a selected pattern to all sectors of thehard disk drive. This may eliminate not only sensitive data from thehard disk drive, but also application programs of interest to computerthieves, resulting in a decrease in value of such a portable computer toa potential thief.

[0030] Computer tracking with page codes is also possible for portablecomputers with a modem. In this embodiment, the portable computer may becommanded via a page to run a security program which periodicallydetermines if a telephone line is linked to the computer's telephonemodem. If a telephone line is detected, the security program mightinstruct the telephone modem to turn off the speaker and silently dial apredetermined phone number of a computer at a security company or othersecure location. Once the portable computer is connected to the computerat the security company, information can be sent related to the locationof the portable computer. For example, in one embodiment, the portablecomputer may contain instructions for sending the owner's name, addressand the Caller ID tag of the phone line being used to make the call tothe security center. Thus, security personnel at the security centerwill know the name of the real owner of the portable computer and thetelephone number of the location at which the computer is currentlylocated.

[0031] Either as a standalone security feature, or in conjunction withthe above functions, a predetermined numerical page code issued to theportable computer may additionally cause the portable computer todisable the boot process so that the computer may not be re-started. Thelocked computer is therefore useless to the thief. Reactivation of thecomputer may be implemented by sending a second page to the computerwith an alphanumeric code which removes boot limitation set by the firstpage. In this embodiment, the BIOS may, when booting the computer atpower up, retrieve one or more status bits from the memory 52 todetermine whether or not the boot sequence should be halted or modified.These status bits are in turn set when an appropriate page code isreceived by the portable computer. In some advantageous embodiments, themicrocontroller 50 is programmed to search received pages for selectedalphanumeric sequences, and in response thereto, to set or clear theabove mentioned status bits accordingly. The memory 52 may include someEEPROM memory to store these status bits so that they will not be erasedeven if the computer battery pack and the additionalpager/microcontroller battery 60 are removed. It can thus be appreciatedthat in some embodiments of the invention, at least some pageinterpretation and processing, in addition to the function of storingpage messages for later retrieval, may be done by the microcontroller50, rather than only by the microprocessor 20. The portable computer mayadvantageously include a page receiver setup program which allows theuser to choose the codes that either the microcontroller 50 and/ormicroprocessor 20 will interpret as selected security commands. Accessto this program may itself be password protected, to inhibit thieves orother unauthorized users from reprogramming these security codes.

[0032] A specific example of a BIOS boot sequence in accordance withthis implementation of the invention is provided in FIG. 4. Referringnow to this Figure, a boot process 150 begins at a start state 152 andthen moves to a state 154 when the portable computer 10 is turned on.The process 150 then moves to a state 156 wherein the computer BIOSretrieves a status code from the microcontroller 50. As discussed above,this status code may comprise a security code which has been set to aparticular configuration and stored in the memory 52 in response to aprior page sent to the portable computer by the user. As is known in theart, the Basic Input/Output System (BIOS) is firmware that controls acomputer's bootup sequence. The BIOS is normally stored in aprogrammable read only memory such an EPROM or EEPROM. Thus, the BIOScan be programmed at the factory to search for a particular securityflag during every boot. Once the BIOS has read a security code from themicrocontroller or its associated memory, the process 150 moves to adecision state 160 to determine whether the status of the computer isokay. Thus, if the computer has received a numerical or alpha-numericalpage instructing the computer to no longer boot, the microcontroller 50asserts a flag instructing the BIOS to bypass the bootup sequence. Thus,at the decision state 160, a determination is made whether such a lockuppage code has been received.

[0033] If the status is okay at the decision state 160, the process 150completes the boot sequence at a state 164. However, if the status isnot okay, indicating that a security page has been received, the process150 aborts the normal boot sequence at a state 166 and then proceeds toa decision state 170 to determine whether an additional security commandhas been stored in the memory 52. The additional command, for instance,might be to instruct a telephone modem within the portable computer 10to dial a predetermined telephone number and transmit the Caller ID tagof the phone where the portable computer is located. As one alternativeexample, the additional command may instruct the portable computer toreformat the hard disk drive.

[0034] If a determination is made at the decision state 170 that astored security command should be performed, the process 150 moves to astate 174 wherein the command is performed. However, if a determinationis made at the decision state 170 that an additional security commandhas not been stored by the user via page the boot process of theportable computer 10 is terminated at a state 176. Once a securitycommand has been performed at a state 174 (if required), the process ofbooting is also terminated at the state 176. Thus, if the portablecomputer has received a predetermined code that is associated with themicrocontroller 50 preventing the portable computer 10 from booting, theportable computer will continue to terminate its boot sequence at thestate 176. It can be appreciated that if the computer is laterrecovered, an additional, different code can be sent to the pager unit56 to instruct the microcontroller 50 to clear the status code set withthe prior page to indicate that the status of the computer at thedecision state 160 is now okay. Thus, the computer will no longer beprevented from booting. Defeating the above described security system isvery difficult for a computer thief. Without knowledge of the pagesecurity codes programmed in by the user, the thief cannot clear any setsecurity flags. Furthermore, the dedicated battery supply 60 preventsthe thief from blocking the reception of a security page by removing thecomputer battery pack.

[0035] The following scenario describes one type of security functionwhich may be performed by embodiments of the portable computer. Theowner of a portable computer may send a pager code to the portablecomputer after realizing that it has been stolen. To send a page, theowner dials a telephone number corresponding to the pager unit 56, andenters in the predetermined security code such as “99999.” The code“99999” may instruct the computer to terminate any future boot sequenceand re-format the hard disk drive to prevent access to any sensitivedata present there.

[0036] In a few moments, the pager unit 56 receives the code “99999” andtransfers that code to the microcontroller 50. If the portable computeris turned off, the battery 60 continues providing power to the pager 56,microcontroller 50 and memory 52 so that pages may be received andprocessed.

[0037] As can be appreciated from the discussion presented above, thepage “99999” may be processed by the portable computer in a variety ofways. For example, the microcontroller 50 firmware may initiallyevaluate the content of the page to determine if the “99999” codecorresponds to a particular pre-determined function or comprises simplya typical alphanumeric message for the computer user. If themicrocontroller firmware identifies the code “99999” as being a securitycode, it may set one or more EEPROM status bits that are later evaluatedby the BIOS of the portable computer so as to instruct themicroprocessor 20 to exit the normal boot sequence and initiate alow-level format of the hard drive. Alternatively, the microcontroller50 may not be programmed to evaluate the content of the pages received,and may simply store the “99999” in memory 52 for later retrieval andinterpretation by the microprocessor 20.

[0038] If the portable computer is powered up at the time this page code“99999” is received, the microcontroller 50 may forward this code to theprocessor as part of the usual page processing program. The receivedpage codes nay be evaluated by the processor 20 to check for codes suchas the “99999” and, when received, cause the processor 20 to beginreformatting the hard drive.

[0039] It can be appreciated that many types of functions may beperformed by the microcontroller 50 and/or the microprocessor 20 once apage has been received. The microcontroller 50 or an associated memorycould store hundreds of codes, with each code being associated with aparticular function to be carried out once the page is received.

[0040] While the invention has been described in connection withspecific embodiments thereof, it will be understood that it is capableof further modification, and this application is intended to cover anyvariations, uses, or adaptations of the invention following, in general,the principles of the invention and including such departures from thepresent invention as would be understood to those in the art asequivalent and the scope and context of the present invention is to beinterpreted as including such equivalents and construed in accordancewith the claims appended hereto.

What is claimed is:
 1. A method of manufacturing a device havingsecurity functions, the method comprising: configuring the device toreceive information via a wireless receiver; providing a resettablestatus flag in a memory of the device; configuring a processor of thedevice to set the status of the flag based at least in part on thecontent of the information received via the wireless receiver; andproviding the device with computer instructions that, when executed bythe processor, perform a security function that comprises: determiningthe status of the flag; and if the flag is in a predetermined state,determining whether the device is connected to a communications networkvia a modem, and transmitting information indicative of the location ofthe device with the modem.
 2. The method of claim 1, wherein wirelessreceiver is located in the device.
 3. The method of claim 1, wherein apublic switched telephone network is utilized in order to transmitinformation indicative of the location of the device.
 4. The method ofclaim 1, wherein the information indicative of the location of thedevice comprises a caller ID tag.
 5. A device having a securityfunction, the device comprising: a wireless receiver; and computerinstructions operative to cause the device to perform the following:define a code to correspond with one or more security functions, whereinthe code comprises alphanumeric characters and is reprogrammable andcustomizable by an end-user; receive via the wireless receiverinformation corresponding to the code; and execute the security functioncommands in response to receiving the information.
 6. The computingdevice of claim 5, wherein the device comprises a portable computingdevice.
 7. The computing device of claim 6, wherein the computing devicecomprises a portable computer.
 8. The computing device of claim 5,wherein the wireless receiver comprises a page receiver.
 9. Thecomputing device of claim 8, wherein the device is configured to receivea page message.
 10. The computing device of claim 5, wherein the deviceis configured to execute a security function command comprising alteringexisting data stored on a memory of the device.
 11. The computing deviceof claim 10, wherein the device is configured to execute a securityfunction command comprising activating an audible alarm.
 12. Thecomputing device of claim 10, wherein the device is configured toexecute a security function command comprising altering the performanceof a subsequent boot sequence of the device.
 13. An apparatus having asecurity function, the apparatus comprising: a security setup programconfigured to allow an end-user to customize a code to correspond to oneor more security function commands, wherein the code comprisesalphanumeric characters; means for receiving information from a remotedevice; a memory for storing information received via the receivingmeans, wherein the information comprises the code; and a microprocessorconfigured to perform the security function commands in response to theapparatus receiving the information.
 14. The apparatus of claim 13,wherein the setup program is configured to allow an end-user tocustomize the code more than one time.
 15. The apparatus of claim 13,wherein the apparatus comprises a portable computing device.
 16. Theapparatus of claim 15, wherein the apparatus comprises a portablecomputer.
 17. The apparatus of claim 13, wherein the end-user customizesthe code using at least one of a keyboard, keypad, stylus, or pointerdevice.
 18. The apparatus of claim 13, wherein the microprocessor isconfigured to perform a security function command comprising alteringdata stored in a memory of the device.
 19. The apparatus of claim 13,wherein the microprocessor is configured to perform a security functioncommand comprising activating an audible alarm.
 20. The apparatus ofclaim 13, wherein the microprocessor is configured to perform a securityfunction command comprising altering the performance of a subsequentboot sequence of the device.
 21. The apparatus of claim 20, whereinaltering the performance of a subsequent boot sequence comprisesterminating the boot sequence if the code indicates that the device islost or stolen.
 22. The apparatus of claim 13, further comprising amodem, wherein the microprocessor is configured to perform a securityfunction command comprising instructing the modem to dial apredetermined telephone number and transmit a caller ID tag of a phoneline to which the modem is connected.
 23. A device comprising: aconfiguration module configured to allow an end-user to establish one ormore security codes, wherein each of the one or more security codes isassociated with at least one of a plurality of security functions; and amicrocontroller configured to receive from a remote device informationrepresentative of at least one of the security codes, wherein saidinformation is stored in a memory of the device.
 24. The computingdevice of claim 23, wherein the microcontroller causes the device toexecute the at least one of said security codes.
 25. The computingdevice of claim 23, wherein the security codes are stored in anon-volatile memory readable by the device.
 26. The computing device ofclaim 23, wherein the information representative of at least one of saidsecurity codes is received via a wireless communication link.
 27. Thecomputing device of claim 23, wherein the information representative ofat least one of said security codes is received via a paging devicecoupled to the device.
 28. The computing device of claim 23, wherein theat least one of said security codes, when executed, causes data on atleast a portion of an existing memory of the device to be altered. 29.The computing device of claim 28, wherein the existing memory comprisesa hard drive.
 30. The computing device of claim 23, wherein the at leastone of said security codes, when executed, causes an audible alarm toactivate.
 31. The computing device of claim 23, wherein the at least oneof said security codes, when executed, causes the performance of asubsequent boot sequence of the device to be altered.
 32. A devicecomprising: a wireless receiver configured to receive information from aremote device, wherein said information indicates a state to whichstatus information stored at the device should be set; and a securitysetup program configured to allow an end-user to customize one or moreboot sequence operations, wherein at least one of the boot sequenceoperations is executed by the device depending on the state of thestatus information.
 33. The device of claim 32, wherein the state of thestatus information indicates a customized order for execution of aplurality of boot sequence operations.
 34. The device of claim 32,wherein the status information indicates that the device should executea predefined series of boot sequence operations.
 35. The device of claim32, wherein the status information comprises a plurality ofalpha-numeric characters.
 36. The device of claim 32, wherein the statusinformation comprises a flag bit.
 37. A device comprising: a wirelessreceiver configured to receive a boot sequence information, wherein theboot sequence information identifies at least one of a plurality of bootsequence operations for the device; and a receiver configured to receivethe boot sequence information from the wireless receiver; and aprocessor configured to initiate execution of the identified at leastone of a plurality of boot sequence operations.
 38. The device of claim37, wherein the boot sequence information comprises a plurality ofalphanumeric characters.
 39. The device of claim 38, wherein the bootsequence information contains at least one string of characters that isassociated with a boot sequence operation.
 40. The device of claim 38,wherein the boot sequence information contains at least one string ofcharacters that is associated with a plurality of boot sequenceoperations.
 41. The device of claim 37, wherein the boot sequenceinformation comprises a flag bit.
 42. A method comprising: storing in adevice one or more security codes, wherein each of the one or moresecurity codes is associated with at least one of a plurality ofsecurity functions and the one or more security codes are established byan end user; and receiving at the device information representative ofat least one of the security codes, wherein the device is configured toinitiate the at least one of a plurality of security functionsassociated with the security code represented in the receivedinformation.
 43. The method of claim 42, wherein the device comprises awireless receiver and the information is received at the wirelessreceiver of the device.
 44. The method of claim 42, wherein the devicedoes not indicate to a user that the information representative of atleast one of the security codes has been received.
 45. The method ofclaim 42, wherein the device automatically initiates the at least one ofa plurality of security functions associated with the security coderepresented in the received information.