Computer recovery or return

ABSTRACT

A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus includes a return screen that the processor automatically causes to appear during or after boot-up of the processor on the display, that displays information concerning an owner who owns the computer, concerning user information about who the user is who the computer is assigned to for use, and return information for returning the computer to the owner from data stored in the memory. A method for displaying information to assist with returning a computer to its owner.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation of U.S. patent application Ser. No. 14/591,222filed Apr. 20, 2015, now U.S. Pat. No. 9,390,296, which is acontinuation of U.S. patent application Ser. No. 14/087,866 filed Nov.22, 2013, now U.S. Pat. No. 9,021,610 issued Apr. 28, 2015, which is acontinuation of U.S. patent application Ser. No. 10/945,332 filed Sep.20, 2004, now U.S. Pat. No. 8,601,606 issued Dec. 3, 2013, which is acontinuation-in-part of U.S. patent application Ser. No. 10/304,827filed Nov. 25, 2002, now abandoned, all of which are incorporated byreference herein.

FIELD OF THE INVENTION

The present invention is related to the return of lost or stolencomputers. More specifically, the present invention is related to thereturn of lost or stolen computers using a recovery screen that appearsduring or after boot-up of the computer.

BACKGROUND OF THE INVENTION

Current methods of computer return or recovery products include:

-   (1) Physical labels that attach to the outside hardware of the    computer equipment.    -   These hardware labels can contain custom recovery information,        but because they are hardware based, they can not be        interactively changed by the owner. Also, since they do not have        any ability to affect the computer boot-up process, they can do        nothing to help protect the confidential owner information on        the hard drive. An example of a well known physical        hardware/recovery label is the STOP Tag by Security Tracking of        Office Property in Connecticut. This labeling system has been        patented in France, the US, and other countries. The product can        be easily defeated by removing the physical label. In the case        of STOP Tag which includes a ‘recovery mark’ which states        “STOLEN PROPERTY” underneath the label, a new label can be        simply added over the ‘recovery mark’ to hide the STOLEN        PROPERTY sign. (The Security Tracking of Office Property        equipment recovery patent is U.S. Pat. No. 5,163,711 This patent        actually refers to how the labels adhere to the equipment—but        this is their patent).    -   The computer security recovery/return program of the present        invention utilizes this type of hardware recovery approach to a        small degree, but is greatly different from this system, because        this is a software program rather than a hardware solution.        Additionally, the present invention is greatly superior, since        the owner can interactively customize the return/recovery        information displayed at any time, and the present invention        also helps protect the important, confidential owner information        on the hard drive, by the positioning of the program layer in        the equipment boot-up process.-   (2) Computer Software Programs that attempt recovery through the use    of the modem.    -   There are several patented computer security software products        on the market today that are designed for the purpose of        recovering lost or stolen equipment. These programs use the        computer's modem to regularly call a recovery center. Then once        a computer is stolen, the recovery center waits for the stolen        computer to call in. When the computer modem calls in, the        recovery centers use something similar to the reverse 911 system        to get the phone number that the stolen equipment is accessing.        Using the phone number, the recovery system then can try to get        a map of where the computer is. Some of these computer security        recovery programs can also attempt to locate stolen computers        through an IP address. Some of these computer security recovery        software programs, can actually attempt to seize the        communication between the stolen computer and the recovery        center and delete selected files to help protect the owner's        confidential information. Products like these include        CompuTrace, PC Phone Home, CyberAngel, LapTrak and Luceria.    -   The present invention is also designed for the purpose of        recovering lost or stolen equipment, but the method is        distinctively different and unique from the current methods. The        present invention does not rely on the use of the computer        modem. The present invention uses a layered program in the        boot-up process to provide a display of the proper owner        recovery and return information using the computer's own monitor        or screen. The present invention is also different and superior        to the above software tracking products, in helping to        accomplish international recovery. None of the above products to        date have been able to use the modem phone or IP system to track        stolen equipment internationally. The present invention provides        international recovery by displaying owner email information as        well as providing recovery help through an international        recovery internet web site.    -   There are other differences as well in how these programs try to        also protect the information on the hard drive. The present        invention automatically initiates during the boot-up process of        the equipment, in order to display the recovery/return        information before a security prompt screen to always help        protect the owner's confidential information on the hard drive.        Some of the programs above do nothing to protect the user        information. Others like LapTrak include a Hide-A-File feature        that an owner can access after the user enters the operating        system. CyberAngel includes an encryption feature. Luceria        includes the ability to delete pre-selected files from the        recovery center. By layering this computer security application        strategically before or during a security prompt in the boot-up        process, this application provides a unique and different method        to help protect owner information.    -   (An example of patents for these types of products would be the        CompuTrace U.S. Pat. Nos. 5,715,174, 5,764,892, and 5,802,280).-   (3) Bios Based Password Identification systems.    -   There are some computers that are sold with Bios based        identification systems included. These products activate        immediately when a computer is turned on, and prompt the user        for a password before accessing the data on the computer.    -   The present invention is very different and unique from the Bios        based program, for many reasons. Most importantly the bios based        password identification products are built into the hardware of        the computer equipment        -   not the hard drive. In other words, if you removed the hard            drive from a stolen or lost laptop, and inserted the stolen            hard drive into a different laptop, you would bypass the            bios based password identification system, and the bios            based password identification system would remain with the            original equipment. Thus, the Bios Based Password            Identification system can identify the computer hardware,            but not the hard drive (the most important part of the            computer equipment).    -   In addition, the Bios Based Password Identification systems are        designed as a unique method for providing an additional layer of        password protection to the equipment hardware, but are not        designed for recovery or return. There is no design for        including complete owner information, no recovery information        displayed, no effective protection of the information on the        hard drive, no effective method for the recovery or return of        the hard drive—the most important item that a consumer would        want back. In fact the Bios Password Identification product        occurs before allowing the hard drive to boot up. The present        invention is unique because it is an application software        program that provides its layer of protection during the boot-up        process (not before), and thus allows the security product to        move with the hard drive, the most critical part of the        computer.

SUMMARY OF THE INVENTION

The present invention pertains to a computer return apparatus. Theapparatus comprises a processor. The apparatus comprises a memoryconnected to the processor. The apparatus comprises a display. Theapparatus comprises a return screen that the processor automaticallycauses to appear during or after boot-up of the processor on thedisplay, that displays ownership information concerning who owns thecomputer and return information for returning the computer to the ownerfrom data stored in the memory.

The present invention pertains to a method for returning a computer toits owner. The method comprises the steps of activating a computer. Thenthere is the step of displaying automatically a return screen on adisplay of the computer during or after boot-up of the computer, whichdisplays information concerning owner information about who owns thecomputer and return information for returning the computer to the ownerfrom data stored in the memory of the computer.

The present invention pertains to a computer readable medium whosecontents cause a computer to show who is its owner by performing thesteps of activating a computer. Then there is the step of displayingautomatically a return screen on a display of the computer during orafter boot-up of the computer, which displays information concerningowner information about who owns the computer and return information forreturning the computer to the owner from data stored in the memory ofthe computer.

The present invention pertains to a computer return apparatus. Theapparatus comprises a processor. The apparatus comprises a memoryconnected to the processor. The apparatus comprises a display. Theapparatus comprises a return screen that the processor automaticallycauses to appear during or after boot-up of the processor on thedisplay, that displays information concerning an owner who owns thecomputer, concerning user information about who the user is who thecomputer is assigned to for use, and return information for returningthe computer to the owner from data stored in the memory.

The present invention pertains to a method for displaying information toassist with returning a computer to its owner. The method comprises thesteps of activating a computer. There is the step of displayingautomatically a return screen on a display of the computer during orafter boot-up which displays information concerning owner informationabout who owns the computer, concerning user information about who theuser is who the computer is assigned to for use, and return informationfor returning the computer to the owner from data stored in a memory ofthe computer.

BRIEF DESCRIPTION OF THE DRAWINGS

In the accompanying drawings, the preferred embodiment of the inventionand preferred methods of practicing the invention are illustrated inwhich:

FIG. 1 is a schematic representation of the apparatus of the presentinvention.

FIG. 2 is a representation of a return/recovery dialog box of anembodiment of the present invention.

FIG. 3 is a flow chart regarding an embodiment of the present invention.

FIG. 4 is a flow chart regarding a second embodiment of the presentinvention.

FIG. 5 is a representation of an administration program section of thepresent invention.

FIG. 6 is a representation of a return screen of the present invention.

FIG. 7 is an example of a password screen utilized by the presentinvention.

FIG. 8 is a return administration screen of the present invention.

FIG. 9 is a second return administration screen of the presentinvention.

FIG. 10 is a third return administration screen of the presentinvention.

FIG. 11 is a fourth return administration screen of the presentinvention.

DETAILED DESCRIPTION

Referring now to the drawings wherein like reference numerals refer tosimilar or identical parts throughout the several views, and morespecifically to FIG. 1 thereof, there is shown a computer 12 returnapparatus 10. The apparatus 10 comprises a processor 14. The apparatus10 comprises a memory 16 connected to the processor 14. The apparatus 10comprises a display 18. The apparatus 10 comprises a return screen 20that the processor 14 automatically causes to appear during or afterboot-up of the processor 14 on the display 18, that displays ownershipinformation concerning who owns the computer 12 and return informationfor returning the computer 12 to the owner from data stored in thememory 16. The Owner is defined as the person or entity that owns,rents, or licenses the Retriever, and/or the person or entity whocontrols the recovery service. The Owner has greater control over thecomputer 12 than the user. This could include, but not be limited to, anemployee of a company that owns the computer 12, or an agent of theowner or a friend that has the permission of the owner to use or have orrecover the computer 12.

Preferably, the apparatus 10 includes means for causing the screen toappear on the display 18 with the owner and return information. Thecausing means 22 is stored in the memory 16. The causing means 22preferably is a software program 24. Preferably, the memory 16 includesa primary operating system having an operating screen 26 for thecomputer 12, and the return screen 20 appears on the display 18 beforethe operating screen 26 of the operating system appears on the display18.

The software program 24 preferably appears before a security prompt suchas a password to be entered to obtain access to the primary operatingsystem of the computer 12. Preferably, the software program 24 allowsthe owner to change the return information and the owner information,after the password or security prompt is satisfied for the computer 12.The software program 24 is preferably able to communicate through amodem (or wireless) to a predetermined location to transfer the returninformation to the location to facilitate return of the computer 12 ifit becomes lost by the owner.

The present invention pertains to a method for returning a computer 12to its owner. The method comprises the steps of activating a computer12. Then there is the step of displaying automatically a return screen20 on a display 18 of the computer 12 during or after boot-up of thecomputer 12, which displays information concerning owner informationabout who owns the computer 12 and return information for returning thecomputer 12 to the owner from data stored in the memory 16 of thecomputer 12.

Preferably, the displaying step includes the step of displayingautomatically the return screen 20 before an operating screen 26 of theprimary operating system of the computer 12. There is preferably thestep of displaying the return screen 20 before satisfying a securityprompt such as entering a password into the computer 12 to access theprimary operating system. Preferably, there is the step of changing thereturn information, and the owner information after the step ofsatisfying a security prompt such as entering the password into thecomputer 12.

The present invention pertains to a computer 12 readable medium whosecontents cause a computer 12 to show who is its owner by performing thesteps of activating a computer 12. Then there is the step of displayingautomatically a return screen 20 on a display 18 of the computer 12during or after boot-up of the computer 12, which displays informationconcerning owner information about who owns the computer 12 and returninformation for returning the computer 12 to the owner from data storedin the memory 16 of the computer 12.

Preferably, the displaying step includes the step of displayingautomatically the return screen 20 before an operating screen 26 of theprimary operating system of the computer 12. There is preferably thestep of displaying the return screen 20 before satisfying a securityprompt such as entering a password into the computer 12 to access theprimary operating system. Preferably, there is the step of changing thereturn information and the owner information after the step ofsatisfying a security prompt such as entering a password into thecomputer 12.

In the operation of the invention, first, the owner of the computer 12would install the computer 12 security recovery/return software program24 application. The program could be installed to work on any type ofcomputer 12 screen including but not limited to, PC's, laptops, handheldcomputers (such as blackberries, palm pilots), UPS computerized handheldtracking display units, and even cell phone displays. The uniquerecovery/return computer 12 security program could in fact, be installedand used by any type of computer 12 that utilized a monitor displayscreen. The software application program provides an additional layer tothe existing operating system of each computer 12. The coding languageused for the software program 24 could and would vary depending upon thecomputer 12 equipment, but the core structure of how the programoperates would be similar in all items.

Once the computer 12 security software program 24 is installed, themonitor of the computer 12 will display the complete and currentrecovery/return information that the program has allowed the owner ofthe equipment to interactively enter, change and update at anytime.

This “on the fly” ability to change owner recovery information to aidreturn of equipment is an important feature for anyone, includingcollege students who travel from home to college during different partsof the year, people who move, and particularly business people whotravel throughout the world. The recovery/return information would notonly allow the display 18 of physical address return information, andowner contact telephone information, but would also provide forinternational internet based recovery through the added display 18 ofowner email information, as well as the ability to display aninternational recovery center web site.

In addition to increasing chances of return and recovery of the stolenor lost equipment by using the computer's 12 display 18 monitor, theprogram is an additional programming layer added into the initial startup program of the computer 12, so that the recovery/return display 18information occurs during or before a password or security promptscreen. This is an important feature that helps create an environmentwhereby the individual that happens upon a stolen or lost piece ofequipment will see the owner recovery/return information displayedbefore a password or security prompt screen. By automatically initiatingthis program during or before a user's security prompt, such as apassword screen program, the recovery/return program will not onlyincrease chances of recovery, but will also increase chances that thecomputer 12 information on the hard drive is protected while thecomputer 12 is not in the owner's possession.

For example, the actual step by step operation of the program is asfollows:

-   (1) Someone finds a lost or stolen computer 12. The person who finds    the computer 12, turns the computer 12 on.    -   (The software program 24 could be provided with a warning        sticker that will be placed on the outside of the equipment        telling anyone finding the equipment, about the program and the        display recovery screen.)-   (2) The computer 12 display 18 screen turns on. The computer 12    security software return/recovery program automatically initiates    during the computer's 12 boot-up process.-   (3) As the computer 12 booting up process moves the user to a    password or security prompt screen, the computer 12 security    software program 24 displays a dialog box which includes owner    recovery and return information, so that the person finding the    equipment can return the equipment either directly or through the    international web site recovery center. The information screen can    include any of the following items of information that the owner    would like displayed including but not limited to: contact name,    organization name, owner address, owner telephone number, owner    email, international web site recovery site, international recovery    email information, unique program serial/registration number. (See    FIG. 2).    -   Virtually all of this information would have been interactively        inputted by the owner, and the owner would have control over how        much recovery information is displayed. (This is important,        because some owners would like all the available information        displayed, and others would not. For example, a U.S. secret        service agent, accountant, or military personnel, might only        want his name and phone number displayed, and would not like the        organization name displayed for fear that would encourage a        thief to try harder to break into the system rather than return        the equipment.)-   (4) The individual who has found the lost or stolen computer 12, is    now able to easily return the equipment to the rightful owner.    Because the display 18 screen showing the owner information is    before, or during a password or security prompt screen that occurs    before allowing the user to access the full operating system, the    person recovering the equipment is blocked by the password or    security prompt screen from accessing the data, and is unable to    avoid seeing the recovery information screen.

It is important to note only that the computer 12 security softwarerecovery/return program be displayed on the computer 12 screen monitorbefore, or during a password or security prompt display screen, becausethe operating system password screen creates a ‘wall’ before taking thecomputer 12 user to the computer 12 operating system. (See FIG. 3). Thishelps not only protect the owner's information on the hard drive, butalso ensures that the person finding the equipment will see the ownerrecovery/return information. If the program initiated after the passwordor security prompt screen, the person finding the lost or stolenequipment would have difficulty ever seeing the recovery/return display20.

It is also important to note that even through the recovery screendialog box would ideally be the first screen, this may not be possibledue to the wide variety of software operating systems used by computer12 systems. Each computer 12 security program will attempt to displaythe recovery information on the initial screen when possible. However,for one of the Window operating systems for example, the first boot-updefault screen is a CTR+ALT+DEL screen, and then the program can move toa password screen. In this case, the recovery/return program couldprovide a display 18 dialog screen that would be an additional layerbetween the CTR+ALT+DEL dialog box and the password dialog box. (SeeFIG. 4). Other operating systems could allow the program to display therecovery dialog box, with the password or security prompt at the bottomof the dialog box (so that even though the recovery dialog applicationis an additional layer during the boot-up, it would appear that thepassword or security prompt is included within the same dialog box).(See FIGS. 2 and 3). The recovery dialog box would occur before orduring the password or security dialog box that ‘blocks’ the user fromaccessing the operating system.

Operation Administration Feature:

The computer 12 security software recovery/return program would alsoinclude an administration section to the program through hard drive orremote. The operation of the administration section features could worklike this:

-   -   (1) The owner of the computer 12 would turn their machine on.    -   (2) As the boot-up begins, the owner sees the recovery/return        display 18 dialog box appear.    -   (3) The owner then may see a password or security prompt to        allow the owner into the operating system.    -   (4) In the event that there is a security prompt, the owner        types in the correct password or satisfies the security prompt        to access the hard drive's operating system and programs.    -   (5) Once the owner gains access to the primary operating system,        the owner will have the ability to select an administration        section for the computer 12 security software recovery/return        program through the Start Up button or a shortcut icon on the        display 18 screen. (See FIG. 5). The administration dialog box        will allow the owner to interactively change the recovery/return        display 18 information that appears in the recovery/return        dialog box displayed during the boot-up process.    -   (6) There are additional features to the administration dialog        box that may be added. Some of the features include:        -   a) added password or security protection prompt to allow the            owner to access the administrative part of the program in            order to change the recovery/return dialog display            information,        -   b) interactive email based registration capability that            would export owner information to an international recovery            center using the internet,        -   c) a ‘where to order more licenses’ information screen (that            could be tailored to allow dealer/distributor contact            information),        -   d) screen saver lock feature, and        -   e) possible audit log to track user activity.

There are at least 3 important features that are critical and unique tothe program, and make this program vastly different from other equipmentsecurity recovery products:

-   -   (1) The ability to display recovery/return information on the        computer's 12 monitor screen.    -   (2) The ability to make sure that the display 18 occurs before        or during a password or security prompt stopping the user from        accessing the full operating system and hard drive information.    -   (3) The ability using an administrative program feature to allow        the owner to interactively change the recovery/return        information at any time.

Installation of the program is simple. The owner would load aninstallation CD into the computer 12 equipment or download the programfrom the internet. During the installation process, the owner will beprompted to provide some recovery/return information that the ownerwould like displayed; for example, contact name, phone and emailinformation. The installation process will create the recovery/returndisplay 18 screen, input the owner information, and create anadministration section that can be accessed by the owner to be able tochange recovery information at any time. After installation is complete,the computer 12 will be rebooted, and the program installation will becomplete.

The program is essentially a recovery/return information screen that isdisplayed, and does not attempt to duplicate or replace moresophisticated access security programs already on the system. In theevent that there is a security access program on the system using apassword, security card, or biometric recognition device, therecovery/return screen 20 is ideally layered before the security screen(otherwise the recovery/return information would never bedisplayed—except to the owner since the person finding the equipmentwould not be able to enter the correct security information to get tothe return screen 20). In operation:

-   -   1) The equipment is turned on.    -   2) The equipment processor 14 begins to go through the steps        necessary to open up and allow access to the equipment's        operating system. These steps may involve displaying various        visual screens, depending upon the equipment.        -   a) For example, a typical Gateway computer may have the            series of displays shown in FIG. 12.

In this example, the recovery/return program would display before orwith the Microsoft password or security prompt.

-   -   b) Another example is with a Dell computer, which may have the        series of displays shown in FIG. 13.    -   c) Another example is with an AT&T Cellular phone, which may        have the series of displays shown in FIG. 14:    -   3) The Return/Recovery owner information display screen is        displayed before the main operating system. The Return/Recovery        owner information screen has been customized by the owner (and        can be interactively changed using an administrative program        that can be accessed when the user gets to the operating        system).    -   4) Once the owner information dialog box is displayed, it        remains displayed until the user satisfies a security prompt        and/or pushes an OK button or says “OK”. The security program        prompt could include a password that might need to be entered, a        card access card that might need to be used, or a biometric        impression that might need to be used, such as fingerprint,        face, eye, or voice recognition system. Once the security        program is satisfied, the computer 12 program continues to the        main operating system.

The definition of the “boot-up” process includes a series of steps thatthe computer 12 is taking (including the series of displays that theprograms are automatically displaying) in order to move the user togaining access to the main operating system. And, as can be seen fromthe 3 examples above, the booting up process entails different steps anddifferent display 18 screens on its way to the operating system.

It is important that

-   -   1) the Recovery/Return screen 20 be displayed before the        operating system, and    -   2) that the display remains displayed until the user does        something (like pushes an OK button on the screen, or says OK        for future voice activation programs, or satisfies a security        prompt).

This software application:

should be layered before the main operating system,

and in the event that a security program exists,

should be layered before or during the security program prompt(otherwise the recovery screen would only be seen by the authorizedowner).

Security programs that currently exist could include:

-   -   a) entering a correct password (in the example of the current        computers that have a Microsoft password system already built in        and available).    -   b) entering another type of security prompt such as future        security applications with a voice activated security prompt, an        access card which needs to be within the vicinity of the        computer 12, or even a fingerprint or eye recognition security        program (which are currently available).

The basic Recovery/Return computer 12 security software program 24 mayor may not include a security prompt feature as an option. The point ofthe program is that the recovery information can be customized,interactively changed, and displayed using the computer's 12 screen, andlayered at the correct point (before the operating system, and before orduring a security program prompt if a security program exists).

The present invention pertains to a computer 12 return apparatus 10, asshown in FIG. 1. The apparatus 10 comprises a processor 14. Theapparatus 10 comprises a memory 16 connected to the processor 14. Theapparatus 10 comprises a display 18. The apparatus 10 comprises a returnscreen 20 that the processor 14 automatically causes to appear during orafter boot-up of the processor 14 on the display 18, that displaysinformation concerning an owner who owns the computer, concerning userinformation about who the user is who the computer 12 is assigned to foruse, and return information for returning the computer 12 to the ownerfrom data stored in the memory 16.

Preferably, the apparatus 10 includes means 22 for causing the screen toappear on the display 18 with the owner, user and return information.The causing means 22 is stored in the memory 16. The apparatus 10preferably includes means for changing the return information by theuser through remote communication with the computer 12. Preferably, thechanging means changes a security prompt by the owner, overriding anysecurity prompt entered into the computer 12 by the user. The apparatus10 preferably includes means for changing recovery information ofadditional computers 12 owned by the owner through remote communicationby the owner with the additional computers 12.

The present invention pertains to a method for displaying information toassist with returning a computer 12 to its owner. The method comprisesthe steps of activating a computer 12. There is the step of displayingautomatically a return screen 20 on a display 18 of the computer 12during or after boot-up which displays information concerning ownerinformation about who owns the computer 12, concerning user informationabout who the user is who the computer 12 is assigned to for use, andreturn information for returning the computer 12 to the owner from datastored in a memory 16 of the computer 12.

Preferably, the displaying step includes the step of changing the returninformation by the user. The changing step preferably includes the stepof changing the return information by the user through remotecommunication with the computer 12. Preferably, there is the step ofchanging a security prompt by the owner, overriding any security promptentered into the computer 12 by the user. There is preferably the stepof the owner changing recovery information of additional computers 12owned by the owner through remote communication by the owner with theadditional computers 12.

The Retriever is preferably a software program 24 that is disposed in amemory 16 of a computer 12 and at a remote station to allow an owner tocommunicate and control the computer 12, as needed.

The Retriever clearly distinguishes between the “Owner” of the equipmentand the person(s) “Assigned To” the equipment. See FIGS. 9 and 10.

The Owner is defined as the person or entity that owns, rents, orlicenses the Retriever, and/or the person or entity who controls therecovery service. The Owner has greater control over the computer 12than the user.

The Retriever allows the ability to distinguish between the ‘owner’ andthe ‘assigned to’ person who may be allowed possession of the equipment.These two entities can be the same, but very often are not. For example,a bank may be the owner of 5,000 laptops, and then issue them out to5,000 different employees. The Bank owns the laptops, and the employeesare the “assigned to” persons. Another example would be a company thatmay provide a recovery security service to equipment owners, and wouldalso be able to control the recovery screen information and displaythrough their recovery service.

The Retriever allows the ‘owner’ of the protected equipment toultimately control the recovery information displayed on the protectedequipment, not the user.

The current PDA recovery programs, for example, are all completelycontrolled by the equipment user. Again the ‘owner’ and ‘assigned to’user of the equipment may or may not be the same people, but theRetriever is unique because it allows the ability to distinguish betweenthe ‘owner’ and the ‘assigned to’ person. The Retriever allows the‘owner’ to have control over both the ‘owner’ recovery informationdisplayed AND the ‘assigned to’ recovery information displayed. The‘assigned to’ person(s) can only change or control the ‘assigned to’recovery information.

The Retriever also allows the owner ultimate control over the securityprompt, not the user.

The current PDA software recovery program gives ultimate control overthe security prompt to the user or ‘assigned to’ individual(s). The‘owner’ would want the ability to reassign the equipment to a newperson. The current PDA recovery program does not satisfy this need. Ifa disgruntled employee quits or gets fired and hands back their PDA witha unique secret password prompt and says they cannot remember thepassword, the current PDA recovery program makes it very difficult forthe owner to be able to regain control over the password prompt andassign the equipment to someone new.

Both the pocket PC, Palm and other handhelds do have the ability tocreate a screen on the monitor in conjunction with a password prompt.However, the design of these current programs are flawed, as evidencedby the fact that the program feature is rarely used, even thoughavailable.

The Retriever satisfies a need that the pocket PC, Palm and other PDArecovery programs do not. It is the ‘owner’ of the equipment that needsto have ultimate control of (1) the program, (2) the recovery screen and(3) the password—not the person who is using the equipment. There aremany reasons why this is important.

EXAMPLES

There is a school district in Virginia that issued 25,000 laptops tostudents at the high school and middle school level last year. Theschool district owns the laptops—not the students assigned to theequipment. The students are unlikely to care as much as the schooldistrict as to the loss of the equipment.

If the current PDA recovery software program 24 was loaded onto theselaptops, the kids could easily (and more than likely would) disable thesecurity prompt since it would be inconvenient to continually have tosatisfy a password prompt every time the computer 12 was turned on ortimed out. In addition, with the current PDA recovery system the ownerof the equipment (the school district) would loose control of not onlythe recovery information displayed on the monitor, but the password thatallows access to the equipment. The Retriever is unique since itdistinguishes between the ‘owner’ and the ‘assigned to’ person, allowsthe owner to have ultimate control over the display 18 screen, allowsthe ‘owner’ to override recovery information displayed by the ‘assignedto’ person if necessary, and allows the ‘owner’ to have ultimate controlof the password to access the equipment.

Individuals who are ‘assigned to’ equipment have inherently lessliability and concern if the equipment is lost or stolen than ‘theowner’. This is true for not only students, but employees at salesfirms, banks, accounting firms, corporations, healthcare facilities,high school students, university personnel, people who rent or leaseequipment, etc.

It is the ‘owner’ who should have ultimate control over securitydecisions regarding the equipment, not necessarily the person whohappens to be in possession of or assigned to the equipment. The currentPDA design causes an ‘inconvenience’ by creating an extra logon screen,and therefore, is not likely to be used by the equipment holder,especially if the equipment holder is not the owner. The owner needs theability to control whether the program is enabled, and thus ensure thatthe ‘assigned to’ person use the program if the owner desires for themto use it.

The current PDA recovery system design is indeed flawed. With thecurrent PDA recovery program, the user or person assigned to theequipment has complete and sole control over recovery information,complete and sole control over the security password, and complete andsole control over whether the security program is even enabled or not.These are some of the reasons that help explain why people that do havea PDA rarely use the recovery security feature available.

As further proof as to the inadequacy of this current program, is thefact that The World Computer Security Company of Colorado has sold“outside” glue on recovery labels to customers to protect hundreds ofPDAs, Palms, etc. that indeed already have the PDA recovery programmentioned by the patent office. In fact, this company recently sold acouple hundred of these glue-on security STOP Tag recovery labels thatwere PDA size this month to Bertek Pharmaceuticals and WashingtonUniversity St. Louis (June 2004). This is further proof that the currentprogram design is flawed and not commercially viable.

Most alarmingly, the current program does not take into account thatmany crime statistics suggest that 90% of all theft is internal(committed by those non-owners allowed access to property)!

Perhaps one of the most important and critical differences between theRetriever and the existing programs is the type of communicationpossible made possible with the Retriever. The Retriever is designed toenable communication of the recovery display information back and forthfrom the recovery administration center to the equipment being protectedto control changes to the recovery display 18 screen, and thiscommunication from the recovery administration center is not limited toonly the hard drive of the equipment being protected or the computer 12that the equipment is synchronized with.

The recovery administration update center for the current PDA recoveryprogram is limited to the user updating the owner information directlyon the PDA, or directly on the computer 12 the PDA is set up tosynchronize with when accessing the PDA program on the main computer 12.This recovery display information can then be synchronized using the PDAsynchronize capability.

The Retriever's recovery administration update center can be anadministration program located on the hard drive of the protectedequipment, an administration program located on a server on a networkand/or an administration program located on a hard drive of a computer12 that is completely remote from the protected equipment, for example,a web based recovery center. This is an very unique and importantfeature.

The program design feature allows the ‘owner’ to access the recoverycenter administration program, initiate a download of changes to theprotected equipment, control the entire recovery screen displayed, andeven override the ‘assigned to’ person's input. This is an importantfeature, in case the ‘assigned to’ person is a disgruntled employee whosimply reports equipment as stolen and is still using the equipment orhas sold it. The Retriever program design allows the owner to makechanges at the recovery center level, have the recovery center attemptto communicate those changes to the ‘stolen equipment’ via phone line(or cable, wi-fi, bluetooth, satellite etc. in the future). This allowsthe owner to eliminate erroneous or misleading ‘assigned to’ recoveryinformation that might have been created by the rogue “assigned to”individual, replace the display 18 screen with correct owner recoveryinformation and even change or delete the ‘assigned to’ password to stopaccess to the equipment information. By attempting to disable the‘assigned to’ password from remote, the equipment becomes extremelydifficult if not impossible to use, the information on the hard drive isbetter protected, and the chances of a quick recovery of the stolenequipment are dramatically enhanced. This remote communication abilitymakes the Retriever design completely unique and very different from thecurrent PDA recovery software programs.

It is this remote communication ability in the design of the Retrieversoftware recovery program that helps better meet the challenges ofinternal theft (again many statistics suggest that it is internal theftthat comprises 90% of all theft). With the current PDA recovery program,the ‘owner’ is limited to only making changes directly on the ‘assignedto’ person's equipment and/or the ‘assigned to’ person's computer 12 orover a limited network that the assigned to person may never accessagain. With the Retriever's recovery software design, the ‘owner’ canalso attempt to access the ‘assigned to’ person's equipment byadditional ways, such as over the internet, phone lines, cable, etc.thereby having a more effective ability to try to locate the equipmentand control the recovery information displayed by remote.

The “assigned to” person can only control the “assigned to” recoveryinformation and password. The “owner” can control both the ownerinformation and all the “assigned to” recovery information at therecovery center level, and then attempt to communicate this to theprotected equipment using the Retriever licensed security recoveryprogram.

Using this unique communication power, both ‘owner’ and “assigned to”information can be uploaded to the recovery center and/or downloaded tothe protected equipment in order to synchronize the internationalrecovery center information and the recovery information displayed onthe initial display 18 screen. (This is a combination of the PDA type ofsynchronization between the main computer 12 and the PDA, and the McAfeeanti-virus software internet updating capability where every time you goon-line, your computer 12 automatically checks to make sure that youhave the most current anti-virus software and automatically updates yourcomputer 12 with the latest changes.) Nobody has ever before consideredor designed a product combining this type of communication ability withthis type of recovery security program that seizes control of thedisplay 18 monitor until a security prompt is satisfied. The Retrieverdesign allows an equipment recovery capability that just does not existon today's market, and is completely unique from all current products onthe market.

Current PDA Communication is limited:

User input/update PDA

User input/update Host Computer w/PDA program

The Retriever Design Communication is much broader, See FIG. 15.

The Retriever design has both a stand-alone and a network based program.This allows an owner to handle multiple machines easily fororganizations or entities with more than one equipment.

Each program license has a unique program registration license numberthat is unique. This is extremely important feature that allows manyfeatures that owners would need in handling the protection of multiplemachines. From looking at the current PDA security recovery software,the program appears to be only to have ‘single license’ capability.

The Retriever program design can also allow global changes by the ownerwho might handle multiple computers.

This is a very important feature for organizations who are in charge oflarge numbers of computers. For example, let's say that Sgt. Cody is thecrime prevention officer at Georgetown University and then retires.Let's say that Sgt. Grier is the contact person currently listed on 700university owned computers. Now Sgt. Smith is in charge. The Retrieverprogram design allows Sgt. Smith (assuming she uses the correctpassword), to access the recovery center and globally change all thecomputers that she wants to change and display her phone number and nameto help with recovery. This ability to allow the owner to globally makechanges to certain display information over multiple licensed computersis also extremely useful if a phone number changes, a corporate name orlogo changes, a recovery contact name changes or a phone number areacode changes.

The program also allows owners to easily tag or mark equipment that isready or available to be sold making it easy for new owners tore-register under the initial security software license registrationnumber. Let's say for example that ABC Telecommunications decided tosell 100 laptops that they are replacing with new ones. The owner orauthorized person representing the owner (the IT director for example)can preset the 100 serial license numbers as for sale to allow easiersales to new owners using organizations such as Ebay. New owners caneasily be allowed to re-register under the released registration numberthat is associated with the Retriever recovery license.

The program also allows owners to easily report equipment as stolen overthe internet. Owners can go to the recovery administration center, findthe license number of the equipment they believe might be lost orstolen, update the information for this specific license number andreport the information over the internet for all to see. This is veryhelpful resource for both owners and authorities to facilitate recoveryof lost or stolen items.

The security program can also not only display ‘owner’ and ‘assigned to’information but also display organization logos and/or other pictures ordesigns. This is another extremely important feature. The Retrieverprogram seizes control of the entire display 18 screen.

Many, many customers currently desire to customize their physicalsecurity tags with owner and logo information. This is often difficult,since the security label manufacturer has to get art design approval,fit corporate and logo information on an often limited space, and thenset the tool to run the special labels at the manufacturing plant. Leadtimes can often go over 3 weeks, and once the customer has their specialcustomized tag, they must often order a minimum amount (STOP Tag has aminimum order of 200 tags for customization for example). If the companychanges names, logos or phone numbers the physical security labelsuddenly becomes incorrect. And, when these customized security tagcustomers want to sell their equipment, it becomes difficult, since thesecurity label can permanently read ‘Property of ABC Corp”.

Let's say the company wants to donate 25 laptops to the church. A nun orother church personnel would not really want to be carrying aroundlaptops where the cover of the laptops state “Property of the US Army”,“Property of Waste Management Company”, or “Property of XYZ University”.This becomes awkward for the new owner who actually is the new rightfulowner, and cannot always easily remove the existing security label.

The Retriever provides an interactive method of designing and changingthe entire recovery screen ‘on the fly’ that eliminates all of thesecurrent problems. Organization logos or ads can be easily and quicklydownloaded onto the recovery screens of protected equipment. The currentPDA system does not allow this.

The Retriever creates an audit trail of changes. Time and Date fieldsregistering changes are logged and maintained at the recovery center toprovide the customer with a security audit trail of changes.

The Retriever display not only appears during the initial boot-up, butthe Retriever program security recovery display screen can also bemanually initiated by the computer 12 user. This would be theWorkstation Locked display. (FIG. 10). This allows the computer 12 userto manually lock the computer 12 screen and protect the computer 12 ifthey need to leave their computer 12 for a few minutes. This feature ishandy for all types of situations, like emergency room laptops athospitals, etc.

The Retriever display not only appears during the initial boot-up orwith a manual activation by the computer 12 user; the Retrieverworkstation locked recovery screen can also be initiated automaticallyusing a screen saver timer feature that can be changed by the Owner orthe Assigned To person. For example, let's say the computer 12 screensaver time feature has a 10 minute timer. If there is no activity on thecomputer 12, the Workstation Locked security Recovery screen willdisplay and stay displayed until the password prompt is satisfied.

The owner can browse the entire database of there own licensed Retrieversecurity software licenses. The owner can look at an individual licenserecord, or browse the entire database and use features such as EDIT,SORT, SEARCH/FIND, and EXPORT when working with the licensed records.

The Retriever provides the owner with extra data information fields thatowners can assign their own values to. These data fields are not reallyrelated to recovery information displayed, but this is a handyconvenience for owners who would like to correlate their own inventorynumbers to Retriever license numbers, search by lease dates onequipment, etc.

It should be noted that the communication ability is not limited tointernet communication. Satellite, WI-FI, cable, bluetooth, or any othertype of remote communication can be used.

Although the invention has been described in detail in the foregoingembodiments for the purpose of illustration, it is to be understood thatsuch detail is solely for that purpose and that variations can be madetherein by those skilled in the art without departing from the spiritand scope of the invention except as it may be described by thefollowing claims.

What is claimed is:
 1. A method for displaying information to assistwith returning a computer comprising the steps of: displaying by aprocessor automatically an ownership recovery screen on a display of thecomputer which displays information concerning return information forreturning the computer to an owner from data stored in a memory of thecomputer, the ownership recovery screen displaying recovery information,to facilitate return of the computer so the return information isvisible to anyone viewing the ownership recovery screen; initiating andchanging additional information which appears on the display and returninformation through remote communication without assistance by the userwith the computer, wherein the changing of the additional information isdone through an interactive program stored in the memory of the computerand is remotely accessed only by the owner of the computer or the partyauthorized by the owner to enable the designing and changing of theownership recovery screen; and displaying the ownership recovery screenbefore or with a lock screen or security prompt which prevents the userfrom accessing operatively the computer; and activating the processor toissue a warning message to the user.
 2. The method as described in claim1 including the step of selecting by the owner or user an Internet linkon the ownership recovery screen, an Internet location associated withthe Internet link stored in the memory of the computer, the owner oruser is automatically able to access the computer and the Internetlocation associated with the Internet link.
 3. The method as describedin claim 1 wherein security information associated with a securityprompt by the processor is accepted by the processor allowing the userto access the computer, the ownership recovery screen having an activelink allowing remote communication to a remote server which providesrecovery information to facilitate return of the computer.
 4. Anapparatus for displaying information at a computer owned by an ownerwhich is used by a user, the apparatus comprising: a computercomprising; a memory; a display; and a processor in communication withthe display and the memory which automatically displays an ownershiprecovery screen on the display of the computer which displaysinformation concerning return information for returning the computer toan owner from data stored in the memory of the computer to facilitatereturn of the computer so the return information is visible to anyoneviewing the ownership recovery screen, the ownership recovery screenshowing additional information which includes advertisements, logos,pictures, or designs, the initiating and changing the additionalinformation which includes advertisements, logos, pictures, or designs,through remote communication without assistance by the user with thecomputer, wherein the changing of the additional information is donethrough an interactive program stored in the memory of the computer andwhich is remotely accessed only by the owner of the computer or theparty authorized by the owner to enable the designing and changing ofthe ownership recovery screen.
 5. The apparatus as described in claim 4wherein the ownership recovery screen includes an internet link that canbe selected by the owner or user, an Internet location associated withthe Internet link stored in the memory of the computer, the owner oruser is automatically able to access the computer and the Internetlocator associated with the Internet link.
 6. The system as described inclaim 4 wherein the ownership recovery screen having an active link toallow remote communication to the remote server which provides recoveryinformation to facilitate return of the computer.
 7. A computer programstored in a non-transient memory for displaying information to assistwith returning a computer to its owner comprising the computer generatedsteps of: displaying by a processor automatically an ownership recoveryscreen on a display of the computer which displays informationConcerning return information for returning the computer to an ownerfrom data stored in a memory of the computer, the ownership recoveryscreen displaying recovery information, to facilitate return of thecomputer so the return information is visible to anyone viewing theownership recovery screen, the ownership recovery screen showingadditional information which includes advertisements, logos, pictures,or designs; and initiating and changing the additional information whichincludes advertisements, logos, pictures, or designs, through remotecommunication without, assistance by the user with the computer, whereinthe changing of the additional information is done through aninteractive program stored in the memory of the computer and is remotelyaccessed only by the owner of the computer or the party authorized bythe owner to enable the designing and changing of the ownership recoveryscreen.