Portable computer supporting paging instructions

ABSTRACT

A portable computer is described that contains a circuit for receiving pages and performing security functions based on the received page. Once a page has been received by the portable computer, the computer&#39;s hard drive can be automatically reformatted, or the portable computer can be prevented from booting. In addition, the portable computer can be programmed to use a modem to automatically dial a security center and transmit security information such as the Caller ID Tag of the current telephone number.

RELATED APPLICATIONS

[0001] This application is a continuation of, and incorporates byreference in their entireties, copending U.S. application Ser. No.09/098,937, entitled “PORTABLE COMPUTER SUPPORTING PAGING FUNCTIONS,”and copending U.S. application Ser. No. 09/098,935, entitled “METHOD FORINFORMATION RECEPTION IN A PORTABLE COMPUTER,” both of which were filedon Jun. 17, 1998.

FIELD OF THE INVENTION

[0002] This invention relates to portable computer systems.Specifically, this invention relates to portable computer systems havingintegrated circuits for receiving and processing paging messages.

BACKGROUND OF THE INVENTION

[0003] Over the past several years, personal communication devices suchas pagers and cellular telephones have become widely used in bothbusiness and personal environments. Fast and reliable communication hasmade it much easier for people to travel from their home or officewithout becoming unavailable to co-workers or others. The advent ofportable computers has also encouraged this trend, as many peopleperform a large amount of their duties using computing devices, and theportable or “laptop” computer further enhances the ability of people toremain productive while traveling.

[0004] More recently, pagers have been introduced into the market withincreased data handling capabilities. As one example, the PageWriter™2000 manufactured by Motorola is a two-way pager with a keyboard andgraphical display which sends Internet e-mail and has automated messagehandling capability. In addition, computing devices have been enhancedwith additional communication capabilities. U.S. Pat. No. 5,550,861 toChan et al. for example, describes a PCMCIA format card for laptopcomputing applications which includes an onboard modem and pager unit.

[0005] Despite these trends in combining communication and dataprocessing capabilities, little progress has been made in takingadvantage of the available benefits of the combined implementation ofsuch devices. The current state of the art consists essentially ofconventional communication functions coupled to conventional dataprocessing functions, thereby producing one device which may combinepreviously available features but which does nothing to provideadditional functionality. In addition, advantageous hardwareimplementations of such combinations have not been explored.

SUMMARY OF THE INVENTION

[0006] The invention comprises a portable computer which includes awireless receiver. The wireless receiver may be adapted for receivingpages. In some embodiments, the portable computer includes a pageinterpreter coupled to the page receiver so as to translate selectedpage messages into commands to be executed by the portable computer.

[0007] Another embodiment of the invention comprises a computing devicewhich includes a microprocessor, a microcontroller coupled to themicroprocessor; and a wireless receiver coupled to the microcontroller.The computing device may further include a battery, coupled to themicrocontroller and the wireless receiver such that the microcontrollerand the wireless receiver are operative to receive and store messageswhen the microprocessor is in an off state.

[0008] Messages received via a page receiving circuit may in someembodiments of the invention be classified into two groups. A volatilememory circuit may store messages of a first group, and a non-volatilememory may store information concerning message content for messages ofa second group. Messages of the second group may comprise commands tothe portable computer.

BRIEF DESCRIPTION OF THE DRAWINGS

[0009]FIG. 1 is a block diagram illustrating a portable computer systemincluding a processor, bridge chipset, microcontroller and pager unit.

[0010]FIG. 2 is a flow diagram illustrating the process of receiving apage and activating a user notification.

[0011]FIG. 3 is a flow diagram illustrating the process of receiving apager command and performing a security function.

[0012]FIG. 4 is a flow diagram of a process of locking a computer once asecurity code has been received.

DETAILED DESCRIPTION OF THE INVENTION

[0013] The invention will now be described with reference to theaccompanying Figures, wherein like numerals refer to like elementsthroughout. It may initially be noted that the terminology used in thedescription presented herein is intended to be interpreted in itsbroadest reasonable manner, even though it is being utilized inconjunction with a detailed description of certain specific embodimentsof the invention.

[0014] Embodiments of the invention include portable computers havingintegrated pager circuitry for receiving messages through a wirelesscommunication network. Although a wireless receiver is a generic circuitprovided in any type of wireless communication device including radios,cellular telephones, televisions, etc., a pager is a specific type ofwireless communication device which is adapted to receive (and sometimestransmit) numerical or alpha-numerical data over a dedicated pagerfrequency band, such as 940-941 MHz for example. As used herein, theterm “pager” refers to any wireless receiver with the capability toreceive transmissions of numerical or alpha-numerical data over adedicated paging system, whether public or private, and which may beimplemented in whole or in part through the public telephone network,satellite systems, base stations, etc. In the embodiments describedbelow, a wireless receiver which may advantageously comprise a pagerunit is integrated into a portable computer so that numerical oralpha-numerical codes can be sent to the portable computer for furtherprocessing by the portable computer.

[0015] Referring now to FIG. 1, a portable computer 10 includes aprocessor 20 in communication with a host bus 22. The processor 20 maybe any conventional microprocessor such as an Intel Pentium, IntelPentium II, Digital Equipment Corporation Alpha or Motorolamicroprocessor. The host bus 22 communicates data between the processor20 and a bridge circuit 24. The bridge circuit 24 can include one ormore discreet components that provide data communication between theprocessor 20 and other components within the personal computer 10.Bridge circuits 24 incorporating the functionality shown in FIG. 1 areknown in the art, and are commercially available from, for example,Intel Corp., as the 430TX chipset. The bridge circuit 24 is linked to acache memory system 30 and a main memory system 32. The cache memorysystem 30 provides conventional cache functions for buffering data readsand writes to the main memory system 32.

[0016] In addition, the bridge circuit 24 is linked to a systemmanagement bus (SMBUS) 38 and a peripheral component interconnect (PCI)bus 40. In conventional computers, the PCI bus transfers data betweenperipheral devices and the bridge chip set 24. The SMBUS 38 providescontrol signals for managing several high-level functions within theportable computer 10. For example, the SMBUS 38 may communicate signalsindicative of the remaining battery power in the portable computer froma battery to the processor 20. In addition, the SMBUS 38 might providesignals relating to power management features within the portablecomputers such as screen blanking, hard disk powering, and otherfeatures that allow a portable computer to extend its battery life. Mostcommercially available laptop computers include a standard format systemmanagement bus, and further description of its structure andcommunication protocol is not required to understand the presentinvention.

[0017] In one embodiment of the invention, the system management bus 38is linked to a microcontroller 50. The microcontroller can be anyconventional microcontroller available from several commercial sources.One suitable commercially available microcontroller is the model 68HC11from Motorola Corporation. The microcontroller 50 can store and retrievedata from a memory 52. The memory 52 can be any type of data storagedevice including Dynamic Random Access Memory (DRAM), Static RandomAccess Memory (SRAM), Erasable Programmable Read Only Memory (EPROM) orElectrically Erasable Programmable Read Only Memory (EEPROM). As will beexplained more fully below, the memory advantageously comprises abattery powered SRAM portion and a EEPROM portion. Furthermore, althoughillustrated in FIG. 1 as separate components, some or all of the memory52 may be incorporated into the microcontroller 50. The Motorola 68HC11mentioned above, for example, includes internal EEPROM. In oneembodiment, the memory 52 stores security codes that, when received bythe microcontroller 50, will be translated into a signal on the SMBUS38.

[0018] As shown in FIG. 1, the microcontroller 50 communicates with apager unit 56 having a receiving antenna 58. The pager unit 56 itselfmay comprise a conventional wireless receiver circuit with the abilityto receive numeric or alpha-numeric data and transmit that data to themicrocontroller 50. These circuits are well known to those of skill inthe art, and are not described further herein.

[0019] The pager unit 56, microcontroller 50, and memory 52 may all beconnected to a dedicated battery supply 60, which is advantageouslyseparate from the battery which powers the remainder of the portablecomputer. With a separate battery supply 60, not only can pages bereceived and processed when the portable computer 10 is turned off, butpages can be received and processed even if the battery pack provided topower the portable computer as a whole is removed entirely. This featureis significant with reference to several security functions implementedas described in more detail below.

[0020] When the portable computer is paged, the pager unit answers thepage, receives the message contained in the page, and sends this messageto the microcontroller 50. The microcontroller 50 stores the message inthe memory 52. Due to the presence of the battery backup 60, thisprocess can be performed while the computer is off, or even when themain battery pack for the computer is removed. If several pages arereceived when the computer is off, the messages will continue to queuein the memory 52 until the microprocessor is available to retrieve andprocess them.

[0021] It is one advantageous aspect of the invention that the messagesreceived by the pager and acted upon by the portable computer may beclassified into two distinct groups. A first group of messages comprisesinformation sent to the portable computer for viewing by the portablecomputer user. This class of page corresponds to many conventionalpaging alphanumeric messages which include telephone numbers to returnphone calls to, short textual messages from the paging party, etc. Thisclass of page also corresponds to existing “global” pages, includingstock or weather reports, or other information which is broadcast tolarge number of subscribers at approximately the same time. A secondgroup of messages comprise commands which instruct the computer toperform a function specified in the page. As will be explained below,advantageous functions performed in response to pages include securityfunctions which may be initiated by the portable computer user with apage if the computer has been stolen.

[0022] Referring now to FIG. 2, a specific embodiment of a process 100of servicing pager messages is described. The process illustrated inFIG. 2 is especially adapted to the reception and processing of pagermessages of the first group described above, although it will beappreciated by those of skill in the art that many of the stepsperformed will be the same for page processing of messages of bothgroups. The process 100 begins at a start state 102 and then moves to adecision state 104 to determine whether a page message has been receivedby the portable computer 10. When implemented with the hardware of FIG.1, this step may be accomplished by periodically evaluating one or morestatus flags in the microcontroller 50 which are set if page messageinformation which has not previously been forwarded to themicroprocessor is resident in the memory 52. If a page message has notbeen received, the process 100 continues looping at the decision state104 until a message is received. If a message has been received, theprocess 100 moves to a state 106 wherein the microcontroller 50 forwardsan interrupt on the SMBUS 38 to the processor 20. The SMBUS interruptindicates to the processor 20 that the microcontroller 50 has data thatneeds to be retrieved, and causes the microprocessor to perform a pageservice subroutine.

[0023] The processor 20 then services the request made by the pagermicrocontroller 50. The process 100 moves to a state 110 wherein themessage received by the pager unit 56 and stored in the memory 52 isretrieved by the processor 20 and stored on, for example, the hard diskdrive of the portable computer. A determination is then made at adecision state 112 whether additional messages have been stored in thememory 52 which have not been retrieved by the processor 20.

[0024] If a determination is made that more messages have been received,they are retrieved and stored at the state 110 as before. However, ifmore messages have not been received the process 100 moves to a state116 wherein the user is notified that one or more pages have beenreceived. The pages may be displayed and read with a simple text editorprogram or other user application software. It should be noted, however,that in some embodiments the user may not be notified of the page. Forexample, some types of security programs may be designed to bypass theuser notification.

[0025] Once a user notification has been activated at the state 116, theprocess 100 returns to the decision state 104 and waits for additionalpage messages to be received. It will be appreciated by those of skillin the art that many different hardware and software implementations ofthe above described procedure are possible. One alternativeimplementation may involve a memory resident page servicing programwhich automatically retrieves queued messages received since thecomputer was last powered up, and when the computer is on, periodicallypolls the microcontroller for additional page messages.

[0026] As mentioned above, it is one aspect of the invention that theportable computer not only receives and displays standard personal andglobal pages for the computer user, but may also evaluate the content ofthe page so as to interpret the page as a command to perform aparticular function. Computer activity based on page content has notbeen performed prior to the present invention. Thus, a portable computerin accordance with the present invention may include not just pagereception and display circuitry, but may additionally include a pagecontent interpreter.

[0027] One advantageous application of this feature of the inventionincreases the security of portable computing platforms. This provides asubstantial improvement over existing laptop computers as some of theadvantages of portable computers, such as their small size and lightweight are also disadvantages in that they can be easily stolen.Increases in laptop security is one example of enhanced functionalityprovided by a computer/pager in accordance with the invention.

[0028] Specific implementations of processes by which the computerperforms functions in response to pages are explained with reference toFIGS. 3 and 4 below. Advantageously, some of these functions may berelated to computer security. Referring now to FIG. 3, a general pageimplemented computer command procedure is described. This process beginsat a start state 140 and moves to a state 142 wherein the processor 20retrieves a page from the microcontroller 50. In contrast to theprocedure described in conjunction with FIG. 2, however, the content ofthe page retrieved in this case is not merely a message for the portablecomputer user, but is actually a command to be performed by the portablecomputer. Thus, in conjunction with retrieving and storing receivedpages, the page servicing routing performed by the processor 20 maysearch the alphanumeric contents of the received pages for particularstrings of characters, wherein selected strings are respectivelyassociated with selected commands to be performed by the processor 20.If a match is found, the process then moves to a state 146 wherein theprocessor performs the function requested by the page. The process thenterminates at an end state 148.

[0029] Although it will be appreciated that a wide variety of commandsmay be issued to the computer in this way, some specific advantageouscommands include commands to perform security functions in the event theportable computer is stolen. In one embodiment, the received page caninitiate an audible alarm from the internal speaker. In otherembodiments, the owner can send a numerical page to the portablecomputer, which, when received, runs a more complicated securityprogram. For example, the portable computer may, in response to a givenpage code, reset or reformat the hard disk drive, check the hard diskdrive geometry, and/or write a selected pattern to all sectors of thehard disk drive. This may eliminate not only sensitive data from thehard disk drive, but also application programs of interest to computerthieves, resulting in a decrease in value of such a portable computer toa potential thief.

[0030] Computer tracking with page codes is also possible for portablecomputers with a modem. In this embodiment, the portable computer may becommanded via a page to run a security program which periodicallydetermines if a telephone line is linked to the computer's telephonemodem. If a telephone line is detected, the security program mightinstruct the telephone modem to turn off the speaker and silently dial apredetermined phone number of a computer at a security company or othersecure location. Once the portable computer is connected to the computerat the security company, information can be sent related to the locationof the portable computer. For example, in one embodiment, the portablecomputer may contain instructions for sending the owner's name, addressand the Caller ID tag of the phone line being used to make the call tothe security center. Thus, security personnel at the security centerwill know the name of the real owner of the portable computer and thetelephone number of the location at which the computer is currentlylocated.

[0031] Either as a standalone security feature, or in conjunction withthe above functions, a predetermined numerical page code issued to theportable computer may additionally cause the portable computer todisable the boot process so that the computer may not be re-started. Thelocked computer is therefore useless to the thief. Reactivation of thecomputer may be implemented by sending a second page to the computerwith an alphanumeric code which removes boot limitation set by the firstpage. In this embodiment, the BIOS may, when booting the computer atpower up, retrieve one or more status bits from the memory 52 todetermine whether or not the boot sequence should be halted or modified.These status bits are in turn set when an appropriate page code isreceived by the portable computer. In some advantageous embodiments, themicrocontroller 50 is programmed to search received pages for selectedalphanumeric sequences, and in response thereto, to set or clear theabove mentioned status bits accordingly. The memory 52 may include someEEPROM memory to store these status bits so that they will not be erasedeven if the computer battery pack and the additionalpager/microcontroller battery 60 are removed. It can thus be appreciatedthat in some embodiments of the invention, at least some pageinterpretation and processing, in addition to the function of storingpage messages for later retrieval, may be done by the microcontroller50, rather than only by the microprocessor 20. The portable computer mayadvantageously include a page receiver setup program which allows theuser to choose the codes that either the microcontroller 50 and/ormicroprocessor 20 will interpret as selected security commands. Accessto this program may itself be password protected, to inhibit thieves orother unauthorized users from reprogramming these security codes.

[0032] A specific example of a BIOS boot sequence in accordance withthis implementation of the invention is provided in FIG. 4. Referringnow to this Figure, a boot process 150 begins at a start state 152 andthen moves to a state 154 when the portable computer 10 is turned on.The process 150 then moves to a state 156 wherein the computer BIOSretrieves a status code from the microcontroller 50. As discussed above,this status code may comprise a security code which has been set to aparticular configuration and stored in the memory 52 in response to aprior page sent to the portable computer by the user. As is known in theart, the Basic Input/Output System (BIOS) is firmware that controls acomputer's bootup sequence. The BIOS is normally stored in aprogrammable read only memory such an EPROM or EEPROM. Thus, the BIOScan be programmed at the factory to search for a particular securityflag during every boot. Once the BIOS has read a security code from themicrocontroller or its associated memory, the process 150 moves to adecision state 160 to determine whether the status of the computer isokay. Thus, if the computer has received a numerical or alpha-numericalpage instructing the computer to no longer boot, the microcontroller 50asserts a flag instructing the BIOS to bypass the bootup sequence. Thus,at the decision state 160, a determination is made whether such a lockuppage code has been received.

[0033] If the status is okay at the decision state 160, the process 150completes the boot sequence at a state 164. However, if the status isnot okay, indicating that a security page has been received, the process150 aborts the normal boot sequence at a state 166 and then proceeds toa decision state 170 to determine whether an additional security commandhas been stored in the memory 52. The additional command, for instance,might be to instruct a telephone modem within the portable computer 10to dial a predetermined telephone number and transmit the Caller ID tagof the phone where the portable computer is located. As one alternativeexample, the additional command may instruct the portable computer toreformat the hard disk drive.

[0034] If a determination is made at the decision state 170 that astored security command should be performed, the process 150 moves to astate 174 wherein the command is performed. However, if a determinationis made at the decision state 170 that an additional security commandhas not been stored by the user via page the boot process of theportable computer 10 is terminated at a state 176. Once a securitycommand has been performed at a state 174 (if required), the process ofbooting is also terminated at the state 176. Thus, if the portablecomputer has received a predetermined code that is associated with themicrocontroller 50 preventing the portable computer 10 from booting, theportable computer will continue to terminate its boot sequence at thestate 176. It can be appreciated that if the computer is laterrecovered, an additional, different code can be sent to the pager unit56 to instruct the microcontroller 50 to clear the status code set withthe prior page to indicate that the status of the computer at thedecision state 160 is now okay. Thus, the computer will no longer beprevented from booting. Defeating the above described security system isvery difficult for a computer thief. Without knowledge of the pagesecurity codes programmed in by the user, the thief cannot clear any setsecurity flags. Furthermore, the dedicated battery supply 60 preventsthe thief from blocking the reception of a security page by removing thecomputer battery pack.

[0035] The following scenario describes one type of security functionwhich may be performed by embodiments of the portable computer. Theowner of a portable computer may send a pager code to the portablecomputer after realizing that it has been stolen. To send a page, theowner dials a telephone number corresponding to the pager unit 56, andenters in the predetermined security code such as “99999.” The code“99999” may instruct the computer to terminate any future boot sequenceand re-format the hard disk drive to prevent access to any sensitivedata present there.

[0036] In a few moments, the pager unit 56 receives the code “99999” andtransfers that code to the microcontroller 50. If the portable computeris turned off, the battery 60 continues providing power to the pager 56,microcontroller 50 and memory 52 so that pages may be received andprocessed.

[0037] As can be appreciated from the discussion presented above, thepage “99999” may be processed by the portable computer in a variety ofways. For example, the microcontroller 50 firmware may initiallyevaluate the content of the page to determine if the “99999” codecorresponds to a particular pre-determined function or comprises simplya typical alphanumeric message for the computer user. If themicrocontroller firmware identifies the code “99999” as being a securitycode, it may set one or more EEPROM status bits that are later evaluatedby the BIOS of the portable computer so as to instruct themicroprocessor 20 to exit the normal boot sequence and initiate alow-level format of the hard drive. Alternatively, the microcontroller50 may not be programmed to evaluate the content of the pages received,and may simply store the “99999” in memory 52 for later retrieval andinterpretation by the microprocessor 20.

[0038] If the portable computer is powered up at the time this page code“99999” is received, the microcontroller 50 may forward this code to theprocessor as part of the usual page processing program. The receivedpage codes nay be evaluated by the processor 20 to check for codes suchas the “99999” and, when received, cause the processor 20 to beginreformatting the hard drive.

[0039] It can be appreciated that many types of functions may beperformed by the microcontroller 50 and/or the microprocessor 20 once apage has been received. The microcontroller 50 or an associated memorycould store hundreds of codes, with each code being associated with aparticular function to be carried out once the page is received.

[0040] While the invention has been described in connection withspecific embodiments thereof, it will be understood that it is capableof further modification, and this application is intended to cover anyvariations, uses, or adaptations of the invention following, in general,the principles of the invention and including such departures from thepresent invention as would be understood to those in the art asequivalent and the scope and context of the present invention is to beinterpreted as including such equivalents and construed in accordancewith the claims appended hereto.

What is claimed is:
 1. A method of providing a security function in acomputing device, the method comprising: storing a resettable statusflag in a memory of the device; receiving information via a wirelessreceiver; setting the status of the flag based at least in part on thecontent of the received information; and terminating execution of a bootprogram of the computing device if the flag is in a pre-defined state.2. The method of claim 1, wherein receiving comprises receivinginformation via a wireless receiver of the device.
 3. The method ofclaim 1, wherein receiving comprises receiving information via awireless receiver coupled to the device.
 4. The method of claim 1,wherein terminating execution of a boot program comprises executing theboot program upon application of electrical power to the device.
 5. Themethod of claim 1, further comprising performing one or more securitycommands before terminating execution of the boot program.
 6. The methodof claim 5, wherein performing one or more security commands comprisesinstructing a modem of the device to dial a predetermined telephonenumber and transmit information indicative of the location of thedevice.
 7. The method of claim 6, wherein instructing the modem totransmit information comprises instructing the modem to transmit acaller ID tag of a phone where the device is located.
 8. The method ofclaim 5, wherein performing one or more security commands comprisesinstructing the device to reformat a hard disk drive of the device. 9.The method of claim 1, wherein storing comprises storing the flag in amemory of a portable computer.
 10. A method of securing a computingdevice, the method comprising: executing a boot program in the device,the boot program comprising instructions which when performed by amicroprocessor performs a boot sequence comprising the steps of:retrieving a resettable status flag from a memory associated with awireless receiver, the flag having at least first and second states;completing boot sequence performance if the flag is in the first state;and terminating boot sequence performance if the flag is in the secondstate.
 11. The method of claim 10, further comprising performing asecurity command before terminating boot sequence performance.
 12. Themethod of claim 10, wherein performing the security command comprisesaltering existing data stored on a disk drive in the device.
 13. Themethod claim 10, further comprising retrieving at least a portion of apage message.
 14. The method of claim 10, wherein executing a bootprogram comprises executing a boot program in a portable computer.
 15. Amethod of manufacturing a computing device having security functions,the method comprising: configuring the device to receive information viaa wireless receiver; providing a resettable status flag in a memory ofthe device; configuring a processor of the device to set the status ofthe flag based at least in part on the content of information receivedvia the wireless receiver; providing the device with computerinstructions that when executed by a processor of the device perform asecurity function that comprises the steps of: determining the status ofthe flag; if the flag is in a predetermined state, determining whether amodem of the device is connected to a communications network, andforwarding with the modem, via the communications network, informationindicative of the location of the device
 16. The method of claim 15,wherein configuring the device to receive information comprisesproviding a wireless receiver in the device.
 17. The method of claim 15,wherein forwarding with the modem comprises forwarding via the publicswitched telephone network information indicative of the location of thedevice.
 18. The method of claim 15, wherein configuring the devicecomprises configuring a portable computing device to receive informationvia a wireless receiver.
 19. The method of claim 18, wherein configuringthe device to receive information comprises providing a wirelessreceiver in the device.
 20. The method of claim 19, wherein forwardinginformation indicative of the location of the device comprisesinstructing the modem to transmit a caller ID tag of a phone where thedevice is located.
 21. A computing device having a security function,the device comprising: a wireless receiver; and computer instructionsoperative to cause the device to perform the following steps: receive anend-user input associated with defining a code to correspond to one ormore security function commands, wherein the code comprises alphanumericcharacters and is reprogrammable and customizable by the end-user;receive via the wireless receiver information comprising the code; andexecute the security function commands in response to receiving theinformation.
 22. The computing device of claim 21, wherein the devicecomprises a portable computing device.
 23. The computing device of claim22, wherein the computing device comprises a portable computer.
 24. Thecomputing device of claim 21, wherein the wireless receiver comprises apage receiver.
 25. The computing device of claim 24, wherein the deviceis configured to receive a page message.
 26. The computing device ofclaim 21, wherein the device is configured to execute a securityfunction command comprising altering existing data stored on a memory ofthe device.
 27. The computing device of claim 26, wherein the device isconfigured to alter data stored on a hard disk of the device.
 28. Thecomputing device of claim 26, wherein the device is configured toexecute a security function command comprising activating an audiblealarm.
 29. The computing device of claim 26, wherein the device isconfigured to execute a security function command comprising alteringthe performance of a subsequent boot sequence of the device.
 30. Anapparatus having a security function, the apparatus comprising: awireless receiver; a security setup program configured to allow anend-user to customize a code to correspond to one or more securityfunction commands, wherein the code comprises alphanumeric characters;means for receiving at the setup program an end-user input associatedwith customizing the code; a memory for storing information received viathe wireless receiver, wherein the information comprises the code; and amicroprocessor configured to perform the security function commands inresponse to the apparatus receiving the information.
 31. The apparatusof claim 30, wherein the wireless receiver comprises a page receiver.32. The apparatus of claim 30, wherein the setup program is configuredto allow an end-user to customize the code more than one time.
 33. Theapparatus of claim 30, wherein the apparatus comprises a portablecomputing device.
 34. The apparatus of claim 33, wherein the apparatuscomprises a portable computer.
 35. The apparatus of claim 30, whereinthe means for receiving comprises a keyboard, keypad, stylus, or pointerdevice.
 36. The apparatus of claim 30, wherein the microprocessor isconfigured to perform a security function command comprising alteringdata stored in a memory of the device.
 37. The apparatus of claim 30,wherein the microprocessor is configured to perform a security functioncommand comprising activating an audible alarm.
 38. The apparatus ofclaim 30, wherein the microprocessor is configured to perform a securityfunction command comprising altering the performance of a subsequentboot sequence of the device.
 39. The apparatus of claim 38, whereinaltering the performance of a subsequent boot sequence comprisesterminating the boot sequence if the code indicates that the device islost or stolen.
 40. The apparatus of claim 30, further comprising amodem, and wherein the microprocessor is configured to perform asecurity function command comprising instructing the modem to dial apredetermined telephone number and transmit a caller ID tag of a phonewhere the device is located.