|Publication number||USRE40012 E1|
|Application number||US 10/671,437|
|Publication date||Jan 22, 2008|
|Filing date||Sep 25, 2003|
|Priority date||Mar 15, 1999|
|Publication number||10671437, 671437, US RE40012 E1, US RE40012E1, US-E1-RE40012, USRE40012 E1, USRE40012E1|
|Inventors||Jennifer S. Patterson|
|Original Assignee||J2D Llc|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (22), Referenced by (5), Classifications (15), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application claims priority to U.S. Provisional patent application Ser. No. 60/124,413 filed on Mar. 15, 1999 which is herein incorporated by reference.
A software method for causing the speaker of a portable computer to emit an audible alarm when the authorized user has set the alarm and some unauthorized person attempts to move or steal the portable computer and, in so doing, closes the cover of the portable computer.
The present invention relates to methods of preventing theft of portable computers. While no method or device can prevent all thefts, the present invention, because it is a software method of preventing a particular kind of common theft of personal computers, substantially increases the number of owners of portable computers who can enjoy a greater measure of protection from thefts.
Many thefts of small, valuable devices such as portable computers occur when a dishonest person seizes an opportunity. There is no master plan, no forethought. The thief sees an unguarded item, picks it up, tucks it under a coat or into a shopping bag, and disappears with it. Thieves of this sort depend on acting without being detected. The present invention, by causing an alarm to sound, will convince most thieves to bolt and run, leaving behind the portable computer.
Portable computers, as opposed to desktop computers, provide benefits to their users and owners in direct proportion to their small size. Technology has expanded to allow small laptops and notebooks and even smaller palm-sized or hand-held portable computers. The benefits of small size allow portable computers to be carried from place to place with a minimum of effort while taking up very little room in backpacks or briefcases.
Would-be thieves have not failed to notice the small size of portable computers. A computer small enough to fit into the briefcase, backpack or pocket of its owner can be hidden just as easily in the briefcase, pocket or bag of a thief.
Theft of portable computers is widespread and especially common in libraries at colleges and universities. Opportunity for theft is created when students ignore their portable computers for short time spans while they nap, turn away from their work to talk with friends, gaze over their shoulders to look out windows as they think or daydream, and drop pens or papers and bend down to retrieve them. Any place students spend time between classes studying, working on their portable computers, and talking with friends—for example, campus unions or nearby coffee houses—presents similar opportunities for theft.
Presently available anti-theft devices range from physical devices such as chains and locks to motion detectors and remotely-triggered alarms as well as internal circuitry which causes an alarm to sound when the portable computer is moved. Others rely entirely on additional internal circuitry to cause an alarm to sound when the cover is closed on the portable computer.
Current anti-theft devices include the following: U.S. Pat. No. 5,757,271 to Andrews (1998)—a two-part motion detector, with one part internal and one part external; U.S. Pat. No. 5,760,690 to French (1998)—an internal motion detector; U.S. Pat. No. 5,648,762 to Ichimura (1997)—a “docking station” attached to a work surface into which the portable computer can be inserted and literally locked-down. U.S. Pat. No. 5,872,515 to Ha (1997) teaches a hardware means of causing an alarm to sound.
All of these devices are physical, hardware devices requiring either that the device be installed inside the computer case during manufacture or that the device be attached externally. The former method limits the protection to those who buy from particular manufacturers. The latter might prevent theft but also prevents the authorized user from carrying the computer from place to place. Since ease of transport and the ability to use the personal computer in many locations are among the primary reasons for owning a portable computer, anything that prevents the authorized user from transporting the portable computer decreases the usefulness of the portable computer.
A drawback of current internally installed anti-theft devices to manufacturers of portable computers is the extra expense of buying or making the hardware, and warehousing spares for repairs. Since the trend in portable computers is for them to be ever thinner and lighter, finding a place to put hardware without impeding heat-removal airflow is another drawback. A further drawback of the existing internal devices is that computers already manufactured cannot utilize the internal devices.
A major drawback of external chains and locks for portable computers is that the chains and locks must be carried along and attached at each place the portable computer is used. These devices provide no protection at all to the forgetful who leave them home or are in too much of a hurry to use them. Many such devices are not, themselves, portable since they must be screwed down or otherwise permanently fastened to some object not easily moved, such as a table.
The present invention teaches a software method for causing the speaker of a portable computer to emit an audible alarm whenever the authorized user has left the computer in a state with the alarm activated and speaker turned on and some unauthorized person attempts to move or steal the portable computer and, in doing so, closes the cover of the portable computer.
A thief wishes to avoid detection. In achieving this, the thief nearly always tries to conceal the object being stolen. In the case of a portable computer, concealment is enhanced by making the portable computer take up the least possible room. To minimize the size of the computer, the thief will nearly always close the cover on the computer. The invention takes advantage of the thief's closing the cover. When the thief closes that cover, the invention will cause an audible alarm thereby alerting the owner and bringing attention to the act of the thief. Most thieves will leave the computer alone and flee. The authorized user will be notified of the attempt to steal the computer. The theft should be prevented.
One of the advantages of the present invention is that it provides wider availability of protection against theft than do hardware-based alarms by permitting any portable computer user to install the software which is the disclosed invention. This will give a greater measure of anti-theft protection to those authorized users whose portable computers were not built with special, and relatively expensive, internal an circuitry.
Another advantage of the present invention is that an authorized user may select either to allow the speaker to emit an alarm at the maximum volume the speaker is capable of or to emit an alarm at a volume selected by the authorized user.
Another advantage of the present invention is that it permits an authorized user to select a password, a hot-key sequence, or both, whereby said authorized user may deactivate or activate the alarm feature.
Another advantage of the present invention is that it provides this wider level of protection whether a given portable computer employs an interrupt to initiate an instruction segment whenever the cover of said portable computer is foldably closed against the main body of said portable computer or if said portable computer must rely on a polling scheme for the same purpose.
Still another advantage of the present invention is that software is quite inexpensive to install. Changing the hardware internals can be quite expensive requiring various circuitry plus some quantity of labor to implement the circuitry. Installing new hardware can take substantial time. The present invention can be installed by the authorized user in a few minutes.
Yet another advantage is that the present invention, unlike the locks and chain used in some methods of preventing theft, will continue to permit the authorized user to transport said portable computer which is a major advantage and the reason for having portable computers.
Portable computers contain nearly all of the major components of desktop and even larger computers.
The main computer body 13 of the portable computer contains much of the circuitry which will include the processor, memory, a mass storage device, and other circuitry. (Not shown.) On the outside of this main computer body lie the keyboard 15 for input and, usually, some form of pointing device, often called a “mouse” 16.
The cover and main computer body are connected by a hinge 14. This permits the cover and main computer body to be foldably dosed so the portable computer looks like a book, as in FIG. 1b.
One drawback of modern portable computers is that they consume a substantial amount of energy to run, substantial relative to the batteries that power them. Manufacturers strive to devise ways to extend battery life.
One common method to prolong battery life is to shut down the display when the cover is closed. This requires some way to detect if the cover has been foldably closed against the main computer body as in FIG. 1b. The detection is often made with a microswitch. The present invention is not limited to use of a microswitch. An electric eye or infrared sensor or any other means would suffice for purposes of the present invention. This invention is not concerned with the particular device or method used to detect that the cover is foldably closed against the main computer body nor is it concerned with the structure or architecture of the hardware components. It does not matter to the present invention whether the display is an LCD or a plasma screen or any other technology. The invention depends only that there be some way among the many possible ways to detect that the cover is foldably closed against the main computer body and that said detection causes some change in the portable computer's internal environment so that the software can react to that change.
It is well-known in the art to use a microswitch to detect if a cover of a portable computer is closed or open. It is also well-known in the computer art to make said microswitch send a signal to the portable computer's interrupt vector when a cover closes. FIG. 2.
An interrupt vector 20 is a portion of the processor or memory. It is a table of addresses to which control of the computer processor will be transferred upon occurrence of the particular interrupt Such addresses are sometimes called “pointers” or “indirect addresses”. They are, in effect, addresses of other addresses. By various techniques well-known in the art, such pointers or indirect addresses can in turn point to other pointers or indirect addresses forming what is sometimes called a “cascade” of pointers or indirect addresses.
The number of levels of such a cascade can vary from one to any number depending on how the programmer writes the instructions. In the present invention, the term “indirect address” is used in the well-accepted sense of applying to cascades of any number of levels.
An interrupt is a cessation of processing and almost immediate transfer of control to the interrupt vector. A computer designer or component designer designs as many interrupts as the designer deems appropriate. Each condition that might cause an interrupt has its own location in the vector. The designer may design the processor so that the interrupt vector has the interrupt locations in any order the designer deems appropriate. Control of the processor is transferred to an address stored in the interrupt vector should that type of interrupt occur. The process of doing whatever the particular interrupt requires is called “interrupt handling”.
The interrupt vector 20 contains numerous locations shown as 22 and 24. Whenever one of the interrupts occur, a computer stops what it is doing, saves the address of where the instruction was that the computer was executing when the interrupt occurs, reads the address in the location of the interrupt vector corresponding to the particular interrupt 22, then transfers control of the computer to the instruction segment at the address corresponding to that address in the interrupt vector.
A computer program can, through various techniques well-known in the art, alter an address in the interrupt vector 20. In its simplest form, this process, known as “trapping an interrupt”, is accomplished by replacing the address in the interrupt vector 20 for a particular interrupt with the address of an instruction that a programmer wishes the computer to execute instead.
Trapping is normally accomplished during the system start or “boot” process. It does not matter whether it is a cold boot—meaning starting with the portable computer shut off—or a warm boot—meaning starting with the portable computer running. The trapping is the same. FIG. 3.
Next, the boot process segment 30 stores the starting address of the instruction segment which processes the cover-dosed interrupt 40 in the closed-cover interrupt location 24.
Thus, when the closed-cover interrupt occurs, control passes to the instruction segment shown in FIG. 4.
Once the trapping has been completed, the boot process continues 36.
If the cover is closed 40, control passes to the next instruction segment If the cover is not closed, control passes to the step shown at 48. As part of the boot process, the instruction segment at 48 was changed to contain the address of the interrupt handler that would have been executed but for the changes made by the present invention. Usually, this is an instruction segment intended to power down or decrease power to the display. This power down or power decrease function is not part of the present invention.
If control reaches 42, the instruction segment checks to see if the speaker is enabled This is usually a function of the operating system. It is common for an operating system to permit a user to turn the speaker off or to turn down the volume on that speaker. If the speaker is not enabled, control passes to 48, described above. If the speaker is enabled, control passes to 44.
At 44, the instruction segment checks to see if the alarm is activated. The authorized user has a number of options for activating and deactivating the alarm. These options permit the authorized user to turn off the alarm so that, for example, the authorized user may shut the cover on the authorized user's own portable computer without causing an alarm to sound. If the alarm has been deactivated, control passes to 48 as described above.
If the alarm is activated 44, control passes to the instruction segment that causes the speaker to emit the alarm 46.
One common method is to have the detecting device, which may be a microswitch or other device, change the condition of a register or status indicator location in memory or the processor. In order to begin the power down process, the operating system polls said register or status indicator. This means that some instruction segment tests the register or status indicator to detect if the register or status indicator indicates the cover is closed. Said instruction segment may be part of the operating system or it may be an instruction segment that is started and executed on a regular or irregular basis.
In the polling case, there is no need to implement a boot process instruction segment since polling does not depend on interrupts. However, the polling program must be started during initialization or manually be the authorized user.
The polling sequence begins at 50. The instruction segment reads the register or status indicator 52 then tests the contents thereof to detect if the register or status indicator indicates the cover is foldably closed against the main computer body. If the register or status indicator does not indicate the cover is foldably closed against the rain computer body, control passes to 56. At 56, control passes to whatever instruction segment would have been executed but for the polling segment's executing. If the register or status indicator does indicate the cover is foldably closed against the main computer body, the present invention passes control to 40 as shown in
The preferred embodiment of the present invention contains a variety of features as set out in the claims. The present invention is implemented on any personal computer which contains any method for detecting that the cover is foldably closed against the main computer body. The present invention is installed as a software program on any of said portable computers.
The preferred method begins during the boot process, the process of initializing a portable or other computer, loading the operating system, loading programs, and any other tasks that are executed when said portable or other computer is started from a power off situation, called a cold boot, or restarted from a power on situation, called a warm boot.
The preferred embodiment of the present invention operates during a cold or a warm boot. The type of boot has no effect on the operation of the method.
During the boot process, the cover-closed interrupt is trapped so that, upon triggering of a closed-cover interrupt, control will transfer to the start of the instruction segment which represents the present invention.
The present invention will cause a speaker in said portable computer to emit a sound which serves as an alarm. In the preferred embodiment, the authorized user may set the volume of said speaker to its maximum or the authorized user may select some other volume or sound. In the preferred embodiment, the authorized user may also select a password for deactivating the program segment, specifically said program segment which causes said speaker to emit said alarm. The authorized user may also select passwords or hot-key sequences or both, said passwords being used for activating or deactivating the instruction segment, specifically, said program segment which causes said speaker to emit said alarm. The password for activating the instruction segment may be different from the password for deactivating the program segment. The hot-key sequence for activating the instruction segment may be different from the hot-key sequence for deactivating the instruction segment. The authorized user may activate the program segment with a password and deactivate the program segment with a hot-key sequence or vice-versa.
An alternative embodiment differs from the above-described embodiment only in that this alternative embodiment allows the present invention to be implemented on a portable computer which does not employ an interrupt to indicate said cover is foldably dosed against said main computer body. In the alternative embodiment, the present invention polls the register or status location which is changed when the cover is foldably closed against the main computer body. In said alternative embodiment there is no interrupt trapping so, in this embodiment, there is nothing to be done at boot time. The program segment must be started by the operating system or the authorized user.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4686514 *||May 22, 1986||Aug 11, 1987||Integrated Technology Work, Inc.||Alarm system for computers and the like|
|US4812841 *||May 26, 1987||Mar 14, 1989||Chen Hai C||Computer-controlled password lock|
|US4899368 *||Jan 22, 1988||Feb 6, 1990||Lisa Krohn||Switching mechanism for electrical devices|
|US5034723 *||Mar 1, 1990||Jul 23, 1991||Nynex Corporation||Security cable and system for protecting electronic equipment|
|US5406261 *||Jan 11, 1993||Apr 11, 1995||Glenn; James T.||Computer security apparatus and method|
|US5578991 *||Dec 2, 1994||Nov 26, 1996||Dell Usa, L.P.||Security system and method for a portable personal computer|
|US5612520 *||Jun 7, 1995||Mar 18, 1997||Ast Research, Inc.||Suspend switch for portable electronic equipment|
|US5648762 *||Feb 1, 1995||Jul 15, 1997||Canon Kabushiki Kaisha||Built-in electronic apparatus and device-detaching method therefor|
|US5675321 *||Nov 29, 1995||Oct 7, 1997||Mcbride; Randall C.||Personal computer security system|
|US5757271 *||Nov 12, 1996||May 26, 1998||International Business Machines Corporation||Portable computer and method of providing security for an electronic device|
|US5757616 *||Oct 31, 1996||May 26, 1998||Hewlett-Packard Company||Physical security system for portable computer|
|US5760690 *||May 2, 1996||Jun 2, 1998||Digital Equipment Corporation||Portable computer with integrated alarm system|
|US5767771 *||Mar 8, 1996||Jun 16, 1998||Independent Security Appraisers Of Canada||Electronic equipment theft deterrent system|
|US5787738 *||Dec 18, 1996||Aug 4, 1998||Brandt; Dean M.||Security lock for a laptop computer|
|US5805066 *||Jun 2, 1995||Sep 8, 1998||Murdy; Dwight||Instrument case and alarm|
|US5818345 *||Dec 1, 1995||Oct 6, 1998||Icl Systems Ab||Theft protection for electrically-powered articles|
|US5867097 *||Aug 19, 1996||Feb 2, 1999||Samsung Electronics Co., Ltd.||Method and apparatus for alarm signal processing|
|US5872515 *||Mar 11, 1997||Feb 16, 1999||Samsung Electronics Co., Ltd.||Laptop computer with an anti-theft alarm function and a method of controlling the same|
|US5936526 *||Jan 13, 1998||Aug 10, 1999||Micron Electronics, Inc.||Apparatus for generating an alarm in a portable computer system|
|US5963131 *||Aug 4, 1998||Oct 5, 1999||Lexent Technologies, Inc.||Anti-theft device with alarm screening|
|US5987613 *||Dec 20, 1994||Nov 16, 1999||Dell Computer Corporation||Portable computer with time-sensitive tri-modal power management switch|
|US6011473 *||Jan 13, 1998||Jan 4, 2000||Micron Electronics, Inc.||Method for generating an alarm in a portable computer system|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7518508 *||Dec 8, 2005||Apr 14, 2009||Sava Cvek||Emergency and security condition retractable computer arrangements|
|US7548160 *||Sep 22, 2006||Jun 16, 2009||Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd.||Anti-theft alarm system for portable computer|
|US20060161993 *||Dec 8, 2005||Jul 20, 2006||Sava Cvek||Emergency and security condition retractable computer arrangements|
|US20070103300 *||Aug 28, 2006||May 10, 2007||Hon Hai Precision Industry Co., Ltd.||Burglar alarm system and method for a portable device|
|US20070152820 *||Sep 22, 2006||Jul 5, 2007||Hon Hai Precision Industry Co., Ltd.||Anti-theft alarm system for portable computer|
|U.S. Classification||340/571, 340/686.1, 340/568.1, 340/687, 704/273|
|International Classification||G08B13/14, G06F1/16|
|Cooperative Classification||G06F1/1677, G06F1/1616, G08B13/1418, G08B13/149|
|European Classification||G06F1/16P1F, G06F1/16P9M2, G08B13/14B1, G08B13/14P|
|Apr 6, 2009||REMI||Maintenance fee reminder mailed|
|Sep 27, 2009||LAPS||Lapse for failure to pay maintenance fees|
|Dec 4, 2012||FPAY||Fee payment|
Year of fee payment: 12