A computer-implemented method for determining whether a camera component of a camera includes obtaining information relating to one or more damage indicators; obtaining, from the camera, at least one image which has been taken when light from a light source has been incident on the camera component; dividing the image into one or more areas; analysing each area to determine whether each area includes at least one of the one or more damage indicators; and based on said analysing, providing an indication of whether the camera component is classified as damaged or undamaged.
H04N 23/617 - Mise à niveau ou mise à jour des programmes ou des applications pour la commande des caméras
H04N 25/61 - Traitement du bruit, p.ex. détection, correction, réduction ou élimination du bruit le bruit provenant uniquement de l'objectif, p. ex. l'éblouissement, l'ombrage, le vignettage ou le "cos4"
2.
SECURE ERASURE AND REPLACEMENT OF VIRTUAL MACHINE POOLS
The present disclosure relates to a method and apparatus for securely erasing and replacing a pool of virtual machines and in particular, though not exclusively, to a method and apparatus for securely erasing and replacing a pool of virtual desktops. The virtual machines of the pool of virtual machines are implemented on a common virtualization layer and are managed by a common virtual machine management application. The method comprises using the virtual machine management application to create a replacement pool of virtual machines on the common virtualization layer, wherein the replacement pool of virtual machines has the same configuration and/or settings as the pool of virtual machines. The method further comprises using an erasure application to erase each virtual machine of the pool of virtual machines, wherein the erasure application is executable independently of the virtual machine management application, and using the virtual machine management application to delete the pool of virtual machines.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
3.
DIAGNOSIS OF MOBILE DEVICES USING BUILT-IN ACTUATORS AND SENSORS
According to an aspect, there is provided a method for self-diagnosing a mobile device comprising at least one or more actuators, one or more sensors and a display. The method comprises, first, feeding a pre-defined control signal to a first actuator of the mobile device and measuring, in response to the feeding, a first electric signal using a first sensor of the one or more sensors. Then, the first electric signal is compared to one or more reference signals associated with the first actuator and the pre-defined control signal. If the first electric signal fails to match the one or more reference signals according to one or more pre-defined criteria, negative diagnosis is indicated to use of the mobile device using one or more of a display of the mobile device and one or more actuators of the mobile device.
There is presented a system and method for detecting mobile device fault conditions, including detecting fault conditions by software operating on the mobile device. In one embodiment, the present invention provides for systems and methods for detecting that a mobile device has a cracked screen, and reporting the status of the screen, working or not, so that appropriate action may be taken by a third party. In one embodiment, the data obtained by testing of the mobile device is encrypted to prevent tampering or spoofing by the user of the mobile device, and is suitably decrypted by the recipient or software running within a server.
G06F 11/263 - Génération de signaux d'entrée de test, p.ex. vecteurs, formes ou séquences de test
G01L 5/22 - Appareils ou procédés pour la mesure des forces, du travail, de la puissance mécanique ou du couple, spécialement adaptés à des fins spécifiques pour la mesure de la force appliquée aux organes de commande, p.ex. organes de commande des véhicules, détentes
G06F 3/041 - Numériseurs, p.ex. pour des écrans ou des pavés tactiles, caractérisés par les moyens de transduction
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p.ex. essais de mise en route
5.
SYSTEM AND METHOD FOR DIRECT DEVICE COMMUNICATION WITH DIAGNOSTICS AND PROVISIONING
There are provided systems and methods for mobile device diagnostics and provisioning, whereby connections are effectuated to communicate directly with hardware of mobile devices to perform diagnostics and other functions such as device erasure without the need to first install an app on the mobile device. In this manner, information such as detailed product identification, vendor identification, and diagnostic information may be quickly obtained from the mobile device, and diagnostics and erasure undertaken to return a previously owned device into the stream of commerce in an efficient manner.
G06F 13/20 - Gestion de demandes d'interconnexion ou de transfert pour l'accès au bus d'entrée/sortie
H04M 1/72409 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens de soutien local des applications accroissant la fonctionnalité par interfaçage avec des accessoires externes
A method for use in testing an operational status of a light source for illuminating a scene, comprises using a camera to capture a first image when the light source is disabled, the light source having a fixed spatial relationship relative to the camera, and using the camera to capture a second image when the light source is enabled. The method comprises determining a test result indicating the operational status of the light source based at least in part on a light source setting when the camera captures each of the first and second images, the light source setting indicating whether the light source is disabled or enabled when the camera captures the first and second images and at least one of: one or more camera settings when the camera captures the first and second images, and one or more image properties of the first and second images. Such a method may be used for testing the operational status of a light source and, in particular, though not exclusively, for use in automatically testing the operational status of a camera flash of a mobile electronic device.
G03B 43/00 - Test du fonctionnement correct d'appareils photographiques ou de leurs pièces
H04N 23/74 - Circuits de compensation de la variation de luminosité dans la scène en influençant la luminosité de la scène à l'aide de moyens d'éclairage
7.
STREAMING METHOD AND SYSTEM FOR MOBILE ELECTRONIC DEVICE DIAGNOSTICS
A method for use in performing a diagnostic test on a mobile electronic device, comprises: (i) transmitting, from a server to the mobile electronic device, data defining a portion of an algorithm, the algorithm defining the diagnostic test; (ii) executing, on the mobile electronic device, the portion of the algorithm; and (iii) repeating steps (i) and (ii) for each portion of the algorithm until the diagnostic test is complete. Such a method may avoid any requirement to install a computer program defining an algorithm for a diagnostic test on the mobile electronic device. The present disclosure also relates to a system, a method and a computer program for use in performing a diagnostic test on a mobile electronic device and, in particular, though not exclusively for use in performing a diagnostic test on a mobile phone, a smartphone, a tablet or a laptop.
A mobile electronic device comprises an operating system and a method for use in providing system-level diagnostic information relating to the performance of hardware of the mobile electronic device comprises receiving a request from a user of the mobile electronic device to execute a diagnostics application on the mobile electronic device and executing the diagnostics application on the mobile electronic device based on user privileges in response to the received user request. Executing the diagnostics application causes the mobile electronic device to invite the user to confirm whether the operating system should generate a bug report and the operating system to generate a bug report at the mobile electronic device in response to the user confirming that the bug report should be generated. The method further comprises extracting the system-level diagnostic information from the bug report at the mobile electronic device and/or at a server located remotely from the mobile electronic device and making the extracted system-level diagnostic information accessible to a third party located remotely from the mobile electronic device and from the server. The method may allow a third party to remotely access the system-level diagnostics information indirectly, for example from a server located remotely from the mobile electronic device. Further, such a method enables system-level information to be obtained from the bug report based only on read-only user privileges.
A method for use in determining a condition of a battery of a mobile electronic device, comprises receiving, at a server, mobile electronic device data from a mobile electronic device, receiving, at the server, information relating to each candidate method of a plurality of candidate methods, each candidate method being configured for determining a value of a corresponding battery condition, wherein the battery condition value corresponding to each candidate method is representative of the condition of the battery of the mobile electronic device. The method further comprises determining whether any of the candidate methods are capable of determining a corresponding battery condition value based at least in part on the mobile electronic device data and the information relating to each candidate method, and, in response to determining that one or more of the candidate methods is capable of determining one or more corresponding battery condition values, performing one or more of the capable methods to thereby determine the one or more corresponding battery condition values. The method may be suitable for use in determining a condition of a battery of a mobile electronic device and, in particular though not exclusively, for use in determining a condition of a battery of a mobile electronic device which comprises or runs an Android operating system.
G01R 31/367 - Logiciels à cet effet, p.ex. pour le test des batteries en utilisant une modélisation ou des tables de correspondance
G01R 31/371 - Dispositions pour le test, la mesure ou la surveillance de l’état électrique d’accumulateurs ou de batteries, p.ex. de la capacité ou de l’état de charge avec indication à distance, p.ex. sur des chargeurs séparés
G01R 31/392 - Détermination du vieillissement ou de la dégradation de la batterie, p.ex. état de santé
A method for erasing data stored from memory of a network device comprises erasing stored data from the memory of the network device and requesting data from the memory of the network device after completion of the data erasure procedure or accessing the memory of the network device after completion of the data erasure procedure. The method further comprises determining the outcome of the data erasure procedure based at least in part on: the results of a comparison between a response received from the network device and an expected response which indicates a successful erasure of the memory of the network device; or a comparison between any contents of the memory of the network device after completion of the data erasure procedure and expected contents of the memory after the data erasure procedure which are indicative of a successful erasure of the memory of the network device.
A method for performing an operation in relation to a USB device, comprises configuring a USB interface in a USB controller so as to open one or more pipes between the USB controller and one or more corresponding USB endpoints of a USB device according to a required USB endpoint configuration of the USB device that is required for performing an operation in relation to the USB device, performing the operation in relation to the USB device, and unconfiguring the configured USB interface in the USB controller so as to close the one or more pipes between the USB controller and the one or more corresponding USB endpoints of the USB device. Such a method may allow operations to be performed concurrently in relation to a greater number of USB devices than the prior art methods and/or may allow operations to be performed concurrently in relation to the same number of USB devices using fewer USB endpoint resources of the USB controller and/or fewer USB controllers than the prior art methods.
A method for use in determining a status of a mobile electronic device, comprises repeatedly reading information from a debug log stored in a ringbuffer of the mobile electronic device, repeatedly using the information read from the debug log to construct and maintain an event history for the mobile electronic device, and repeatedly determining the status of the mobile electronic device based on the event history. The method may be used for determining a status of a mobile electronic device and, in particular though not exclusively, for use in determining a status of one or more hardware elements of a mobile phone, a smartphone, a tablet and/or a laptop. A system and a computer program for use in determining a status of a mobile electronic device are also disclosed.
The present disclosure relates to a method and apparatus for securely erasing and replacing a pool of virtual machines and in particular, though not exclusively, to a method and apparatus for securely erasing and replacing a pool of virtual desktops. The virtual machines of the pool of virtual machines are implemented on a common virtualization layer and are managed by a common virtual machine management application. The method comprises using the virtual machine management application to create a replacement pool of virtual machines on the common virtualization layer, wherein the replacement pool of virtual machines has the same configuration and/or settings as the pool of virtual machines. The method further comprises using an erasure application to erase each virtual machine of the pool of virtual machines, wherein the erasure application is executable independently of the virtual machine management application, and using the virtual machine management application to delete the pool of virtual machines.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
H04L 41/0897 - Capacité à monter en charge au moyen de ressources horizontales ou verticales, ou au moyen d’entités de migration, p.ex. au moyen de ressources ou d’entités virtuelles
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data erasure software; data destruction software;
downloadable computer security software; mobile apps;
application software, computer application software and
downloadable computer software applications for use in
relation to data erasure; computer application software for
mobile devices; software for cloud computing services;
software for servers; computer hardware; downloadable
applications for use with mobile devices; computer hardware
and computer software for use in relation to data erasure
management; software for diagnostics and troubleshooting;
diagnostic and troubleshooting application software;
electronic publications; downloadable publications; computer
software and computer hardware for use in the repair of
mobile devices; computer software and computer hardware for
use in IT asset disposal and recycling. Design and development of computer hardware and software;
design and development of mobile applications; hardware and
software consulting services; software as a service;
computer software technical support services; computer
programming; data security services; computer services,
namely computerized data erasure services; computer
technology consultancy in the field of data management;
computer programming services for commercial analysis and
reporting; cloud computing services; design and development
of electronic data security systems; computer services,
namely destroying computerized documents and other forms of
recorded media and data storage media; IT consultancy,
advisory and information services; providing temporary use
of non-downloadable software for use in relation to data
erasure, diagnostics and troubleshooting.
15.
DIAGNOSTIC TEST PRIORITIZATION BASED ON ACCUMULATED DIAGNOSTIC REPORTS
According to an aspect, there is provided a method for guiding a user in diagnostic test selection. Initially, one or more diagnostic reports on each of a plurality of computing devices are maintained (201) in a diagnostic report database (103). In response to receiving (204) a first set of one or more device parameters characterizing a second computing device (124) from a first computing device (121), a remote computing system (101) compares (204) the first set to a plurality of sets of device parameters maintained in the diagnostic report database (103) to find one or more relevant diagnostic reports. The remote computing system (101) predicts (205) results of one or more diagnostic tests when performed on the second computing device (124) based on results of one or more diagnostic tests in the one or more relevant diagnostic reports by using statistical analysis. The remote computing system (101) sends (206) results of the predicting to the first computing device (121).
A computer-implemented method for determining whether a camera component of a camera is damaged is described. The method comprises obtaining information relating to one or more damage indicators; obtaining, from the camera, at least one image which has been taken when light from a light source has been incident on the camera component; dividing the image into one or more areas; analysing each area to determine whether it comprises at least one of the one or more damage indicators; and based on said analysing, providing an indication of whether the camera component is classified as damaged or undamaged.
H04N 23/617 - Mise à niveau ou mise à jour des programmes ou des applications pour la commande des caméras
H04N 25/61 - Traitement du bruit, p.ex. détection, correction, réduction ou élimination du bruit le bruit provenant uniquement de l'objectif, p. ex. l'éblouissement, l'ombrage, le vignettage ou le "cos4"
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Data erasure software; data destruction software; downloadable computer security software; downloadable applications for mobile phones, smart phones and tablet computers for assessing the performance of and diagnosing problems with mobile telephones, smart telephones, and tablet computers and providing data sanitization on these devices; application software, computer application software and downloadable computer software applications for use in relation to data erasure; computer application software for mobile phones, smart phones and tablet computers, namely, software for destroying electronic documents and erasure and sanitization of data on other forms of recorded media and data storage media; downloadable cloud-computing software for the management, erasure and sanitization of data; computer operating software for servers for the management, erasure and sanitization of data; computer hardware; downloadable applications for use with mobile phones, smart phones and tablet computers for assessing the performance of and diagnosing problems with mobile telephones, smart telephones, and tablet computers and providing data sanitization on these devices; computer hardware and computer software for use in relation to data erasure management; computer software for diagnosing and troubleshooting problems with mobile telephones, smart telephones, and tablet computers; computer application software for diagnosing and troubleshooting problems with mobile telephones, smart telephones, and tablet computers; electronic downloadable publications, namely, whitepapers, reports, magazines and journals in the field of data management, mobile diagnostics, erasure and sanitization for computer security; computer software and computer hardware for use in the repair of mobile devices, namely mobile telephones, smart telephones, and tablet computers and for the management, erasure and sanitization of data in the repair process; computer software and computer hardware for use in IT asset disposal and recycling. (1) Design and development of computer hardware and software; design and development of mobile applications; hardware and software consulting services; software as a service (SAAS) provider services in the field of software for data management, mobile diagnostics, erasure and sanitization in the field of computer security; computer software technical support services; computer programming; data security services; computer services, namely computerized data erasure services; computer technology consultancy in the field of data management; computer programming services for commercial analysis and reporting; cloud computing services, namely, consulting services in the field of cloud computing provider services; design and development of electronic data security systems; computer services, namely destroying computerized documents and other forms of recorded media and data storage media; computer software consultancy; computer security consultancy; providing temporary use of non-downloadable software for use in relation to data erasure, diagnostics and troubleshooting.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software to destroy electronic documents and data on a variety of platforms, namely, computers, smart phones, and storage devices Software as a Service (SAAS) services featuring software to destroy electronic documents and data on a variety of platforms, namely, computers, smart phones, and storage devices
19.
Providing User Guidance on Erasure Process Selection Based on Accumulated Erasure Reports
According to an aspect, there is provided a method for guiding a user of a first computing device in selecting a suitable erasure process for a second computing device. Initially, information on a plurality of erasure reports describing erasure processes carried out for computing devices is maintained in an erasure report database. A remote computing device receives one or more device parameters characterizing the second computing device from the first computing device. The remote computing system compares the one or more device parameters to device parameters maintained in the erasure report database in response to the receiving and based thereon determines one or more expected erasure process properties for at least one erasure process for erasing a memory or part thereof of the second computing device. The remote computing system sends the one or more expected erasure process properties for said at least one erasure process to the first computing device.
A method for use in performing a diagnostic test on a mobile electronic device, comprises: (i) transmitting, from a server to the mobile electronic device, data defining a portion of an algorithm, the algorithm defining the diagnostic test; (ii) executing, on the mobile electronic device, the portion of the algorithm; and (iii) repeating steps (i) and (ii) for each portion of the algorithm until the diagnostic test is complete. Such a method may avoid any requirement to install a computer program defining an algorithm for a diagnostic test on the mobile electronic device. The present disclosure also relates to a system, a method and a computer program for use in performing a diagnostic test on a mobile electronic device and, in particular, though not exclusively for use in performing a diagnostic test on a mobile phone, a smartphone, a tablet or a laptop.
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p.ex. essais de mise en route
G06F 11/32 - Surveillance du fonctionnement avec indication visuelle du fonctionnement de la machine
G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
A method for use in testing an operational status of a light source for illuminating a scene, comprises using a camera to capture a first image when the light source is disabled, the light source having a fixed spatial relationship relative to the camera, and using the camera to capture a second image when the light source is enabled. The method comprises determining a test result indicating the operational status of the light source based at least in part on a light source setting when the camera captures each of the first and second images, the light source setting indicating whether the light source is disabled or enabled when the camera captures the first and second images and at least one of: one or more camera settings when the camera captures the first and second images, and one or more image properties of the first and second images. Such a method may be used for testing the operational status of a light source and, in particular, though not exclusively, for use in automatically testing the operational status of a camera flash of a mobile electronic device.
A mobile electronic device comprises an operating system and a method for use in providing system-level diagnostic information relating to the performance of hardware of the mobile electronic device comprises receiving a request from a user of the mobile electronic device to execute a diagnostics application on the mobile electronic device and executing the diagnostics application on the mobile electronic device based on user privileges in response to the received user request. Executing the diagnostics application causes the mobile electronic device to invite the user to confirm whether the operating system should generate a bug report and the operating system to generate a bug report at the mobile electronic device in response to the user confirming that the bug report should be generated. The method further comprises extracting the system-level diagnostic information from the bug report at the mobile electronic device and/or at a server located remotely from the mobile electronic device and making the extracted system-level diagnostic information accessible to a third party located remotely from the mobile electronic device and from the server. The method may allow a third party to remotely access the system-level diagnostics information indirectly, for example from a server located remotely from the mobile electronic device. Further, such a method enables system-level information to be obtained from the bug report based only on read-only user privileges.
A method for use in determining a condition of a battery of a mobile electronic device, comprises receiving, at a server, mobile electronic device data from a mobile electronic device, receiving, at the server, information relating to each candidate method of a plurality of candidate methods, each candidate method being configured for determining a value of a corresponding battery condition, wherein the battery condition value corresponding to each candidate method is representative of the condition of the battery of the mobile electronic device. The method further comprises determining whether any of the candidate methods are capable of determining a corresponding battery condition value based at least in part on the mobile electronic device data and the information relating to each candidate method, and, in response to determining that one or more of the candidate methods is capable of determining one or more corresponding battery condition values, performing one or more of the capable methods to thereby determine the one or more corresponding battery condition values. The method may be suitable for use in determining a condition of a battery of a mobile electronic device and, in particular though not exclusively, for use in determining a condition of a battery of a mobile electronic device which comprises or runs an Android operating system.
G06F 1/28 - Surveillance, p.ex. détection des pannes d'alimentation par franchissement de seuils
G01R 31/367 - Logiciels à cet effet, p.ex. pour le test des batteries en utilisant une modélisation ou des tables de correspondance
G01R 31/371 - Dispositions pour le test, la mesure ou la surveillance de l’état électrique d’accumulateurs ou de batteries, p.ex. de la capacité ou de l’état de charge avec indication à distance, p.ex. sur des chargeurs séparés
G01R 31/392 - Détermination du vieillissement ou de la dégradation de la batterie, p.ex. état de santé
G06F 1/3212 - Surveillance du niveau de charge de la batterie, p.ex. un mode d’économie d’énergie étant activé lorsque la tension de la batterie descend sous un certain niveau
H02J 7/00 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries
H01M 10/42 - Procédés ou dispositions pour assurer le fonctionnement ou l'entretien des éléments secondaires ou des demi-éléments secondaires
24.
Diagnosis of mobile devices using built-in actuators and sensors
According to an aspect, there is provided a method for self-diagnosing a mobile device comprising at least one or more actuators, one or more sensors and a display. The method comprises, first, feeding a pre-defined control signal to a first actuator of the mobile device and measuring, in response to the feeding, a first electric signal using a first sensor of the one or more sensors. Then, the first electric signal is compared to one or more reference signals associated with the first actuator and the pre-defined control signal. If the first electric signal fails to match the one or more reference signals according to one or more pre-defined criteria, a negative diagnosis is indicated to a user of the mobile device using one or more of a display of the mobile device and one or more actuators of the mobile device.
A method for erasing stored data from the memory of the network device and requesting data from the memory after completion of the data erasure procedure or accessing the memory of the network device after completion of the data erasure procedure. The method further comprises determining the outcome of the data erasure procedure based on: the results of a comparison between a response received from the network device in reply to the request for data and an expected response which is indicative of a successful erasure of the memory of the network device; or the results of a comparison between any contents of the memory of the network device after completion of the data erasure procedure and expected contents of the memory of the network device after completion of the data erasure procedure which are indicative of a successful erasure of the memory of the network device.
A method for use in erasing data stored in the memory of a network device comprises performing a data erasure procedure to erase stored data from the memory of the network device and requesting data from the memory of the network device after completion of the data erasure procedure or accessing the memory of the network device after completion of the data erasure procedure. The method further comprises determining the outcome of the data erasure procedure based at least in part on: the results of a comparison between a response received from the network device in reply to the request for data and an expected response which is indicative of a successful erasure of the memory of the network device; or the results of a comparison between any contents of the memory of the network device after completion of the data erasure procedure and expected contents of the memory of the network device after completion of the data erasure procedure which are indicative of a successful erasure of the memory of the network device. The method may comprise erasing all accessible data stored in the memory of the network device.
There are provided systems and methods for extensible device assessment and dynamic policy configuration, where a plurality of devices associated with a primary device owner can be covered in a dynamically adjustable insurance policy. In one embodiment, a primary device is tested and assessed for insurability, then additional related devices may be discovered devices through network connections established through communications interfaces with the primary device (as well as direct inputs from the device owner. Then once devices are discovered and more fully diagnosed for operational status, insurance/warranty options are assessed, and a list of devices, coverage options, and cost is provided to the device owner. As such, comprehensive insurance with known and manageable risk may be provided for a collection of devices, not all of which may be presented to an insurance agent in person.
B60R 16/023 - Circuits électriques ou circuits de fluides spécialement adaptés aux véhicules et non prévus ailleurs; Agencement des éléments des circuits électriques ou des circuits de fluides spécialement adapté aux véhicules et non prévu ailleurs électriques pour la transmission de signaux entre des parties ou des sous-systèmes du véhicule
G01S 19/48 - Détermination de position en combinant ou en commutant entre les solutions de position dérivées du système de positionnement par satellite à radiophares et les solutions de position dérivées d'un autre système
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data erasure software; data destruction software; downloadable computer security software; mobile apps; application software, computer application software and downloadable computer software applications for use in relation to data erasure; computer application software for mobile devices; software for cloud computing services; software for servers; computer hardware; downloadable applications for use with mobile devices; computer hardware and computer software for use in relation to data erasure management; software for diagnostics and troubleshooting; diagnostic and troubleshooting application software; electronic publications; downloadable publications; computer software and computer hardware for use in the repair of mobile devices; computer software and computer hardware for use in IT asset disposal and recycling. Design and development of computer hardware and software; design and development of mobile applications; hardware and software consulting services; software as a service; computer software technical support services; computer programming; data security services; computer services, namely data erasure services; computer programming services for commercial analysis and reporting; cloud computing services; design and development of electronic data security systems; computer services, namely destroying documents and other forms of recorded media and data storage media; IT consultancy, advisory and information services; providing temporary use of non-downloadable software for use in relation to data erasure, diagnostics and troubleshooting.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data erasure software; data destruction software; downloadable computer security software; mobile apps; application software, computer application software and downloadable computer software applications for use in relation to data erasure; computer application software for mobile devices; software for cloud computing services; software for servers; computer hardware; downloadable applications for use with mobile devices; computer hardware and computer software for use in relation to data erasure management; software for diagnostics and troubleshooting; diagnostic and troubleshooting application software; electronic publications; downloadable publications; computer software and computer hardware for use in the repair of mobile devices; computer software and computer hardware for use in IT asset disposal and recycling. Design and development of computer hardware and software; design and development of mobile applications; hardware and software consulting services; software as a service; computer software technical support services; computer programming; data security services; computer services, namely data erasure services; data management on servers; computer programming services for commercial analysis and reporting; cloud computing services; design and development of electronic data security systems; computer services, namely destroying documents and other forms of recorded media and data storage media; IT consultancy, advisory and information services; providing temporary use of non-downloadable software for use in relation to data erasure, diagnostics and troubleshooting.
30.
Methods and apparatus for use in sanitizing a network of non-volatile memory express devices
A method for use in sanitizing a network of non-volatile memory express devices, comprises identifying the configuration of the network of non-volatile memory express devices including identifying one or more controllers of the non-volatile memory express devices; and identifying which portions of non-volatile memory of the non-volatile memory express devices are accessible to which of the identified controllers. The method further comprises performing a data erasure process in relation to at least one portion of the non-volatile memory of at least one of the non-volatile memory express devices based at least in part on the identified configuration of the network.
act of the battery to determine the wear value of the battery. A computer program is configured so that, when executed by a processor, the processor implements the method for determining a wear value of a battery of a mobile electronic device.
G01R 31/367 - Logiciels à cet effet, p.ex. pour le test des batteries en utilisant une modélisation ou des tables de correspondance
G01R 31/392 - Détermination du vieillissement ou de la dégradation de la batterie, p.ex. état de santé
G01R 31/371 - Dispositions pour le test, la mesure ou la surveillance de l’état électrique d’accumulateurs ou de batteries, p.ex. de la capacité ou de l’état de charge avec indication à distance, p.ex. sur des chargeurs séparés
A method for performing an operation in relation to a USB device, comprises configuring a USB interface in a USB controller so as to open one or more pipes between the USB controller and one or more corresponding USB endpoints of a USB device according to a required USB endpoint configuration of the USB device that is required for performing an operation in relation to the USB device, performing the operation in relation to the USB device, and unconfiguring the configured USB interface in the USB controller so as to close the one or more pipes between the USB controller and the one or more corresponding USB endpoints of the USB device. Such a method may allow operations to be performed concurrently in relation to a greater number of USB devices than the prior art methods and/or may allow operations to be performed concurrently in relation to the same number of USB devices using fewer USB endpoint resources of the USB controller and/or fewer USB controllers than the prior art methods.
There is presented a system and method for detecting mobile device fault conditions, particularly detecting defects in a display or housing of a mobile device. One or more cameras included within the mobile device are used with a reflecting surface in a test fixture to obtain properly aligned and formatted images of the external housing and display of the mobile device, and interactive guidance assists with placement and execution of diagnostics. A remote server conducts further analysis of the captured images, and then defect status may be returned to and displayed upon the mobile device screen.
There is presented a system and method for detecting mobile device fault conditions, including detecting fault conditions by software operating on the mobile device. In one embodiment, the present invention provides for systems and methods for detecting that a mobile device has a cracked screen, and reporting the status of the screen, working or not, so that appropriate action may be taken by a third party. In one embodiment, the data obtained by testing of the mobile device is encrypted to prevent tampering or spoofing by the user of the mobile device, and is suitably decrypted by the recipient or software running within a server.
G06F 11/263 - Génération de signaux d'entrée de test, p.ex. vecteurs, formes ou séquences de test
G01F 11/22 - Appareils qu'il faut actionner de l'extérieur, adaptés à chaque opération répétée et identique, pour mesurer et séparer le volume prédéterminé d'un fluide ou d'un matériau solide fluent à partir d'une alimentation ou d'un récipient sans tenir compte avec chambres de mesure se déplaçant au cours de l'opération du type à soupapes, c. à d. que la séparation est effectuée par des mouvements étanches aux fluides ou aux poudres dans lesquels la chambre de mesure tourne ou oscille pour un liquide ou un semi-liquide
G06F 3/041 - Numériseurs, p.ex. pour des écrans ou des pavés tactiles, caractérisés par les moyens de transduction
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p.ex. essais de mise en route
G01L 5/22 - Appareils ou procédés pour la mesure des forces, du travail, de la puissance mécanique ou du couple, spécialement adaptés à des fins spécifiques pour la mesure de la force appliquée aux organes de commande, p.ex. organes de commande des véhicules, détentes
G06F 11/277 - Matériel de test, c. à d. circuits de traitement de signaux de sortie avec une comparaison entre la réponse effective et la réponse connue en l'absence d'erreur
35.
System and method for mobile device display and housing diagnostics
There is presented a system and method for detecting mobile device fault conditions, particularly detecting defects in a display or housing of a mobile device. One or more cameras included within the mobile device are used with a reflecting surface in a test fixture to obtain properly aligned and formatted images of the external housing and display of the mobile device, and interactive guidance assists with placement and execution of diagnostics. A remote server conducts further analysis of the captured images, and then defect status may be returned to and displayed upon the mobile device screen.
G01N 21/956 - Inspection de motifs sur la surface d'objets
G06F 1/16 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES - Détails non couverts par les groupes et - Détails ou dispositions de structure
G06K 7/015 - Alignement ou centrage du dispositif de lecture par rapport au support d'enregistrement
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p.ex. lecture de la lumière blanche réfléchie
36.
DETERMINING A STATUS OF A MOBILE ELECTRONIC DEVICE
A method for use in determining a status of a mobile electronic device, comprises repeatedly reading information from a debug log stored in a ringbuffer of the mobile electronic device, repeatedly using the information read from the debug log to construct and maintain an event history for the mobile electronic device, and repeatedly determining the status of the mobile electronic device based on the event history. The method may be used for determining a status of a mobile electronic device and, in particular though not exclusively, for use in determining a status of one or more hardware elements of a mobile phone, a smartphone, a tablet and/or a laptop. A system and a computer program for use in determining a status of a mobile electronic device are also disclosed.
There are provided systems and methods for mobile device diagnostics and provisioning, whereby connections are effectuated to communicate directly with hardware of mobile devices to perform diagnostics and other functions such as device erasure without the need to first install an app on the mobile device. In this manner, information such as detailed product identification, vendor identification, and diagnostic information may be quickly obtained from the mobile device, and diagnostics and erasure undertaken to return a previously owned device into the stream of commerce in an efficient manner.
G06F 13/20 - Gestion de demandes d'interconnexion ou de transfert pour l'accès au bus d'entrée/sortie
H04M 1/72409 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens de soutien local des applications accroissant la fonctionnalité par interfaçage avec des accessoires externes
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
38.
SYSTEM AND METHOD FOR DIRECT DEVICE COMMUNICATION WITH DIAGNOSTICS AND PROVISIONING
There are provided systems and methods for mobile device diagnostics and provisioning, whereby connections are effectuated to communicate directly with hardware of mobile devices to perform diagnostics and other functions such as device erasure without the need to first install an app on the mobile device. In this manner, information such as detailed product identification, vendor identification, and diagnostic information may be quickly obtained from the mobile device, and diagnostics and erasure undertaken to return a previously owned device into the stream of commerce in an efficient manner.
According to an aspect, there is provided a method for guiding a user in diagnostic test selection. Initially, one or more diagnostic reports on each of a plurality of computing devices are maintained (201) in a diagnostic report database (103). In response to receiving (204) a first set of one or more device parameters characterizing a second computing device (124) from a first computing device (121), a remote computing system (101) compares (204) the first set to a plurality of sets of device parameters maintained in the diagnostic report database (103) to find one or more relevant diagnostic reports. The remote computing system (101) predicts (205) results of one or more diagnostic tests when performed on the second computing device (124) based on results of one or more diagnostic tests in the one or more relevant diagnostic reports by using statistical analysis. The remote computing system (101) sends (206) results of the predicting to the first computing device (121).
G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p.ex. essais de mise en route
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
G16H 40/40 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santé; TIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion d’équipement ou de dispositifs médicaux, p.ex. pour planifier la maintenance ou les mises à jour
40.
A SYSTEM AND METHOD FOR DETERMINING WHETHER A CAMERA COMPONENT IS DAMAGED
A computer-implemented method for determining whether a camera component of a camera is damaged is described. The method comprises obtaining information relating to one or more damage indicators; obtaining, from the camera, at least one image which has been taken when light from a light source has been incident on the camera component; dividing the image into one or more areas; analysing each area to determine whether it comprises at least one of the one or more damage indicators; and based on said analysing, providing an indication of whether the camera component is classified as damaged or undamaged.
According to an aspect, there is provided a method for guiding a user of a first computing device in selecting a suitable erasure process for a second computing device. Initially, information on a plurality of erasure re-ports describing erasure processes carried out for computing devices is maintained in an erasure report database. A remote computing device receives one or more device parameters characterizing the second computing device from the first computing device. The remote computing system compares the one or more device parameters to device parameters maintained in the erasure report database in response to the receiving and based thereon determines one or more expected erasure process properties for at least one erasure process for erasing a memory or part thereof of the second computing device. The remote computing system sends the one or more expected erasure process properties for said at least one erasure process to the first computing device.
According to an aspect, there is provided a method for self-diagnosing a mobile de-vice comprising at least one or more actuators, one or more sensors and a display. The method comprises, first, feeding a pre-defined control signal to a first actuator of the mobile device and measuring, in response to the feeding, a first electric signal using a first sensor of the one or more sensors. Then, the first electric signal is com-pared to one or more reference signals associated with the first actuator and the pre-defined control signal. If the first electric signal fails to match the one or more reference signals according to one or more pre-defined criteria, a negative diagno-sis is indicated to a user of the mobile device using one or more of a display of the mobile device and one or more actuators of the mobile device.(Figure 1B)
A method for use in sanitizing a network of non-volatile memory express devices, comprises identifying the configuration of the network of non-volatile memory express devices including identifying one or more controllers of the non-volatile memory express devices; and identifying which portions of non-volatile memory of the non-volatile memory express devices are accessible to which of the identified controllers. The method further comprises performing a data erasure process in relation to at least one portion of the non-volatile memory of at least one of the non- volatile memory express devices based at least in part on the identified configuration of the network.
A method of erasing data from a data storage apparatus comprising a memory, the method comprises writing a known data pattern to a plurality of known memory locations of the data storage apparatus, causing the data storage apparatus to perform a data erasure procedure, reading data stored at the known memory locations after completion of the data erasure procedure, comparing the read data and the data of the known data pattern, and determining a verification result based at least in part on the result of the comparison between the read data and the data of the known data pattern.
G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
G06F 12/02 - Adressage ou affectation; Réadressage
G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
G06F 21/79 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données dans les supports de stockage à semi-conducteurs, p.ex. les mémoires adressables directement
A method for use in repurposing, erasing data from, and/or disposing of an IT asset comprises transmitting a signal, for example an erasure target signal, from the IT asset to a server located remotely from the IT asset, receiving at the server at least part of a profile of the IT asset, and in response to receipt of the signal, for example the erasure target signal, at the server, identifying an action to be performed in relation to the IT asset based at least in part on the profile or part of the profile of the IT asset. The method may comprise transmitting instructions from the server to an erasure client, which instructions at least partially define the action to be performed in relation to the IT asset and in response to receipt of the instructions at the erasure client, performing the action in relation to the IT asset. The action to be performed may comprise an erasure procedure.
Qactact Qdesdes Qactact act of the battery to determine the wear value of the battery. A computer program is configured so that, when executed by a processor, the processor implements the method for determining a wear value of a battery of a mobile electronic device.
G01R 31/367 - Logiciels à cet effet, p.ex. pour le test des batteries en utilisant une modélisation ou des tables de correspondance
G01R 31/392 - Détermination du vieillissement ou de la dégradation de la batterie, p.ex. état de santé
G01R 31/371 - Dispositions pour le test, la mesure ou la surveillance de l’état électrique d’accumulateurs ou de batteries, p.ex. de la capacité ou de l’état de charge avec indication à distance, p.ex. sur des chargeurs séparés
47.
Erasure of data from a memory of a data storage apparatus by identifying available free space in the memory and iteratively writing a sequence of files decreasing size to the memory using a file-based protocol
A method of erasing data using a file-based protocol from a data storage apparatus for repurposing, reallocation to a new user or retirement of the data storage apparatus, the data storage apparatus comprising a memory using a file-based protocol, and the method comprises: receiving one or more signals representative of the available free space of at least one selected region of the memory; iteratively writing files to the at least one selected region of the memory using the file based protocol, wherein: at least one of the files is sized based on at least one of the received signals and the iterative writing of the files comprises writing the files in sequence such that for at least part of the sequence each file is smaller in size than the preceding file of the sequence; and wherein the files are written to collectively occupy all of the at least one selected region of the memory; and the method further comprises receiving an indication that said at least one selected region of memory is full following the writing of said files, and in response to the indication writing at least one further file to said at least one region of memory.
Disclosed herein is a method for providing for erasure of data from, and/or diagnosis of at least one condition of a device. The method includes the steps of providing a stored set of actions, the actions directed to either or both of an erasure action and a diagnosis action; selecting actions from the stored set and linking the actions to generate a sequence of actions; and outputting, storing or performing the generated sequence of actions. Performing the sequence of actions may include performing at least one of the actions in dependence or based on data representative of a property of the device, at least one customer or client or business preference or requirement, or at least one regulatory requirement.
G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
G06F 11/32 - Surveillance du fonctionnement avec indication visuelle du fonctionnement de la machine
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
49.
System and method for detection of mobile device fault conditions
There is presented a system and method for detecting mobile device fault conditions, including detecting fault conditions by software operating on the mobile device. In one embodiment, the present invention provides for systems and methods for using a neural network to detect, from an image of the device, that the mobile device has a defect, for instance a cracked or scratched screen. Systems and methods also provide for, reporting the defect status of the device, working or not, so that appropriate action may be taken by a third party.
There is presented a system and method for detecting mobile device fault conditions, including detecting fault conditions by software operating on the mobile device. In one embodiment, the present invention provides for systems and methods for using a neural network to detect, from an image of the device, that the mobile device has a defect, for instance a cracked or scratched screen. Systems and methods also provide for, reporting the defect status of the device, working or not, so that appropriate action may be taken by a third party.
A method of erasing data from a data storage apparatus comprising a memory, the method comprises writing a known data pattern to a plurality of known memory locations of the data storage apparatus, causing the data storage apparatus to perform a data erasure procedure, reading data stored at the known memory locations after completion of the data erasure procedure, comparing the read data and the data of the known data pattern, and determining a verification result based at least in part on the result of the comparison between the read data and the data of the known data pattern.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 21/79 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données dans les supports de stockage à semi-conducteurs, p.ex. les mémoires adressables directement
A method for use in repurposing, erasing data from, and/or disposing of an IT asset comprises transmitting a signal, for example an erasure target signal, from the IT asset to a server located remotely from the IT asset, receiving at the server at least part of a profile of the IT asset, and in response to receipt of the signal, for example the erasure target signal, at the server, identifying an action to be performed in relation to the IT asset based at least in part on the profile or part of the profile of the IT asset. The method may comprise transmitting instructions from the server to an erasure client, which instructions at least partially define the action to be performed in relation to the IT asset and in response to receipt of the instructions at the erasure client, performing the action in relation to the IT asset. The action to be performed may comprise an erasure procedure.
A method of erasing data using a file-based protocol from a data storage apparatus for repurposing, reallocation to a new user or retirement of the data storage apparatus, the data storage apparatus comprising a memory using a file-based protocol, and the method comprises: receiving one or more signals representative of the available free space of at least one selected region of the memory; iteratively writing files to the at least one selected region of the memory using the file based protocol, wherein: at least one of the files is sized based on at least one of the received signals and the iterative writing of the files comprises writing the files in sequence such that for at least part of the sequence each file is smaller in size than the preceding file of the sequence; and wherein the files are written to collectively occupy all of the at least one selected region of the memory; and the method further comprises receiving an indication that said at least one selected region of memory is full following the writing of said files, and in response to the indication writing at least one further file to said at least one region of memory.
There is presented a system and method for detecting mobile device fault conditions, including detecting fault conditions by software operating on the mobile device. In one embodiment, the present invention provides for systems and methods for detecting that a mobile device has a cracked screen, and reporting the status of the screen, working or not, so that appropriate action may be taken by a third party. In one embodiment, the data obtained by testing of the mobile device is encrypted to prevent tampering or spoofing by the user of the mobile device, and is suitably decrypted by the recipient or software running within a server.
G01L 5/22 - Appareils ou procédés pour la mesure des forces, du travail, de la puissance mécanique ou du couple, spécialement adaptés à des fins spécifiques pour la mesure de la force appliquée aux organes de commande, p.ex. organes de commande des véhicules, détentes
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p.ex. essais de mise en route
G06F 3/041 - Numériseurs, p.ex. pour des écrans ou des pavés tactiles, caractérisés par les moyens de transduction
G06F 11/277 - Matériel de test, c. à d. circuits de traitement de signaux de sortie avec une comparaison entre la réponse effective et la réponse connue en l'absence d'erreur
G06F 11/263 - Génération de signaux d'entrée de test, p.ex. vecteurs, formes ou séquences de test
09 - Appareils et instruments scientifiques et électriques
16 - Papier, carton et produits en ces matières
35 - Publicité; Affaires commerciales
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Electronic publications, electronic magazines; multi-media recordings and publications; digital audio, video and audio video files; digital audio, video and audio video files downloadable from the internet; podcasts; computer databases; data recording in electronic and/or optical form; data carriers, CDs, CDIs, DVDs, discs and other data carriers; photographic transparencies; holograms; all the aforesaid goods relating to data security and data sanitization; data sanitization software; data erasure software; data destruction software; downloadable computer security software; mobile apps; application software, computer application software and downloadable computer software applications for use in relation to data erasure and data sanitization; computer application software for mobile devices; software for cloud computing services; software for servers; computer hardware; downloadable applications for use with mobile devices; computer hardware and computer software for use in relation to data erasure management and data sanitization; software for diagnostics and troubleshooting; diagnostic and troubleshooting application software; downloadable publications; computer software and computer hardware for use in the repair of mobile devices; computer software and computer hardware for use in IT asset disposal and recycling. Printed matter; printed publications; instructional and teaching material; magazines; journals; periodical publications; newspapers; directories; brochures; books; newsletters; guides; manuals; reports; stationery; diaries; calendars; postcards; bookmarks; posters; pamphlets; photographs; transparencies; all the aforesaid goods relating to data security and data sanitization. Advertising, publicity, promotional and marketing services, public relations, marketing consultancy and advisory services; provision of business, marketing, management and in-commerce consultancy and advisory services relating to data security and data sanitization; promoting the commercial interests of the IT security profession and data sanitization; promoting the commercial interests of the data sanitization profession; provision of data and statistical information; compilation, storage, analysis and retrieval of information and data provided online; preparation of reports; compilation and provision of databases and directories; all the aforesaid services relating to data security and data sanitization. Education; provision of training; arranging and conducting of congresses, conferences and seminars; arranging and conducting networking events and training workshops; publication services; provision of electronic publications online; all the aforesaid services relating to data security and data sanitization. Design and development of computer hardware and software; design and development of mobile applications; hardware and software consulting services; software as a service; computer software technical support services; computer programming; data security services; data erasure services; data sanitization services; electronic data processing consultancy; data management on servers; computer programming services for commercial analysis and reporting; cloud computing services; design and development of electronic data security systems; destroying documents and other forms of recorded media and data storage media; IT consultancy, advisory and information services; providing temporary use of non-downloadable software for use in relation to data erasure, data sanitization, diagnostics and troubleshooting; certification services and authentication and verification of standards and of compliance in the field of data security and data sanitization; development and testing of standards, best practices, certification criteria and certification guidelines in the field of data security and data sanitization.
56.
Method for mitigating the unauthorized use of a device
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data erasure software; data destruction software;
downloadable computer security software; mobile apps;
application software, computer application software and
downloadable computer software applications for use in
relation to data erasure; computer application software for
mobile devices; software for cloud computing services;
software for servers; computer hardware; downloadable
applications for use with mobile devices; computer hardware
and computer software for use in relation to data erasure
management; software for diagnostics and troubleshooting;
diagnostic and troubleshooting application software;
electronic publications; downloadable publications; computer
software and computer hardware for use in the repair of
mobile devices; computer software and computer hardware for
use in IT asset disposal and recycling. Design and development of computer hardware and software;
design and development of mobile applications; hardware and
software consulting services; software as a service;
computer software technical support services; computer
programming; data security services; computer services,
namely data erasure services; computer programming services
for commercial analysis and reporting; cloud computing
services; design and development of electronic data security
systems; computer services, namely destroying documents and
other forms of recorded media and data storage media; IT
consultancy, advisory and information services; providing
temporary use of non-downloadable software for use in
relation to data erasure, diagnostics and troubleshooting.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data erasure software; data destruction software;
downloadable computer security software; mobile apps;
application software, computer application software and
downloadable computer software applications for use in
relation to data erasure; computer application software for
mobile devices; software for cloud computing services;
software for servers; computer hardware; downloadable
applications for use with mobile devices; computer hardware
and computer software for use in relation to data erasure
management; software for diagnostics and troubleshooting;
diagnostic and troubleshooting application software;
electronic publications; downloadable publications; computer
software and computer hardware for use in the repair of
mobile devices; computer software and computer hardware for
use in IT asset disposal and recycling. Design and development of computer hardware and software;
design and development of mobile applications; hardware and
software consulting services; software as a service;
computer software technical support services; computer
programming; data security services; data erasure services;
computer programming services for commercial analysis and
reporting; cloud computing services; design and development
of electronic data security systems; destroying documents
and other forms of recorded media and data storage media; IT
consultancy, advisory and information services; providing
temporary use of non-downloadable software for use in
relation to data erasure, diagnostics and troubleshooting.
09 - Appareils et instruments scientifiques et électriques
40 - Traitement de matériaux; recyclage, purification de l'air et traitement de l'eau
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Data erasure software; data destruction software; downloadable computer security software; downloadable applications for mobile phones, smart phones and tablet computers for assessing the performance of and diagnosing problems with mobile telephones, smart telephones, and tablet computers and providing data sanitization on these devices; application software, computer application software and downloadable computer software applications for use in relation to data erasure; computer application software for mobile phones, smart phones and tablet computers, namely, software for destroying electronic documents and erasure and sanitization of data on other forms of recorded media and data storage media; downloadable cloud-computing software for the management, erasure and sanitization of data; computer operating software for servers for the management, erasure and sanitization of data; computer hardware; downloadable applications for use with mobile phones, smart phones and tablet computers for assessing the performance of and diagnosing problems with mobile telephones, smart telephones, and tablet computers and providing data sanitization on these devices; computer hardware and computer software for use in relation to data erasure management; computer software for diagnosing and troubleshooting problems with mobile telephones, smart telephones, and tablet computers; computer application software for diagnosing and troubleshooting problems with mobile telephones, smart telephones, and tablet computers; electronic downloadable publications, namely, whitepapers, reports, magazines and journals in the field of data management, mobile diagnostics, erasure and sanitization for computer security; computer software and computer hardware for use in the repair of mobile devices, namely mobile telephones, smart telephones, and tablet computers and for the management, erasure and sanitization of data in the repair process; computer software and computer hardware for use in IT asset disposal and recycling (1) Design and development of computer hardware and software; design and development of mobile applications; hardware and software consulting services; software as a service (SAAS) provider services in the field of software for data management, mobile diagnostics, erasure and sanitization in the field of computer security; computer software technical support services, namely, troubleshooting of computer software and computer hardware problems; computer programming; data security services, namely, analyzing, diagnosing, and providing corrective and erasure updates to computer software securing electronic storage of computer data; data erasure services; electronic data processing consultancy; data management on servers; computer programming services for commercial analysis and reporting; cloud computing services, namely, consulting services in the field of cloud computing provider services; design and development of electronic data security systems; destroying documents and other forms of recorded media and data storage media; computer software consultancy; computer security consultancy; providing temporary use of non-downloadable software for use in relation to data erasure, providing temporary use of non-downloadable software for use in diagnosing and troubleshooting computer hardware and software problems and for data erasure
09 - Appareils et instruments scientifiques et électriques
40 - Traitement de matériaux; recyclage, purification de l'air et traitement de l'eau
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Data erasure software; data destruction software; downloadable computer security software; downloadable applications for mobile phones, smart phones and tablet computers for assessing the performance of and diagnosing problems with mobile telephones, smart telephones, and tablet computers and providing data sanitization on these devices; application software, computer application software and downloadable computer software applications for use in relation to data erasure; computer application software for mobile phones, smart phones and tablet computers, namely, software for destroying electronic documents and erasure and sanitization of data on other forms of recorded media and data storage media; downloadable cloud-computing software for the management, erasure and sanitization of data; computer operating software for servers for the management, erasure and sanitization of data; computer hardware; downloadable applications for use with mobile phones, smart phones and tablet computers for assessing the performance of and diagnosing problems with mobile telephones, smart telephones, and tablet computers and providing data sanitization on these devices; computer hardware and computer software for use in relation to data erasure management; computer software for diagnosing and troubleshooting problems with mobile telephones, smart telephones, and tablet computers; computer application software for diagnosing and troubleshooting problems with mobile telephones, smart telephones, and tablet computers; electronic downloadable publications, namely, whitepapers, reports, magazines and journals in the field of data management, mobile diagnostics, erasure and sanitization for computer security; computer software and computer hardware for use in the repair of mobile devices, namely mobile telephones, smart telephones, and tablet computers and for the management, erasure and sanitization of data in the repair process; computer software and computer hardware for use in IT asset disposal and recycling (1) Design and development of computer hardware and software; design and development of mobile applications; hardware and software consulting services; software as a service (SAAS) provider services in the field of software for data management, mobile diagnostics, erasure and sanitization in the field of computer security; computer software technical support services, namely, troubleshooting of computer software and computer hardware problems; computer programming; data security services, namely, analyzing, diagnosing, and providing corrective and erasure updates to computer software securing electronic storage of computer data; computer services, namely data erasure services; data management on servers; computer programming services for commercial analysis and reporting; cloud computing services, namely, consulting services in the field of cloud computing provider services; design and development of electronic data security systems; computer services, namely destroying documents and other forms of recorded media and data storage media; computer software consultancy; computer security consultancy; providing temporary use of non-downloadable software for use in relation to data erasure, providing temporary use of non-downloadable software for use in diagnosing and troubleshooting computer hardware and software problems and for data erasure
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data erasure software; data destruction software; downloadable computer security software for destroying electronic documents and erasure and sanitization of data on other forms of recorded media and data storage media; mobile apps, namely, mobile applications for assessing the performance of and diagnosing problems with mobile telephones, smart telephones, and tablet computers; application software, computer application software and downloadable computer software applications for use in relation to data erasure; computer application software for mobile devices, namely, software for destroying electronic documents and erasure and sanitization of data on other forms of recorded media and data storage media; downloadable cloud-computing software for the management, erasure and sanitization of data; computer operating software for servers; computer hardware; downloadable applications for use with mobile devices, namely, mobile applications for assessing the performance of and diagnosing problems with mobile telephones, smart telephones, and tablet computers; computer hardware and computer software for use in relation to data erasure management; software for diagnostics and troubleshooting; diagnostic and troubleshooting application software; electronic downloadable publications in the nature of whitepapers, reports, magazines and journals in the field of data management, mobile diagnostics, erasure and sanitization for computer security; computer software and computer hardware for use in the repair of mobile devices; computer software and computer hardware for use in IT asset disposal and recycling Design and development of computer hardware and software; design and development of mobile applications; software as a service (SAAS) services featuring software for data management, mobile diagnostics, erasure and sanitization in the field of computer security; computer software technical support services, namely, troubleshooting of computer software problems; computer programming; data security services, namely, analyzing, diagnosing, and providing corrective and erasure updates to computer software securing electronic storage of computer data; computer services, namely, data erasure and sanitization services for electronic data storage; computer programming services for commercial analysis and reporting; cloud computing services, namely, consulting services in the field of cloud computing; design and development of electronic data security systems; computer security services, namely, electronic data storage erasure and sanitization services for electronically destroying documents and other forms of recorded media and data storage media; IT consultancy, advisory and information services; providing temporary use of non-downloadable software for use in relation to data erasure, diagnostics and troubleshooting
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data erasure software; data destruction software; downloadable computer security software for destroying electronic documents and erasure and sanitization of data on other forms of recorded media and data storage media; mobile apps, namely, mobile applications for assessing the performance of and diagnosing problems with mobile telephones, smart telephones, and tablet computers; application software, computer application software and downloadable computer software applications for use in relation to data erasure; computer application software for mobile devices, namely, software for destroying electronic documents and erasure and sanitization of data on other forms of recorded media and data storage media; downloadable cloud-computing software for the management, erasure and sanitization of data; computer operating software for servers; computer hardware; downloadable applications for use with mobile devices, namely, mobile applications for assessing the performance of and diagnosing problems with mobile telephones, smart telephones, and tablet computers; computer hardware and computer software for use in relation to data erasure management; software for diagnostics and troubleshooting; diagnostic and troubleshooting application software; electronic downloadable publications in the nature of whitepapers, reports, magazines and journals in the field of data management, mobile diagnostics, erasure and sanitization for computer security; computer software and computer hardware for use in the repair of mobile devices; computer software and computer hardware for use in IT asset disposal and recycling Design and development of computer hardware and software; design and development of mobile applications; computer hardware and software consulting services in the field of data management, mobile diagnostics, erasure and sanitization for computer security; software as a service (SAAS) services featuring software for data management, mobile diagnostics, erasure and sanitization in the field of computer security; computer software technical support services, namely, troubleshooting of computer software problems; computer programming; data security services, namely, analyzing, diagnosing, and providing corrective and erasure updates to computer software securing electronic storage of computer data; computer services, namely, data erasure and sanitization services for electronic data storage; computer programming services for commercial analysis and reporting; cloud computing services, namely, consulting services in the field of cloud computing ; design and development of electronic data security systems; computer security services, namely, electronic data storage erasure and sanitization services for electronically destroying documents and other forms of recorded media and data storage media; IT consultancy, advisory and information services; providing temporary use of non-downloadable software for use in relation to data erasure, diagnostics and troubleshooting
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data erasure software; data destruction software; downloadable computer security software; mobile apps; application software, computer application software and downloadable computer software applications for use in relation to data erasure; computer application software for mobile devices; software for cloud computing services; software for servers; computer hardware; downloadable applications for use with mobile devices; computer hardware and computer software for use in relation to data erasure management; software for diagnostics and troubleshooting; diagnostic and troubleshooting application software; electronic publications; downloadable publications; computer software and computer hardware for use in the repair of mobile devices; computer software and computer hardware for use in IT asset disposal and recycling. Design and development of computer hardware and software; design and development of mobile applications; hardware and software consulting services; software as a service; computer software technical support services; computer programming; data security services; computer services, namely data erasure services; data management on servers; computer programming services for commercial analysis and reporting; cloud computing services; design and development of electronic data security systems; computer services, namely destroying documents and other forms of recorded media and data storage media; IT consultancy, advisory and information services; providing temporary use of non-downloadable software for use in relation to data erasure, diagnostics and troubleshooting.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data erasure software; data destruction software; downloadable computer security software; mobile apps; application software, computer application software and downloadable computer software applications for use in relation to data erasure; computer application software for mobile devices; software for cloud computing services; software for servers; computer hardware; downloadable applications for use with mobile devices; computer hardware and computer software for use in relation to data erasure management; software for diagnostics and troubleshooting; diagnostic and troubleshooting application software; electronic publications; downloadable publications; computer software and computer hardware for use in the repair of mobile devices; computer software and computer hardware for use in IT asset disposal and recycling. Design and development of computer hardware and software; design and development of mobile applications; hardware and software consulting services; software as a service; computer software technical support services; computer programming; data security services; data erasure services; electronic data processing consultancy; data management on servers; computer programming services for commercial analysis and reporting; cloud computing services; design and development of electronic data security systems; destroying documents and other forms of recorded media and data storage media; IT consultancy, advisory and information services; providing temporary use of non-downloadable software for use in relation to data erasure, diagnostics and troubleshooting.
65.
Apparatus, a system, a method and a computer program for erasing data stored on a storage device using a sequence of uncompressible data
An approach for erasing data being stored in a data storage apparatus is provided, which may be provided e.g. as an apparatus, as a method, as a system or as a computer program. A sequence of uncompressible data is obtained fulfilling predetermined criteria, which includes a statistical measure indicative of compressibility or uncompressibility of the sequence of uncompressible data meeting a predetermined criterion, wherein the sequence of uncompressible data is divided into one or more blocks of uncompressible data, the sum of the sizes of the one or more blocks of uncompressible data being larger than or equal to the storage capacity of the data storage apparatus. The one or more blocks of uncompressible data is provided to the data storage apparatus for storage therein to overwrite the data currently stored in the data storage apparatus.
G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
G06F 12/02 - Adressage ou affectation; Réadressage
G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données
G06F 21/79 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données dans les supports de stockage à semi-conducteurs, p.ex. les mémoires adressables directement
G06F 12/0891 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p.ex. mémoires cache utilisant des moyens d’effacement, d’invalidation ou de réinitialisation
G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts
G06F 11/263 - Génération de signaux d'entrée de test, p.ex. vecteurs, formes ou séquences de test
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
66.
Apparatus, a system, a method and a computer program for erasing data stored on a storage device
An approach for erasing data being stored in a data storage apparatus is provided. The approach may be provided e.g. as an apparatus, as a method, as a system or as a computer program. The approach comprises obtaining a sequence of uncompressible data fulfilling predetermined criteria, which predetermined criteria comprises a statistical measure indicative of compressibility or uncompressibility of the sequence of uncompressible data meeting a predetermined criterion, wherein the sequence of uncompressible data is divided into one or more blocks of uncompressible data, the sum of the sizes of the one or more blocks of uncompressible data being larger than or equal to the storage capacity of the data storage apparatus, and providing, to the data storage apparatus, the one or more blocks of uncompressible data for storage therein to overwrite the data being currently stored in the data storage apparatus.
G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
G06F 12/08 - Adressage ou affectation; Réadressage dans des systèmes de mémoires hiérarchiques, p.ex. des systèmes de mémoire virtuelle
G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données
G06F 21/79 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données dans les supports de stockage à semi-conducteurs, p.ex. les mémoires adressables directement
There is provided a method and system for securely coupling and transferring data between devices. In a preferred embodiment, the devices may comprise two devices, a transferring device and a receiving device, and both devices are mobile devices. Embodiments of the present invention allow the wireless transfer of data such as contacts, photo images, video files, or other data from one device to another device, without need for special hardware or cabling.
There is disclosed systems and methods to enhance reliability of measured position data. Measuring devices, such mobile phones equipped with location measurement elements (such as GPS, LBS, network location reporting, or tower location triangulation reporting) may collect various samples of positions where the device is believed to be located at particular moments in time; however such measurements often vary even if the device is not moving because of device inaccuracy, atmospheric conditions, obstructing buildings, and the like, making it difficult to determine whether such devices are actually stationary or are in motion over predetermined time periods. Systems and methods of the present invention provide for enhanced accuracy of position data by selectively merging varying location positions that are attributable to noise or accuracy deviations, and providing an enhanced assessment of actual device position.
G01S 19/01 - Systèmes de positionnement par satellite à radiophares émettant des messages horodatés, p.ex. GPS [Système de positionnement global], GLONASS [Système global de navigation par satellite] ou GALILEO
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a method includes detecting that a security compromise event has occurred for a mobile device. The method also includes altering a function of the mobile device in response to the security compromise event to mitigate loss of control by an authorized user. Altering the function of the mobile device includes denying access to data stored on the mobile device.
Certain embodiments are directed to systems and methods for monitoring and/or managing a device with respect to a rule or set of rules and/or altering the functionality of the device in response. In one embodiment, a method includes monitoring a mobile user's equipment with respect to a rule. The method also includes applying at least one consequence to the mobile user equipment when the rule is at least one of followed or violated. The at least one consequence comprises at least one of a reward or a punishment. The at least one consequence pertains to use of the mobile user equipment.
Embodiments of the present invention delineate systems and methods for dynamically assessing and mitigating risk of an insured entity. Additional embodiments of the present invention delineate systems and methods for providing a user of a mobile device with information relevant to a position of a mobile device, wherein such information may describe one of a risk and an opportunity within a predetermined distance of a location for the mobile device.
The invention is directed to a user interface on a provided electronic device, the user interface including: (i) an auxiliary interface for receiving input from a user and providing output to the user; and (ii) a primary access interface. Using the auxiliary interface, a message to the user is provided, wherein the message is provided without requiring the user to be authenticated through the primary access interface. Input from the user is accepted through the auxiliary interface to access a service available from the provided electronic device, wherein access to the service is provided without requiring the user to be authenticated through the primary access interface.
Embodiments of the present invention include a primary access interface where messages are in an auxiliary interface area, where a user can see/hear the message without having to log in (that is, when they normally would have to have logged in to access the message). Included in various embodiments are types of messages output, emergency messages, advertising messages and conditions for outputting messages. Also provided is allowing for user input through an auxiliary interface triggering services or features normally requiring login (before they can be used). What is further provided is an application programming interface for independent or third party applications. What is also provided is an advertising server system integrated with a front-end interface.
H04M 3/42 - Systèmes fournissant des fonctions ou des services particuliers aux abonnés
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
H04M 1/00 - COMMUNICATIONS TÉLÉPHONIQUES Équipement de sous-station, p.ex. pour utilisation par l'abonné
H04W 24/00 - Dispositions de supervision, de contrôle ou de test
G06F 15/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement de traitement de données en général
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/88 - Détection ou prévention de vol ou de perte
The invention is directed to systems and methods for that provide a user interface on an electronic device, the user interface including: (i) an auxiliary interface for receiving input from a user and providing output to the user; and (ii) a primary access interface. Using the auxiliary interface, a message to the user is provided, without requiring the user to be authenticated through the primary access interface.
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
H04M 1/66 - COMMUNICATIONS TÉLÉPHONIQUES Équipement de sous-station, p.ex. pour utilisation par l'abonné avec des moyens pour empêcher les appels non autorisés ou faux appels
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
H04M 1/66 - COMMUNICATIONS TÉLÉPHONIQUES Équipement de sous-station, p.ex. pour utilisation par l'abonné avec des moyens pour empêcher les appels non autorisés ou faux appels
G06F 21/88 - Détection ou prévention de vol ou de perte
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p.ex. gestion de la mobilité
79.
System for monitoring the unauthorized use of a device
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
G06F 7/04 - Contrôle d'égalité, c. à d. pour valeurs égales ou non
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
80.
System for monitoring the unauthorized use of a device
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/50 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
G06F 21/88 - Détection ou prévention de vol ou de perte
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole