Abstract:
An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.
Abstract:
A computer device (2010) with a file system having clusters and meta data. The computer device (2010) includes a processor (1030) and a storage (1025) coupled to the processor and having physical representations of instructions so that the processor is operable to reserve (230) at least one of the clusters and to create a log record when meta data for the file system is to be updated by a write (240) of such meta data beforehand to such a reserved cluster, and then set (250) at least one state entry to substantially represent readiness to write the meta data to the file system.
Abstract:
A computer device (2010) with a file system having clusters and meta data. The computer device (2010) includes a processor (1030) and a storage (1025) coupled to the processor and having physical representations of instructions so that the processor is operable to reserve (230) at least one of the clusters and to create a log record when meta data for the file system is to be updated by a write (240) of such meta data beforehand to such a reserved cluster, and then set (250) at least one state entry to substantially represent readiness to write the meta data to the file system.