REMOTE SECURITY TECHNOLOGY
First Claim
Patent Images
1. A complex electronic system, comprising:
- at least one microprocessor operatively connected to detect inputs from an input device;
a nonvolatile memory containing settings for administrative configurations;
a memory which is connected to be read/write accessible by said microprocessor;
input/output circuitry operatively connected to said microprocessor; and
an RF receiver operatively connected to write to said nonvolatile memory, said receiver being receptive to a communication system;
wherein said system includes at least one security feature which can be remotely activated by commanding said receiver, through said communication system, to modify at least one of said settings in said nonvolatile memory.
3 Assignments
0 Petitions
Accused Products
Abstract
A computer security system whereby access is controlled by remote enablement or disablement. The system can be coupled with third-party products to accommodate satellite transmissions for long-distance access control.
39 Citations
19 Claims
-
1. A complex electronic system, comprising:
-
at least one microprocessor operatively connected to detect inputs from an input device;
a nonvolatile memory containing settings for administrative configurations;
a memory which is connected to be read/write accessible by said microprocessor;
input/output circuitry operatively connected to said microprocessor; and
an RF receiver operatively connected to write to said nonvolatile memory, said receiver being receptive to a communication system;
wherein said system includes at least one security feature which can be remotely activated by commanding said receiver, through said communication system, to modify at least one of said settings in said nonvolatile memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system security method, comprising the steps of:
-
(a.) receiving a security-activation command from an RF transmitting source; and
(b.) selectively changing at least one administrative configuration options of a system to activate at least one security feature, based upon said command. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification