Using a communication protocol to provide security services
First Claim
Patent Images
1. A method comprising:
- receiving a wireless signal from a portable device;
attempting to authenticate the wireless signal; and
if the signal is not authenticated, disabling an operation of the device.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless communication protocol may be utilized to authenticate a protected device. If the device is not properly authenticated, the device may be rendered inoperable. Thus, a limited range RF communication between the protected device and a base station may be utilized to automatically determine whether or not the device may be utilized. If the base station is not in-range, operation of the device may be defeated.
-
Citations
29 Claims
-
1. A method comprising:
-
receiving a wireless signal from a portable device;
attempting to authenticate the wireless signal; and
if the signal is not authenticated, disabling an operation of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A wireless system comprising:
-
a processor;
a wireless transceiver; and
a storage coupled to said processor, said storage storing instructions that enable the processor to authenticate a received wireless signals, and, if the signal is not authenticated, disable an operation of the device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An article comprising a medium storing instructions that enable a processor-based system to:
-
receive a wireless signal from a portable device;
attempt to authenticate the wireless signal; and
disable an operation of the device if the signal is not authenticated. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification