Security system
First Claim
1. A security system for a protected object, comprising:
- a first wireless module disposed in the protected object, transmitting an authorization request with an authorization ID (identification) of the protected object, and receiving an authorization response;
a central controller disposed in the protected object, coupled to the first wireless module, allowing the protected object to operate in accordance with the authorization response; and
a remote authorization server responsive to the authorization request, generating the authorization response from an authorization record thereof in accordance with the authorization ID, and transmitting the authorization response.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system. The security system for a protected object comprises a first wireless module, a central controller, and a remote authorization server. The first wireless module and the central controller are disposed in the protected object. The first wireless module transmits an authorization request with an authorization ID (identification) of the protected object, and receives an authorization response. The central controller is coupled to the first wireless module, and allows the protected object to operate in accordance with the authorization response. The remote authorization server, responsive to the authorization request, generates the authorization response from an authorization record thereof in accordance with the authorization ID, and transmits the authorization response.
10 Citations
29 Claims
-
1. A security system for a protected object, comprising:
-
a first wireless module disposed in the protected object, transmitting an authorization request with an authorization ID (identification) of the protected object, and receiving an authorization response;
a central controller disposed in the protected object, coupled to the first wireless module, allowing the protected object to operate in accordance with the authorization response; and
a remote authorization server responsive to the authorization request, generating the authorization response from an authorization record thereof in accordance with the authorization ID, and transmitting the authorization response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A vehicle security system for a vehicle, comprising:
-
a wireless module disposed in the vehicle, transmitting an authorization request with an authorization ID (identification) of the vehicle, and receiving an authorization response;
a central controller disposed in the vehicle, coupled to the first wireless module, allowing the protected object to operate in accordance with the authorization response;
a transceiver, receiving the authorization request from the first wireless module and transmitting the authorization response thereto; and
a remote authorization server connected to the transceiver via a network, responsive to the authorization request from the transceiver, generating the authorization response from an authorization record thereof in accordance with the authorization ID, and transmitting the authorization response to the transceiver. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A security method for a protected object, comprising:
-
transmitting an authorization request with an authorization ID (identification) of the protected object;
generating an authorization response from an authorization record in accordance with the authorization ID; and
allowing the protected object to operate in accordance with the authorization response. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
Specification