Security system
First Claim
Patent Images
1. A method implemented by a device, the method comprising:
- attempting to establish a connection between the device and a network access point;
determining whether the device successfully established a connection with the network access point; and
preventing enabling of the device if the device does not successfully establish a connection with the network access point.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of security systems are presented herein.
22 Citations
20 Claims
-
1. A method implemented by a device, the method comprising:
-
attempting to establish a connection between the device and a network access point; determining whether the device successfully established a connection with the network access point; and preventing enabling of the device if the device does not successfully establish a connection with the network access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more computer-readable media comprising processor-executable instructions that, when executed, direct a processor to implement a security system by:
-
receiving a request to activate a device, wherein the processor is contained in the device; attempting to establish a connection between the device and a particular network; determining whether a connection was successfully established between the device and the particular network; and preventing enabling of the device if a connection was not successfully established between the device and the particular network. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. An apparatus comprising:
-
a communication module; and a device activation module coupled to the communication module, wherein the device activation module is configured to attempt to establish a wireless connection between the apparatus and a network, to attempt to authenticate the apparatus with an authentication system coupled to the network, to determine whether a wireless connection was successfully established between the apparatus and the network and whether the apparatus was authenticated, and further to prevent enabling of the apparatus if a wireless connection was not successfully established or the apparatus was not authenticated. - View Dependent Claims (18, 19, 20)
-
Specification