Immobilization module for security on a communication system
First Claim
Patent Images
1. A method of controlling a self-sufficient network system to prevent unauthorized use of the self-sufficient network, the method comprising:
- receiving an activation request from the self-sufficient network system; and
authenticating the self-sufficient network system based on the activation request, the self-sufficient network system being functional if the activation request is valid and the self-sufficient network system having reduced functionality if the activation request is not valid.
12 Assignments
0 Petitions
Accused Products
Abstract
Example embodiments are directed to a method of controlling a self-sufficient network system to prevent unauthorized use of the self-sufficient network. The method includes receiving an activation request from the self-sufficient network system and authenticating the self-sufficient network system based on the activation request. The self-sufficient network system is functional if the activation request is valid and the self-sufficient network system has reduced functionality if the activation request is not valid.
-
Citations
19 Claims
-
1. A method of controlling a self-sufficient network system to prevent unauthorized use of the self-sufficient network, the method comprising:
-
receiving an activation request from the self-sufficient network system; and authenticating the self-sufficient network system based on the activation request, the self-sufficient network system being functional if the activation request is valid and the self-sufficient network system having reduced functionality if the activation request is not valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of controlling a self-sufficient network system to prevent unauthorized use of the self-sufficient network system, the method comprising:
-
requesting, by a service system, authentication information; receiving, from the self-sufficient network system, the requested authentication information; determining, by the service system, a tampering state of the self-sufficient network system; and restricting the functionality of or disabling, by the service system, the self-sufficient network system based on the determined tampered state. - View Dependent Claims (10, 11, 12)
-
-
13. A method of automatically controlling a self-sufficient network system, the method comprising:
-
detecting, by the self-sufficient network system, a tampering of the self-sufficient network system; transmitting, by the self-sufficient network system, a tampering alert if a tampering has occurred. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification