METHOD AND A SYSTEM FOR CONTROLLING AND MONITORING OPERATION OF A DEVICE
First Claim
1. A method of controlling and monitoring operation of a rental machine having a keyless start arrangement configured to activate the machine, the method comprising:
- communicating an authorization code via a remote management source to a processor having a memory, wherein the processor regulates operation of the machine and is operatively connected to the keyless start arrangement configured to activate the machine;
storing the authorization code within the processor memory;
detecting by the processor an entry of an access code made via a selective input;
assessing whether the entered access code matches the authorization code;
authorizing operation of the machine if the entered access code matches the authorization code;
denying authorized operation of the machine if the entered access code does not match the authorization code; and
locking out operation of the machine if the processor detects that the access code was disabled upon completion of the authorized operation of the machine and log in the actual duration of time the machine was in use.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of controlling and monitoring operation of a device is disclosed. The method includes communicating an authorization code via a management source to a processor having a memory. The processor is configured for regulating operation of the device, and is operatively connected to a keyless start arrangement configured to activate the device. The method additionally includes receiving the authorization code by the processor and storing the authorization code within the controller memory. Furthermore, the method includes entering an access code via a selective input, receiving the access code by the processor, and authorizing operation of the device if the access code matches the authorization code.
15 Citations
20 Claims
-
1. A method of controlling and monitoring operation of a rental machine having a keyless start arrangement configured to activate the machine, the method comprising:
-
communicating an authorization code via a remote management source to a processor having a memory, wherein the processor regulates operation of the machine and is operatively connected to the keyless start arrangement configured to activate the machine; storing the authorization code within the processor memory; detecting by the processor an entry of an access code made via a selective input; assessing whether the entered access code matches the authorization code; authorizing operation of the machine if the entered access code matches the authorization code; denying authorized operation of the machine if the entered access code does not match the authorization code; and locking out operation of the machine if the processor detects that the access code was disabled upon completion of the authorized operation of the machine and log in the actual duration of time the machine was in use. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system of controlling and monitoring operation of a rental machine, the system comprising:
-
a keyless start arrangement configured to activate the machine; a processor having a memory and operatively connected to the keyless start arrangement; and a remote management source configured to communicate an authorization code to the processor; wherein the processor is configured to; regulate operation of the machine; receive the authorization code; store the authorization code within the memory; detect an entry of an access code made via a selective input; and assess whether the entered access code matches the authorization code; and wherein one of the processor and the remote management source is additionally configured to; authorize operation of the machine if the entered access code matches the authorization code; deny operation of the machine if access code does not match the authorization code; and lock out operation of the machine if the processor detects that the access code was disabled upon completion of the authorized operation of the machine and log in the actual duration of time the machine was in use. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification