Detecting unauthorized modification of communication unit based on comparison between stored hardware identification code and hardware identification code generated from operational platform identification code
First Claim
1. In a communication system that includes a plurality of communication units and at least one radio frequency communication resource, wherein each communication unit of the plurality of communication units includes at least one operational platform, a method for identifying unauthorized modification to a communication unit of the plurality of communication units, the method comprises the steps of:
- a) transmitting, by the communication unit via the at least one radio frequency communication resource, a message, wherein the message contains a hardware identification code and a communication unit identification code;
b) receiving, by a receiver via the at least one radio frequency communication resource, the message;
c) transporting, by the receiver, the hardware identification code and the communication unit identification code to a database unit;
d) accessing, by the database unit, a database to retrieve a stored hardware identification code based on the communication unit identification code;
e) comparing, by the database unit, the stored hardware identification code with the hardware identification code; and
f) when the stored hardware identification code and the hardware identification code do not substantially match, indicating, by the database unit, that the communication unit has undergone the unauthorized modification;
wherein the transmitting of the message step (a) further comprises the steps of;
(1) accessing, by the communication unit, an operational platform identification code for the at least one operational platform; and
(2) generating, by the communication unit, the hardware identification code based on the operational platform identification code a first predetermined function.
2 Assignments
0 Petitions
Accused Products
Abstract
A database unit monitors the communications occurring within at least one communication system for hardware identification codes of communication or broadcast units. Upon detecting the hardware identification code, the database unit compares the one received with a stored hardware identification code for the unit. When the stored hardware code does not match the one received, the database unit indicates that the unit has undergone an unauthorized modification.
148 Citations
12 Claims
-
1. In a communication system that includes a plurality of communication units and at least one radio frequency communication resource, wherein each communication unit of the plurality of communication units includes at least one operational platform, a method for identifying unauthorized modification to a communication unit of the plurality of communication units, the method comprises the steps of:
-
a) transmitting, by the communication unit via the at least one radio frequency communication resource, a message, wherein the message contains a hardware identification code and a communication unit identification code; b) receiving, by a receiver via the at least one radio frequency communication resource, the message; c) transporting, by the receiver, the hardware identification code and the communication unit identification code to a database unit; d) accessing, by the database unit, a database to retrieve a stored hardware identification code based on the communication unit identification code; e) comparing, by the database unit, the stored hardware identification code with the hardware identification code; and f) when the stored hardware identification code and the hardware identification code do not substantially match, indicating, by the database unit, that the communication unit has undergone the unauthorized modification;
wherein the transmitting of the message step (a) further comprises the steps of;(1) accessing, by the communication unit, an operational platform identification code for the at least one operational platform; and (2) generating, by the communication unit, the hardware identification code based on the operational platform identification code a first predetermined function. - View Dependent Claims (2, 3)
-
-
4. In a communication system that includes a plurality of communication units and at least one radio frequency communication resource, wherein each communication unit of the plurality of communication units includes at least one operational platform, a method for identifying unauthorized modification to a communication unit of the plurality of communication units, the method comprises the steps of:
-
a) accessing, by the communication unit, an operational platform identification code for the at least one operational platform; b) generating, by the communication unit, a hardware identification code based on the operational platform identification code and a first predetermined function; c) transmitting, by the communication unit via the at least one radio frequency communication resource, a message, wherein the message contains the hardware identification code and a communication unit identification code; d) receiving, by a receiver via the at least one radio frequency communication resource, the message; e) transporting, by the receiver, the hardware identification code and the communication unit identification code to a database unit; f) recovering, by the database unit, the operational platform identification code based on the hardware identification code and a second predetermined function; g) accessing, by the database unit, a database to retrieve a stored operational platform identification code based on the communication unit identification code; h) comparing, by the database unit, the stored operational platform identification code with the operational platform identification code; and i) when the stored operational platform identification code and the operational platform identification code do not substantially match, indicating, by the database unit, that the communication unit has undergone the unauthorized modification. - View Dependent Claims (5, 6)
-
-
7. In a communication system that includes a plurality of broadcast units and at least one radio frequency communication resource, wherein each broadcast unit of the plurality of broadcast units includes at least one operational platform, a method for identifying unauthorized modification to a broadcast unit of the plurality of broadcast units, the method comprises the steps of:
-
a) transmitting, by the broadcast unit via the at least one radio frequency communication resource, a message, wherein the message contains a hardware identification code and a broadcast unit identification code; b) receiving, by a receiver via the at least one radio frequency communication resource, the message; c) transporting, by the receiver, the hardware identification code and the broadcast unit identification code to a database unit; d) accessing, by the database unit, a database to retrieve a stored hardware identification code based on the broadcast unit identification code; e) comparing, by the database unit, the stored hardware identification code with the hardware identification code; and f) when the stored hardware identification code and the hardware identification code do not substantially match, indicating, by the database unit, that the broadcast unit has undergone the unauthorized modification;
wherein the transmitting of the message step (a) further comprises the steps of;(1) accessing, by the broadcast unit, an operational platform identification code for the at least one operational platform; and (2) generating, by the broadcast unit, the hardware identification code based on the operational platform identification code a first predetermined function. - View Dependent Claims (8, 9)
-
-
10. In a communication system that includes a plurality of broadcast units and at least one radio frequency communication resource, wherein each broadcast unit of the plurality of broadcast units includes at least one operational platform, a method for identifying unauthorized modification to a broadcast unit of the plurality of broadcast units, the method comprises the steps of:
-
a) accessing, by the broadcast unit, an operational platform identification code for the at least one operational platform; b) generating, by the broadcast unit, a hardware identification code based on the operational platform identification code and a first predetermined function; c) transmitting, by the broadcast unit via the at least one radio frequency communication resource, a message, wherein the message contains the hardware identification code and a broadcast unit identification code; d) receiving, by a receiver via the at least one radio frequency communication resource, the message; e) transporting, by the receiver, the hardware identification code and the broadcast unit identification code to a database unit; f) recovering, by the database unit, the operational platform identification code based on the hardware identification code and a second predetermined function; g) accessing, by the database unit, a database to retrieve a stored operational platform identification code based on the broadcast unit identification code; h) comparing, by the database unit, the stored operational platform identification code with the operational platform identification code; and i) when the stored operational platform identification code and the operational platform identification code do not substantially match, indicating, by the database unit, that the broadcast unit has undergone the unauthorized modification. - View Dependent Claims (11, 12)
-
Specification