Method for detecting unauthorized modification of a communication or broadcast unit
First Claim
1. In an RF communication system that includes a plurality of communication units, wherein each of the communication units includes at least one module and at least one software program, a method of detecting an unauthorized modification of a communication unit of the plurality of communication units, the method comprises the steps of:
- a. detecting, by the communication unit, expiration of a predetermined time period;
b. when the predetermined time period has expired, transmitting, by the communication unit, a message via an RF communication resource, wherein the message includes a unit identification code and an assembly code, the assembly code based on, at least in part, an identification code of the at least one module and an identification code of the at least one software program;
c. receiving, by an RF receiver, the message;
d. transporting the message from the RF receiver to a database unit;
e. accessing, by the database unit, a stored assembly code based on the unit identification code;
f. comparing, by the database unit, the assembly code to the stored assembly code;
g. indicating, by the database unit, that an unauthorized modification of the communication unit has occurred when the assembly code does not substantially match the stored assembly code.
1 Assignment
0 Petitions
Accused Products
Abstract
A database unit monitors the communications occurring within at least one communication system for hardware identification codes of communication or broadcast units. Upon detecting the hardware identification code, the database unit compares the one received with a stored hardware identification code for the unit. When the stored hardware code does not match the one received, the database unit indicates that the unit has undergone an unauthorized modification.
46 Citations
8 Claims
-
1. In an RF communication system that includes a plurality of communication units, wherein each of the communication units includes at least one module and at least one software program, a method of detecting an unauthorized modification of a communication unit of the plurality of communication units, the method comprises the steps of:
-
a. detecting, by the communication unit, expiration of a predetermined time period; b. when the predetermined time period has expired, transmitting, by the communication unit, a message via an RF communication resource, wherein the message includes a unit identification code and an assembly code, the assembly code based on, at least in part, an identification code of the at least one module and an identification code of the at least one software program; c. receiving, by an RF receiver, the message; d. transporting the message from the RF receiver to a database unit; e. accessing, by the database unit, a stored assembly code based on the unit identification code; f. comparing, by the database unit, the assembly code to the stored assembly code; g. indicating, by the database unit, that an unauthorized modification of the communication unit has occurred when the assembly code does not substantially match the stored assembly code. - View Dependent Claims (2)
-
-
3. In an RF communication system that includes a plurality of broadcasting units, wherein each of the broadcasting units includes at least one module and at least one software program, a method of detecting an unauthorized modification of a broadcasting unit of the plurality of broadcasting units, the method comprises the steps of:
-
a. detecting, by the broadcasting unit, expiration of a predetermined time period; b. when the predetermined time period has expired, transmitting, by the broadcasting unit, a message via an RF communication resource, wherein the message includes a unit identification code and an assembly code, the assembly code based on, at least in part, an identification code of the at least one module and an identification code of the at least one software program; c. receiving, by an RF receiver, the message; d. transporting the message from the RF receiver to a database unit; e. accessing, by the database unit, a stored assembly code based on the unit identification code; f. comparing, by the database unit, the assembly code to the stored assembly code; g. indicating, by the database unit, that an unauthorized modification of the broadcasting unit has occurred when the assembly code does not substantially match the stored assembly code. - View Dependent Claims (4)
-
-
5. In an RF communication system that includes a plurality of communication units, wherein each of the communication units includes at least one module and at least one software program, a method of detecting an unauthorized modification of a communication unit of the plurality of communication units, the method comprises the steps of:
-
a. detecting a modification of the communication unit, whereupon after detection, transmitting, by the communication unit, a message via an RF communication resource, wherein the message includes a unit identification code and an assembly code, the assembly code based on, at least in part, an identification code of the at least one module and an identification code of the at least one software program; b. receiving, by an RF receiver, the message; c. transporting the message from the RF receiver to a database unit; c. accessing, by the database unit, a stored assembly code based on the unit identification code; e. comparing, by the database unit, the assembly code to the stored assembly code; f. indicating, by the database unit, that an unauthorized modification of the communication unit has occurred when the assembly code does not substantially match the stored assembly code. - View Dependent Claims (6)
-
-
7. In an RF communication system that includes a plurality of broadcasting units, wherein each of the broadcasting units includes at least one module and at least one software program, a method of detecting an unauthorized modification of a broadcasting unit of the plurality of broadcasting units, the method comprises the steps of:
-
a. detecting a modification of the broadcasting unit, whereupon after detection, transmitting, by the broadcasting unit, a message via an RF communication resource, wherein the message includes a unit identification code and an assembly code, the assembly code based on, at least in part, an identification code of the at least one module and an identification code of the at least one software program; b. receiving, by an RF receiver, the message; c. transporting the message from the RF receiver to a database unit; d. accessing, by the database unit, a stored assembly code based on the unit identification code; e. comparing, by the database unit, the assembly code to the stored assembly code; f. indicating, by the database unit, that an unauthorized modification of the broadcast unit has occurred when the assembly code does not substantially match the stored assembly code. - View Dependent Claims (8)
-
Specification