Method and apparatus for securing an earth moving machine
First Claim
1. A method of securing a machine having a machine security system, the machine security system including, a primary controller, a key switch associated with the primary controller and adapted to receive a key, the key switch being configurable to a plurality of positions, comprising the steps of:
- delivering power to the primary controller in response to the key switch being configured in a predetermined position;
activating the security system in response to said power delivery;
receiving an identification code from said key in response to said security system being active;
comparing said received identification code to at least one authorized key identification code, said authorized key code having an associated key activation period;
determining a first operating characteristic of said machine;
comparing said first operating characteristic with said key activation period; and
disarming said machine security system in response to an access key list including said received identification code, and said first operating characteristic being within said key activation period.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention includes a method and apparatus to secure a machine having a machine security system. The machine security system includes a primary controller, and a key switch associated with the primary controller and adapted to receive a key, the key switch being configurable to a plurality of positions. The method includes the steps of delivering power to the primary controller in response to the key switch being configured in a predetermined position, activating the security system in response to the power delivery, determining a first operating characteristic of the machine, determining whether to maintain activation of the security system in response to the first operating characteristic, receiving an identification code from the key, and determining whether to enable machine operation in response to the received key code.
46 Citations
38 Claims
-
1. A method of securing a machine having a machine security system, the machine security system including, a primary controller, a key switch associated with the primary controller and adapted to receive a key, the key switch being configurable to a plurality of positions, comprising the steps of:
-
delivering power to the primary controller in response to the key switch being configured in a predetermined position;
activating the security system in response to said power delivery;
receiving an identification code from said key in response to said security system being active;
comparing said received identification code to at least one authorized key identification code, said authorized key code having an associated key activation period;
determining a first operating characteristic of said machine;
comparing said first operating characteristic with said key activation period; and
disarming said machine security system in response to an access key list including said received identification code, and said first operating characteristic being within said key activation period. - View Dependent Claims (2, 3, 4, 5)
determining a second operating characteristic of the machine in response to activation of said security system; and
determining whether to maintain activation of said security system in response said second operating characteristic.
-
-
3. A method, as set forth in claim 2, wherein each security system has an associated system activation period, and wherein the step of determining whether to maintain activation of said security system in response to said first operating characteristic further includes the step of determining whether said first operating characteristic is compatible with said system activation period.
-
4. A method, as set forth in claim 3, wherein said first operating characteristic is a reference time, and the step of determining whether said first operating characteristic is compatible includes the step of determining whether said first operating characteristic is within said system activation period.
-
5. A method, as set forth in claim 4, wherein the step of determining whether to maintain activation of said security system includes the step of enabling said machine operation in response to said first operating characteristic is within said system activation period.
-
6. A method of securing an machine having a machine security system, the machine security system including, a primary controller, a key switch associated with the primary controller and adapted to receive a key, the key switch being configurable to a plurality of positions, comprising the steps of:
-
delivering power to the primary controller in response to the key switch being configured in a predetermined position;
activating the security system in response to said power delivery;
determining a first operating characteristic of the machine;
determining whether to maintain activation of said security system in response to said first operating characteristic;
receiving an identification code from said key;
comparing said received identification code to at least one authorized key identification code;
determining whether to enable operation of said machine in response to said code comparison. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
receiving a polling request from said at least one secondary controller, said secondary controller controlling a machine function;
delivering an encrypted message to said at least one secondary controller;
enabling a machine function, in response to said encrypted message.
-
-
13. A method, as set forth in claim 12, wherein said access list is located on a remote data facility.
-
14. A method, as set forth in claim 13, wherein the step of comparing said received identification code to an access list further comprises the steps of:
-
communicating said received identification code to a remote data facility; and
,receiving from said remote data facility a signal indicative of said comparison.
-
-
15. A method, as set forth in claim 14, wherein the step of determining whether to maintain activation of said security system in response to said first operating characteristic includes the steps of:
-
communicating said first operating characteristic to said remote data facility; and
,receiving from said remote data facility an activation signal indicative of whether activation of said security system should be maintained.
-
-
16. A method, as set forth in claim 11, further comprising the step of enabling said machine to start with one of a non-electronic key and an electronic key in response to said security system being deactived.
-
17. A method, as set forth in claim 6, wherein each said authorized key identification code has an associated key activation period, and wherein the step of determining whether to enable operation of said machine in response to said code comparison further comprises the steps of:
-
establishing a second operating characteristic of said machine;
comparing said second operating characteristic with said key activation period; and
enabling said machine operation in response to said received identification code matching at least one of said at least one authorized codes, and said second operating characteristic being within said key activation period of said matched key.
-
-
18. A method, as set forth in claim 17, wherein the step of receiving said identification code further comprises the step of polling said key in response to said security system remaining active.
-
19. A method, as set forth in claim 18, wherein the step of comparing said received identification code further comprises the step of verifying said received identification code contains valid data.
-
20. A method, as set forth in claim 6, further comprising the steps of preventing an engine associated with said machine from starting until said security system is one of disarmed and deactivated.
-
21. A method, as set forth in claim 20, wherein the machine has an associated hydraulic circuit, further comprising the steps of preventing an implement associated with a hydraulic circuit from operating until said security system is one of disarmed and deactivated.
-
22. A method, as set forth in claim 21, further comprising the steps of preventing an transmission associated with the machine from operating until said security system is one of disarmed and deactivated.
-
23. A method, as set forth in claim 6, further comprising the step of enabling said machine to start with one of a non-electronic key and an electronic key in response to said security system being deactived.
-
24. A method, as set forth in claim 6, wherein said at least one authorized key code is located on at least one of said machine and a remote data facility.
-
25. An security apparatus adapted to secure an machine, comprising:
-
a key switch adapted to receive a key, said key switch having a plurality of positions;
a power source for delivering a power signal;
an antenna adapted to receive a key identification code signal, and responsively generate a received key identification signal;
a primary controller adapted to receive said power signal in response to said key switch being configured in a predetermined position, said primary controller adapted to receive said key identification signal, said primary controller including an access list, said access list including at least one key identification code, said primary controller being further adapted to activate the security system in response to receiving said power signal, determine a first operating characteristic of the machine, determine whether to maintain activation of said security system in response to said first operating characteristic, compare said received identification code to said access list, determine whether to maintain activation of said security system in response to said identification code comparison. - View Dependent Claims (26, 27, 28)
-
-
29. A method of securing an machine having a machine security system, the machine security system including, a primary controller, a key switch associated with the primary controller and adapted to receive a key, the key switch being configurable to a plurality of positions, comprising the steps of:
-
delivering power to the primary controller in response to the key switch being configured in a predetermined position;
determining a first operating characteristic of the machine;
determining whether to enable operation of said machine in response to said first operating characteristic;
receiving an identification code from said key in response to said machine operation remaining disabled; and
determining whether to enable operation of said machine in response to said received identification code. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37)
comparing said received identification code to at least one authorized key code; and
determining whether to enable operation of said machine in response to said comparison.
-
-
31. A method, as set forth in claim 30, wherein said machine operation remains disabled upon said power delivery.
-
32. A method, as set forth in claim 30, wherein each said key identification code in said access list has an associated key activation period, and wherein the step of determining whether to enable said machine in response to said comparison of said identification code and said access list further comprises the steps of:
-
establishing a second operating characteristic of said machine;
comparing said second operating characteristic with said key activation period; and
enabling said machine operation in response to said key list including said received identification code, and said second operating characteristic being within said key activation period.
-
-
33. A method, as set forth in claim 32, wherein each security system has an associated system activation period, and wherein the step of determining whether to maintain activation of said security system in response to said first operating characteristic further includes the step of determining whether said first operating characteristic is compatible with said system activation period.
-
34. A method, as set forth in claim 33, wherein said first operating characteristic is a reference time, and the step of determining whether said first operating characteristic is compatible includes the step of determining whether said first operating characteristic is within said system activation period.
-
35. A method, as set forth in claim 34, wherein the step of determining whether to maintain activation of said security system includes the step of enabling said machine operation in response to said first operating characteristic is within said system activation period.
-
36. A method, as set forth in claim 35, wherein the step of receiving said identification code further comprises the step of polling said key in response to said security system remaining active.
-
37. A method, as set forth in claim 36, wherein the machine security system includes at least one secondary controller, wherein the step of enabling said machine to operate further comprises the steps of:
-
delivering an enable signal to said secondary controller; and
herein said secondary controller enables a machine element in response to said enable signal.
-
-
38. A method of securing an machine having a machine security system, the machine security system including, a primary controller, a key switch associated with the primary controller and adapted to receive a key, the key switch being configurable to a plurality of positions, comprising the steps of:
-
delivering power to the primary controller in response to the key switch being configured in a predetermined position;
determining a first operating characteristic of the machine;
activating said security system in response to said first operating characteristic;
receiving an identification code from said key in response to said security system being activated;
comparing said received identification code to an access list, said access list including at least one key identification code;
determining whether to maintain activation of said security system in response to said comparison.
-
Specification