Security system for a marine vessel
First Claim
Patent Images
1. A method of deterring theft of a given protected component from a marine vessel, comprising:
- installing a security device on said vessel, said security device comprising an identification code transmitter;
transmitting an initial interrogation signal from said protected component to said security device;
receiving said initial interrogation signal at said security device and, in response thereto, transmitting an identification code from said security device to said protected component;
receiving said identification code at said protected component and storing same as an expected identification code;
transmitting a subsequent interrogation signal from said protected component;
awaiting at said protected component a subsequent identification code, and responding to at least one of the following security-breach events to perform a designated function,a) non-receipt of an identification code within a given time increment,b) receipt of an identification code non-matching said expected identification code.
7 Assignments
0 Petitions
Accused Products
Abstract
A security system for a marine vessel uses identification values to ascertain whether or not the devices used in a marine vessel control system are those which are expected. If an identification value is received by one device from another device, appropriate operation of the devices is permitted. However, if an incorrect identification value is received or no identification value is received, continued operation of the marine propulsion system is disabled.
29 Citations
3 Claims
-
1. A method of deterring theft of a given protected component from a marine vessel, comprising:
-
installing a security device on said vessel, said security device comprising an identification code transmitter; transmitting an initial interrogation signal from said protected component to said security device; receiving said initial interrogation signal at said security device and, in response thereto, transmitting an identification code from said security device to said protected component; receiving said identification code at said protected component and storing same as an expected identification code; transmitting a subsequent interrogation signal from said protected component; awaiting at said protected component a subsequent identification code, and responding to at least one of the following security-breach events to perform a designated function, a) non-receipt of an identification code within a given time increment, b) receipt of an identification code non-matching said expected identification code. - View Dependent Claims (2, 3)
-
Specification