Systems and methods for providing theft protection in a machine
First Claim
1. A method for providing theft protection in a machine, comprising:
- activating a first control module to restrict access to a first operational system in the machine;
activating a second control module to restrict access to a second operational system in the machine;
detecting, by the first control module, a substitution of a new control module for the second control module; and
automatically configuring the new control module to restrict access to the second operational system in the machine.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems may provide theft protection in one or more work machines. Methods and systems may control one or more operational systems and may provide and manage varying levels of access to work machines. Methods and systems may react to override attempts in order to provide robust theft protection. One or more control modules embedded in a work machine may be leveraged to perform theft protection services. Methods and systems may activate a first control module to restrict access to a first operational system in a work machine and activate a second control module to restrict access to a second operational system in the work machine. The first control module may detect a substitution of a new control module for the second control module and automatically configure the new control module to restrict access to the second operational system in the work machine.
-
Citations
35 Claims
-
1. A method for providing theft protection in a machine, comprising:
-
activating a first control module to restrict access to a first operational system in the machine; activating a second control module to restrict access to a second operational system in the machine; detecting, by the first control module, a substitution of a new control module for the second control module; and automatically configuring the new control module to restrict access to the second operational system in the machine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A control apparatus for providing theft protection in a machine, comprising:
-
a first port that interfaces a first control module; a second port that interfaces a communication device; a third port coupled to a first operational system in the machine; a memory including executable instructions for; restricting access to the first operational system in response to a command received from the communication device; detecting a substitution of a second control module for the first control module; and automatically configuring the second control module to restrict access to a second operational system in the machine; and a processor for executing the instructions included in the memory. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A theft protection system, comprising:
-
means for activating a first control module to restrict access to a first operational system in a machine; means for activating a second control module to restrict access to a second operational system in the machine; means for detecting, by the first control module, a substitution of a new control module for the second control module; and means for automatically configuring the new control module to restrict access to the second operational system in the machine.
-
-
21. A theft protection system in a machine, comprising:
-
a first control module coupled to a first data link and coupled to a first operational system in the machine; a second control module coupled to the first data link and coupled to a second operational system in the machine; and a communication module coupled to the first control module by a second data link and configured to receive commands from a user of the machine; wherein the first control module is configured to; restrict access to the first operational system in response to a first command received by the communication device; activate the second control module to restrict access to the second operational system in response to a second command received by the communication device; detect a substitution of a new control module for the second control module; and automatically activate the new control module to restrict access to the second operational system. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A theft protection system in a machine, comprising:
-
a first control module coupled to a first data link and coupled to a first operational system in the machine; a second control module coupled to the first data link and coupled to a second operational system in the machine; and a computer system remotely located with respect to the machine and coupled to the first control module by a network; wherein the first control module is configured to; restrict access to the first operational system in response to a first command received from the computer system; activate the second control module to restrict access to the second operational system in response to a second command received from the computer system; detect a substitution of a new control module for the second control module; and automatically activate the new control module to restrict access to the second operational system.
-
-
35. A computer-readable medium including instructions for performing a method in a machine, the method comprising:
-
activating a first control module to restrict access to a first operational system in the machine; activating a second control module to restrict access to a second operational system in the machine; detecting, by the first control module, a substitution of a new control module for the second control module; and automatically configuring the new control module to restrict access to the second operational system in the machine.
-
Specification