Security system
First Claim
1. A security system for a protected object configured with an authorization ID (identification), comprising:
- a first wireless module disposed in the protected object, transmitting an authorization request with the authorization ID, and receiving an authorization response responsive to the authorization request;
a remote authorization server, generating the authorization response with an authorization password from the authorization record thereof in accordance with the authorization ID and transmitting the authorization responses, in response to the authorization request; and
a central controller disposed in the protected object, coupled to the first wireless module, determining whether the authorization password in the authorization response is valid, allowing the protected object to operate if the authorization password in the authorization response is valid, and disabling the protected object if the authorization password in the authorization response is not valid,wherein the authorization record is originally set for the remote authorization server to generate the authorization response with the authorization password being valid, when the protected object is not stolen, and the authorization record is further changed by a user so that the remote authorization server generates the authorization response with the authorization password being invalid, when the protected object is stolen.
1 Assignment
0 Petitions
Accused Products
Abstract
The security system for a protected object comprises a first wireless module, a central controller, and a remote authorization server. The first wireless module and the central controller are disposed in the protected object. The first wireless module transmits an authorization request with an authorization ID (identification) of the protected object, and receives an authorization response. The central controller is coupled to the first wireless module, and allows the protected object to operate in accordance with the authorization response. The remote authorization server, responsive to the authorization request, generates the authorization response from an authorization record thereof in accordance with the authorization ID, and transmits the authorization response.
7 Citations
19 Claims
-
1. A security system for a protected object configured with an authorization ID (identification), comprising:
-
a first wireless module disposed in the protected object, transmitting an authorization request with the authorization ID, and receiving an authorization response responsive to the authorization request; a remote authorization server, generating the authorization response with an authorization password from the authorization record thereof in accordance with the authorization ID and transmitting the authorization responses, in response to the authorization request; and a central controller disposed in the protected object, coupled to the first wireless module, determining whether the authorization password in the authorization response is valid, allowing the protected object to operate if the authorization password in the authorization response is valid, and disabling the protected object if the authorization password in the authorization response is not valid, wherein the authorization record is originally set for the remote authorization server to generate the authorization response with the authorization password being valid, when the protected object is not stolen, and the authorization record is further changed by a user so that the remote authorization server generates the authorization response with the authorization password being invalid, when the protected object is stolen. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A vehicle security system for a vehicle configured with an authorization ID (identification), comprising:
-
a wireless module disposed in the vehicle, transmitting an authorization request with the authorization ID, and receiving an authorization response responsive to the authorization request; a transceiver, receiving the authorization request from the first wireless module and transmitting the authorization response thereto; a remote authorization server connected to the transceiver via a network, generating the authorization response with an authorization password from an authorization record thereof in accordance with the authorization ID and transmitting the authorization response to the transceiver, in response to the authorization request; and a central controller disposed in the vehicle, coupled to the first wireless module, determining whether the authorization password in the authorization response is valid, allowing the vehicle to operate if the authorization password in the authorization response is valid, and disabling the vehicle if the authorization password in the authorization response is not valid, wherein the authorization record is originally set for the remote authorization server to generate the authorization response with the authorization password being valid, when the vehicle is not stolen, and the authorization record is further changed by a user so that the remote authorization server generates the authorization response with the authorization password being invalid, when the vehicle is stolen. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A security method for protecting a protected object configured with an authorization ID (identification) and connected with a remote authorization server, comprising:
-
transmitting, by a wireless module disposed in the protected object, an authorization request with the authorization ID; generating, by the remote authorization server, an authorization response with an authorization password from an authorization record in accordance with the authorization ID, in response to the authorization request; determining, by the protected object, whether the authorization password in the authorization response received from the remote authorization server is valid; allowing the protected object to operate if the authorization password in the authorization response is valid; and disabling the protected object if the authorization password is not valid, wherein the authorization record is originally set for the remote authorization server to generate the authorization response with the authorization password being valid, when the protected object is not stolen, and the authorization record is further changed by a user so that the remote authorization server generates the authorization response with the authorization password being invalid, when the protected object is stolen. - View Dependent Claims (17, 18, 19)
-
Specification