Security system
First Claim
Patent Images
1. A method implemented by a device, the method comprising:
- attempting to establish a connection between the device and a network access point;
determining whether the device successfully established a connection with the network access point;
disabling the device if the device does not successfully establish a connection with the network access point;
requesting, over the connection, authentication from an authentication system using a security key stored in a security key module; and
disabling the device if the device is not successfully authenticated by the authentication system.
1 Assignment
0 Petitions
Accused Products
Abstract
Described herein are one or more implementations of a security system for one or more protected devices. The security system implements an authentication system that enables protected devices. Protected devices are enabled for a particular network, and are disabled when the protected devices leave the network.
18 Citations
12 Claims
-
1. A method implemented by a device, the method comprising:
-
attempting to establish a connection between the device and a network access point; determining whether the device successfully established a connection with the network access point; disabling the device if the device does not successfully establish a connection with the network access point; requesting, over the connection, authentication from an authentication system using a security key stored in a security key module; and disabling the device if the device is not successfully authenticated by the authentication system. - View Dependent Claims (2, 3, 4, 5)
-
-
6. One or more non-transitory computer-readable media having stored thereon computer executable instructions that, when executed, perform a method comprising:
-
receiving a request to activate a device; attempting to establish a connection between the device and a particular network access point; determining whether a connection was successfully established between the device and the particular network access point; disabling the device if a connection was not successfully established between the device and the particular network access point; requesting, over the connection, authentication from an authentication system using a security key stored in a security key module; and disabling the device if the device is not successfully authenticated by the authentication system. - View Dependent Claims (7, 8, 9)
-
-
10. An apparatus comprising:
-
one or more processors; a communication module coupled to the one or more processors; a security key module adapted to store a security key, coupled to the one or more processors; and a device activation module coupled to the communication module, wherein the device activation module includes computer executable instructions stored in a non-transitory computer-readable media which when executed by the one or more processors; attempt to establish a wireless connection between the apparatus and a network access point; authenticate the apparatus with an authentication system coupled to the network access point, using the security key stored in the security key module; determine whether a wireless connection was successfully established between the apparatus and the network access point and whether the apparatus was authenticated, and further to disable the apparatus if a wireless connection was not successfully established or the apparatus was not authenticated. - View Dependent Claims (11, 12)
-
Specification