RFID-based systems and methods for preventing hi-jacker from using airplanes as guided missiles, vessels as guided torpedoes, and automotive or rail conveyances as bombs
First Claim
1. An anti-hijacker system for use in association with a transportation conveyance having an engine or motor system, said anti-hijacker system including:
- an RFID tag associated with an authorized user of the transportation conveyance;
a receiver enabled to read a signal transmitted from said RFID tag; and
a computer operatively connected to said receiver and the engine or motor system of the transportation conveyance so that in the absence of an expected signal from said RFID tag, said computer controls operation of the engine or motor system.
1 Assignment
0 Petitions
Accused Products
Abstract
An anti-hijacker system for use in association with a transportation conveyance having an engine or motor system. The anti-hijacker system includes an RFID tag associated with an authorized user of the transportation conveyance and a receiver enabled to read a signal transmitted from the RFID tag. The system further includes a computer operatively connected to the receiver and the engine or motor system of the transportation conveyance so that in the absence of an expected signal from the RFID tag, the computer takes operational control of the engine or motor system. The computer may disable the engine or place the conveyance on autopilot. Related methods include concealing an RFID tag on the person of an authorized user of the transportation conveyance and disabling operation of the engine or motor system of the transportation conveyance when an expected signal from the RFID tag is not received in an expected manner.
41 Citations
36 Claims
-
1. An anti-hijacker system for use in association with a transportation conveyance having an engine or motor system, said anti-hijacker system including:
-
an RFID tag associated with an authorized user of the transportation conveyance;
a receiver enabled to read a signal transmitted from said RFID tag; and
a computer operatively connected to said receiver and the engine or motor system of the transportation conveyance so that in the absence of an expected signal from said RFID tag, said computer controls operation of the engine or motor system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of preventing a transportation conveyance from being hijacked, said method comprising the steps of:
-
concealing an RFID tag on the person of an authorized user of the transportation conveyance; and
taking remote control of the engine or motor system of the transportation conveyance when an expected signal from said RFID tag is not received in an expected manner. - View Dependent Claims (18, 19)
-
-
17. A method of preventing a transportation conveyance from being hijacked, said method comprising the steps of:
-
concealing an RFID tag on the person of an authorized user of the transportation conveyance; and
disabling operation of the engine or motor system of the transportation conveyance when an expected signal from said RFID tag is not received in an expected manner.
-
-
20. A method of preventing a transportation conveyance from being hijacked, said method comprising the steps of:
-
providing an authorized user of the transportation conveyance with an RFID tag that transmits a known signal;
providing a receiver enabled to read said signal transmitted from said RFID tag; and
providing a computer operatively connected to said receiver and the engine or motor system of the transportation conveyance so that in the absence of an expected signal from said RFID tag, said computer controls operation of the engine or motor system. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A biometric and password system, comprising:
-
reader means for taking a biometric reading from a user to determine whether the user is an authorized user;
input means for the user to input a password into the system to determine whether the user has an authorized password; and
processing means to compare the biometric reading to the inputted password to determine whether the inputted password matches with the biometric reading. - View Dependent Claims (26)
-
-
27. A biometric and password system, comprising:
-
a reader implemented to take a biometric reading from a user to determine whether the user is an authorized user;
an input device enabled to receive a password and input said password into the system to determine whether the user has inputted an authorized password; and
a processor configured to compare the biometric reading to the inputted password to determine whether the inputted password matches with the biometric reading. - View Dependent Claims (28, 29)
-
-
30. A piloting control and security system for use in an aircraft, said system comprising:
-
a yoke including a thumb cradle formed therein, said thumb cradle having a reader capable of reading a fingerprint of a user that places a finger in the thumb cradle, said reader being operatively connected to a processor; and
a password input device operatively connected to said processor so that when the user'"'"'s fingerprint has been read by the reader and a password inputted into said password input device, said processor determines whether the user is an authorized user. - View Dependent Claims (31)
-
-
32. A steering control and security system for use in an automotive vehicle, said system comprising:
-
a steering wheel including a thumb cradle formed therein, said thumb cradle having a reader capable of reading a fingerprint of a user that places a finger in the thumb cradle, said reader being operatively connected to a processor; and
a password input device operatively connected to said processor so that when the user'"'"'s fingerprint has been read by the reader and a password inputted into said password input device, said processor determines whether the user is an authorized user. - View Dependent Claims (33)
-
-
34. A steering control and security system for use in watercraft, said system comprising:
-
a pilot wheel including a thumb cradle formed therein, said thumb cradle having a reader capable of reading a fingerprint of a user that places a finger in the thumb cradle, said reader being operatively connected to a processor; and
a password input device operatively connected to said processor so that when the user'"'"'s fingerprint has been read by the reader and a password inputted into said password input device, said processor determines whether the user is an authorized user. - View Dependent Claims (35)
-
-
36. A method for determining authorized use of a transportation conveyance, said method comprising the steps of:
-
requiring a user of the transportation conveyance to carry an RFID tag;
requiring the user to input a password into a computer system associated with the transportation conveyance;
requiring the user to periodically conduct a biometric check during the course of operation of the transportation conveyance; and
initiating a security protocol in the event of an incorrect password entry, a negative biometric check, or a failure to receive an expected signal from said computer system.
-
Specification