The security system for a protected object comprises a first wireless module, a central controller, and a remote authorization server. The first wireless module and the central controller are disposed in the protected object. The first wireless module transmits an authorization request with an authorization ID (identification) of the protected object, and receives an authorization response. The central controller is coupled to the first wireless module, and allows the protected object to operate in accordance with the authorization response. The remote authorization server, responsive to the authorization request, generates the authorization response from an authorization record thereof in accordance with the authorization ID, and transmits the authorization response.

 
Web www.patentalert.com

< Methods and systems for transmitting digital messages

< Management of a communication network and the migration of mobile agents

> Method and apparatus for transition of encryption key during an ongoing media communication session

> Cryptographic key management

~ 00603