The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jan. 25, 2011
Filed:
Nov. 28, 2007
Kenneth S. Ehrman, New York, NY (US);
Michael L. Ehrman, New York, NY (US);
Jeffrey M. Jagid, Closter, NJ (US);
Joseph M. Pinzon, Bronx, NY (US);
Yaron Hecker, New York, NY (US);
Leonard Pimentel, Newfoundland, NJ (US);
Kenneth S. Ehrman, New York, NY (US);
Michael L. Ehrman, New York, NY (US);
Jeffrey M. Jagid, Closter, NJ (US);
Joseph M. Pinzon, Bronx, NY (US);
Yaron Hecker, New York, NY (US);
Leonard Pimentel, Newfoundland, NJ (US);
I.D. Systems, Inc., Hackensack, NJ (US);
Abstract
Methods and systems for preventing unauthorized use of a mobile asset are described. The method for providing access to the mobile asset can include providing a control device on the mobile asset. The control device is in communication with the mobile asset to selectively control whether the mobile asset is enabled for operation. The method also includes storing data in the control device that identifies a group of potential operators who are permitted to operate that mobile asset. This stored data includes unique password data for each potential operator in the permitted group. Further, the method includes receiving an identifier and password from an accessing operator and comparing by the control device of the received identifier to the stored data to order confirm that the accessing operator is a potential operator. Moreover, the method includes comparing by the received password to the stored data in order to confirm that the password matches the unique password data, and, if the comparisons are satisfied, controlling the mobile asset to be enabled for operation by the accessing operator.