摘要 |
Example embodiments are directed to a method of controlling a self-sufficient network system to prevent unauthorized use of the self-sufficient network. The method includes receiving an activation request from the self-sufficient network system and authenticating the self-sufficient network system based on the activation request. The self-sufficient network system is functional if the activation request is valid and the self-sufficient network system has reduced functionality if the activation request is not valid. |