摘要 |
Described herein are one or more implementations of a security system for one or more protected devices. The security system implements an authentication system that enables protected devices. Protected devices are enabled for a particular network, and are disabled when the protected devices leave the network. |