CN1086655C - 用于装置、特别是汽车接收机的防盗方法 - Google Patents
用于装置、特别是汽车接收机的防盗方法 Download PDFInfo
- Publication number
- CN1086655C CN1086655C CN98804064A CN98804064A CN1086655C CN 1086655 C CN1086655 C CN 1086655C CN 98804064 A CN98804064 A CN 98804064A CN 98804064 A CN98804064 A CN 98804064A CN 1086655 C CN1086655 C CN 1086655C
- Authority
- CN
- China
- Prior art keywords
- coding
- checking information
- automobile receiver
- automobile
- receiver
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000002427 irreversible effect Effects 0.000 claims abstract description 11
- 230000008676 import Effects 0.000 claims description 6
- 230000000052 comparative effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000010998 test method Methods 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R11/00—Arrangements for holding or mounting articles, not otherwise provided for
- B60R11/02—Arrangements for holding or mounting articles, not otherwise provided for for radio sets, television sets, telephones, or the like; Arrangement of controls thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R11/00—Arrangements for holding or mounting articles, not otherwise provided for
- B60R11/02—Arrangements for holding or mounting articles, not otherwise provided for for radio sets, television sets, telephones, or the like; Arrangement of controls thereof
- B60R11/0205—Arrangements for holding or mounting articles, not otherwise provided for for radio sets, television sets, telephones, or the like; Arrangement of controls thereof for radio sets
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R11/00—Arrangements for holding or mounting articles, not otherwise provided for
- B60R2011/0096—Theft prevention of articles
- B60R2011/0098—Theft prevention of articles using electric or electronic means, e.g. alarms, codes
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mechanical Engineering (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
- Burglar Alarm Systems (AREA)
- Transceivers (AREA)
- Storage Device Security (AREA)
- Automotive Seat Belt Assembly (AREA)
Abstract
本发明涉及一种装置的、特别是汽车接收机的防盗方法,其中,为了种激活该装置必须直接在该装置上输入识别它的识别信息(编码)。在此提出,借助于一个不可逆的编码方法由与该装置相配的一个测试信息得到该编码。
Description
本发明涉及一种能够使装置、特别是汽车接收机防盗的方法,其中,为了激活该装置、必须直接在该装置上输入识别该装置的识别信息。
已公知,在汽车接收机上设置一个防盗代码。为此,在一个与汽车接收机相配的存储器内存放了一个密码。它可以例如是在一个内部或外部EEPROM内(电算只读存储器)。为了首次打开或者在汽车接收机供电中断之后重新打开该接收机,该代码必须直接被输入到汽车接收机内。它的输入可以或是手工通过输入键或是通过外部的代码卡。一个集成在汽车接收机内的处理单元把存储的密码与输入的代码相比较并且在代码一致时准予无线电收音机不受限制地使用。
在这里不足的是,汽车接收机内存放的密码能够以较简单的方式被读出。通过未被授权的读出而对代码的识别,汽车接收机也能够由未被授权的使用者激活。
本发明的目的是,提供一种用于装置、特别是汽车接收机的防盗方法,使得未经授权是不可能使用防盗装置的。
按照本发明,提出了一种阻止未被授权地使用一个装置、特别是一个汽车接收机的方法,其中,为了激活该装置,必须直接在该装置上输入与该装置相配的一个编码,其中,由该编码借助于一个不可逆的编码方法形成一个检验信息,并且为了释放该装置,将该检验信息与一个在该装置内存储的检验信息相比较。
相比较而言,本发明方法的优点是,未经授权是不可能使用防盗装置的。借助一个不可逆的编码方法由一个与该装置相配的检测信息得到该编码,因此防盗代码本身不被存放在装置内。由此防止该编码被以无理的方式读出并且防止被滥用于装置的未被授权的起动。例如不对称方法,特别是所谓的RSA-方法(里韦斯特—沙米尔—阿德勒曼(REVEST-SHAMIR-EDELMANN)方法)被用作不可逆的编码方法。这些方法具有很高密码文性能的优点,也就是说,通过不对称方法被编码的信息的译码只有通过极长时间消耗和极高计算费用的系统性试验才是可能的,这种费用与可获得的结果在经济上是不相配的。
在本发明的优选方案中提出,在装置的一个处理器或者一个与处理器相配的存储元件上存放该编码方法的一个公开的译码和进行编码的起始信息(检验信息),特别是该要保护装置的一个序列号。在了解这种信息时,未被授权的使用者不可能得到用于要保护装置的不受限制的使用的编码。只有通过被授权的使用者外部输入该编码,例如手工输入或者借助于代码卡输入,才能计算检验信息,它与存储的检验信息的比较结果一致时该装置才能被使用。
在本发明另一优选方案中提出,除了检验信息之外,在待保护装置上存放了一个检验算法。这样有利的是,能够在保留一种不可逆编码方法的情况下减小进行编码的费用。不使用费用相对高的、完全的不对称方法也能够进行这样一种不可逆的编码,即存放用于一个编码的测试方法,但不存放该编码的生成算法。该检验算法和检验信息是可被读出的,同样允许的是,只有在高费用下才能获得该编码的生成算法和从而获得该编码本身。
以下在实施例中借助于有关的附图对本发明做详细说明。附图示出了:
图1:一个装置进行编码的示意图,
图2:一个被编码的装置的起动示意图,
图3:按照第二实施例的一个装置进行编码的示意图,
图4和图5:按照第二实施例被编码装置的起动示意图。
按照下列说明的实施例,由汽车接收机的一个防盗编码的产生和使用开始。原则上,这种方法可适用所有的有保护价值的装置。
附图1示出按照本发明编码的产生。在此提供一个不对称的编码算法10和一个检验信息12,该检验信息被一个秘密的译码14处理,这样形成一个编码16。待保护的装置、即例如汽车接收机的序列号可用作检验信息12。由这个序列号或者其一部分、例如任选序列号的几位,在制造汽车接收机时在可靠环境中借助于秘密的译码14形成编码16。在第一次供货时或在所希望的转送中,该编码16被附在汽车接收机上。它可以例如以有关编码的书面通知的形式或者以代码卡的形式进行,该代码卡具有被存储形式的编码16。
汽车接收机本身包括一个处理器单元,在处理器单元内存放作为不可变信息的检验信息12和所用的不对称编码方法10的一个公开的译码(Schluessel)18。
附图2中所示出的汽车接收机20,除了公开的译码18和检验信息12之外,不包括编码16,它对于汽车接收机20的起动或重新起动是必需的。为了进行汽车接收机20的授权的起动或重新起动,被授权的使用者把编码16输入汽车接收机20的处理器内。可以例如借助于按键输入书面通知的编码16或者借助于代码卡输入。不对称的编码方法10由输入的编码16和公开的译码18得出一个计算出的检验信息12’。该检验信息12’与不可变存储的检验信息12在一个比较器22内比较。如果在检验信息12和计算的检验信息12’之间的比较22结果的一致的,那么汽车接收机20被允许不受限制地使用。
清楚的是,在汽车接收机20被偷盗时,虽然所用的不对称编码方法10的公开译码18对每人都是可得到的,并且检验信息、例如序列号对每人也是可得到的,但是用于获得检验信息12’的编码16不能被每人得到。编码16也不会由所用的不对称编码方法10的公开译码18得出。
再清楚不过的是,不知道编码16,绝不可能起动或重新起动汽车接收机20。
对于确定的待保护装置组而言,因为借助于附图1和2所描述的不可逆的不对称编码方法的费用与经济的结果是不相配的,所以借助于附图3和4介绍了一个简单的不可逆的编码方法。
以与附图1相似的方式,给编码方法10’输入检验信息12,例如输入汽车接收机的序列号。通过一个生成算法26由检验信息得出编码16。编码16要么以书面形式要么以代码卡的形式附在该汽车接收机上。
汽车接收机20的起动或重新起动,如附图4所示,通过在汽车接收机20上输入编码16来进行。通过编码方法10’,编码16被一个检验算法28和检验信息12加载。检验算法28检验,编码16是否与检验信息12有联系。如果通过检验算法28确定,该编码16属于包含检验信息12的汽车接收机20,那么实现汽车接收机20的不受限制的使用许可24。
借助于附图3和4说明的不可逆编码方法的特征同样在于,在汽车接收机20中既不包含编码16又不包含编码16的生成算法26。它只包含有检验信息12和检验算法28,未授权地读出该检验算法也不允许直接得到编码16。只有通过用于检验算法28的费事的分析方法,才可以逻辑推断出编码16的生成算法26。因此用这种简单的、不可逆的编码方法也可以达到汽车接收机20或其他有保护价值的装置的防盗。
根据待保护装置的保护需要,可以在按照附图1和2的耗费的不对称编码方法或按照附图3和4的简单的假不对称编码方法之间选择。
图5示出了一个按照第二个实施例被编码装置的起动,在此,编码16和检验算法28被输入编码方法10’中,这种方法由此产生检验信息12’。在此,检验算法28与检验信息12都处于汽车接收机20内。在比较器22中检验信息12’与汽车接收机内的检验信息12相比较,并且在比较结果一致时允许汽车接收机的不受限制的使用24。
Claims (7)
1、阻止未被授权地使用一个装置(20)、特别是一个汽车接收机的方法,其中,为了激活该装置(20),必须直接在该装置(20)上输入与该装置相配的一个编码(16),其特征是,由该编码(16)借助于一个不可逆的编码方法(10)形成一个检验信息(12’),并且为了释放该装置,将该检验信息(12’)与一个在该装置(20)内存储的检验信息(12)相比较。
2、按照权利要求1所述的方法,其特征是,作为所述编码方法使用一种不对称的编码方法。
3、按照权利要求2所述的方法,其特征是,使用里韦斯特—沙米尔—阿德勒曼(Rivest-Shamir-Adlemann)方法。
4、按照上述权利要求之一所述的方法,其特征是,该编码(16)能够借助于在对于每一装置的一个可靠地点上的一个秘密的译码(14)被确定。
5、按照权利要求1至3之一所述的方法,其特征是,在装置(20)内存放了一个用于该编码(16)和在装置(20)内存储的检验信息(12)的公开的译码(18)。
6、按照权利要求1或2所述的方法,其特征是,在装置(20)内存放了一个用于该编码(16)和在装置(20)内存储的检验信息(12)的检验算法(28)。
7、按照权利要求1所述的方法,其特征是,该装置(20)的一个序列号或序列号的一部分被用作在装置(20)内存储的检验信息(12)。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19715049.7 | 1997-04-11 | ||
DE19715049A DE19715049A1 (de) | 1997-04-11 | 1997-04-11 | Verfahren zur Erlangung eines Diebstahlsschutzes für Geräte, insbesondere für Autoradios |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1252030A CN1252030A (zh) | 2000-05-03 |
CN1086655C true CN1086655C (zh) | 2002-06-26 |
Family
ID=7826155
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN98804064A Expired - Lifetime CN1086655C (zh) | 1997-04-11 | 1998-04-08 | 用于装置、特别是汽车接收机的防盗方法 |
Country Status (13)
Country | Link |
---|---|
US (1) | US6992563B1 (zh) |
EP (1) | EP0973659B1 (zh) |
CN (1) | CN1086655C (zh) |
AU (1) | AU732908B2 (zh) |
CZ (1) | CZ296538B6 (zh) |
DE (2) | DE19715049A1 (zh) |
ES (1) | ES2189181T3 (zh) |
HU (1) | HU223640B1 (zh) |
PL (1) | PL189234B1 (zh) |
RU (1) | RU2189912C2 (zh) |
SK (1) | SK285702B6 (zh) |
TW (1) | TW484114B (zh) |
WO (1) | WO1998046455A2 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110346623A (zh) * | 2019-08-14 | 2019-10-18 | 广东电网有限责任公司 | 一种锁定窃电用户的系统、方法及设备 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6356841B1 (en) | 1999-12-29 | 2002-03-12 | Bellsouth Intellectual Property Corporation | G.P.S. management system |
FR2901081B1 (fr) * | 2006-05-11 | 2008-07-11 | Sagem Monetel Soc Par Actions | Procede d'activation d'un terminal |
US8943330B2 (en) | 2011-05-10 | 2015-01-27 | Qualcomm Incorporated | Apparatus and method for hardware-based secure data processing using buffer memory address range rules |
US8849519B2 (en) * | 2011-08-09 | 2014-09-30 | Ford Global Technologies, Llc | Method and apparatus for vehicle hardware theft prevention |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4759062A (en) * | 1986-10-06 | 1988-07-19 | International Electronics Technology Corporation | Arrangement for and method of protecting private security codes from unauthorized disclosure |
US5594793A (en) * | 1993-10-28 | 1997-01-14 | Sgs-Thomson Microelectronics, S.A. | Integrated circuit containing a protected memory and secured system using said integrated circuit |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3641230C1 (de) * | 1986-12-02 | 1988-04-28 | Megamos F & G Sicherheit | Verfahren und Schaltungsanordnung zur Diebstahlsicherung von Geraeten,insbesondere Autoradiogeraeten |
US5091939A (en) * | 1990-06-22 | 1992-02-25 | Tandy Corporation | Method and apparatus for password protection of a computer |
DE4242186C2 (de) | 1992-12-15 | 2003-04-17 | Grundig Ag | Diebstahlsicherung eines elektronischen Gerätes |
US5394471A (en) * | 1993-09-17 | 1995-02-28 | Bell Atlantic Network Services, Inc. | Method and system for proactive password validation |
DE4411451C1 (de) * | 1994-04-01 | 1995-05-04 | Daimler Benz Ag | Fahrzeugsicherungseinrichtung mit elektronischer Nutzungsberechtigungscodierung |
JP3319230B2 (ja) * | 1994-08-05 | 2002-08-26 | 株式会社デンソー | 遠隔操作装置 |
DE69533972T2 (de) * | 1994-11-17 | 2005-06-30 | Matsushita Electric Industrial Co., Ltd., Kadoma | Optische Platte, Verfahren zur Herstellung und Verfahren zum Lesen einer solchen Platte |
GB2306029A (en) | 1995-10-06 | 1997-04-23 | Ford Motor Co | Audio device security system |
DE19631591A1 (de) * | 1996-08-05 | 1998-02-12 | Bosch Gmbh Robert | Elektronisches Zusatzgerät für ein Automobil, insbesondere Auto-Rundfunkgerät, mit einer Schlüsselkarte |
-
1996
- 1996-04-08 US US09/402,907 patent/US6992563B1/en not_active Expired - Lifetime
-
1997
- 1997-04-11 DE DE19715049A patent/DE19715049A1/de not_active Withdrawn
-
1998
- 1998-04-08 WO PCT/DE1998/000984 patent/WO1998046455A2/de active IP Right Grant
- 1998-04-08 ES ES98928156T patent/ES2189181T3/es not_active Expired - Lifetime
- 1998-04-08 SK SK1363-99A patent/SK285702B6/sk not_active IP Right Cessation
- 1998-04-08 CZ CZ0299099A patent/CZ296538B6/cs not_active IP Right Cessation
- 1998-04-08 AU AU80102/98A patent/AU732908B2/en not_active Ceased
- 1998-04-08 HU HU0002847A patent/HU223640B1/hu not_active IP Right Cessation
- 1998-04-08 PL PL98336069A patent/PL189234B1/pl unknown
- 1998-04-08 RU RU99123427/28A patent/RU2189912C2/ru active
- 1998-04-08 CN CN98804064A patent/CN1086655C/zh not_active Expired - Lifetime
- 1998-04-08 EP EP98928156A patent/EP0973659B1/de not_active Expired - Lifetime
- 1998-04-08 DE DE59806447T patent/DE59806447D1/de not_active Expired - Lifetime
- 1998-04-10 TW TW087105416A patent/TW484114B/zh not_active IP Right Cessation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4759062A (en) * | 1986-10-06 | 1988-07-19 | International Electronics Technology Corporation | Arrangement for and method of protecting private security codes from unauthorized disclosure |
US5594793A (en) * | 1993-10-28 | 1997-01-14 | Sgs-Thomson Microelectronics, S.A. | Integrated circuit containing a protected memory and secured system using said integrated circuit |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110346623A (zh) * | 2019-08-14 | 2019-10-18 | 广东电网有限责任公司 | 一种锁定窃电用户的系统、方法及设备 |
Also Published As
Publication number | Publication date |
---|---|
TW484114B (en) | 2002-04-21 |
EP0973659B1 (de) | 2002-11-27 |
PL189234B1 (pl) | 2005-07-29 |
DE19715049A1 (de) | 1998-10-15 |
WO1998046455A3 (de) | 1998-12-17 |
EP0973659A2 (de) | 2000-01-26 |
ES2189181T3 (es) | 2003-07-01 |
WO1998046455A2 (de) | 1998-10-22 |
US6992563B1 (en) | 2006-01-31 |
AU732908B2 (en) | 2001-05-03 |
CN1252030A (zh) | 2000-05-03 |
CZ299099A3 (cs) | 2000-02-16 |
PL336069A1 (en) | 2000-06-05 |
SK136399A3 (en) | 2000-05-16 |
RU2189912C2 (ru) | 2002-09-27 |
CZ296538B6 (cs) | 2006-04-12 |
HUP0002847A2 (hu) | 2000-12-28 |
DE59806447D1 (de) | 2003-01-09 |
AU8010298A (en) | 1998-11-11 |
SK285702B6 (sk) | 2007-06-07 |
HUP0002847A3 (en) | 2002-11-28 |
HU223640B1 (hu) | 2004-10-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6737955B2 (en) | Method and system for passive entry and passive anti-theft | |
US5867802A (en) | Biometrically secured control system for preventing the unauthorized use of a vehicle | |
US6957338B1 (en) | Individual authentication system performing authentication in multiple steps | |
RU2041498C1 (ru) | Способ защиты от неправомерного использования микропроцессорных карт и устройство для его осуществления | |
US6020827A (en) | Authentication device with key number memory | |
US20020072349A1 (en) | Method and apparatus for securing communications | |
GB2288049A (en) | A vehicle security device with electronic use-authorization coding | |
US5982894A (en) | System including separable protected components and associated methods | |
CN1245311A (zh) | 用于保护秘密信息免遭分析破解的系统和程序 | |
WO1994028658A1 (en) | Method for authenticating objects identified by images or other identifying information | |
CA2190437A1 (en) | Method and device for protecting stored data | |
CN1263324A (zh) | 指纹辨识键盘装置及其辨识方法 | |
CN101398872A (zh) | 保护口令免受未授权访问的方法和数据处理单元 | |
CN1086655C (zh) | 用于装置、特别是汽车接收机的防盗方法 | |
AU2002236323B2 (en) | User indentification with an improved password input method | |
TWI534711B (zh) | 智慧卡及其存取方法 | |
WO2003079168A3 (en) | System and method for preventing unauthorized operation of identification and financial document production equipment | |
US20070083916A1 (en) | System for authentication of electronic devices | |
WO1999065175A1 (en) | Method for generating, storing, and verifying a binding between an authorized user and a token | |
CN1364282A (zh) | 存储和检索个人识别号代码的方法和设备 | |
US20060059374A1 (en) | Method for securing computer systems by software containment | |
WO2008032351A1 (en) | Counterfeit card detecting system, authentication judgment information writing device, and counterfeit card detecting device | |
Sasi et al. | Vehicle Anti-theft System Based on an Embedded Platform | |
US20030107468A1 (en) | Entry security device | |
RU99123427A (ru) | Способ обеспечения защиты от кражи аппаратуры и оборудования, прежде всего автомобильных радиоприемников |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: TONGTENG GLOBAL PROPERTIES CO., LTD. Free format text: FORMER OWNER: ROBERT BOSCH GMBH Effective date: 20141229 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20141229 Address after: Amsterdam Patentee after: Tong Teng global asset Limited Address before: Stuttgart, Germany Patentee before: Robert Bosch GmbH |
|
CX01 | Expiry of patent term |
Granted publication date: 20020626 |
|
CX01 | Expiry of patent term |