EP1530785A1 - APPAREIL ELECTRIQUE SECURISE CONTRE LE VOL, SYSTEME ANTIVOL COMPORTANT UN TEL APPAREIL ET PROCEDE D’APPARIEMENT D’APPAREILS ELECTRIQUES - Google Patents

APPAREIL ELECTRIQUE SECURISE CONTRE LE VOL, SYSTEME ANTIVOL COMPORTANT UN TEL APPAREIL ET PROCEDE D’APPARIEMENT D’APPAREILS ELECTRIQUES

Info

Publication number
EP1530785A1
EP1530785A1 EP03750724A EP03750724A EP1530785A1 EP 1530785 A1 EP1530785 A1 EP 1530785A1 EP 03750724 A EP03750724 A EP 03750724A EP 03750724 A EP03750724 A EP 03750724A EP 1530785 A1 EP1530785 A1 EP 1530785A1
Authority
EP
European Patent Office
Prior art keywords
state
network
guardian
electrical
guard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP03750724A
Other languages
German (de)
English (en)
French (fr)
Inventor
Sylvain Chevreau
Eric Diehl
Teddy Furon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
THOMSON LICENSING
Original Assignee
Thomson Licensing SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing SAS filed Critical Thomson Licensing SAS
Publication of EP1530785A1 publication Critical patent/EP1530785A1/fr
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • G08B13/1418Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • Theft-proof electrical appliance. anti-theft system comprising such a device and method of pairing electrical devices
  • the present invention relates to an electrical device intended to be connected to a network comprising at least one guard device. It also relates to an anti-theft system comprising a network to which a security device is connected. Finally, it relates to a method of pairing a first and a second device, the first device being called a guard device.
  • an electrical appliance provided with a protection device can operate only if it is connected to a guard appliance authorizing its operation.
  • the guardian device manages, in an associated database, a list of electrical devices identified by a unique identification code and includes means for authorizing the operation of the devices registered on the list.
  • the guardian device is fixed, hidden, even distant, so that possible thieves can steal only the electrical devices connected to this guardian device. Consequently, thieves do not have the guardian device authorizing the operation of these stolen devices and cannot use or resell these devices.
  • the disadvantage of such a system is that the authorization to operate the electrical device is managed by the guardian device.
  • the guardian device also manages the authorization to operate all the other devices on the list. This management can become cumbersome and difficult in the case where many electrical devices are connected to the guardian device.
  • the invention aims to remedy this drawback by providing an electrical device which can be protected against theft without requiring the management of a list of electrical devices by the guardian device with which it is associated.
  • the invention relates to an electrical device intended to be connected to a network comprising at least one guardian device.
  • the device electric includes storage means; configuration means for authorizing its operation in the presence of the guardian device, means for identifying at least one guardian device when the electrical device is connected to any network comprising such a guardian device, and means for inhibition of the electrical device if the identified guard device does not correspond to the guard device for which it has been configured or if said any network does not include a guard device.
  • the means for configuring the electrical device are suitable for recording a public identifier of the guardian device for which the electrical device is configured, in the storage means of the latter.
  • the means of identification include means for interrogating any guardian device in order to know its public identifier; the identification means include means for authenticating the guardian device for which it has been configured;
  • the authentication means implement a challenge process with zero knowledge transfer
  • the electrical appliance is in a state chosen from one of the elements of the assembly consisting of a blank state, a state configured to operate in the presence of at least one guardian appliance and a blocked state, the configured state being obtained after activation of the configuration means and the blocked state being obtained after activation of the inhibition means;
  • the electrical appliance works only when it is in the configured state.
  • the invention also relates to an anti-theft system comprising at least one network and at least one guard device connected to the network and comprising a public identifier, characterized in that it comprises at least one electrical device as described above.
  • An anti-theft system according to the invention may also include one or more of the following characteristics:
  • the guardian device includes secure means for storing a secret identifier from which the public identifier is generated;
  • the network is chosen from one of the elements of the set consisting of an electrical network, a digital transmission network and a telecommunications network.
  • the invention finally relates to a method of pairing a first and a second device, the second device being intended to be connected to a network to which the first device called "guardian device" is connected.
  • the method includes a step of configuring the second device to authorize its operation only in the presence of the guardian device.
  • This step of configuring the second device comprises recording, in storage means of the second device, a public identifier of the guardian device.
  • the second device is in a state chosen from one of the elements of the set consisting of a blank state, a state configured to operate in the presence of at least one guardian device and a blocked state, and in that the configuration step comprises a change of state of the second device, from the blank state to the configured state;
  • the method includes a step of inhibiting the second device when the latter is connected to a guardian device for which it has not been configured, this inhibiting step comprising a change of state of the second device, of the configured state in blocked state;
  • the method includes a step of identifying a guardian device connected to a network, when the second device is connected to this network;
  • the identification step is triggered by one of the triggering events of the set of events consisting of a connection of the second device to the network, a start-up of the second device and a regular or random identification program ;
  • the identification step includes the authentication of the guardian apparatus;
  • the guardian device comprising secure means for storing a secret identifier from which a public identifier is generated, the identification comprises a step of interrogating the guardian device to know its public identifier and the authentication comprises a sequence of steps during which the guardian device proves to the electrical device that it knows the secret identifier using the challenge process with zero knowledge transfer;
  • the identification step concludes that the guardian device for which the second device has been configured is present on the network while the second device is in the blocked state, it is followed by a change of state of the second device from the blocked state to the configured state.
  • FIG. 1 schematically shows an anti-theft system according to the invention
  • FIG. 2 shows the functional diagram of a process for changing states of an electrical device according to the invention.
  • FIG. 3 shows the functional diagram of a method of matching an electrical appliance to a guard appliance according to the invention.
  • FIG. 1 shows a local area network 10 such as an electrical energy distribution network, a digital transmission network or even a telecommunications network. It can be a wired or wireless network. To this local network 10 are connected a guard device 12 and electrical devices 14.
  • a guard device 12 To this local network 10 are connected a guard device 12 and electrical devices 14.
  • the guardian 12 can be hidden or attached to a support so that it can hardly be stolen. It includes calculation means 16 such as a secure processor and a network interface 18.
  • the guardian device 12 stores in memory (not shown in the figure) a very large secret number S and a number V, hereinafter called identifier audience of the guardian apparatus 12.
  • S and V verify the following equation: where n is an integer whose factorization is secret, for example by being the product of two very large prime numbers kept secret.
  • the guardian apparatus 12 also stores a signature SigV of the public identifier V calculated by a control authority, using a public key K.
  • V and n are public values, that is to say known to the guardian device 12, but which can also be communicated to the electrical devices 14. While the value n is stored in the electrical devices 14 during construction, the value V is transmitted to the electrical devices 14 during their configuration.
  • the electrical devices 14 are for example household appliances, audiovisual, computer or any other device which it is desired to protect against theft and suitable for being connected to the network 10.
  • Each electrical device 14 includes storage means 20, such as a non-volatile memory, calculation means 22 such as a processor and a network interface 24 similar to the network interface 18 of the guardian device 12.
  • the calculation means 22 include means 26 for configuring each electrical device 14, means 28 for identifying guardian devices and means 30 for inhibiting each electrical device 14. These means 26, 28 and 30 are advantageously software means conventionally programmed in the processor 22 of each electrical appliance 14.
  • Each electrical device 14 stores in its memory 20 the number n and the public key K from the control authority having calculated the signature SigV. This key is used to verify the Sig V signature based on the value of V.
  • the invention aims to restrict the use of each device 14 to the local network 10, that is to say that each electrical device 14 can only operate if it is connected to the guard device.
  • the memory 20 of each device 14 stores only the public identifier V of the guardian device 12, in addition to n and K.
  • each electrical device 14 can be restricted to several local networks each comprising a guard device.
  • Each electrical device 14 can therefore be associated with several guardian devices.
  • the memory 20 of each device can be restricted to several local networks each comprising a guard device.
  • the electrical device 14 can be in three fundamental states, represented in FIG. 2: a blank state 32, a configured state 34 and a blocked state 36.
  • the blank state 32 corresponds to a state in which the memory 20 of the electrical appliance 14 does not store any public identifier of the guardian appliance.
  • the configured state 34 corresponds to a state in which the electrical device 14 stores in its memory 20 the public identifier V of the guardian device 12. The electrical device 14 can then operate only in the presence of the guardian device 12 , that is to say when the device 14 is connected to a network to which the guard device 12 is also connected.
  • the configured state corresponds to a state in which the memory 20 of each device 14 stores public identifiers V of several predetermined guard devices.
  • Blocked state 36 corresponds to a state in which the electrical appliance, although having been configured, cannot operate because it is connected to a guardian appliance for which it has not been configured, that is to say of which he does not know the public identifier V, or else he is not connected to any guardian device.
  • the state of the electrical device 14 will be defined by a variable e, stored in its memory 20, to which the value 0 is given if the electrical device 14 is in the blank state 32, the value 1 if it is in the configured state 34 and the value 2 if it is in the blocked state 36.
  • the configuration step 38 is automatic, for example when the electrical device 14 is connected to the network 10, or when the electrical device 14 is switched on, for the first time .
  • the configuration step 38 can be triggered manually by the user, for example by entering a secret code, using a physical or electronic key, or by authenticating the user. by means of biometrics such as fingerprint or voice recognition.
  • the unlocking step 42 can be triggered manually, for example when entering a password, when using a physical or electronic key or when authenticating the user by means of biometrics.
  • This pairing method comprises a first initialization step 48 consisting of a triggering event such as the switching on of the electrical device 14, its connection to a network, or a periodic clock signal. In all cases, it is assumed that the electrical appliance is connected to a network to which the guard appliance 46 is also connected.
  • the electrical device 14 sends a command requesting the guard device 46 present on the network to identify itself.
  • the guardian appliance 46 transmits to the electrical appliance 14 its public identifier V as well as its signature SigV.
  • a test 54 is performed by the electrical device 14. This test consists in verifying the signature SigV using the public identifier V sent by the guardian device 46 and the public key K stored in the electrical appliance 14.
  • test 54 If the result of the test 54 is negative, that is to say if the signature SigV does not correspond to the transmitted identifier V, the method is carried over to the initialization step 48. If the result of the test 54 is positive, a test 56 is performed on the variable e stored in the memory 20 of the electrical device 14.
  • step 58 is followed by the configuration step 38 described above. During this step, the variable e takes the value 1 and the electrical appliance 14 is then in the configured state 34. The method is then carried over to the initialization step 48. If in step 56 the variable e is equal to 1 or 2, we pass to a test step 60 during which the electrical appliance 14 compares the public identifier V sent by the guard appliance 46 to the public identifier Vo stored in its memory 20. If the result of test 60 is negative, the electrical device 14 performs a test 61 on the variable e.
  • step 62 during which the guard apparatus 46 triggers a challenge process with transfer of zero knowledge, by first generating a random number r.
  • This method is the subject of steps 62 to 86.
  • step 64 during which the guard apparatus 46 chooses a pledge G which is a number taken randomly from the two numbers r 2 and rS where S is the secret number of the guardian appliance 46. It transmits this pledge G to the electric appliance 14 without informing it of its choice.
  • step 66 the electrical device 14 randomly assigns a value A or B to a challenge C. It then sends this challenge C to the guardian device 46.
  • the guardian apparatus 46 performs a test 68 on the challenge C. If the test 68 reveals that the challenge C is worth A, we go to a step
  • the electrical device 14 performs a test 72 for verifying the value of the pledge G. It is known that, following the step 64, the pledge G is equal to r 2 or rS.
  • step 76 for monitoring triggering events.
  • a triggering event forming part of a set of predetermined triggering events.
  • test 72 If the test 72 is negative, that is to say if G ⁇ A and G 2 ⁇ AVmo ⁇ , we pass to a step 78 during which we give the value 2 to e, that is to say that the electrical appliance is put in blocked state 36.
  • step 78 we go to step 76 for monitoring triggering events.
  • test 68 reveals that the challenge C is worth B, we pass to a step 80 during which the guardian apparatus 46 assigns to B the value r.S and sends B to the electrical apparatus 14.
  • the electrical device 14 performs a test 82 for verifying the value of the pledge G.
  • the pledge G is equal to r 2 or rS.
  • step 84 we go to step 76 for monitoring triggering events. If the test 82 is negative, that is to say if G ⁇ B and B 2 ⁇ G.Vmodn, we pass to a step 86 during which we give the value 2 to e, that is to say that the apparatus electric is put in the blocked state 36.
  • step 78 we go to step 76 for monitoring triggering events.
  • the invention allows each electrical appliance to operate only in the presence of the appliance guard for which it has been configured, without the guard having to manage a list of authorized devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)
  • Telephonic Communication Services (AREA)
EP03750724A 2002-08-21 2003-08-21 APPAREIL ELECTRIQUE SECURISE CONTRE LE VOL, SYSTEME ANTIVOL COMPORTANT UN TEL APPAREIL ET PROCEDE D’APPARIEMENT D’APPAREILS ELECTRIQUES Ceased EP1530785A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR0210430 2002-08-21
FR0210430A FR2843819B1 (fr) 2002-08-21 2002-08-21 Appareil electrique securise contre le vol, systeme antivol comportant un tel appareil et procede d'appariement d'appareils electriques
PCT/EP2003/050386 WO2004019296A1 (fr) 2002-08-21 2003-08-21 Appareil electrique securise contre le vol, systeme antivol comportant un tel appareil et procede d’appariement d’appareils electriques

Publications (1)

Publication Number Publication Date
EP1530785A1 true EP1530785A1 (fr) 2005-05-18

Family

ID=31198236

Family Applications (1)

Application Number Title Priority Date Filing Date
EP03750724A Ceased EP1530785A1 (fr) 2002-08-21 2003-08-21 APPAREIL ELECTRIQUE SECURISE CONTRE LE VOL, SYSTEME ANTIVOL COMPORTANT UN TEL APPAREIL ET PROCEDE D’APPARIEMENT D’APPAREILS ELECTRIQUES

Country Status (9)

Country Link
US (1) US7832002B2 (zh)
EP (1) EP1530785A1 (zh)
JP (1) JP4035538B2 (zh)
KR (1) KR101070978B1 (zh)
CN (1) CN100350437C (zh)
AU (1) AU2003268947A1 (zh)
FR (1) FR2843819B1 (zh)
MX (1) MXPA05002038A (zh)
WO (1) WO2004019296A1 (zh)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1626579A1 (en) * 2004-08-11 2006-02-15 Thomson Licensing Device pairing
EP1628481B1 (en) * 2004-08-11 2010-09-01 Thomson Licensing Device pairing
US7702895B2 (en) * 2005-04-12 2010-04-20 Hewlett-Packard Development Company, L.P. Method for configurating a computing system
US9154499B2 (en) * 2007-05-29 2015-10-06 Absolute Software Corporation Offline data delete with false trigger protection
EP2535833A1 (fr) * 2011-06-15 2012-12-19 Gemalto SA Procédé de sécurisation d'un appareil électrique
WO2013095583A1 (en) 2011-12-22 2013-06-27 Intel Corporation Always-available embedded theft reaction subsystem
EP2795508A4 (en) 2011-12-22 2015-06-24 Intel Corp STILL AVAILABLE EMBEDDED THEFT REACTION SYSTEM
US9558378B2 (en) 2011-12-22 2017-01-31 Intel Corporation Always-available embedded theft reaction subsystem
EP2795518A4 (en) 2011-12-22 2015-09-02 Intel Corp INCORPORATED FLIGHT REACTION SUBSYSTEM ALWAYS AVAILABLE
US9092957B2 (en) 2011-12-22 2015-07-28 Intel Corporation Always-available embedded theft reaction subsystem
US9520048B2 (en) 2011-12-22 2016-12-13 Intel Corporation Always-available embedded theft reaction subsystem
WO2013095594A1 (en) 2011-12-22 2013-06-27 Intel Corporation Always-available embedded theft reaction subsystem
US9208359B2 (en) 2011-12-22 2015-12-08 Intel Corporation Always-available embedded theft reaction subsystem
WO2013095585A1 (en) 2011-12-22 2013-06-27 Intel Corporation Always-available embedded theft reaction subsystem
EP2795517A4 (en) 2011-12-22 2015-09-02 Intel Corp STILL AVAILABLE EMBEDDED THEFT REACTION SYSTEM
EP2795516A4 (en) 2011-12-22 2015-09-02 Intel Corp INCORPORATED FLIGHT REACTION SUBSYSTEM ALWAYS AVAILABLE
US8938796B2 (en) 2012-09-20 2015-01-20 Paul Case, SR. Case secure computer architecture
KR101534974B1 (ko) 2013-12-19 2015-07-08 현대자동차주식회사 다중 마이크로 코어 감시 장치 및 방법
US10057261B2 (en) 2015-11-09 2018-08-21 Fotonation Limited Method for configuring access for a limited user interface (UI) device
DE102015223152A1 (de) * 2015-11-24 2017-05-24 Siemens Aktiengesellschaft Schutzvorrichtung, Sicherheitssystem und Schutzverfahren
US11849043B2 (en) 2020-11-13 2023-12-19 Sony Group Corporation Zero-knowledge authentication based on device information

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5146472A (en) * 1990-03-28 1992-09-08 General Datacomm, Inc. Method for imbedding information in modem handshake procedure and modems incorporating the same
US5325499A (en) * 1990-09-28 1994-06-28 Tandon Corporation Computer system including a write protection circuit for preventing illegal write operations and a write poster with improved memory
SE9200066L (sv) * 1992-01-10 1993-07-11 Easy Shopping Ab Anordning vid kodskyddade elektroniska apparater
US6175308B1 (en) * 1993-12-16 2001-01-16 Actall Corporation Personal duress security system
FR2715492B1 (fr) * 1994-01-27 1996-09-20 Jean Noel Bruere Dispositif antivol électronique à codage pour appareils raccordés à un réseau électrique.
EP0740037A1 (en) 1995-04-28 1996-10-30 Hewlett-Packard Company Security device
EP0912919B1 (en) 1996-07-25 2003-06-11 Peter David Collins Immobilisation protection system for electronic components and method therefor
DE69720971T2 (de) * 1997-05-28 2003-10-30 Siemens Ag Computersystem und Verfahren zum Schutz von Software
DE69724235T2 (de) * 1997-05-28 2004-02-26 Siemens Ag Computersystem und Verfahren zum Schutz von Software
US6032257A (en) * 1997-08-29 2000-02-29 Compaq Computer Corporation Hardware theft-protection architecture
US6249868B1 (en) * 1998-03-25 2001-06-19 Softvault Systems, Inc. Method and system for embedded, automated, component-level control of computer systems and other complex systems
AU1401800A (en) * 1998-12-04 2000-06-26 Norman Frederick Parkin Disabling an electrical device
FR2808149B1 (fr) * 2000-04-19 2003-01-31 Electricite De France Procede et dispositif de controle d'habilitation d'un appareil electrique connecte a un reseau
US20020108058A1 (en) * 2001-02-08 2002-08-08 Sony Corporation And Sony Electronics Inc. Anti-theft system for computers and other electronic devices
US6697719B2 (en) * 2001-07-19 2004-02-24 Code Alarm, Inc. Programmable electronic device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2004019296A1 *

Also Published As

Publication number Publication date
CN100350437C (zh) 2007-11-21
AU2003268947A1 (en) 2004-03-11
FR2843819B1 (fr) 2006-11-10
KR101070978B1 (ko) 2011-10-06
MXPA05002038A (es) 2005-06-03
JP4035538B2 (ja) 2008-01-23
FR2843819A1 (fr) 2004-02-27
KR20050058376A (ko) 2005-06-16
US7832002B2 (en) 2010-11-09
JP2005535987A (ja) 2005-11-24
US20060103531A1 (en) 2006-05-18
WO2004019296A1 (fr) 2004-03-04
CN1675658A (zh) 2005-09-28

Similar Documents

Publication Publication Date Title
EP1530785A1 (fr) APPAREIL ELECTRIQUE SECURISE CONTRE LE VOL, SYSTEME ANTIVOL COMPORTANT UN TEL APPAREIL ET PROCEDE D’APPARIEMENT D’APPAREILS ELECTRIQUES
EP1964307B1 (fr) Procédé pour la réalisation d'un compteur sécurisé sur un système informatique embarqué disposant d'une carte a puce.
EP1570648B1 (fr) Méthode de sécurisation des mises à jour de logiciels
EP2494489B1 (fr) Procédé et agent client pour contrôler l'utilisation d'un contenu protégé
EP0547975A1 (fr) Procédé d'authentification, par un milieu extérieur, d'un objet portatif connecté à ce milieu par l'intermédiaire d'une ligne de transmission, et système pour la mise en oeuvre
EP2097849B1 (fr) Dispositif electronique portable et procede de securisation d'un tel dispositif
EP1549011A1 (fr) Procédé et système de communication entre un terminal et au moins un équipment communicant
FR2718091A1 (fr) Dispositif de sûreté contre le vol appliquant un codage électronique d'autorisation d'utilisation pour véhicule.
EP1055203B1 (fr) Protocole de controle d'acces entre une cle et une serrure electronique
EP1726121A1 (fr) Procede d'authentification anonyme
FR2829855A1 (fr) Identification securisee par donnees biometriques
FR2774960A1 (fr) Systeme antivol pour vehicule automobile et procede d'initialisation de ce systeme antivol
EP1494460A1 (fr) Procédé et dispositif d'authentification de données numériques par module d'extension d'authentification
WO1998013984A1 (fr) Procede et systeme pour securiser les prestations de service diffusees sur un reseau informatique du type internet
EP3871122B1 (fr) Procédé et système d'authentification d'un utilisateur par rapport à une session de conduite d'un véhicule automobile
WO2012093215A1 (fr) Dispositif et procede de tracage
WO2004084525A2 (fr) Procede de protection d’un terminal de telecommunication de type telephone mobile
EP0566512A1 (fr) Procédé de contrôle d'accès du type autorisant l'accès à une fonction d'exploitation d'un module d'exploitation à l'aide d'un mot de contrôle
WO2002081853A1 (fr) Dispositif d'acces pilote et installation correspondante
EP2016700A1 (fr) Procede d'activation d'un terminal
EP2795526A1 (fr) Dispositif electronique pour le stockage de donnees confidentielles
EP1883034A2 (fr) Procédé de sécurisation pour appareil électronique utilisant une carte à puce
EP3564841A1 (fr) Authentification d'un circuit électronique
FR2878669A1 (fr) Procede pour installer un etat predefini d'un verrou d'immobilisattion d'un dispositif, dispositif de cryptage et dispositif de reconnaissance
FR2856497A1 (fr) Procede de determination d'un code d'utilisation, de verification d'un code de carte prepayee virtuelle et systeme correspondant

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20050118

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL LT LV MK

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: THOMSON LICENSING

DAX Request for extension of the european patent (deleted)
RBV Designated contracting states (corrected)

Designated state(s): DE ES FR GB IT

17Q First examination report despatched

Effective date: 20070813

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20091008

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: THOMSON LICENSING