EP2068289A1 - Verfahren zum Diebstahlschutz von Endgeräten und entsprechendes System, Endgerät und Softwareprogramm - Google Patents

Verfahren zum Diebstahlschutz von Endgeräten und entsprechendes System, Endgerät und Softwareprogramm Download PDF

Info

Publication number
EP2068289A1
EP2068289A1 EP08169918A EP08169918A EP2068289A1 EP 2068289 A1 EP2068289 A1 EP 2068289A1 EP 08169918 A EP08169918 A EP 08169918A EP 08169918 A EP08169918 A EP 08169918A EP 2068289 A1 EP2068289 A1 EP 2068289A1
Authority
EP
European Patent Office
Prior art keywords
terminal
terminals
park
detected
absence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP08169918A
Other languages
English (en)
French (fr)
Inventor
David Naccache
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ingenico Group SA
Original Assignee
Compagnie Industrielle et Financiere dIngenierie Ingenico SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Compagnie Industrielle et Financiere dIngenierie Ingenico SA filed Critical Compagnie Industrielle et Financiere dIngenierie Ingenico SA
Publication of EP2068289A1 publication Critical patent/EP2068289A1/de
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1427Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/24Coin-freed apparatus for hiring articles; Coin-freed facilities or services for parking meters
    • G07F17/248Housing construction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/207Surveillance aspects at ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/0036Checkout procedures
    • G07G1/0045Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader
    • G07G1/0081Checkout procedures with a code reader for reading of an identifying code of the article to be registered, e.g. barcode reader or radio-frequency identity [RFID] reader the reader being a portable scanner or data reader
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G3/00Alarm indicators, e.g. bells
    • G07G3/003Anti-theft control
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0227System arrangements with a plurality of child units

Definitions

  • the field of the invention is that of electronic payment terminals, and more specifically portable or mobile payment terminals deployed in groups, or within a park, on the same site.
  • the invention relates to the protection against theft of such terminals.
  • a disadvantage of these mobile terminals is to make them easily accessible and therefore exposed to theft.
  • the invention particularly aims to overcome these disadvantages of the prior art.
  • an objective of the invention is to quickly and simply detect the absence of a terminal within a terminal park.
  • the invention thus aims to provide a technique for protecting terminals against theft, by detecting their absence.
  • Yet another object of the invention is to provide such a technique which is simple to implement and inexpensive.
  • the invention is based on a new and inventive approach to protection against terminal theft, which uses the terminals themselves to detect the possible absence of one or more terminals of the same park, or for mutually control the presence of each of the terminals in the park.
  • the method according to the invention provides for the transmission of absence information, making it possible to implement the appropriate actions, for example a verification (by means of control human or by a video surveillance system ...) of the absence of a terminal, on the place of use of the park of terminals, or a direct call to a person in charge of the safety of the park of terminals ...
  • the latter apart from the processing of payment transactions conventionally carried out by such a terminal, are also responsible for monitoring the other terminals, in order to detect the possible absence.
  • the mutual detection step implemented for at least one of the terminals of the park, comprises sub-steps for controlling the presence of at least one other terminal, noted terminal to detect, and to issue an alert potential absence, to other terminals, if a terminal is detected absent.
  • a terminal is detected absent if it does not answer, or if it responds incorrectly, before a certain delay, to a first presence control request, issued by at least one terminal of the park.
  • This delay can be predetermined according to criteria such as the transmission time of the messages on the network, or the assumed activity rate of the terminals for the transaction processing.
  • said potential absence alert is broadcast to all terminals of said park, so that each of them implements a step of checking the absence of said terminal to be detected.
  • the method according to the invention provides a step of verifying the potential absence of the terminal to be detected, in order to limit erroneous and unverified absence detections.
  • a terminal can be detected absent while it was simply unavailable (for example busy with a transaction processing, or still being started ). In this case, it is important not to generate an absent terminal alert.
  • This potential absence alert is transmitted to each terminal of the park, on the one hand, so that the latter all implement a verification of the potential absence of the terminal to be detected and that all means are used to confirm or deny the absence of the latter, and on the other hand so that all the terminals of the park are informed of the possible absence of another terminal of the Park.
  • the method according to the invention makes it possible to confirm or invalidate a detection of potential absence of a terminal by requesting it again via a second presence control request. Again, a valid response from the terminal to be detected is expected, to control its presence, and to reverse its potential absence. In this case, an alarm cancellation information is issued so as not to continue the procedure implemented in case of theft of a terminal. On the other hand, in the event of no response, or invalid response of the interrogated terminal, the potential absence is confirmed by the transmission of confirmed absence information.
  • said mutual detection step comprises a decision step delivering a validated absence information of said terminal to be detected when no cancellation information has been received.
  • the terminals of the park considers that the terminal to be detected is not present in the park.
  • the case where only one cancellation information has been issued, or the case where several cancellation information and several confirmed absence information have been issued can be processed. in different ways. For example, it may be envisaged that this verification step is again implemented, or that the alert is canceled systematically if at least one alert cancellation information has been received.
  • the method comprises a step of transmitting said validated absence information from said terminal to be detected to at least one management entity of said terminals of said park.
  • the terminal park is managed by an entity, distinct or not from these terminals, for example a management server, this entity is informed only when the absence of a terminal of the park that it manages is confirmed and validated . The managing entity can then act accordingly.
  • an entity distinct or not from these terminals, for example a management server
  • said requests, said responses and / or said information comprise at least one identification information of said terminal to be detected.
  • the messages associated with the terminal to be detected can easily be identified by the terminals of the park, thanks to this identifying or identifying information. In this way, the status of each terminal can be easily monitored by each of the other terminals of the park.
  • the method comprises, prior to said mutual detection step, a step of associating at least one terminal to be detected at each of said terminals of said network.
  • a park terminal is responsible for controlling the presence of at least one other terminal of the park. For example, at the time of the installation of the park, or the commissioning of the terminals, or evenly during the operation of the park, the terminal management entity of the park associates a terminal with another terminal to control .
  • this association can be determined for all the mutual detection steps implemented by the terminals.
  • this combination can be random, and different with each implementation of the method according to the invention.
  • each terminal of the park is listening to other terminals, and is responsible for monitoring the presence of other terminals.
  • each of the terminals manages an attendance list to know the status of the other terminals of the park.
  • This presence list can include information identifying the other terminals of the park, information on messages received from the other terminals of the park, for example a timestamp of the last message received for each terminal, etc..
  • This attendance list can be updated according to the received messages, and thus make it possible to know the status of the other terminals, for example according to the time of the last message received compared to the current time at the time of placing updated list.
  • said step of transmitting a first presence control request is implemented based on an analysis of said presence list.
  • a terminal if a terminal has not received a message from another terminal of the park for a predetermined time, it can consider the latter as potentially absent from the park, and issue a first presence control request , in order to initiate the mutual detection step of the method according to the invention.
  • the method comprises a step of auto-detection of theft of one of said terminals of said network, called isolated terminal, when it receives no message from the other terminals of said park.
  • the method according to the invention not only allows the terminals of a park to detect the presence or absence of other terminals of the same park, but also allows a terminal to detect that it is itself absent from the park . Indeed, when a terminal manages a list of presence as described above, he may assume that he is absent from the park if he has not received any messages from any other terminal for some time. Similarly, when a terminal is responsible for monitoring one or more other terminals, if it receives no response to transmitted control requests, it can self-detect itself as being absent from the park.
  • said self-detection step comprises a step of protecting and / or deleting the data of said isolated terminal.
  • a terminal when it was absent from the park, and therefore isolated and potentially stolen, it implements actions of protection of its data, in order to make itself unusable. For example, it may make it impossible to access certain protected data, or more drastically delete all or part of its data.
  • said self-detection step comprises a step of transmitting an alarm message to all of said terminals of said park and / or a management entity of said park.
  • an isolated terminal can inform the other terminals of the park, or the management entity thereof, by issuing an alarm message. In this way, protection actions can then also be implemented by the management entity or one of the other terminals of the park.
  • the method according to the invention can also provide for increasing the transmission power of the terminal in the case of the transmission of such an alarm message. In fact, the isolated terminal can find itself far from the park and unable to send messages to the terminals of the park, if it does not increase its transmission power.
  • the method comprises a step of issuing a warning message by a faulty terminal, in order to avoid the generation of unnecessary alarms.
  • a terminal having knowledge of an internal failure can inform the other terminals of the park and / or the management entity park to avoid being detected as absent from the park for no wrong answer or answer to control requests.
  • this terminal is considered by the other terminals of the park and / or the management entity of the park as defective, and is no longer requested to control its presence.
  • the invention also relates to a protection system against the theft of electronic payment terminals deployed within a park composed of at least two electronic payment terminals organized in a network, comprising means for mutual detection of the presence of each of said terminals. said park and means for transmitting an absence information if at least one of said terminals is not detected.
  • Such a system is able to implement the method of protection against theft of terminals described above.
  • Another aspect of the invention relates to an electronic payment terminal intended to be deployed within a park composed of at least two electronic payment terminals organized in a network, comprising means for checking the presence of at least one other terminal of said park and means for transmitting an absence information if at least one of said terminals is not detected.
  • such a terminal includes means of auto-detection of theft when it receives no message from other terminals said park.
  • Such a terminal is particularly adapted to implement the method of protection against theft of terminals described above.
  • the invention relates to a computer program product downloadable from a communication network and / or recorded on a computer readable medium and / or executable by a processor, comprising program code instructions for the implementation of the method protection against the theft of terminals described above.
  • the general principle of the invention is based on the use of the electronic payment terminals themselves to detect the presence, and therefore the possible absence of other terminals of the same park. This mutual detection of presence is notably made possible by a dialogue between the terminals of the same park, organized in a network, for example managed by an entity called network manager, or park manager.
  • the other terminals of the same park are able to detect the absence of the stolen terminal or terminals, then allowing the implementation of appropriate actions in the case of theft of terminals (deactivation of stolen terminals, for example). These actions are initiated for example by the park manager when he is informed of the detected and confirmed absence of one or more of the terminals of the park.
  • all the terminals of the park 10 are listening to other terminals and are able to detect the absence of one or more terminals of the park.
  • each terminal is used to detect the presence of another terminal in the park.
  • This association between two terminals of the park that is to say between a terminal responsible for detecting the presence of another terminal and it, can be defined in several ways.
  • each terminal is assigned the presence control of another terminal of the restaurant. park, and this for all implementations of the mutual detection method according to the invention.
  • each of the four terminals is responsible for detecting the presence of another terminal of the park, so that all terminals are “monitored” and that the absence of one or more of the terminals can be detected .
  • the mutual presence detection of the four terminals of the network is performed in a random mode.
  • the manager of the terminal park 10 can randomly assign each terminal another terminal of the network whose presence it must detect.
  • each terminal receives from the park manager identification information of the terminal which it must detect the presence.
  • This random allocation can be renewed randomly also, or predetermined, so that a terminal of the network is not always in charge of detecting the presence of the same terminal.
  • the terminal T1 seeks to ensure the presence of the terminal T2. Since the terminal T1 is not busy processing a transaction, it can therefore implement the steps necessary to detect the presence of the terminal T2.
  • step 20 the steps of the mutual detection are the same.
  • the terminal T1 is listening to all the other terminals of the network, and, after detecting the possible absence of the terminal T2 (for example because it has not received a message from T2 since a certain duration), it implements the main steps of the method according to the invention.
  • the terminal T1 being loaded by the fleet manager of the presence monitoring of the terminal T2, the terminal T1 regularly implements the steps of the method according to the invention, in order to regularly check the presence of the terminal T2.
  • a first step 20 of mutual detection the following substeps are implemented.
  • the terminal T1 sends a first presence control request to the terminal T2 during a substep 200.
  • This first presence control request may contain an indication for identifying the sender of the request, here T1, so that the receiving terminal, here T2, can respond.
  • This indication may be useful in particular in the second network example ( figure 1b ). In the first For example, it is assumed that a response from T2 is sent to all the terminals of the park, so that they can be informed of the presence of T2.
  • This first request may also contain a recipient identification indication, here T2, so that it can verify that the request is intended for him.
  • the terminal T1 puts on hold 201 a response from the terminal T2 interrogated in the previous step.
  • the waiting time of the response is predetermined and may take into account, for example, the assumed use of the terminals. In fact, a terminal used on average at 80% of its time for the processing of transactions, will take longer to respond to a presence control request than a terminal used only at 50% of its time for the processing of transactions .
  • This waiting time can also be calculated as a function of the transmission time of the messages in the network.
  • the terminal T1 considers that the terminal T2 is present within the network, its request to check the presence of the terminal T2 having received a positive response.
  • the terminal T1 considers that the terminal T2 is potentially absent from the network, and issues a potential absence alert in a step 202, for a verification of the absence of T2.
  • each terminal of the network is asked to check if a terminal controlled as potentially absent at first is actually absent or not.
  • the terminal T2 did not have time to respond to the request, for example because it was busy processing a transaction. It is also possible that the terminal T2 has not received the request sent by the terminal T1, due to communication problems within the terminal network. It is still possible that T2's response was not correctly routed to T1. A check of the absence of the terminal T2 is therefore necessary, in order to alert the network manager only in the case of confirmed absence.
  • the method according to the invention thus comprises a step 203 of absence verification, described in more detail below in relation to the Figures 3a and 3b , to confirm or deny the absence of the terminal T2.
  • a decision step 204 is implemented, delivering a validated absence information from the terminal T2 if the absence of T2 is confirmed in the previous step 203.
  • This information of the validated absence is then transmitted, during a step 21, for example to the network manager.
  • This network manager may be an entity separate from the terminals of the park, or one of the terminals. In this case, it may be a terminal pre-identified as the network manager, or the terminal at the origin of the issuance of the potential absence alert, in our example the terminal T1.
  • the terminals of the network After having received from the terminal T1 a potential absence alert of the terminal T2, the terminals of the network therefore implement an absence check step, comprising a substep 300 of sending a second request of presence control. The terminals then go on standby 301 with a response of T2.
  • the waiting time is predetermined and depends on parameters such as the frequency of use of the terminal T2 for example, or the transmission time of the messages in the network.
  • the waiting time in this absence check step may be longer than the waiting time of the first detection step.
  • the terminals T1, T3 and T4 receive from the terminal T2 an invalid response, or do not receive a response before the end of the waiting period. They then consider that the absence of T2 terminal is confirmed and emit, in a step 302, confirmed absence information to other terminals of the park.
  • terminal park illustrated in figure 1a all the terminals being responsible for monitoring the presence of the other terminals of the park, they are all capable of delivering validated absence information, and then forwarding it to the park manager.
  • the terminal T1 since the terminal T1 is solely responsible for controlling the presence of the terminal T2, it is it that delivers a validated absence information from the terminal T2, if it receives from the other terminals of the park confirmed absence information. According to the variant embodiments, it then transmits this validated absence information to the park manager, or implements itself the appropriate actions when the absence of a terminal is detected.
  • the figure 3b illustrates the case where the terminal T2 is present in the terminal park, although it did not respond to the first presence control request issued during the mutual detection step (200). For example, it was busy processing a transaction, or it responded to this request but its response was not correctly transmitted to other network terminals ...
  • the terminal T2 therefore responds validly, and its response is correctly transmitted to the terminals T1, T3 and T4. They then emit, during a step 303, an alarm canceling information, reversing the potential absence of the terminal T2.
  • This information of cancellation of alert makes it possible to decide that T2 is not absent from the park, and makes it possible not to alert the manager of the park.
  • all terminals are responsible for monitoring or controlling the presence of other terminals in the fleet.
  • each terminal manages a list of presence 50, as illustrated in FIG. figure 5 , allowing him to know the status of each terminal of the park.
  • the figure 4 illustrates the main steps implemented by each terminal of the network, prior to the triggering of the mutual detection step described above.
  • each terminal of the park listens for all the messages sent on the network and updates, in a step 41, its presence list, according to the messages received.
  • This update of the attendance list is also performed following a verification of the timestamp of the last message received by a terminal.
  • each terminal checks whether the last message received by the other terminals is "recent", or if the difference between the current time and the time of the last received message does not exceed a threshold, in which case a check of the presence of the terminal in question would be necessary.
  • a first presence control request is issued during a step 42, thereby initiating the mutual detection step as described in the preceding paragraphs.
  • Another aspect of the method of protection against the theft of terminals according to the invention relates to self-detection of theft by a terminal.
  • the principle of the method according to the invention is based on the use of the dialogue capabilities of the terminals between them to detect a terminal that does not respond to the solicitations of others. Consequently, a terminal present in the network and implementing the method according to the invention is at a moment in communication with one or more terminals of the network, or, in the case of the park illustrated in FIG. figure 1a , is listening to all messages sent by all terminals.
  • the auto-detection of theft is based on the observation, by a terminal, that it can not enter into communication with one or more terminals of the park.
  • a terminal realizing that it has received, for a certain time, no message from the other terminals, can consider that all other terminals are absent from the park, or more likely, it is he who is no longer connected to the network.
  • the method according to the invention therefore provides that a terminal that can not enter into communication with one or more other terminals of the same network, after a predetermined time, that is to say that receives no information in from at least one other terminal, considers itself isolated from this network, and potentially stolen.
  • This flight self-detecting step 60 can then be followed by a step 61 for protecting / deleting the data of the isolated terminal, consisting, for example, of erasing the secure data stored in memory, or of no longer authorizing access to these data, thus rendering the isolated terminal unusable.
  • the isolated terminal may also attempt to issue an alarm message, during a step 62, to the other terminal of the park, if necessary by increasing its transmission power so as to increase the chances that its message reaches other terminals in the park.
  • a stolen terminal will be quite quickly a significant distance from the terminal park to which it was attached, and its transmission power in normal operation may be insufficient in case of removal of the network.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Child & Adolescent Psychology (AREA)
  • Emergency Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Telephonic Communication Services (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
EP08169918A 2007-12-07 2008-11-25 Verfahren zum Diebstahlschutz von Endgeräten und entsprechendes System, Endgerät und Softwareprogramm Ceased EP2068289A1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0759656A FR2924846B1 (fr) 2007-12-07 2007-12-07 Procede de protection contre le vol de terminaux, systeme, terminal et produit programme d'ordinateur correspondants.

Publications (1)

Publication Number Publication Date
EP2068289A1 true EP2068289A1 (de) 2009-06-10

Family

ID=39591335

Family Applications (1)

Application Number Title Priority Date Filing Date
EP08169918A Ceased EP2068289A1 (de) 2007-12-07 2008-11-25 Verfahren zum Diebstahlschutz von Endgeräten und entsprechendes System, Endgerät und Softwareprogramm

Country Status (3)

Country Link
US (1) US8182549B2 (de)
EP (1) EP2068289A1 (de)
FR (1) FR2924846B1 (de)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016166101A1 (fr) 2015-04-14 2016-10-20 Ingenico Group Procédé de détection d'un terminal frauduleux dans un réseau, dispositif et programme correspondants

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170149967A1 (en) * 2015-11-25 2017-05-25 Microsoft Technology Licensing, Llc Managing Communication Events
US11200792B2 (en) * 2019-11-20 2021-12-14 Allan Mann Proximity separation alert system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000052658A1 (en) * 1999-03-01 2000-09-08 Commtrack Ltd. Security network and system
US20040167820A1 (en) * 2003-02-26 2004-08-26 Diana Melick Two part payment terminal
WO2004109613A1 (en) * 2003-06-05 2004-12-16 Philips Intellectual Property & Standards Gmbh Method of safeguarding electronic devices
WO2006079520A1 (de) * 2005-01-25 2006-08-03 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Verfahren zur überwachung einer gruppe von objekten sowie zugehörige anordnung

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7336784B2 (en) * 2002-12-20 2008-02-26 Brite Smart Corporation Multimedia decoder method and system with authentication and enhanced digital rights management (DRM) where each received signal is unique and where the missing signal is cached inside the storage memory of each receiver
EP2008483B1 (de) * 2006-04-19 2020-03-04 Orange Verfahren für den sicheren zugriff auf ein proximitätskommunikationsmodul in einem mobilen endgerät
JP4613969B2 (ja) * 2008-03-03 2011-01-19 ソニー株式会社 通信装置、及び通信方法
FR2941312B1 (fr) * 2009-01-19 2017-06-23 Cie Ind Et Financiere D'ingenierie Ingenico Procede de securisation d'interface entre un utilisateur et une application, systeme, terminal et produit programme d'ordinateur correspondants.

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000052658A1 (en) * 1999-03-01 2000-09-08 Commtrack Ltd. Security network and system
US20040167820A1 (en) * 2003-02-26 2004-08-26 Diana Melick Two part payment terminal
WO2004109613A1 (en) * 2003-06-05 2004-12-16 Philips Intellectual Property & Standards Gmbh Method of safeguarding electronic devices
WO2006079520A1 (de) * 2005-01-25 2006-08-03 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Verfahren zur überwachung einer gruppe von objekten sowie zugehörige anordnung

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016166101A1 (fr) 2015-04-14 2016-10-20 Ingenico Group Procédé de détection d'un terminal frauduleux dans un réseau, dispositif et programme correspondants
FR3035254A1 (fr) * 2015-04-14 2016-10-21 Cie Ind Et Financiere D'ingenierie Ingenico Procede de detection d'un terminal frauduleux dans un reseau, dispositif et programme correspondants

Also Published As

Publication number Publication date
FR2924846B1 (fr) 2010-02-19
FR2924846A1 (fr) 2009-06-12
US8182549B2 (en) 2012-05-22
US20090151010A1 (en) 2009-06-11

Similar Documents

Publication Publication Date Title
FR2940567A1 (fr) Procede de securisation de transactions, dispositif de transaction, serveur bancaire, terminal mobile, et produits programmes d'ordinateur correspondants
WO1998013972A1 (fr) Procede et systeme pour securiser les serveurs informatiques de jeux
EP2336990A1 (de) Geräuschlose Diebstahlsicherungseinrichtung für der Öffentichkeit vorgestellte Waren
EP2068289A1 (de) Verfahren zum Diebstahlschutz von Endgeräten und entsprechendes System, Endgerät und Softwareprogramm
WO1998013990A2 (fr) Procede et systeme pour securiser les prestations de service des operateurs de telecommunication
FR3040817A1 (fr) Procedes de desarmement automatique et d'utilisation d'un systeme d'alarme anti-intrusion, et systeme d'alarme associe
EP2091017A1 (de) Rückverfolgbarkeitsverfahren eines Endgeräts zur elektronischen Bezahlung für den Fall des Diebstahls dieses Geräts, sowie entsprechendes Computerprogramm und Endgerät
WO2012080412A1 (fr) Système de surveillance
EP3613029B1 (de) Identifizierung an bord eines fahrzeugs
WO2002023498A1 (fr) Procede de mise en oeuvre et dispositif de surveillance destine a prevenir lors d'une intrusion dans la zone qu'il surveille
FR2884787A1 (fr) Systeme antivol semi-passif avec verrouillage automatique du dispositif identifiant en cas de perte d'oubli ou de vol
EP3107023B1 (de) Verfahren, vorrichtung und programm zur drahtlosen authentizierung einen zahlungsterminal
EP3475931B1 (de) Verfahren zum betrieb einer alarmanlage mit einer entfernten vorrichtung
EP3029599B1 (de) Verfahren zur detektion einer trennung des hauptanschlusses eines elektronischen zahlungsterminals, entsprechendes computerprogrammprodukt, entsprechendes speichermittel und entsprechendes zahlungsterminal
FR3035254B1 (fr) Procede de detection d'un terminal frauduleux dans un reseau, dispositif et programme correspondants
EP3195223A1 (de) Verfahren zur erkennung eines risikos zum ersetzen eines endgeräts und zugehörige vorrichtung, programm und aufzeichnungsmedium
EP1965328B1 (de) Sicherungsverfahren und damit gesichertes Mobilgerät
CN112509296B (zh) 报警推送方法、装置、电子设备及机器可读存储介质
EP3956874B1 (de) System zur verwaltung mehrerer einzelräume mit alarm
EP3571682B1 (de) Verfahren und system zur signalisierung von zonenabweichungen für elektronische vorrichtungen
FR2741178A1 (fr) Installation de protection contre le vol pour des vehicules automobiles
FR3089321A1 (fr) Procédés et programmes d’ordinateur de défense contre les attaques informatiques
WO2017001770A1 (fr) Procédé de gestion de profils dans un élément sécurisé
EP3819885A1 (de) System und verfahren zur handhabung des sturzes einer person
WO2023247675A1 (fr) Procede de deverrouillage d'urgence d'un vehicule automobile et dispositif de deverrouillage d'urgence associe

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA MK RS

17P Request for examination filed

Effective date: 20090917

17Q First examination report despatched

Effective date: 20091222

AKX Designation fees paid

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20110310