KR20100095267A - Antitheft device and method through setting approval region - Google Patents
Antitheft device and method through setting approval region Download PDFInfo
- Publication number
- KR20100095267A KR20100095267A KR1020090014453A KR20090014453A KR20100095267A KR 20100095267 A KR20100095267 A KR 20100095267A KR 1020090014453 A KR1020090014453 A KR 1020090014453A KR 20090014453 A KR20090014453 A KR 20090014453A KR 20100095267 A KR20100095267 A KR 20100095267A
- Authority
- KR
- South Korea
- Prior art keywords
- terminal
- user
- setting
- permission
- permission area
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000012790 confirmation Methods 0.000 claims abstract description 7
- 230000002265 prevention Effects 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/104—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device characterised by the type of theft warning signal, e.g. visual or audible signals with special characteristics
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01C—MEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
- G01C21/00—Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
- G01C21/26—Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 specially adapted for navigation in a road network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/24—Reminder alarms, e.g. anti-loss alarms
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Remote Sensing (AREA)
- Computer Security & Cryptography (AREA)
- Radar, Positioning & Navigation (AREA)
- Theoretical Computer Science (AREA)
- Emergency Management (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Automation & Control Theory (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Burglar Alarm Systems (AREA)
Abstract
An anti-theft device and method through setting a licensed area are disclosed. The apparatus for preventing theft of a terminal by setting a permission area includes a permission area setting unit that sets a permission area of a terminal, a permission area determination unit that determines whether the destination input to the terminal is the permission area, and the input destination is the permission area. A user confirmation unit confirms whether a user is registered when the user is not in the permission region, and a lock setting unit that locks the terminal when the user is not a registered user.
Description
The present invention relates to an anti-theft device and method by setting a licensed area, in particular, when the terminal is used outside the licensed area due to theft of the terminal, to determine whether the user is a legitimate user, theft to track the location of the terminal An apparatus and method for preventing the same.
When a terminal (eg, a navigation terminal, etc.) is stolen, the terminal can be freely used even if the owner is not the owner. This may cause the terminal to be stolen. However, it may be very inconvenient to enter a password every time to prevent theft.
In addition, when damage caused by theft of the terminal occurs, the user has no obvious way to recover it. However, in a communication terminal, when the terminal is stolen, the user can easily retrieve the terminal by using the location information of the terminal.
Accordingly, there is a need for an anti-theft device and method for preventing the user from using the terminal when the terminal is stolen, and recovering the terminal by tracking the location of the terminal.
The present invention checks whether a terminal user is registered when using it outside the permission area of the terminal, and locks the terminal in the case of an unregistered user, thereby limiting the use of the stolen terminal and preventing theft in advance. It provides a prevention device and method.
The present invention checks whether the terminal user is registered when using the terminal outside the permission area and transmits the location of the terminal to a registered user, etc., so that the stolen terminal can be easily found. An apparatus and method are provided.
The anti-theft device by using a permission area setting according to an embodiment of the present invention, the permission area setting unit for setting the permission area of the terminal, the permission area determination unit for determining whether the destination input to the terminal is the permission area; The apparatus may include a user confirmation unit confirming whether a user is registered when the input destination is not the permission region, and a lock setting unit that locks the terminal when the user is not a registered user.
The anti-theft device by using a permission area setting according to an embodiment of the present invention, a permission area setting unit for setting a permission area of the terminal, a permission area determination unit for determining whether the current location of the terminal is the permission area, And a user confirming unit confirming whether a user is registered when the current location of the terminal is not the use permission area, and a lock setting unit that locks the terminal when the user is not a registered user.
The anti-theft method by using a licensed area setting according to an embodiment of the present invention comprises the steps of setting a licensed area of a terminal, determining whether the destination input to the terminal is the licensed area, and the destination is the use. Checking whether the user is registered when the user is not in the permitted region, and locking the terminal when the user is not a registered user.
The anti-theft method by using a licensed area setting according to an embodiment of the present invention, the step of setting a licensed area of the terminal, determining whether the current location of the terminal is the licensed area, the current location of the terminal Checking whether the user is registered when the user is not the permission area, and locking the terminal when the user is not a registered user.
According to an embodiment of the present invention, when using the terminal outside of the permission region, the terminal user is checked for registration, and in the case of an unregistered user, the terminal is locked by limiting the use of the stolen terminal. There is provided an anti-theft device and method for preventing this.
According to an embodiment of the present invention, when using the terminal outside the permission area, the terminal user is registered or not, and in the case of an unregistered user, by transmitting the location of the terminal to a registered user, the stolen terminal can be easily An antitheft device and method are provided for finding.
Hereinafter, with reference to the contents described in the accompanying drawings will be described in detail an embodiment according to the present invention. However, the present invention is not limited to or limited by the embodiments. Like reference numerals in the drawings denote like elements.
FIG. 1 is a block diagram illustrating an anti-theft device through setting a permission area according to an embodiment of the present invention.
Referring to FIG. 1, the
The permission
The permission
In addition, the permission
If the input destination is not the permission area, the user checking
In addition, if the current location of the terminal is not the permission area, the
3 is a view for explaining a process of identifying a user when the user leaves the permission area according to an embodiment of the present invention.
Referring to FIG. 3, when a user uses a navigation in a licensed area (ex. Seoul) and then turns off the border of Seoul or turns on the navigation in an area outside of Seoul, a password with a phrase indicating that the user has left the licensed area. Can be entered. At this time, the pop-up
Referring back to FIG. 1, when the user is an unregistered user, the
When the user is not a registered user, the
Here, when transmitting the location of the terminal and the product number of the terminal to a registered user, it can be transmitted through an SMS message, MMS message and the like.
As described above, the user authentication can be performed for the terminal to be used outside the licensed area, and if the user is not a legitimate user, the terminal cannot be used and the terminal can be easily recovered by transmitting the terminal information to the legitimate user. .
2 is a view showing the operation of the anti-theft device according to the position of the terminal according to an embodiment of the present invention.
Referring to FIG. 2, when the location of the terminal is out of the permission area, a process of performing user authentication and transmitting terminal information is illustrated.
In FIG. 2, for convenience of explanation, it is assumed that the user sets the permission area of the
In this case, the user may be authenticated by inputting a password, fingerprint recognition, or the like. If it is determined that the user is not registered, the user information including the terminal information including at least one of the location of the terminal and the product number of the terminal may be registered. ) And the
In this case, when the user is authenticated as a registered user by inputting a password, the terminal may be normally used after checking whether the location of the current terminal is included as a permission area.
4 is a diagram for describing a method of preventing theft through setting a permission area according to an embodiment of the present invention.
Referring to FIG. 4, in step S410, a usage permission area of a terminal may be set. Here, the user may set one or more permission zones of the terminal. For example, when a user commutes from Incheon to Seoul, the user's permission region of the terminal may be set to Incheon and Seoul.
In operation S420, it may be determined whether the destination input to the terminal is the permission area. For example, in the case where the user sets Incheon and Seoul as the use permission area, when the user inputs Taean, Chungnam as a destination, it may be determined whether the Taean is the use permission area.
In operation S420, it may be determined whether the current location of the terminal is the permission area. That is, in addition to the method of determining whether the destination input by the user is the permission area, it may be determined whether the current location of the terminal is outside the permission area by using the GPS attached to the terminal. For example, when the user sets the Seoul area as the permission area, it may be determined that the user turns on the terminal in an area other than Seoul or leaves the permission area as soon as the user passes the boundary of Seoul.
In step S430, if the destination is not the usage permission area, it may be checked whether the user is registered. In operation S430, if the current location of the terminal is not the permission area, the user may check whether the user is registered.
In this case, in order to confirm whether the user is registered, a password input, fingerprint recognition, or the like may be used.
In operation S440, when the user is not a registered user, the terminal may be locked. Therefore, a user who steals the terminal can prevent the user from using the terminal in an area outside the licensed area, thereby preventing theft of the terminal.
In operation S450, when the user is not a registered user, terminal information including at least one of a location of the terminal and a product number of the terminal may be transmitted to at least one of the user and a sales company of the terminal. Therefore, the user or the seller of the terminal receives the current location of the stolen terminal, so that the stolen terminal can be found. This may be implemented by allowing a legitimate user to register a terminal product before storing the terminal and storing the product number, user information, etc. in the terminal vendor when registering the product.
In operation S460, when the user is a registered user, it may be set whether to include a destination input to the terminal or a current location of the terminal in the permission area. This means that even when the terminal is not stolen, a legitimate user can move to an area outside the permission area, so in this case, user authentication is performed, and the destination entered in the terminal or the current location of the terminal is used area. This is for inclusion in.
As described above, when the terminal leaves the preset use permission area, the user authentication is performed, and if the user authentication is not performed, the terminal cannot be used, thereby preventing theft of the terminal in advance.
In addition, when an illegal user wants to use the terminal outside the permission area, the terminal may be recovered by transmitting information of the terminal to a legitimate user or a sales company of the terminal.
In addition, the anti-theft method by setting a licensed area according to an embodiment of the present invention includes a computer readable medium including program instructions for performing various computer-implemented operations. The computer readable medium may include program instructions, data files, data structures, etc. alone or in combination. The media may be program instructions that are specially designed and constructed for the present invention or may be available to those skilled in the art of computer software. Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tape, optical media such as CD-ROMs, DVDs, and magnetic disks, such as floppy disks. Magneto-optical media, and hardware devices specifically configured to store and execute program instructions, such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine code, such as that produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter.
As described above, the present invention has been described by way of limited embodiments and drawings, but the present invention is not limited to the above-described embodiments, which can be variously modified and modified by those skilled in the art to which the present invention pertains. Modifications are possible. Accordingly, the spirit of the present invention should be understood only by the claims set forth below, and all equivalent or equivalent modifications thereof will belong to the scope of the present invention.
FIG. 1 is a block diagram illustrating an anti-theft device through setting a permission area according to an embodiment of the present invention.
2 is a view showing the operation of the anti-theft device according to the position of the terminal according to an embodiment of the present invention.
3 is a view for explaining a process of identifying a user when the user leaves the permission area according to an embodiment of the present invention.
4 is a diagram for describing a method of preventing theft through setting a permission area according to an embodiment of the present invention.
<Explanation of symbols for the main parts of the drawings>
110: permission area setting unit
120: permission area judgment
130: user confirmation unit
140: lock setting unit
150: alarm transmission unit
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020090014453A KR20100095267A (en) | 2009-02-20 | 2009-02-20 | Antitheft device and method through setting approval region |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020090014453A KR20100095267A (en) | 2009-02-20 | 2009-02-20 | Antitheft device and method through setting approval region |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20100095267A true KR20100095267A (en) | 2010-08-30 |
Family
ID=42759030
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020090014453A KR20100095267A (en) | 2009-02-20 | 2009-02-20 | Antitheft device and method through setting approval region |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20100095267A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2782079A2 (en) | 2013-03-18 | 2014-09-24 | Kum Oh Electronics Co., Ltd | Grip-type locking device for terminal |
KR102068531B1 (en) * | 2018-08-22 | 2020-02-11 | 엔에이치엔 주식회사 | Elctronic smoking device and control method for providing anti-theft mechanism |
-
2009
- 2009-02-20 KR KR1020090014453A patent/KR20100095267A/en active Search and Examination
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2782079A2 (en) | 2013-03-18 | 2014-09-24 | Kum Oh Electronics Co., Ltd | Grip-type locking device for terminal |
US9625058B2 (en) | 2013-03-18 | 2017-04-18 | Kum Oh Electronics Co., Ltd. | Grip-type locking device for terminal |
KR102068531B1 (en) * | 2018-08-22 | 2020-02-11 | 엔에이치엔 주식회사 | Elctronic smoking device and control method for providing anti-theft mechanism |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104554145B (en) | The system and method for certification vehicle part | |
US10521241B1 (en) | Preventing unauthorized powering off of mobile devices | |
JP2007220075A (en) | Personal authentication device, positional information transmission device, personal authentication system, personal authentication method, and personal authentication program | |
JP2006077431A (en) | On-vehicle theft preventive device and center authentication device | |
KR20100095267A (en) | Antitheft device and method through setting approval region | |
JP2007261495A (en) | Vehicle antitheft device and vehicle antitheft method | |
JP2012172325A (en) | Smart key system of vehicle, vehicle operation method by smart key, and program | |
CN105809045A (en) | Method and device for processing equipment systems during data reset | |
JP2007213105A (en) | Cabinet control system | |
JP2000311024A (en) | Safety protection of mobile computer system in company environment | |
EP3321874A1 (en) | System and method for processing a rental of a secured asset | |
JP5251283B2 (en) | Entrance / exit management device | |
JP2007079777A (en) | Authentication server, portable terminal, authentication system, authentication method and authentication program | |
JP4945130B2 (en) | Vehicle management system for parking lot | |
KR20170003141A (en) | Apparatus and method for cart rental | |
JP7069893B2 (en) | Information processing equipment for vehicles, information processing systems for vehicles, information processing programs for vehicles, and information processing methods for vehicles. | |
JP2011158954A (en) | Movable body control apparatus and movable body control method for movable body control apparatus | |
JP2005050150A (en) | Authentication system using positioning information, authentication method thereof, and program thereof | |
JP2007036693A (en) | Security system for mobile terminal and method of preventing unauthorized access to mobile terminal | |
JP2006178591A (en) | Authentication device, security device and authentication method for security device | |
JP2006021598A (en) | Antitheft system for vehicle | |
CN105719369A (en) | Antitheft equipment unlock system and method | |
JP4887996B2 (en) | Vehicle anti-theft system | |
JP6060761B2 (en) | Vehicle antitheft device | |
Khan et al. | Vehicle Anti-Theft Face Recognition System Based on IoT using Raspberry Pi4 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
A302 | Request for accelerated examination | ||
E902 | Notification of reason for refusal | ||
AMND | Amendment | ||
E601 | Decision to refuse application | ||
J201 | Request for trial against refusal decision | ||
AMND | Amendment | ||
B601 | Maintenance of original decision after re-examination before a trial | ||
J301 | Trial decision |
Free format text: TRIAL DECISION FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20110530 Effective date: 20110928 |