WO1997023986A1 - An electronic anti-theft apparatus and related method - Google Patents

An electronic anti-theft apparatus and related method Download PDF

Info

Publication number
WO1997023986A1
WO1997023986A1 PCT/GB1996/003177 GB9603177W WO9723986A1 WO 1997023986 A1 WO1997023986 A1 WO 1997023986A1 GB 9603177 W GB9603177 W GB 9603177W WO 9723986 A1 WO9723986 A1 WO 9723986A1
Authority
WO
WIPO (PCT)
Prior art keywords
code
battery unit
battery
security code
data
Prior art date
Application number
PCT/GB1996/003177
Other languages
French (fr)
Inventor
Andrew Jonathan Thomas Sansome
Original Assignee
British Technology Group Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Technology Group Limited filed Critical British Technology Group Limited
Priority to EP96942527A priority Critical patent/EP0868806A1/en
Priority to KR1019980704652A priority patent/KR19990076581A/en
Priority to JP09523411A priority patent/JP2000517487A/en
Publication of WO1997023986A1 publication Critical patent/WO1997023986A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • G08B13/1418Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • H04M1/727Identification code transfer arrangements

Definitions

  • the present invention relates to an electronic anti-theft apparatus and related method, and in particular, but not exclusively to an anti-theft system for use with portable electronic equipment. It is unfortunate that in today's society crime appears to be growing. In particular theft is an everyday problem. Often thieves steal high value, portable electronic consumer equipment apparatus, for example portable personal computers, video cameras and mobile telephones. Such apparatus can be expensive to replace and in the case of portable personal computers, the theft of such apparatus can also mean the potential exposure of highly confidential material stored on the computer.
  • German Offenlegungschrift DE-A1 -3803357 (PHILIPS) describes a security system for use with portable electronic equipment.
  • the system consists of a battery charger designated for use with the equipment.
  • the charger has a code transmitter and a code receiver.
  • the code receiver disables the equipment if the code it receives, from the charger, does not match that stored in the code receiver.
  • the system described is for use with equipment having a built-in, rechargeable battery.
  • a disadvantage of the prior-art system described is that when such an energy source is depleted there may be a considerable time, whilst the battery recharges until the system may be used again.
  • many pieces of mobile electronic equipment are supplied with a second rechargeable battery so that a user may easily swap a charged battery for a depleted one. Such equipment could not be used with the aforementioned recharger because the batteries are not removable.
  • apparatus which receives a removable battery unit, the battery unit comprises a rechargeable battery and a memory store, the apparatus having comparison means for comparing a security code stored in the apparatus, with an authorisation code presented by the memory store and means for selectively enabling the apparatus upon receipt of a valid authorisation code or disabling the apparatus upon receipt of an invalid authorisation code.
  • the electronic apparatus will function normally. For example, in the case of a portable telephone, it can be used to make and/or receive calls. However, if the security code is not an authorised code supplied by the battery unit, the electronic apparatus will be disabled. That is to say the apparatus is "jammed" so that it may not be used for its intended purpose. Disabling may be performed electronically.
  • an electronic electrical or electronic apparatus having a first data store to store a security code (the stored code), means to read an authorisation code; means to compare the authorisation code with the stored code, means to enable operation ofthe apparatus when the authorisation code is a valid authorisation code, characterised in that the apparatus is adapted to receive a removable, rechargeable battery unit which unit comprises a battery and a memory store.
  • the battery is a rechargeable battery having a volatile memory such as, for example, a Random Access Memory (RAM) or an erasable programmable store, such as, for example, an erasable programmable read only memory (EPROM).
  • RAM Random Access Memory
  • EPROM erasable programmable read only memory
  • the authorisation code originates from a code source which is provided within a battery charger used for recharging the battery and is transmitted to the memory during recharging.
  • the apparatus is effectively tailored for use with batteries which have been charged with the owner's charger, i.e. an "authorised” charger and as soon as the battery has discharged, unless the correct authorisation code is resupplied, the apparatus may not be used.
  • a battery charger for charging a battery, the charger comprising a primary code source, and means responsive to said code source to transmit an authorisation security code to a data store in a battery unit whilst the battery is recharging.
  • the battery charger supplies the code during supply of current required to recharge the battery.
  • the authorisation security code may be supplied prior to charging or subsequent to charging.
  • the battery unit and battery charger may be configured such that at the commencement of a charging cycle any security code still held in a store within a memory store in the battery unit is first erased and a new security code is written to the store in the battery unit. Such a system has a higher level of security.
  • the electrical or electronic apparatus may be equipped with a means for automatically erasing the code in the memory store if an attempt is made to gain access to the store in the battery unit. Automatic erasing may be carried out by means in the battery unit or in the apparatus.
  • a battery unit comprising a rechargeable battery and a data memory store (e.g. an EPROM) within which data memory store an authorisation security code is written.
  • a data memory store e.g. an EPROM
  • the authorisation security code is transmitted to the battery unit when the battery is being recharged.
  • the battery unit prior to use, is required to convey the code more than once having a single cycle and the electronic apparatus is arranged to receive the code more than once.
  • the security codes may be encrypted in such a way that the possession of both the battery unit (containing the "primary" code and presenting an encrypted form of the authorisation code) and the electronic apparatus containing the security code (to be protected) does not permit identification of any of he codes.
  • circuitry located in the battery unit is operative to read data, the circuitry comprising: means to identify connection ofthe battery unit to the charger; means for storing data, which permits erasing of said data when stored; means to decode said data and means to store serial data after a predetermined period when data is presented by the charger.
  • the circuitry provided in the battery unit includes means to write data to the electrical or electronic apparatus comprising: means to identify connection of an electronic apparatus to the battery unit; means to read stored data; means to encode the data; and means to send the encoded data to the electronic apparatus.
  • said data is used in serial data form.
  • means to read a second piece of data, (second portion ofthe code) means to encode said data by addition to a subsequent piece of data, generated by a pseudo-random sequence generator, and means to retransmit the subsequently generated authorisation code to the electronic apparatus.
  • Means may be provided which is adapted to stop transmitting until the battery unit has been removed from the electronic apparatus.
  • a method of charging a rechargeable battery unit characterised in that a security code is transmitted to a memory store in the battery unit.
  • Figure 1 shows an overall block diagram showing the concept of the invention
  • Figure 2 is a circuit diagram of a battery charger
  • Figure 3 is a circuit diagram of a battery unit
  • Figure 4 is a circuit diagram of an electronic apparatus.
  • Figure 1 shows diagrammatically a working implementation and is only intended to demonstrate the principles involved. It is not the only way of achieving the broader objective ofthe invention.
  • An electronic apparatus 24 comprises a first data store 26 for storing a code; means 23 for comparing a stored code with a security code received from a second data store 21 and means to enable the electronic apparatus 24 when the security code is a valid authorisation code characterised in that the second data store 21 is housed within a detachable rechargeable battery unit 10.
  • Figure 1 shows a rechargeable battery unit 10, (described below in detail with reference to Figure 3) connected to a battery charger 12 (described below in detail with reference to Figure 2) via power lines 12a and 12b.
  • the battery charger 12 is in turn connected to a mains supply across A, B.
  • a data entry means 14, such as a keypad, is connected, temporarily or permanently, to the battery charger 12.
  • the data entry means 14 passes a coded security signal (the authorisation code) to a memory store 16 housed inside the battery charger 12.
  • the store 16 includes an electronic memory device such as a random access memory (RAM) chip (not shown).
  • the authorisation code (or authorisation code generator) is therefore stored in the battery charger 12.
  • the code is transmitted to a store 21 in the battery unit 10 via a separate data link 18.
  • the authorisation code can be transmitted to the battery unit 10 via dedicated connections 12a and 12b.
  • FIG. 4 shows a circuit, which may be a portable personal computer or a telephone.
  • Electronic apparatus 24 houses the battery unit 10. This is illustrated by the dotted line surrounding a combined portable module 25. Battery unit 10 is detachable and removable from module 25.
  • FIG. 2 shows how two four bit codes from the battery unit to a mobile electronic apparatus 24 are written to the battery unit 10 by a charger 12 as a single 8 bit word.
  • Charger 12 has an oscillator having resistor 30, capacitor 32, and Schmitt inverter 34 (part of lCl). These produce a clock signal.
  • Gating means 44 is provided to produce a serial pulse width modulated data stream at output pin 46.
  • Master clock oscillator 48 (frequency f) runs continually and clocks counter 40. Counter Ql therefore produces a square wave at f/2. Counter Q5 counts at f/32. (The remaining stages of counter Q5 are not directly relevant to the present invention.) Counter Q5 is therefore alternately high for a first set of 16 clock pulses and then low for the following set of 16 clock pulses.
  • Shift register 42 is clocked by counter Ql (i.e. at f/2 which is half of the master clock rate.). Parallel input lines of shift register 42 are connected either high (to VDD) to represent a ONE or low (to VSS) to represent a ZERO, representing eight bits of data. Thus two four bit code numbers are used by the battery unit 10 and electronic apparatus 24 are programmed by connecting the parallel input lines either high or low. This may be achieved for example with a dip switch (not shown).
  • Serial / parallel select line, of shift register 42 is connected to Q5 pin of counter 40.
  • Q5 When Q5 is high, parallel data on the shift register input lines is jammed in.
  • Q5 When Q5 is low the data is shifted out sequentially from QH, at f/2. Thus QH remains at the level of input H for 16 master clock cycles whilst the counter Q5 is high.
  • Q5 goes low, 8 bits of serial data are presented followed by a low for the next 8 clock cycles. The process is then repeated.
  • Inverters 50 and 52, "AND” gates 54, 56 and 58 and “OR” gates 60 and 62 combine the master clock with the counter Ql, Q5 and shift register QH so as to produce a pulse width modulated serial data stream at f/2.
  • the pulse length is half of the period of master clock 48, when the data represented is ZERO(O) and 1.5 times the period of master clock 48 when the data represents a ONE (1).
  • Inverter 64 and "AND" gate 66 block data when the counter Q5 is high, so that the only data to appear at output 46 are the required 8 bits after Q5 goes low.
  • the battery charger 12 produces an 8 bit pulse width modulated data stream representing data programmed onto the input pins ofthe shift register. This data is repeated every 32 cycles ofthe master clock 48. It requires 8 clock cycles and is followed by a pause (output data line is low) for 24 clock cycles.
  • FIG. 3 shows a circuit diagram ofthe battery unit. Circuitry which is located in the battery unit 10. It comprises two sections: circuitry to read data from the battery charger 12 and circuitry to write data to the electronic apparatus 24.
  • the battery unit 10 is connected to input line 67 such that the voltage on the input of inverter 70 rises to VDD.
  • Output of inverter 70 goes low producing a positive pulse at the output of inverter 72 which resets counter 74.
  • Q14 of counter 74 is reset low enabling its clock via OR gate 76.
  • Serial pulse width modulated data is presented to monostables 78 and 80 (M S 78 and M/S 80).
  • the timing can be derived from a master clock (not shown).
  • M/S 78 and M/S 80 are triggered by a positive going edge of an input waveform.
  • M S 80 is retriggerable and has a period which is slightly greater than that of incoming data.
  • M/S 80 Q clocks "D” type latch 82, (D82) transferring the state of its data input (connected to Q5 of counter 74) to its "Q” and thence to "AND” gate 84. Until counter 74 Q5 goes high the data pin of "D" type latch 82 and therefore its Q is low, thereby preventing the transmission of the derived clock via AND 84 to shift registers 86 and 88. Potentially corrupt data is therefore blocked at power on.
  • the derived clock via AND gate 84 clocks data from "Data in” into shift registers 86 and 88.
  • the derived clock via AND gate 84 clocks data from "Data in” into shift registers 86 and 88.
  • the shift registers arc repeatedly reset and loaded with data.
  • counter 74 Q14 goes high counter 74 clock is inhibited via OR gate 76.
  • the cycle stops, leaving the last set of data sent in shift registers 86 and 88.
  • the battery unit 10 then remains in this state until either removed from the charger 12 , and reconnected (when the sequence is repeated) or connected to the electronic apparatus 24.
  • the battery unit has a clock oscillator which comprises invertor 98 capacitor 100 and resistor 102 operates continuously.
  • a pseudo-random sequence generator (P.R.S.) is formed from shift register 104 and exclusive OR gate 106 (XOR 106) .
  • OR gate 108 and NOR gate 1 10 ensure that the P.R.S. cannot latch in an all LOW state. It produces a sequence of (2 n )-l numbers of length n bits (where n is the number of stages in the shift register).
  • the REQUEST in line remains high via resistor 1 12, holding reset counter 114 and "D" type latch 1 16 and enabling the clock to the pseudo-random sequence generator via AND gate 118.
  • Counter 1 14 When battery unit 10 is connected to the electronics apparatus 24 REQUEST line is taken LOW, releasing the reset lines and disabling the pseudo-random sequence generator clock via AND gate 118 and OR gate 120.
  • Counter 1 14 is clocked via OR gate 122 and once it is reset has been released, it counts until both Q9 and Q10 are HIGH when its clock is disabled via AND gate 124 and OR gate 122.
  • Counter 1 14 Q9 controls the state of two-to-one line selector 132 and therefore selects either the data in shift register 86 or 88. These comprise first or second four bits ofthe authorisation code. Initially Counter 114 Q9 is LOW and data from shift register 86 is selected.
  • pseudo-random sequence (P.R.S..) generator stops when its clock is inhibited by the LOW reset line.
  • Four bit full adder 130 produces the sum ofthe four bits of output data (Q0 to Q3) from the PRS and the four bits of data selected from shift register 86.
  • the sum is presented to the first four parallel input lines of shift register 126, the remainder are tied LOW. Data is jammed into register 126 when counter 114 Q8 is HIGH and shifted from QH (synchronous with its clock) when Q8 goes LOW.
  • D type latch 1 16 and OR gate 128 generate a burst of eight clock pulses following the LOW transition of counter 1 14 Q8, to clock this data out and provide clock pulses to the electronics apparatus.
  • the data could of course be transmitted, combined with its clock, as a pulse width modulated data stream just as the battery charger 12 transmits data to the battery unit 10 during charging, via a single connection.
  • Counter 114 Q9 and Q10 are now high and the clock of counter 114 is disabled via AND gate 124 and OR gate 122 preventing further data transmission until the REQUEST line is allowed to go HIGH and then LOW again (i.e. the battery unit 10 is removed and reconnected to the electronics apparatus 24).
  • the first four bits of code data have been added to a four bit number obtained at random and transmitted with a corresponding number of clock pulses to the electronic apparatus. This has then been followed by the sum ofthe second four bits of code data and the "random" four bit number which follows in the generated sequence, with their corresponding clock pulses.
  • an electronic apparatus 24 comprises electronic means to read a preset authorisation code (numerically the same (in this example) as two four bit codes programmed into the charger 12 and sent to the battery unit 10), and means to add the data to "random numbers" generated by a P.R.S generator and to compare the sum with serial data sent from the battery unit 10 as described above with reference to Figure 3.
  • An authorisation code is preset by connecting the eight inputs ofthe two to one line selector 133 either HIGH or LOW. This data would of course be stored in R.O.M. (not shown) in a commercial implementation.
  • Serial data and its clock are presented by battery unit 10 as described above, and loaded into shift register 135. This also clocks monostable 137, which is retriggerable and has a period of twice the incoming clock, so that its NOT Q goes LOW during the receipt of data. At the end of four bits of data, the NOT Q returns HIGH, clocking the Q of D type latch 152 HIGH. The output of AND gate 152 therefore goes HIGH enabling the output of the four bit comparator via AND gate 158. During the receipt of subsequent data the LOW on M/S 1 NOT Q disables comparison via AND gates 154 and 158, to prevent an invalid but correct comparison (occurring due to data corruption during loading) from taking place.
  • Output of ADDER 140 is compared, using a 4 bit magnitude comparator with the encoded data from the battery unit 10.
  • the output of the comparator 156 goes HIGH and clocks "D" type latch 160 via AND gate 158. Since Dl has not changed state, the Q of "D" type latch 160 remains LOW (i.e. unchanged).
  • the output ofthe P.R.S. in the electronic apparatus 24 now matches the state ofthe P.R.S. in the battery unit 10 when it was encoding the first four bits of code. That is the two P.R.S's are synchronised.
  • the output ofthe 4 bit comparator 156 goes (back) LOW clocking latch 142 via invertor 162.
  • Latch 142 NOT Q goes LOW and disables the P.R.S. clock.
  • Latch 142 Q goes HIGH and selects the second CODE word via the line selector.
  • the pseudo-random sequence generator therefore stops one step beyond the number which resulted in equivalence, i.e. at the same point as that used by the P.R.S in the battery unit 10 to encode the second CODE.
  • the second electronics apparatus CODE has been selected and the sum therefore anticipates the encoded data expected next from the battery unit 10.
  • D type latch 164 has a HIGH clocked into its Q.
  • Latches 146 and 160 are reset via OR gate 166 preventing authorisation. This may only occur if an unauthorised user were attempting to overcome the system.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)
  • Burglar Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention describes an anti-theft apparatus and related method for use with portable electrical or electronic apparatus, particularly with mobile telephones or personal computers. The invention comprises a first data store in which an encrypted code is stored in the electronic apparatus, a comparator and a removable second data store which is within a removable, rechargeable battery unit which unit comprises a battery and a memory store. Upon insertion of the battery unit a security code is transmitted to the first data store. If the code is recognised as a valid authorisation code, the apparatus is enabled and may be operated in the usual way. If it is not recognised the apparatus may be disabled electronically. Once the battery is spent the apparatus is useless, because unless the battery unit receives a refreshed security code upon recharge (from a recharger equipped with a means for re-supplying a suitable code) the electronic apparatus may not be used. Preferably a recharger has been modified such that a valid security code is transmitted to the battery unit at each recharge.

Description

AN ELECTRONIC ANTI-THEFT APPARATUS AND RELATED METHOD The present invention relates to an electronic anti-theft apparatus and related method, and in particular, but not exclusively to an anti-theft system for use with portable electronic equipment. It is unfortunate that in today's society crime appears to be growing. In particular theft is an everyday problem. Often thieves steal high value, portable electronic consumer equipment apparatus, for example portable personal computers, video cameras and mobile telephones. Such apparatus can be expensive to replace and in the case of portable personal computers, the theft of such apparatus can also mean the potential exposure of highly confidential material stored on the computer.
It is an object ofthe present invention to overcome the above mentioned problem by providing an anti-theft system comprising a method and apparatus, suitable for use with electronic apparatus specifically of the type mentioned above, although it will be understood that the invention can be used with other types of electronic apparatus. German Offenlegungschrift DE-A1 -3803357 (PHILIPS) describes a security system for use with portable electronic equipment. The system consists of a battery charger designated for use with the equipment. The charger has a code transmitter and a code receiver. The code receiver disables the equipment if the code it receives, from the charger, does not match that stored in the code receiver. The system described is for use with equipment having a built-in, rechargeable battery. A disadvantage of the prior-art system described is that when such an energy source is depleted there may be a considerable time, whilst the battery recharges until the system may be used again. Nowadays, many pieces of mobile electronic equipment are supplied with a second rechargeable battery so that a user may easily swap a charged battery for a depleted one. Such equipment could not be used with the aforementioned recharger because the batteries are not removable.
Another disadvantage with the prior-art system is that it would be possible for an unauthorised person to physically remove (disconnect) a spent battery and replace it with a battery which has been charged using an "unauthorised" charger, as there is no mechanism of verifying the authenticity of a recharged battery. According to a first aspect of the present invention there is provided apparatus which receives a removable battery unit, the battery unit comprises a rechargeable battery and a memory store, the apparatus having comparison means for comparing a security code stored in the apparatus, with an authorisation code presented by the memory store and means for selectively enabling the apparatus upon receipt of a valid authorisation code or disabling the apparatus upon receipt of an invalid authorisation code.
Once enabled the electronic apparatus will function normally. For example, in the case of a portable telephone, it can be used to make and/or receive calls. However, if the security code is not an authorised code supplied by the battery unit, the electronic apparatus will be disabled. That is to say the apparatus is "jammed" so that it may not be used for its intended purpose. Disabling may be performed electronically.
According to another aspect ofthe present invention there is provided an electronic electrical or electronic apparatus having a first data store to store a security code (the stored code), means to read an authorisation code; means to compare the authorisation code with the stored code, means to enable operation ofthe apparatus when the authorisation code is a valid authorisation code, characterised in that the apparatus is adapted to receive a removable, rechargeable battery unit which unit comprises a battery and a memory store.
Conveniently the battery is a rechargeable battery having a volatile memory such as, for example, a Random Access Memory (RAM) or an erasable programmable store, such as, for example, an erasable programmable read only memory (EPROM).
Preferably, the authorisation code originates from a code source which is provided within a battery charger used for recharging the battery and is transmitted to the memory during recharging.
Thus the apparatus is effectively tailored for use with batteries which have been charged with the owner's charger, i.e. an "authorised" charger and as soon as the battery has discharged, unless the correct authorisation code is resupplied, the apparatus may not be used.
Because most portable electrical or electronic apparatus is supplied ( in order to reduce weight and size) with one or more removable, rechargeable batteries and a separate battery charger (which is not usually transported or stored with the apparatus), it is apparent that the present system is more secure and more flexible than the aforementioned system described in DE-A1-3803357.
According to a further aspect of the present invention, there is provided a battery charger for charging a battery, the charger comprising a primary code source, and means responsive to said code source to transmit an authorisation security code to a data store in a battery unit whilst the battery is recharging.
Preferably the battery charger supplies the code during supply of current required to recharge the battery. Alternatively the authorisation security code may be supplied prior to charging or subsequent to charging. The battery unit and battery charger may be configured such that at the commencement of a charging cycle any security code still held in a store within a memory store in the battery unit is first erased and a new security code is written to the store in the battery unit. Such a system has a higher level of security.
Similarly the electrical or electronic apparatus may be equipped with a means for automatically erasing the code in the memory store if an attempt is made to gain access to the store in the battery unit. Automatic erasing may be carried out by means in the battery unit or in the apparatus.
According to a further aspect of the invention there is provided a battery unit comprising a rechargeable battery and a data memory store (e.g. an EPROM) within which data memory store an authorisation security code is written. Preferably the authorisation security code is transmitted to the battery unit when the battery is being recharged.
Preferably, prior to use, the battery unit is required to convey the code more than once having a single cycle and the electronic apparatus is arranged to receive the code more than once. The security codes may be encrypted in such a way that the possession of both the battery unit (containing the "primary" code and presenting an encrypted form of the authorisation code) and the electronic apparatus containing the security code (to be protected) does not permit identification of any of he codes.
Conveniently, circuitry located in the battery unit is operative to read data, the circuitry comprising: means to identify connection ofthe battery unit to the charger; means for storing data, which permits erasing of said data when stored; means to decode said data and means to store serial data after a predetermined period when data is presented by the charger.
Preferably the circuitry provided in the battery unit, includes means to write data to the electrical or electronic apparatus comprising: means to identify connection of an electronic apparatus to the battery unit; means to read stored data; means to encode the data; and means to send the encoded data to the electronic apparatus.
Advantageously said data is used in serial data form. There may also be provided means to read a second piece of data, (second portion ofthe code), means to encode said data by addition to a subsequent piece of data, generated by a pseudo-random sequence generator, and means to retransmit the subsequently generated authorisation code to the electronic apparatus.
Means may be provided which is adapted to stop transmitting until the battery unit has been removed from the electronic apparatus.
According to a further aspect ofthe present invention there is provided a method of charging a rechargeable battery unit characterised in that a security code is transmitted to a memory store in the battery unit.
Embodiments ofthe invention will now be described, by way of example only, and with reference to the Figures in which:
Figure 1 shows an overall block diagram showing the concept of the invention;
Figure 2 is a circuit diagram of a battery charger; Figure 3 is a circuit diagram of a battery unit; and Figure 4 is a circuit diagram of an electronic apparatus. Figure 1 shows diagrammatically a working implementation and is only intended to demonstrate the principles involved. It is not the only way of achieving the broader objective ofthe invention.
An electronic apparatus 24 comprises a first data store 26 for storing a code; means 23 for comparing a stored code with a security code received from a second data store 21 and means to enable the electronic apparatus 24 when the security code is a valid authorisation code characterised in that the second data store 21 is housed within a detachable rechargeable battery unit 10. Figure 1 shows a rechargeable battery unit 10, (described below in detail with reference to Figure 3) connected to a battery charger 12 (described below in detail with reference to Figure 2) via power lines 12a and 12b. The battery charger 12 is in turn connected to a mains supply across A, B. A data entry means 14, such as a keypad, is connected, temporarily or permanently, to the battery charger 12. The data entry means 14 passes a coded security signal (the authorisation code) to a memory store 16 housed inside the battery charger 12. The store 16 includes an electronic memory device such as a random access memory (RAM) chip (not shown). The authorisation code (or authorisation code generator) is therefore stored in the battery charger 12. The code is transmitted to a store 21 in the battery unit 10 via a separate data link 18. Alternatively the authorisation code can be transmitted to the battery unit 10 via dedicated connections 12a and 12b.
Figure 4 shows a circuit, which may be a portable personal computer or a telephone. Electronic apparatus 24 houses the battery unit 10. This is illustrated by the dotted line surrounding a combined portable module 25. Battery unit 10 is detachable and removable from module 25.
The embodiment described in detail below, with reference to Figures 2 to 4, utilises only four bit security with corresponding "random numbers". Therefore it is not as secure as might be desired. As will be appreciated by a skilled person, a commercial implementation may use 8, 12 or even 16 bit random numbers and would therefore be physically only slightly more complex, and otherwise identical. However, it would offer much higher security.
Figure 2 shows how two four bit codes from the battery unit to a mobile electronic apparatus 24 are written to the battery unit 10 by a charger 12 as a single 8 bit word. Charger 12 has an oscillator having resistor 30, capacitor 32, and Schmitt inverter 34 (part of lCl). These produce a clock signal. There is also a counter 40 and a shift register 42 which acts as a parallel to serial converter. Gating means 44 is provided to produce a serial pulse width modulated data stream at output pin 46.
Master clock oscillator 48 (frequency f) runs continually and clocks counter 40. Counter Ql therefore produces a square wave at f/2. Counter Q5 counts at f/32. (The remaining stages of counter Q5 are not directly relevant to the present invention.) Counter Q5 is therefore alternately high for a first set of 16 clock pulses and then low for the following set of 16 clock pulses.
Shift register 42 is clocked by counter Ql (i.e. at f/2 which is half of the master clock rate.). Parallel input lines of shift register 42 are connected either high (to VDD) to represent a ONE or low (to VSS) to represent a ZERO, representing eight bits of data. Thus two four bit code numbers are used by the battery unit 10 and electronic apparatus 24 are programmed by connecting the parallel input lines either high or low. This may be achieved for example with a dip switch (not shown).
Serial / parallel select line, of shift register 42, is connected to Q5 pin of counter 40. When Q5 is high, parallel data on the shift register input lines is jammed in. When Q5 is low the data is shifted out sequentially from QH, at f/2. Thus QH remains at the level of input H for 16 master clock cycles whilst the counter Q5 is high. When Q5 goes low, 8 bits of serial data are presented followed by a low for the next 8 clock cycles. The process is then repeated. Inverters 50 and 52, "AND" gates 54, 56 and 58 and "OR" gates 60 and 62, combine the master clock with the counter Ql, Q5 and shift register QH so as to produce a pulse width modulated serial data stream at f/2. The pulse length is half of the period of master clock 48, when the data represented is ZERO(O) and 1.5 times the period of master clock 48 when the data represents a ONE (1). Inverter 64 and "AND" gate 66 block data when the counter Q5 is high, so that the only data to appear at output 46 are the required 8 bits after Q5 goes low. Thus the battery charger 12 produces an 8 bit pulse width modulated data stream representing data programmed onto the input pins ofthe shift register. This data is repeated every 32 cycles ofthe master clock 48. It requires 8 clock cycles and is followed by a pause (output data line is low) for 24 clock cycles.
The circuit described above with reference to Figure 2 does not require valid data to be received twice. Such variation to the embodiment is well known to the skilled artisan. The circuit may be readily adapted to perform this function. Namely verification of data upon receipt of two sets of correct data sequences, one after the other, is required in order to enable the apparatus. Figure 3 shows a circuit diagram ofthe battery unit. Circuitry which is located in the battery unit 10. It comprises two sections: circuitry to read data from the battery charger 12 and circuitry to write data to the electronic apparatus 24.
Referring to Figure 3 in detail, the battery unit 10 is connected to input line 67 such that the voltage on the input of inverter 70 rises to VDD. Output of inverter 70 goes low producing a positive pulse at the output of inverter 72 which resets counter 74. Q14 of counter 74 is reset low enabling its clock via OR gate 76. Serial pulse width modulated data is presented to monostables 78 and 80 (M S 78 and M/S 80). In a particularly preferred embodiment the timing can be derived from a master clock (not shown). M/S 78 and M/S 80 are triggered by a positive going edge of an input waveform. M S 80 is retriggerable and has a period which is slightly greater than that of incoming data. Its "Q" therefore goes high at the start ofthe eight bits of data and remains high for their duration. M/S 80 Q clocks "D" type latch 82, (D82) transferring the state of its data input (connected to Q5 of counter 74) to its "Q" and thence to "AND" gate 84. Until counter 74 Q5 goes high the data pin of "D" type latch 82 and therefore its Q is low, thereby preventing the transmission of the derived clock via AND 84 to shift registers 86 and 88. Potentially corrupt data is therefore blocked at power on.
At the start of each input data stream (once counter 74 Q5 is high) the NOT Q of D type latch 82 goes low generating a reset pulse to shift registers 86 and 88 via resistor 90, capacitor 92 and inverter 94. This reset can be edge triggered and would not require timing components. Until Q13 of counter 74 goes high, the derived clock is prevented from reaching shift registers 86 and 88 by AND gate 84, preventing new data from being written until charging has continued for a period of 4096 clock cycles. This delay might be set to several minutes to enhance security. Monostable 78 has a period equal to that of the charger clock. Thus the state of
"Data in" line when the NOT Q of monostable 78 goes high, (end of the monostable period) represents data sent from the battery charger 12.
The derived clock via AND gate 84 clocks data from "Data in" into shift registers 86 and 88. Thus during charging, once counter 74 Q13 is high the shift registers arc repeatedly reset and loaded with data. When counter 74 Q14 goes high counter 74 clock is inhibited via OR gate 76. At this time the cycle stops, leaving the last set of data sent in shift registers 86 and 88. The battery unit 10 then remains in this state until either removed from the charger 12 , and reconnected (when the sequence is repeated) or connected to the electronic apparatus 24.
The battery unit has a clock oscillator which comprises invertor 98 capacitor 100 and resistor 102 operates continuously. A pseudo-random sequence generator (P.R.S.) is formed from shift register 104 and exclusive OR gate 106 (XOR 106) . OR gate 108 and NOR gate 1 10 ensure that the P.R.S. cannot latch in an all LOW state. It produces a sequence of (2n)-l numbers of length n bits (where n is the number of stages in the shift register). When the battery unit 10 is disconnected from the electronic apparatus 24 the REQUEST in line remains high via resistor 1 12, holding reset counter 114 and "D" type latch 1 16 and enabling the clock to the pseudo-random sequence generator via AND gate 118.
When battery unit 10 is connected to the electronics apparatus 24 REQUEST line is taken LOW, releasing the reset lines and disabling the pseudo-random sequence generator clock via AND gate 118 and OR gate 120. Counter 1 14 is clocked via OR gate 122 and once it is reset has been released, it counts until both Q9 and Q10 are HIGH when its clock is disabled via AND gate 124 and OR gate 122. Counter 1 14 Q9 controls the state of two-to-one line selector 132 and therefore selects either the data in shift register 86 or 88. These comprise first or second four bits ofthe authorisation code. Initially Counter 114 Q9 is LOW and data from shift register 86 is selected.
As described above the pseudo-random sequence (P.R.S..) generator stops when its clock is inhibited by the LOW reset line. Four bit full adder 130 produces the sum ofthe four bits of output data (Q0 to Q3) from the PRS and the four bits of data selected from shift register 86. Clearly with more secure systems there would be a greater bit length. The sum is presented to the first four parallel input lines of shift register 126, the remainder are tied LOW. Data is jammed into register 126 when counter 114 Q8 is HIGH and shifted from QH (synchronous with its clock) when Q8 goes LOW. D type latch 1 16 and OR gate 128 generate a burst of eight clock pulses following the LOW transition of counter 1 14 Q8, to clock this data out and provide clock pulses to the electronics apparatus. The data could of course be transmitted, combined with its clock, as a pulse width modulated data stream just as the battery charger 12 transmits data to the battery unit 10 during charging, via a single connection.
As counter 1 14 Q8 goes LOW Q9 goes HIGH and clocks the P.R.S. once via OR gate 120, presenting the next four bits of output data to adder 130. Since counter 114 Q9 is now HIGH the data selector 132 is routing the second four bits of authorisation code, from shift register 88, to four bit full adder 130.
The sum ofthe four bits presented by the P.R.S. and line selector is again presented to shift register 126, jammed in when counter 1 14 Q8 is HIGH and shifted out from QH as serial data when LOW.
Counter 114 Q9 and Q10 are now high and the clock of counter 114 is disabled via AND gate 124 and OR gate 122 preventing further data transmission until the REQUEST line is allowed to go HIGH and then LOW again (i.e. the battery unit 10 is removed and reconnected to the electronics apparatus 24). Thus the first four bits of code data have been added to a four bit number obtained at random and transmitted with a corresponding number of clock pulses to the electronic apparatus. This has then been followed by the sum ofthe second four bits of code data and the "random" four bit number which follows in the generated sequence, with their corresponding clock pulses.
Operation of a piece of electronic apparatus will now be described in detail with reference to Figure 4, in which an electronic apparatus 24 comprises electronic means to read a preset authorisation code (numerically the same (in this example) as two four bit codes programmed into the charger 12 and sent to the battery unit 10), and means to add the data to "random numbers" generated by a P.R.S generator and to compare the sum with serial data sent from the battery unit 10 as described above with reference to Figure 3. An authorisation code is preset by connecting the eight inputs ofthe two to one line selector 133 either HIGH or LOW. This data would of course be stored in R.O.M. (not shown) in a commercial implementation. When the battery unit 10 is connected, power on reset is generated by inverter 134, resistor 136 and capacitor 138. The first four bits of code data (CODE) are selected and added by a four bit full ADDER 140, to the output of a pseudo-random sequence generator (P.R.S), as described above. The P.R.S is continuously clocked since the NOT Q of "D" type latch 142 is reset HIGH, via AND gate 144. An oscillator is formed by resistor 146, capacitor 148 and invertor 150. The output of the adder 140 therefore presents a series of 4 bit words representing the sum ofthe first CODE and the successive outputs of the P.R.S.
Serial data and its clock are presented by battery unit 10 as described above, and loaded into shift register 135. This also clocks monostable 137, which is retriggerable and has a period of twice the incoming clock, so that its NOT Q goes LOW during the receipt of data. At the end of four bits of data, the NOT Q returns HIGH, clocking the Q of D type latch 152 HIGH. The output of AND gate 152 therefore goes HIGH enabling the output of the four bit comparator via AND gate 158. During the receipt of subsequent data the LOW on M/S 1 NOT Q disables comparison via AND gates 154 and 158, to prevent an invalid but correct comparison (occurring due to data corruption during loading) from taking place.
Output of ADDER 140 is compared, using a 4 bit magnitude comparator with the encoded data from the battery unit 10. When the data are the same the output of the comparator 156 goes HIGH and clocks "D" type latch 160 via AND gate 158. Since Dl has not changed state, the Q of "D" type latch 160 remains LOW (i.e. unchanged). The output ofthe P.R.S. in the electronic apparatus 24 now matches the state ofthe P.R.S. in the battery unit 10 when it was encoding the first four bits of code. That is the two P.R.S's are synchronised. When the P.R.S has been clocked one step past the output which resulted in equivalence ofthe sum and input data, the output ofthe 4 bit comparator 156 goes (back) LOW clocking latch 142 via invertor 162. Latch 142 NOT Q goes LOW and disables the P.R.S. clock. Latch 142 Q goes HIGH and selects the second CODE word via the line selector. The pseudo-random sequence generator therefore stops one step beyond the number which resulted in equivalence, i.e. at the same point as that used by the P.R.S in the battery unit 10 to encode the second CODE. The second electronics apparatus CODE has been selected and the sum therefore anticipates the encoded data expected next from the battery unit 10. When the second piece of encoded data is received from the battery unit it is compared with the output ofthe ADDER 140 (generated as described above) and if the two codes are the same, or that is the code presented by the battery unit is an authorisation code, comparator 156 output goes HIGH. Latch 160 is therefore clocked, transferring the HIGH now present on its D input to its Q, indicating that the received data are valid and thereby authorising operation ofthe electronic apparatus 25.
If a third four bit word is received from the battery unit 10 then D type latch 164 has a HIGH clocked into its Q. Latches 146 and 160 are reset via OR gate 166 preventing authorisation. This may only occur if an unauthorised user were attempting to overcome the system.
Thus two authorisation codes have been sent from the battery charger 12 to the electronic apparatus via the battery unit 10, where both codes have been recognised as valid and thus use ofthe apparatus is authorised. Both codes are encrypted in such a way as to prevent an unauthorised user who is in possession of BOTH the battery unit and electronics apparatus from successfully interrogating the link between them and identifying the authorisation codes. The electronic apparatus is therefore only of value to a thief until the battery has discharged and is spent. Once this has occurred, unless the thief has knowledge of the codes, recharging the battery will be associated with loss of its stored codes and therefore further use will be prevented. Alternatively the codes stored in the store in the battery unit become erased.
It will be appreciated that the invention has been described by way of an example only and variation to the above embodiment may be made without departing from the scope of the invention.

Claims

1. Apparatus for receiving a removable battery unit, the battery unit comprising a rechargeable battery and a memory store, the apparatus having comparison means for comparing a security code stored in the apparatus, with an authorisation code presented by the memory store and means for selectively enabling the apparatus upon receipt of a valid authorisation code or disabling the apparatus upon receipt of an invalid authorisation code.
2. An electronic apparatus comprising a first data store for storing a code; means for comparing a stored code with a security code received from a second data store and means to enable the electronic apparatus when the security code is a valid authorisation code characterised in that the second data store is supported by or disposed within a detachable rechargeable battery unit.
3. Apparatus according to Claim 1 or 2 wherein the security code stored in the second store is automatically erased when the battery is spent.
4. Apparatus according to Claim 3 in which the code is encrypted.
5. An electronic anti-theft method comprising the steps of: transmitting a security code to a first data store within an electronic apparatus from a second data store, comparing the security code with an already stored code, such that the electronic apparatus is enabled if the security code is a valid authorisation code, characterised in that the second data store, is disposed on or within a detachable rechargeable battery unit.
6. A method according to Claim 5 wherein the security code is transmitted to the apparatus more than once.
7. A method according to either of claims 5 or 6 wherein a security code stored in the second store is automatically erased when the battery is spent.
8. A method according to Claim 7 wherein the battery unit is placed in a battery recharger and a new security code is generated by the battery recharger.
9. A method according to Claim 8 in which the security code is encrypted.
10. A modified battery charger comprising: means for enabling a security code to be entered; means to store said security code; means to supply an electric current in order to recharge a battery unit in electrical contact with the charger and means to transmit said security code to the battery unit whilst the battery is recharging.
11. A battery unit comprising a rechargeable battery and a data store, within which data store a security code is written.
- 1 J-
PCT/GB1996/003177 1995-12-21 1996-12-20 An electronic anti-theft apparatus and related method WO1997023986A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP96942527A EP0868806A1 (en) 1995-12-21 1996-12-20 An electronic anti-theft apparatus and related method
KR1019980704652A KR19990076581A (en) 1995-12-21 1996-12-20 Electronic anti-theft device and its method
JP09523411A JP2000517487A (en) 1995-12-21 1996-12-20 Electronic anti-theft device and related method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9526235.8 1995-12-21
GBGB9526235.8A GB9526235D0 (en) 1995-12-21 1995-12-21 An electronic anti-theft method and related apparatus

Publications (1)

Publication Number Publication Date
WO1997023986A1 true WO1997023986A1 (en) 1997-07-03

Family

ID=10785864

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1996/003177 WO1997023986A1 (en) 1995-12-21 1996-12-20 An electronic anti-theft apparatus and related method

Country Status (6)

Country Link
EP (1) EP0868806A1 (en)
JP (1) JP2000517487A (en)
KR (1) KR19990076581A (en)
CA (1) CA2240862A1 (en)
GB (1) GB9526235D0 (en)
WO (1) WO1997023986A1 (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2324684A (en) * 1997-02-24 1998-10-28 Nec Corp Mobile Telephone with Anti-theft Security Function
EP0898254A2 (en) * 1997-08-16 1999-02-24 Robert Bosch Gmbh Anti-theft device for an apparatus
WO2000057375A1 (en) * 1999-03-19 2000-09-28 British Telecommunications Public Limited Company Security systems
WO2000070564A1 (en) * 1999-04-29 2000-11-23 Uwe Luboch Method and device for interrupting the operation of a device and use of said method or said device
GB2361567A (en) * 2000-04-18 2001-10-24 Mitel Corp Hardware authentication
GB2387998A (en) * 2002-04-26 2003-10-29 Motorola Inc Mobile communication system with external electronic key that prevents unauthorised change of handset PIN code
GB2396261A (en) * 2002-11-15 2004-06-16 Malcolm Mccallum Secure charger and portable electronic device
WO2004112363A1 (en) * 2003-06-18 2004-12-23 Philips Intellectual Property & Standards Gmbh Anti-theft system for mobile electronic devices
GB2408180A (en) * 2003-10-17 2005-05-18 Darren Michael Blackwood Personal communications device immobilizer
GB2416652A (en) * 2004-11-26 2006-02-01 Sony Computer Entertainment Inc Authentication between a battery and a device using the battery by means of encrypted challenge codes
GB2424344A (en) * 2005-03-18 2006-09-20 Motorola Inc Charging of a portable handset battery when correct user PIN is entered
WO2007057037A1 (en) * 2005-11-18 2007-05-24 Metabowerke Gmbh Electric hand tool device and battery pack therefor
WO2011107119A1 (en) * 2010-03-05 2011-09-09 Husqvarna Ab Battery powered product
US8525473B2 (en) 2006-08-31 2013-09-03 Kabushiki Kaisha Tokai Rika Denki Seisakusho Charging system for hybrid and electric vehicles including an authentication management device arranged in the household
US9466198B2 (en) 2013-02-22 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US9467862B2 (en) 2011-10-26 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US9756402B2 (en) 2015-05-04 2017-09-05 Milwaukee Electric Tool Corporation Power tool and method for wireless communication
US10131043B2 (en) 2013-10-21 2018-11-20 Milwaukee Electric Tool Corporation Adapter for power tool devices
US10149142B2 (en) 2016-06-06 2018-12-04 Milwaukee Electric Tool Corporation System and method for establishing a wireless connection between power tool and mobile device
US10158213B2 (en) 2013-02-22 2018-12-18 Milwaukee Electric Tool Corporation Worksite power distribution box
US10295990B2 (en) 2015-05-18 2019-05-21 Milwaukee Electric Tool Corporation User interface for tool configuration and data capture
US10380883B2 (en) 2015-06-16 2019-08-13 Milwaukee Electric Tool Corporation Power tool profile sharing and permissions
US11622392B2 (en) 2016-06-06 2023-04-04 Milwaukee Electric Tool Corporation System and method for establishing a wireless connection between power tool and mobile device
US11763610B2 (en) 2018-09-13 2023-09-19 Milwaukee Electric Tool Corporation Anti-theft systems and devices for battery-powered power tools

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6819248B2 (en) * 2002-10-30 2004-11-16 Bradley L. Gotfried System for preventing access
JP4833224B2 (en) * 2005-12-09 2011-12-07 パナソニック株式会社 Information communication terminal device and automatic backup system including the device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3803357A1 (en) * 1988-02-05 1989-08-17 Philips Patentverwaltung Electric device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3803357A1 (en) * 1988-02-05 1989-08-17 Philips Patentverwaltung Electric device

Cited By (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU748362B2 (en) * 1997-02-24 2002-06-06 Nec Corporation Portable telephone apparatus with security function
US6212410B1 (en) 1997-02-24 2001-04-03 Nec Corporation Portable telephone apparatus with security function
GB2324684B (en) * 1997-02-24 2001-07-25 Nec Corp Portable telephone apparatus with security function
GB2324684A (en) * 1997-02-24 1998-10-28 Nec Corp Mobile Telephone with Anti-theft Security Function
EP0898254A2 (en) * 1997-08-16 1999-02-24 Robert Bosch Gmbh Anti-theft device for an apparatus
EP0898254A3 (en) * 1997-08-16 1999-12-29 Robert Bosch Gmbh Anti-theft device for an apparatus
WO2000057375A1 (en) * 1999-03-19 2000-09-28 British Telecommunications Public Limited Company Security systems
WO2000070564A1 (en) * 1999-04-29 2000-11-23 Uwe Luboch Method and device for interrupting the operation of a device and use of said method or said device
GB2361567B (en) * 2000-04-18 2004-02-11 Mitel Corp Hardware authentication system and method
GB2361567A (en) * 2000-04-18 2001-10-24 Mitel Corp Hardware authentication
US6931533B2 (en) 2000-04-18 2005-08-16 Mitel Knowledge Corporation Removable hardware device authentication system and method
GB2387998A (en) * 2002-04-26 2003-10-29 Motorola Inc Mobile communication system with external electronic key that prevents unauthorised change of handset PIN code
GB2396261A (en) * 2002-11-15 2004-06-16 Malcolm Mccallum Secure charger and portable electronic device
WO2004112363A1 (en) * 2003-06-18 2004-12-23 Philips Intellectual Property & Standards Gmbh Anti-theft system for mobile electronic devices
GB2408180B (en) * 2003-10-17 2007-06-13 Darren Michael Blackwood Personal communication devices
GB2408180A (en) * 2003-10-17 2005-05-18 Darren Michael Blackwood Personal communications device immobilizer
GB2416652A (en) * 2004-11-26 2006-02-01 Sony Computer Entertainment Inc Authentication between a battery and a device using the battery by means of encrypted challenge codes
GB2416652B (en) * 2004-11-26 2006-08-16 Sony Computer Entertainment Inc Battery and authentication requesting device
US7949872B2 (en) 2004-11-26 2011-05-24 Sony Computer Entertainment Inc. Battery and authentication requesting device
US7617395B2 (en) 2004-11-26 2009-11-10 Sony Computer Entertainment Inc. Battery and authentication requesting device
GB2424344A (en) * 2005-03-18 2006-09-20 Motorola Inc Charging of a portable handset battery when correct user PIN is entered
GB2424344B (en) * 2005-03-18 2007-05-23 Motorola Inc Portable communication handset unit and a method of operation of such a unit
US8169298B2 (en) * 2005-11-18 2012-05-01 Metabowerke Gmbh Electric hand tool device and battery pack therefor
WO2007057037A1 (en) * 2005-11-18 2007-05-24 Metabowerke Gmbh Electric hand tool device and battery pack therefor
US8525473B2 (en) 2006-08-31 2013-09-03 Kabushiki Kaisha Tokai Rika Denki Seisakusho Charging system for hybrid and electric vehicles including an authentication management device arranged in the household
WO2011107119A1 (en) * 2010-03-05 2011-09-09 Husqvarna Ab Battery powered product
US11871232B2 (en) 2011-10-26 2024-01-09 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10237742B2 (en) 2011-10-26 2019-03-19 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US9467862B2 (en) 2011-10-26 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US12089047B2 (en) 2011-10-26 2024-09-10 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US11159942B2 (en) 2011-10-26 2021-10-26 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US11937086B2 (en) 2011-10-26 2024-03-19 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10531304B2 (en) 2011-10-26 2020-01-07 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10631120B2 (en) 2013-02-22 2020-04-21 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US11749975B2 (en) 2013-02-22 2023-09-05 Milwaukee Electric Tool Corporation Worksite power distribution box
US10158213B2 (en) 2013-02-22 2018-12-18 Milwaukee Electric Tool Corporation Worksite power distribution box
US9949075B2 (en) 2013-02-22 2018-04-17 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US9466198B2 (en) 2013-02-22 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10727653B2 (en) 2013-02-22 2020-07-28 Milwaukee Electric Tool Corporation Worksite power distribution box
US10285003B2 (en) 2013-02-22 2019-05-07 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US12059779B2 (en) 2013-10-21 2024-08-13 Milwaukee Electric Tool Corporation Power tool communication system
US11738426B2 (en) 2013-10-21 2023-08-29 Milwaukee Electric Tool Corporation Power tool communication system
US11541521B2 (en) 2013-10-21 2023-01-03 Milwaukee Electric Tool Corporation Power tool communication system
US10213908B2 (en) 2013-10-21 2019-02-26 Milwaukee Electric Tool Corporation Adapter for power tool devices
US10131042B2 (en) 2013-10-21 2018-11-20 Milwaukee Electric Tool Corporation Adapter for power tool devices
US10569398B2 (en) 2013-10-21 2020-02-25 Milwaukee Electric Tool Corporation Adaptor for power tool devices
US10967489B2 (en) 2013-10-21 2021-04-06 Milwaukee Electric Tool Corporation Power tool communication system
US10131043B2 (en) 2013-10-21 2018-11-20 Milwaukee Electric Tool Corporation Adapter for power tool devices
US10136198B2 (en) 2015-05-04 2018-11-20 Milwaukee Electric Tool Corporation Power tool and method for wireless communication
US10277964B2 (en) 2015-05-04 2019-04-30 Milwaukee Electric Tool Corporation Power tool and method for wireless communication
US9756402B2 (en) 2015-05-04 2017-09-05 Milwaukee Electric Tool Corporation Power tool and method for wireless communication
US9888300B2 (en) 2015-05-04 2018-02-06 Milwaukee Electric Tool Corporation Power tool and method for wireless communication
US10979786B2 (en) 2015-05-04 2021-04-13 Milwaukee Electric Tool Corporation Power tool and method for wireless communication
US11871167B2 (en) 2015-05-04 2024-01-09 Milwaukee Electric Tool Corporation Power tool and method for wireless communication
US10516920B2 (en) 2015-05-04 2019-12-24 Milwaukee Electric Tool Corporation Power tool and method for wireless communication
US10735833B2 (en) 2015-05-04 2020-08-04 Milwaukee Electric Tool Corporation Power tool and method for wireless communication
US11483633B2 (en) 2015-05-04 2022-10-25 Milwaukee Electric Tool Corporation Power tool and method for wireless communication
US10976726B2 (en) 2015-05-18 2021-04-13 Milwaukee Electric Tool Corporation User interface for tool configuration and data capture
US10838407B2 (en) 2015-05-18 2020-11-17 Milwaukee Electric Tool Corporation User interface for tool configuration and data capture
US11599093B2 (en) 2015-05-18 2023-03-07 Milwaukee Electric Tool Corporation User interface for tool configuration and data capture
US10295990B2 (en) 2015-05-18 2019-05-21 Milwaukee Electric Tool Corporation User interface for tool configuration and data capture
US11886168B2 (en) 2015-05-18 2024-01-30 Milwaukee Electric Tool Corporation User interface for tool configuration and data capture
US11256234B2 (en) 2015-05-18 2022-02-22 Milwaukee Electric Tool Corporation User interface for tool configuration and data capture
US11423768B2 (en) 2015-06-16 2022-08-23 Milwaukee Electric Tool Corporation Power tool profile sharing and permissions
US10380883B2 (en) 2015-06-16 2019-08-13 Milwaukee Electric Tool Corporation Power tool profile sharing and permissions
US11622392B2 (en) 2016-06-06 2023-04-04 Milwaukee Electric Tool Corporation System and method for establishing a wireless connection between power tool and mobile device
US10149142B2 (en) 2016-06-06 2018-12-04 Milwaukee Electric Tool Corporation System and method for establishing a wireless connection between power tool and mobile device
US12048030B2 (en) 2016-06-06 2024-07-23 Milwaukee Electric Tool Corporation System and method for establishing a wireless connection between power tool and mobile device
US10582368B2 (en) 2016-06-06 2020-03-03 Milwaukee Electric Tool Corporation System and method for establishing a wireless connection between power tool and mobile device
US10382942B2 (en) 2016-06-06 2019-08-13 Milwaukee Electric Tool Corporation System and method for establishing a wireless connection between power tool and mobile device
US11763610B2 (en) 2018-09-13 2023-09-19 Milwaukee Electric Tool Corporation Anti-theft systems and devices for battery-powered power tools

Also Published As

Publication number Publication date
JP2000517487A (en) 2000-12-26
CA2240862A1 (en) 1997-07-03
EP0868806A1 (en) 1998-10-07
GB9526235D0 (en) 1996-02-21
KR19990076581A (en) 1999-10-15

Similar Documents

Publication Publication Date Title
EP0868806A1 (en) An electronic anti-theft apparatus and related method
US3806874A (en) Identification system for individuals
GB2288049A (en) A vehicle security device with electronic use-authorization coding
US6510517B1 (en) Method of cryptological authentification in a scanning identification system
US5530431A (en) Anti-theft device for protecting electronic equipment
US5600723A (en) Cryptographically secure electric fuel pump system
JP3558488B2 (en) Cryptographic communication system
US4288778A (en) Electronic theft prevention apparatus for vehicles
JP2784309B2 (en) Remote control security system
GB2288050A (en) Vehicle security device with electronic use-authorization coding
US6225889B1 (en) Method of producing rolling code and keyless entry apparatus using the same
RU2187147C2 (en) Stealing protection device
JPS6143750B2 (en)
FR2645303A1 (en) PORTABLE SECURITY SEMICONDUCTOR MEMORY DEVICE
JP2000159063A (en) Device for identifying user of vehicle
JPS58181349A (en) Communication system
CN101582770B (en) Authentication system, authentication request device and control method thereof
GB2229025A (en) Safeguarding electrical apparatus
CN1596018A (en) Method and apparatus for preventing mobile terminal from being illegally used
US20060148449A1 (en) Anti-theft system for mobile electronic devices
GB2294787A (en) Electronic device and method of cloning
JPS627251A (en) Multifunctional telephone set
EP0970287A1 (en) Automatic resynchronization for remote keyless entry systems
CN100545406C (en) Remote control password lock device and control method thereof based on identification
JPH0533419B2 (en)

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA JP KR US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref document number: 2240862

Country of ref document: CA

Ref country code: CA

Ref document number: 2240862

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1019980704652

Country of ref document: KR

ENP Entry into the national phase

Ref country code: JP

Ref document number: 1997 523411

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1996942527

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1996942527

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1019980704652

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1019980704652

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1996942527

Country of ref document: EP