WO2001073711A2 - Procede et dispositif de protection antivol d'un appareil - Google Patents

Procede et dispositif de protection antivol d'un appareil Download PDF

Info

Publication number
WO2001073711A2
WO2001073711A2 PCT/DE2001/001057 DE0101057W WO0173711A2 WO 2001073711 A2 WO2001073711 A2 WO 2001073711A2 DE 0101057 W DE0101057 W DE 0101057W WO 0173711 A2 WO0173711 A2 WO 0173711A2
Authority
WO
WIPO (PCT)
Prior art keywords
theft
identifier
stored
devices
appliance
Prior art date
Application number
PCT/DE2001/001057
Other languages
German (de)
English (en)
Other versions
WO2001073711A3 (fr
Inventor
Matthias Herrmann
Original Assignee
Robert Bosch Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Robert Bosch Gmbh filed Critical Robert Bosch Gmbh
Publication of WO2001073711A2 publication Critical patent/WO2001073711A2/fr
Publication of WO2001073711A3 publication Critical patent/WO2001073711A3/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • G08B13/1418Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles

Definitions

  • the invention relates to an anti-theft device for a first device, which is coupled to at least one second device, comprising a detection device which can detect a separation between the first and second devices and can then switch the first device to an anti-theft state. Furthermore, the invention comprises a method for protecting a first device, which is coupled to at least one second device, against theft, wherein a separation between the first and second device is recognized and then at least one of the devices is switched into an anti-theft protection state.
  • a further disadvantage of the known methods for protecting a device from theft is that its effect is always limited to a specific device, although the devices to be protected are generally used in a networked system of several components.
  • components such as a CD changer, an IR remote control or other external drives (DVD) can be connected.
  • DVD external drives
  • the protection of the anti-theft device does not extend to these components, although as a rule they also represent a considerable value.
  • the anti-theft device is therefore effective or integrated in a first device which is coupled to at least one second device. It contains a detection device which can recognize the separation between the first and second device and can then switch the first device into an anti-theft protection state.
  • the anti-theft device is characterized in that said detection device contains a configuration memory in which an individual identifier of the second device can be stored. Furthermore, the detection device is set up in such a way that it can make a comparison of the stored identifier mentioned with an identifier transmitted by the second device and that it can activate the anti-theft protection state upon detection of a discrepancy between the stored and the transmitted identifier.
  • the theft protection device accordingly recognizes a potential theft by the fact that the first device to be protected is separated from a second device.
  • the first device can be a car radio and the second device can be the car itself.
  • the separation of the first device from the second device is recognized by the fact that the individual identifier transmitted by the second device no longer corresponds to the identifier that is stored in the configuration memory of the theft protection device.
  • the first device to be protected only works if it is coupled to an individually determined second device. If, on the other hand, it is separated from the second device and, for example, coupled to another device - which is otherwise completely identical - it detects the change of device based on the different individual identifiers and then changes to the theft protection state. It is therefore not possible to remove (steal) the first device from a type X vehicle and to insert it into another type X vehicle of identical construction, since the two Vehicles (second devices) can be distinguished from the first device based on their individual identification.
  • the anti-theft device manages without constant confirmation of the access authorization by the user. This means that the user does not have to enter a code or insert a key element for each start of operation by the device. Rather, the device recognizes its use in an authorized environment by the fact that it is coupled to a second device that it knows and for which it has been configured.
  • the anti-theft device can contain an input device, which is set up in such a way that it can check an access authorization and, if there is an existing access authorization, enable the configuration memory to be changed.
  • an input device enables the authorized user to use the first device to be protected with other second devices or in another networked configuration.
  • the car radio is installed in the new motor vehicle, verifying his access authorization via the input device and then occupying the configuration memory of the anti-theft device of the car radio with the individual identifier of the new motor vehicle , The latter can be done, for example, by entering a command, whereupon the data transmitted by the new motor vehicle are transferred to the configuration memory. After completing this procedure, the car radio is "stamped" on the new motor vehicle, so that from then on it will only perform its service if a coupling to this new motor vehicle is determined on the basis of the matching identifiers.
  • the advantage here is that the proof of access authorization by the user is only necessary in the rare cases of changing the configuration of the environment of the device to be protected.
  • the input device mentioned is preferably also set up in such a way that it enables the configuration memory of another theft protection device of the type mentioned above, which is arranged in a second device, to be changed. This means that the proof of access authorization only has to be made once on a (first) device and that the configuration memory of all theft protection devices of devices in the networked environment can then be changed from this first device so that they correspond to the new configuration.
  • the input device preferably contains a reading device for a chip card, since such a chip card enables a convenient and reliable check of the access authorization of a user.
  • the anti-theft device has a memory for its own individual identifier and is set up in such a way that it can transmit this own identifier to another connected device.
  • Such an anti-theft device can thus cooperate with similar anti-theft devices on other devices in the networked environment.
  • the devices coupled to one another protect one another or have an individual configuration pattern, the fault or change of which is recognized by all components and allows all components to activate a theft protection state.
  • the provision of an individual identifier in the anti-theft device itself also has the advantage that such an identifier does not have to be provided in the respective device.
  • the manufacturer of such a device can therefore use an anti-theft device as a finished assembly in his device without knowing its mode of operation or having to provide the device with an individual identifier for the device.
  • the control of a clear assignment of individual identifiers can be carried out centrally from a single source at the manufacturer of the theft protection devices.
  • the invention also includes a method for protecting a first device against theft, the first device being coupled to at least one second device. The method detects a separation between the first and the second device and switches at least one of the devices into an anti-theft state after detection of such a separation.
  • the method is characterized in that an individual identifier of the second device is stored in the first device, that this stored identifier is compared with an identifier transmitted by the second device, and that if a discrepancy is found between the stored and the transmitted identifier, the theft protection state of the first device is activated.
  • the two devices connected to one another are thus protected against theft by converting them to an anti-theft state when a separation between the devices occurs.
  • the comparison between a stored individual identifier of the second device and a transmitted identifier of this device serves to determine the separation between the devices. If the two identifiers do not match, this indicates that the first device has been disconnected from the second device and connected to another device. This is interpreted as an indication of a potential theft, for example by removing the device from a first motor vehicle and installing it in a second motor vehicle.
  • the second device can also store an individual identifier of the first device in a mirror-image manner, compare this stored identifier with an identifier transmitted by the first device and activate the theft protection state of the second device if a discrepancy between the identifiers is found.
  • the method works completely symmetrically with regard to the first and second devices, that is to say when the disconnection and connection of another device with a different individual identifier occurs, the anti-theft protection state is activated in each of the original devices. It is therefore easy and inexpensive It is possible to protect all components of a networked system against theft.
  • changing the identifier of the second device stored in the first device and / or (if present) the identifier of the first device stored in the second device is only possible with an access authorization which is checked by the first device. It must be possible to change stored identifiers so that a device protected against theft can also be used with other devices and in other configurations at the request of the authorized owner. So that such an authorized configuration change can be distinguished from an unauthorized configuration change in the event of theft, the first device checks the user's access authorization for the storage of the identifiers. If the second device coupled to the first device is also protected by a method according to the invention and accordingly has a memory for the identification of the first device, access to this memory is preferably possible from the first device. This means that only one of the devices in a networked system requires devices for changing identifiers and for checking access authorization and that all other devices in the system can then be reconfigured from this device.
  • FIG. 1 schematically shows a networked system of devices protected against theft
  • Fig. 2 shows schematically the more detailed structure of a device protected against theft. Best way to carry out the invention
  • FIG. 1 five devices 20-24, which are coupled to one another in a ring, are shown as examples.
  • the networked system can be, for example, a music system and / or a driver information system (FIS).
  • a head unit 20, a tuner 21, a CDC 22, a telephone 23 and an amplifier 24 are shown as examples as devices. Because of the networking, the devices 20 - 24 can exchange any information with one another.
  • FIG 2 shows schematically the internal structure of the device 20 of the networked system of Figure 1 with an anti-theft device according to the invention.
  • the other components 21-24 are constructed in a similar manner in principle, the respective device function being represented by a block 13.
  • the core of the anti-theft device is a protected memory area 10, which has a memory 11 for its own individual identification of the device 20 and a memory 12 for an encrypted system configuration.
  • the individual identifiers of the other devices 21-24 are stored in the last-mentioned memory 12.
  • each device 20-24 checks on the basis of the system configuration 12 present in its protected memory area 10 whether the individual identifiers of the other devices stored there are also present in the current environment. This means that the devices 20-24 exchange their respective identifiers with one another and each of the devices compares the identifiers transmitted by the other devices with the identifiers stored in the memory 12. If all the identifiers of the other devices 21-24 received by one device 20 match the corresponding identifiers stored in the configuration memory 12, the device 20 is in the environment into which it was legally introduced. There is therefore no evidence of theft and the device 20 can start operating. On the other hand, becomes a take up.
  • the method according to the invention does not require the cumbersome entry of a key in the form of a chip card or of an explicitly entered code each time it is used.
  • one of the devices 20 has an access option for an authorized user.
  • the user proves his access authorization to the device 20, for example by means of a chip card 25. From device 20, he can then make the desired configuration changes in device 20 and in all other devices 21-24.
  • the chip card 25 thus acts as a master key for the entire networked system. Proof of access authorization by the user, which is associated with expenditure, is only rarely necessary in this method, namely in the case of configuration changes or when setting up the system. In the subsequent operation, on the other hand, there is no longer any need to prove the access authorization, since the system uses the individual configuration with the other components to recognize whether it is in the correct environment or not.
  • each individual component 20-24 of the networked system of FIG. 1 can only be activated when all components of the system know each other and are present. If a component was removed from the system without authorization (stolen), it cannot be reactivated in an external system environment, which can consist of similar components.
  • the key is the system configuration itself and is therefore inherent in the system. A legal change in the system configuration, that is to say the legal addition or removal of a component 20-24, is only possible by means of a master key (for example chip card 25).
  • the described method has the advantage that key activation is only necessary once when the system is reconfigured, that all system components are protected, that only one key is required to protect all system components (cost reduction), and that there is no constant insertion or removal of Sharing (keys) is necessary.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

L'invention concerne un procédé de protection antivol d'appareils montés en réseau (20-24), selon lequel chacun des appareils présente une caractéristique individuelle, et les caractéristiques individuelles des autres appareils sont mémorisées dans une mémoire protégée. Lorsque le système est en service, un appareil (20) compare les caractéristiques individuelles transmises par les autres appareils (21-24) avec les caractéristiques mémorisées dans la mémoire dudit appareil. Lorsqu'on constate un écart entre les caractéristiques transmises et mémorisées, cela indique que l'appareil (20) est éloigné de l'environnement initial et est utilisé dans un autre environnement, ce qui est l'indice d'un vol et a pour effet que l'appareil (20) passe en l'état de protection antivol. Cet état de protection peut être de nouveau abandonné et/ou une configuration modifiée légalement du système peut être mémorisée par contrôle de l'autorisation d'accès, par exemple au moyen d'une carte à puce (25).
PCT/DE2001/001057 2000-03-28 2001-03-20 Procede et dispositif de protection antivol d'un appareil WO2001073711A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10015307.0A DE10015307B4 (de) 2000-03-28 2000-03-28 Verfahren und Vorrichtung zum Schutz eines Gerätes vor Diebstahl
DE10015307.0 2000-03-28

Publications (2)

Publication Number Publication Date
WO2001073711A2 true WO2001073711A2 (fr) 2001-10-04
WO2001073711A3 WO2001073711A3 (fr) 2002-08-08

Family

ID=7636642

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DE2001/001057 WO2001073711A2 (fr) 2000-03-28 2001-03-20 Procede et dispositif de protection antivol d'un appareil

Country Status (2)

Country Link
DE (1) DE10015307B4 (fr)
WO (1) WO2001073711A2 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008021874A1 (fr) * 2006-08-08 2008-02-21 Robert Poor Système de protection sans fil
CN104486601A (zh) * 2015-01-04 2015-04-01 安徽波维电子科技有限公司 卫星电视接收系统的户外单元防盗方法
EP2960119A1 (fr) * 2014-06-24 2015-12-30 Gemalto SA Véhicule comprenant des équipements munis d'éléments sécurisés

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2382441A (en) * 2001-11-24 2003-05-28 Roke Manor Research Theft deterrent system
DE10209766B4 (de) * 2002-03-05 2004-02-19 Daimlerchrysler Ag Komponententausch-Warnsystem
DE102006040228A1 (de) * 2006-08-28 2008-03-06 Giesecke & Devrient Gmbh Identifikationssystem
DE102007036094A1 (de) * 2007-08-01 2009-02-05 Volkswagen Ag Verfahren zur Diebstahlsicherung eines elektronischen Gerätes in einem Kraftfahrzeug und Diebstahlschutzvorrichtung für ein solches Gerät
US20090096573A1 (en) 2007-10-10 2009-04-16 Apple Inc. Activation of Cryptographically Paired Device
DE102010064360A1 (de) 2010-12-30 2012-07-05 Robert Bosch Gmbh Schutzeinrichtung
DE102019211497A1 (de) * 2019-08-01 2021-02-04 Audi Ag Kraftfahrzeug

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0767087A1 (fr) * 1995-10-06 1997-04-09 Ford Motor Company Limited Système de sécurité pour dispositif audio
WO1998043851A1 (fr) * 1997-03-28 1998-10-08 Daewoo Electronics Co., Ltd. Systeme audio pour voiture de type a carte ci et son procede d'utilisation
US5870018A (en) * 1996-05-20 1999-02-09 Chrysler Corporation Automotive radio anti-theft device via multiplex bus
EP0898254A2 (fr) * 1997-08-16 1999-02-24 Robert Bosch Gmbh Dispositif antivol pour un appareil
EP0967120A2 (fr) * 1998-06-27 1999-12-29 Robert Bosch Gmbh Dispositif de protection de composants reliés à un autoradio

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19526542A1 (de) 1995-07-20 1997-01-23 Vdo Schindling Einrichtung zum Schutz von Geräten in einem Kraftfahrzeug gegen Diebstahl

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0767087A1 (fr) * 1995-10-06 1997-04-09 Ford Motor Company Limited Système de sécurité pour dispositif audio
US5870018A (en) * 1996-05-20 1999-02-09 Chrysler Corporation Automotive radio anti-theft device via multiplex bus
WO1998043851A1 (fr) * 1997-03-28 1998-10-08 Daewoo Electronics Co., Ltd. Systeme audio pour voiture de type a carte ci et son procede d'utilisation
EP0898254A2 (fr) * 1997-08-16 1999-02-24 Robert Bosch Gmbh Dispositif antivol pour un appareil
EP0967120A2 (fr) * 1998-06-27 1999-12-29 Robert Bosch Gmbh Dispositif de protection de composants reliés à un autoradio

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008021874A1 (fr) * 2006-08-08 2008-02-21 Robert Poor Système de protection sans fil
EP2960119A1 (fr) * 2014-06-24 2015-12-30 Gemalto SA Véhicule comprenant des équipements munis d'éléments sécurisés
WO2015197722A1 (fr) * 2014-06-24 2015-12-30 Gemalto Sa Vehicule comprenant des equipements munis d'elements securises
CN104486601A (zh) * 2015-01-04 2015-04-01 安徽波维电子科技有限公司 卫星电视接收系统的户外单元防盗方法

Also Published As

Publication number Publication date
DE10015307B4 (de) 2018-10-11
WO2001073711A3 (fr) 2002-08-08
DE10015307A1 (de) 2001-10-04

Similar Documents

Publication Publication Date Title
EP0725743B1 (fr) Systeme de protection pour vehicule
DE19546775B4 (de) Datenverarbeitungsgerät für Fahrzeug
WO2000019580A1 (fr) Systeme de protection d'un module solaire
EP1000824B1 (fr) Dispositif de sécurité pour véhicule
DE19525180C5 (de) Elektronisches Steuergerät für ein Kraftfahrzeug mit Datennetzwerken und Wegfahrsperre
DE10021811A1 (de) Ausbausicherung für elektronische Komponenten bei einem Kraftfahrzeug
EP0600243B1 (fr) Procédé pour la prévention du vol d'une voiture automobile
DE10015307B4 (de) Verfahren und Vorrichtung zum Schutz eines Gerätes vor Diebstahl
WO2020002155A1 (fr) Procédé de blocage de composants de véhicule et composant de véhicule correspondant
WO2020260243A1 (fr) Système électronique de fermeture de portières
WO1998012084A1 (fr) Dispositif servant a empecher le vol d'un vehicule
EP3557660B1 (fr) Véhicule électrique avec câble de recharge
DE4301436A1 (de) Sicherungssystem
DE4325221C2 (de) Verfahren zum Einlesen einer Codierung eines Codeträgers in eine Identifizierungseinrichtung eines Kraftfahrzeuges und Identifizierungseinrichtung zur Durchführung des Verfahrens
EP0269965B1 (fr) Méthode et agencement d'interrupteurs pour prévenir le vol d'appareils, en particulier d'autoradios
DE4427267A1 (de) Diebstahlsicherung
DE102017113647B4 (de) Vorrichtung zur Nachrüstung eines Kraftfahrzeugs für den Betrieb in einem Mietwagen- oder Carsharing-System
EP1591902A2 (fr) Procédé de fonctionnement d'un organe de commande et organe de commande
DE102005031376B3 (de) Steuermodul und Verfahren zum Betreiben eines Kraftfahrzeugs
WO2005087556A1 (fr) Systeme d'autorisation de conduite, element d'authentification associe et procede d'alimentation en energie
DE19529666C1 (de) Verfahren zum Initialisieren eines Diebstahlschutzsystems für ein Kraftfahrzeug
DE102007005068B3 (de) Diebstahlsicherungssystem
DE19520505A1 (de) Wegfahrsperre
DE102022003679A1 (de) Elektronische Wegfahrsperre für ein Fahrzeug und Verfahren zur Herstellung einer elektronischen Wegfahrsperre
EP0711892B1 (fr) Procédé destiné à synchroniser deux unités conversationnelles sur un signal codé dans une installation de verrouillage d'un véhicule à moteur

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

122 Ep: pct application non-entry in european phase
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
NENP Non-entry into the national phase

Ref country code: JP