WO2007062654A2 - A method and a system for theft protection of electronic equipment - Google Patents
A method and a system for theft protection of electronic equipment Download PDFInfo
- Publication number
- WO2007062654A2 WO2007062654A2 PCT/DK2006/000673 DK2006000673W WO2007062654A2 WO 2007062654 A2 WO2007062654 A2 WO 2007062654A2 DK 2006000673 W DK2006000673 W DK 2006000673W WO 2007062654 A2 WO2007062654 A2 WO 2007062654A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- equipment
- software program
- time
- embedded software
- internet portal
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Definitions
- This invention relates to a method and a theft prevention system for use with electronic equipment such as flat screens, DVD-players, DVD-recorders, stereos, stationary and portable PCs, projectors etc.
- This system combines blocking and recovery functions in an, until now, unknown type of theft prevention system for use with electronic equipment connected to the Internet or prepared to be connected to the Internet.
- a first aspect of the present invention is a method of theft protection of electronic equipment being connected periodically or permanently to the Internet
- the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, the embedded software program ensuring that the equipment communicates with an Internet portal and preventing that the embedded software program be replaced by another embedded software program, when the embedded software program has been written into the equipment,
- an activation e.g. a first use of the equipment, a registration number of the equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,
- a thief or a buyer of stolen equipment being identified by my means of the IP address associated with the thief or the buyer, the registration number of the equipment and the unique number associated with the equipment being provided by means of a barcode, the equipment comprising for example a TV, a flat screen, a DVD player, a DVD recorder, a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of the examples.
- the invention comprises a system for theft protection of electronic equipment being connected periodic or permanent to the Internet, i) the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, the embedded software program ensuring that the equipment communicates with an Internet portal and preventing that the embedded software program be replaced by another embedded software program, when the embedded software program has been written into the equipment,
- an activation e.g. a first use of the equipment, a registration number of the equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,
- a thief or a buyer of stolen equipment being identified by my means of the IP address associated with the thief or the buyer, the registration number of the equipment and the unique number associated with the equipment being provided by means of a barcode, the equipment comprising for example a TV, a flat screen, a DVD player, a
- DVD recorder a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of the examples.
- fig. 1 shows a system and a method of the invention
- fig. 2 shows a certificate
- fig. 3 shows a printout browser certificate
- fig. 4 and 5 show the component layout of a prototype version of the electronics
- fig. 6 shows the main components of the prototype
- figs. 7a - 10 show the electronics in more details.
- the same abbreviations indicate identical elements or variables.
- variables or elements identical to variables or elements, respectively, described previously with reference to a preceding Figure are designated by the same text, symbol or abbreviation.
- the system and the method comprise
- Each protected piece of equipment is accompanied by a safety certificate used when registering the equipment at the retailer's.
- each piece of equipment is usually fitted with a certain type of software by integrating or embedding it into the internal processor of the equipment for the sake of handling connection and data transfer procedures.
- This software ensures that the equipment is able to communicate with the Internet portal administering the theft prevention system. Once integrated, the software cannot be replaced by another type of software in an attempt to break the theft protection.
- the equipment is configured for periodic or permanent connection to the Internet.
- the equipment is accompanied by a certificate containing
- the retailer will scan the two bar codes listed in the accompanying certificate as well as the ID-number of the retail outlet, alternatively he will enter the numbers associated with the barcodes. These bar codes or numbers are then stored on the Internet portal administering the theft protection system.
- the Internet portal automatically asks whether or not theft protection has been registered for this particular piece of equipment, and the buyer will answer "yes" to this question. From this point onwards, the equipment will be protected against theft through the present invention.
- the IP-address of the equipment - or an IP-address associated with the equipment - as well as the time of registration onto the Internet portal are stored along with the certificate and equipment numbers, which were scanned at the retailer.
- time units When the equipment is registered and connected to the Internet portal for the first time, it is automatically provided with a number of time units (ticks) needed for it to work.
- the number of time units, which are transferred each time the equipment is activated, has been set at a standard level, however, the user or consumer may select a different number within a certain range.
- the time units are used each time the equipment is activated.
- the equipment At regular intervals, and before the equipment runs out of time units, it automatically requests a new set of time units from the Internet portal. Before the units are transferred, the equipment IP-address and the exact point of time of registration are registered once again. If the equipment is removed from the Internet connection, the equipment will run out of time units and cease to work after a while.
- the equipment If the equipment is stolen at a time, when it contains no time units, it will not work, and if it does contain a certain number of time units, it will work until these run out.
- the time units run out i.e. they have been used up, and the equipment consequently no longer works, the equipment will attempt to be connected to the Internet portal - but my means of the IP address associated the thief - in order to receive further time units, and if the thief or buyer of stolen goods attempts to do so, the IP-address used by that person to connect the equipment, as well as the exact point of registration time, are registered on the portal.
- the equipment owner declares the equipment stolen, its location can be tracked down via the IP-address, and the police can pick the equipment up.
- the legal owner finds out theft of his equipment he can by means of the Internet portal select whether the stolen equipment no longer is to be provided with time units when the equipment is connected to the Internet portal, or that the stolen equipment is allowed to work until the police knocks on the door.
- the thief or a handler of stolen goods can be stopped and identified.
- the thief or buyer of stolen goods may be able to - unlawfully - use the equipment as long as it is connected to the Internet. This ensures that the equipment is not simply disposed off or destroyed, thus maintaining its resale value. However, the equipment will stop working once the time units run out.
- the equipment is also fitted with a "buffer" containing time units for the equipment to use when the server connection is down or inaccessible.
- a buffer containing time units for the equipment to use when the server connection is down or inaccessible.
- the equipment is only able to tap into the buffer once it has received an Internet failure notification, and once the buffer is empty, further time units must be downloaded for the equipment to work again.
- An empty buffer i.e. no time units remaining, will cause the equipment to close down and remain closed down until further time units have been downloaded to it.
- Theft protection can also be applied to portable equipment such as digital cameras, portable PCs etc. All it takes is for the equipment to be connected to the Internet, e.g. via a PC, when it needs to download further time units. Before leaving the house, the user needs to make sure that the equipment has been provided with enough time units to last through the period of time you will be using it offline.
- the retailer When the retailer registers the equipment, he/she registers the retailer ID- number (possibly also the sales person's ID-number), the equipment and certificate numbers, as well as date and time of registration, using a bar code reader or just entering the associated data or number.
- the retailer ID- number possibly also the sales person's ID-number
- the equipment and certificate numbers as well as date and time of registration, using a bar code reader or just entering the associated data or number.
- the technology used in this system is based on standardised forms of communication. Data exchange takes place using normal encryption through SSL (HTTPS), a recognised, secure form of communication. Equipment, which is able to communicate via the Internet, is bound to be based on such protocols. The only extra function that needs to be integrated into the equipment software is a means of measuring and loading running time, as well as storage space for the unique equipment identification certificate. Furthermore, various product/supplier-related functions may be included (service functions).
- a certificate is a number of databytes, which can only be validated if one has the key to the certificate, see Fig. 2.
- the certificate is stored on the equipment and in the database of the Internet portal.
- the key to the certificate is associated with the document and with the serial number (product serial number, product serial No., vide Fig. 1) it possible to unlock the certificate
- FIG. 3 An example of a browser certificate is shown in Fig. 3.
- the Figure illustrates a printout browser certificate. This is a Danish version of the browser certificate.
- the words as stated in Danish are in English as follows in the table below:
- the system comprises the following modules/units:
- Invoicing system General webservices for partners and customers/buyers/user
- Item 1 and 2 involve local physical special adaptation of applications and interfaces, the other items are in principle web-based screen images extended with a device, e.g. a standard barcode-reader/scanner, additionally or alternatively a keyboard and/or a mouse may be used to enter data
- a device e.g. a standard barcode-reader/scanner, additionally or alternatively a keyboard and/or a mouse may be used to enter data
- the database registers the following information
- a shared and /or common Internet portal is associated with all series of equipment and/or products sold or to be sold from the retailer.
- the Internet portal is used by the retailer to enter information - see the above tables - about each individual equipment or apparatus.
- the Internet portal is used by the user or buyer of the product or equipment to handle the equipment, and in case of theft to put forward a charge of theft.
- the Internet portal may be accessed to:
- the Internet portal may be accessed to:
- the Internet is connected to via P1.
- P1 it is possible to gain access to the status, e.g. number of ticks remaining, serial number, etc of the equipment.
- P1 it is possible from the Internet portal to gain access to the equipment, e.g. number of ticks used and/ or remaining, serial number, maintenance status of the equipment, etc. and if it turns out that the equipment is stolen the equipment may be shot down.
- Fig. 4 illustrates the component layout of a prototype version of the electronics.
- the prototype version of the electronics is e.g. an integral part of the equipment.
- Fig. 5 illustrates the component layout of a prototype version of the electronics.
- the primary, big components are illustrated e.g. the connector and the capacitors.
- Fig. 6 illustrates the main components of the prototype.
- the main components of the prototype are the circuit for the power supply and the main building blocks, i.e. the CPU, the network block, the memory block and the interface block.
- Figs. 7 - 10 illustrate the electronics in more details.
- Figs. 7a and 7b are to be laid side by side to connect A0-A23 and CS0-CS3 with one another.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
- Burglar Alarm Systems (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2006319589A AU2006319589A1 (en) | 2005-11-30 | 2006-11-30 | A method and a system for theft protection of electronic equipment |
EP06818133A EP1958115A2 (en) | 2005-11-30 | 2006-11-30 | A method and a system for theft protection of electronic equipment |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DKPA200501686 | 2005-11-30 | ||
DKPA200501686 | 2005-11-30 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007062654A2 true WO2007062654A2 (en) | 2007-06-07 |
WO2007062654A3 WO2007062654A3 (en) | 2007-10-04 |
Family
ID=37983552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/DK2006/000673 WO2007062654A2 (en) | 2005-11-30 | 2006-11-30 | A method and a system for theft protection of electronic equipment |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1958115A2 (en) |
AU (1) | AU2006319589A1 (en) |
WO (1) | WO2007062654A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103124281A (en) * | 2011-11-18 | 2013-05-29 | 联想移动通信科技有限公司 | Tracking information obtaining method and device of electronic device and electronic device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1041483A1 (en) * | 1999-03-30 | 2000-10-04 | International Business Machines Corporation | Discovering stolen or lost network-attachable computer systems |
WO2001084455A1 (en) * | 2000-04-27 | 2001-11-08 | Solagent, Inc. | Portable computing device communication system and method |
US20020016838A1 (en) * | 1999-12-17 | 2002-02-07 | Ceki Geluc | Scheme for blocking the use of lost or stolen network-connectable computer systems |
-
2006
- 2006-11-30 EP EP06818133A patent/EP1958115A2/en not_active Withdrawn
- 2006-11-30 WO PCT/DK2006/000673 patent/WO2007062654A2/en active Application Filing
- 2006-11-30 AU AU2006319589A patent/AU2006319589A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1041483A1 (en) * | 1999-03-30 | 2000-10-04 | International Business Machines Corporation | Discovering stolen or lost network-attachable computer systems |
US20020016838A1 (en) * | 1999-12-17 | 2002-02-07 | Ceki Geluc | Scheme for blocking the use of lost or stolen network-connectable computer systems |
WO2001084455A1 (en) * | 2000-04-27 | 2001-11-08 | Solagent, Inc. | Portable computing device communication system and method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103124281A (en) * | 2011-11-18 | 2013-05-29 | 联想移动通信科技有限公司 | Tracking information obtaining method and device of electronic device and electronic device |
Also Published As
Publication number | Publication date |
---|---|
AU2006319589A1 (en) | 2007-06-07 |
EP1958115A2 (en) | 2008-08-20 |
WO2007062654A3 (en) | 2007-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8432257B2 (en) | Merchandise-integral transaction receipt and auditable product ownership trail | |
EP1423771B1 (en) | Method to protect software against unauthorized use | |
USRE41227E1 (en) | System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection | |
US20150278487A1 (en) | Security scheme for authenticating digital entities and aggregate object origins | |
US20160098730A1 (en) | System and Method for Block-Chain Verification of Goods | |
US20060020821A1 (en) | System and method for data processing system planar authentication | |
US20090133131A1 (en) | Method and system for managing software licenses | |
US20050216420A1 (en) | Method and system for licensing a software product | |
US20100313037A1 (en) | Collectible case authentication system, device and method | |
WO1998004967A1 (en) | Immobilisation protection system for electronic components | |
JP2008293284A (en) | Commodity management system and method | |
WO2018125472A1 (en) | System and method for secure lock box with near proximity awareness | |
EP2255318A1 (en) | Theft-deterrent system and method | |
US20080005557A1 (en) | Method of authentication and ownership verification of collectibles | |
US20160100299A1 (en) | Communication Method And System To Process And Control The Legality Of Products | |
US20060080464A1 (en) | System and method of utilizing a MAC address based unlocking key | |
JP4214252B1 (en) | Management system and management program | |
WO2007062654A2 (en) | A method and a system for theft protection of electronic equipment | |
US20230161847A1 (en) | System and method for identifying ownership and managing transfer of ownership of premium goods | |
EP1174786A2 (en) | Method, system, and program for reusing software licenses with new computer hardware | |
US20080270306A1 (en) | System and method of theft detection of encoded encrypted software keyed genuine goods | |
WO2013021158A2 (en) | Auditing assets | |
JP4511645B2 (en) | Method and system for checking violation of use condition of copyrighted work, copyrighted product sales management server, general terminal and recording medium | |
BE1026075B1 (en) | SYSTEM FOR SAFE TRANSACTIONS | |
JP4472915B2 (en) | Ticket sales apparatus, admission management apparatus, method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2006818133 Country of ref document: EP |
|
NENP | Non-entry into the national phase in: |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006319589 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 3362/CHENP/2008 Country of ref document: IN |
|
ENP | Entry into the national phase in: |
Ref document number: 2006319589 Country of ref document: AU Date of ref document: 20061130 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2006319589 Country of ref document: AU |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 06818133 Country of ref document: EP Kind code of ref document: A2 |
|
WWP | Wipo information: published in national office |
Ref document number: 2006818133 Country of ref document: EP |