WO2007062654A2 - A method and a system for theft protection of electronic equipment - Google Patents

A method and a system for theft protection of electronic equipment Download PDF

Info

Publication number
WO2007062654A2
WO2007062654A2 PCT/DK2006/000673 DK2006000673W WO2007062654A2 WO 2007062654 A2 WO2007062654 A2 WO 2007062654A2 DK 2006000673 W DK2006000673 W DK 2006000673W WO 2007062654 A2 WO2007062654 A2 WO 2007062654A2
Authority
WO
WIPO (PCT)
Prior art keywords
equipment
software program
time
embedded software
internet portal
Prior art date
Application number
PCT/DK2006/000673
Other languages
French (fr)
Other versions
WO2007062654A3 (en
Inventor
Leif Henriksen
Ole Thielow
Orla Kristensen
Original Assignee
Deninvent Aps
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deninvent Aps filed Critical Deninvent Aps
Priority to AU2006319589A priority Critical patent/AU2006319589A1/en
Priority to EP06818133A priority patent/EP1958115A2/en
Publication of WO2007062654A2 publication Critical patent/WO2007062654A2/en
Publication of WO2007062654A3 publication Critical patent/WO2007062654A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Definitions

  • This invention relates to a method and a theft prevention system for use with electronic equipment such as flat screens, DVD-players, DVD-recorders, stereos, stationary and portable PCs, projectors etc.
  • This system combines blocking and recovery functions in an, until now, unknown type of theft prevention system for use with electronic equipment connected to the Internet or prepared to be connected to the Internet.
  • a first aspect of the present invention is a method of theft protection of electronic equipment being connected periodically or permanently to the Internet
  • the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, the embedded software program ensuring that the equipment communicates with an Internet portal and preventing that the embedded software program be replaced by another embedded software program, when the embedded software program has been written into the equipment,
  • an activation e.g. a first use of the equipment, a registration number of the equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,
  • a thief or a buyer of stolen equipment being identified by my means of the IP address associated with the thief or the buyer, the registration number of the equipment and the unique number associated with the equipment being provided by means of a barcode, the equipment comprising for example a TV, a flat screen, a DVD player, a DVD recorder, a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of the examples.
  • the invention comprises a system for theft protection of electronic equipment being connected periodic or permanent to the Internet, i) the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, the embedded software program ensuring that the equipment communicates with an Internet portal and preventing that the embedded software program be replaced by another embedded software program, when the embedded software program has been written into the equipment,
  • an activation e.g. a first use of the equipment, a registration number of the equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,
  • a thief or a buyer of stolen equipment being identified by my means of the IP address associated with the thief or the buyer, the registration number of the equipment and the unique number associated with the equipment being provided by means of a barcode, the equipment comprising for example a TV, a flat screen, a DVD player, a
  • DVD recorder a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of the examples.
  • fig. 1 shows a system and a method of the invention
  • fig. 2 shows a certificate
  • fig. 3 shows a printout browser certificate
  • fig. 4 and 5 show the component layout of a prototype version of the electronics
  • fig. 6 shows the main components of the prototype
  • figs. 7a - 10 show the electronics in more details.
  • the same abbreviations indicate identical elements or variables.
  • variables or elements identical to variables or elements, respectively, described previously with reference to a preceding Figure are designated by the same text, symbol or abbreviation.
  • the system and the method comprise
  • Each protected piece of equipment is accompanied by a safety certificate used when registering the equipment at the retailer's.
  • each piece of equipment is usually fitted with a certain type of software by integrating or embedding it into the internal processor of the equipment for the sake of handling connection and data transfer procedures.
  • This software ensures that the equipment is able to communicate with the Internet portal administering the theft prevention system. Once integrated, the software cannot be replaced by another type of software in an attempt to break the theft protection.
  • the equipment is configured for periodic or permanent connection to the Internet.
  • the equipment is accompanied by a certificate containing
  • the retailer will scan the two bar codes listed in the accompanying certificate as well as the ID-number of the retail outlet, alternatively he will enter the numbers associated with the barcodes. These bar codes or numbers are then stored on the Internet portal administering the theft protection system.
  • the Internet portal automatically asks whether or not theft protection has been registered for this particular piece of equipment, and the buyer will answer "yes" to this question. From this point onwards, the equipment will be protected against theft through the present invention.
  • the IP-address of the equipment - or an IP-address associated with the equipment - as well as the time of registration onto the Internet portal are stored along with the certificate and equipment numbers, which were scanned at the retailer.
  • time units When the equipment is registered and connected to the Internet portal for the first time, it is automatically provided with a number of time units (ticks) needed for it to work.
  • the number of time units, which are transferred each time the equipment is activated, has been set at a standard level, however, the user or consumer may select a different number within a certain range.
  • the time units are used each time the equipment is activated.
  • the equipment At regular intervals, and before the equipment runs out of time units, it automatically requests a new set of time units from the Internet portal. Before the units are transferred, the equipment IP-address and the exact point of time of registration are registered once again. If the equipment is removed from the Internet connection, the equipment will run out of time units and cease to work after a while.
  • the equipment If the equipment is stolen at a time, when it contains no time units, it will not work, and if it does contain a certain number of time units, it will work until these run out.
  • the time units run out i.e. they have been used up, and the equipment consequently no longer works, the equipment will attempt to be connected to the Internet portal - but my means of the IP address associated the thief - in order to receive further time units, and if the thief or buyer of stolen goods attempts to do so, the IP-address used by that person to connect the equipment, as well as the exact point of registration time, are registered on the portal.
  • the equipment owner declares the equipment stolen, its location can be tracked down via the IP-address, and the police can pick the equipment up.
  • the legal owner finds out theft of his equipment he can by means of the Internet portal select whether the stolen equipment no longer is to be provided with time units when the equipment is connected to the Internet portal, or that the stolen equipment is allowed to work until the police knocks on the door.
  • the thief or a handler of stolen goods can be stopped and identified.
  • the thief or buyer of stolen goods may be able to - unlawfully - use the equipment as long as it is connected to the Internet. This ensures that the equipment is not simply disposed off or destroyed, thus maintaining its resale value. However, the equipment will stop working once the time units run out.
  • the equipment is also fitted with a "buffer" containing time units for the equipment to use when the server connection is down or inaccessible.
  • a buffer containing time units for the equipment to use when the server connection is down or inaccessible.
  • the equipment is only able to tap into the buffer once it has received an Internet failure notification, and once the buffer is empty, further time units must be downloaded for the equipment to work again.
  • An empty buffer i.e. no time units remaining, will cause the equipment to close down and remain closed down until further time units have been downloaded to it.
  • Theft protection can also be applied to portable equipment such as digital cameras, portable PCs etc. All it takes is for the equipment to be connected to the Internet, e.g. via a PC, when it needs to download further time units. Before leaving the house, the user needs to make sure that the equipment has been provided with enough time units to last through the period of time you will be using it offline.
  • the retailer When the retailer registers the equipment, he/she registers the retailer ID- number (possibly also the sales person's ID-number), the equipment and certificate numbers, as well as date and time of registration, using a bar code reader or just entering the associated data or number.
  • the retailer ID- number possibly also the sales person's ID-number
  • the equipment and certificate numbers as well as date and time of registration, using a bar code reader or just entering the associated data or number.
  • the technology used in this system is based on standardised forms of communication. Data exchange takes place using normal encryption through SSL (HTTPS), a recognised, secure form of communication. Equipment, which is able to communicate via the Internet, is bound to be based on such protocols. The only extra function that needs to be integrated into the equipment software is a means of measuring and loading running time, as well as storage space for the unique equipment identification certificate. Furthermore, various product/supplier-related functions may be included (service functions).
  • a certificate is a number of databytes, which can only be validated if one has the key to the certificate, see Fig. 2.
  • the certificate is stored on the equipment and in the database of the Internet portal.
  • the key to the certificate is associated with the document and with the serial number (product serial number, product serial No., vide Fig. 1) it possible to unlock the certificate
  • FIG. 3 An example of a browser certificate is shown in Fig. 3.
  • the Figure illustrates a printout browser certificate. This is a Danish version of the browser certificate.
  • the words as stated in Danish are in English as follows in the table below:
  • the system comprises the following modules/units:
  • Invoicing system General webservices for partners and customers/buyers/user
  • Item 1 and 2 involve local physical special adaptation of applications and interfaces, the other items are in principle web-based screen images extended with a device, e.g. a standard barcode-reader/scanner, additionally or alternatively a keyboard and/or a mouse may be used to enter data
  • a device e.g. a standard barcode-reader/scanner, additionally or alternatively a keyboard and/or a mouse may be used to enter data
  • the database registers the following information
  • a shared and /or common Internet portal is associated with all series of equipment and/or products sold or to be sold from the retailer.
  • the Internet portal is used by the retailer to enter information - see the above tables - about each individual equipment or apparatus.
  • the Internet portal is used by the user or buyer of the product or equipment to handle the equipment, and in case of theft to put forward a charge of theft.
  • the Internet portal may be accessed to:
  • the Internet portal may be accessed to:
  • the Internet is connected to via P1.
  • P1 it is possible to gain access to the status, e.g. number of ticks remaining, serial number, etc of the equipment.
  • P1 it is possible from the Internet portal to gain access to the equipment, e.g. number of ticks used and/ or remaining, serial number, maintenance status of the equipment, etc. and if it turns out that the equipment is stolen the equipment may be shot down.
  • Fig. 4 illustrates the component layout of a prototype version of the electronics.
  • the prototype version of the electronics is e.g. an integral part of the equipment.
  • Fig. 5 illustrates the component layout of a prototype version of the electronics.
  • the primary, big components are illustrated e.g. the connector and the capacitors.
  • Fig. 6 illustrates the main components of the prototype.
  • the main components of the prototype are the circuit for the power supply and the main building blocks, i.e. the CPU, the network block, the memory block and the interface block.
  • Figs. 7 - 10 illustrate the electronics in more details.
  • Figs. 7a and 7b are to be laid side by side to connect A0-A23 and CS0-CS3 with one another.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

This invention relates to a method and a system for theft protection of electronic equipment being connected periodically or permanently to the Internet, the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, by a first use of the equipment, a registration number of the equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal, the registering of the first use of the equipment allowing subsequent use of the equipment in a predetermined period of time corresponding to a specific number of time units (ticks), after expiry of the predetermined period of time the electronic equipment being verified anew against the Internet portal as not having a charge of theft issued, thief or a buyer of stolen equipment can be identified by my means of the IP address associated with the thief or the buyer.

Description

A method and a system for theft protection of electronic equipment
This invention relates to a method and a theft prevention system for use with electronic equipment such as flat screens, DVD-players, DVD-recorders, stereos, stationary and portable PCs, projectors etc.
This system combines blocking and recovery functions in an, until now, unknown type of theft prevention system for use with electronic equipment connected to the Internet or prepared to be connected to the Internet.
It is an object of the invention to provide a method and a system, which each enhance the possibility to detect theft of electronic equipment.
Moreover, it is an object of the invention to provide for that a thief or buyer of stolen equipment can be identified.
Further, it is an object of the invention to provide that personal data of the buyer are not left at the retailer in order to prevent thieves to identify the location of the sold equipment.
The above objects, the above advantage, and the above feature together with numerous other objects, advantages, and features, which will be evident from the below detailed description of the present invention and are in accordance with the teaching of the present invention, are obtained by the following two aspects of the invention, where a first aspect of the present invention is a method of theft protection of electronic equipment being connected periodically or permanently to the Internet,
i) the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, the embedded software program ensuring that the equipment communicates with an Internet portal and preventing that the embedded software program be replaced by another embedded software program, when the embedded software program has been written into the equipment,
ii) by an activation, e.g. a first use of the equipment, a registration number of the equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,
iii) the registering of the first use of the equipment allowing subsequent use of the equipment in a predetermined period of time corresponding to a specific number of time units (ticks), and
iv) after expiry of the predetermined period of time the electronic equipment being verified anew against the Internet portal as not having a charge of theft issued, whereafter a subsequent use of the equipment is being allowed in a continued period of time corresponding to or different from the number of time units (ticks).
In a preferred embodiment of the invention, a thief or a buyer of stolen equipment being identified by my means of the IP address associated with the thief or the buyer, the registration number of the equipment and the unique number associated with the equipment being provided by means of a barcode, the equipment comprising for example a TV, a flat screen, a DVD player, a DVD recorder, a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of the examples.
According to a second aspect of the present invention, the invention comprises a system for theft protection of electronic equipment being connected periodic or permanent to the Internet, i) the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, the embedded software program ensuring that the equipment communicates with an Internet portal and preventing that the embedded software program be replaced by another embedded software program, when the embedded software program has been written into the equipment,
ii) by an activation, e.g. a first use of the equipment, a registration number of the equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,
In a preferred embodiment of the invention, a thief or a buyer of stolen equipment being identified by my means of the IP address associated with the thief or the buyer, the registration number of the equipment and the unique number associated with the equipment being provided by means of a barcode, the equipment comprising for example a TV, a flat screen, a DVD player, a
DVD recorder, a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of the examples.
The invention will be explained in more detail below in connection with the preferred embodiments and with reference to the drawings, in which:
fig. 1 shows a system and a method of the invention, fig. 2 shows a certificate, fig. 3 shows a printout browser certificate, fig. 4 and 5 show the component layout of a prototype version of the electronics, fig. 6 shows the main components of the prototype, figs. 7a - 10 show the electronics in more details. Throughout the drawings, the same abbreviations indicate identical elements or variables. In the present specification, variables or elements identical to variables or elements, respectively, described previously with reference to a preceding Figure are designated by the same text, symbol or abbreviation.
As shown in Fig. 1 the system and the method comprise
• Internet portal for handling various equipment codes, IP-addresses and connection time.
• Software extension, which is normally integrated into the equipment during production (licence based)
• Each protected piece of equipment is accompanied by a safety certificate used when registering the equipment at the retailer's.
During production, each piece of equipment is usually fitted with a certain type of software by integrating or embedding it into the internal processor of the equipment for the sake of handling connection and data transfer procedures. This software ensures that the equipment is able to communicate with the Internet portal administering the theft prevention system. Once integrated, the software cannot be replaced by another type of software in an attempt to break the theft protection. The equipment is configured for periodic or permanent connection to the Internet.
The equipment is accompanied by a certificate containing
a) Unique registration number (e.g. a bar code), and
b) Unique equipment number, e.g. also a bar code. These two numbers or bar codes are used when registering and thus theft protecting the equipment and theft protection is not completed until the equipment has been registered on the Internet portal.
When buying a piece of equipment, the buyer is able to choose whether or not to apply theft protection.
This may also be done at a later point of time, or not at all. If the buyer chooses to apply theft protection to the equipment, the retailer will scan the two bar codes listed in the accompanying certificate as well as the ID-number of the retail outlet, alternatively he will enter the numbers associated with the barcodes. These bar codes or numbers are then stored on the Internet portal administering the theft protection system. When the buyer connects the equipment to the Internet at home, the Internet portal automatically asks whether or not theft protection has been registered for this particular piece of equipment, and the buyer will answer "yes" to this question. From this point onwards, the equipment will be protected against theft through the present invention. The IP-address of the equipment - or an IP-address associated with the equipment - as well as the time of registration onto the Internet portal are stored along with the certificate and equipment numbers, which were scanned at the retailer.
When the equipment is registered and connected to the Internet portal for the first time, it is automatically provided with a number of time units (ticks) needed for it to work. The number of time units, which are transferred each time the equipment is activated, has been set at a standard level, however, the user or consumer may select a different number within a certain range. The time units are used each time the equipment is activated.
At regular intervals, and before the equipment runs out of time units, it automatically requests a new set of time units from the Internet portal. Before the units are transferred, the equipment IP-address and the exact point of time of registration are registered once again. If the equipment is removed from the Internet connection, the equipment will run out of time units and cease to work after a while.
If the equipment is stolen at a time, when it contains no time units, it will not work, and if it does contain a certain number of time units, it will work until these run out. When the time units run out, i.e. they have been used up, and the equipment consequently no longer works, the equipment will attempt to be connected to the Internet portal - but my means of the IP address associated the thief - in order to receive further time units, and if the thief or buyer of stolen goods attempts to do so, the IP-address used by that person to connect the equipment, as well as the exact point of registration time, are registered on the portal. When the equipment owner declares the equipment stolen, its location can be tracked down via the IP-address, and the police can pick the equipment up.
When the legal owner finds out theft of his equipment he can by means of the Internet portal select whether the stolen equipment no longer is to be provided with time units when the equipment is connected to the Internet portal, or that the stolen equipment is allowed to work until the police knocks on the door. Hereby the thief or a handler of stolen goods can be stopped and identified.
The thief or buyer of stolen goods may be able to - unlawfully - use the equipment as long as it is connected to the Internet. This ensures that the equipment is not simply disposed off or destroyed, thus maintaining its resale value. However, the equipment will stop working once the time units run out.
All have experienced Internet failure due to server breakdown or the like. In order to avoid the equipment not working in such situations, the equipment is also fitted with a "buffer" containing time units for the equipment to use when the server connection is down or inaccessible. When the equipment is used for the first time, it is provided with enough time units to make it work for predetermined number of days without connecting to the Internet and the supplying server. The equipment is only able to tap into the buffer once it has received an Internet failure notification, and once the buffer is empty, further time units must be downloaded for the equipment to work again. An empty buffer, i.e. no time units remaining, will cause the equipment to close down and remain closed down until further time units have been downloaded to it.
Theft protection can also be applied to portable equipment such as digital cameras, portable PCs etc. All it takes is for the equipment to be connected to the Internet, e.g. via a PC, when it needs to download further time units. Before leaving the house, the user needs to make sure that the equipment has been provided with enough time units to last through the period of time you will be using it offline.
When the retailer registers the equipment, he/she registers the retailer ID- number (possibly also the sales person's ID-number), the equipment and certificate numbers, as well as date and time of registration, using a bar code reader or just entering the associated data or number.
When the equipment is registered on the portal by the user connecting it to the Internet, a registration is made of the connected IP-address, the equipment's unique number and point of time of the Internet connection. Along with the equipment's certificate number, which is registered with the retailer, these pieces of information are transferred through an encrypted SSL-connection.
It is therefore an advantage that no personal data are left with the retailer. Accordingly a thief cannot obtain the data at the retailer to locate the physical place (address) of the equipment.
The technology used in this system is based on standardised forms of communication. Data exchange takes place using normal encryption through SSL (HTTPS), a recognised, secure form of communication. Equipment, which is able to communicate via the Internet, is bound to be based on such protocols. The only extra function that needs to be integrated into the equipment software is a means of measuring and loading running time, as well as storage space for the unique equipment identification certificate. Furthermore, various product/supplier-related functions may be included (service functions).
A certificate is a number of databytes, which can only be validated if one has the key to the certificate, see Fig. 2.
The certificate is stored on the equipment and in the database of the Internet portal. The key to the certificate is associated with the document and with the serial number (product serial number, product serial No., vide Fig. 1) it possible to unlock the certificate
An example of a browser certificate is shown in Fig. 3. The Figure illustrates a printout browser certificate. This is a Danish version of the browser certificate. The words as stated in Danish are in English as follows in the table below:
Translation of the Danish-language content in the rint screen of Fig. 3
Figure imgf000010_0001
The system comprises the following modules/units:
1) Software program embedded in equipment
2) Manufacturer interface in order to enable storing of the certificate in the equipment and possibly on-line generation of certificates
3) Retail-interface for handling (activation) of certificates
4) User-interface allowing the user/purchaser to handle their respective equipment
5) Equipment-interface, communication with equipment legally connected
6) Administration system for handling of manufacturers, retailers and users
7) Invoicing system 8) General webservices for partners and customers/buyers/user
Item 1 and 2 involve local physical special adaptation of applications and interfaces, the other items are in principle web-based screen images extended with a device, e.g. a standard barcode-reader/scanner, additionally or alternatively a keyboard and/or a mouse may be used to enter data
The database registers the following information
Table USERDATA
Figure imgf000011_0001
Table CERTDATA
Figure imgf000012_0001
Table LOGDATA
Figure imgf000013_0001
Table PRODLOG
Figure imgf000014_0001
In order to enable handling of systems and equipment a shared and /or common Internet portal is associated with all series of equipment and/or products sold or to be sold from the retailer. The Internet portal is used by the retailer to enter information - see the above tables - about each individual equipment or apparatus. Correspondingly, the Internet portal is used by the user or buyer of the product or equipment to handle the equipment, and in case of theft to put forward a charge of theft.
The Internet portal may be accessed to:
• Registering of equipment • Receiving of time units (ticks)
• Tracking or tracing of stolen equipment
• Charge of theft
Additionally, the Internet portal may be accessed to:
• Datacontrol of the equipment or apparatus
• (repair or maintenance control)
• New software versions to the equipment or other services The following Figures of the implementation of the invention are considered to be self-explanatory. The Internet is connected to via P1. By means of P1 it is possible to gain access to the status, e.g. number of ticks remaining, serial number, etc of the equipment. Further, through P1 it is possible from the Internet portal to gain access to the equipment, e.g. number of ticks used and/ or remaining, serial number, maintenance status of the equipment, etc. and if it turns out that the equipment is stolen the equipment may be shot down.
Fig. 4 illustrates the component layout of a prototype version of the electronics. The prototype version of the electronics is e.g. an integral part of the equipment.
Fig. 5 illustrates the component layout of a prototype version of the electronics. The primary, big components are illustrated e.g. the connector and the capacitors.
Fig. 6 illustrates the main components of the prototype. The main components of the prototype are the circuit for the power supply and the main building blocks, i.e. the CPU, the network block, the memory block and the interface block.
Figs. 7 - 10 illustrate the electronics in more details.
Figs. 7a and 7b are to be laid side by side to connect A0-A23 and CS0-CS3 with one another.

Claims

1. A method of theft protection of electronic equipment being connected periodically or permanently to the Internet,
i) the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, said embedded software program ensuring that the equipment communicates with an Internet portal and preventing that said embedded software program be replaced by another embedded software program, when said embedded software program has been written into the equipment,
ii) by an activation, e.g. a first use of the equipment, a registration number of said equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,
iii) said registering of said first use of the equipment allowing subsequent use of the equipment in a predetermined period of time corresponding to a specific number of time units (ticks), and
iv) after expiry of said predetermined period of time the electronic equipment being verified anew against said Internet portal as not having a charge of theft issued, whereafter a subsequent use of the equipment is being allowed in a continued period of time corresponding to or different from said number of time units (ticks).
2. The method according to claim 1, a thief or a buyer of stolen equipment being identified by my means of the IP address associated with said thief or said buyer.
3. The method according to claim 1 or 2, said registration number of said equipment and said unique number associated with the equipment being provided by means of a barcode.
4. The method according to claim 1 to 3, said equipment comprising for example a TV, a flat screen, a DVD player, a DVD recorder, a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of said examples.
5. A system for theft protection of electronic equipment being connected periodic or permanent to the Internet,
i) the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, said embedded software program ensuring that the equipment communicates with an Internet portal and preventing that said embedded software program be replaced by another embedded software program, when said embedded software program has been written into the equipment,
ii) by an activation, e.g. a first use of the equipment, a registration number of said equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,
iii) said registering of said first use of the equipment allowing subsequent use of the equipment in a predetermined period of time corresponding to a specific number of time units (ticks), and iv) after expiry of said predetermined period of time the electronic equipment being verified anew against said Internet portal as not having a charge of theft issued, whereafter a subsequent use of the equipment is being allowed in a continued period of time corresponding to or different from said number of time units (ticks).
6. The system according to claim 5, a thief or a buyer of stolen equipment being identified by my means of the IP address associated with said thief or said buyer.
7. The system according to claim 5 or 6, said registration number of said equipment and said unique number associated with the equipment being provided by means of a barcode.
8. The system according to claim 5 to 7, said equipment comprising for example a TV, a flat screen, a DVD player, a DVD recorder, a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of said examples.
PCT/DK2006/000673 2005-11-30 2006-11-30 A method and a system for theft protection of electronic equipment WO2007062654A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2006319589A AU2006319589A1 (en) 2005-11-30 2006-11-30 A method and a system for theft protection of electronic equipment
EP06818133A EP1958115A2 (en) 2005-11-30 2006-11-30 A method and a system for theft protection of electronic equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DKPA200501686 2005-11-30
DKPA200501686 2005-11-30

Publications (2)

Publication Number Publication Date
WO2007062654A2 true WO2007062654A2 (en) 2007-06-07
WO2007062654A3 WO2007062654A3 (en) 2007-10-04

Family

ID=37983552

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DK2006/000673 WO2007062654A2 (en) 2005-11-30 2006-11-30 A method and a system for theft protection of electronic equipment

Country Status (3)

Country Link
EP (1) EP1958115A2 (en)
AU (1) AU2006319589A1 (en)
WO (1) WO2007062654A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124281A (en) * 2011-11-18 2013-05-29 联想移动通信科技有限公司 Tracking information obtaining method and device of electronic device and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1041483A1 (en) * 1999-03-30 2000-10-04 International Business Machines Corporation Discovering stolen or lost network-attachable computer systems
WO2001084455A1 (en) * 2000-04-27 2001-11-08 Solagent, Inc. Portable computing device communication system and method
US20020016838A1 (en) * 1999-12-17 2002-02-07 Ceki Geluc Scheme for blocking the use of lost or stolen network-connectable computer systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1041483A1 (en) * 1999-03-30 2000-10-04 International Business Machines Corporation Discovering stolen or lost network-attachable computer systems
US20020016838A1 (en) * 1999-12-17 2002-02-07 Ceki Geluc Scheme for blocking the use of lost or stolen network-connectable computer systems
WO2001084455A1 (en) * 2000-04-27 2001-11-08 Solagent, Inc. Portable computing device communication system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124281A (en) * 2011-11-18 2013-05-29 联想移动通信科技有限公司 Tracking information obtaining method and device of electronic device and electronic device

Also Published As

Publication number Publication date
AU2006319589A1 (en) 2007-06-07
EP1958115A2 (en) 2008-08-20
WO2007062654A3 (en) 2007-10-04

Similar Documents

Publication Publication Date Title
US8432257B2 (en) Merchandise-integral transaction receipt and auditable product ownership trail
EP1423771B1 (en) Method to protect software against unauthorized use
USRE41227E1 (en) System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
US20150278487A1 (en) Security scheme for authenticating digital entities and aggregate object origins
US20160098730A1 (en) System and Method for Block-Chain Verification of Goods
US20060020821A1 (en) System and method for data processing system planar authentication
US20090133131A1 (en) Method and system for managing software licenses
US20050216420A1 (en) Method and system for licensing a software product
US20100313037A1 (en) Collectible case authentication system, device and method
WO1998004967A1 (en) Immobilisation protection system for electronic components
JP2008293284A (en) Commodity management system and method
WO2018125472A1 (en) System and method for secure lock box with near proximity awareness
EP2255318A1 (en) Theft-deterrent system and method
US20080005557A1 (en) Method of authentication and ownership verification of collectibles
US20160100299A1 (en) Communication Method And System To Process And Control The Legality Of Products
US20060080464A1 (en) System and method of utilizing a MAC address based unlocking key
JP4214252B1 (en) Management system and management program
WO2007062654A2 (en) A method and a system for theft protection of electronic equipment
US20230161847A1 (en) System and method for identifying ownership and managing transfer of ownership of premium goods
EP1174786A2 (en) Method, system, and program for reusing software licenses with new computer hardware
US20080270306A1 (en) System and method of theft detection of encoded encrypted software keyed genuine goods
WO2013021158A2 (en) Auditing assets
JP4511645B2 (en) Method and system for checking violation of use condition of copyrighted work, copyrighted product sales management server, general terminal and recording medium
BE1026075B1 (en) SYSTEM FOR SAFE TRANSACTIONS
JP4472915B2 (en) Ticket sales apparatus, admission management apparatus, method, and program

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2006818133

Country of ref document: EP

NENP Non-entry into the national phase in:

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2006319589

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 3362/CHENP/2008

Country of ref document: IN

ENP Entry into the national phase in:

Ref document number: 2006319589

Country of ref document: AU

Date of ref document: 20061130

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 2006319589

Country of ref document: AU

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06818133

Country of ref document: EP

Kind code of ref document: A2

WWP Wipo information: published in national office

Ref document number: 2006818133

Country of ref document: EP