WO2015172766A1 - Device with a unit for receiving a mobile communication device, and method for this purpose - Google Patents
Device with a unit for receiving a mobile communication device, and method for this purpose Download PDFInfo
- Publication number
- WO2015172766A1 WO2015172766A1 PCT/DE2015/000243 DE2015000243W WO2015172766A1 WO 2015172766 A1 WO2015172766 A1 WO 2015172766A1 DE 2015000243 W DE2015000243 W DE 2015000243W WO 2015172766 A1 WO2015172766 A1 WO 2015172766A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile communication
- communication device
- computer
- technological
- protective
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B62—LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
- B62B—HAND-PROPELLED VEHICLES, e.g. HAND CARTS OR PERAMBULATORS; SLEDGES
- B62B3/00—Hand carts having more than one axis carrying transport wheels; Steering devices therefor; Equipment therefor
- B62B3/14—Hand carts having more than one axis carrying transport wheels; Steering devices therefor; Equipment therefor characterised by provisions for nesting or stacking, e.g. shopping trolleys
- B62B3/1408—Display devices mounted on it, e.g. advertisement displays
- B62B3/1416—Display devices mounted on it, e.g. advertisement displays mounted on the handle
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B62—LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
- B62B—HAND-PROPELLED VEHICLES, e.g. HAND CARTS OR PERAMBULATORS; SLEDGES
- B62B3/00—Hand carts having more than one axis carrying transport wheels; Steering devices therefor; Equipment therefor
- B62B3/14—Hand carts having more than one axis carrying transport wheels; Steering devices therefor; Equipment therefor characterised by provisions for nesting or stacking, e.g. shopping trolleys
- B62B3/1408—Display devices mounted on it, e.g. advertisement displays
- B62B3/1424—Electronic display devices
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B62—LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
- B62B—HAND-PROPELLED VEHICLES, e.g. HAND CARTS OR PERAMBULATORS; SLEDGES
- B62B3/00—Hand carts having more than one axis carrying transport wheels; Steering devices therefor; Equipment therefor
- B62B3/14—Hand carts having more than one axis carrying transport wheels; Steering devices therefor; Equipment therefor characterised by provisions for nesting or stacking, e.g. shopping trolleys
- B62B3/1428—Adaptations for calculators, memory aids or reading aids
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1632—External expansion units, e.g. docking stations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1427—Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0275—Electronic Article Surveillance [EAS] tag technology used for parent or child unit, e.g. same transmission technology, magnetic tag, RF tag, RFID
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/16—Security signalling or alarm systems, e.g. redundant systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/02—Constructional features of telephone sets
- H04M1/04—Supports for telephone transmitters or receivers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0205—Specific application combined with child monitoring using a transmitter-receiver system
- G08B21/0213—System disabling if a separation threshold is exceeded
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
- G08B29/181—Prevention or correction of operating errors due to failing power supply
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/04—Details of telephonic subscriber devices including near field communication means, e.g. RFID
Definitions
- the invention relates to a device with a device, wherein the device is equipped with a tray for receiving a mobile communication device, with a supported by the tray mobile communication device, with at least one device provided on the detection means and with a force acting on the mobile communication device protection device, wherein the mobile communication device is activatable and deactivatable by the user by means of at least one user interface and has a computer-technological system which is determined by means of the at least one user interface for activating the protection device and using a data processing-based key for deactivating the protection device; the means for establishing a continuous recognition process between the mobile communication device and the at least one recognition means is suitable.
- the invention further relates to a method for activating and subsequently deactivating a protective device acting on the mobile communication device using the device just mentioned.
- the document DE 197 31 271 AI describes a device in the form of a shopping cart, which has a shelf for receiving a communication device.
- the communication device is described as a computer, in particular as a so-called "hand-held scanner", with which the customer of a self-service market can bill the goods which he has bought himself.
- the hand-held scanner is the property of the self-service market and is owned by the latter provided to the customer.
- the document says nothing about how such a communication device can be protected during the purchase process against abuse or theft.
- Trays for mobile communication devices are also known as so-called docking stations, which are mainly intended to provide a connected to a docking mobile communication device with power.
- mechanical security means In order to guarantee the safety of mobile communication devices that are stored on shelves, protective devices have been developed which mechanically secure mobile communication devices, for example with the aid of a frame, with the aid of brackets, or with the help of locks.
- Known mechanical security means also include software-controlled means that allow the mechanical security to be removed by entering a code or reading a card.
- the document DE 10 2011 118 506 AI describes a push handle for a shopping cart and formed of a push handle and a mobile communication device theft warning system.
- the mobile communication device is mechanically secured by means of a holder, preferably with a locking device in the tray, wherein a holding position is provided.
- a program product running on the communication terminal interacts with an inclination sensor of the mobile communication device such that pivoting of the mobile communication device from the holding position to the removal position triggers a code query.
- the document calls it advantageous if the tray has a detector which detects whether a communication device is located in the tray.
- a data connection only occurring at a short distance between an electronic advertising surface arranged on the push handle and the mobile communication device can emit an alarm signal when it is interrupted, which draws attention to a removal of the mobile communication device.
- Mobile communication devices are equipped with blocking devices which serve to block the devices against unauthorized use, wherein the blocking is carried out manually or by the device itself and wherein the blocking by user identification, eg. B. in the form of an access code or biometric can be done.
- blocking devices which serve to block the devices against unauthorized use, wherein the blocking is carried out manually or by the device itself and wherein the blocking by user identification, eg. B. in the form of an access code or biometric can be done.
- Locking devices serve as well as known alarm systems for the protection of objects. In the following description as well as in the claims, therefore, both locking devices and alarm systems are covered by the superordinate term "protection device.”
- Alarm systems regardless of numerous details and types, have a detector device which detects an event which is intended to trigger an alarm, the terminal device of FIG Alarm device forming alarm device that generates the alarm, as well as a data connection device by means of which the detector device can act on the alarm device, so that the detected facts become the triggering means of the alarm
- a known protection device against losing a mobile communication device is the Keylink key fob of Motorola: Keylink and the mobile communication device communicate with each other in such a way that each of the two devices can be used to find each other even.
- the prior art provides that the pairwise assignment is set up by the user in each case using computer-technological means.
- the other mobile communication device is thereby assigned a function. This is not only expensive but also technically problematic because the process of setting up is vulnerable. With the safety problems, inter alia, the WO2014 / 158365 apart.
- Also known are the predetermined personalization of user interfaces as well as the functionality of mobile communication devices depending on the recognition of detection means arranged on a docking station, see the document US2013 / 0168445. The document says nothing about how the communication device can be protected against misuse or theft.
- Mobile communication devices owned by customers are known in the form of mobile phones, smartphones, tablets, and the like. They are equipped with individual identifiers in the form of SIM cards, telephone numbers and IP addresses and can therefore be distinguished from other similar devices.
- Computer-technological systems are known either as hardware, as software, as a combination of hardware and software, and / or as executed software.
- a computer-technological system may be a process running on a processor, a processor, an executable object, a sequence of executed instructions, a program, and / or a computer.
- Both an application running on a server and the server itself are examples of a computer-technological system.
- mobile communication devices and software running on mobile communication devices are examples of computer-technological systems.
- a computer-technological system may be located in a process and / or a sequence of executed instructions, or may be divided into a computer or multiple computers.
- Data processing based keys are realized by computer technological systems, eg as a code query using the user interface.
- Detecting means are also realized with the aid of computer technology systems. Detecting means are all means which are suitable for making an object carrying the recognition means identifiable, in particular in the form of printed character codes, barcodes, QR codes, as well as data carrying means such as transponders.
- Recognition means are suitable, according to different embodiments, to make an object distinguishable from similar objects and / or to identify a subject as belonging to a group of similar objects.
- As an individual identifier are the distinction of similar items enabling features to understand, such as serial numbers or individual codes.
- a group identifier is to be understood as meaning features which are used to identify belonging to a group of similar objects, for example a code which is the same for all objects belonging to the group.
- Known detection means for example barcode readers, QR code readers, or NFC readers, are used to identify respectively suitable recognition means.
- the object of the invention is to improve a device of the type mentioned so that a mobile communication device that is located on the shelf of the device, with the simplest means and cost of abuse by unauthorized persons and theft is largely protected.
- the solution of the object with respect to the device is that the continuous recognition process is only established in the active state of the mobile communication device and only starting from the computer-technological system of the mobile communication device and the computer-technological system has computer-technological means such that only in the active state of the mobile communication device, the protection device is activated.
- the at least one detection means continuously recognizes that the continuous recognition process, a first operating state is established
- the first operating state is maintained such that a protective device acting on the communication device is activated and thereby the mobile communication device is secured against misuse
- the backup of the communication device is achieved by means of a first wireless data connection short range, the storage, and thus the device having at least one data transmitter and the mobile communication device is equipped with at least one data receiver and wherein the communication device, the storage by transmitted and recognizes predetermined data.
- the range of this first data connection limits the space within which the mobile communication device may be located without the mobile communication device triggering a protective function.
- a passive signal transmitter without a separate power supply is sufficient for this purpose. It is suitable for z. B. a passive RFID transponder. Since the mobile communication device has its own energy Has supply, this is used to detect the passive signal transmitter, z. B. by means of Near Field Communication (NFC).
- NFC Near Field Communication
- the range of the at least one first wireless data connection is exceeded, so that this connection is interrupted.
- the at least one second data connection can optionally consist of a receiver within the mobile communication device, and / or to a receiver outside the mobile communication device.
- a receiver located inside the device may be a blocking and / or alarm device serving to block the device or to trigger an acoustic alarm of the device while a receiver located outside the mobile communication device may be an external computer.
- user interfaces, speakers, microphones, sensors and cameras are suitable receivers within the mobile communication device.
- the first data connection may also abort for other reasons, although the mobile communication device has not been removed from the shelf. Causes for this can be an inadequate power supply of the communication device as well as a sudden malfunction of the mobile communication device.
- the at least one second data connection which as a result of the termination of the first data connection assumes the function of reporting the termination of the first data connection to one or more protective devices.
- the mobile communication device can already initiate protection functions when the device anticipates a premature termination of the first data connection, without the termination has already occurred, for. B. upon detection of a declining power supply.
- the protection functions in this case may be the same, but also advantageous, different from protection functions that are triggered by exceeding the range of the at least one first data connection.
- the second data connection can be established as a result of the termination of the first data connection.
- the second data connection can also already exist when the first data connection terminates and it is only as a result of the termination of the first data connection as technically triggering means the termination of the data connection due to exceeding the maximum signal transmission status data transmitted.
- This solution is equivalent to the first mentioned solution, since in both cases the second data connection is only used in the sense of the invention when the first data connection is aborted.
- the first operating state in which the communication device continuously recognizes the filing, is preceded by no second operating state, in which the data connection between filing and communication device is interrupted.
- the second operating state is always preceded by the first operating state. It follows that protective functions are only triggered when initially made a proper connection corresponding to the first state and this is then lost in an improper way.
- the mobile communication device corresponding to the third operating state, ie without triggering a protective function, can be removed from the storage, at least one function of the safe removal is required.
- the prior art provides numerous functions of safe removal. These functions include, for example, a ⁇ input, a password input, a biometric recognition or an acoustic input.
- the communication device In order for the mobile communication device to establish the first and second data connections and to perform the required functions, the communication device must be equipped with a corresponding program. If the communication device is, for example, a smartphone, the program is expediently a user program or an app.
- the active mobile communication device forms a detector device in conjunction with the continuously recognized detection means.
- the active mobile communication device also forms a data connection device and a blocking device and / or alarm device, so that overall a protective device is formed, which protects the mobile communication device.
- no terminal belonging to a protective device and different from the object to be protected is required.
- the detector unit is formed without the filing recognizes the mobile communication device.
- no mechanical securing means are required and it is waived that for unlocking mechanical securing means, the mobile communication device or an objectively separated present, serving as a key means must be recognized.
- a mutual recognition is dispensed with, which proves to be an unnecessary effort to fulfill the inventive task.
- the invention makes it possible for providers and users of the protection device to create a precisely limited subject of the contract, that a provider can offer protection devices to a group of users, and that a user can use protection devices of a group of providers and each usage process is individualized.
- suitable, system-forming choice of the first, second, third and fourth computer-technological means can be achieved that the at least one detection means of the computer-technological system of the mobile communication device individually and as a group of recognition means belonging only identifiable when the computer -technological system itself is individualized and belongs to a group of computer-technological systems, and each of the group-related computer-technological system is intended to identify any recognition means associated with the group of recognition means.
- the first computer-technological means formed by an operating system and / or user program belonging to a computer technological system, which belongs to a group of similar user programs and / or a first group identifier.
- the second computer-technological means is formed by a first individual identifier of the user program, for example by a software license number.
- the third computer-technological means is formed by a second group identifier.
- the fourth computer-technological means is formed by a second individual identifier.
- the respective group identifier and individual identifier can be implemented separately or with the aid of only one code or with the aid of other suitable computer-technological means.
- a recognition means for example both an NFC tag and a QR code.
- functions of the mobile communication device which can be controlled via data connections and / or user interfaces and / or the possibility of accessing stored data are updated simultaneously with the activation of the protective device.
- Preferred updates are
- the invention thus completely integrates protective device, functionality and data access. This offers the enormous advantage that the user using the device can confirm a potentially highly complex predetermined relationship between protective device, functionality and data access with a simple yes-or-no query and terminate it with a simple code query.
- the question of who is responsible for and liable for the protection of the mobile communication device is uniformly and uniquely solvable for very different applications in that the owner of the mobile communication device who places it on the storage carries the responsibility.
- the exclusion of liability claims against the provider is particularly advantageous if, as in the case of shopping carts, the devices widely distributed and used for different lengths, used by ever-changing users and exposed to constant risk of damage.
- the minimal requirement of the detection means in connection with the use of already available and reliable functions of mobile communication devices minimizes the risk of malfunction.
- the link between the scope of functions and the protective device also ensures that a fault is much more easily recognized by the user, because without the protective device, the intended range of functions is not given and vice versa.
- a further particular advantage of the invention is that the combination of the first, second, third and fourth computer-technological means provides a system that can be offered from a single source.
- a service company may offer both the shopping cart recognition device and the computer-technological device in the form of an application program of the mobile communication device, the requirement of the combination protecting the service company against the use of recognition means and / or application programs not provided to it. This differentiation from external funds is in turn beneficial to the security and regulation of responsibility and liability.
- the activation of the protective device takes place either either by first forming the protective device or by activating a deactivated present protection device.
- the deactivation of the protective device takes place either either so that the protective device determined for a renewed activation and only deactivated still exists or by permanent dissolution or deletion of the protective device.
- Confirmation of the user using the user interface is expedient upon initial formation and permanent resolution. It is also useful if the confirmation of the user is not required for repeated activation and deactivation. For example, a user may for the first time decide to form a protector with a tray placed on a shopping cart and repeatedly use the once formed protector in future purchases by only activating and deactivating them without erasing them.
- the at least one recognition means is suitable for making available to the mobile communication device a user program serving as the first computer-technological means, wherein in the recognition means the user program itself and / or a download link for the program and / or an additional program automatically starting the download of the user program and / or a key required for the execution of the user program is.
- the recognition means the user program itself and / or a download link for the program and / or an additional program automatically starting the download of the user program and / or a key required for the execution of the user program is.
- a user whose mobile communication device does not yet have an application program and a first computer-technological means required to form a protection device conveniently obtains the means necessary for forming a protection device.
- the user program can form the second computer-technological means by means of components or data of the mobile communication device, which distinguish it from all other mobile communication devices, such as a SIM card or telephone number.
- the advantages of the invention can be used for very different devices.
- mobile devices such as shopping trolleys or luggage trolleys
- preferred applications are as shop furniture or furniture, as containers and as doors present devices, both in public spaces and in the private use environment.
- the invention is particularly advantageous for the use of a mobile communication device during a shopping.
- User programs intended for purchasing goods also known as a mobile shopping app
- the computer-technological device used by the invention with the aid of the mobile shopping app then also comprises the first and second computer-technological means.
- the cost of such a programmatic addition to a mobile shopping app is minimal. If the mobile communication device is equipped with a mobile shopping app, the computer-technological system of the mobile communication device serving to recognize the recognition means can be used as a price recording means.
- the invention also makes it possible to limit usage times and / or usage spaces for mobile communication devices.
- the protective device can only be resolved and the preparation of the third operating state is only possible if the device is in a predetermined period and / or space, the mobile communication device recognizes period and / or space for this purpose. This allows, for example, parents to set usage times for their children, or allow a business to use only during business hours.
- the device and / or the tray for receiving a mobile communication device, with which the device is equipped can be configured in an advantageous embodiment such that the protective device not only protects the mobile communication device, but also other objects, surfaces, or rooms.
- the protective device is achieved by a specific spatial arrangement of the mobile communication device and the tray, wherein the shape and the functional scope of the tray can otherwise be made freely.
- the mobile communication device can cover a hook formed on the tray such that a bag hanging on the hook can only be removed from the hook if the protective device has been previously deactivated and the mobile communication device has been removed from the rack.
- mechanical securing means for other objects, areas or rooms can be saved in numerous possible applications.
- the protective device can also be used for non-local control.
- the mobile communication device communicates with the at least one device such that the existence of the protection device enables or effects the control of the at least one device and that the dissolution of the protection device makes the control impossible or ineffective.
- a mobile communication device used as a central control for building technology can only enable control of the building services when the protection device is in existence.
- the protective device thus not only secures the mobile communication device, but also against unauthorized access to the building services. Access is then only possible with the help of the mobile communication device and only at the location of the existing protection device.
- the examples mentioned illustrate that with the formation of a protective device beyond the protection of the mobile communication device very different purposes can be pursued.
- a technical means must be provided which enables differentiation and recognition of the different purposes.
- the preferred technical means is the first computer-technological means by which membership in a first group is identified and the third computer-technological means by which membership in a second group is identified. Any number of groups of mobile communication devices and any number of groups of devices can be assigned as appropriate to each other.
- the computer-technological system can then determine the purpose on the basis of the present groups and perceive or initiate any functions which go beyond the formation of a protective device and serve the respective purpose.
- any number of groups and the respective groups can be consider, add and delete properties of protection devices, functions and data access assigned to them. This is conveniently possible by updating only one all-encompassing user program.
- the universality that results from the inventive combination of protection, functionality and data access also makes it possible to form the first computer-technological means with the operating system of the mobile communication device.
- the combination of the first, second, third and fourth computer-technological means is transmitted in the course of activation of the protection device by means of a data connection to another, external computer-technological system and stored there.
- a wireless data connection from the mobile communication device to the further computer-technological system is preferably established and separated again by establishing the third operating state.
- first and / or second and / or third operating state recording data can be stored under identification of the mobile communication device and the device and in conjunction with location and / or time data in the other computer-technological system. It can be determined by the first and / or second and / or third and / or fourth means a space area and / or a period in which the protection device acts on the mobile communication device.
- the inventive method allows further advantageous embodiments.
- the user of a mobile communication device installs a user program on his mobile communication device in such a way that that the mobile communication device independently recognizes certain detection means for forming a protective device,
- the advantage of this embodiment is that different recognition means for forming a protective device can be made available to the user. Trays can be equipped with recognition means at several positions with regard to different position of the detection means depending on the model of a mobile communication device. Furthermore, this opens the possibility that the user depending on the choice of detection means different protection devices are made available. For example, the customer can choose between a private protection device, which is formed solely with the mobile communication device, and an extended protection device, which additionally comprises external means, for example the camera surveillance of a public area.
- the first computer-technological means allows the market operator to install a mobile shopping device on the mobile communication device App that allows every user of the app to create a protective device with any shopping cart of this market operator.
- the number of users and thus the number of second funds does not have to be fixed and can change.
- the third computer-technological means enables the customer, using the mobile shopping app of a particular market operator, to use any shopping cart of that market operator to form a protective device.
- the customer can be enabled to log in once or on any shopping cart for the first time and then to automatically form the protection device with all shopping carts of the same market operator.
- the number of shopping trolleys and thus the number of fourth computer-technological means does not have to be fixed and can change.
- the summary relations formed by the first and third computer-technological means can also be resolved summarily.
- the embodiments mentioned are not mutually exclusive and can be combined.
- the inventive method is suitable according to a further advantageous embodiment, not only to protect the mobile communication device, but also to cause the return of loaned equipment. This is achieved in that the production of the third operating state is only possible if the borrowed device is located at a return point intended for its return.
- the computer-technological system of the mobile communication device does not recognize this only the first, second, third and fourth computer-technological means, but in addition a located at the return station detection means.
- the detection means located at the return location then forms the key, the detection of which is required in connection with the continuous recognition of the storage by the communication device, so that the protection device is put out of operation.
- This embodiment is particularly advantageous in the case of shopping cart present devices.
- the device has at least two different detection means.
- the realization of the detection means with standardized components is also expedient. It is therefore appropriate for a recognition means to be formed by an exchangeable card and / or for a recognition means to have a barcode and / or a QR code and / or a transponder.
- a detection means is connected to the device in such a way that it is destroyed or changed when it is removed.
- preferred positions of the detection means are on the push handle of a device present as a means of transport and / or above the basket of a transport equipped with a basket and / or behind a child seat and in front of the basket top of a transport equipped with a basket and / or or on a shelf for a mobile communication device.
- a preferred position of a recognition means is a horizontal area and / or a surface facing the user and / or a surface serving for the wireless power supply of the mobile communication device.
- the securing of a mobile communication device on a shelf achieved by the invention has a number of further advantages. share and expand the application possibilities of the mobile communication device.
- the prior art offers the customer a shopping cart with a scanner holder and a scanner, wherein the scanner for the scanning either the scanner holder removed or can remain in the scanner holder. Nevertheless, the scanners are provided and returned independently of the shopping cart, so they can not leave the market building and be neither stolen nor damaged.
- the invention makes it possible to replace the scanner provided by the market by the customer's smartphone.
- the smartphone is thus the mobile communication device.
- a mobile communication device in storage can be secured on a tray on a picking trolley or roll container, so that the owner operating there has his hands free and can also temporarily move away from his device without having to take precautionary measures or fear of unauthorized access ,
- Storage systems which secure mobile communication devices on tables or on standing desks of an Internet café or at a hotspot of an airport, or in which the mobile communication device is used as a sound or image recording device, e.g. to record a conference in a conference room.
- Customized solutions and user programs can be designed according to the different fields of application.
- the constant detection of the filing can then also be used to detect a purpose of filing, so that when you place it on a shopping cart communicates the purpose of "shopping in a self-service store” when filing in an Internet cafe, the purpose of "surfing the Internet” and when stored on a repository in a conference room, the purpose of "conference recording” can be communicated, and accordingly, depending on the identified purpose of the repository, the application program may launch certain applications and lock others so that the desired functions of the mobile communication device are immediately met and related Unnecessary or insecure applications are blocked Implementation of the summary relation, or the first and the third computer-technological means.
- Fig. 1 is a schematically illustrated device with the necessary for the invention technical and computer-technological components and
- Fig. 2 shows a device using a typical shopping cart.
- the device 1 shown schematically in Fig. 1 comprises as a device 2, for example, manually movable transport, containers, shelves, displays and other shop fittings and tables, furniture, desks.
- the term means of transport includes all mobile, portable or manually movable devices that are suitable for the transport of objects, such as goods or luggage. Such devices are especially shopping carts, trolleys in garden centers and hardware stores, roll containers, shopping baskets, and luggage trolleys.
- the drawing shows the device 1 with a schematically illustrated device 2, wherein the device 2 is equipped with a tray 3 for receiving a mobile communication device 5, with a carried by the tray 3 mobile communication device 5, with at least one on the device 2 and / or provided on the tray 3 detection means 4 and with a force acting on the mobile communication device 5 protective device 6, wherein the mobile communication device 5 by the user with the help of at least one user interface 16 can be activated and deactivated and a computer-technological system 13, with the help of at least a user interface 16 for activating the protection device 6 and using a data-processing-based key 10 for deactivating the protection device 6 is determined and wherein the device 1 for establishing a continuous recognition process between the mobile communication device 5 and the at least e in detection means 4 is suitable.
- a continuous recognition state is established between the computer-technological system 13 of the mobile communication device 5 and the at least one recognition means 4.
- the computer-technological system 13 has computer-technological means 14, 15 such that only in the active state of the mobile communication device 5, the protective device 6 is activated, wherein the continuous recognition state is the triggering means for continuous activation of the protective device 6.
- the at least one protective device 6 prevents improper use of the communication device 5 by third parties.
- the computer-technological system 13 is identified by means of a first computer-technological means 14 as belonging to a first group of computer-technological systems 13 and identified by means of a second computer-technological means 15 within this first group.
- the at least one recognition means 4 comprises computer-technological means 11, 12 formed by means of stored data in such a way that it is identified as belonging to a second group of recognition means 4 with the aid of a third computer-technological means 11 and that it uses a fourth computer technological means 12 within this second group.
- the first computer-technological means 14 is preferably formed by an operating system and / or user program belonging to the computer-technological system 13 and / or by a first group identifier.
- the second computer-technological means 15 is formed by a first individual identifier of the operating system and / or user program and / or by the SIM card.
- the third computer-technological means 11 is formed by a second group identifier and the fourth computer technological means (12) is formed by a second individual identifier.
- FIG. 2 shows a device 1 as a device 2 formed by a shopping cart with a shelf 3 arranged on the push handle of the shopping cart.
- the mobile communication device 5 recognizes the at least one recognition means 4 with the aid of a first wireless data connection 8.
- External protection device 7 may be provided, which is able to at least contact the mobile communication device 5 in contact.
- the mobile communication device 5 can be in a known manner with the aid of the data processing-based key 10, see FIG. 1, z. B. using the user interface 16, see Fig. 1, in an active, so operable state transfer. It can be set in a likewise known manner by switching off.
- the tray 3 is equipped with the at least one detection means 4, which is suitable as a currentless data transmitter, for example a known passive RFID transponder.
- the first wireless data connection 8 between the mobile communication device 5 and the at least one detection means 4, and thus with the tray 3 can be constructed, since both the communication device 5 and the tray 3 with the appropriate computer-technological means 14, 15, see Fig. 1, are equipped.
- the at least one detection means 4 is preferably arranged on or in the tray 3, but may also be located on the appliance 2 in the vicinity of the tray 3.
- a protective device 6 which can trigger an alarm and / or block the mobile communication device 5 with the aid of a known blocking device belonging to the communication device 5. For example, an audible alarm may be triggered while at the same time an inhibit function may be activated, permitting the mobile communication device 5 to be switched off with the aim of terminating the audible alarm only if a secure removal function or the data processing-based key 10 has been used is used.
- the protective device 6 designed in this way is part of the communi- kations convinceds 5.
- the protective device 6 is therefore formed by the communication device 5.
- Other protection features known in the art are also contemplated. In self-service shops and other public facilities, there are, for example, widespread video surveillance, access control systems, cash register systems and other security equipment.
- a second, outside of the mobile communication device (5) located protection device 7 can advantageously integrate, which is connected by means of at least one second wireless data connection 9 to the communication device 5.
- additional protection functions such as the blocking of the acceptance of the mobile communication device 5 by the POS system or a targeted video surveillance and a Alerting self-service security personnel appropriate means to prevent abuse or theft.
- the protective devices 6, 7 can therefore comprise numerous, multi-layered protective functions tailored to the respective application.
- the detection state is a triggering means for establishing and maintaining the first operating state, in which the protective device 6 is activated and thereby the communication device 5 is secured.
- the range of at least one first, between the recognition means 4 and the computer-technological system 13, see FIG. cation device 5 formed limited a space within which the mobile communication device 5 may be located without a protective function is triggered by the protective device 6. If an unauthorized person attempts to remove the mobile communication device 5 of the filing station 3 in an abusive manner, a predetermined range between the filing station 3 and the communication device 5 is exceeded during the removal process, with the result that the recognition process is interrupted. This interruption is a triggering means for producing the second operating state in which at least one protective function in the mobile communication device 5 and / or in the use of the protective device 7 is also triggered outside of the mobile communication device 5, at least by the protective device 6.
- the data connection 9 can also already be activated in the first operating state. If the communication device 5 is within the predetermined range, no alarm occurs.
- the at least one protective device 6 is thus designed as a blocking device or comprises a blocking device which blocks the mobile communication device 5 against use.
- the key 10 such as PIN, code, or the like must be entered or carried out a biometric recognition. This leads to a now allowed interruption of the detection process, with the result that the protective device 6 is taken out of service and no protection functions are triggered.
- the choice of the key 10 is expediently based on the type and equipment of the mobile communication device 5 used. If the mobile communication device 5 is present, for example, as data glasses, as known, inter alia, by Google Glass or Microsoft Hololens, a suitable key 10 is determined by voice recognition.
- the communication device 5 is preferably equipped with a program such that the communication device 5 can not be switched off in the first operating state and that the second operating state is triggered by the attempt to switch off the mobile communication device 5 or to force a restart.
- the second operating state is therefore always preceded by the first operating state.
- the device 1 can be formed by more than one tray 3 and by more than one mobile communication device 5.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Mechanical Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Chemical & Material Sciences (AREA)
- Combustion & Propulsion (AREA)
- Transportation (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Child & Adolescent Psychology (AREA)
- Emergency Management (AREA)
- Business, Economics & Management (AREA)
- Human Computer Interaction (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE112015002277.5T DE112015002277A5 (en) | 2014-05-15 | 2015-05-13 | Device with a device for receiving a mobile communication device and method for this purpose |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102014007179.0 | 2014-05-15 | ||
DE102014007179.0A DE102014007179A1 (en) | 2014-05-15 | 2014-05-15 | Device with a mobile communication device |
DE102015002933.9A DE102015002933A1 (en) | 2015-03-07 | 2015-03-07 | Device with a device for receiving a mobile communication device and method for this purpose |
DE102015002933.9 | 2015-03-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015172766A1 true WO2015172766A1 (en) | 2015-11-19 |
Family
ID=53541468
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/DE2015/000243 WO2015172766A1 (en) | 2014-05-15 | 2015-05-13 | Device with a unit for receiving a mobile communication device, and method for this purpose |
Country Status (2)
Country | Link |
---|---|
DE (1) | DE112015002277A5 (en) |
WO (1) | WO2015172766A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11126810B2 (en) | 2018-03-02 | 2021-09-21 | Toshiba Tec Kabushiki Kaisha | Handcart |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19731271A1 (en) | 1997-07-22 | 1999-01-28 | Wanzl Metallwarenfabrik Kg | Holding part for a computer, in particular for a hand scanner |
DE102011118506A1 (en) | 2011-10-14 | 2013-04-18 | Horst Sonnendorfer | Push handle for a shopping cart |
US20130168445A1 (en) | 2010-12-17 | 2013-07-04 | Motorola Mobility Llc | Method and Device for Recognition of Docking Stations |
EP2720444A1 (en) * | 2012-10-10 | 2014-04-16 | BlackBerry Limited | Mobile wireless communications device providing security features based upon wearable near field communication "NFC" device |
US20140168884A1 (en) | 2012-12-05 | 2014-06-19 | Mobile Technologies, Inc. | Docking station for tablet device |
WO2014158365A1 (en) | 2013-03-14 | 2014-10-02 | Motorola Mobility Llc | Method and apparatus to facilitate pairing between wireless devices |
-
2015
- 2015-05-13 WO PCT/DE2015/000243 patent/WO2015172766A1/en active Application Filing
- 2015-05-13 DE DE112015002277.5T patent/DE112015002277A5/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19731271A1 (en) | 1997-07-22 | 1999-01-28 | Wanzl Metallwarenfabrik Kg | Holding part for a computer, in particular for a hand scanner |
US20130168445A1 (en) | 2010-12-17 | 2013-07-04 | Motorola Mobility Llc | Method and Device for Recognition of Docking Stations |
DE102011118506A1 (en) | 2011-10-14 | 2013-04-18 | Horst Sonnendorfer | Push handle for a shopping cart |
EP2720444A1 (en) * | 2012-10-10 | 2014-04-16 | BlackBerry Limited | Mobile wireless communications device providing security features based upon wearable near field communication "NFC" device |
US20140168884A1 (en) | 2012-12-05 | 2014-06-19 | Mobile Technologies, Inc. | Docking station for tablet device |
WO2014158365A1 (en) | 2013-03-14 | 2014-10-02 | Motorola Mobility Llc | Method and apparatus to facilitate pairing between wireless devices |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11126810B2 (en) | 2018-03-02 | 2021-09-21 | Toshiba Tec Kabushiki Kaisha | Handcart |
US11704513B2 (en) | 2018-03-02 | 2023-07-18 | Toshiba Tec Kabushiki Kaisha | Handcart |
EP3533686B1 (en) * | 2018-03-02 | 2023-09-13 | Toshiba Tec Kabushiki Kaisha | Handcart |
Also Published As
Publication number | Publication date |
---|---|
DE112015002277A5 (en) | 2017-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2018220046B2 (en) | Anti-theft system used for customer service | |
KR102653929B1 (en) | Self-disconnection of anti-theft devices using power removal stations | |
US10121338B2 (en) | Self-detaching anti-theft device for retail environment | |
US9098990B2 (en) | Mobile retail peripheral platform for handheld devices | |
CN106414876A (en) | Systems and methods for remotely controlling security devices | |
MX2014008940A (en) | Method and system for preventing shopping cart theft. | |
EP2606477A1 (en) | Theft prevention system and method | |
JP6440327B2 (en) | Crime prevention system, crime prevention method, and robot | |
WO2015172766A1 (en) | Device with a unit for receiving a mobile communication device, and method for this purpose | |
EP2959082B1 (en) | Security tag detacher activation system | |
US20080309389A1 (en) | System for preventing shopping cart push-out theft | |
WO2016037749A1 (en) | Method for establishing an authenticated link in order to secure electronic objects | |
DE102015002933A1 (en) | Device with a device for receiving a mobile communication device and method for this purpose | |
DE102014007179A1 (en) | Device with a mobile communication device | |
EP4032072A1 (en) | Self-detaching anti-theft device with a multi-purpose transceiver for energy harvesting and communication | |
EP3696780A1 (en) | Device for holding and securing at least one object of value on a piece of furniture or part of a piece of furniture, and part of a piece of furniture | |
DE102016224984A1 (en) | Method and system for theft protection of a, in particular not yet sold, telecommunication terminal, system, computer program and computer program product | |
DE102013017717A1 (en) | System and method to make mobile phones easier and faster to protect against misuse | |
JP2007265232A (en) | Deadline management support system, deadline management support method and deadline management support program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15736381 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 112015002277 Country of ref document: DE |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: R225 Ref document number: 112015002277 Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15736381 Country of ref document: EP Kind code of ref document: A1 |