Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A METHOD AND A SYSTEM FOR THEFT PROTECTION OF ELECTRONIC EQUIPMENT
Document Type and Number:
WIPO Patent Application WO/2007/062654
Kind Code:
A3
Abstract:
This invention relates to a method and a system for theft protection of electronic equipment being connected periodically or permanently to the Internet, the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, by a first use of the equipment, a registration number of the equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal, the registering of the first use of the equipment allowing subsequent use of the equipment in a predetermined period of time corresponding to a specific number of time units (ticks), after expiry of the predetermined period of time the electronic equipment being verified anew against the Internet portal as not having a charge of theft issued, thief or a buyer of stolen equipment can be identified by my means of the IP address associated with the thief or the buyer.

Inventors:
HENRIKSEN LEIF (DK)
THIELOW OLE (DK)
KRISTENSEN ORLA (DK)
Application Number:
PCT/DK2006/000673
Publication Date:
October 04, 2007
Filing Date:
November 30, 2006
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
DENINVENT APS (DK)
HENRIKSEN LEIF (DK)
THIELOW OLE (DK)
KRISTENSEN ORLA (DK)
International Classes:
G06F21/88
Domestic Patent References:
WO2001084455A12001-11-08
Foreign References:
US20020016838A12002-02-07
EP1041483A12000-10-04
Attorney, Agent or Firm:
NIELSEN, Henrik, Sten (Schou & Ostenfeld A/SVester Søgade 10, Copenhagen V, DK)
Download PDF:
Claims:

CLAIMS

1. A method of theft protection of electronic equipment being connected periodically or permanently to the Internet,

i) the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, said embedded software program ensuring that the equipment communicates with an Internet portal and preventing that said embedded software program be replaced by another embedded software program, when said embedded software program has been written into the equipment,

ii) by an activation, e.g. a first use of the equipment, a registration number of said equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,

iii) said registering of said first use of the equipment allowing subsequent use of the equipment in a predetermined period of time corresponding to a specific number of time units (ticks), and

iv) after expiry of said predetermined period of time the electronic equipment being verified anew against said Internet portal as not having a charge of theft issued, whereafter a subsequent use of the equipment is being allowed in a continued period of time corresponding to or different from said number of time units (ticks).

2. The method according to claim 1, a thief or a buyer of stolen equipment being identified by my means of the IP address associated with said thief or said buyer.

3. The method according to claim 1 or 2, said registration number of said equipment and said unique number associated with the equipment being provided by means of a barcode.

4. The method according to claim 1 to 3, said equipment comprising for example a TV, a flat screen, a DVD player, a DVD recorder, a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of said examples.

5. A system for theft protection of electronic equipment being connected periodic or permanent to the Internet,

i) the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, said embedded software program ensuring that the equipment communicates with an Internet portal and preventing that said embedded software program be replaced by another embedded software program, when said embedded software program has been written into the equipment,

ii) by an activation, e.g. a first use of the equipment, a registration number of said equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,

iii) said registering of said first use of the equipment allowing subsequent use of the equipment in a predetermined period of time corresponding to a specific number of time units (ticks), and

iv) after expiry of said predetermined period of time the electronic equipment being verified anew against said Internet portal as not having a charge of theft issued, whereafter a subsequent use of the equipment is being allowed in a continued period of time corresponding to or different from said number of time units (ticks).

6. The system according to claim 5, a thief or a buyer of stolen equipment being identified by my means of the IP address associated with said thief or said buyer.

7. The system according to claim 5 or 6, said registration number of said equipment and said unique number associated with the equipment being provided by means of a barcode.

8. The system according to claim 5 to 7, said equipment comprising for example a TV, a flat screen, a DVD player, a DVD recorder, a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of said examples.

Description:

A method and a system for theft protection of electronic equipment

This invention relates to a method and a theft prevention system for use with electronic equipment such as flat screens, DVD-players, DVD-recorders, stereos, stationary and portable PCs, projectors etc.

This system combines blocking and recovery functions in an, until now, unknown type of theft prevention system for use with electronic equipment connected to the Internet or prepared to be connected to the Internet.

It is an object of the invention to provide a method and a system, which each enhance the possibility to detect theft of electronic equipment.

Moreover, it is an object of the invention to provide for that a thief or buyer of stolen equipment can be identified.

Further, it is an object of the invention to provide that personal data of the buyer are not left at the retailer in order to prevent thieves to identify the location of the sold equipment.

The above objects, the above advantage, and the above feature together with numerous other objects, advantages, and features, which will be evident from the below detailed description of the present invention and are in accordance with the teaching of the present invention, are obtained by the following two aspects of the invention, where a first aspect of the present invention is a method of theft protection of electronic equipment being connected periodically or permanently to the Internet,

i) the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, the embedded software program ensuring that the equipment communicates with an Internet portal and preventing that the embedded software program be replaced by another

embedded software program, when the embedded software program has been written into the equipment,

ii) by an activation, e.g. a first use of the equipment, a registration number of the equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,

iii) the registering of the first use of the equipment allowing subsequent use of the equipment in a predetermined period of time corresponding to a specific number of time units (ticks), and

iv) after expiry of the predetermined period of time the electronic equipment being verified anew against the Internet portal as not having a charge of theft issued, whereafter a subsequent use of the equipment is being allowed in a continued period of time corresponding to or different from the number of time units (ticks).

In a preferred embodiment of the invention, a thief or a buyer of stolen equipment being identified by my means of the IP address associated with the thief or the buyer, the registration number of the equipment and the unique number associated with the equipment being provided by means of a barcode, the equipment comprising for example a TV, a flat screen, a DVD player, a DVD recorder, a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of the examples.

According to a second aspect of the present invention, the invention comprises a system for theft protection of electronic equipment being connected periodic or permanent to the Internet,

i) the electronic equipment having an embedded software program for handling a connection procedure and transfer of data, the embedded software program ensuring that the equipment communicates with an Internet portal and preventing that the embedded software program be replaced by another embedded software program, when the embedded software program has been written into the equipment,

ii) by an activation, e.g. a first use of the equipment, a registration number of the equipment and a unique number associated with the equipment are registered on the Internet portal, and likewise by subsequent use of the equipment a registration of the point of time of use and the IP address to which the equipment is connected or associated are registered on the Internet portal,

In a preferred embodiment of the invention, a thief or a buyer of stolen equipment being identified by my means of the IP address associated with the thief or the buyer, the registration number of the equipment and the unique number associated with the equipment being provided by means of a barcode, the equipment comprising for example a TV, a flat screen, a DVD player, a

DVD recorder, a stereo equipment, a stationary or portable PC, a projector, a digital camera, other portable equipment or equipment having the combined functionality of one or more of the examples.

The invention will be explained in more detail below in connection with the preferred embodiments and with reference to the drawings, in which:

fig. 1 shows a system and a method of the invention, fig. 2 shows a certificate, fig. 3 shows a printout browser certificate, fig. 4 and 5 show the component layout of a prototype version of the electronics, fig. 6 shows the main components of the prototype, figs. 7a - 10 show the electronics in more details.

Throughout the drawings, the same abbreviations indicate identical elements or variables. In the present specification, variables or elements identical to variables or elements, respectively, described previously with reference to a preceding Figure are designated by the same text, symbol or abbreviation.

As shown in Fig. 1 the system and the method comprise

• Internet portal for handling various equipment codes, IP-addresses and connection time.

• Software extension, which is normally integrated into the equipment during production (licence based)

• Each protected piece of equipment is accompanied by a safety certificate used when registering the equipment at the retailer's.

During production, each piece of equipment is usually fitted with a certain type of software by integrating or embedding it into the internal processor of the equipment for the sake of handling connection and data transfer procedures. This software ensures that the equipment is able to communicate with the Internet portal administering the theft prevention system. Once integrated, the software cannot be replaced by another type of software in an attempt to break the theft protection. The equipment is configured for periodic or permanent connection to the Internet.

The equipment is accompanied by a certificate containing

a) Unique registration number (e.g. a bar code), and

b) Unique equipment number, e.g. also a bar code.

These two numbers or bar codes are used when registering and thus theft protecting the equipment and theft protection is not completed until the equipment has been registered on the Internet portal.

When buying a piece of equipment, the buyer is able to choose whether or not to apply theft protection.

This may also be done at a later point of time, or not at all. If the buyer chooses to apply theft protection to the equipment, the retailer will scan the two bar codes listed in the accompanying certificate as well as the ID-number of the retail outlet, alternatively he will enter the numbers associated with the barcodes. These bar codes or numbers are then stored on the Internet portal administering the theft protection system. When the buyer connects the equipment to the Internet at home, the Internet portal automatically asks whether or not theft protection has been registered for this particular piece of equipment, and the buyer will answer "yes" to this question. From this point onwards, the equipment will be protected against theft through the present invention. The IP-address of the equipment - or an IP-address associated with the equipment - as well as the time of registration onto the Internet portal are stored along with the certificate and equipment numbers, which were scanned at the retailer.

When the equipment is registered and connected to the Internet portal for the first time, it is automatically provided with a number of time units (ticks) needed for it to work. The number of time units, which are transferred each time the equipment is activated, has been set at a standard level, however, the user or consumer may select a different number within a certain range. The time units are used each time the equipment is activated.

At regular intervals, and before the equipment runs out of time units, it automatically requests a new set of time units from the Internet portal. Before the units are transferred, the equipment IP-address and the exact point of time of registration are registered once again. If the equipment is removed from the

Internet connection, the equipment will run out of time units and cease to work after a while.

If the equipment is stolen at a time, when it contains no time units, it will not work, and if it does contain a certain number of time units, it will work until these run out. When the time units run out, i.e. they have been used up, and the equipment consequently no longer works, the equipment will attempt to be connected to the Internet portal - but my means of the IP address associated the thief - in order to receive further time units, and if the thief or buyer of stolen goods attempts to do so, the IP-address used by that person to connect the equipment, as well as the exact point of registration time, are registered on the portal. When the equipment owner declares the equipment stolen, its location can be tracked down via the IP-address, and the police can pick the equipment up.

When the legal owner finds out theft of his equipment he can by means of the Internet portal select whether the stolen equipment no longer is to be provided with time units when the equipment is connected to the Internet portal, or that the stolen equipment is allowed to work until the police knocks on the door. Hereby the thief or a handler of stolen goods can be stopped and identified.

The thief or buyer of stolen goods may be able to - unlawfully - use the equipment as long as it is connected to the Internet. This ensures that the equipment is not simply disposed off or destroyed, thus maintaining its resale value. However, the equipment will stop working once the time units run out.

All have experienced Internet failure due to server breakdown or the like. In order to avoid the equipment not working in such situations, the equipment is also fitted with a "buffer" containing time units for the equipment to use when the server connection is down or inaccessible. When the equipment is used for the first time, it is provided with enough time units to make it work for predetermined number of days without connecting to the Internet and the supplying server. The equipment is only able to tap into the buffer once it has

received an Internet failure notification, and once the buffer is empty, further time units must be downloaded for the equipment to work again. An empty buffer, i.e. no time units remaining, will cause the equipment to close down and remain closed down until further time units have been downloaded to it.

Theft protection can also be applied to portable equipment such as digital cameras, portable PCs etc. All it takes is for the equipment to be connected to the Internet, e.g. via a PC, when it needs to download further time units. Before leaving the house, the user needs to make sure that the equipment has been provided with enough time units to last through the period of time you will be using it offline.

When the retailer registers the equipment, he/she registers the retailer ID- number (possibly also the sales person's ID-number), the equipment and certificate numbers, as well as date and time of registration, using a bar code reader or just entering the associated data or number.

When the equipment is registered on the portal by the user connecting it to the Internet, a registration is made of the connected IP-address, the equipment's unique number and point of time of the Internet connection. Along with the equipment's certificate number, which is registered with the retailer, these pieces of information are transferred through an encrypted SSL-connection.

It is therefore an advantage that no personal data are left with the retailer. Accordingly a thief cannot obtain the data at the retailer to locate the physical place (address) of the equipment.

The technology used in this system is based on standardised forms of communication. Data exchange takes place using normal encryption through SSL (HTTPS), a recognised, secure form of communication. Equipment, which is able to communicate via the Internet, is bound to be based on such protocols. The only extra function that needs to be integrated into the equipment software is a means of measuring and loading running time, as well

as storage space for the unique equipment identification certificate. Furthermore, various product/supplier-related functions may be included (service functions).

A certificate is a number of databytes, which can only be validated if one has the key to the certificate, see Fig. 2.

The certificate is stored on the equipment and in the database of the Internet portal. The key to the certificate is associated with the document and with the serial number (product serial number, product serial No., vide Fig. 1) it possible to unlock the certificate

An example of a browser certificate is shown in Fig. 3. The Figure illustrates a printout browser certificate. This is a Danish version of the browser certificate. The words as stated in Danish are in English as follows in the table below:

Translation of the Danish-language content in the rint screen of Fig. 3

The system comprises the following modules/units:

1) Software program embedded in equipment

2) Manufacturer interface in order to enable storing of the certificate in the equipment and possibly on-line generation of certificates

3) Retail-interface for handling (activation) of certificates

4) User-interface allowing the user/purchaser to handle their respective equipment

5) Equipment-interface, communication with equipment legally connected

6) Administration system for handling of manufacturers, retailers and users

7) Invoicing system

8) General webservices for partners and customers/buyers/user

Item 1 and 2 involve local physical special adaptation of applications and interfaces, the other items are in principle web-based screen images extended with a device, e.g. a standard barcode-reader/scanner, additionally or alternatively a keyboard and/or a mouse may be used to enter data

The database registers the following information

Table USERDATA

Table CERTDATA

Table LOGDATA

Table PRODLOG

In order to enable handling of systems and equipment a shared and /or common Internet portal is associated with all series of equipment and/or products sold or to be sold from the retailer. The Internet portal is used by the retailer to enter information - see the above tables - about each individual equipment or apparatus. Correspondingly, the Internet portal is used by the user or buyer of the product or equipment to handle the equipment, and in case of theft to put forward a charge of theft.

The Internet portal may be accessed to:

• Registering of equipment • Receiving of time units (ticks)

• Tracking or tracing of stolen equipment

• Charge of theft

Additionally, the Internet portal may be accessed to:

• Datacontrol of the equipment or apparatus

• (repair or maintenance control)

• New software versions to the equipment or other services

The following Figures of the implementation of the invention are considered to be self-explanatory. The Internet is connected to via P1. By means of P1 it is possible to gain access to the status, e.g. number of ticks remaining, serial number, etc of the equipment. Further, through P1 it is possible from the Internet portal to gain access to the equipment, e.g. number of ticks used and/ or remaining, serial number, maintenance status of the equipment, etc. and if it turns out that the equipment is stolen the equipment may be shot down.

Fig. 4 illustrates the component layout of a prototype version of the electronics. The prototype version of the electronics is e.g. an integral part of the equipment.

Fig. 5 illustrates the component layout of a prototype version of the electronics. The primary, big components are illustrated e.g. the connector and the capacitors.

Fig. 6 illustrates the main components of the prototype. The main components of the prototype are the circuit for the power supply and the main building blocks, i.e. the CPU, the network block, the memory block and the interface block.

Figs. 7 - 10 illustrate the electronics in more details.

Figs. 7a and 7b are to be laid side by side to connect A0-A23 and CS0-CS3 with one another.