WO1996008754A1 - Method for protecting an apparatus against unauthorized use - Google Patents
Method for protecting an apparatus against unauthorized use Download PDFInfo
- Publication number
- WO1996008754A1 WO1996008754A1 PCT/BE1995/000083 BE9500083W WO9608754A1 WO 1996008754 A1 WO1996008754 A1 WO 1996008754A1 BE 9500083 W BE9500083 W BE 9500083W WO 9608754 A1 WO9608754 A1 WO 9608754A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- code word
- under control
- word
- monitoring station
- code
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000012544 monitoring process Methods 0.000 claims abstract description 38
- 238000012545 processing Methods 0.000 claims abstract description 14
- 230000009849 deactivation Effects 0.000 claims abstract description 9
- 238000004458 analytical method Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 6
- 238000012795 verification Methods 0.000 description 5
- 230000005856 abnormality Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 230000002349 favourable effect Effects 0.000 description 3
- 238000009877 rendering Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Definitions
- the invention relates .to a method for the protection against unauthorized use of an apparatus running on an electric current, whereby at least one external first code word presented to the apparatus, is processed in the apparatus, and on the basis of the thus obtained processing result, the apparatus being switched either to at least partial deactivation or being released.
- a method is for example applied in car radios and in computer programs loaded in a computer.
- the method intends to render theft less attractive by application to car radios, and to prevent illegal use by application to computer programs .
- the user knows the first code word that he must present to the apparatus.
- the apparatus verifies if the first code word presented corresponds with the one expected, and releases the apparatus when the correct first code word is received. If not, the apparatus is totally or partially deactivated rendering it at least partially unusable.
- a drawback of the known method is that the first code word is generally easy to discover rendering the protection insufficient.
- the user knows the first code word' and because it remains unchanged, or could be changed by the user himself, a collusion of the user is not to be excluded in case of theft or illegal use.
- the object of the invention is to realise a method for the protection against unauthorised use of an apparatus running on electric current that offers a more adequate protection.
- a method according to the invention is characterised in that the occurrence of at least one predetermined event occurring upon operation of said apparatus is monitored by said apparatus, and after having established that said event has occurred a second code word is generated by the apparatus that thereupon is presented to at least one monitoring station, wherein the first code word is thereafter determined on the basis of the second code word.
- the user does not know the first code word or only at the time it has to be presented.
- another first code word will then be presented, preferably different form the first code word.
- the fact that the second code word is generated after the occurrence of at least one predetermined event which is monitored by the apparatus, gives an unexpected character to the protection method on which the user has no grasp. In that manner the security facet is stressed.
- the fact that the monitoring station generates the first code word obliges the user to implicate an external source whereby an external monitoring is rendered possible. Collusion of the user is considerably complicated by the intervention of the external station.
- the supply of a first code word by a monitoring station to an apparatus is for example known as such from
- EP-A-0373278 In the latter application a main station provides a code word to a remote station upon receipt of another code word furnished by the remote station.
- the main station according to EP-A-0373278 however does not generate the code word on the basis of the other code word, as that code word is already known by the operator at the main station.
- the first code word is not stored beforehand in the apparatus and becomes only known when the monitoring station has supplied it after having determined the first code word on the basis of the second one.
- a first preferred embodiment of a method according to the invention is characterised in that the apparatus is at least partially deactivated upon generation of the second code word.
- the apparatus is consequently rendered partially unusable until the correct first code word is presented, and the authorised user will be incited to request his first code word as fast as possible.
- the attention of the user will directly be attracted to the fact that something is going on with the apparatus, without enabling him to exercise any influence thereupon.
- a second preferred embodiment of a method according to the invention is characterised in that said partial deactivation of the apparatus is executed with a predetermined delay. The authorised user will therefor experience no discomfort from the method according to the invention during this period.
- a third preferred embodiment of a method according to the invention is characterised in that a command word is incorporated in the first code word and that, after reception of the first code word by the apparatus, the or the events are substituted by one or more further events under control of the command word.
- a command word is incorporated in the first code word and that, after reception of the first code word by the apparatus, the or the events are substituted by one or more further events under control of the command word.
- a fourth preferred embodiment of a method according to the invention is characterised in that in the second code word a subsequent command word is incorporated on the basis of which the first code word is determined. Consequently differentiation between apparatuses of a same type is possible. It is favourable that under control of said one or more subsequent events a further second code word be generated on the basis of which a further first code word is generated, whereby said further first and second code words are substantially different form the first and second code word. Because code words and further code words are different from each other, the knowledge of the first code word does not offer any solution when a further second code word is generated.
- the invention also relates to a set composed of an apparatus running on electric current and a monitoring station, which apparatus comprises a decoding unit provided to decode a first code word presented at the input of the apparatus, and on the basis of the decoded result either to at least partially deactivate the apparatus either to release it.
- Such a set is characterised in that the apparatus comprises a first code word generator comprising a memory element provided for storing a parameter identifying at least one predetermined event to occur upon operation of said apparatus, said first code word generator being provided to monitor the occurrence of said event and to issue a second code word to said monitoring station upon establishing that said event (s) occurred, which monitoring station comprises a second decoding unit provided to decode said second code word as well as a second code word generator connected to the second decoding unit and provided to generate said first code word under control of the receipt of the second code word.
- Figure 1 schematically represents a combination of an apparatus running on electric current and a monitoring station according to the invention.
- Figure 2 represents a data processing device as a component of an apparatus according to the invention.
- Figure 3 and 4 represent a flow chart of the method according to the invention, at least for what concerns the apparatus .
- the set according to the invention and shown in figure 1 comprises an apparatus 1 running on electric current as well as at least one monitoring station 2.
- the apparatus is for example formed of a car radio, a photo camera or video camera, a video recorder, a radio or television apparatus, a radio or television decoder, a motor management unit of a vehicle, a refrigerator, a computer, etc..., in sum, any apparatus that is fed by means of electric current. This current is subtracted from the mains and supplied to the apparatus via an input
- the apparatus should be provided with a data processing unit such as a microprocessor or a PLA for example.
- the apparatus has a communication module 3, preferably provided with a display unit and a data supply member.
- the communication module 3 can additionally be provided with an antenna or a telephone connection for example.
- the monitoring station 2 is also provided with a communication module 4 intended to cooperate with the communication module 3 when these are directly in connection with each other.
- the monitoring station is further provided with a data processing unit in order to process information originating from the apparatus and to generate further information therefrom.
- the apparatus is preferably provided with a data processing device 10 as shown in figure 2.
- the data processing device comprises a microprocessor 6 connected to a communication bus 5 whereto a memory element such as for example a ROM 7 and RAM 8 are further connected as well as an input/output interface 9.
- a memory element such as for example a ROM 7 and RAM 8 are further connected as well as an input/output interface 9.
- the memory element could for example be included in the microprocessor or formed by a flip-flop or a counter. It is clear that the components of this data processing device are not only intended for the application of the method according to the invention, but can also execute other functions of the apparatus.
- the method is started up (11, SRT) when electric current is presented to the apparatus. This can happen for example when the plug is introduced in the plugsocket for the first time, such as for example in video recorders , refrigerators and other apparatuses that run under uninterrupted current.
- SRT start up
- the starting point with apparatuses that do not run under uninterrupted current occurs when the apparatus is switched on.
- a circuit break be registered when it occurs, for example because the plug has been unplugged from the plugsocket .
- the apparatus is set under current again, the procedure is started over again.
- Subsequent events that can lead to the generating of the second code word are for example a predetermined number of times that the apparatus is switched on and off, that reset operations have taken place, or that the current supply has been interrupted.
- a number of times that well determined manipulations inherent to the apparatus have taken place such as for example in a car radio the number of times that a well determined channel is chosen, or the number of times a particular memory address is read in a computer, are all events that can lead to the generating of the second code word.
- the generating of the second code word can also occur on request of the user, who can verify in this manner that the delivered apparatus is not registered as stolen. The user will push on the appropriate key, or execute a predetermined manipulation.
- the apparatus monitors the occurrence of the predetermined event.
- a parameter identifying that predetermined event is stored in the memory element .
- That parameter is for example a preset number (N) stored in the memory element of a counter which is part of the microprocessor 6.
- An individual counter or a "modulo N" counter could also be used for that purpose.
- Other examples of such a parameter are for example a memory address or a data word to be addressed or read during operation of the apparatus .
- the memory element could also be formed by a flip-flop, whereas the predetermined event could be the triggering of the flip-flop.
- the monitoring by the apparatus of the occurrence of the predetermined event is for example realised by comparison with the parameter stored in the memory element .
- the generating of the second code word can eventually be linked to the use of a particular software or be limited to the use of well determined functions of the apparatus. Subsequently the generating of the second code word can be time-linked, so that for example five years after the installation of the apparatus, the second code word will no longer be generated and the method will be neutralised.
- NT? When no second code word is to be generated (12, N) because the conditions are not fulfilled, it is verified if the apparatus is not already in an at least partially deactivated condition, for example as consequence of a previous generated second code word. If not, then the program stays in a monitoring loop until said one or more events have occurred. 14. NT : If the apparatus is in an at least partially deactivated condition, then this condition is hereby reenforced eventually by means of the emission of a message to the user. 15. GN2CW : When it is confirmed by step 12 that one or more events have occurred that lead to the generating of the second code word, then that second code word is now generated. At the same time, a flag is set which shows that the second code word has been generated in order to simplify the verification within step 13.
- the second code word can take various forms depending on the apparatus.
- the second code word can for example be a one or more bits binary word, or it can comprise a command word that imposes a series of commands to the user that are presented on a display unit. Such commands are for example the contact establishment with one or more monitoring stations.
- the second code word will preferably be automatically proposed to the monitoring station.
- the second code word can comprise if required a further command word, that will then be used to determine the first code word. In that manner an individual character can be given to the first and second code word of every apparatus.
- the second code word preferably comprises an identification of the or the element (s) that have lead to the generating of the second code word. This must then enable the monitoring station to take this identification into consideration for the determination of the first code word.
- STC When the second code word is generated the apparatus enters a stand-by cycle whereby it awaits the reception of the first code word. During this stand-by cycle, the apparatus is at least partially deactivated either immediately or with a certain delay after expiration of a predetermined period. This deactivation can vary from one apparatus to another. In a car radio for example the receiver or the end stage amplifier can be disconnected, in a computer one or more computer programs can be locked.
- the second code word When the second code word only deactivates the apparatus after expiration of a predetermined period, the second code word will preferably initiate counting means that count down the predetermined period. When the latter is reached without the counter being stopped beforehand, then the total or partial deactivation will become operative, depending on whether or not the apparatus was simultaneously switched to partial deactivation when generating the second code word.
- the second word generated it has to be presented to one or more monitoring stations in order to determine the first code word there, on the basis of the second code word.
- the emission of the second word itself varies on whether the user contacts the monitoring station and transmits the second code word, or whether the apparatus, when it is provided thereto, sends itself the second code word.
- the monitoring station uses, for the determination of the first code word, for example the serial number of the apparatus, and identifies the source from which the second code word is originated. When the station discovers no abnormalities such as for example a strange source of origin, or does not collect from the second code word any information which demonstrates an unauthorised use, it will generate a first code word that will release the apparatus.
- the release can as well be a release for an undetermined period as a release for a determined period, depending on what the monitoring station has decided.
- the station uses on one hand the information present in the second code word, and on the other hand its own data. In that manner the station keeps data over theft reporting up to date in order to verify if an apparatus with a certain serial number was stolen for example. Additionally, the station keeps data up to date over when and for which apparatus a first code word has been generated. Therefrom, the station can then conclude whether, for example, there is illegal copying. Indeed, when a first code word has already been generated for a same software serial number beforehand, and that no appeal is thus expected in the short term, this clearly concludes to unauthorised use.
- the station thus preferably keeps personalised data up to date for every apparatus, that enables it to memorise and to analyse the profile of the user for the generation of the first code word. If the station now determines abnormalities that are indicative of an unauthorised use of the apparatus, such as for example disconnection of the loud speakers in a car radio, a repetitive appeal for a same software program in the short term, etc..., the station will generate a first code word that will lead either to a total deactivation or to a temporary release. Both solutions are obtained by analysis of the second code word in which the information that reflect abnormalities is stored, as well as the information available in the station such as already described. For this purpose, such abnormalities are monitored by the apparatus, and stored in the memory in order to dispose of them when generating the second code word.
- the extent to which such monitoring takes place and the choice of the events to be monitored and stored depends on the extent to which the apparatus is to be monitored, and the value of the apparatus.
- a refrigerator will consequently comprise a far lower protection level then for example a big computer system.
- To implement such monitorings use is made of for example flip-flop or clocks and the likes.
- the first code word is determined by one or more monitoring stations it is sent to the apparatus in a manner analogous to the one used for the emission of the second code word.
- the first code word comprises either a binary word or a series of manipulations such as for example "switch radio on a certain frequency”, “switch out AFC”, etc..., that the user must execute.
- RC1CW The first code word such as issued by the monitoring station, is presented to the apparatus.
- AN1CW The first code word is now analysed by the apparatus in order to verify if it is indeed a usable first code word. This analysis can occur in various manners, depending on the data processing capacity of the apparatus. In that manner an error detection algorithm can be applied on the first code word, or the first code word can be formed from a predetermined mangling of the serial number.
- the apparatus verifies that the appropriate manipulation occurs in the appropriate order, so as imposed by the first code word.
- the apparatus then emits a positive or negative result, whereby the negative result can eventually be nuanced and can impose a further test on a later point in time.
- the apparatus executes the verification on the first code word by means of for example the necessary program steps stored in the memory element. In the case that only a flip-flop is used, the first code word would reset the flip-flop.
- ACT? The apparatus takes the result of the analysis into consideration.
- ACT If the result of the analysis is positive, which signifies that the apparatus is in the hands of an authorised user, the apparatus is released.
- NN? The existence of a nuanced negative result is examined.
- TACT If a nuanced negative result is determined, the apparatus is temporarily released in expectation of a subsequent control .
- SDCW A nuanced analysis outcome is often the result of the presence of a command word in the first code word. That command word indicates that the monitoring station has objections about the second code word and considers a subsequent verification necessary.
- the apparatus will then store this command word in order to generate a further second code word herewith, that preferably is different from the previously generated second code word, and this to prevent that a same first code word be generated. That subsequent second code word will then be determined in a later period in time, determined by the apparatus in function of the command word and an analogous procedure will then be initiated with that subsequent second code word.
- the station will then determine a further first code word in order to execute the verification.
- the further first code word is preferably different from the first code word.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP95931100A EP0781426A1 (en) | 1994-09-16 | 1995-09-15 | Method for protecting an apparatus against unauthorized use |
AU34672/95A AU3467295A (en) | 1994-09-16 | 1995-09-15 | Method for protecting an apparatus against unauthorized use |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP94870149.5 | 1994-09-16 | ||
EP94870149 | 1994-09-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1996008754A1 true WO1996008754A1 (en) | 1996-03-21 |
Family
ID=8218672
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/BE1995/000083 WO1996008754A1 (en) | 1994-09-16 | 1995-09-15 | Method for protecting an apparatus against unauthorized use |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP0781426A1 (en) |
AU (1) | AU3467295A (en) |
WO (1) | WO1996008754A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1990004841A1 (en) * | 1988-10-27 | 1990-05-03 | Motorola, Inc. | Event-based adaptive radio control |
EP0373278A1 (en) * | 1988-12-13 | 1990-06-20 | International Business Machines Corporation | Remote power on control device |
EP0398492A2 (en) * | 1989-05-15 | 1990-11-22 | International Business Machines Corporation | A flexible interface to authentication services in a distributed data processing system |
-
1995
- 1995-09-15 WO PCT/BE1995/000083 patent/WO1996008754A1/en not_active Application Discontinuation
- 1995-09-15 AU AU34672/95A patent/AU3467295A/en not_active Abandoned
- 1995-09-15 EP EP95931100A patent/EP0781426A1/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1990004841A1 (en) * | 1988-10-27 | 1990-05-03 | Motorola, Inc. | Event-based adaptive radio control |
EP0373278A1 (en) * | 1988-12-13 | 1990-06-20 | International Business Machines Corporation | Remote power on control device |
EP0398492A2 (en) * | 1989-05-15 | 1990-11-22 | International Business Machines Corporation | A flexible interface to authentication services in a distributed data processing system |
Also Published As
Publication number | Publication date |
---|---|
EP0781426A1 (en) | 1997-07-02 |
AU3467295A (en) | 1996-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5003591A (en) | Functionally modifiable cable television converter system | |
EP1280350B1 (en) | Time validation system | |
US5708712A (en) | Vehicle security device with electronic use authorization coding | |
KR100997467B1 (en) | Method for remote diagnostics and set-top box | |
US7853798B2 (en) | Program tamper detecting apparatus, method for program tamper detection, and program for program tamper detection | |
US20040202109A1 (en) | Data distribution server and terminal apparatus | |
US20060115085A1 (en) | Communication system having plurality of nodes sharing a common cipher key, cipher key dispatching apparatus for use in the system, and anti-theft apparatus utilizing information derived from cipher key utilization | |
EP0675626A1 (en) | Security system | |
KR19980073478A (en) | Broadcast receiver with electronic money terminal function and method | |
US6122350A (en) | PSTN appliance security system with reduced PSTN traffic loading | |
CN102172037B (en) | Multi-vendor conditional access system | |
CN113850938A (en) | Intelligent door lock control method and device, storage medium and electronic equipment | |
US6968018B2 (en) | Digital broadcast receiving apparatus, and a method for receiving digital broadcasts | |
CN1081041A (en) | Prevent to send the authorization code lockout mechanism of going beyond one's commission and receiving of data | |
EP0740037A1 (en) | Security device | |
US20050216943A1 (en) | Method and apparatus for processing television system messages received when a device is in a low power mode | |
CN107959890B (en) | Detection method, device, terminal and storage medium for reserved recording | |
EP0781426A1 (en) | Method for protecting an apparatus against unauthorized use | |
WO2004017637A1 (en) | Hard disk security | |
KR100245442B1 (en) | Wireless call receivers and receiving methods | |
US8565431B2 (en) | System and method for scrambling wireless signals using a secure time value | |
CN109005450B (en) | Broadcast control method and device of broadcast equipment | |
WO2005015932A1 (en) | Method of preventing use of a lost or stolen device including a digital transmission receiver | |
US7502473B2 (en) | Process for managing the handling of conditional access data by at least two decoders | |
JP3138582B2 (en) | Anti-theft viewing device in CATV terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AM AT AT AU BB BG BR BY CA CH CN CZ CZ DE DE DK DK EE EE ES FI FI GB GE HU IS JP KE KG KP KR KZ LK LR LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SK TJ TM TT UA UG US UZ VN |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): KE MW SD SZ UG AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref country code: US Ref document number: 1997 809313 Date of ref document: 19970314 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1995931100 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1995931100 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1995931100 Country of ref document: EP |