US20100066507A1 - Automated Control System for Multi-Level Authority to Operate Electronic and Electrical Devices - Google Patents
Automated Control System for Multi-Level Authority to Operate Electronic and Electrical Devices Download PDFInfo
- Publication number
- US20100066507A1 US20100066507A1 US12/308,061 US30806107A US2010066507A1 US 20100066507 A1 US20100066507 A1 US 20100066507A1 US 30806107 A US30806107 A US 30806107A US 2010066507 A1 US2010066507 A1 US 2010066507A1
- Authority
- US
- United States
- Prior art keywords
- code
- set forth
- security
- mobile phone
- protected
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
- G06F21/43—User authentication using separate channels for security data wireless channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B15/00—Systems controlled by a computer
- G05B15/02—Systems controlled by a computer electric
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/40—Remote control systems using repeaters, converters, gateways
- G08C2201/42—Transmitting or receiving remote control signals via a network
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/60—Security, fault tolerance
- G08C2201/61—Password, biometric
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/90—Additional features
- G08C2201/91—Remote control based on location and proximity
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/90—Additional features
- G08C2201/93—Remote control using other portable devices, e.g. mobile phone, PDA, laptop
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2807—Exchanging configuration information on appliance services in a home automation network
- H04L12/281—Exchanging configuration information on appliance services in a home automation network indicating a format for calling an appliance service function in a home automation network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
- H04L12/2818—Controlling appliance services of a home automation network by calling their functionalities from a device located outside both the home and the home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
- H04L12/282—Controlling appliance services of a home automation network by calling their functionalities based on user interaction within the home
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/283—Processing of data at an internetworking point of a home automation network
- H04L12/2834—Switching of information between an external network and a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/14—Special services or facilities with services dependent on location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/30—Determination of the location of a subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
- H04M3/382—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
Definitions
- the invention relates to a control system for the authority to operate electronic and electrical devices, the level of authority provided thereby being subject to change automatically according to location and service mode.
- the system includes one or more controlled devices and an individual security code controlling the operation thereof, and an identification of one or more authorized users according to a location or service conditions, as well as an automated control of the security code.
- security relating to the use of electronic devices has been implemented either by a burglar alarm or an access code capable of denying unauthorized use of the device.
- Examples include burglar alarms and code-encrypted car radios as well as mobile phones.
- the purpose of security codes and alarm equipment is to prevent unauthorized use as well as a theft of the device.
- a problem with such protection methods is that people do not know how to use the equipment or become tired of repeatedly tapping codes, which thus remain unused.
- One unsolved problem is presented for example by portable entertainment equipment such as MP3 players, which have no protection whatsoever and which are consequently stolen directly from users.
- Car radios are also often used without a removable face panel, thus facilitating a theft thereof.
- Controlling the service mode of home automation has been traditionally effected by an identifier or action calling for personal activity.
- a user sets the system with push buttons in an absence or long absence control mode and upon arrival at home in a presence control mode encrypted by a code or some other electronic identifier.
- the identification can be effected in a wireless and automatic manner, but the service is limited to the immediate ambience of an object and the level of absence cannot be determined automatically.
- a problem with these traditional solutions, e.g. in reference to arriving at home is a slow response time of temperature regulation, the proper function of which would require earlier knowledge about when the users are due to arrive, which at present calls for an active personal remote control or the use of a control timer.
- the system has a range of application extending from granting the right of using a single mobile device all the way to automated control of a multi-level mode in building automation. In electronic devices, the right of use can also be verified from manufacture all the way to end use.
- the authorization is implemented by a protected operating code and by its automatic communication, depending either on the intended use of a device or on the location or relocation of an authorized person.
- the level of operating authority granted by the system may also change automatically according to the operating condition.
- the protection system enables securing electronic and electrical devices without the user having to tap in security codes as protection takes place in the background automatically, such that the code can be put out by a place in which the device is used or by peripherals attached to the protected device.
- An applicable protection code can be provided by numerically encoded childproof locks of existing entertainment equipment or mobile phone protection codes, base station information, a bluetooth communication link, with no modifications needed in the equipment.
- What is essentially novel is that the above-described existing codes are used and controlled automatically. Thus, a device can be protected by an individual code as early as at a manufacturing plant.
- the protection code put in at a manufacturing plant can be delivered, prior to first use of the device, through the supplier's logistic system, such that it will only be given to a purchasing customer at a sale transaction as a number, which is only activated by the user as the device is set up for active service.
- the protection code can also be delivered to a customer by way of existing electrical payment media or a mobile phone.
- a security code transmitter employed during service can be integrated with or disposed for example in a charging unit, a service power supply system, a local network, a service server, a burglar alarm system or a smart home control system, from all of which there is either a wired or wireless communication link to a protected device.
- the code is transmitted automatically under the control of an identification made by an operation-authorized person or the code communicated by peripherals or a service environment is identified by the protected device.
- the protection of portable equipment can be effected by using a charging unit with a code transmitter integrated therewith, whereby the battery can only be charged or the device programmed with a voltage source that is part of the device or encoded therefor.
- a device cannot be used, except in a restricted manner, without a security code, the operation of e.g. a mobile phone being only possible by using previously programmed numbers or within the range of a desired base station and the listening of an MP3 player only for as long as long the battery stays alive. Neither can an MP3 player be loaded with new music without a charging unit or a PC encoded therefor. Hence, the electronic device is useless for anyone who snatches it. By virtue of a restricted operating mode, the maintenance of equipment is nevertheless possible without the code.
- the method makes it impossible for a snatcher to use the phone for his/her own purposes, which means that snatching mobile phones from young and elderly people is no longer plausible.
- the mobile phone may also use a prior known base station as a working condition, in which case it can only be used within the coverage range of accepted base stations or the protection status may change according to a base station.
- the switched-on status of a charging unit allows for the programming of numbers and the exchange of a SIM card and a base station near home allows for unrestricted calling and a school-covering base station only allows for calling programmed numbers.
- a further novel feature is also that a single joint code transmitter, mounted on or integrated with an electric distribution board or some other control device in the summer cabin, at home or in the office, which, on the basis of a bluetooth communication link and base station information regarding the home-covering mobile phone network, identifies the presence of accepted persons, is capable of protecting all desired pieces of home electronic entertainment equipment.
- the joint code transmitter provides a permanent or transient security code through the intermediary of an electrical network, a radio-frequency or infrared signal or some other prior known data transfer method whenever an authorized person arrives home or when he/she enters the range of a home-covering mobile phone base station.
- the system also enables an automatic identification of leaving home, as well as a long or short absence.
- the identification takes place by means of a person's mobile phone, whereby, when the person leaves the range of a home base station network, the program integrated with the mobile phone can transmit a message to the home automation system regarding the departure.
- the mobile phone program or the operator service can be used for detecting a distance from home and to automatically control information regarding both departures and arrivals.
- the heating of a summer cabin can be remote-activated beforehand automatically when, on the basis of base station information, it is perceived that a person is heading towards the summer cabin and his/her arrival in the destination is ultimately identified by a bluetooth communication link, which is automatically switched on by the mobile phone once arriving within the range of a base station closest to the cabin.
- the system can also be used as clearance monitoring information for denying the unauthorized use of all equipment or the PC of a particular person.
- wireless or wired network technology for transmitting a code, wherein the “virtual transmitter” uses bluetooth identification. This also enables the protection of PDA equipment which uses a wireless local network, such that said equipment is only capable of operating within and not at all outside a desired area.
- Another novel feature is that all electronic equipment aboard an automobile can be protected by means of a single code transmitter, which is concealed within structures or integrated with a bus used in the automobile and which is controlled by a bluetooth communication link automatically, whereby the user is neither required to memorize input codes nor to remove operating panels.
- a still further novel feature is that the system enables setting up the devices in various modes as desired by the customer.
- the restricted mode can be switched on in such a way that TV is on only the presence of parents while children, whenever home by themselves, are only able to watch children's channels.
- a restricted mode can also be applied to a telephone whereby, consistently with the preceding example, in the parents' absence it is only possible to call accepted numbers and, when absent, the phone calls are automatically diverted only to an alarm center or emergency number.
- FIG. 1 shows the system in operation from manufacturing to retailing.
- FIG. 2 shows the system in operation with entertainment equipment.
- FIG. 3 shows the system in operation at home.
- FIG. 4 shows the system in operation with a mobile phone.
- FIG. 1 shows the system in operation in terms of protecting the supply chain of electronic devices from a manufacturing plant to a retail store and to the end user.
- the product has an individual protection code put in at a manufacturing plant 1 , which code is sent to a logistic server 2 that transmits the security code to an end customer upon receiving a message from a retailer 3 regarding a sale transaction of the device and a mobile phone number for the end customer.
- the logistic server also verifies whether a product shipped from the manufacturing plant 1 is in the possession of an authorized retailer 3 as the sale transaction is confirmed.
- the customer picks up the product at the store 3 and the security code is transmitted to him/her by a mobile phone as he/she makes a call to the logistic server 2 .
- a product 6 can be delivered all the way to a place of use and it is not until there 7 that the security code allows for operation of the device. Accordingly, the entire supply chain is secured from the factory all the way to the location of final use.
- FIG. 2 depicts the system in operation with entertainment equipment.
- the protected product for example an MP 3 player 6
- the protected product is activated at the time of its first use by means of a security code obtained at the sale transaction, such that the code is tapped in by the keys of the device or a PC 8 or by way of the internet/a mobile phone network 5 , the code becoming recorded in a user-right authorizing memory of the PC 8 and a charging unit 8 .
- the latter shall confirm an operating authority by transmitting a security code 7 to the device.
- the device cannot be loaded or new data recorded in its memory without a charging unit or a PC authorizing the right of use 8 .
- FIG. 3 depicts the system in operation at home.
- protected devices 6 consist of home entertainment equipment, a standard feature of which is a childproof lock code that can be used as a security code all the way from a manufacturing plant.
- a device 8 authorizing the right of use is the home automation or security system operating device, featuring a wireless communication for transmitting a protection code 7 to entertainment equipment (IR), heaters (RF) 10 , and a mobile phone (bluetooth) 11 or a mobile phone network 12 .
- IR entertainment equipment
- RF heaters
- mobile phone bluetooth
- the operating authority control device 8 activates childproof locks for the entertainment equipment.
- a message is sent to the control device 8 about the user going outside the range of a mobile phone base station 16 covering the place of use.
- the control device 8 sets heating of the site to a lower level, for example to 18 degrees. In the event that a person authorized to use the site goes away, for example abroad, he/she shall arrive within the range of a mobile phone network 15 in another country.
- a message is sent to the control device 8 about the user stepping outside the country's borders for further dropping the temperature to a lower level.
- the control device 8 shall be respectively informed of an arrival in the home country or in the coverage range of a place-of-use base station, whereby the control device 8 sets up the heating stepwise to a normal level and activates the short-range mobile phone communication (bluetooth) 11 .
- the control device 8 shall switch off the childproof locks of the entertainment equipment.
- the method enables protecting entertainment equipment, such that the use thereof outside an authorized place of use shall be disabled and the protection thereof shall be controlled automatically.
- the control of an operating authority for heating proceeds also automatically without the user having to transmit any control commands in advance.
- FIG. 4 depicts the system in operation with a mobile phone.
- the protected device comprises a mobile phone 6 and a protection or security code 7 is provided by the base station information of a mobile phone network.
- the mobile phone detects whenever the user is within the range of whichever base station 5 , 20 of a mobile phone network. This information is applied to control the protection of a mobile phone in such a way that, when the phone is for example within the range of a home base station, it is possible to make unrestricted calls but the programming of new numbers or the switching of a sim card is disabled.
- the phone when a mobile phone leaves the range of a home base station 5 and steps into the range of any other base station 20 , the phone only enables calls to speed-dial, numbers.
- the programming of mobile phone numbers or the switching of a sim card can only be performed within the coverage range of the home base station 5 and with a right-of-use authorized charging unit, as described in reference to FIG. 2 .
- the system enables protecting a mobile phone automatically, nor can it be loaded or put to full service except with its specific home base station and charging unit.
- the system utilizes the base station information of a mobile phone network and/or at close range a wired or wireless communication link, such as a bluetooth communication link.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention relates to an automated control system for multi-level authority to operate electronic and electrical equipment, said system comprising one or more wireless or wired controlled devices and one or more separate communicator and/or transmitter devices for an operation authorizing code and/or separate user identifiers for communicating the codes to a customer or a device. In the process of granting authorities to operate, the system utilizes, as positional data for a user or a device, the base station information of a mobile phone network and/or at close range a wired or wireless communication link, such as a bluetooth communication link.
Description
- The invention relates to a control system for the authority to operate electronic and electrical devices, the level of authority provided thereby being subject to change automatically according to location and service mode. The system includes one or more controlled devices and an individual security code controlling the operation thereof, and an identification of one or more authorized users according to a location or service conditions, as well as an automated control of the security code.
- Traditionally, security relating to the use of electronic devices has been implemented either by a burglar alarm or an access code capable of denying unauthorized use of the device. Examples include burglar alarms and code-encrypted car radios as well as mobile phones. The purpose of security codes and alarm equipment is to prevent unauthorized use as well as a theft of the device. A problem with such protection methods is that people do not know how to use the equipment or become tired of repeatedly tapping codes, which thus remain unused. One unsolved problem is presented for example by portable entertainment equipment such as MP3 players, which have no protection whatsoever and which are consequently stolen directly from users. Car radios are also often used without a removable face panel, thus facilitating a theft thereof. The most interesting burglary objects at home and office are often electronic equipment for being the easiest items to convert into money. Home electronics is not generally protected but, instead, covered by burglar alarm systems which do not disable the equipment after theft. As for burglar alarms, it is known that break-ins cannot be prevented by those alone, such systems being subject to sabotage and over 50% of people not having them in active mode, which is why the best security could be provided by giving the object a visible protection and in such a way that the snatched piece of property cannot be exploited. Stealing electronic equipment during the course of shipping, storage and from retail stores is also relatively easy.
- Controlling the service mode of home automation has been traditionally effected by an identifier or action calling for personal activity. Typically, a user sets the system with push buttons in an absence or long absence control mode and upon arrival at home in a presence control mode encrypted by a code or some other electronic identifier. In the latest solutions, the identification can be effected in a wireless and automatic manner, but the service is limited to the immediate ambience of an object and the level of absence cannot be determined automatically. A problem with these traditional solutions, e.g. in reference to arriving at home, is a slow response time of temperature regulation, the proper function of which would require earlier knowledge about when the users are due to arrive, which at present calls for an active personal remote control or the use of a control timer.
- It is an object of the invention to create a novel control system for operating authority, which grants a right to operate electronic and electrical devices automatically without the user's activity. The system has a range of application extending from granting the right of using a single mobile device all the way to automated control of a multi-level mode in building automation. In electronic devices, the right of use can also be verified from manufacture all the way to end use. The authorization is implemented by a protected operating code and by its automatic communication, depending either on the intended use of a device or on the location or relocation of an authorized person. The level of operating authority granted by the system may also change automatically according to the operating condition.
- This object is accomplished on the basis of the characterizing features presented in the appended claims.
- What is novel about the protection system is that the protection of an electronic device is automated in a way of enabling its utilization in devices intended for both children and the elderly. The protection system enables securing electronic and electrical devices without the user having to tap in security codes as protection takes place in the background automatically, such that the code can be put out by a place in which the device is used or by peripherals attached to the protected device. An applicable protection code can be provided by numerically encoded childproof locks of existing entertainment equipment or mobile phone protection codes, base station information, a bluetooth communication link, with no modifications needed in the equipment. What is essentially novel is that the above-described existing codes are used and controlled automatically. Thus, a device can be protected by an individual code as early as at a manufacturing plant. The protection code put in at a manufacturing plant can be delivered, prior to first use of the device, through the supplier's logistic system, such that it will only be given to a purchasing customer at a sale transaction as a number, which is only activated by the user as the device is set up for active service. The protection code can also be delivered to a customer by way of existing electrical payment media or a mobile phone. A security code transmitter employed during service can be integrated with or disposed for example in a charging unit, a service power supply system, a local network, a service server, a burglar alarm system or a smart home control system, from all of which there is either a wired or wireless communication link to a protected device. The code is transmitted automatically under the control of an identification made by an operation-authorized person or the code communicated by peripherals or a service environment is identified by the protected device. The protection of portable equipment can be effected by using a charging unit with a code transmitter integrated therewith, whereby the battery can only be charged or the device programmed with a voltage source that is part of the device or encoded therefor.
- Another novel feature is that a device cannot be used, except in a restricted manner, without a security code, the operation of e.g. a mobile phone being only possible by using previously programmed numbers or within the range of a desired base station and the listening of an MP3 player only for as long as long the battery stays alive. Neither can an MP3 player be loaded with new music without a charging unit or a PC encoded therefor. Hence, the electronic device is useless for anyone who snatches it. By virtue of a restricted operating mode, the maintenance of equipment is nevertheless possible without the code. In particular reference to the protection of mobile phones, the method makes it impossible for a snatcher to use the phone for his/her own purposes, which means that snatching mobile phones from young and elderly people is no longer tempting. The mobile phone may also use a prior known base station as a working condition, in which case it can only be used within the coverage range of accepted base stations or the protection status may change according to a base station. Thus, for example, the switched-on status of a charging unit allows for the programming of numbers and the exchange of a SIM card and a base station near home allows for unrestricted calling and a school-covering base station only allows for calling programmed numbers.
- A further novel feature is also that a single joint code transmitter, mounted on or integrated with an electric distribution board or some other control device in the summer cabin, at home or in the office, which, on the basis of a bluetooth communication link and base station information regarding the home-covering mobile phone network, identifies the presence of accepted persons, is capable of protecting all desired pieces of home electronic entertainment equipment. The joint code transmitter provides a permanent or transient security code through the intermediary of an electrical network, a radio-frequency or infrared signal or some other prior known data transfer method whenever an authorized person arrives home or when he/she enters the range of a home-covering mobile phone base station. The system also enables an automatic identification of leaving home, as well as a long or short absence. The identification takes place by means of a person's mobile phone, whereby, when the person leaves the range of a home base station network, the program integrated with the mobile phone can transmit a message to the home automation system regarding the departure. When being for example far away from home, the mobile phone program or the operator service can be used for detecting a distance from home and to automatically control information regarding both departures and arrivals. Hence, for example the heating of a summer cabin can be remote-activated beforehand automatically when, on the basis of base station information, it is perceived that a person is heading towards the summer cabin and his/her arrival in the destination is ultimately identified by a bluetooth communication link, which is automatically switched on by the mobile phone once arriving within the range of a base station closest to the cabin.
- In offices, the system can also be used as clearance monitoring information for denying the unauthorized use of all equipment or the PC of a particular person. In connection with computer hardware, it is possible to apply wireless or wired network technology for transmitting a code, wherein the “virtual transmitter” uses bluetooth identification. This also enables the protection of PDA equipment which uses a wireless local network, such that said equipment is only capable of operating within and not at all outside a desired area.
- Another novel feature is that all electronic equipment aboard an automobile can be protected by means of a single code transmitter, which is concealed within structures or integrated with a bus used in the automobile and which is controlled by a bluetooth communication link automatically, whereby the user is neither required to memorize input codes nor to remove operating panels.
- A still further novel feature is that the system enables setting up the devices in various modes as desired by the customer. The restricted mode can be switched on in such a way that TV is on only the presence of parents while children, whenever home by themselves, are only able to watch children's channels. A restricted mode can also be applied to a telephone whereby, consistently with the preceding example, in the parents' absence it is only possible to call accepted numbers and, when absent, the phone calls are automatically diverted only to an alarm center or emergency number.
- The invention will now be described in more detail with reference to the accompanying drawings, in which
-
FIG. 1 shows the system in operation from manufacturing to retailing. -
FIG. 2 shows the system in operation with entertainment equipment. -
FIG. 3 shows the system in operation at home. -
FIG. 4 shows the system in operation with a mobile phone. - A system of the invention is first described in its operation in reference to
FIG. 1 .FIG. 1 shows the system in operation in terms of protecting the supply chain of electronic devices from a manufacturing plant to a retail store and to the end user. In the figure, the product has an individual protection code put in at a manufacturing plant 1, which code is sent to alogistic server 2 that transmits the security code to an end customer upon receiving a message from aretailer 3 regarding a sale transaction of the device and a mobile phone number for the end customer. The logistic server also verifies whether a product shipped from the manufacturing plant 1 is in the possession of an authorizedretailer 3 as the sale transaction is confirmed. Hence, the customer picks up the product at thestore 3 and the security code is transmitted to him/her by a mobile phone as he/she makes a call to thelogistic server 2. This way aproduct 6 can be delivered all the way to a place of use and it is not until there 7 that the security code allows for operation of the device. Accordingly, the entire supply chain is secured from the factory all the way to the location of final use. -
FIG. 2 depicts the system in operation with entertainment equipment. The protected product, for example anMP 3player 6, is activated at the time of its first use by means of a security code obtained at the sale transaction, such that the code is tapped in by the keys of the device or aPC 8 or by way of the internet/amobile phone network 5, the code becoming recorded in a user-right authorizing memory of thePC 8 and acharging unit 8. Thereafter, it is no longer necessary to input the code, whenever thedevice 6 is then connected to the PC or the charging unit, the latter shall confirm an operating authority by transmitting asecurity code 7 to the device. Thus, the device cannot be loaded or new data recorded in its memory without a charging unit or a PC authorizing the right ofuse 8. -
FIG. 3 depicts the system in operation at home. In the figure, protecteddevices 6 consist of home entertainment equipment, a standard feature of which is a childproof lock code that can be used as a security code all the way from a manufacturing plant. Adevice 8 authorizing the right of use is the home automation or security system operating device, featuring a wireless communication for transmitting aprotection code 7 to entertainment equipment (IR), heaters (RF) 10, and a mobile phone (bluetooth) 11 or amobile phone network 12. As the equipment is set up for first use, a protection code is supplied by way of either the mobile phone 11 or themobile phone network 12 to the operationauthority control device 8. When a person in possession of an operating authority leaves the place of use, that will be detected by a disconnection of the short-range mobile phone communication (bluetooth) 11, in which case the operatingauthority control device 8 activates childproof locks for the entertainment equipment. Under the control of an extra service by the mobile phone or the operator, a message is sent to thecontrol device 8 about the user going outside the range of a mobilephone base station 16 covering the place of use. Upon receiving the message, thecontrol device 8 sets heating of the site to a lower level, for example to 18 degrees. In the event that a person authorized to use the site goes away, for example abroad, he/she shall arrive within the range of amobile phone network 15 in another country. Under the control of an extra service by the mobile phone or the operator, a message is sent to thecontrol device 8 about the user stepping outside the country's borders for further dropping the temperature to a lower level. When the user returns, thecontrol device 8 shall be respectively informed of an arrival in the home country or in the coverage range of a place-of-use base station, whereby thecontrol device 8 sets up the heating stepwise to a normal level and activates the short-range mobile phone communication (bluetooth) 11. As the user arrives within a coverage range of the short-range communication (bluetooth) 11, thecontrol device 8 shall switch off the childproof locks of the entertainment equipment. Hence, the method enables protecting entertainment equipment, such that the use thereof outside an authorized place of use shall be disabled and the protection thereof shall be controlled automatically. The control of an operating authority for heating proceeds also automatically without the user having to transmit any control commands in advance. -
FIG. 4 depicts the system in operation with a mobile phone. The protected device comprises amobile phone 6 and a protection orsecurity code 7 is provided by the base station information of a mobile phone network. The mobile phone detects whenever the user is within the range of whicheverbase station home base station 5 and steps into the range of anyother base station 20, the phone only enables calls to speed-dial, numbers. The programming of mobile phone numbers or the switching of a sim card can only be performed within the coverage range of thehome base station 5 and with a right-of-use authorized charging unit, as described in reference toFIG. 2 . Thus, the system enables protecting a mobile phone automatically, nor can it be loaded or put to full service except with its specific home base station and charging unit. - What is essential about the invention is the fact that, as location information in the process of granting operating authorities, the system utilizes the base station information of a mobile phone network and/or at close range a wired or wireless communication link, such as a bluetooth communication link.
Claims (15)
1. An automated control system for multi-level authority to operate electronic and electrical devices, said system comprising one or more wireless or wired controlled devices and one or more separate communicator and/or transmitter devices for an operation authorizing code and/or separate user identifiers for communicating the codes to a customer or the device, wherein the permission to operate electronic or electrical devices or the control or delivery of a code authorizing it proceeds automatically on the basis of the location of an authorized user and/or the device or the predetermined mutual relationship therebetween, such that the security or operating level of the protected device may change according to a location and a service mode,
such that the geographic data of base stations in a mobile phone network is used as a code and the user and/or the device must be located within the range of a predetermined base station in a mobile phone network and the level of operating authority is determined on the basis of the location of various base stations,
or such that the presence of a user is identified by means of the base station information of a mobile phone network and a short-range wireless communication link, such as bluetooth or Wlan, in such a way that the short-range communication link is activated automatically once the user arrives within the range of a determined base station in a mobile phone network,
or an operating authority code is transmitted from the factory to the user by way of an authorized dealer,
or the accepted operating location of the device is identified at close range by means of a code transmitter operating either over a wired or wireless communication link, the activation of which proceeds as described above or by connecting the device to its normal operating environment, such as a charging unit or a docking station or by way of a home automation, security or surveillance system.
2. A system as set forth in claim 1 , wherein the transmission or communication of an operation permitting or authorizing code is effected by any of the alternatives listed as follows: by means of a charging unit, a service power supply system, a clearance monitoring or a smart home/car control system, and useful options for a security code include childproof locks available for entertainment equipment, mobile phone passwords, base station information, a bluetooth/Wlan communication link or a separate code assigned for this service.
3. A system as set forth in claim 1 , wherein the security code for a protected device is communicated by way of either supply logistic or electrical payment systems in isolation from the actual product.
4. A system as set forth in claim 1 , wherein the security code is not made available to a customer until at a sale transaction.
5. A system as set forth in claim 1 , wherein the seller of a protected device is capable of communicating a security code to his/her customer by a separate business or personal encryption code.
6. A system as set forth in claim 5 , wherein the right of a protected device seller to communicate a security code to his/her customer is verified by a logistic system authorization of the correct seller according to the shipping address of the product.
7. A system as set forth in claim 1 , wherein the protected device includes at least one or more security codes covering a range of protection levels, which can be delivered to the device automatically with prior known data transfer methods from outside the device by using prior known data transfer interfaces.
8. A system as set forth in claim 1 , wherein the code transmitter is apart from a protected device either as a separate code transmitter or integrated with other protected or unprotected devices.
9. A system as set forth in claim 1 , wherein the location of a code transmitter can change virtually either randomly or specifically or as distributed amongst one or more protected devices.
10. A system as set forth in claim 1 , wherein one and the same or several different security codes can be used for protecting a plurality of devices, and in that the code(s) can be protected by prior known protection methods.
11. A system as set forth in claim 1 , wherein the security code(s) is (are) transmitted automatically to a protected device either under the control of an operating mode, randomly, at desired intervals and/or by way of a burglar control, clearance monitoring system or some other personal identification method as the presence of an authorized user is detected.
12. A system as set forth in claim 1 , wherein the protected device can operate in a plurality of various restricted operating modes depending on each permitted protection level.
13. A system as set forth in claim 1 , wherein the protected device has a peripheral or data transfer equipment thereof containing a code transmitter, whereby a desired protection level can be established by various operating conditions.
14. A system as set forth in claim 1 , wherein the security codes can be stored in a separate memory unit detachable from the code transmitter.
15. A system as set forth in claim 1 , wherein the use of a security code is prominently displayed in the products with a relevant registered brand.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20065390A FI20065390L (en) | 2006-06-08 | 2006-06-08 | Automatic multi-level access control system for electronic and electrical equipment |
FI20065390 | 2006-06-08 | ||
PCT/FI2007/000161 WO2007141374A1 (en) | 2006-06-08 | 2007-06-06 | Automated control system for multi-level authority to operate electronic and electrical devices |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FI2007/000161 A-371-Of-International WO2007141374A1 (en) | 2006-06-08 | 2007-06-06 | Automated control system for multi-level authority to operate electronic and electrical devices |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/890,349 Division US9196101B2 (en) | 2006-06-08 | 2013-05-09 | Automated control system for multi-level authority to operate electronic and electrical devices |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100066507A1 true US20100066507A1 (en) | 2010-03-18 |
Family
ID=36651484
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/308,061 Abandoned US20100066507A1 (en) | 2006-06-08 | 2007-06-06 | Automated Control System for Multi-Level Authority to Operate Electronic and Electrical Devices |
US13/890,349 Active 2028-07-07 US9196101B2 (en) | 2006-06-08 | 2013-05-09 | Automated control system for multi-level authority to operate electronic and electrical devices |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/890,349 Active 2028-07-07 US9196101B2 (en) | 2006-06-08 | 2013-05-09 | Automated control system for multi-level authority to operate electronic and electrical devices |
Country Status (7)
Country | Link |
---|---|
US (2) | US20100066507A1 (en) |
EP (1) | EP2033474B1 (en) |
ES (1) | ES2749399T3 (en) |
FI (1) | FI20065390L (en) |
NO (1) | NO20085173L (en) |
RU (1) | RU2008151976A (en) |
WO (1) | WO2007141374A1 (en) |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080086758A1 (en) * | 2006-10-10 | 2008-04-10 | Honeywell International Inc. | Decentralized access control framework |
US20100056124A1 (en) * | 2008-09-04 | 2010-03-04 | Virginia Walker Keating | System and method of providing mode changes to wireless devices |
US20110035788A1 (en) * | 2009-08-05 | 2011-02-10 | Conor Robert White | Methods and systems for authenticating users |
US20110173542A1 (en) * | 2009-08-21 | 2011-07-14 | Imes Kevin R | Mobile energy management system |
EP2770601A1 (en) * | 2013-02-22 | 2014-08-27 | HTC Corporation | Method of protecting a power receiver |
US20140344918A1 (en) * | 2013-05-14 | 2014-11-20 | Samsung Electronics Co., Ltd. | Method and electronic device for providing security |
US9024759B2 (en) | 2013-03-15 | 2015-05-05 | Kwikset Corporation | Wireless lockset with integrated antenna, touch activation, and light communication method |
US9178890B1 (en) * | 2011-09-08 | 2015-11-03 | Amazon Technologies, Inc. | Passwordless strong authentication using trusted devices |
US9209652B2 (en) | 2009-08-21 | 2015-12-08 | Allure Energy, Inc. | Mobile device with scalable map interface for zone based energy management |
US9360874B2 (en) | 2009-08-21 | 2016-06-07 | Allure Energy, Inc. | Energy management system and method |
US20160165443A1 (en) * | 2012-12-03 | 2016-06-09 | Douglas Baldasare | System and method for providing photoverification to mobile device charging stations |
US20160191270A1 (en) * | 2014-12-30 | 2016-06-30 | Grand Mate Co., Ltd. | Method of providing operating options of an electric appliance |
US20160204984A1 (en) * | 2010-07-07 | 2016-07-14 | Comcast Interactive Media, Llc | Device Communication, Monitoring and Control Architecture and Method |
US9398443B2 (en) | 2008-09-04 | 2016-07-19 | Qualcomm Incorporated | System and method of providing mode changes to wireless devices |
US20160335423A1 (en) * | 2015-05-12 | 2016-11-17 | Echostar Technologies L.L.C. | Restricted access for home automation system |
US9716530B2 (en) | 2013-01-07 | 2017-07-25 | Samsung Electronics Co., Ltd. | Home automation using near field communication |
US9800463B2 (en) | 2009-08-21 | 2017-10-24 | Samsung Electronics Co., Ltd. | Mobile energy management system |
US9928672B2 (en) | 2013-12-05 | 2018-03-27 | Wallflower Labs Inc. | System and method of monitoring and controlling appliances and powered devices using radio-enabled proximity sensing |
US9960980B2 (en) | 2015-08-21 | 2018-05-01 | Echostar Technologies International Corporation | Location monitor and device cloning |
US9989507B2 (en) | 2014-09-25 | 2018-06-05 | Echostar Technologies International Corporation | Detection and prevention of toxic gas |
US9996066B2 (en) | 2015-11-25 | 2018-06-12 | Echostar Technologies International Corporation | System and method for HVAC health monitoring using a television receiver |
US10027503B2 (en) | 2013-12-11 | 2018-07-17 | Echostar Technologies International Corporation | Integrated door locking and state detection systems and methods |
US10050802B2 (en) * | 2013-03-15 | 2018-08-14 | Vivint, Inc. | Using a control panel as a wireless access point |
US10049515B2 (en) | 2016-08-24 | 2018-08-14 | Echostar Technologies International Corporation | Trusted user identification and management for home automation systems |
US10063499B2 (en) | 2013-03-07 | 2018-08-28 | Samsung Electronics Co., Ltd. | Non-cloud based communication platform for an environment control system |
US10060644B2 (en) | 2015-12-31 | 2018-08-28 | Echostar Technologies International Corporation | Methods and systems for control of home automation activity based on user preferences |
US10061288B2 (en) | 2013-12-05 | 2018-08-28 | Wallflower Labs Inc. | Monitoring and controlling of appliances |
US10073428B2 (en) | 2015-12-31 | 2018-09-11 | Echostar Technologies International Corporation | Methods and systems for control of home automation activity based on user characteristics |
US10091017B2 (en) | 2015-12-30 | 2018-10-02 | Echostar Technologies International Corporation | Personalized home automation control based on individualized profiling |
US10101717B2 (en) | 2015-12-15 | 2018-10-16 | Echostar Technologies International Corporation | Home automation data storage system and methods |
CN108735205A (en) * | 2018-04-17 | 2018-11-02 | 上海康斐信息技术有限公司 | A kind of control method and intelligent sound box of intelligent sound box |
US10129383B2 (en) | 2014-01-06 | 2018-11-13 | Samsung Electronics Co., Ltd. | Home management system and method |
US10135628B2 (en) | 2014-01-06 | 2018-11-20 | Samsung Electronics Co., Ltd. | System, device, and apparatus for coordinating environments using network devices and remote sensory information |
US10200752B2 (en) | 2013-12-16 | 2019-02-05 | DISH Technologies L.L.C. | Methods and systems for location specific operations |
US10250520B2 (en) | 2011-08-30 | 2019-04-02 | Samsung Electronics Co., Ltd. | Customer engagement platform and portal having multi-media capabilities |
US10294600B2 (en) | 2016-08-05 | 2019-05-21 | Echostar Technologies International Corporation | Remote detection of washer/dryer operation/fault condition |
US11158145B2 (en) | 2016-03-22 | 2021-10-26 | Spectrum Brands, Inc. | Garage door opener with touch sensor authentication |
US11450158B2 (en) | 2018-01-05 | 2022-09-20 | Spectrum Brands, Inc. | Touch isolated electronic lock |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI20065390L (en) * | 2006-06-08 | 2007-12-09 | Innohome Oy | Automatic multi-level access control system for electronic and electrical equipment |
EP2255318A4 (en) * | 2008-02-13 | 2011-06-15 | Weng Wah Chng | Theft-deterrent system and method |
US10440566B2 (en) * | 2015-06-19 | 2019-10-08 | Samsung Electronics Co., Ltd. | Method and apparatus for automated locking of electronic devices in connected environments |
FI126189B (en) * | 2015-09-21 | 2016-08-15 | Innohome Oy | Monitoring and control procedure to prevent poor air quality and fire and to give alarms about a dangerous situation |
CN105607500B (en) * | 2016-01-11 | 2018-06-29 | 成都思唯奇科技有限公司 | A kind of intelligent safety defense monitoring system |
CN105447372B (en) * | 2016-01-11 | 2018-06-29 | 成都思唯奇科技有限公司 | A kind of intelligent security guard early warning system |
KR102173839B1 (en) * | 2016-07-15 | 2020-11-04 | 후아웨이 테크놀러지 컴퍼니 리미티드 | How to apply for media transfer rights, and how and how to revoke media transfer rights |
CN108550216A (en) * | 2018-04-28 | 2018-09-18 | 上海与德通讯技术有限公司 | A kind of method for unlocking, intelligent module and door latch device |
US11671029B2 (en) | 2018-07-07 | 2023-06-06 | Intelesol, Llc | AC to DC converters |
US11581725B2 (en) | 2018-07-07 | 2023-02-14 | Intelesol, Llc | Solid-state power interrupters |
US11056981B2 (en) | 2018-07-07 | 2021-07-06 | Intelesol, Llc | Method and apparatus for signal extraction with sample and hold and release |
US11477209B2 (en) | 2018-08-08 | 2022-10-18 | Amber Semiconductor, Inc. | Managing access rights of transferable sensor systems |
US11334388B2 (en) | 2018-09-27 | 2022-05-17 | Amber Solutions, Inc. | Infrastructure support to enhance resource-constrained device capabilities |
US10993082B2 (en) | 2018-09-27 | 2021-04-27 | Amber Solutions, Inc. | Methods and apparatus for device location services |
US11205011B2 (en) | 2018-09-27 | 2021-12-21 | Amber Solutions, Inc. | Privacy and the management of permissions |
US11197153B2 (en) | 2018-09-27 | 2021-12-07 | Amber Solutions, Inc. | Privacy control and enhancements for distributed networks |
US10951435B2 (en) | 2018-09-27 | 2021-03-16 | Amber Solutions, Inc. | Methods and apparatus for determining preferences and events and generating associated outreach therefrom |
US10936749B2 (en) | 2018-09-27 | 2021-03-02 | Amber Solutions, Inc. | Privacy enhancement using derived data disclosure |
US10985548B2 (en) | 2018-10-01 | 2021-04-20 | Intelesol, Llc | Circuit interrupter with optical connection |
US11349296B2 (en) | 2018-10-01 | 2022-05-31 | Intelesol, Llc | Solid-state circuit interrupters |
US10887447B2 (en) | 2018-10-10 | 2021-01-05 | Amber Solutions, Inc. | Configuration and management of smart nodes with limited user interfaces |
US11463274B2 (en) | 2018-11-07 | 2022-10-04 | Amber Semiconductor, Inc. | Third party application enablement for node networks deployed in residential and commercial settings |
US11336096B2 (en) | 2018-11-13 | 2022-05-17 | Amber Solutions, Inc. | Managing power for residential and commercial networks |
CN113455105A (en) | 2018-12-17 | 2021-09-28 | 因特莱索有限责任公司 | AC driven light emitting diode system |
US11170964B2 (en) | 2019-05-18 | 2021-11-09 | Amber Solutions, Inc. | Intelligent circuit breakers with detection circuitry configured to detect fault conditions |
EP4088125A4 (en) | 2020-01-21 | 2024-03-06 | Amber Semiconductor Inc | Intelligent circuit interruption |
US11670946B2 (en) | 2020-08-11 | 2023-06-06 | Amber Semiconductor, Inc. | Intelligent energy source monitoring and selection control system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020104878A1 (en) * | 1999-10-26 | 2002-08-08 | First Data Corporation | Systems and methods of introducing and receiving information across a computer network |
GB2399924A (en) * | 2003-03-25 | 2004-09-29 | Milton Thompson | Security authorisation system requires wireless communication link between complentary parts |
US20050071252A1 (en) * | 2000-03-16 | 2005-03-31 | Keith Henning | Utilization of accumulated customer transaction data in electronic commerce |
US20060273885A1 (en) * | 2003-03-25 | 2006-12-07 | Milton Thompson | Security authorisation system |
US7757803B2 (en) * | 2006-07-14 | 2010-07-20 | Richard Fiske | Motor vehicle operator identification and maximum speed limiter |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088450A (en) | 1996-04-17 | 2000-07-11 | Intel Corporation | Authentication system based on periodic challenge/response protocol |
US6011973A (en) | 1996-12-05 | 2000-01-04 | Ericsson Inc. | Method and apparatus for restricting operation of cellular telephones to well delineated geographical areas |
JP3005496B2 (en) * | 1997-05-21 | 2000-01-31 | 日本電気株式会社 | Transmission restriction device, wireless transmission / reception terminal device, and transmission restriction system using the same |
US6505046B1 (en) * | 1997-11-19 | 2003-01-07 | Nortel Networks Limited | Method and apparatus for distributing location-based messages in a wireless communication network |
EP1074156A4 (en) | 1998-04-22 | 2004-08-25 | Netline Comm Technologies Nct | Method and system for providing cellular communications services |
US6233448B1 (en) * | 1998-07-22 | 2001-05-15 | Ericsson Inc. | System, method and apparatus for automatic feature activation/deactivation based upon positioning |
US6987975B1 (en) | 1999-04-08 | 2006-01-17 | Ericsson Inc. | Method of generating control signals based on location of radio terminals |
AU6236700A (en) * | 1999-09-17 | 2001-04-24 | Ericsson Inc. | Safe zones for portable electronic devices |
US7072945B1 (en) * | 2000-06-30 | 2006-07-04 | Nokia Corporation | Network and method for controlling appliances |
US6701144B2 (en) * | 2001-03-05 | 2004-03-02 | Qualcomm Incorporated | System for automatically configuring features on a mobile telephone based on geographic location |
US6778837B2 (en) | 2001-03-22 | 2004-08-17 | International Business Machines Corporation | System and method for providing access to mobile devices based on positional data |
US7149529B2 (en) | 2001-05-07 | 2006-12-12 | Hewlett-Packard Development Company, L.P. | Method and system for controlling selective wireless communication access |
WO2002093502A1 (en) | 2001-05-17 | 2002-11-21 | Nokia Corporation | Remotely granting access to a smart environment |
US20030034877A1 (en) | 2001-08-14 | 2003-02-20 | Miller Brett E. | Proximity detection for access control |
FI111891B (en) * | 2001-12-20 | 2003-09-30 | Nokia Corp | Identification of a terminal device |
US7015817B2 (en) * | 2002-05-14 | 2006-03-21 | Shuan Michael Copley | Personal tracking device |
US20040059914A1 (en) | 2002-09-12 | 2004-03-25 | Broadcom Corporation | Using signal-generated location information to identify and authenticate available devices |
GB2400196A (en) | 2003-04-02 | 2004-10-06 | Nec Technologies | Restricting access to a mobile phone, laptop etc. using an authorization procedure involving a separate transceiver |
US7136709B2 (en) * | 2003-11-04 | 2006-11-14 | Universal Electronics Inc. | Home appliance control system and methods in a networked environment |
US7155305B2 (en) * | 2003-11-04 | 2006-12-26 | Universal Electronics Inc. | System and methods for home appliance identification and control in a networked environment |
US7135969B2 (en) * | 2004-02-06 | 2006-11-14 | Agere Systems Inc | Theft deterrent for home appliances |
WO2005109905A2 (en) * | 2004-04-30 | 2005-11-17 | Vulcan Inc. | Time-based graphical user interface for television program information |
ATE507688T1 (en) | 2004-05-13 | 2011-05-15 | Koninkl Philips Electronics Nv | METHOD AND DEVICES FOR LOCATION AND ACCESS RIGHT-DEPENDENT ACCESS CONTROL |
US8880047B2 (en) * | 2005-08-03 | 2014-11-04 | Jeffrey C. Konicek | Realtime, location-based cell phone enhancements, uses, and applications |
US8311845B2 (en) * | 2006-02-07 | 2012-11-13 | Groupon, Inc. | Pay-for-visit advertising based on visits to physical locations |
FI20065390L (en) * | 2006-06-08 | 2007-12-09 | Innohome Oy | Automatic multi-level access control system for electronic and electrical equipment |
US7649456B2 (en) * | 2007-01-26 | 2010-01-19 | Sony Ericsson Mobile Communications Ab | User interface for an electronic device used as a home controller |
-
2006
- 2006-06-08 FI FI20065390A patent/FI20065390L/en unknown
-
2007
- 2007-06-06 EP EP07765901.9A patent/EP2033474B1/en active Active
- 2007-06-06 RU RU2008151976/09A patent/RU2008151976A/en unknown
- 2007-06-06 ES ES07765901T patent/ES2749399T3/en active Active
- 2007-06-06 US US12/308,061 patent/US20100066507A1/en not_active Abandoned
- 2007-06-06 WO PCT/FI2007/000161 patent/WO2007141374A1/en active Application Filing
-
2008
- 2008-12-11 NO NO20085173A patent/NO20085173L/en not_active Application Discontinuation
-
2013
- 2013-05-09 US US13/890,349 patent/US9196101B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020104878A1 (en) * | 1999-10-26 | 2002-08-08 | First Data Corporation | Systems and methods of introducing and receiving information across a computer network |
US20050071252A1 (en) * | 2000-03-16 | 2005-03-31 | Keith Henning | Utilization of accumulated customer transaction data in electronic commerce |
GB2399924A (en) * | 2003-03-25 | 2004-09-29 | Milton Thompson | Security authorisation system requires wireless communication link between complentary parts |
US20060273885A1 (en) * | 2003-03-25 | 2006-12-07 | Milton Thompson | Security authorisation system |
US7757803B2 (en) * | 2006-07-14 | 2010-07-20 | Richard Fiske | Motor vehicle operator identification and maximum speed limiter |
Cited By (79)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080086758A1 (en) * | 2006-10-10 | 2008-04-10 | Honeywell International Inc. | Decentralized access control framework |
US8166532B2 (en) * | 2006-10-10 | 2012-04-24 | Honeywell International Inc. | Decentralized access control framework |
US8725171B2 (en) * | 2008-09-04 | 2014-05-13 | Qualcomm Incorporated | System and method of providing mode changes to wireless devices |
US20100056124A1 (en) * | 2008-09-04 | 2010-03-04 | Virginia Walker Keating | System and method of providing mode changes to wireless devices |
US9398443B2 (en) | 2008-09-04 | 2016-07-19 | Qualcomm Incorporated | System and method of providing mode changes to wireless devices |
US20110035788A1 (en) * | 2009-08-05 | 2011-02-10 | Conor Robert White | Methods and systems for authenticating users |
US20110209200A2 (en) * | 2009-08-05 | 2011-08-25 | Daon Holdings Limited | Methods and systems for authenticating users |
US8855794B2 (en) | 2009-08-21 | 2014-10-07 | Allure Energy, Inc. | Energy management system and method, including auto-provisioning capability using near field communication |
US10551861B2 (en) | 2009-08-21 | 2020-02-04 | Samsung Electronics Co., Ltd. | Gateway for managing energy use at a site |
US8626344B2 (en) | 2009-08-21 | 2014-01-07 | Allure Energy, Inc. | Energy management system and method |
US20140058568A1 (en) * | 2009-08-21 | 2014-02-27 | Kevin R. Imes | Method of managing a site using a proximity detection module |
US20140128001A1 (en) * | 2009-08-21 | 2014-05-08 | Allure Energy, Inc. | Proximity control using bluetooth connection |
US8174381B2 (en) * | 2009-08-21 | 2012-05-08 | Allure Energy, Inc. | Mobile energy management system |
US20120093141A1 (en) * | 2009-08-21 | 2012-04-19 | Imes Kevin R | Proximity control using wifi connection |
US10310532B2 (en) | 2009-08-21 | 2019-06-04 | Samsung Electronics Co., Ltd. | Zone based system for altering an operating condition |
US8855830B2 (en) | 2009-08-21 | 2014-10-07 | Allure Energy, Inc. | Energy management system and method |
US9800463B2 (en) | 2009-08-21 | 2017-10-24 | Samsung Electronics Co., Ltd. | Mobile energy management system |
US10416698B2 (en) * | 2009-08-21 | 2019-09-17 | Samsung Electronics Co., Ltd. | Proximity control using WiFi connection |
US10444781B2 (en) | 2009-08-21 | 2019-10-15 | Samsung Electronics Co., Ltd. | Energy management system and method |
US9164524B2 (en) * | 2009-08-21 | 2015-10-20 | Allure Energy, Inc. | Method of managing a site using a proximity detection module |
US8571518B2 (en) | 2009-08-21 | 2013-10-29 | Allure Energy, Inc. | Proximity detection module on thermostat |
US9209652B2 (en) | 2009-08-21 | 2015-12-08 | Allure Energy, Inc. | Mobile device with scalable map interface for zone based energy management |
US9360874B2 (en) | 2009-08-21 | 2016-06-07 | Allure Energy, Inc. | Energy management system and method |
US10613556B2 (en) | 2009-08-21 | 2020-04-07 | Samsung Electronics Co., Ltd. | Energy management system and method |
US10996702B2 (en) | 2009-08-21 | 2021-05-04 | Samsung Electronics Co., Ltd. | Energy management system and method, including auto-provisioning capability |
US9977440B2 (en) | 2009-08-21 | 2018-05-22 | Samsung Electronics Co., Ltd. | Establishing proximity detection using 802.11 based networks |
US20110173542A1 (en) * | 2009-08-21 | 2011-07-14 | Imes Kevin R | Mobile energy management system |
US9405310B2 (en) | 2009-08-21 | 2016-08-02 | Allure Energy Inc. | Energy management method |
US11550351B2 (en) | 2009-08-21 | 2023-01-10 | Samsung Electronics Co., Ltd. | Energy management system and method |
US9964981B2 (en) | 2009-08-21 | 2018-05-08 | Samsung Electronics Co., Ltd. | Energy management system and method |
US9874891B2 (en) | 2009-08-21 | 2018-01-23 | Samsung Electronics Co., Ltd. | Auto-adaptable energy management apparatus |
US9838255B2 (en) | 2009-08-21 | 2017-12-05 | Samsung Electronics Co., Ltd. | Mobile demand response energy management system with proximity control |
US9766645B2 (en) | 2009-08-21 | 2017-09-19 | Samsung Electronics Co., Ltd. | Energy management system and method |
US11398947B2 (en) | 2010-07-07 | 2022-07-26 | Comcast Interactive Media, Llc | Device communication, monitoring and control architecture and method |
US10298452B2 (en) * | 2010-07-07 | 2019-05-21 | Comcast Interactive Media, Llc | Device communication, monitoring and control architecture and method |
US20160204984A1 (en) * | 2010-07-07 | 2016-07-14 | Comcast Interactive Media, Llc | Device Communication, Monitoring and Control Architecture and Method |
US10250520B2 (en) | 2011-08-30 | 2019-04-02 | Samsung Electronics Co., Ltd. | Customer engagement platform and portal having multi-media capabilities |
US10805226B2 (en) | 2011-08-30 | 2020-10-13 | Samsung Electronics Co., Ltd. | Resource manager, system, and method for communicating resource management information for smart energy and media resources |
US9178890B1 (en) * | 2011-09-08 | 2015-11-03 | Amazon Technologies, Inc. | Passwordless strong authentication using trusted devices |
US9979720B2 (en) | 2011-09-08 | 2018-05-22 | Amazon Technologies, Inc. | Passwordless strong authentication using trusted devices |
US9565565B2 (en) * | 2012-12-03 | 2017-02-07 | Douglas Baldasare | System and method for providing photoverification to mobile device charging stations |
US20160165443A1 (en) * | 2012-12-03 | 2016-06-09 | Douglas Baldasare | System and method for providing photoverification to mobile device charging stations |
US9716530B2 (en) | 2013-01-07 | 2017-07-25 | Samsung Electronics Co., Ltd. | Home automation using near field communication |
US9507969B2 (en) * | 2013-02-22 | 2016-11-29 | Htc Corporation | Method of protecting power receiver and related wireless charging device |
US20140245464A1 (en) * | 2013-02-22 | 2014-08-28 | Htc Corporation | Method of Protecting Power Receiver and Related Wireless Charging Device |
US9904812B2 (en) | 2013-02-22 | 2018-02-27 | Htc Corporation | Method of protecting power receiver and related wireless charging device |
EP2770601A1 (en) * | 2013-02-22 | 2014-08-27 | HTC Corporation | Method of protecting a power receiver |
US10063499B2 (en) | 2013-03-07 | 2018-08-28 | Samsung Electronics Co., Ltd. | Non-cloud based communication platform for an environment control system |
US10050802B2 (en) * | 2013-03-15 | 2018-08-14 | Vivint, Inc. | Using a control panel as a wireless access point |
US10944589B2 (en) | 2013-03-15 | 2021-03-09 | Vivint, Inc. | Using a control panel as a wireless access point |
US11408202B2 (en) | 2013-03-15 | 2022-08-09 | Spectrum Brands, Inc. | Wireless lockset with integrated antenna, touch activation, and light communication method |
US11913252B2 (en) | 2013-03-15 | 2024-02-27 | Assa Abloy Americas Residential Inc. | Wireless lockset with touch activation |
US10738504B2 (en) | 2013-03-15 | 2020-08-11 | Spectrum Brands, Inc. | Wireless lockset with integrated antenna, touch activation, and light communication method |
US11408201B2 (en) | 2013-03-15 | 2022-08-09 | Spectrum Brands, Inc. | Wireless lockset with integrated antenna, touch activation, and light communication method |
US9024759B2 (en) | 2013-03-15 | 2015-05-05 | Kwikset Corporation | Wireless lockset with integrated antenna, touch activation, and light communication method |
US20140344918A1 (en) * | 2013-05-14 | 2014-11-20 | Samsung Electronics Co., Ltd. | Method and electronic device for providing security |
US10061288B2 (en) | 2013-12-05 | 2018-08-28 | Wallflower Labs Inc. | Monitoring and controlling of appliances |
US9928672B2 (en) | 2013-12-05 | 2018-03-27 | Wallflower Labs Inc. | System and method of monitoring and controlling appliances and powered devices using radio-enabled proximity sensing |
US10027503B2 (en) | 2013-12-11 | 2018-07-17 | Echostar Technologies International Corporation | Integrated door locking and state detection systems and methods |
US10200752B2 (en) | 2013-12-16 | 2019-02-05 | DISH Technologies L.L.C. | Methods and systems for location specific operations |
US11109098B2 (en) | 2013-12-16 | 2021-08-31 | DISH Technologies L.L.C. | Methods and systems for location specific operations |
US10135628B2 (en) | 2014-01-06 | 2018-11-20 | Samsung Electronics Co., Ltd. | System, device, and apparatus for coordinating environments using network devices and remote sensory information |
US10129383B2 (en) | 2014-01-06 | 2018-11-13 | Samsung Electronics Co., Ltd. | Home management system and method |
US9989507B2 (en) | 2014-09-25 | 2018-06-05 | Echostar Technologies International Corporation | Detection and prevention of toxic gas |
US20160191270A1 (en) * | 2014-12-30 | 2016-06-30 | Grand Mate Co., Ltd. | Method of providing operating options of an electric appliance |
US10270615B2 (en) * | 2014-12-30 | 2019-04-23 | Grand Mate Co., Ltd. | Method of providing operating options of an electric appliance |
US9946857B2 (en) * | 2015-05-12 | 2018-04-17 | Echostar Technologies International Corporation | Restricted access for home automation system |
US20160335423A1 (en) * | 2015-05-12 | 2016-11-17 | Echostar Technologies L.L.C. | Restricted access for home automation system |
US9960980B2 (en) | 2015-08-21 | 2018-05-01 | Echostar Technologies International Corporation | Location monitor and device cloning |
US9996066B2 (en) | 2015-11-25 | 2018-06-12 | Echostar Technologies International Corporation | System and method for HVAC health monitoring using a television receiver |
US10101717B2 (en) | 2015-12-15 | 2018-10-16 | Echostar Technologies International Corporation | Home automation data storage system and methods |
US10091017B2 (en) | 2015-12-30 | 2018-10-02 | Echostar Technologies International Corporation | Personalized home automation control based on individualized profiling |
US10073428B2 (en) | 2015-12-31 | 2018-09-11 | Echostar Technologies International Corporation | Methods and systems for control of home automation activity based on user characteristics |
US10060644B2 (en) | 2015-12-31 | 2018-08-28 | Echostar Technologies International Corporation | Methods and systems for control of home automation activity based on user preferences |
US11158145B2 (en) | 2016-03-22 | 2021-10-26 | Spectrum Brands, Inc. | Garage door opener with touch sensor authentication |
US10294600B2 (en) | 2016-08-05 | 2019-05-21 | Echostar Technologies International Corporation | Remote detection of washer/dryer operation/fault condition |
US10049515B2 (en) | 2016-08-24 | 2018-08-14 | Echostar Technologies International Corporation | Trusted user identification and management for home automation systems |
US11450158B2 (en) | 2018-01-05 | 2022-09-20 | Spectrum Brands, Inc. | Touch isolated electronic lock |
CN108735205A (en) * | 2018-04-17 | 2018-11-02 | 上海康斐信息技术有限公司 | A kind of control method and intelligent sound box of intelligent sound box |
Also Published As
Publication number | Publication date |
---|---|
RU2008151976A (en) | 2010-07-20 |
FI20065390L (en) | 2007-12-09 |
EP2033474A1 (en) | 2009-03-11 |
EP2033474B1 (en) | 2019-07-31 |
EP2033474A4 (en) | 2012-04-25 |
US9196101B2 (en) | 2015-11-24 |
NO20085173L (en) | 2008-12-11 |
ES2749399T3 (en) | 2020-03-20 |
FI20065390A0 (en) | 2006-06-08 |
WO2007141374A1 (en) | 2007-12-13 |
US20130300534A1 (en) | 2013-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9196101B2 (en) | Automated control system for multi-level authority to operate electronic and electrical devices | |
US20170236350A1 (en) | Electronic door lock system | |
US7012503B2 (en) | Electronic key device a system and a method of managing electronic key information | |
US20090153291A1 (en) | Method and apparatus for communicating access to a lockbox | |
US20040177072A1 (en) | Smart environment | |
US20070013610A1 (en) | Wireless security badge | |
US20190066415A1 (en) | Mobile-based access control system | |
US11335150B2 (en) | Electronic lockbox with interface to other electronic locks | |
WO2019203306A1 (en) | Sharing system | |
JP7035491B2 (en) | Key information management device, key information management method, key information management program | |
AU2023210587A1 (en) | Methods and systems for access control and awareness management | |
WO2008056152A1 (en) | Lock | |
CN101512449A (en) | A device with signal generator and signal receiver for providing controlled access to information and/or communication channels | |
GB2370378A (en) | A secure storage unit having a communications interface for receiving an access code which comprises in part an authorised time slot | |
JP5938927B2 (en) | Remote operation system, flying object remote operation system, remote operation method, and flying object remote operation method | |
KR20190056988A (en) | Delivery assistance device, delivery assistance method, and non-transitory computer-readable storage medium storing delivery assistance program | |
JP2002528801A (en) | Remote access and security system | |
CN101010652A (en) | Wireless lock | |
JP2019070960A (en) | Car sharing system | |
CA2501192A1 (en) | Locking device for electronic equipment | |
JP6924167B2 (en) | Shared system and in-lock prevention method | |
JP4290996B2 (en) | Data network | |
JP2002115438A (en) | Keyless entry system | |
GB2407128A (en) | A secure storage system and method of providing an access code. | |
ES2264387A1 (en) | Apparatus control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INNOHOME OY,FINLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MYLLYMAKI, MATTI;REEL/FRAME:023415/0068 Effective date: 20090115 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |