CA2240862A1 - An electronic anti-theft apparatus and related method - Google Patents

An electronic anti-theft apparatus and related method Download PDF

Info

Publication number
CA2240862A1
CA2240862A1 CA002240862A CA2240862A CA2240862A1 CA 2240862 A1 CA2240862 A1 CA 2240862A1 CA 002240862 A CA002240862 A CA 002240862A CA 2240862 A CA2240862 A CA 2240862A CA 2240862 A1 CA2240862 A1 CA 2240862A1
Authority
CA
Canada
Prior art keywords
code
battery unit
battery
security code
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002240862A
Other languages
French (fr)
Inventor
Andrew Jonathan Thomas Sansome
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BTG International Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2240862A1 publication Critical patent/CA2240862A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • G08B13/1418Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • H04M1/727Identification code transfer arrangements

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention describes an anti-theft apparatus and related method for use with portable electrical or electronic apparatus, particularly with mobile telephones or personal computers. The invention comprises a first data store in which an encrypted code is stored in the electronic apparatus, a comparator and a removable second data store which is within a removable, rechargeable battery unit which unit comprises a battery and a memory store. Upon insertion of the battery unit a security code is transmitted to the first data store. If the code is recognised as a valid authorisation code, the apparatus is enabled and may be operated in the usual way. If it is not recognised the apparatus may be disabled electronically. Once the battery is spent the apparatus is useless, because unless the battery unit receives a refreshed security code upon recharge (from a recharger equipped with a means for re-supplying a suitable code) the electronic apparatus may not be used. Preferably a recharger has been modified such that a valid security code is transmitted to the battery unit at each recharge.

Description

~N EI,ECT3~ONIC ANTI-THE~T APPARATUS AND RELATFn METHOO
The present invention relates to an electronic anti-theft apparatus and related method, and in particular, but not exclusively to an anti-theft system for use with portable electronic equipment.
It is unfortunate that in today's society crime appears to be growing. In particular theft is an everyday problem. Often thieves steal high value, portable electronic consumer equipment apparatus, for example portable personal computers, video cameras and mobile telephones. Such ~l~ala~lls can be expensive to replace and in the case of portable personal computers, the theft of such app~dlus can also mean the potential exposure of highly 10 confidential material stored on the computer.
It is an object of the present invention to overcome the above mentioned problemby providing an anti-theft system comprising a method and apparatus, suitable for use with electronic ap~dLùs specifically of the type mentioned above, although it will beunderstood that the invention can be used with other types of electronic app~dlus~
German Offenleg--ng~-~hrit~ DE-Al -38033~7 (PHILIPS) describes a security systemfor use with portable electronic eqllipment The system consists of a battery charger de~i~n~te~l for use with the equipment. The charger has a code tr~n~mi~ r and a code receiver. The code receiver disables the equipment if the code it receives, from the charger, does not match that stored in the code receiver.
The system described is for use with equipment having a built-in, rechargeable battery. A disadvantage of the prior-art system described is that when such an energy source is depleted there may be a considerable time, whilst the battery recharges until the system may be used again. Nowadays, many pieces of mobile electronic equipment are supplied with a second rechargeable battery so that a user may easily swap a charged 25 battery for a depleted one. Such equipment could not be used with the aforementioned recharger because the batteries are not removable.
Another disadvantage with the prior-art system is that it would be possib}e for an unauthorised person to physically remove (disconnect) a spent battery and replace it with a battery which has been charged using an "unauthorised" charger, as there is no30 mechanism of verifying the authenticity of a recharged battery.

W O 97/23986 PCT/~B96/03177 According to a first aspect of the present invention there is provided apparatuswhich receives a removable battery unit, the battery unit comprises a rechargeable battery and a memory store, the ~paldlus having comparison means for comparing a security code stored in the apparatus, with an authorisation code presented by the memory store and 5 means for selectively enabling the apparatus upon receipt of a valid authorisation code or disabling the apparatus upon receipt of an invalid authorisation code.
Once enabled the electronic ap~ Lus will function normally. For example, in the case of a portable telephone, it can be used to make and/or receive calls. However, if the security code is not an authorised code supplied by the battery unit, the electronic a~dlus 10 will be disabled. That is to say the ~ lus is "jarnmed" so that it may not be used for its intended purpose. Disabling may be performed electronically.
According to another aspect of the present invention there is provided an electronic electrical or electronic ~dl~ls having a first data store to store a security code (the stored code), means to read an authorisation code; means to compare the authorisation code with 15 the stored code, means to enable operation of the a~p~dl~ls when the authorisation code is a valid authorisation code, characterised in that the ~J~dlus is adapted to receive a removable, lecll~,eable batter,v unit which unit comprises a battery and a memory store.
Conveniently the battery is a rechargeable battery having a volatile memory suchas, for example, a Random Access Memory (RAM) or an erasable programmable store,20 such as, for example, an erasable programrnable read only memory (EPROM).
Preferably, the RllthOri~Rtion code ~riginRtec from a code source which is provided within a battery charger used for recharging the battery and is transmitted to the memory during recharging.
Thus the apparatus is effectively tailored for use with batteries which have been 25 charged with the owner's charger, i.e. an "authorised" charger and ~ soon ~ the battery has discharged, unless the correct authorisation code is resupplied, the apparatus may not be used.
Because most portable electrical or electronic apparatus is supplied ( in order to reduce weight and size) with one or more removable, rechargeable batteries and a separate 30 battery charger (which is not usually transported or stored with the apparatus~, it is apparent -CA 02240862 l998-06-l7 that the present system is more secure and more flexible than the aforementioned system described in DE-A1-3803357.
According to a filrther aspect of the present invention, there is provided a battery charger for charging a battery, the charger comprising a primary code source, and means S responsive to said code source to transmit an authorisation security code to a data store in a battery unit whilst the batterv is recharging.
Preferably the battery charger supplies the code during supply of current required to recharge the battery. Alternatively the authorisation security code may be supplied prior to charging or subsequent to charging. The battery unit and battery charger may be 10 configured such that at the commenç~:ment of a charging cycle any security code still held in a store within a memory store in the battery unit is first erased and a new security code is written to the store in the battery unit. Such a system has a higher level o~ security.
Similarly the electrical or electronic ~)p~ldL~ls may be equipped with a means ~or automatically erasing the code in the memory- store if an attempt is made to gain access to 15 the store in the battery unit. Automatic erasing may be carried out by means in the battery unit or in the apparatus.
According to a further aspect of the invention there is provided a battery unit comprising a rechargeable battery and a data memory store (e.g. an EPROM) within which data memory store an authorisation security code is written.
Preferably the authorisation ~eewily code is ~ ;l(e~l to the battery unit when the battery is being recharged.
Preferably, prior to use, the battery unit is required to convey the code more than once having a single cycle and the electronic apparatus is arranged to receive the code more than once.
The security codes may be encrypted in such a way that the possession of both the battery unit (cont~ining the "primary" code and pres~nting an encrypted form of the authorisation code) and the eleckonic apparatus cont~ining the security code (to be protected) does not permit identification of any of the codes Conveniently, circuitry located in the battery unit is operative to read data, the 30 circuitry comprising: means to identify connection of the battery unit to the charger; means for storing data, which perrnits erasing of said data when stored; means to decode said data CA 02240862 l998-06-l7 and means to store serial data after a predçte.rmined period when data is presented by the charger.
Preferably the circuiky provided in the battery unit, includes means to write data to ihe electrical or eleckonic a~ s comprising: means to identify connection of an electronic apparatus to the battery unit; means to read stored data; means to encode the data; and means to send the encoded data to the electronic a~aldLIls.
Advantageously said data is used in serial data form. There may also be providedmeans to read a second piece of data, (second portion of the code), means to encode said data by addition to a subsequent piece of data, generated by a pseudo-random sequence 1(~ generator, and means to rekansmit the subse~uently generated authorisation code to the electronic apparatus.
Means may be provided which is adapted to stop kansmitting until the battery unit has been removed from the electronic ap~al~L-ls.
According to a further aspect of the present invention there is provided a method of charging a rechargeable battery unit characterised in that a security code is transmitted to a memory store in the battery unit.
Embo(lim~nt~ of the invention will now be described, by way of exarnple only, and with reference to the Figures in which:
Figure 1 shows an overall block diagram showing the concept of the invention;
Figure 2 is a circuit diagrarn of a battery charger, Figure 3 is a circuit diagram of a battery unit; and Figure 4 is a circuit diagram of an eleckonic ~alaL~ls.
Figure 1 shows diagrammatically a working implementation and is only intf~ndçd to demonstrate the principles involved. It is not the only way of achieving the broader objective of the invention.
An electronic apparatus 24 comprises a first data store 26 for storing a code;
means 23 for comparing a stored code with a security code received from a second data store 21 and means to enable the electronic apparatus 24 when the security code is a valid authorisation code characterised in that the second data store ~1 is housed within a detachable rechargeable battery unit 10.

W O 97/23986 PCT/GB96/~3~77 Figure 1 shows a rechargeable battery unit 10, (described below in detail with reference to Figure 3) connected to a battery charger 12 (described below in detail with reference to Figure 2) via power lines 12a and 12b. The battery charger 12 is in turn connected to a mains supply across A, B. A data entry means 14, such as a keypad, is 5 connected, temporarily or perm~nenfly, to the battery charger 12. The data entry means 14 passes a coded security signal (the authorisation code) to a memory store 16 housed inside the battery charger 12. The store 16 includes an electronic memory device such as a random access memory (RAM) chip (not shown). The authorisation code (or ~llth~ri~1ion code generator) is therefore stored in the battery charger 12. The code is transmitted to a 10 store 21 in the battery unit 10 via a separate data link 18. Altematively the authorisation code can be tr~n~milte~l to the battery unit 10 via dedicated connections 12a and 12b.
Figure 4 shows a circuit, which may be a portable personal computer or a telephone.
Electronic a~dl ls 24 houses the battery unit 10. This is illustrated by the dotted line surrounding a combined portable module 25. Battery unit lQ is detachable and 15 removable from module 25.
The embodiment described in detail below, with reference to Figures 2 to 4, utilises only four bit security with corresponding "random numbers". Therefore it is not as secure as might be desired. As will be appreciated by a skilled person, a commercial implementation may use 8, 12 or even 16 bit random numbers and would therefore be 20 physically only slightly more complex, and otherwise identical. However, it would o~fer much higher security.
Figure 2 shows how two four bit codes from the battery unit to a mobile electronic apparatus 24 are written to the battery unit 10 by a charger 12 as a single 8 bit word Charger 12 has an oscillator having resistor 30, capacitor 32, and Schmitt inverter 34 (part 25 of IC 1). These produce a clock signal. There is also a counter 40 and a shift register 42 which acts as a parallel to serial converter. Gating means 44 is provided to produce a serial pulse width modulated data stream at output pin 46.
Master clock oscillator 48 (frequency f) runs continually and clocks counter 40 Counter Q1 therefore produces a square wave at f/2. Counter Q5 counts at f/32 30 (The rem~ining stages of counter QS are not directly relevant to the present invention.) Counter Q5 is therefore alternately high for a first set of 16 clock pulses and then low for the following set of 16 clock pulses.
Shift register 42 is clocked by counter Ql (i.e. at ft2 which is half of the master clock rate.). Parallel input lines of shift register 42 are connected either high (to VDD) to represent a ONE or low (to VSS) to represent a ZERO, representing eight bits of data. Thus two four bit code numbers are used by the battery unit 10 and electronic a~dllls 24 are programmed by connecting the parallel input lines either high or low. This may be achieved for example with a dip switch (not shown).
Serial / para}lel select line, of shift register 42, is connected to Q5 pin of ~0 counter 40. When Q5 is high, parallel data on the shift register input lines is ~ammed in.
When Q5 is low the data is shifted out sequentially from QH, at f/2. Thus QH remains at the level of input H for 16 master clock cycles whilst the counter Q5 is high. When QS
goes low, 8 bits of serial data are presented followed by a low for the next 8 clock cycles.
The process is then repeated.
Inverters 50 and 52, "AN~" gates 54, 56 and 58 and "OR" gates 60 and 62, combinethe master clock with the counter Q1, QS and shift register QH so as to produce a pulse width modulated serial data stream at f/2. The pulse length is half of the period of master clock 48, when the data represented is 7ERO(0) and 1.5 times the period of master clock 48 when the data .c~,~sell~ a ONE (1).
lnverter 64 and "AND" gate 66 block data when the counter Q5 is high, so that the only data to appear at output 46 are the required 8 bits after Q5 goes low. Thus the battery charger 12 produces an 8 bit pulse width modulated data stream representing dataprogramIned onto the input pins of the shift register. This data is repeated every 32 cycles of the master clock 48. It Ic.luil~s 8 clock cycles and is followed by a pause (output data 25 line is low) for 24 clock cycles.
The circuit described above with reference to Figure 2 does not require valid data to be received twice. Such variation to the embodiment is well known to the skilled artisan.
The circuit may be readily adapted to perform this fimction. Namely verification of data upon receipt of two sets of correct data sequences, one after the other, is required in order 30 to enable the apparatus.

Figure 3 shows a circuit diagram of the battery unit. Circuitry which is locatecl in the battery unit 10. Il comprises two sections: circuitry to read data from the battery charger 12 and ~ ;uiLly to write data to the electronic apparatus 24.
Referring to Figure 3 in detail, the battery unit 10 is connected to input line 67 such that the voltage on the input of inverter 70 rises to VDD. Output of inverter 70 goes low producing a positive pulse at the output of inverter 72 which resets counter 74. Q14 of counter 74 is reset low enabling its clock via OR gate 76. Serial pulse width modulated data is presented to monostables 78 and 80 (M/S 78 and M/S 80). In a particularly ~lc;rellc;d embodiment the timing can be derived from a master clock (not shown~. M/S 78 10 and M/S 80 are triggered by a positive going edge of an input waveform. M/S 80 is retriggerable and has a period which is slightly greater than that of incoming data. Its "Q"
therefore goes high at the start of the eight bits of data and remains high for their duration.
M/S 80 Q clocks "D" type latch 82, (D82) transferring the state of its data input (connected to Q5 of counter 74) to its "Q" and thence to "AND" gate 84. Until counter 74 Q5 goes 15 high the data pin of "D" type latch 82 and therefore its Q is low, thereby preventing the tr~n~mi~sion of the derived clock via AND 84 to shift registers 86 and 88. Potentially corrupt data is therefore blocked at power on.
At the start of each input data stream (once counter 74 Q5 is high) the NOT Q ofD type latch 82 goes low generating a reset pulse to shift registers 86 and 88 via resistor 90, 20 capacitor 92 and inverter 94. This reset can be edge triggered and would not require timing components. Until Q13 of counter 74 goes high, the derived clock is ~le~ ~d fromre~chm~ shift registers 86 and 88 by AND gate 84, preventing new data from being written until charging has continued for a period of 4096 clock cycles. This delay might be set to several min~ltPs to enhance security.
Monostable 78 has a period equal to that of the charger clock. Thus the state of"Data in" line when the NOT Q of monostable 78 goes high, (end of the monostableperiod) represents data sent from the battery charger 12.
The derived clock via AND gate 84 clocks data from "Data in" into shift registers 86 and 88. Thus during charging, once counter 74 Q 13 is high the shift registers 30 are repeatedly reset and loaded with data. When counter 74 Q14 goes high counter 74 clock is inhibited via OR gate 76. At this time the cycle stops, leaving the last set of data sent in shift registers 86 and 88. The battery unit 10 then remains in this state until either removed from the charger 12, and reconnected (when the sequence is repeated~ or connected to the electronic apparatus 24.
The battery unit has a c~ock oscillator which comprises invertor 98 capacitor 100 5 and resistor 102 operates continuously. A pseudo-random sequence generator (P.R.S.) is formed from shift register 104 and exclusive OR gate 106 (XOR 106) . OR gate 108 and NOR gate 110 ensure that the P.R.S. carmot latch in an all LOW state. It produces a sequence of (2n)-1 numbers of length n bits (where n is the number of stages in the shift register). When the battery unit 10 is disconnect~d from the electronic ~ dl~ls 24 the 10 REQUEST ;n line remains high via resistor 112, holding reset counter 114 and "D" type latch 116 and enabling the clock to the pseudo-random sequence generator via AND gate 118.
When battery unit 10 is cormected to the electronics ~ LldlUS 24 R~Q~JEST line is taken LOW, releasing the reset lines and disabling the pseudo-random sequence15 generator clock via AND gate 118 and OR gate 120. Counter 114 iS clocked via OR gate 122 and once it is reset has been released, it counts until both Q9 and Q10 are HIGH when its clock is disabled via AND gate 124 and OR gate 122. Counter 114 Q9controls the state of two-to-one line selector 132 and therefore selects either the data in shift register 86 or 88. These comprise first or second four bits of the authorisation code.
~nitially Counter 114 Q9is LOW and data from shift register 86 is selected.
As described above the pseudo-random sequence (P.RS..) generator stops when its clock is inhibited by the LOW reset line. Four bit full adder 130 produces the sum of the four bits of output data (Q0 to Q3) from the PRS and the four bits of data selected from shift register 86. Clearly with more secure systems there would be a greater bit length.
The sum is presented to the first four parallel input lines of shift register 126, the remainder are tied LOW. Data is jammed into register 126 when counter 114 Q8 is HIGH
and shifted from QH (synchronous with its clock) when Q8 goes LOW. D type latch 116 and OR gate 128 generate a burst of eight clock pulses following the LOW transition of counter 1 14 Q8, to clock this data out and provide cloclc pulses to the electronics apparatus.

The data could of course be transmitted, combined with its clock, as a pulse width modulated data stream just as the battery charger 12 transmits data to the battery unit 10 during charging, via a single connection.
As counter 114 Q8 goes LOW Q9 goes HIGH and clocks the P.R.S. once via OR
gate 120, pl~e. ~ g the next four bits of output data to adder 130. Since counter 1 14 Q9 is now HIGH the data selector 132 is routing the second four bits of authorisation code, from shift register 88, to four bit full adder 130.
The surn of the four bits presented by the P.R.S. and line selector is again presented to shift register 126, J~mme-l in when counter 1 14 Q8 is HIGH and shifted out from QH as 10 serial data when LOW.
Counter 114 Q9 and Q10 are now high and the clock of counter 114 is disabled viaAND gate 124 and OR gate 122 preventing further data k~n~mi~ion until the REQUEST
line is allowed to go HIGH and then l,OW again (i.e. the battery unit 10 is removed and reconnected to the electronics ~ ildl.US 24). Thus the first four bits of code data have 15 been added to a four bit num~er obtained at random and transmitted with a co~ onding number of clock pulses to the electronic apparatus. This has then been followed by the sum of the second four bits of code data and the "random" four bit number which follows in the generated sequence, with their corresponding clock pulses.
Operation of a piece of electronic apparatus will now be described in detail with 20 reference to Figure 4, in which an electronic apparatus 24 comprises electronic means to read a preset authorisation code (numerically the same (in this exarnple) as two four bit codes programmed into the charger 12 and sent to the battery unit 10), and means to add the data to "random numbers" generated by a P.R.S ~enerator and to compare the sum with serial data sent from the battery unit 10 as described above with reference to Figure 3.
An ~llthori~ion code is preset by connecting the eight inputs of the two to one line selector 133 either HIGH or LOW. This data would of course be stored in R.O.M. (not shown) in a cornrnercial implementation. When the battery unit 10 is connected, power on reset is generated by inverter 134, resistor 136 and capacitor 138. The first four bits of code data (COD~) are selected and added by a four bit full ADDER 140, to the output of a 30 pseudo-random sequence generator (P.R.S), as described above. The P.R.S is continuously clocked since the NOT Q of "D" type latch 14~ is reset HIG~I, via AND gate 144 An oscillator is forrned by resistor 146, capacitor 14~ and invertor 150. The output of the adder 140 therefore presents a series of 4 bit words represen~ing the surn of the first CODE
and the successive outputs of the P.R.S.
Serial data and its clock are presented by battery unit 10 as described above, and 5 loaded into shift register 135. This also clocks monostable 137, which is retriggerable and has a period of twice the incoming clock, so that its NOT Q goes LOW during the receipt of data. At the end of four bits of data, the NOT Q returns HIGH, clocking the Q of D type latch 152 HIGH. The output of AND gate 152 therefore goes HIGH enabling the output of the four bit comparator via AND gate 158. During the receipt of subsequent data the 10 LOW on M/S 1 NOT Q disables comp~ on via AND gates 154 and 158, to prevent aninvalid but correct comparison (occurring due to data corruption during loading) from taking place.
Output of ADDER 140 is compared, using a 4 bit magnitude comparator with the encoded data from the battery unit 10. When the data are the sarne the output of the 15 comparator 156 goes HIGH and clocks "D" type latch 160 via AND gate 158. Since D1 has not changed state, the Q of"D" type latch 160 remains LOW (i.e. unchanged). The output of the P.R.S. in the electronic al,l.~a~us 24 now m~tches the state of the P.R.S. in the battery unit 10 when it was encoding the first four bits of code. That is the two P.R.S's are synchronised. When the P.R.S has been clocked one step past the output which resulted 20 in equivalence of the surn and input data, the output of the 4 bit comparator 156 goes ~back) LOW clocking latch 142 via invertor 162. Latch 142 NOT Q goes LOW and disables the P.R.S. clock. Latch 142 Q goes HIGH and selects the second CODE word via the line selector. The pseudo-random sequence generator therefore stops one step beyond the number which resulted in equivalence, i.e. at the same point as that used by the P.RS in the 25 battery unit 10 to encode the second CODE. The second electronics apparatus CODE has been selected and the sum therefore anticipates the encoded data expected next from the battery unit 10. When the second piece of encoded data is received ~rom the battery unit it is compared with the output of the ADDE~ 140 (generated as described above) and if the two codes are the same, or that is the code presented by the battery unit is an authorisation 30 code, comparator 156 output goes HIGH. Latch 160 is therefore clocked, transferring the HIGH now present on its D input to its Q, indicating that the received data are valid and thereby authorising operation of the electronic appaldllls 25.
If a third four bit word is received from the battery unit 10 then D ~pe latch 164 has a HIGH clocked into its Q. Latches 146 and 160 are reset via OR gate 166 preventing 5 authorisation. This may only occur if an unauthorised user were attempting to overcome the system.
Thus two authorisation codes have been sent from the battery charger 12 to the electror~c a~pdldLIls via the battery unit 10, where both codes have been recognised as valid and thus use of the apparatus is authorised. Both codes are encrypted in such a way as to 10 prevent an unauthorised user who is in possession of BOT~ the battery unit and electronics ap~aldLus from successfully inte~Togating the link between them and identifying the authorisation codes. The electronic app~u~lus is therefore only of value to a thief until the battery has discharged and is spent. Once this has occurred, unless the thief has knowledge of the codes, recharging the battery will be associated with loss of its stored codes and 15 therefore further use will be prevented. Alternatively the codes stored in the store in the battery unit become erased.
It will be appreciated that the invention has been described by way of an example only and variation to the above embodiment may be made without departing from the scope of the invention.

Claims (11)

1. Apparatus for receiving a removable battery unit, the battery unit comprising a rechargeable battery and a memory store, the apparatus having comparison means for comparing a security code stored in the apparatus, with an authorisation code presented by the memory store and means for selectively enabling the apparatus upon receipt of a valid authorisation code or disabling the apparatus upon receipt of an invalid authorisation code.
2. An electronic apparatus comprising a first data store for storing a code; means for comparing a stored code with a security code received from a second data store and means to enable the electronic apparatus when the security code is a valid authorisation code characterised in that the second data store is supported by or disposed within a detachable rechargeable battery unit.
3. Apparatus according to Claim 1 or 2 wherein the security code stored in the second store is automatically erased when the battery is spent.
4. Apparatus according to Claim 3 in which the code is encrypted.
5. An electronic anti-theft method comprising the steps of: transmitting a security code to a first data store within an electronic apparatus from a second data store, comparing the security code with an already stored code, such that the electronic apparatus is enabled if the security code is a valid authorisation code, characterised in that the second data store, is disposed on or within a detachable rechargeable battery unit.
6. A method according to Claim 5 wherein the security code is transmitted to theapparatus more than once.
7. A method according to either of claims 5 or 6 wherein a security code stored in the second store is automatically erased when the battery is spent.
8. A method according to Claim 7 wherein the battery unit is placed in a batteryrecharger and a new security code is generated by the battery recharger.
9. A method according to Claim 8 in which the security code is encrypted.
10. A modified battery charger comprising: means for enabling a security code to be entered; means to store said security code; means to supply an electric current in order to recharge a battery unit in electrical contact with the charger and means to transmit said security code to the battery unit whilst the battery is recharging.
11. A battery unit comprising a rechargeable battery and a data store, within which data store a security code is written.
CA002240862A 1995-12-21 1996-12-20 An electronic anti-theft apparatus and related method Abandoned CA2240862A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9526235.8 1995-12-21
GBGB9526235.8A GB9526235D0 (en) 1995-12-21 1995-12-21 An electronic anti-theft method and related apparatus

Publications (1)

Publication Number Publication Date
CA2240862A1 true CA2240862A1 (en) 1997-07-03

Family

ID=10785864

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002240862A Abandoned CA2240862A1 (en) 1995-12-21 1996-12-20 An electronic anti-theft apparatus and related method

Country Status (6)

Country Link
EP (1) EP0868806A1 (en)
JP (1) JP2000517487A (en)
KR (1) KR19990076581A (en)
CA (1) CA2240862A1 (en)
GB (1) GB9526235D0 (en)
WO (1) WO1997023986A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9466198B2 (en) 2013-02-22 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US9467862B2 (en) 2011-10-26 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10158213B2 (en) 2013-02-22 2018-12-18 Milwaukee Electric Tool Corporation Worksite power distribution box

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3217007B2 (en) * 1997-02-24 2001-10-09 埼玉日本電気株式会社 Mobile phone device with security function
DE19735660A1 (en) * 1997-08-16 1999-02-18 Bosch Gmbh Robert Device for theft protection of a device
AU3178600A (en) * 1999-03-19 2000-10-09 British Telecommunications Public Limited Company Security systems
DE19919480A1 (en) * 1999-04-29 2000-11-02 Uwe Luboch Interrupting operation of equipment involves interrupting process before expiry of defined period by entering release code coinciding with reference code or returning to first activation state
GB2361567B (en) 2000-04-18 2004-02-11 Mitel Corp Hardware authentication system and method
GB2387998A (en) * 2002-04-26 2003-10-29 Motorola Inc Mobile communication system with external electronic key that prevents unauthorised change of handset PIN code
US6819248B2 (en) * 2002-10-30 2004-11-16 Bradley L. Gotfried System for preventing access
GB2396261A (en) * 2002-11-15 2004-06-16 Malcolm Mccallum Secure charger and portable electronic device
WO2004112363A1 (en) * 2003-06-18 2004-12-23 Philips Intellectual Property & Standards Gmbh Anti-theft system for mobile electronic devices
GB0324325D0 (en) * 2003-10-17 2003-11-19 Blackwood Darren M Mobile immobiliser phone and mobile phone immobiliser
JP3765544B1 (en) * 2004-11-26 2006-04-12 株式会社ソニー・コンピュータエンタテインメント Battery and authentication request device
GB2424344B (en) * 2005-03-18 2007-05-23 Motorola Inc Portable communication handset unit and a method of operation of such a unit
DE502005008889D1 (en) * 2005-11-18 2010-03-04 Metabowerke Gmbh ELECTRIC HAND TOOL UNIT AND BATTERY PACK FOR THIS
WO2007066412A1 (en) * 2005-12-09 2007-06-14 Matsushita Electric Industrial Co., Ltd. Information-communication terminal device and automatic backup system including the same
JP4366385B2 (en) * 2006-08-31 2009-11-18 株式会社東海理化電機製作所 Charging system
WO2011107119A1 (en) * 2010-03-05 2011-09-09 Husqvarna Ab Battery powered product
US10131042B2 (en) 2013-10-21 2018-11-20 Milwaukee Electric Tool Corporation Adapter for power tool devices
CN110213676B (en) 2015-05-04 2022-08-19 米沃奇电动工具公司 Electric tool and wireless communication method
US10295990B2 (en) 2015-05-18 2019-05-21 Milwaukee Electric Tool Corporation User interface for tool configuration and data capture
CN207096983U (en) 2015-06-16 2018-03-13 米沃奇电动工具公司 The system and server of system including external equipment and server including electric tool and external equipment
US11622392B2 (en) 2016-06-06 2023-04-04 Milwaukee Electric Tool Corporation System and method for establishing a wireless connection between power tool and mobile device
TWM555274U (en) 2016-06-06 2018-02-11 米沃奇電子工具公司 Mobile devices for connecting with power tool devices
US11763610B2 (en) 2018-09-13 2023-09-19 Milwaukee Electric Tool Corporation Anti-theft systems and devices for battery-powered power tools

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3803357A1 (en) * 1988-02-05 1989-08-17 Philips Patentverwaltung Electric device

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11159942B2 (en) 2011-10-26 2021-10-26 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US9467862B2 (en) 2011-10-26 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10237742B2 (en) 2011-10-26 2019-03-19 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10531304B2 (en) 2011-10-26 2020-01-07 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US11871232B2 (en) 2011-10-26 2024-01-09 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US11937086B2 (en) 2011-10-26 2024-03-19 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US9949075B2 (en) 2013-02-22 2018-04-17 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10158213B2 (en) 2013-02-22 2018-12-18 Milwaukee Electric Tool Corporation Worksite power distribution box
US10285003B2 (en) 2013-02-22 2019-05-07 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10631120B2 (en) 2013-02-22 2020-04-21 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US10727653B2 (en) 2013-02-22 2020-07-28 Milwaukee Electric Tool Corporation Worksite power distribution box
US9466198B2 (en) 2013-02-22 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US11749975B2 (en) 2013-02-22 2023-09-05 Milwaukee Electric Tool Corporation Worksite power distribution box

Also Published As

Publication number Publication date
WO1997023986A1 (en) 1997-07-03
KR19990076581A (en) 1999-10-15
EP0868806A1 (en) 1998-10-07
GB9526235D0 (en) 1996-02-21
JP2000517487A (en) 2000-12-26

Similar Documents

Publication Publication Date Title
CA2240862A1 (en) An electronic anti-theft apparatus and related method
US3806874A (en) Identification system for individuals
US5034597A (en) IC cards and information storage circuit therefor
US6130621A (en) Method and apparatus for inhibiting unauthorized access to or utilization of a protected device
US6240517B1 (en) Integrated circuit card, integrated circuit card processing system, and integrated circuit card authentication method
AU2006321928B2 (en) Method and apparatus for authenticating a mobile phone accessory
JPS6143750B2 (en)
CA2500039A1 (en) Electronic lock box with multiple modes and security states
GB2288049A (en) A vehicle security device with electronic use-authorization coding
US5600723A (en) Cryptographically secure electric fuel pump system
JP2000159063A (en) Device for identifying user of vehicle
EP0820621A1 (en) Anti-theft device for protecting electronic equipment
RU98123599A (en) Theft Prevention Device
EP1293856A1 (en) Secure integrated circuit having confidential parts and a method for activating the circuit
WO1990015211A1 (en) Security system
CN101582770B (en) Authentication system, authentication request device and control method thereof
US20060148449A1 (en) Anti-theft system for mobile electronic devices
US20030097580A1 (en) Data encipher/decipher system for a portable rack of a computer
JPS627251A (en) Multifunctional telephone set
CN108843145A (en) A kind of method for unlocking based on optic communication, electronic lock and electron key
JPS6152775A (en) Illegal access preventing system of card
RU2117745C1 (en) Electronic key and lock
JP3258030B2 (en) Apparatus for communicating with portable data media
JPS623331A (en) Control system for software of external storage device
CN212201671U (en) Emergency unlocking key based on dual authentication protection

Legal Events

Date Code Title Description
FZDE Dead