Method for the Protection of a Movable Object, Especially a Vehicle, Against Unauthorized Use
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a method for protection of a movable asset, particularly a motorvehicle (100), against unauthorized use with the following steps: cryptographic identity verification and/or cryptographic authentication of the vehicle with an external computer system (108), verification whether a blocking is stored for the motorvehicle, transmission of a signal from the computer system to the vehicle in order to allow use of the motorvehicle if no blocking is stored for the motorvehicle.
28 Citations
43 Claims
-
1-15. -15. (canceled)
-
16. A method for the protection of a mobile asset against unauthorized use, comprising the following steps:
-
cryptographic identity verification and/or cryptographic authentication of the asset with an external computer system, verification whether a blocking is stored for the asset, and transmission of a signal from the computer system to the asset in order to allow the use of the asset if no blocking is stored for the asset. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer readable storage medium, comprising instructions executable by a computer and which cause the computer to perform actions for the protection of a mobile asset against unauthorized use, comprising:
-
cryptographic identity verification and/or cryptographic authentication of the asset with an external computer system, verification whether a blocking is stored for the asset, and transmission of a signal from the computer system to the asset in order to allow the use of the asset if no blocking is stored for the asset.
-
-
31. A computer system, comprising:
-
means for cryptographic identity verification and/or cryptographic authentication of a movable asset, means for determining a usage status of the asset, and means for transmission of a signal to the asset depending on the usage status. - View Dependent Claims (32)
-
-
33. A method for the protection of a mobile asset against unauthorized use, comprising the following steps:
-
cryptographic identity verification and/or cryptographic authentication of the asset with the external computer system, and reception of a usage signal or a blocking signal from the computer system. - View Dependent Claims (34, 35, 36)
-
-
37. A computer readable storage medium, comprising instructions executable by a computer and which cause the computer to perform actions for the protection of a mobile asset against unauthorized use, comprising:
-
cryptographic identity verification and/or cryptographic authentication of the asset with the external computer system, and reception of a usage signal or a blocking signal from the computer system.
-
-
38. A motorvehicle electronics apparatus, comprising:
-
means for cryptographic identity verification and/or cryptographic authentication of the asset with a computer system, and means for reception of a usage signal or a blocking signal from the computer system. - View Dependent Claims (39, 40, 41)
-
-
42. A method for the protection of a mobile asset against unauthorized use, comprising the following steps:
-
entry of information indicating loss of the asset into a first computer system, transmission of the information to a second computer system for storing the information in a database, wherein the second computer system is adapted for generating a signal for enabling usage or blocking usage of the asset depending on the information stored in the database. - View Dependent Claims (43)
-
Specification