Probabilistic theft deterrence
First Claim
1. A method comprised of the steps of:
- causing a device to operate normally in a first state without the use of any access code;
causing the device to operate normally in a second state and providing one or more warnings during the second state, the one or more warnings indicating that in order for the device to continue to operate normally an access code must be provided;
wherein a first event triggers the providing of one or more warnings and the operation of the device in the second state; and
causing the device to operate other than normally in a third state if the access code is not provided prior to the occurrence of a second event.
3 Assignments
0 Petitions
Accused Products
Abstract
A protected device is provided which may normally operate in a first state of normal operation. A first event may cause the protected device to go into a second state of alert where the protected device still operates normally but additionally provides warnings to a user. For example, during the second state of alert a user may be warned that an access code needs to be entered to prevent degradation or altering of the operation of the protected device. The first event may be triggered or may depend on one or more sub-events some of which may occur with some probability and some of which may automatically occur or may be deterministic. If a second event occurs prior to the user providing an access code then the protected device would transition from the second state (normal operation with warnings) to a third state in which the operation of the protected device would be altered or degraded. The second event may be based on one or sub events some of which may be probabilistic and some of which may be deterministic. If the user enters the correct access code during either the second state (warnings) or the third state (altering or degradation of operation), then the protected device would go back to the first state (normal operation, no warnings and no degradation).
-
Citations
27 Claims
-
1. A method comprised of the steps of:
-
causing a device to operate normally in a first state without the use of any access code;
causing the device to operate normally in a second state and providing one or more warnings during the second state, the one or more warnings indicating that in order for the device to continue to operate normally an access code must be provided;
wherein a first event triggers the providing of one or more warnings and the operation of the device in the second state; and
causing the device to operate other than normally in a third state if the access code is not provided prior to the occurrence of a second event. - View Dependent Claims (2, 3, 4)
after the occurrence of the second event, causing the device to transition from operating other than normally in the third state to operating normally in the first state, when the access code is provided during the third state.
-
-
3. The method of claim 1 wherein
the first event occurs eventually after some random period of time. -
4. The method of claim 1 wherein
the second event occurs eventually after some random period of time.
-
5. An apparatus comprising:
-
means for causing normal operation of a protected device without the use of any access code;
means for altering the normal operation of a protected device;
means for receiving an access code; and
wherein the means for altering the normal operation of the protected device alters the normal operation of the protected device if the access code is not received prior to an occurrence of an event. - View Dependent Claims (6, 7, 8, 9)
the occurrence of the event is the passage of a certain period of time. -
7. The apparatus of claim 5 further comprising
means for providing one or more warnings prior to the occurrence of the event; wherein each warning indicates that the operation of the protected device will be altered unless an access code is provided to the means for receiving an access code.
-
8. The apparatus of claim 7 wherein
the means for providing one or more warnings provides warnings in a random manner. -
9. The apparatus of claim 8 wherein
the means for providing one or more warnings provides a warning to a user when a randomly generated numbers falls within a first range.
-
-
10. An apparatus comprising:
-
a memory;
a processor;
a user interface device;
an operation controlling mechanism;
wherein the operation controlling mechanism controls the operation of a protected device;
wherein the operation controlling mechanism causes normal operation of the protected device without the use of any access codes;
wherein the processor provides a warning to a user that the operation of the operation controlling mechanism will the altered unless an access code is entered into the user interface device;
and wherein the processor alters the operation of the operation controlling mechanism and thereby alters the operation of the protected device, if the access code is not entered into the user interface device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
the processor provides periodically provides warnings to the user that the operation of the operation controlling mechanism will be altered unless an access code is entered in the user interface device. -
12. The apparatus of claim 10 wherein
the processor provides a warning to a user when a randomly generated numbers falls within a first range. -
13. The apparatus of claim 10 wherein
the processor alters the operation of the operation controlling mechanism and thereby alters the operation of the protected device, if the access code is not entered into the user interface device with a certain time period. -
14. The apparatus of claim 10 wherein
the protected device is a compact disc player. -
15. The apparatus of claim 10 wherein
the protected device is a camera. -
16. The apparatus of claim 10 wherein
the protected device is a computer. -
17. The apparatus of claim 10 wherein
the protected device is a television. -
18. The apparatus of claim 10 wherein
the protected device is a video cassette recorder. -
19. The apparatus of claim 10 wherein
the access code is stored in memory.
-
-
20. A method comprising the steps of
causing normal operation of a protected device without the use of any access code; -
providing a warning to a user that the operation of the protected device will be altered from normal operation unless an access code is entered into a user interface device;
partially altering the operation of the protected device, if the access code is not entered into the user interface device prior to the occurrence of a first event; and
further partially altering the operation of the protected device, if the access code is not entered into the user interface device prior to the occurrence of a second event. - View Dependent Claims (21, 22)
transitioning the protected device from altered operation back to normal operation if the access code is entered. -
22. The method of claim 20 wherein
the first event is the passage of a first time period; and the second event is the passage of a second time period.
-
-
23. A method comprising the steps of
providing service to a protected device without the use of any access code; -
providing a warning to a user that the service for a protected device will be altered unless an access code is entered into a user interface device;
altering the service for the protected device, if the access code is not entered into the user interface device or to the occurrence of an event. - View Dependent Claims (24)
the event is the passage of a first time period.
-
-
25. A method comprising
enabling all operations for a protected device without the use of any access code; -
providing an access code for entry into a protected device;
wherein the access code when entered into the protected device causes one or more operations of the protected device to be disabled after warning has been provided by the protected device and after the occurrence of an event unless the access code is entered into the protected device after the wang is provided and prior to the occurrence of the event. - View Dependent Claims (26, 27)
wherein the event is the expiration of a length of time. -
27. The method of claim 25
wherein the event is the completion of a number of operations of the protected device.
-
Specification