Method for protecting devices, specially car radios, against theft
First Claim
Patent Images
1. A method for preventing an unauthorized use of a device, comprising the steps of:
- generating a code from a first item of check information using an irreversible encryption method;
assigning the code to the device, the code being entered directly into the device to activate the device;
storing the first item of check information in the device for authorization purposes;
generating a second item of check information from the code using the irreversible encryption method;
comparing the first item of check information with the second item of check information; and
storing a check algorithm for the code and the second items of check information in the device.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for providing an anti-theft mechanism for devices, in particular for car radios, in that a code which identifies the device must be entered directly into the device in order to activate the device. The code is derived from an item of check information assigned to the device, using an irreversible encryption method.
-
Citations
9 Claims
-
1. A method for preventing an unauthorized use of a device, comprising the steps of:
-
generating a code from a first item of check information using an irreversible encryption method; assigning the code to the device, the code being entered directly into the device to activate the device; storing the first item of check information in the device for authorization purposes; generating a second item of check information from the code using the irreversible encryption method; comparing the first item of check information with the second item of check information; and storing a check algorithm for the code and the second items of check information in the device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
8. A method for preventing an unauthorized use of a device, comprising the steps of:
-
causing an irreversible encryption method to apply a generation algorithm to an item of check information to generate a code; assigning the code to the device, the code being entered directly into the device to activate the device; storing a check algorithm for the code and the item of check information in the device; causing the irreversible encryption method to apply the check algorithm and the item of check information to the code; and causing the check algorithm to check the code to determine whether the code is associated with the item of check information. - View Dependent Claims (7)
-
-
9. A method for preventing an unauthorized use of a device, comprising the steps of:
-
generating a code from a first item of check information using an irreversible encryption method; assigning the code to the device, the code being entered directly into the device to activate the device; storing the first item of check information in the device for authorization purposes; generating a second item of check information from the code using the irreversible encryption method; and comparing the first item of check information with the second item of check information.
-
Specification