System for identifying an unauthorized use of a telematic device
First Claim
Patent Images
1. A method of identifying on unauthorized use of a telematic device or a vehicle equipped therewith, the telematic device having an identification code, which is transmitted to a service provider, comprising:
- storing at the service provider, the identification codes of those telematic devices which have been reported as being used unauthorized;
receiving at the service provider an on-line service request from a first telematic device having a first identification code and a second telematic device having a second identification code;
receiving the first and the second identification codes from the first and the second telematic devices in their ordinary operating routine, which comprises the on-line service request requested by an unauthorized user and a billing for the on-line service request, where the on-line service request with the telematic device is known to-the unauthorized user such that the unauthorized user can select and request on-line service;
comparing identification codes received at the service provider for a match with the stored identification codes;
comparing the first identification code received at the service provider for a match with the stored identification codes;
comparing the second identification code received at the service provider for a match with the stored identification codes;
identifying that a use of the first telematic device is authorized and a use of the second telematic device is unauthorized;
providing the requested service to both the first and the second telematic devices, even though the use of the second telematic device is unauthorized, to prevent an unauthorized user of the second telematic device from becoming aware that the second identification code is compared and that the use of the second telematic device is identified to be an unauthorized; and
providing the requested service to the second telematic device, even though the second telematic device is manipulated by changing an identity card inserted by the unauthorized user to use radio mobile communication, and detecting the unauthorized use of the second telematic device by the identification code obtained through an ordinary operation routine of the second telematic device.
7 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a system of identifying an unauthorized use of a telematic device or a vehicle equipped with a telematic device. The telematic device includes an identification code, which is transmitted to a service provider. The identification codes of those telematic devices, which have been reported as being used in unauthorized, are stored at the service provider. The identification codes received at the service provider is compared for a match with the stored identification codes.
-
Citations
33 Claims
-
1. A method of identifying on unauthorized use of a telematic device or a vehicle equipped therewith, the telematic device having an identification code, which is transmitted to a service provider, comprising:
-
storing at the service provider, the identification codes of those telematic devices which have been reported as being used unauthorized; receiving at the service provider an on-line service request from a first telematic device having a first identification code and a second telematic device having a second identification code; receiving the first and the second identification codes from the first and the second telematic devices in their ordinary operating routine, which comprises the on-line service request requested by an unauthorized user and a billing for the on-line service request, where the on-line service request with the telematic device is known to-the unauthorized user such that the unauthorized user can select and request on-line service; comparing identification codes received at the service provider for a match with the stored identification codes; comparing the first identification code received at the service provider for a match with the stored identification codes; comparing the second identification code received at the service provider for a match with the stored identification codes; identifying that a use of the first telematic device is authorized and a use of the second telematic device is unauthorized; providing the requested service to both the first and the second telematic devices, even though the use of the second telematic device is unauthorized, to prevent an unauthorized user of the second telematic device from becoming aware that the second identification code is compared and that the use of the second telematic device is identified to be an unauthorized; and providing the requested service to the second telematic device, even though the second telematic device is manipulated by changing an identity card inserted by the unauthorized user to use radio mobile communication, and detecting the unauthorized use of the second telematic device by the identification code obtained through an ordinary operation routine of the second telematic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A telematic device comprising:
-
a memory storing an identification code; a global positioning system module for determining position coordinates; a mobile communication unit operating under applicable telecommunication standards and communicating with a service provider to transmit the identification code; a module for reading an identity card inserted by a user to enable communication by the mobile telecommunication unit; and a mechanism for enabling/disabling cyclic transmission of the identification code to the service provider; where independently of the unauthorized use of the telematic device, the mobile communication unit transmits the identification code in an ordinary operation routine of the telematic device and the ordinary operation routine comprises an on-line service request requested by an unauthorized user and a billing for the on-line service request, and where the on-line service request with the telematic device in the unauthorized use is known to the unauthorized user such that the unauthorized user can select and request on-line service; and where even if the telematic device is manipulated by changing the identity card inserted by the unauthorized user, the unauthorized use of the telematic device is detectable by the identification code of the telematic device obtained through the ordinary operation routine of the telematic device. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
-
31. A system for identifying unauthorized use of a telematic device or a vehicle equipped therewith, comprising:
-
a memory for storing the identification codes at the service provider of those telematic devices, which have been reported a being used unauthorized; means for comparing identification codes received at the service provider for a match with the stored identification cedes; and a communication unit operable to receive a service request from a first telematic device having a first identification code and a second telematic device having a second identification code; where the means for comparing operates to compare the first identification code and the second identification code for the match with the stored identification codes and the means for comparing identifies that a use of the first telematic device is authorized and a use of the second telematic device is unauthorized; and where the communication unit provides the requested service to both the first and second telematic devices, even though the use of the second telematic device is unauthorized, to prevent an unauthorized user of the second telematic device from becoming aware that the second identification code is compared for match with the stored identification codes and the use of the second telematic device is identified to be unauthorized; and where the telematic device comprising; a memory storing an identification code; a global positioning system module for determining position coordinates; a mobile communication unit operating under applicable telecommunication standards and communicating with a service provider to transmit the identification code; a module for reading an identity card inserted by a user to enable communication by the mobile telecommunication unit; and a mechanism for enabling/disabling cyclic transmission of the identification code to the service provider; where independently of the unauthorized use of the telematic device, the mobile communication unit transmits the identification code in an ordinary operation routine of the telematic device and the ordinary operation routine comprises an on-line service request requested by an unauthorized user and a billing for the on-line service request where the on-line service request with the telematic device in the unauthorized use is known to the unauthorized user such that the unauthorized use can select and request on-line service; and where even if the telematic device is manipulated by changing the identity card inserted by the unauthorized user, the unauthorized use of the telematic device is detectable by the identification code of the telematic device obtained through the ordinary operation routine of the telematic device. - View Dependent Claims (32, 33)
-
Specification