×

System for identifying an unauthorized use of a telematic device

  • US 7,688,197 B2
  • Filed: 02/27/2003
  • Issued: 03/30/2010
  • Est. Priority Date: 02/27/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method of identifying on unauthorized use of a telematic device or a vehicle equipped therewith, the telematic device having an identification code, which is transmitted to a service provider, comprising:

  • storing at the service provider, the identification codes of those telematic devices which have been reported as being used unauthorized;

    receiving at the service provider an on-line service request from a first telematic device having a first identification code and a second telematic device having a second identification code;

    receiving the first and the second identification codes from the first and the second telematic devices in their ordinary operating routine, which comprises the on-line service request requested by an unauthorized user and a billing for the on-line service request, where the on-line service request with the telematic device is known to-the unauthorized user such that the unauthorized user can select and request on-line service;

    comparing identification codes received at the service provider for a match with the stored identification codes;

    comparing the first identification code received at the service provider for a match with the stored identification codes;

    comparing the second identification code received at the service provider for a match with the stored identification codes;

    identifying that a use of the first telematic device is authorized and a use of the second telematic device is unauthorized;

    providing the requested service to both the first and the second telematic devices, even though the use of the second telematic device is unauthorized, to prevent an unauthorized user of the second telematic device from becoming aware that the second identification code is compared and that the use of the second telematic device is identified to be an unauthorized; and

    providing the requested service to the second telematic device, even though the second telematic device is manipulated by changing an identity card inserted by the unauthorized user to use radio mobile communication, and detecting the unauthorized use of the second telematic device by the identification code obtained through an ordinary operation routine of the second telematic device.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×