DE29617704U1 - Device for securing in particular audio and video devices and other media and / or telecommunication devices from unauthorized use - Google Patents
Device for securing in particular audio and video devices and other media and / or telecommunication devices from unauthorized useInfo
- Publication number
- DE29617704U1 DE29617704U1 DE29617704U DE29617704U DE29617704U1 DE 29617704 U1 DE29617704 U1 DE 29617704U1 DE 29617704 U DE29617704 U DE 29617704U DE 29617704 U DE29617704 U DE 29617704U DE 29617704 U1 DE29617704 U1 DE 29617704U1
- Authority
- DE
- Germany
- Prior art keywords
- key
- media
- devices
- secured
- key medium
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/346—Cards serving only as information carrier of service
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1409—Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
- G08B13/1418—Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
- H04M1/675—Preventing unauthorised calls from a telephone set by electronic means the user being required to insert a coded card, e.g. a smart card carrying an integrated circuit chip
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/44—Receiver circuitry for the reception of television signals according to analogue transmission standards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/78—Television signal recording using magnetic recording
- H04N5/782—Television signal recording using magnetic recording on tape
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Signal Processing Not Specific To The Method Of Recording And Reproducing (AREA)
- Traffic Control Systems (AREA)
Description
Dr, Ing. Hanns-Jürgen Mostert 7. Oktober &Iacgr;996 Dr, Ing. Hanns-Jürgen Mostert 7 October &Iacgr;996
Vorrichtung zur Sicherung von insbesondere Audio- und Video- Geräten sowie weiteren Media- und/ oder Telekommunikationsgeräten vor unbefugter Benutzung.Device for securing audio and video devices as well as other media and/or telecommunications devices against unauthorized use.
Der Übergang von der herkömmlichen Informationsgesellschaft mit Fernseher, Radio und teilweise Computer zur mehr oder weniger weltweit vernetzten Multimedia-Gesellschaft bringt weitere Gefahren für den Anwender im geschäftlichen, professionellen Bereich oder aber auch im privaten Umfeld, beispielsweise für seine Familienmitglieder zu Hause, mit sich.The transition from the traditional information society with television, radio and sometimes computers to the more or less globally networked multimedia society brings with it further risks for the user in the business, professional area or in the private environment, for example for his family members at home.
Man denke hier an die Nutzung teurer Medien- oder Telekommunikationsdienste durch unbefugte Personen oder auch an jugendgefährdende Sendungen oder vergleichbare Angebote, die ohne Schutz von Kindern abgerufen werden könnten.One might think here of the use of expensive media or telecommunications services by unauthorized persons or of programs or similar offers that are harmful to minors and that could be accessed by children without protection.
Die heute zumeist einzig verfügbare Methode, zumindest Fernsehgeräte und Videorecorder vor ungewünschtem Betrieb zu sperren, ist die Verwendung von Passwörtern, die der befugte Benutzer zunächst eingeben muß, um sein Gerät einschalten zu können. Jedoch ist dieses Verfahren sehr umständlich. Auch können diese Paßwörter häufig durch "Probieren" übergangen werden, da sie oft in direktem Zusammenhang mit persönlichen Daten des legalen Benutzers stehen. Vielfach sind Passwörter sogar irgendwo aufgeschrieben.The only method available today to prevent unwanted operation of at least television sets and video recorders is to use passwords that the authorized user must first enter in order to be able to switch on his device. However, this procedure is very cumbersome. These passwords can also often be bypassed by "trial and error" as they are often directly related to the legal user's personal data. Passwords are often even written down somewhere.
Schutzsysteme für die anderen Mediageräte sind bislang unbekannt. Einzig für Personal-Computer werden moderne Schutzsysteme, beispielsweise Chipkartensysteme mit Smart-Cards, die als elektronische Schlüssel dienen, angeboten. Auch verwenden Telephon-Handys und vergleichbare Funktelephone Chipkarten mit einer Benutzerkennung zur Zugangskontrolie und korrekten Gebührenzuordnung.Protection systems for other media devices are currently unknown. Modern protection systems are only available for personal computers, such as chip card systems with smart cards that serve as electronic keys. Cell phones and similar radio telephones also use chip cards with a user ID for access control and correct billing.
Das hier erfindungsgemäß vorgeschlagene Sicherungssystem ermöglicht nun die intelligente Zugangskontrolle zu allen möglichen Media- oder Telekommunikations-Geräten. The security system proposed here according to the invention now enables intelligent access control to all possible media or telecommunications devices.
Dieses Sicherungssystem basiert auf der in Schutzanspruch 1 aufgeführten Vorrichtung, dadurch gekennzeichnet ist, daß zur Funktion der Sicherung bzw. zur Nutzungskontrolle ein elektronisches Schloß verwendet wird, das als "Schlüssel" insbesondere eine Chipkarte nach ISO 7816 akzeptiert.This security system is based on the device specified in claim 1, characterized in that an electronic lock is used for the security function or for usage control, which accepts as a "key" in particular a chip card according to ISO 7816.
Die Verwendung der verbreiteten Chipkartentechnologie als Schlüsselsystem ermöglicht es, daß der oder die befugten Nutzer die zumeist ohnehin vorhandenen Chipkarten anderer Zugangskontrollsysteme auch hier benutzen können.The use of widespread chip card technology as a key system enables the authorized user(s) to use the chip cards of other access control systems, which are usually already available.
Dr. Ing. Hanns-Jürgen Mostert 7. Oktober 1996Dr. Ing. Hanns-Jürgen Mostert 7 October 1996
_· 1 « * JLJ S-_· 1 « * JLJ S-
Mit der Erfindung wird in den verschiedenen Ausgestaltungen, die insbesondere in den Unteransprüchen beschrieben sind, erreicht, daß eine Sicherung von insbesondere medialen- sowie Telekommunikations-Geräten und -systemen vollständig möglich und darüber hinaus benutzerabhängig anpassbar ist.With the invention, in the various embodiments, which are described in particular in the subclaims, it is achieved that the security of, in particular, media and telecommunications devices and systems is completely possible and, moreover, can be adapted to suit the user.
Vorteilhafte Ausführungen der Erfindung sind in den Schutzansprüchen 2 bis 6 gegeben.Advantageous embodiments of the invention are given in claims 2 to 6.
Die Ausgestaltung nach Anspruch 2 ermöglicht die Verwendung der heute zumeist ohnehin vorhandenen Schlüsselmedien, insbesondere Chipkarten zur Zugangskontrolle, beispielsweise Dienstausweise, auch zur Nutzungskontrolle der hier erwähnten Media- und Telekommunikations Systeme, indem diese Systeme die Karten "lernen" und freischalten.The embodiment according to claim 2 enables the use of the key media that are generally available today, in particular chip cards for access control, for example service ID cards, also for controlling the use of the media and telecommunications systems mentioned here, in that these systems "learn" and activate the cards.
Bei der Ausgestaltung nach Anspruch 3, wird wie in Figur 1 skizziert, das Schlüsselmedium, beispielsweise eine Smart Card {Chipkarte) (1) mit Chip (2) nach ISO 7816, zur Nutzungsfreigabe des Gerätes in die entsprechende Aufnahme (4) der Fernbedienung (3) eingesteckt. Hierbei ist gewährleistet, daß ohne gültigen Schlüssel auch keine Bedienung resp. Nutzung des Gerätes am Gerät selber mit dem Ziel der Umgehung der Sicherung in der Fernbedienung (3) möglich ist.In the embodiment according to claim 3, as outlined in Figure 1, the key medium, for example a smart card (chip card) (1) with a chip (2) according to ISO 7816, is inserted into the corresponding slot (4) of the remote control (3) to enable use of the device. This ensures that without a valid key, it is not possible to operate or use the device on the device itself with the aim of bypassing the security in the remote control (3).
Bei der Ausgestaltung nach Anspruch 4 wird das Schlüsselmedium in das Gerät selber eingesteckt. Dieses Verfahren ist notwendig, wenn das zu schützende Gerät über keine Fernbedienung verfügt, beispielsweise ein Telephonapparat, oder aber diese zu klein ist oder sonstige Gründe dagegen sprechen. Denkbar ist auch, daß beide Möglichkeiten parallel vorhanden sind.In the embodiment according to claim 4, the key medium is inserted into the device itself. This method is necessary if the device to be protected does not have a remote control, for example a telephone, or if it is too small or there are other reasons against it. It is also conceivable that both options exist in parallel.
Die Ausgestaltung nach Anspruch 5 beschreibt eine Realisation, bei der das Schlüsselmedium nicht dazu dient, das Gerät freizuschalten, sondern daß je nach Schlüssel und damit benutzerabhängig bestimmte Funktionen des Gerätes freigeschaitet werden. Beispielsweise können benutzerabhängig bestimmte Fernsehprogramme freigeschaltet oder gesperrt werden, oder beim Telefon werden bestimmte Nummern bzw. -bereiche freigegeben oder gesperrt. Gleiches gilt für die Steuerung von INTERNET-Diensten durch entsprechend ausgestattete Modem-Boxen oder Datengeräten, insbesondere PC's.The embodiment according to claim 5 describes an implementation in which the key medium is not used to unlock the device, but rather to unlock certain functions of the device depending on the key and thus depending on the user. For example, certain television programs can be unlocked or blocked depending on the user, or certain numbers or ranges can be unlocked or blocked on the telephone. The same applies to the control of INTERNET services by means of appropriately equipped modem boxes or data devices, in particular PCs.
Die Ausgestaltung nach Anspruch 6 beschreibt eine Systemvariante, die in oder nicht in Ergänzung zu Anspruch 5 auch die Rechte für Benutzer programmierbar resp. vorgebbar macht, die über kein Schlüsselmedium verfügen. Man denke hier an die grundsätzliche Freischaltung von Nachrichtendiensten auf bestimmten TV-Kanälen oder an Notrufmöglichkeiten über Telefon.The embodiment according to claim 6 describes a system variant which, in or not in addition to claim 5, also makes the rights programmable or predeterminable for users who do not have a key medium. One thinks here of the basic activation of news services on certain TV channels or of emergency call options via telephone.
Dr. Ing. Hanns-Jürgen Mostert 7. Oktober 1996 Dr. Ing. Hanns-Jürgen Mostert 7 October 1996
I · · II · · I
Alle hier beschriebenen Ausführungen unterscheiden sich zu dem bekannten und in den Fundstellen angegebenen Verfahren dadurch, daß die dort beschriebenen Systeme für die Verwendung insbesondere in Personal-Computern ausgelegt sind und so nicht ohne weiteres für die Verwendung in Media-geräten, beispielsweise Fernseher oder Radio, sowie in Telekommunikationsgeräten, beispielsweise Telephonieendgeräten, einsetzbar sind.All the embodiments described here differ from the known method and the methods given in the references in that the systems described there are designed for use in personal computers in particular and thus cannot be used without further ado in media devices, such as televisions or radios, or in telecommunications devices, such as telephone terminals.
Bekannte Fundsteilen zum Stand der TechnikKnown findings on the state of the art
(A) Vorrichtung zur Sicherung von insbesondere datenverarbeitungstechnischen Geräten vor unbefugter Bedienung; erteiltes Gebrauchsmuster, Rollen- Nr.: G 295 11 304.9 vom 13.07.1995(A) Device for securing data processing equipment in particular against unauthorized use; granted utility model, roll number: G 295 11 304.9 dated 13.07.1995
(B) "pc_guard"-; technische Produktbeschreibungen 1995/96; Herstellung und Vertrieb: moco hardware industries GmbH, Kluser Weg 26, 52525 Waldfeucht.(B) "pc_guard"-; technical product descriptions 1995/96; production and distribution: moco hardware industries GmbH, Kluser Weg 26, 52525 Waldfeucht.
Claims (7)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE29617704U DE29617704U1 (en) | 1996-10-11 | 1996-10-11 | Device for securing in particular audio and video devices and other media and / or telecommunication devices from unauthorized use |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE29617704U DE29617704U1 (en) | 1996-10-11 | 1996-10-11 | Device for securing in particular audio and video devices and other media and / or telecommunication devices from unauthorized use |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| DE29617704U1 true DE29617704U1 (en) | 1996-12-12 |
Family
ID=8030453
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| DE29617704U Expired - Lifetime DE29617704U1 (en) | 1996-10-11 | 1996-10-11 | Device for securing in particular audio and video devices and other media and / or telecommunication devices from unauthorized use |
Country Status (1)
| Country | Link |
|---|---|
| DE (1) | DE29617704U1 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1056291A3 (en) * | 1999-05-21 | 2002-08-28 | Telefonica, S.A. | Multifunctional remote control unit for digital television |
| US6657679B2 (en) * | 1997-09-03 | 2003-12-02 | Universal Electronics Inc. | Universal remote control system |
| US6882729B2 (en) | 2002-12-12 | 2005-04-19 | Universal Electronics Inc. | System and method for limiting access to data |
-
1996
- 1996-10-11 DE DE29617704U patent/DE29617704U1/en not_active Expired - Lifetime
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6657679B2 (en) * | 1997-09-03 | 2003-12-02 | Universal Electronics Inc. | Universal remote control system |
| US7268694B2 (en) | 1997-09-03 | 2007-09-11 | Universal Electronics, Inc. | Universal remote control system |
| EP1056291A3 (en) * | 1999-05-21 | 2002-08-28 | Telefonica, S.A. | Multifunctional remote control unit for digital television |
| US6882729B2 (en) | 2002-12-12 | 2005-04-19 | Universal Electronics Inc. | System and method for limiting access to data |
| US8254576B2 (en) | 2002-12-12 | 2012-08-28 | Universal Electronics, Inc. | System and method for limiting access to data |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP0927975A2 (en) | Access control device for a service-on-demand system | |
| DE102006042014B4 (en) | Remote control | |
| DE10135527A1 (en) | Mobile station for mobile communications system with individual protection code checked before access to requested service or data is allowed | |
| DE4406602A1 (en) | Security system for identification and authentication of communication partners | |
| DE69330743T2 (en) | Procedure for the certification of one unit of information by another | |
| DE19645937B4 (en) | Method and system for person-dependent control of a telecommunications terminal | |
| EP0400441B1 (en) | Testing method for terminal communicating with IC-cards | |
| Trouessin et al. | FOIN: a nominative information occultation function | |
| DE10055237A1 (en) | Controlling access to restricted access system involves exchanging information and decoding key over second telecommunications connection to enable program reception over first connection | |
| DE10216384A1 (en) | Access control network | |
| CA2439426A1 (en) | User identification with an improved password input method | |
| DE29617704U1 (en) | Device for securing in particular audio and video devices and other media and / or telecommunication devices from unauthorized use | |
| EP1161850B1 (en) | Method of distributing keys to subscribers of communications networks | |
| DE19645936A1 (en) | Authorised user control method for telecommunications device | |
| Hamad | Issues of Surveillance in Bulgaria: Violation of Article 8 of the European Convention on Human Rights | |
| EP2715681B1 (en) | Method for generating a currently valid one-time release code for an electronic lock | |
| DE60215716T2 (en) | System for connecting a first and a second computer system via a telecommunications network | |
| DE19542732B4 (en) | Procedure for detecting the misuse of an access authorization | |
| DE10128925A1 (en) | Terminal and method for using various services offered over a telecommunications network | |
| EP1163559B1 (en) | Method for securing access to a data processing device and appropriate device | |
| WO2003023722A2 (en) | Method for verifying access authorization | |
| Metelski | Achieving Communications Privacy Through Revision of the Eavesdropping Laws | |
| DE102013202339A1 (en) | Device and method for managing access codes | |
| JPS63301350A (en) | Preventing system for wrong access of host computer information given from terminal equipment | |
| DE10140544A1 (en) | Mobile telecommunications unit has security chip in removable battery |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| R086 | Non-binding declaration of licensing interest | ||
| R207 | Utility model specification |
Effective date: 19970130 |
|
| R156 | Lapse of ip right after 3 years |
Effective date: 20000801 |