Method for the provision of an individual device code for an electronic device

ABSTRACT

The invention relates to a method for the provision of a device code for an electronic device, which is at least required for the first commissioning of the device code, whereby the device is inoperable without the input of the device code. The method is characterized in that the following procedural steps are carried out: Storage of a device number and an appropriate device code in a database, delivery of the device to a further processing site and readout of the device code stored in the database in conjunction with the device number, whereby the previous or simultaneous storage of a selected code number in the database in conjunction with the device number is required for readout.

[0001] The invention relates to a method for providing an individualdevice code for an electronic device that is required for at least theinitial commissioning of the device, whereby the device is inoperablewithout the input of the individual device code.

[0002] The protection of a device by means of a device code isfrequently used when, to prevent theft of the device, the latter shouldbe equipped so that the theft is not worthwhile for a thief, since thestolen device is not operable. If the protection of certain devices bymeans of a device code is generally known, the number of thefts of thesedevices consequently decreases.

[0003] For example, the method is used for car radios, since a car radiocan be easily removed by breaking into the car. Usually a PIN number isstored in the device and when the device is delivered, the customer isprovided with this pin number, for example, by means of a sticker on theoperating instructions. Provided that the device and the PIN number arekept in separate places, the device is thus inoperable and,consequently, it is of no interest to the thief. With car radios, thePin number is required if a disconnection from the power system occursor each time it is turned on.

[0004] Another means of preventing unauthorized use by means of a cellphone is known. In cell phones, a so-called SIM card is used by a cellphone supplier, without which the device cannot be operated. The SIMcard is released by the cell phone supplier. However, this does notnecessarily prevent the device from being stolen and used in conjunctionwith another SIM card.

[0005] The problem with the first method mentioned is that a device thatis stolen before delivery to the customer is not protected, since thedevice and the information about the PIN number are delivered to thecustomer together. A thief in the integrated transport system thusreceives all the information required to enable him to operate thedevice. With the second method mentioned, the owner of the cell phone isonly protected from unauthorized telephone use, but this does notprevent the removal and use of the device with another SIM card.

[0006] The task of the invention is to provide a method for theprovision of an individual device code for an electronic device in whichtheft protection is also ensured prior to the commissioning by the endcustomer. The method should be so easy to carry out that an economicaloperation is also possible with a large number of devices sold.

[0007] This task is solved by a method of the initially mentioned type,which is characterized by the execution of the following proceduralsteps in the order mentioned:

[0008] electronic storage of a device number and of the appropriatedevice code in a database

[0009] Delivery of the device to a further processing site

[0010] Automatic electronic readout of the device code stored in thedatabase in conjunction with the device number, whereby the previous orsimultaneous electronic storage of a selected code number in thedatabase in conjunction with the device number is required for readout.

[0011] The prerequisite for applying the method according to theinvention is thus that the device can only be operated by the input of adevice code. The device code is unknown until a code number, which isadvantageously the invoice number produced at the time of purchase, isknown and has been entered into the database. In this manner, it isensured that the device code is only made known when the device has beenproperly purchased and has not been stolen. It is thus pointless for athief to steal a device before it has been purchased.

[0012] The further processing site is advantageously the retail storewhere the end customer shops. However, it is also possible that thisfurther processing site is the premises of an intermediary, or theshipping department of a major customer. The device code in conjunctionwith the device number is stored in a favorable configuration of themethod by the manufacturer in the database. Alternatively, this data mayalso be stored, for example, by a wholesaler or a foreign marketingcompany. The electronic and automatic configuration is advantageous,since no labor-intensive services are required to release the devices orto pass on the individual device code. The methods according to thelatest state-of-the-art, however, have been developed so that theproduction of a code or work with general codes is required only inparticular cases, for which only an intentionally limited circle ofpeople, i.e., the contractual partners of the manufacturer or otherpeople from the service department or skilled workers need to beavailable.

[0013] The method according to the invention is particularlyadvantageous if the device code is stored in an unchangeable memoryarea. In computers, the memory area may be the BIOS, whereby thesecustomarily unalterable and alterable memory areas are stored. If thedevice code is located in the unalterable memory area, then the devicecode also cannot be changed if the BIOS is reprogrammed.

[0014] The method is explained in greater detail below by means ofexemplary configurations. Shown are:

[0015]FIG. 1: A first configuration of the method according to theinvention

[0016]FIG. 2: A second configuration of a method according to theinvention and

[0017]FIG. 3: The storing of the device code in a device.

[0018]FIG. 1 shows the sequence of operations of the method according tothe invention. First, a device number and the appropriate device codefor a device to be delivered are stored in a database. In this case, themanufacturer of the device performs this step. However, the device maybe delivered to a distribution center. Subsequently, the device isdelivered, whereby this device is not as a rule delivered directly to anend customer, but first to a further processing site, or anintermediary, such as a retailer. At this point in time, the device isnot yet operable, because the device code is missing, which is at leastrequired for the first commissioning of the device. However, the devicecode still cannot be read from the database. The prerequisite forreadout of the device code is the input of a code number by theretailer. Such conditions for the readout of data can easily beimplemented by electronic data processing systems. The invoice numberthat is produced when the device is sold is advantageously used as thecode number.

[0019] The invoice number is then stored in the database in the recordbelonging to the corresponding device, which is identified by the devicenumber. The device code is issued only after this storage. The device isnow given together with the device code to the end customer, forexample. Since the input of the invoice number is required, it ispossible at any time to reconstruct when a particular device waspurchased and by whom.

[0020] The connection of the retailer to the database takes place bymeans of a network connection. From the state-of-the-art, many securitymeasures are known that prevent unauthorized persons from accessing thedatabase network.

[0021] The device code may also be printed on the sales slip. If theuser or the end customer forgets the device code, this information canreadily be made available to him again once he has provided the devicenumber and the invoice number.

[0022]FIG. 2 illustrates a variation of the exemplary configuration inFIG. 1. In this case, a device from a manufacturer is also delivered tofurther processing site, which is again a retailer in this case. Thedevice code in conjunction with the device number has been previouslystored in a database. However, in this case, the device code is notissued by the retailer, but only the invoice number together with thedevice number is stored in the database. The end customer receives thedevice and also knows the invoice number based on the invoice, which isstored in the database for his device. The end customer himself obtainsthe device code.

[0023] However, in the exemplary configuration of FIG. 2, the endcustomer cannot directly access the database, but there is a servicedepartment that receives the invoice number and the device number fromthe end customer and which produces the device code based on thesenumbers and passes it on to the end customer. The end customer maycontact the service department by telephone, using a free telephonenumber for example, by a voice-activated computer or by E-mail.

[0024] Stolen devices can also be handled by the service department.Employees in the integrated transport system affected by a stolendevice, thus either the manufacturer, a shipper, the retailer or the endcustomer, informs the service department of the stolen device with acertain device number. A remark is entered into the database for thecorresponding device that the device has been stolen. If the person inpossession of the stolen device later attempts to obtain the device codethrough the service department, it is immediately recognized that itconcerns a stolen device, and the thief can be more easily detected inthis manner. Of course, the entry of a theft warning can also be madedirectly in the database, without the intervention of the servicedepartment.

[0025] The database can be further used to store various stations of adevice, since their transport is usually complicated, as illustrated inFIGS. 1 and 2. Then the device is normally transported from themanufacturer by means of a shipper to an intermediate storage warehouse,from where it is transported by a second shipper to a wholesaler, forexample, also to a central distribution depot of a distribution system.The latter transports the products to the branches by means of a thirdshipper, from which the end customer can purchase the device. If, forexample, the intermediate storage warehouse notes in the database thatthe device has been delivered and that it has also been delivered again,a frequency of theft at a certain part of the route can be easilydetected.

[0026] For a successful application of the method according to theinvention, it is necessary that the device can be operated only afterthe input of the device code. This means that the device code must alsobe stored in the device, so that the stored device code and the devicecode entered can be compared. For example, with computers, so-calledBIOS passwords are already known, although these are located in a partof the BIOS where they can be written. As a result, it is obvious thatthe BIOS password can usually be changed. Advantageously, as illustratedin FIG. 3, a device 1 contains a memory in the BIOS, whereby a part 3 ofthe memory can be written and read and another part that cannot bechanged. In the part that cannot be changed, fundamental systemoperations are stored, whose change would make the device operable. Inthe part 3 of the memory, which is changeable, however, functions arestored that ought to be changeable and in which device configurations orcertain options are stored for the execution of function. If the devicecode is stored in the unchangeable part of the BIOS that cannot be readfrom the outside, the device code cannot be changed or read out by asoftware program.

[0027] The method according to the invention is an advantage from thefinancial point of view for all those concerned. In this manner, themanufacturer prevents devices from being stolen on the route and fromhis having to pay for replacement devices. But devices are also stolenin retail stores, be it by warehouse workers, employees or customers.Once the device has been delivered to the retailer, however, themanufacturer is no longer responsible for replacements. It is thus inthe retailer's interest to make it harder to steal devices. Finally, forthe end customer, and thus for the user of the device, the method isparticularly advantageous if the device code is requested when thedevice is commissioned. Thus the stealing of a Notebook is no longerattractive if it is known that such devices are protected by a devicecode and that the latter cannot be obtained by an unauthorized person.

[0028] Storage in the unchangeable part of the BIOS does not lead to areprogramming of the BIOS or to a disconnection from the internalbattery.

1. Method for the provision of an individual device code for anelectronic device (1), which is required for at least the firstcommissioning of the device code, whereby the device is inoperablewithout the individual device code of the device (1) without theindividual device code of the device (1) characterized by the carryingout of the following procedural steps in the order mentioned: electronicstorage of a device number and the appropriate device code in a databaseDelivery of the device to a further processing site Automatic electronicreadout of the stored device code in conjunction with the device number,whereby the previous or simultaneous electronic storage of a selectedcode number in the database in conjunction with the device number isrequired for readout.
 2. Method according to claim 1, characterized inthat the device code (1) in device 1 is stored in an unchangeable memoryarea (2) that cannot be read by outsiders.
 3. Method according to claim1, characterized in that the code number is the invoice number of aretailer.
 4. Method according to claim 1, characterized in that thedevice code is stored in the database in conjunction with theappropriate device number from the manufacturer of the device.