Method and system for indentifying an unauthorized use of telematic device

ABSTRACT

The invention relates to a system of identifying an unauthorized use of a telematic device or a vehicle equipped with a telematic device. The telematic device includes an identification code, which is transmitted to a service provider. The identification codes of those telematic devices, which have been reported as being used in unauthorized, are stored at the service provider. The identification codes received at the service provider is compared for a match with the stored identification codes.

This application claims the benefit of PCT Patent ApplicationInternational Application No. PCT/EP03/02030, filed Feb. 27, 2003, whichclaims priority to German Patent Application No. 102 08 522.8, filedFeb. 27, 2002. The disclosure of the above applications is incorporatedherein by reference.

BACKGROUND OF THE INVENTION

1. Technical Field.

This invention relates to a method and system for identifying anunauthorized use of a telematic device or a vehicle equipped therewith.Further, this invention relates to a telematic device for use in suchsystem.

2. Related Art.

Nowadays, vehicles are more and more equipped with a telematic device,which is commonly understood as a device that integrates a vehicleinformation and entertainment system with a telecommunication device,such as a mobile telephone unit and a navigation device for providingposition and route data. The telematic device usually comprises tuningreceivers for radio programs or television programs. Video programs ondemand can also be received by a technique called “streaming” involvingthe telecommunication unit.

A telematic device has a considerable value in the vehicle and istherefore frequently subject to thefts. Equally, vehicles of upper classare more and more equipped with such telematic devices and consequentlyare often used in an unauthorized manner or even stolen. Consequently,various systems have been proposed for surveillance of vehicles andsystems for detecting an unauthorized use of vehicles.

For instance, DE 296 24 363 U1 describes a system for locating stolenvehicles using a satellite system for receiving and transmitting datarelating to the vehicle's identification code. To this end, the vehicleis equipped with a decodable microchip having stored data relating tothe vehicle's identification. The microchip can be activated by signalsfrom the satellite and in response thereto transmits a signal includingposition data to the satellite for relaying same to a centralsurveillance station. The system is therefore independent from acellular radio communications network and is thereby not only locallyeffective, but also globally in foreign countries outside the coverageof a standardized communications system.

From WO 97/20714, a system for guarding a vehicle from a distanceconsisting of an alarm system in a vehicle is known. The alarm system isconnected to a transmitter and furthermore to a global positioningsystem GPS navigation system provided in the vehicle. When the alarmsystem is triggered by an attempt to break into the vehicle or to stealthe vehicle, the alarm system generates an alarm signal, which is sentby the transmitter and subsequently to a central surveillance station.Simultaneously, also the position of the vehicle is transmitted to thesurveillance station, such that it is possible to direct police or othersecurity services to the location of the stolen vehicle.

From DE 197 33 579 A1, a mobile unit comprising a receiver for asatellite navigation system and a radio modem for transmitting positiondata in a radio communications network is known. A mobile unit is fixedin a manner to the vehicle, such that it is not immediately apparent forthe user of the vehicle. When the vehicle is in use, the mobile unitsends control data in a cyclic manner in order to prevent powerconsumption from the battery, which could be suspicious to the user.

From the DE 43 40 138 A1, an arrangement of a GPS unit for determiningposition coordinates of a vehicle connected to a mobile radio unitworking within a standardized communication network is known. This isuseful for transmitting the vehicle identity number to a telephonenetwork station, which can be connected to a central unit for locatingthe position of the vehicle reported to be stolen.

Although the prior art systems work well for protecting and locatingvehicles, there is no effective protection against a valuable device,such as a telematic device, which due to its inherent value isfrequently subject to theft. Although there are known security codes inconnection with radio receivers, which need to be inputted after aninterruption of the power supply or security cards, which must beinserted into the device before operation thereof, such codes arefrequently broken by professional by code-breaking devices.

Consequently, it would be desirable to have an effective protectionagainst unauthorized use of a telematic device. The object of thepresent invention is to overcome the shortcomings of the prior artdescribed above.

SUMMARY

The invention relates to storing identification codes of those telematicdevices, which have been reported as being used unauthorized, at aservice provider. Further, identification codes, which are received atthe service provider are compared for a match with the storedidentification codes. In this manner, it is easily possible to detect anunauthorized use of the telematic device. Even more importantly, theuser does not necessarily become aware of the fact that the unauthorizeduse has been detected. This is because the transmission of theidentification code is included in ordinary routines, e.g. whenrequesting online services. Consequently, even if the telematic deviceis manipulated, e.g. by removal of the security module or changing theidentity card, the unauthorized use will become detectable by the uniqueidentification code of the telematic device.

The service provider may request the transmission of the presentposition coordinates of the telematic device when a match is found. Thisfacilitates determining the location at which the telematic device orvehicle being used in an unauthorized manner is located.

The position coordinates are determined using a global positioningsatellite (GPS) module comprised in the telematic device. According tothis preferred embodiment, a standard module can be employed withoutadditional hardware and costs.

According to a further advantageous, the communication between thetelematic device and the service provider is carried out without using astandard cellular radio communication system. Such communication systemshave found widespread use with almost all areas being covered withreasonable costs. According to this embodiment, it is not necessary toprovide a customized radio communication system solely for surveillancepurposes.

The identification code is transmitted to the service provider in cyclicintervals, preferably, once per day, even if no online services arerequested during its interval. Accordingly, an unauthorized use can bevery quickly detected even if the telematic device is not put intooperation for several days.

In order to allow additional flexibility, the cyclic transmission of theidentification code is according to a further preferred embodiment,disabled and enabled upon input of a security code into the telematicdevice.

The steps are carried out by an automatic routine without requiringinteraction by the user. In this way, the unauthorized use can bedetermined without the user being aware that a determination ofunauthorized use has already been made.

Other systems, methods, features and advantages of the invention willbe, or will become, apparent to one with skill in the art uponexamination of the following figures and detailed description. It isintended that all such additional systems, methods, features andadvantages be included within this description, be within the scope ofthe invention, and be protected by the following claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention can be better understood with reference to the followingdrawings and description. The components in the figures are notnecessarily to scale, emphasis instead being placed upon illustratingthe principles of the invention. Moreover, in the figures, likereferenced numerals designate corresponding parts throughout thedifferent views.

FIG. 1 a system according to the present invention, for identifying anunauthorized use of a telematic device or a vehicle equipped therewith.

FIG. 2 a diagram illustrating the method according to the presentinvention, in particular illustrating the communication between thetelematic device and the service provider.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

FIG. 1 shows a vehicle 1 comprising a telematic device 2 comprising aGPS module 4 and a mobile telecommunication unit 5. As mentioned before,the term telematics refers to the emerging market for in-vehiclecommunications that combines wireless voice and data transfer with GPSpositioning technology to provide location-based connectivity, securityinformation and entertainment services. Typically, a telematic devicealso includes a radio receiver and a television receiver and means forreceiving video signals via wireless communication networks.

The telematic device 2 further comprises an identification code, whichuniquely identifies the device among all manufactured devices.Typically, the identification code is stored in a non-volatile read-onlymemory during the manufacturing process.

Finally, the telematic device comprises a module for reading an identitycard, which the user inserts in order to use the radio mobilecommunication unit 5. The communication unit operates under theapplicable telecommunication standards, such as GSM or UMTS. Thecommunication unit uses an antenna 6 to communicate over a wirelessnetwork 8 with a service provider 3 also being equipped with an antenna7 for reception and transmission.

The service provider 3 comprises a memory 9 for storing theidentification codes of those telematic devices that have been reportedas being used unauthorized.

Further, the service provider 3 comprises means for comparing thereceived identification codes for a match with the stored identificationcodes.

The method according to the present invention will now be explained infurther detail with reference to FIG. 2, which illustrates in aschematic way the communication between the telematic device and theservice provider over a wireless network.

As a first step, the telematic device requests any kind of onlineservices, e.g. location-based services or off-board navigation data. Inresponse thereto, the service provider requests the identification codeof the telematic device in order to identify the subscriber. This isgenerally done in order to check the user's authorization to use theservices and for billing purposes. In response thereto, the telematicdevice sends its identification code, which is compared at the serviceprovider with the stored identification codes of those devices whichhave been reported as being used unauthorized.

In case a match is found, the service provider requests to send theposition coordinates of the telematic device. In response to thisrequest, the telematic device sends the position coordinates obtainedfrom the GPS module.

All above-mentioned steps are carried out without any interaction neededby the user, such that the user is not aware that, e.g. his positioncoordinates are sent to the service provider.

In order not to make the unauthorized user of the telematic devicesuspicious, the service provider then delivers the requested services.Consequently, the unauthorized user does not become aware of the factthat his identification code has been checked and possibly determined asbeing one that belongs to a telematic device that has been reported asbeing used in an unauthorized manner. Moreover, because the positioncoordinates can be obtained at the service provider, this informationcan be used to direct police or security authorities to the unauthorizeduser.

According to an alternative embodiment to the method shown in FIG. 2,the identification code is sent without being previously requested fromthe service provider in response to a request to provide onlineservices. In order to do so, the telematic device comprises an internaltimer, which initiates the transmission of an identification code to theservice provider in cyclic intervals, preferably once per day. In thisway, it is ensured that even if no online services are requested, theservice provider can at least on a daily basis determine whether thetelematic device has been used in an unauthorized manner.

This cyclic transmission of the identification code may be disabled andenabled upon input of a security code into the telematic device. Thisallows flexibility for the user to decide whether he wants to put thetelematic device in the cyclic transmission mode with enhanced securityor whether it is sufficient that the identification code is transmittedwhen the telematic device requests online services.

Further, according to another preferred embodiment, a change of theidentity card is the event which initiates the transmission of theidentification code to the service provider for subsequent checking of apossible unauthorized use. The change of an identity card typicallyoccurs when an unauthorized user tries to start operation of a telematicdevice. As mentioned before, it is important that all operational stepsare carried out by an automatic routine without requiring interaction bythe user in order that he does not become aware of the fact that hisidentification code is checked.

While various embodiments of the invention have been described, it willbe apparent to those of ordinary skill in the art that many moreembodiments and implementations are possible within the scope of theinvention. Accordingly, the invention is not to be restricted except inlight of the attached claims and their equivalents.

1. A method of identifying an unauthorized use of a telematic device ora vehicle equipped therewith, the telematic device having anidentification code, which is transmitted to a service provider,comprising: storing at the service provider, the identification codes ofthose telematic devices, which have been reported as being usedunauthorized; and comparing identification codes received at the serviceprovider for a match with the stored identification codes.
 2. The methodaccording to claim 1, further comprising the step of requesting by theservice provider transmission of the present position coordinates of thetelematic device when a match is found.
 3. The method according to claim2, wherein the position coordinates are determined at. the telematicdevice using a global positioning system module and displayed at theservice provider.
 4. The method according to one of claims 1, whereinthe communication between the telematic device and the service provideris carried out using a standard cellular communications unit.
 5. Themethod according to one of claims 1, wherein the identification code istransmitted to the service provider when a change of the identity cardproviding access to the telematic device is detected.
 6. The methodaccording to one of claims 1, wherein the identification code istransmitted to the service provider when the user requests onlineservices from the service provider.
 7. The method according to one ofclaims 1, wherein the identification code is transmitted to the serviceprovider in cyclic intervals preferably once per day.
 8. The methodaccording to claim 7, wherein the cyclic transmission of theidentification is disabled and enabled upon input of a security codeinto the telematic device.
 9. The method according to one of claims 1,wherein all steps are carried out by an automatic operational routine atthe telematic device without requiring interaction by a user.
 10. Themethod according to one of claims 2, wherein the communication betweenthe telematic device and the service provider is carried out using astandard cellular communications unit.
 11. The method according to oneof claims 3, wherein the communication between the telematic device andthe service provider is carried out using a standard cellularcommunications unit.
 12. The method according to one of claims 2,wherein the identification code is transmitted to the service providerwhen a change of the identity card providing access to the telematicdevice is detected.
 13. The method according to one of claims 3, whereinthe identification code is transmitted to the service provider when achange of the identity card providing access to the telematic device isdetected.
 14. The method according to one of claims 4, wherein theidentification code is transmitted to the service provider when a changeof the identity card providing access to the telematic device isdetected.
 15. The method according to one of claims 2, wherein theidentification code is transmitted to the service provider when the userrequests online services from the service provider.
 16. The methodaccording to one of claims 3, wherein the identification code istransmitted to the service provider when the user requests onlineservices from the service provider.
 17. The method according to one ofclaims 4, wherein the identification code is transmitted to the serviceprovider when the user requests online services from the serviceprovider.
 18. The method according to one of claims 2, wherein theidentification code is transmitted to the service provider in cyclicintervals preferably once per day.
 19. The method according to one ofclaims 3, wherein the identification code is transmitted to the serviceprovider in cyclic intervals preferably once per day.
 20. The methodaccording to one of claims 4, wherein the identification code istransmitted to the service provider in cyclic intervals preferably onceper day.
 21. The method according to one of claims 2, wherein all stepsare carried out by an automatic operational routine at the telematicdevice without requiring interaction by a user.
 22. The method accordingto one of claims 3, wherein all steps are carried out by an automaticoperational routine at the telematic device without requiringinteraction by a user.
 23. The method according to one of claims 4,wherein all steps are carried out by an automatic operational routine atthe telematic device without requiring interaction by a user.
 24. Themethod according to one of claims 5, wherein all steps are carried outby an automatic operational routine at the telematic device withoutrequiring interaction by a user.
 25. The method according to one ofclaims 6, wherein all steps are carried out by an automatic operationalroutine at the telematic device without requiring interaction by a user.26. The method according to one of claims 7, wherein all steps arecarried out by an automatic operational routine at the telematic devicewithout requiring interaction by a user.
 27. The method according to oneof claims 8, wherein all steps are carried out by an automaticoperational routine at the telematic device without requiringinteraction by a user.
 28. A system for identifying unauthorized use ofa telematic device or a vehicle equipped therewith, said telematicdevice having stored an identification code, which is transmitted to aservice provider comprising: a memory for storing the identificationcodes at the service provider of those telematic devices, which havebeen reported as being used unauthorized; and means for comparingidentification codes received at the service provider for a match withthe stored identification codes.
 29. The system according to claim 28,wherein the service provider further comprises means for requesting thetransmission of the present position coordinates from the telematicdevice.
 30. A telematic device for use in a system according to claim28, further comprising a global positioning system module fordetermining the position coordinates.
 31. The telematic device accordingto claim 30, further comprising a standard cellular communications unit.32. The telematic device according to claim 30, further comprising meansfor transmitting the identification codes in cyclic intervals.
 33. Thetelematic device according to claim 32, further comprising means forinputting a security code for disabling/enabling the cyclic transmissionof the identification code.
 34. A telematic device for use in a systemaccording to claim 29, further comprising a global positioning systemmodule for determining the position coordinates.
 35. The telematicdevice according to claim 31, further comprising means for transmittingthe identification codes in cyclic intervals.