EP-3890374-B1 - METHOD AND COMMUNICATION SYSTEM FOR RELIABLY DETECTING A THEFT USING IOT DEVICES
Inventors
- BENNER, ALEXANDER
Dates
- Publication Date
- 20260506
- Application Date
- 20200330
Claims (8)
- Method for detecting an alarm case of a user equipment in a communication system comprising the following steps: Attaching an IoT-Device to a user equipment, wherein the IoT-Device is configured to detect unauthorized actions, wherein an effective antenna area of the IoT-Device is increased compared to an original effective antenna area of the IoT-Device by connecting the IoT-Device to antenna-capable components of the user equipment; Setting up a communication connection between the IoT-Device and a communication network; Triggering of an alarm signal in case of an unauthorized action on the IoT-Device and/or the user equipment, Transmission of the alarm signal via the communication network to a server connected to the communication network, characterized in that the IoT-Device detects abrupt changes in a receiving field strength and of the position change of the IoT-Device, wherein the IoT-Device comprises a measuring unit that measures the receiving field strength that is transmitted from the communication network to the IoT-Device, wherein the IoT-Device uses artificial intelligence to learn common changes in the strength of the received signal to detect unusual changes.
- The Method of one of the preceding claims, characterized in that at least two IoT-Devices are attached to the user equipment and the IoT-Devices are implemented in a hierarchical master/slave structure.
- The Method of claim 2, characterized in that the at least two IoT-Devices are attached at different locations of the user equipment.
- The Method of one of the preceding claims, characterized in that the IoT-Device is equipped with its own energy unit, which is especially configured for independent operation.
- The Method of claim 4, characterized in that the IoT-Device is connected to an energy unit of the user equipment and the IoT-Device obtains its operating energy with priority from the energy unit of the user equipment.
- The Method of claim 5, characterized in that the energy unit of the IoT-Device is a rechargeable battery and is charged by the energy unit of the user equipment.
- Communication system for detecting an alarm case of a user equipment configured for executing a method according to claim 1, comprising: a user equipment with at least one antenna compatible component, an IoT-Device attached to the user equipment, wherein the IoT-Device is configured to detect unauthorized actions and to send radio signals, wherein the IoT-Device is attached to at least one antenna compatible component of the user equipment, a communication network, wherein the communication network is adapted to establish a communication link with the IoT device and to forward the radio signals received from the IoT device to a user, characterized in that the IoT-Device is configured to detect abrupt changes in a receiving field strength and of the position change of the IoT-Device, wherein the IoT-Device comprises a measuring unit that is configured to measure the receiving field strength that is transmitted from the communication network to the IoT-Device, wherein the IoT-Device uses artificial intelligence to learn common changes in the strength of the received signal to detect unusual changes.
- The Communication system of claim 7, characterized in that the IoT-Device has at least one interface for connecting external antennas
Description
The invention relates to a method and a communication system in which motion profiles can be registered using compact sensor units attached to user equipment. In particular, the invention relates to a method and a communication system for detecting theft using IoT-Devices attached to valuable items of a user by recording and analyzing the motion profiles of those IoT-Devices. The IoT (Internet-of-Things) technique is more and more used for geo-tracking of high-value, expensive items that can be stolen quite easily, such as bicycles, mowing robots, scooters, power tools and/or construction machinery. The IoT-technology is intended to track the current location and, in the event of movement, to trigger a signal intended for this event, e.g. in the event of an assumed theft an alarm signal. Up to now, user equipment has been protected against theft by attaching an IoT-Device to the user equipment, either openly or hidden (e.g. built into the motor of an e-bike). The IoT-Device can be connected via an LPWAN (Low Power Wide Area Network) to a backend (gateway), which is exchanges information e.g. on the current position of the IoT-Device with a LNS (LoRaWAN network server). The communication between the IoT-Device and the gateway is preferably done in an energy-saving mode, e.g. using LTE-M (Long Term Evolution for Machines) or NB-loT (Narrowband Internet of Things). In order to enable installation of the IoT-Device on the user equipment, the IoT-Device is often built very compact and usually designed in such a way that it can also be retrofitted in the user equipment. As a result, the installation locations are quickly known after a short Internet search and the IoT device can usually be dismantled quickly, for example by a thief. The compactness of the loT-device is disadvantageous, since an aluminum foil already carried by a thief is sufficient to effectively shield the IoT-Device from sending signals and thus effectively prevents the detection and transmission of the IoT-Device's own position and thus in particular the detection of an event (user equipment is moved/stolen). The user equipment prepared in this way can then be stolen without the thief having to worry about geo-tracking. It does not necessarily have to be an aluminum foil to prevent the IoT-Device from working in the desired way, it can also be a grid network tuned to the respective frequency or any other "device" that effectively prevents the transmission of signals from the IoT-Device to the gateway (e.g. via LTE-M or NB-IoT). As a result, the theft will not be noticed and the IoT-Device will continue to be suspected at its last known location. In that context, US 9,194,955 B1 shows a method for obtaining data and communicating with a bicycle mounted cloud based activity monitor is provided. The method includes accepting into a server a plurality of sensor data and GPS location coordinates from a device attached to a bicycle, wherein the activity monitor communicates data to the cloud server via a wireless coupling. The method further includes writing information relating to sensor, GPS, and alarm functions from the cloud based server into the bike mounted activity tracker via a wireless link. In that context, US 2012/273289 A1 shows system and method for self-detecting vehicle theft is provided that includes a first antenna and a second antenna, both located on a vehicle. The first antenna transmits the signal and the second antenna receives the signal. A monitoring module in communication with the second antenna is configured to determine whether the signal has changed. A vehicle security system is configured to activate based on a change in the signal. In that context, US 2011/151833 A1 shows that communications are established between a base station and a mobile unit. The mobile unit analyzes the content of at least some information received from the base station relating to neighboring cells. When the analyzing indicates that the base station is a cloned base station, a warning is initiated to the user. It is therefore the objective of the invention to provide an improved method, an improved communication system and/or an improved IoT-Device to increase the theft protection of a user equipment. This problem is solved by the independent claims. In a first aspect of the invention a method is provided for detecting an alarm case, in particular a theft, of a user equipment in a communication system comprising the following steps: Attaching an IoT-Device to a user equipment, wherein the IoT-Device is configured to detect unauthorized actions, wherein the unauthorized action might be performed by a theft on the user equipment and/or on the IoT-Device. A possible unauthorized action is the removing of the user equipment from its current location or the shielding of the IoT-Device, e.g. by means of an aluminum foil;Setting up a communication connection between the IoT-Device and a communication network, wherein the IoT-Device can send or receive