[go: up one dir, main page]

CN101438528A - Method, system, and network for selectively controlling the utility a target - Google Patents

Method, system, and network for selectively controlling the utility a target Download PDF

Info

Publication number
CN101438528A
CN101438528A CNA2005800447866A CN200580044786A CN101438528A CN 101438528 A CN101438528 A CN 101438528A CN A2005800447866 A CNA2005800447866 A CN A2005800447866A CN 200580044786 A CN200580044786 A CN 200580044786A CN 101438528 A CN101438528 A CN 101438528A
Authority
CN
China
Prior art keywords
effectiveness
state
implement device
key
change
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2005800447866A
Other languages
Chinese (zh)
Inventor
P·阿特金森
R·S·科内罗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kestrel Wireless Inc
Original Assignee
Kestrel Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kestrel Wireless Inc filed Critical Kestrel Wireless Inc
Publication of CN101438528A publication Critical patent/CN101438528A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Selective Calling Equipment (AREA)

Abstract

A distribution control system is provided to support the controlled and selective changing of utility for a target. The target with controlled utility may be an electronic device, or alternatively, may be a tangible media, such as an optical disc. The distribution control system has a target with a change effecting device and a restricted access key. An activation device retrieves or generates an authorization key, and sends the authorization key to the target. The authorization key may be sent to the target wirelessly, for example, using a radio frequency signal. The target has logic that uses the restricted access key and the authorization key to change the utility of the target. In one example, the activation device retrieves the authorization key from a network operation center (NOC) by sending a target identifier to the NOC, and the NOC retrieves the authorization key for the identified target. The activation device may also connect to other systems for obtaining approval to change the utility of the target. For example, the authorization key may be sent to the target upon receiving payment, password, or other confirmation.

Description

用于选择性地控制对象效用的方法、系统及网络 Method, system and network for selectively controlling object utility

相关申请related application

[0001]本申请要求2004年10月26日提交的美国临时专利申请60/622,137号的优先权,该申请的名称为“A Method and System forAffecting the Utility of a Target”;本申请要求2004年12月7日提交的美国临时专利申请60/633,971号的优先权,该申请的名称为“AMethod and Means of RF Activation of a Target”;本申请要求2005年2月18日提交的美国临时专利申请60/654,384号的优先权,该申请的名称为“A Method and Means of RF Activation of a Target”,这三篇专利申请全部以引用方式加入本申请。The application requires the U.S. provisional patent application 60/622, the priority of No. 137 submitted on October 26th, 2004, and the title of this application is " A Method and System for Affecting the Utility of a Target "; The application requires December 2004 Priority to U.S. Provisional Patent Application No. 60/633,971, filed February 7, entitled "AMethod and Means of RF Activation of a Target"; this application claims U.S. Provisional Patent Application 60, filed February 18, 2005 /654,384, the title of the application is "A Method and Means of RF Activation of a Target", all three patent applications are hereby incorporated by reference.

技术领域 technical field

[0002]本发明涉及可以选择性地使其效用受控的对象,以及变更对象效用所用的方法与装置。在一个具体实例中,本发明可使用射频(RF)装置及方法来选择性地控制诸如电子装置或光介质之类耐用物品的效用。[0002] The present invention relates to objects that can selectively have their utility controlled, and methods and apparatus for altering the utility of the object. In one embodiment, the present invention may use radio frequency (RF) devices and methods to selectively control the utility of durable items such as electronic devices or optical media.

背景技术 Background technique

[0003]盗窃是产品销售过程中一个日益严重的问题。举例来说,电子装置的体积越来越小,而效用却越来越多。但是正因为这些电子装置体积越来越小,性能越来越强,所以窃贼更容易并且更喜欢盗窃这些电子装置。诸如数码相机、DVD播放机、MP3播放器以及游戏机之类装置,都是常见的盗窃对象,不仅仅只是零售店里的顾客可能会盗窃这些装置,分销链中的其他人也有可能盗窃这些装置。例如,零售店员工、托运人、库管甚至生产厂家的员工,经常盗窃产品,甚至成箱搬走,据为己有,或者私自卖出。另外,其他类型的产品,诸如DVD、CD、游戏盘、游戏卡带及其他类型的介质也属于偷盗对象。由于这些产品的需求量大,而且体积较小,价格较贵,所以窃贼容易并喜欢盗窃这些产品。[0003] Theft is a growing problem in the distribution of products. For example, electronic devices are getting smaller and smaller in size, but more and more useful. But just because these electronic devices are getting smaller and more powerful, thieves are more likely to steal them and prefer to steal them. Devices such as digital cameras, DVD players, MP3 players, and game consoles are common targets of theft, not just by customers in retail stores but by others in the distribution chain . For example, employees of retail stores, shippers, warehouse managers, and even employees of manufacturers often steal products, or even take them away in boxes, keep them for themselves, or sell them without permission. Additionally, other types of products such as DVDs, CDs, game discs, game cartridges, and other types of media are also subject to theft. Stealing these products is easy and preferred by thieves due to their high demand, smaller size and more expensive prices.

[0004]从制造产品的生产厂家到销售产品的零售网点(POS),这些销售大量高价值的消费品的地方总是容易受到盗窃的威胁。因此采用了各种安全措施来减少盗窃(摄像头、保安、电子标签,或者是将贵重商品锁在柜台里等)。尽管如此,由于诸如DVD、CD、视频游戏、便携式视频游戏机、DVD播放机、数码相机、计算机、打印机、电视之类的贵重商品的失窃,厂商和零售商每年损失数十亿美元。[0004] From the manufacturer where the product is manufactured to the point of sale (POS) where the product is sold, these places that sell large quantities of high-value consumer goods are always vulnerable to the threat of theft. Therefore, various security measures are adopted to reduce theft (cameras, security guards, electronic tags, or locking valuables in the counter, etc.). Nonetheless, manufacturers and retailers lose billions of dollars each year due to theft of valuable merchandise such as DVDs, CDs, video games, portable video game consoles, DVD players, digital cameras, computers, printers, televisions, and the like.

[0005]盗窃的猖獗带来的是商品生产成本、运输成本和销售成本的增加。分销链上的各级机构都存在失窃的风险,因此都要采取措施来控制或降低失窃损失的水平。这些损失的最终承受者是那些合法的购买者,相当于要他们在购买产品时承担不公平的“失窃税”。另外,由于在零售时商品相对更容易失窃,因此零售商必须要采取额外的一些办法来确保产品的安全。例如,DVD、CD,以及小型电子装置,经常被包装在一个过大的包装盒里,从而使它们不容易被隐藏。然而,大包装盒妨碍顾客对其中产品的了解,最终使产品的吸引力下降。再如,零售商店可以将贵重商品和易失窃商品放在带锁的柜台里。这样,完全将零售顾客和商品隔开,虽然降低了被窃的风险,但同时也使得商品难以销售。顾客不能获取带锁柜台里商品的完整标签信息,也不能够实际接触到这些商品,为了拿到产品,他们必须要和拿有钥匙的零售店员进行沟通。另外一种尝试解决方案是,零售商店在商品上贴有安全标签,一旦购买商品后在付款台结帐时再使标签无效。如果顾客带着有效标签离开零售店,就会有警报响起。保安或者店员会来拦下顾客并确认顾客是否盗窃了商品。这个过程对保安和店员来说可能存在危险,并且由于错误报警太多,合法消费者也要承受压力。What the rampant of theft brings is the increase of commodity production cost, transportation cost and sales cost. Organizations at all levels of the distribution chain are at risk of theft, and steps are taken to control or reduce the level of theft loss. The ultimate bearers of these losses are those legitimate buyers, which is equivalent to asking them to bear an unfair "stolen tax" when purchasing products. In addition, since merchandise is relatively easy to steal at retail, retailers must take additional steps to ensure product security. For example, DVDs, CDs, and small electronic devices are often packaged in an oversized box so that they cannot be easily concealed. However, large packaging boxes hinder customers' understanding of the product inside, which ultimately makes the product less attractive. As another example, a retail store can store valuables and items that are prone to theft in locked counters. This completely separates the retail customer from the merchandise, which reduces the risk of theft but also makes it difficult to sell the merchandise. Customers do not have access to the full label information of the products in the locked counters, nor do they have physical access to these products. In order to get the products, they must communicate with the retail clerk who has the key. Another attempted solution is for retail stores to place security tags on items and then invalidate the tags at checkout at the checkout desk once the item has been purchased. If a customer leaves the retail store with a valid tag, an alarm will go off. Security guards or clerks will stop the customer and confirm whether the customer has stolen the product. This process can be dangerous for security guards and shop assistants, and legitimate consumers are also under pressure due to too many false alarms.

[0006]上述种种方法都不能完全防止盗窃,反而降低了这种零售方式对顾客的吸引力。这样,为了吸引顾客并提供一个轻松的购物环境,零售商不得不接受一定程度(有时比例也很高)的失窃。而且,无论是大号包装盒、带锁的柜台,还是保安,对于发生在从厂家到零售店货架之间相当严重的盗窃均无能为力。因此,整个分销链对于“可以接受的”失窃已经习以为常,并将失窃带来的损失转移在合法消费者身上。All above-mentioned methods all can not prevent theft completely, have reduced the attractiveness of this retail mode to the customer on the contrary. Thus, in order to attract customers and provide a relaxed shopping environment, retailers have to accept a certain degree (sometimes a high percentage) of theft. And neither oversized boxes, locked counters, nor security guards can do anything about the fairly serious theft that occurs between the manufacturer and the retail store shelf. As a result, the entire distribution chain becomes accustomed to "acceptable" theft and shifts the cost of theft onto legitimate consumers.

[0007]商品分销同时还面临有其他的难题。例如,顾客需要选择具有某组特定功能或者效用的产品,也希望所购买的产品能够正好满足他们的具体需求。因此,厂家常常将一种产品设计为不同的模型,每种模型都具有不同的特征。尽管这样能够满足消费者的需求,但是这也使得产品的生产、货运、存货清点、盘存和零售的过程变得繁琐。这个问题存在于配置例如电子产品、计算机、游戏机、DVD、CD、游戏卡带这类商品的过程中。对于一个具体实例而言,一张DVD电影盘,有家庭版、影院版,还有“未删节版”。每个版本都有不同的年龄限制,也面向不同的重要市场。因此,必须同时生产、货运、存货清点、盘存和管理这三种不同版本的DVD。相似的问题也存在于游戏机、计算机和其他商品中。[0007] Commodity distribution also faces other problems. For example, customers need to choose products with a specific set of functions or utilities, and they also hope that the purchased products can meet their specific needs. Therefore, manufacturers often design a product as different models, each with different characteristics. While this satisfies the needs of consumers, it also makes the process of product production, shipping, inventory counting, inventory and retailing cumbersome. This problem exists in the configuration of goods such as electronics, computers, game consoles, DVDs, CDs, game cartridges. For a specific example, a DVD movie disc has a home edition, a theater edition, and an "unabridged" edition. Each version has a different age limit and is aimed at a different important market. Therefore, the three different versions of DVDs must be produced, shipped, inventoried, inventoried and managed simultaneously. Similar problems exist in game consoles, computers, and other commodities.

[0008]商品分销还面临另外一个难题,有时商品是租给消费者一段时间。出租商业模式中的典型例子是出租诸如DVD之类的光介质。物理介质上存储的内容的租借模式(即录像带或者光盘中记录的电影)通常取决于介质实际的流通,尤其将其从租赁店借出和向租赁店归还。在以时间为计费单位的租借方式中,租金和顾客持有租借物的时间(例如从借走到归还的时间)多少有关。在租借量最大化方式中,租金与借出量减去归还量的值有关。在租借返还最大化方式中,租金则与借出、归还的频繁程度有关。这些租借方式都有一些相当大的限制。首先,无论租借频度如何,每次租借都会产生交通费用。其次,在消费者决定租借和可以使用租借物之间有时间延迟。[0008] Commodity distribution also faces another problem. Sometimes commodities are leased to consumers for a period of time. A typical example in the rental business model is the rental of optical media such as DVDs. The rental model of content stored on physical media (ie, videotapes or movies recorded on optical discs) generally depends on the actual circulation of the media, especially its checkout from and return to rental outlets. In the rental method with time as the billing unit, the rent is more or less related to the time the customer holds the leased item (for example, the time from borrowing to returning). In the loan-maximization approach, the rent is related to the amount lent minus the amount returned. In the lease return maximization method, the rent is related to the frequency of lending and returning. Each of these lending methods has some considerable limitations. First, there is a transportation fee for each rental, regardless of the frequency of the rental. Second, there is a time delay between when the consumer decides to rent and when the loan can be used.

[0009]对于这类租借方式的缺陷可以通过音像出租业来进行说明。在传统的音像出租店里,每次消费者要租电影看,必须去音像店选择电影,看完后还必须回到店里归还。消费者租借的收费时间取决于从音像店借出电影的时间和归还电影且记录到存货清单中的时间。在这种模式下,消费者要承担往返音像店之间的交通费用。同时消费者还要承受在租借电影和做出选择并实际观看电影之间的时间差。音像店也要承担每次电影的租借、盘存及借出、归还的较高的营运费用。[0009] The defects of this type of rental method can be illustrated by the audio-visual rental industry. In traditional audio-visual rental stores, every time consumers want to rent a movie to watch, they must go to the audio-visual store to choose a movie, and they must return to the store after watching it. The time a consumer is charged for a rental depends on when the movie is checked out from the video store and when it is returned and recorded in inventory. In this model, consumers bear the cost of transportation to and from the video store. Consumers also suffer from the time lag between renting a movie and making a selection and actually watching it. The audiovisual store also has to bear the higher operating costs of each movie rental, inventory, lending, and return.

[0010]即使是采用其他的运输手段,例如通过美国邮政(US mail),在用户选择电影、租借电影和观看电影之间存在时间差。如果以最大流通量或这最大频度为计费的方式,时间差更大一些,直到将电影返还给零售商、入库、再选择其他电影为止。在两种情况下零售商也都承担着实际上重复的货运和处理费用。其他的业务,诸如对于有形介质如票据、赠券、凭单、信用卡、产品标签、安全装置、存储卡、可移动存储计算机存储装置(光盘和磁盘)的授权、激活、验证等等,都有着类似的限制。[0010] Even with other means of transportation, such as by US mail, there is a time lag between the user selecting the movie, renting the movie, and viewing the movie. If the maximum circulation or the maximum frequency is used as the billing method, the time difference will be greater until the movie is returned to the retailer, stored in the warehouse, and then other movies are selected. In both cases the retailer also bears virtually duplicate shipping and handling costs. Other services, such as authorization, activation, verification, etc., of tangible media such as tickets, coupons, vouchers, credit cards, product labels, security devices, memory cards, removable storage computer storage devices (optical and magnetic disks) have similar limits.

[0011]货物的非商业分发也存在类似的难题。例如,军队保存、运输和维护容易失窃和滥用的武器装备。这些武器装备必须保证随时处于可用状态,但是又必须充分控制它们以免落入敌人手中,或者是未经军方许可而被滥用。[0011] Similar difficulties exist with the non-commercial distribution of goods. For example, the military stores, transports and maintains weapons and equipment that are prone to theft and misuse. These weapons must be available at all times, but must be sufficiently controlled to prevent them from falling into enemy hands or being misused without the military's approval.

发明内容 Contents of the invention

[0012]本发明为指定对象提供一个分销控制系统,支持受控和选择性地更改对象的效用。具有受控效用的对象可是电子装置,或者可选地,可以是诸如光盘之类的有形介质。分销控制系统具有一个对象,它具有变更实现装置和受限访问密钥。激活装置用来获取或者产生授权密钥,然后将密钥发送到对象。授权密钥发送给对象的方式可以是无线方式,例如使用射频信号。对象具有使用受限访问密钥和授权密钥以改变对象效用的逻辑。举例来说,激活装置通过发送对象标识符到网络操作中心(NOC)而从NOC获取授权密钥,并且NOC得到用于已识别的对象的授权密钥。激活装置也可以连接其他系统,用于获得许可,从而可变更对象的效用。例如,在收到付款、密码或者其他确认时,将授权密钥发送到指定对象。[0012] The present invention provides a distribution control system for specified objects that supports controlled and selective modification of the utility of objects. The object with controlled utility may be an electronic device, or alternatively, a tangible medium such as an optical disc. The distribution control system has an object that has a change implementer and a restricted access key. The activation device is used to obtain or generate an authorization key, and then send the key to the subject. The manner in which the authorization key is sent to the subject may be wireless, for example using radio frequency signals. Objects have logic that uses restricted access keys and authorization keys to change the object's utility. For example, the activation device obtains the authorization key from the NOC by sending the object identifier to the Network Operations Center (NOC), and the NOC gets the authorization key for the identified object. The activation device can also be connected to other systems for obtaining permission to change the object's utility. For example, upon receipt of a payment, password, or other confirmation, send an authorization key to a designated object.

[0013]本发明提供了效用受控对象,以及改变对象效用的方法。效用受控对象可以是电子装置,或者可选地,可以是诸如光盘之类的有形介质。受控对象带有设置为第一状态的变更实现装置,其允许对象按照第一效用进行工作。受控对象还带有用于接收授权密钥的接收器,以及响应于授权密钥,选择性地控制变更实现装置达到第二状态的逻辑。当变更实现装置处于第二状态时,对象可按照第二效用进行工作。在一个实例中,受控对象带有在生产过程中存储的受限访问密钥,该密钥在改变变更实现装置的状态时供逻辑使用。为改变受控对象的效用,将激活装置设置在受控对象附近。激活装置从受控对象读取可访问的标识符后,获取或产生与对象关联的授权密钥。激活装置可以和网络操作中心或者其他实体连接,从而获取授权密钥,然后获得可以改变受控对象效用的许可。一经许可,激活装置就可以将授权码发送给受控对象。[0013] The present invention provides utility controlled objects, and methods of changing the utility of objects. The utility controlled object may be an electronic device, or alternatively, a tangible medium such as an optical disc. The controlled object has a change implementing means set to a first state which allows the object to behave according to a first utility. The controlled object also has a receiver for receiving an authorization key, and logic for selectively controlling the change implementing means to reach a second state in response to the authorization key. When the change implementing means is in the second state, the object can operate according to the second utility. In one example, the controlled object carries a limited-access key stored during production, which is used by logic when changing the state of the change-implementation device. In order to change the utility of the controlled object, the activation device is set near the controlled object. After the activation device reads the accessible identifier from the controlled object, it obtains or generates an authorization key associated with the object. The activation device can be connected with the network operation center or other entities to obtain the authorization key, and then obtain the permission to change the utility of the controlled object. Once approved, the activation device can send the authorization code to the controlled object.

[0014]在分销控制系统的具体实例中,受控对象在生产时带有用于限制对象效用的变更实现装置。这样,受限对象对小偷来说几乎没有用处,因此也不太可能成为盗窃的目标。生产厂家还在对象上存储标识符和受限访问密钥。厂家也存储可访问标识符和相关联的密钥,以备授权用户恢复对象效用时使用。例如,标识符和密钥可以存储在网络操作中心(NOC)。将大大降低受控对象在分销运输的过程中失窃的风险。顾客决定购买该对象时,可以将其靠近激活装置。由激活装置读取对象的可访问ID,并通过连接到NOC的网络发送可访问ID。NOC获取用于该对象的授权密钥。还可以获取其他一些许可,比如对付款、标识、密码或者年龄进行确认。得到许可后,激活装置通常使用无线通信的方式将授权密钥发送到受控对象。对象接收到授权密钥后,通过自带逻辑对授权密钥和它存储的受限访问密钥进行对比。如果两个密钥相匹配,则对象利用激活的能量源改变变更实现装置的状态。然后,顾客可以使用对象的全部效用。[0014] In a specific example of the distribution control system, the controlled object is produced with a change implementation device for limiting the utility of the object. This way, the restricted object is of little use to a thief and thus less likely to be a target for theft. Manufacturers also store identifiers and restricted-access keys on objects. The vendor also stores the accessibility identifier and associated key for use by an authorized user to restore the utility of the object. For example, identifiers and keys may be stored at a network operations center (NOC). It will greatly reduce the risk of the controlled object being stolen during distribution and transportation. When the customer decides to purchase the object, he can bring it close to the activation device. The accessibility ID of the object is read by the activation device, and the accessibility ID is sent through the network connected to the NOC. The NOC obtains the authorization key for this object. Other permissions can also be obtained, such as confirmation of payment, identification, password or age. After obtaining permission, the activation device usually uses wireless communication to send the authorization key to the controlled object. After the object receives the authorization key, it uses its own logic to compare the authorization key with the restricted access key it stores. If the two keys match, the object alters the state of the implementing device with the activated energy source. The customer can then use the full utility of the object.

附图说明 Description of drawings

[0015]图1是用于分销效用受控对象的网络框图;Fig. 1 is a network block diagram for distribution utility controlled object;

[0016]图2是用于分销效用受控对象的网络框图;Fig. 2 is a network block diagram for distribution utility controlled object;

[0017]图3A和3B是效用受控对象框图;Fig. 3 A and 3B are utility controlled object block diagrams;

[0018]图4A和4B是变更效用受控对象的效用状态的过程框图;4A and 4B are process block diagrams of changing the utility state of a utility controlled object;

[0019]图4C是用于变更效用受控对象的效用状态的过程流程图;[0019] FIG. 4C is a process flow diagram for changing the utility state of a utility controlled object;

[0020]图5是效用受控对象的框图;Fig. 5 is the block diagram of utility controlled object;

[0021]图6A是效用受控电子装置框图;Fig. 6 A is a block diagram of utility-controlled electronic device;

[0022]图6B是效用受控处理器框图;[0022] FIG. 6B is a block diagram of a utility-controlled processor;

[0023]图7A和7B是效用受控光盘框图;[0023] FIGS. 7A and 7B are block diagrams of utility-controlled optical discs;

[0024]图8是用于变更效用受控对象的效用状态的过程流程图;[0024] FIG. 8 is a process flow diagram for changing the utility state of a utility controlled object;

[0025]图9A是用于分销效用受控对象的网络框图;[0025] FIG. 9A is a network block diagram for distribution utility controlled objects;

[0026]图9B是用于效用受控对象的分销链框图;[0026] FIG. 9B is a distribution chain block diagram for utility controlled objects;

[0027]图10是带标签的效用受控对象的示意图;Fig. 10 is the schematic diagram of the utility controlled object with label;

[0028]图11是带有外置天线的效用受控电子装置示意图;Fig. 11 is a schematic diagram of a utility-controlled electronic device with an external antenna;

[0029]图12是带有外置天线的效用受控电子装置框图;Fig. 12 is a block diagram of a utility-controlled electronic device with an external antenna;

[0030]图13是带有外置天线的效用受控电子装置框图;Fig. 13 is a block diagram of a utility-controlled electronic device with an external antenna;

[0031]图14是效用受控对象的框图;Fig. 14 is the block diagram of utility controlled object;

[0032]图15是效用受控对象的框图;Fig. 15 is the block diagram of utility controlled object;

[0033]图16是效用受控对象的电路框图;Fig. 16 is the block circuit diagram of utility controlled object;

[0034]图17是效用受控对象的电路框图;Fig. 17 is the block circuit diagram of utility controlled object;

[0035]图18是效用受控对象的电路框图;Fig. 18 is the block circuit diagram of utility controlled object;

[0036]图19是效用受控对象的电路框图;Fig. 19 is the block circuit diagram of utility controlled object;

[0037]图20是效用受控对象的电路框图;Fig. 20 is the block circuit diagram of utility controlled object;

[0038]图21是效用受控对象的电路框图;Fig. 21 is the block circuit diagram of utility controlled object;

[0039]图22是效用受控对象的框图;[0039] FIG. 22 is a block diagram of a utility controlled object;

[0040]图23是效用受控对象的框图;[0040] FIG. 23 is a block diagram of a utility controlled object;

[0041]图24是效用受控对象的框图;[0041] FIG. 24 is a block diagram of a utility controlled object;

[0042]图25是效用受控对象的框图;Figure 25 is a block diagram of a utility controlled object;

[0043]图26是用于对效用受控对象进行变更的服务器系统框图;[0043] FIG. 26 is a block diagram of a server system for changing utility controlled objects;

[0044]图27是用于对效用受控对象进行变更的服务器系统框图;[0044] FIG. 27 is a block diagram of a server system for changing utility controlled objects;

[0045]图28是使用激活装置变更效用受控对象效用的框图;[0045] FIG. 28 is a block diagram of changing utility controlled object utility using activation means;

[0046]图29是使用激活装置变更效用受控对象效用的框图;[0046] FIG. 29 is a block diagram of changing utility controlled object utility using activation means;

[0047]图30是使用激活装置和网络改变效用受控对象效用的框图;[0047] FIG. 30 is a block diagram of changing the utility of a utility controlled object using an activation device and a network;

[0048]图31是使用激活装置和网络改变效用受控对象效用的框图;[0048] FIG. 31 is a block diagram of changing the utility of a utility controlled object using an activation device and a network;

[0049]图32是使用激活装置和网络改变效用受控对象效用的框图;[0049] FIG. 32 is a block diagram of changing the utility of a utility controlled object using an activation device and a network;

[0050]图33是使用激活装置和网络改变效用受控对象效用的框图;[0050] FIG. 33 is a block diagram of changing the utility of a utility controlled object using an activation device and a network;

[0051]图34是使用激活装置和网络改变效用受控对象效用的框图;[0051] FIG. 34 is a block diagram of changing the utility of a utility controlled object using an activation device and a network;

[0052]图35是使用激活装置和网络改变效用受控对象效用的框图;[0052] FIG. 35 is a block diagram of changing the utility of a utility controlled object using an activation device and a network;

[0053]图36是使用激活装置和网络改变效用受控对象效用的框图;[0053] FIG. 36 is a block diagram of changing the utility of a utility controlled object using an activation device and a network;

[0054]图37是使用激活装置和网络改变效用受控对象效用的框图;[0054] FIG. 37 is a block diagram of changing the utility of a utility controlled object using an activation device and a network;

[0055]图38是使用激活装置和网络改变效用受控对象效用的框图;[0055] FIG. 38 is a block diagram of changing the utility of a utility controlled object using an activation device and a network;

[0056]图39是使用激活装置和网络改变效用受控对象效用的框图;[0056] FIG. 39 is a block diagram of changing the utility of a utility controlled object using an activation device and a network;

[0057]图40是位于包装内部的效用受控对象的框图;[0057] FIG. 40 is a block diagram of a utility controlled object located inside a package;

[0058]图41是位于包装内部的效用受控对象的框图;[0058] FIG. 41 is a block diagram of a utility controlled object located inside a package;

[0059]图42是位于包装内部的效用受控对象的框图。[0059] FIG. 42 is a block diagram of a utility controlled object located inside a package.

具体实施方式 Detailed ways

[0060]参考图1,表示用于控制对象效用的系统。配合分销链中各个点的对象12对系统10进行说明。对象12可以是诸如计算机、电视、仪器、MP3播放器,相机、游戏机或玩具之类的电子装置。在另一个实例中,对象可以是有形介质,比如是光盘、DVD、CD或游戏卡带。对象12在生产或者制备时就带有变更实现装置。变更实现装置用来控制对象的可用效用或者对象的使用。更具体地,变更实现装置可以有多个状态,各个状态分别对应于对象效用的可用状态。在一个具体应用中,变更实现装置可在效用的两个可用状态之间进行切换。[0061]如方框12a所示,当对象进入分销链时,该对象被设置成具有一种效用。例如,此效用可能受到严格限制,对象没有可用的功能。在另一个实例中,还有可能是设置的效用只允许有一定的演示效用。可以理解的是,具体的效用可以根据分销链的需要进行分别设置。例如,在分销链的某一点,当对象转移到顾客时,可能需要改变对象可用的效用。相应地,方框12b是带有激活装置16的对象在销售点或其他传输点14的情况。由于对象接近激活装置16,所以激活装置或者其他读取装置可以从对象读取标识符值或其他标识。利用此标识符,激活装置就可以产生或获取授权密钥。这种授权密钥可能就本地存储在销售点终端机14处,也可以通过网络连接从网络操作中心或者其他远程服务器中获取。销售点终端机14和操作中心18相连接。操作中心可以和销售点终端机14处在同一装置,或者处在其他位置的其他装置。操作中心18还可以有多个计算机服务器,并通过网络系统分配进程和数据库。操作中心18内存储了一组标识以及相应的授权密钥21。在另一个例子中,操作中心18操作算法进程以产生对应于从激活装置16所接收到信息的密钥。不论是产生还是获取密钥,操作中心18都会将对象的授权密钥发送到销售点终端机14,在销售点终端机14,该密钥对激活装置16有效。[0060] Referring to FIG. 1, a system for controlling utility of objects is shown. System 10 is described with reference to objects 12 at various points in the distribution chain. Object 12 may be an electronic device such as a computer, television, instrument, MP3 player, camera, game console, or toy. In another example, the object may be a tangible medium, such as an optical disc, DVD, CD, or game cartridge. The object 12 is produced or prepared with a means for implementing changes. Change implementations are used to control the available utility of an object or the use of an object. More specifically, the change implementing means may have multiple states, and each state corresponds to an available state of the object utility. In one specific application, the change implementing means can switch between two available states of the utility. [0061] As shown in block 12a, when an object enters the distribution chain, the object is set to have a utility. For example, this utility may be so severely limited that the object has no functionality available. In another example, it is also possible that the set utility only allows a certain demonstrative utility. It can be understood that the specific utility can be set separately according to the needs of the distribution chain. For example, at some point in the distribution chain, when the object is transferred to the customer, it may be necessary to change the utility available to the object. Correspondingly, box 12b is the case where the object with the activation device 16 is at the point of sale or other point of transfer 14 . As the object approaches the activation device 16, the activation device or other reading device may read an identifier value or other identification from the object. Using this identifier, the activation device can generate or obtain an authorization key. This authorization key may be stored locally at the point of sale terminal 14, or may be obtained from a network operation center or other remote server through a network connection. The point of sale terminal 14 is connected to an operations center 18 . The operations center may be at the same facility as the point-of-sale terminal 14, or at another facility at another location. The operation center 18 can also have multiple computer servers, and distribute processes and databases through a network system. A group of identifications and corresponding authorization keys 21 are stored in the operation center 18 . In another example, operations center 18 operates an algorithmic process to generate a key corresponding to information received from activation device 16 . Whether generating or obtaining a key, the operations center 18 sends the subject's authorization key to the point-of-sale terminal 14 where it is valid for the activation device 16 .

[0062]在销售点14处,销售点终端机通常连接到激活装置,可以执行各种其他前期任务或进程,以决定是否已经得到授权来更改对象的效用。例如,销售点终端机可以用来确认用于对象的付款,或确认购买一些特殊对象的顾客的年龄也满足条件。如方框12c所示,如果销售点装置得到授权可以更改对象效用,那么激活装置16将授权密钥发送到该对象。在一个实例中,激活装置16可以通过RF(射频)通信从对象读取ID并将授权密钥发送到对象。可以理解的是,也可采用其他类型的无线通信方式。例如,可以通过红外(IR)通信进行单向或双向通信。在另一个实例中,对象也可以和激活装置物理接触以实现通信。[0062] At the point of sale 14, a point of sale terminal, typically connected to the activation device, may perform various other preliminary tasks or processes to determine whether authorization has been granted to alter the object's utility. For example, a point-of-sale terminal can be used to confirm payment for an object, or to verify that the age of the customer purchasing some particular object also meets the criteria. If the point-of-sale device is authorized to change the utility of the object, the activation device 16 sends the authorization key to the object, as shown in block 12c. In one example, the activation device 16 may read the ID from the subject and send the authorization key to the subject via RF (Radio Frequency) communication. It is understood that other types of wireless communication methods may also be used. For example, one-way or two-way communication can be by infrared (IR) communication. In another example, the object may also be in physical contact with the activation device to enable communication.

[0063]如方框12d所示,对象利用接收到的授权密钥更改其内部变更实现装置状态到另外一个状态。在此另一个状态下,对象的效用和在当变更实现装置处在第一状态时的效用不同。对象具有连接于变更实现装置的逻辑,所述变更实现装置用于使用授权密钥来改变对象效用。例如,在生产进程期间定义一个受限访问密钥,并将此密钥存储在对象中。无法从外部读取、更改或者销毁这种受限访问密钥,但是可通过对象的逻辑进行读取或其他处理。将此受限访问密钥和接收到的授权密钥对比或者配合使用,就可以决定是否可以更改对象效用。[0063] As shown in block 12d, the object uses the received authorization key to change its internal change-enabling device state to another state. In this other state, the utility of the object is different from the utility when the change implementing means is in the first state. The object has logic connected to change implementation means for changing the object utility using the authorization key. For example, define a restricted-access key during the production process and store this key in an object. Such restricted-access keys cannot be read, changed, or destroyed externally, but can be read or otherwise manipulated by the object's logic. This restricted access key is compared or used in conjunction with the received authorization key to determine whether the object utility can be changed.

[0064]在系统10的具体实例中,对象12表示为MP3播放器。生产MP3对象装置期间,受限访问密钥储存在MP3播放器内。另外,MP3播放器内还安装有变更实现装置,该装置设置成限制MP3播放器的效用的状态。更具体地,变更实现装置的第一状态设置为MP3播放器无法加电或者不能正常工作,第二状态则设置为允许MP3播放器完全可用。例如,变更实现装置可能是接地的印制电路板迹线。接地迹线可能连接在MP3处理器的管脚上,只要该管脚接地,MP3播放器就不能加电或初始化。当然还可以按照多种可选方式并通过更多变更实现装置结构来实现MP3播放器在各个工作状态间的切换。MP3播放器在生产时带有和变更实现装置相配的电源,以选择性地去掉接地电路。这种电源可以是电池、电磁转换器或射频转换器,或者从MP3播放器的工作电源获取电能。[0064] In the specific example of system 10, object 12 is represented as an MP3 player. During production of the MP3 target device, the restricted access key is stored in the MP3 player. In addition, the MP3 player is also equipped with a change implementation device, which is set in a state of limiting the utility of the MP3 player. More specifically, the first state of the change implementation device is set to be that the MP3 player cannot be powered on or cannot work normally, and the second state is set to allow the MP3 player to be fully usable. For example, the change-implementing device might be a grounded printed circuit board trace. The ground trace may be connected to a pin on the MP3 processor, and as long as that pin is grounded, the MP3 player cannot power up or initialize. Of course, it is also possible to switch between various working states of the MP3 player by implementing device structures in various optional ways and through more changes. The MP3 player is produced with a power supply that matches the implementation of the modification to selectively remove the ground circuit. This power source can be a battery, an electromagnetic converter or a radio frequency converter, or it can draw power from the operating power source of the MP3 player.

[0065]这样生成好MP3播放器并将MP3播放器作为受限产品准备销售,此时MP3播放器并不能正常加电或者发挥其效用。因此,效用受限的MP3播放器对于顾客来说几乎没有什么用处,也不太可能成为盗窃的对象。生产厂家还给MP3播放器一个可访问标识符号。例如,该标识符可以是条形码,或者是可以通过诸如红外之类的读取系统访问的存储数据。该标识符和其对应的密钥值由厂家掌握,以方便零售商或其他授权方在恢复MP3播放器效用时获取。效用受控的MP3播放器将大大降低在分销运输过程以及到达零售商的过程中失窃的风险。另外,零售商也可以在一个宽松的环境中展示商品,把MP3播放器呈现给顾客,而不必过于担心失窃的问题。这样,由于偷到这样无法使用的受限MP3播放器没有任何意义,因此零售时也可以减少诸如带锁柜台或者复杂包装之类的安全措施。Generate MP3 player like this and prepare to sell MP3 player as restricted product, now MP3 player can not normally power on or bring into play its effect. Thus, MP3 players of limited utility are of little use to customers and are less likely to be the subject of theft. The manufacturer also gives the MP3 player an Accessible Identifier. For example, this identifier could be a barcode, or stored data that can be accessed by a reading system such as infrared. The identifier and its corresponding key value are held by the manufacturer, so that retailers or other authorized parties can obtain it when restoring the utility of the MP3 player. A controlled-utility MP3 player would greatly reduce the risk of theft during distribution shipping and on the way to the retailer. In addition, retailers can also display products in a relaxed environment and present MP3 players to customers without worrying too much about theft. This way, security measures such as locked counters or complicated packaging can also be reduced at retail, since there is no point in stealing such an unusable restricted MP3 player.

[0066]当顾客决定购买MP3播放器时,顾客可以将MP3播放器带到销售点终端机14处,靠近激活装置16。当MP3播放器靠近激活装置时,其可访问ID就可以由激活装置16利用条形码值或者利用无线或EM(电磁)通信的方式获取所存储的可访问ID的方式读取出来。例如,这种通信可以是RF(射频)通信。销售点终端机可以和操作中心18进行网络连接,将此可访问ID发送给操作中心。存储有MP3播放器受限访问密钥相关标识的数据库的操作中心获取位于销售点装置的MP3播放器的授权密钥。在销售点终端机14处,可能还有额外的确认操作。例如,零售店的店员要从顾客处收款,或者需要核对顾客的身份证以及年龄。这些其他的确认标准完成后,才能确定销售点的终端机为恢复MP3播放器效用做好了准备。假设激活装置16认为可以恢复,它通常以无线通信的方式将授权密钥发送到MP3播放器。MP3播放器收到授权密钥后,利用自带逻辑比较该授权密钥和预存的受限访问密钥。如果两个密钥匹配,MP3播放器就利用它的激活电源打开接地线。接地线打开后,打开电源的MP3播放器对于顾客来说就具有了全部效用。[0066] When a customer decides to purchase an MP3 player, the customer may bring the MP3 player to the point of sale terminal 14, near the activation device 16. When the MP3 player is close to the activation device, its access ID can be read by the activation device 16 by using the barcode value or using wireless or EM (electromagnetic) communication to obtain the stored access ID. For example, such communication may be RF (Radio Frequency) communication. The point-of-sale terminal can be networked with the operation center 18, and sends the access ID to the operation center. An operations center storing a database of MP3 player restricted access key-associated identifications obtains the authorization key for the MP3 player located at the point-of-sale device. At the point of sale terminal 14, there may be an additional confirmation operation. For example, a clerk in a retail store wants to collect money from a customer, or needs to check a customer's ID and age. Completion of these other validation criteria will determine that the point-of-sale terminal is ready to restore MP3 player utility. Assuming the activation device 16 deems recovery possible, it typically communicates the authorization key wirelessly to the MP3 player. After the MP3 player receives the authorization key, it uses its own logic to compare the authorization key with the pre-stored restricted access key. If the two keys match, the MP3 player uses its active power to open the ground wire. With the ground wire open, the powered-on MP3 player has full utility to the customer.

[0067]在另一实例中,顾客可能从在线零售商处购买MP3播放器,并且MP3播放器通过货运或者邮递的方式寄给顾客。在这种情况下,可以用其他的替代方法恢复MP3播放器的效用。一种可选方法是,在线零售商的仓库或者运输部门配备有激活装置,作为货运过程的一部分,由零售商的员工来恢复MP3播放器效用。另外一种可选方法是货运时MP3播放器仍然是效用受控的,但是一起运送的还有激活装置,在交货前或者交货时恢复MP3播放器的效用。在这种方法下,送货司机可以在顾客收到MP3播放器的同时恢复其效用,因此可以避免整个货运过程中的失窃风险。还有一种可选方法是,顾客具有家用激活装置,并使用此激活装置来恢复MP3播放器的效用。在最后这种方法中,MP3播放器在从生产厂家到顾客位置的整个货运过程中效用都是受限的,直到完成商品交易,才由顾客来最终恢复MP3播放器的效用。[0067] In another example, a customer may purchase an MP3 player from an online retailer, and the MP3 player may be shipped or mailed to the customer. In such cases, other alternatives can be used to restore the utility of the MP3 player. In one option, the online retailer's warehouse or shipping department is equipped with an activation device, and the MP3 player is reactivated by the retailer's employees as part of the shipping process. Another option is to ship the MP3 player still utility controlled, but ship with an activation device that restores the MP3 player utility before or upon delivery. Under this method, the delivery driver can restore the utility of the MP3 player at the same time as the customer receives it, thus avoiding the risk of theft during the entire delivery process. Still another alternative is for the customer to have a home activation device and use this activation device to restore the utility of the MP3 player. In this last method, the utility of the MP3 player is limited throughout the shipment from the manufacturer to the customer's location, until the merchandise transaction is completed, and it is up to the customer to ultimately restore the utility of the MP3 player.

[0068]某些情况下,MP3播放器还需要有辅助电路来确认效用已经得到恢复。例如,可以测量变更实现装置的状态,或者进行其他测试或测量。根据是否成功激活,在确认存储器中设置不同的值。激活装置16可以读取确认存储器,以向顾客和网络操作中心确认激活成功。通过确认成功的激活,零售商可以具有较高的顾客满意度,而且也可以精确、及时地向MP3播放器的供货方报告和许可付款。[0068] In some cases, MP3 players also require auxiliary circuitry to confirm that utility has been restored. For example, the state of the change implementation device may be measured, or other tests or measurements may be performed. Depending on whether the activation was successful or not, different values are set in the confirmation memory. The activation device 16 can read the confirmation memory to confirm the successful activation to the customer and the network operation center. By confirming successful activation, the retailer can have a high level of customer satisfaction, but also can accurately and timely report and license payment to the supplier of the MP3 player.

[0069]参考图2,表示用于使用效用受控对象的方法。方法25表示顾客选择购买某效用受控对象,如方框26所示。顾客可以在传统的零售店购买,也可以在家通过在线订购系统或邮件订购。当顾客选择购买时,对象还没有效用或者只有部分效用,因此对小偷来说没有什么价值。这样,由于小偷得不到什么好处,失窃的风险将大大降低。不过在某些销售点,需要恢复对象效用。于是,如方框28所示,在由零售商设置的时间、位置或事件发生时,向对象发送授权密钥。例如,这可以在零售点的终端机上完成,也可以在顾客家里的远程激活装置上完成,或者在零售商选择的其他位置上进行。如方框32所示,由于对象有自带逻辑、变更实现装置及激活电源,因此可以确认授权密钥正确,然后打开变更实现装置以恢复对象效用。只要对象得到授权,变更实现装置就可以恢复其状态,使对象具有全部效用。也有另外一种情况是,效用恢复的级别取决于授权码的特定值。这样,对象具有多个授权密钥,各授权密钥对应不同的对象效用级别。根据接收到的不同授权密钥,对象恢复预定义的效用级别。在方法25中这样做的好处是,既可以最大程度地减少失窃,同时又可以较好地满足顾客需求。[0069] Referring to FIG. 2, a method for using utility managed objects is shown. Method 25 represents the customer choosing to purchase a utility controlled object, as indicated by block 26 . Customers can buy at a traditional retail store, or order from home through an online ordering system or by mail. When the customer chooses to buy, the object is not yet valid or only partially valid, and thus has little value to the thief. Like this, because the thief does not get any benefit, the risk of theft will be greatly reduced. At some point of sale, however, object utility needs to be restored. Then, as represented by block 28, the authorization key is sent to the object at the time, location or event set by the retailer. This can be done, for example, at a terminal at the point of sale, at a remotely activated unit at the customer's home, or at another location of the retailer's choice. As shown in block 32, since the object has its own logic, change enabler, and activation power, it is possible to verify that the authorization key is correct, and then open the change implement to restore object utility. Once the object is authorized, the change implementer can restore its state, making the object fully valid. There is also another case where the level of utility restoration depends on a specific value of the authorization code. Thus, an object has multiple authorization keys, each authorization key corresponding to a different level of object utility. Depending on the different authorization keys received, the object recovers a predefined utility level. The advantage of doing this in method 25 is that theft can be minimized and customer needs can be better satisfied at the same time.

[0070]方法35表示零售商接收受控对象,如方框37所示。这些对象可以是没有任何效用的电子装置、不能正常加电的电子器件、效用严重受限或只有演示效用的电子装置以及在播放装置上不能读取访问的诸如DVD、CD之类的光媒体等。这样,这些效用受控的对象对于小偷来说几乎没有价值,因此失窃的风险将大大降低。如方框39所示,在由零售商设置的时间、位置或事件发生时,零售商就可以恢复对象的全部效用。一经确认,对象就如方框41所示的那样恢复其效用。这样,零售商控制有效恢复装置效用的时间、地点及事件。在分销链中,运输效用受控对象的方式通常为船载、卡车运输或者其他运输方式。方法45表示了经销商和运输公司接收效用受控对象的过程。效用受控对象对小偷来说没有用处,因此失窃的风险要低得多。如方框48所示,经销商将对象运输到预定地点,完成交货。所以,从经销商或货运公司接到货物(方框47),直到到他们把货物转交给下一级机构(方框48),对象失窃的风险都明显降低了。[0070] Method 35 represents receipt of the controlled object by the retailer, as shown in block 37. These objects can be electronic devices without any utility, electronic devices that cannot be powered on normally, electronic devices with severely limited utility or only for demonstration purposes, and optical media such as DVDs and CDs that cannot be read and accessed on playback devices, etc. . In this way, these utility-controlled objects have little value to a thief, so the risk of theft will be greatly reduced. As shown in block 39, when the time, location or event set by the retailer occurs, the retailer can restore the full utility of the object. Once confirmed, the object resumes its utility as indicated by block 41 . In this way, the retailer controls when, where and when to effectively restore the utility of the device. In the distribution chain, the way of transporting utility-controlled objects is usually by ship, truck or other modes of transport. Method 45 represents the process of dealers and shipping companies receiving utility-controlled objects. Utility controlled objects are of no use to a thief, so the risk of theft is much lower. As indicated at block 48, the dealership transports the object to the predetermined location, completing the delivery. Therefore, the risk of object theft is significantly reduced from the moment the dealer or shipping company receives the goods (box 47) until they hand over the goods to the next level agency (box 48).

[0071]现在参考图3A,表示受控分销系统的对象。对象50一般带有外壳52,对象封在包装内。在一个实例中,对象50可以是电子产品,也可以是诸如光盘、DVD、游戏机、游戏卡带或者CD之类的有形介质。通常对象50出厂后就进入分销链,直到零售商接收到它为止。零售商通常向顾客展示并销售对象50。顾客购买对象50以得到某种特别有用的效用。例如,如果对象50是MP3播放器,顾客就希望通过扬声器或耳机播放MP3音乐文件。在另一个实例中,如果对象是电影光盘(DVD),顾客就希望能将DVD放入相应的播放器中播放并欣赏高质量的电影。然而,对象50有多种效用状态。这样,对象在分销链中有可能处在某种效用状态,然后,当顾客拿到对象时,对象有可能被设置在另一个状态下。在更具体的实例中,在分销或零售场所中对象50的效用几乎都不能用。然后,当移交给顾客时,将对象的效用全部恢复。这样,由于窃取对象不能得到任何好处,分销和零售场所中的失窃的风险就从根本上减少了。因此,对象50应与激活装置合用,这些装置和网络操作中心互相通信并且是整个分销控制系统的一部分。在2004年6月23日提交的10/874,642号,标题为“Method and Apparatus for Activating Optical media”的美国专利申请和2003年7月31提交的10/632,047号,标题为“Wireless ActivationSystem and Method”的美国专利申请专利中更详细全面地描述了激活光介质的过程和方法,这两篇专利申请全文引用于本文中,作为参考。[0072]对象50通过通信电路58接收授权密钥。通信电路58有可能是诸如射频或电磁接收器之类的无线通信电路。对象具有逻辑65,其配置成用来接收授权密钥并确定对象是否要改变其效用,怎样改变效用或者对效用做出怎样的变化。逻辑中可能包括逻辑结构和动态存储器或非易失性存储器。在一个实例中,逻辑65用对象密钥63来决定对象是否能转换到另一种级别的效用。在一个实例中,对象密钥63在生产的过程中以外部装置不可读的方式进行了存储。例如,对象密钥63在生产时可能存储在非易失的、不可擦除的、不可改变的存储器中。这个对象密钥可能与授权密钥具有相同的值,因此逻辑仅仅对限制访问对象密钥63和接收到的授权密钥进行比较,从而确定是否可改变对象的效用。应当理解的是,其他逻辑逻辑处理也可以用于做出这样的决定。假设逻辑65确定可以改变效用,逻辑就会要求变更实现装置67来改变状态。例如,变更实现装置可能是:电子开关、保险丝、电路条件断点、逻辑状态或定义在存储器中的一组值。在另一实例中,变更实现装置是诸如电致变色材料之类的电子可转换光学材料。应当理解,其他装置也可用做变更实现装置。[0071] Referring now to FIG. 3A, objects of the controlled distribution system are shown. The object 50 generally has a housing 52 in which the object is enclosed. In one example, object 50 may be an electronic product or a tangible medium such as an optical disc, DVD, game console, game cartridge, or CD. Usually the object 50 enters the distribution chain after leaving the factory until the retailer receives it. Retailers typically display and sell objects 50 to customers. Customers purchase objects 50 to obtain some particularly useful utility. For example, if object 50 is an MP3 player, the customer wishes to play MP3 music files through speakers or headphones. In another example, if the object is a movie disc (DVD), the customer wishes to put the DVD into a corresponding player to play and enjoy a high-quality movie. However, object 50 has multiple utility states. Thus, an object may be in one utility state in the distribution chain, and then, when the customer picks up the object, it may be set in another state. In a more specific instance, the utility of object 50 is nearly nonexistent in a distribution or retail location. Then, when handing over to the customer, the utility of the object is fully restored. In this way, the risk of theft in distribution and retail establishments is substantially reduced since no benefit is gained from stealing the object. Therefore, the object 50 should be used with activation devices that communicate with the network operations center and are part of the overall distribution control system. U.S. Patent Application Serial No. 10/874,642, filed June 23, 2004, titled "Method and Apparatus for Activating Optical media," and Serial No. 10/632,047, filed July 31, 2003, titled "Wireless Activation System and Method" The process and method of activating optical media is described more fully in more detail in US Patent Application Patents of , both of which are incorporated herein by reference in their entirety. [0072] The subject 50 receives the authorization key via the communication circuit 58. The communication circuit 58 is possibly a wireless communication circuit such as a radio frequency or electromagnetic receiver. The object has logic 65 configured to receive the authorization key and determine if, how, or what changes to the utility are to be changed by the object. Logic may include logic structures and dynamic or non-volatile memory. In one example, logic 65 uses object key 63 to determine whether the object can be converted to another level of utility. In one example, the object key 63 is stored during production in a manner that is not readable by external devices. For example, the object key 63 may be stored in non-volatile, non-erasable, non-alterable memory at the time of production. This object key may have the same value as the authorization key, so the logic simply compares the restricted access object key 63 with the received authorization key to determine if the object's utility can be changed. It should be understood that other logical processes may also be used to make such determinations. Assuming logic 65 determines that utility can be changed, the logic will ask change implementer 67 to change the state. For example, a change-implementing device could be: an electronic switch, a fuse, a circuit condition break, a logic state, or a set of values defined in memory. In another example, the alteration enabling device is an electronically switchable optical material such as an electrochromic material. It should be understood that other means may also be used as the change-implementing means.

[0073]变更实现装置可以在激活电源61的辅助下改变状态,或者用逻辑进程设置或改变存储器所存储的值。例如,激活电源61有可能是给逻辑65、通信进程58和变更实现装置67供电的独立电池。在另一个实例中,激活电源61也可能是把接收到的射频或电磁能量转化为可用电能的转换器。并且,激活电源可以全部或部分从对象外部资源获取。应当理解,可能还需要的其他电子元件来实现如转换器这样的装置。在另一个实例中,工作电源73可以给整个装置提供激活电源。应当理解,不是所有对象都需要工作电源。例如,当对象处于分销链中时,如果整个装置是MP3播放器,并且MP3播放器有可操作性的可充电电池,那么可充电电池具有的初始电量足以向激活电路供电。在另一个实例中,激活电源61也可以由多个电源提供。例如,小容量电池可以给变更实现装置供电,而RF或EM转换器装置可以向逻辑和通信装置58供电。应当理解的是,可以采用多种可选方式向对象50中的电路供电。[0073] The change implementing means may change state with the aid of activating the power source 61, or set or change a value stored in memory with a logic process. For example, activation power source 61 may be a separate battery that powers logic 65 , communication process 58 and change implementation device 67 . In another example, the activation power source 61 may also be a converter that converts received radio frequency or electromagnetic energy into usable electrical energy. Also, the activation power can be obtained in whole or in part from external resources of the object. It should be understood that other electronic components may also be required to implement a device such as a converter. In another example, the working power supply 73 can provide activation power to the entire device. It should be understood that not all objects require operating power. For example, if the entire device is an MP3 player, and the MP3 player has an operable rechargeable battery, the rechargeable battery has an initial charge sufficient to power the activation circuit when the object is in the distribution chain. In another example, the activation power 61 can also be provided by multiple power sources. For example, a small capacity battery may power the change implementation means, while an RF or EM converter means may power the logic and communication means 58 . It should be understood that there are a number of alternative ways to power the circuitry in object 50 .

[0074]在一个实例中,对象50是具有向装置的效用供电的工作电源73的电子装置。效用模块74直接影响效用装置。例如,效用模块有可能是供电装置、处理器、发动机、显示器、可执行代码、存储器、放大器、打印头或者灯等。应当理解的是,可以使用各种类型的效用电路及效用模块。对象50具有一种操作状态,在此状态下效用模块74使用工作电源。而效用模块74连接到变更实现装置67以决定效用可达到的水平。例如,在某种状态下效用装置不允许供电装置或发动机工作,因此使对象50不具有任何有意义的操作。再如,变更实现装置有可能引起效用装置在效用减少或示例模式下操作对象50。这样在零售店允许装置在有限性能下操作,然后在晚些时候恢复它的全部效用,这样顾客就可以使用对象的全部功能。可以理解的是,对象50可以有一个或多个隔离电路来把工作电源73与变更实现装置67及其相关逻辑和通信电路隔离起来。当应用工作电源时,这种隔离可以保护变更实现装置和逻辑不受破坏,相反地,当向变更实现装置施加电源以引起其改变状态时,这种隔离会保护变更实现装置和逻辑不受破坏。也可以采用多种其他隔离程序和电路。[0074] In one example, the object 50 is an electronic device having an operating power source 73 to power the utility of the device. The utility module 74 directly affects the utility devices. For example, a utility module may be a power supply, processor, motor, display, executable code, memory, amplifier, print head, or lamp. It should be understood that various types of utility circuits and utility modules may be used. Object 50 has an operational state in which utility module 74 uses operating power. And the utility module 74 is connected to the change realization device 67 to determine the level of utility achievable. For example, the utility device does not allow the power supply or the motor to operate under certain conditions, thus disabling the object 50 from any meaningful operation. As another example, altering the implementing means may cause the utility means to operate the object 50 in a reduced-utility or instantiation mode. This allows the device to operate with limited capabilities at a retail store and then restore its full utility at a later date so that the customer can use the full functionality of the object. It will be appreciated that object 50 may have one or more isolation circuits to isolate operating power source 73 from change implementation device 67 and its associated logic and communication circuits. This isolation protects the change implementation and logic from damage when operating power is applied, and conversely protects the change implementation and logic from damage when power is applied to the change implementation to cause it to change state . Various other isolation procedures and circuits may also be employed.

[0075]在更复杂的分销模式中,对象50有一个可访问对象ID 56。对象ID 56可能是条形码值或者RFID值。在激活装置的要求下,对象50用通信电路54传送其对象ID。通信电路54可以是简单的RFID通信电路,用于将RFID值传送到激活终端。然后,激活终端根据对象ID获取或产生一个授权密钥。这个密钥被传送到通信装置58,以便逻辑65用它和存储的受限访问目标密钥进行对比。利用对象ID,具体的单个对象或者一大类对象都可以与授权密钥相关联。图3A表示了功能模块关系,并且对应的电路实现可以进一步地分离某些功能,并结合其他某些功能。例如,可操作对象电路可采用单个RF接收装置来作为接收通信功能块58和传送通信功能块54。[0075] In a more complex distribution schema, an object 50 has an accessible object ID 56. Object ID 56 may be a barcode value or an RFID value. At the request of the activation device, the object 50 transmits its object ID using the communication circuit 54 . The communication circuit 54 may be a simple RFID communication circuit for communicating the RFID value to the activated terminal. Then, the activation terminal obtains or generates an authorization key according to the object ID. This key is communicated to the communication means 58 for comparison by the logic 65 with the stored restricted access target key. Using the object ID, a specific single object or a large class of objects can be associated with an authorization key. Figure 3A shows the functional module relationship, and the corresponding circuit implementation can further separate some functions and combine some other functions. For example, the operable circuit may employ a single RF receiving device as the receiving communication functional block 58 and the transmitting communication functional block 54 .

[0076]现在参考图3B,表示对象50的可选构造。在这种构造下,对象50被用来提供确认其效用被有效控制的信息。据此,对象50具有确认电路或存储器59,用于根据对象50的实际或适当效用状态而改变状态。在某些情况下,要检测效用的实际状态或者变更实现装置的实际状态。在其他情况下,不便于测量和检测实际状态,因此替代地检测变化过程中的某些方面。在这种情况下,确认变化过程成功就意味着极有可能成功地改变了对象的效用。因此,确认电路59会直接检测变更实现装置67的状态,或者测量用于引起变化的电子进程。例如,确认电路59会检测通过保险丝的电流,依此确认足够电量通过并熔断保险丝。尽管不是直接检测状态,但是保险丝状态的改变极有可能导致对象效用状态的改变。在另一实例中,确认电路59可能连接于逻辑65,并且确认逻辑正确地进行了激活。在另一实例中,确认电路59也可能直接连接到效用模块或效用装置本身,从而确认激活是否发生。一旦确认电路59收到实现对象效用中预期的改变所需的模块已经改变的信息,则该确认信号就会通过发送器传送给激活装置或依激活装置的要求被读取。图3B中的对象通过反馈信息到激活装置和分销控制系统来确认效用已被改变。这个信息然后用于生成给分销链中当事人的报告或者两笔初始付款。[0076] Referring now to FIG. 3B, an alternative configuration of object 50 is shown. In this configuration, the object 50 is used to provide information confirming that its utility is effectively controlled. Accordingly, the object 50 has validation circuitry or memory 59 for changing state according to the actual or proper utility state of the object 50 . In some cases, it is necessary to detect the actual state of the utility or change the actual state of the implementing device. In other cases, it is not convenient to measure and detect the actual state, so some aspects of the changing process are detected instead. In this case, confirming that the change process was successful means that there is a high probability that the utility of the object was successfully changed. Therefore, validation circuit 59 either directly detects the state of change implementer 67, or measures the electronic progress used to cause the change. For example, the confirming circuit 59 will detect the current passing through the fuse, so as to confirm that enough power passes through and blow the fuse. Although not directly detecting the state, a change in the state of the fuse has a high probability of causing a change in the utility state of the object. In another example, validation circuit 59 may be connected to logic 65 and the validation logic is correctly activated. In another example, the confirmation circuit 59 may also be directly connected to the utility module or the utility device itself to confirm whether activation has occurred. Once the acknowledgment circuit 59 receives information that the modules required to achieve the desired change in object utility have changed, the acknowledgment signal is transmitted to the activation device via a transmitter or read on request by the activation device. The object in Figure 3B confirms that the utility has been changed by feeding back information to the activation device and distribution control system. This information is then used to generate reports or two initial payments to parties in the distribution chain.

[0077]参考图4A,表示控制电子装置分销的方法。在方法100中,对象处在非操作状态,例如,它的主电源是关闭的。在制造对象时就限制其效用,导致对象只能在第一效用级别下操作,如方框102所示。例如,对象的第一效用被高度限制以至于对象对顾客没有实用价值。这样,顾客或分销链中的其他人就不会窃取此装置。当被分销链中的零售商或其他授权人选中时,该对象会获取授权密钥,如方框104所示。通常,尽管有其他地址或进程可用,但授权密钥是通过无线通信方式被零售终端机接收。电子产品通过自带逻辑和激活电源来确定是否被授权改变第一效用级别,如方框106所示。假如收到正确的授权密钥,电子产品用其激活电源和逻辑,以将变更实现装置从第一状态转换到第二状态,如方框108所示。随后,例如,在顾客将电子产品买回家时,顾客插入或打开电子产品的电源,如方框111所示。这时变更实现装置处在第二状态,对象也会在第二可用效用状态下操作,如方框113所示。例如,第二效用可以是完全操作效用。[0077] Referring to FIG. 4A, a method of controlling distribution of electronic devices is shown. In method 100, the object is in a non-operational state, eg, its main power source is off. The utility of the object is limited when it is manufactured, causing the object to operate only at the first utility level, as indicated at block 102 . For example, the primary utility of an object is highly limited such that the object has no practical value to customers. This way, the device cannot be stolen by the customer or others in the distribution chain. When selected by a retailer or other authorized person in the distribution chain, the object obtains an authorization key, as shown in block 104 . Typically, the authorization key is received by the retail terminal via wireless communication, although other addresses or processes are available. The electronic product determines whether it is authorized to change the first utility level through its own logic and activation power, as shown in block 106 . Provided the correct authorization key is received, the electronic product uses it to activate power and logic to transition the change implementing device from the first state to the second state, as shown at block 108 . Subsequently, for example, when the customer brings the electronic product home, the customer plugs in or turns on the power of the electronic product, as shown in block 111 . The change implementation means is now in the second state, and the object is also operating in the second available utility state, as shown in block 113 . For example, the second utility can be a full operational utility.

[0078]在另一实例中,第一效用是演示效用而第二效用是完全工作效用。但是,如果是有年龄限制的产品,第一效用也可能是完全工作效用而第二效用是限制效用。这样,零售商会根据顾客的年龄相应地禁止电子产品的某些性能。有时顾客可能依据一些需要的性能来购买产品。可完全操作产品和激活装置放在一起并且限制不需要的性能。这样,就可以在零售环境中的销售终端或服务区完成电子产品的灵活配置。尽管电子产品在交给顾客时改变其效用,但是电子产品的效用可以在其他时间也可以改变。例如,厂商在发货前会用变更实现装置来具体配置电子产品。这样就会生产出标准版本的电子产品并且用一个或多个变更实现装置选择性地增加或去除其效用。应当理解,这种动态配置过程可在其他时间由如零售店的服务人员执行。类似地,厂商也可在多重变更实现装置中放置例如光盘之类的光媒体,每个变更实现装置都被用来改变媒体的效用。于是,在生产或分销过程中,介质的效用可能被改变。这样,就会生产出一个标准版本的媒体或媒体内容,并用一个或多个变更实现装置选择性地增加或去除其效用。应当理解,这种动态配置过程可在其他时间由如零售端的服务人员执行。[0078] In another example, the first utility is a demo utility and the second utility is a fully working utility. However, in the case of an age-restricted product, it is also possible that the first utility is a full working utility and the second utility is a limited utility. In this way, retailers will prohibit certain features of electronic products according to the age of customers. Sometimes customers may purchase products based on some desired properties. Fully operable products and activation devices are kept together and undesired performance is limited. In this way, flexible configuration of electronic products can be accomplished at the point of sale or service area in a retail environment. Although the utility of an electronic product changes when it is delivered to a customer, the utility of an electronic product may change at other times as well. For example, a manufacturer may use a change implementation device to specifically configure an electronic product prior to shipment. This produces a standard version of the electronic product and selectively adds or removes its utility with one or more modification implementations. It should be understood that this dynamic configuration process may be performed at other times, such as by service personnel at a retail store. Similarly, a manufacturer may also place optical media, such as compact discs, in multiple change implementations, each of which is used to alter the utility of the medium. Thus, the utility of the medium may be altered during production or distribution. In this way, a standard version of the media or media content is produced, with one or more alteration enabling means selectively adding or removing its utility. It should be understood that this dynamic configuration process can be performed by service personnel such as retail outlets at other times.

[0079]参考图4B,表示利用电子装置对象的过程。如方框116所示,方法115中具有处在非操作状态下的电子产品。例如,没有插入电源或者电源开关处在关闭状态的电子产品。如方框117所示,电子产品可能处在操作状态。例如,给电子产品插入电源或者打开其电源开关。然后,电子产品的可用效用级别会随着变更实现装置的状态而改变。例如,如果变更实现装置处在如方框119所示的第一状态,电子产品就可在如方框121所示的第一效用级别下运行。如果变更实现装置处在如方框118所示的第二状态,电子产品就会在如方框120所示的第二效用级别下运行。如方法115所述,电子产品的效用级别往往取决于变更实现装置的状态。因此,变更实现装置会使电子产品总是在获取正确的授权密钥后才能使用。如果从未收到授权密钥,那么电子产品一直处在第一效用状态。在具体实例中,如果第一效用级别被高度限制,那么电子产品对顾客来说就没有实际效用。这样失窃的风险就会大大降低,因为窃取处在第一状态的电子产品不能获取任何利益。[0079] Referring to FIG. 4B, the process of utilizing an electronic device object is shown. As represented by block 116, method 115 has the electronic product in a non-operational state. For example, electronic products that are not plugged in or whose power switch is turned off. As indicated by block 117, the electronic product may be in an operational state. For example, plugging in an electronic product or turning on its power switch. The available utility level of the electronic product is then changed as the state of the change-implementing device is changed. For example, if the change implementing means is in a first state as shown in block 119 , the electronic product may operate at a first utility level as shown in block 121 . If the change implementing means is in the second state as indicated by block 118 , the electronic product operates at a second utility level as indicated by block 120 . As described in method 115, the utility level of an electronic product often depends on the state of the change-implementing device. Therefore, changing the implementation means will make the electronic product always use only after obtaining the correct authorization key. If the authorization key is never received, the electronic product remains in the first utility state. In a specific example, if the first utility level is highly restricted, then the electronic product has no real utility to the customer. The risk of theft will be greatly reduced like this, because stealing the electronic product in the first state can not obtain any profit.

[0080]参考图4C,表示用于控制电子装置目标分销的具体方法。方法125中的电子产品有操作和非操作两种状态。通常,非操作状态下电源是关断的而操作状态下电源是正常打开的。如方框126所示,在生产电子产品时控制其效用并且将其设置在第一效用级别。电子产品在分销链中流通,直到分销链中的某个机构认为可以改变其效用为止。例如,在销售终端零售商把电子产品移交给顾客时,或者由分销商增加或移除其具体效用元件而完成。因为电子产品最初被设置在第一效用级别,所以如果处在操作状态,电子元件只能具备其第一效用级别。例如,如果电子产品的效用被完全限制,电子产品就不能通电或者所有效用都被禁用。[0080] Referring to FIG. 4C, a specific method for controlling targeted distribution of electronic devices is shown. The electronic product in method 125 has two states of operation and non-operation. Usually, the power is turned off in the non-operation state and the power is normally turned on in the operation state. As represented by block 126, the utility of the electronic product is controlled and set at a first utility level as it is produced. Electronic products circulate through the distribution chain until some agency in the distribution chain deems it possible to change their utility. For example, when the electronic product is handed over to the customer by the point-of-sale retailer, or by the addition or removal of its specific utility components by the distributor. Because the electronic product is initially set at the first utility level, the electronic component can only have its first utility level if in an operational state. For example, if the utility of an electronic product is completely limited, the electronic product cannot be powered on or all utility is disabled.

[0081]当电子产品处在非操作状态并需要转换到第二效用状态时,须将其移至临近激活装置的位置。激活装置可能是销售点的激活终端或者是位于其他位置的装置。如方框127所示,电子装置接收到对可访问ID的询问。可访问ID是可无线读取的存储器的值或者用来扫描的条形码。如方框129所示,可访问ID被传送回激活装置。如方框131所示,激活终端通过和其他本地或远程系统合作来许可改变对象的效用。例如,激活终端会确认信用卡付款、密码、组织中的会员身份、激活终端的授权或者顾客的年龄等。如方框133所示,假设许可改变对象效用,那么激活终端将授权密钥传送给对象。通常授权密钥用如射频通信之类的电磁方式进行无线接收。依然处在非操作状态下的对象获取存储在对象中的受限访问密钥。受限访问密钥存储在不可改变的非易失存储器中,不能被外部装置读取。受限访问密钥通常在生产过程中被存储于对象中,被储存的还有授权密钥的拷贝以及相关的ID,用于被激活装置获取。因此,如方框136和138所示,对象自带逻辑获取或利用限制访问密钥并将其和授权密钥进行比较。如方框140所示,如果密钥一致,则对象确定其效用应被改变。然后如方框142所示,逻辑和变更实现装置一起将变更实现装置改变至第二状态。变更实现装置和被用来引导电子产品特殊效用的效用模块关联。因此,如方框144所示,当电子产品处在工作状态时,应依照如方框146所示的第二效用工作。[0081] When the electronic product is in a non-operating state and needs to be converted to a second utility state, it must be moved to a position adjacent to the activation device. The activation device may be an activation terminal at a point of sale or a device located elsewhere. As represented by block 127, the electronic device receives a query for an accessible ID. An Accessibility ID is a wirelessly readable memory value or a barcode to scan. As indicated at block 129, the accessibility ID is communicated back to the activation device. As shown in block 131, the activation terminal cooperates with other local or remote systems to permit changes to the object's utility. For example, the activation terminal will confirm credit card payment, password, membership in the organization, authorization to activate the terminal, or the customer's age. As shown in block 133, assuming permission to change the utility of the object, the activation terminal transmits the authorization key to the object. Typically the authorization key is received wirelessly by electromagnetic means such as radio frequency communication. Objects that are still in a non-operational state acquire a restricted-access key stored in the object. The restricted access key is stored in immutable non-volatile memory and cannot be read by external devices. The restricted access key is usually stored in the object during production, along with a copy of the authorization key and the associated ID for retrieval by the activated device. Accordingly, as indicated by blocks 136 and 138, the object's own logic obtains or utilizes the restricted access key and compares it to the authorization key. As indicated at block 140, if the keys agree, the object determines that its utility should be changed. The logic then works with the change implementer to change the change implementer to the second state, as represented by block 142 . The change implementing means is associated with a utility module that is used to direct a specific utility of the electronic product. Therefore, as shown in block 144 , when the electronic product is in the working state, it should work according to the second utility shown in block 146 .

[0082]参考图5,表示是分销控制系统的另一对象。对象150类似于图3A中描述的对象50,因此不再详细描述。和对象50一样,对象150具有从外部激活装置获取授权密钥的通信电路158。通信模块158和逻辑165以及变更实现装置163一起工作,使变更实现装置在第一状态和第二状态之间改变。依据此状态改变,效用模块171为对象150提供不同的效用级别。对象需要激活电源159为通信、逻辑和变更实现装置供电,而工作电源173为对象的主操作电路和装置供电。对象150也有受限访问对象密钥161和可访问对象ID 156。通信电路154被用来将对象ID值156送至激活装置。外壳152中存储有对象150的主要元件。在一个实例中,外壳152是一个箱子或者盒子。由于外壳152或者对象的其他方面会限制外壳152中其他元件的无线通信,对象150的某些电路和逻辑存放在主要对象外壳152的外设151中。如图5中例子所示,外设151具有激活电源(可能是一个电池或者RF/EM能量转换器)、通信电路158、通信电路154和可访问ID 156。然而,在常规构造中,外设和RF电源转换电路被局限在天线或天线维持电路中,并且对象的ID存储在对象外壳152中。这样,需要不受任何干扰地进行无线通信的电路处于对象外部。其他改变对象效用的电路处于对象外壳152内。可以理解的是,也可以将其他电路从外壳内移至外设151。例如,在某些情况下,对象密钥和逻辑可以移至外设。如果激活电源159中有电池,电池可以放置在外壳152内或者外设151上。[0082] Referring to FIG. 5, the representation is another object of the distribution control system. Object 150 is similar to object 50 depicted in FIG. 3A and therefore will not be described in detail. Like object 50, object 150 has a communication circuit 158 for obtaining an authorization key from an external activation device. The communication module 158 works with the logic 165 and the change implementer 163 to cause the change implementer to change between the first state and the second state. Depending on this state change, the utility module 171 provides different utility levels for the object 150 . The subject requires an active power supply 159 to power the communication, logic, and change implementation devices, while an operating power supply 173 powers the subject's main operating circuits and devices. Object 150 also has a restricted-access object key 161 and an accessible object ID 156. The communication circuit 154 is used to send the object ID value 156 to the activation device. The main elements of the object 150 are stored in the shell 152 . In one example, housing 152 is a case or box. Since the housing 152 or other aspects of the object may restrict wireless communication to other components within the housing 152, some circuitry and logic of the object 150 resides in the peripherals 151 of the main object housing 152. As shown in the example in FIG. 5 , peripheral device 151 has an active power source (perhaps a battery or RF/EM power converter), communication circuit 158, communication circuit 154, and accessibility ID 156. However, in conventional configurations, the peripherals and RF power conversion circuitry are confined to the antenna or antenna maintenance circuitry, and the object's ID is stored in the object housing 152 . In this way, the circuits required for wireless communication without any interference are outside the object. Other circuitry that alters the utility of the object is within the object enclosure 152 . It is understood that other circuits may also be moved from the housing to the peripheral 151 . For example, object keys and logic can be moved to peripherals in some cases. If there is a battery in the activation power supply 159 , the battery can be placed inside the housing 152 or on the peripheral device 151 .

[0083]外设151可以安装或附在对象外壳152中,或者远离对象放置并通过电路连结至对象外壳152。另外,外设151可以通过对象外壳152的连接器166连结至对象外壳152。在另一个实例中,外设可以通过对象外壳152的电源输入端口暂时安装在外壳上。在这种情况下,当外设152和外壳152的电源插头接通时,对象150会被激活;在激活终端处理后将电源插头从外设151中拔出,同时将插头插入电源插座使电子产品处于工作状态。也可以使用其他可用的连接器。例如,可采用已有的音频、视频或者数据连接器。但是,当使用标准连接器166时,可能需要提供一个隔离电路167来保护对象电路169不受外设151的损坏。在对象效用将要被改变时,隔离电路166用来将接收到的授权密钥传给逻辑165,并且,当对象处在工作模式时,将连接器中的信号传送给其常规对象电路169。例如,如果连接器166是音频连接器,那么,当使用对象时,连接器中的信号就被传送至音频对象电路169。隔离电路设计和结构均为公知技术,这样就不用再详细讨论。通过构建对象外部的激活电路部分,与激活装置维持了更多鲁棒性的通信,当从可用RF或EM源转换能量时,也维持了更有效的RF或EM能量转化。[0083] Peripheral device 151 may be mounted or attached in subject housing 152, or located remotely from the subject and coupled to subject housing 152 by circuitry. In addition, the peripheral device 151 may be coupled to the object housing 152 through the connector 166 of the object housing 152 . In another example, peripherals may be temporarily mounted on the subject housing 152 through the power input port of the subject housing. In this case, when the power plugs of the peripheral 152 and the housing 152 are connected, the object 150 will be activated; after activating the terminal process, the power plug is pulled out from the peripheral 151, and the plug is inserted into the power socket at the same time to make the electronic Product is in working condition. Other available connectors can also be used. For example, existing audio, video or data connectors may be used. However, when standard connector 166 is used, it may be desirable to provide an isolation circuit 167 to protect subject circuit 169 from damage by peripheral device 151 . Isolation circuit 166 is used to pass the received authorization key to logic 165 when the object's utility is to be changed, and to pass the signal in the connector to its regular object circuit 169 when the object is in active mode. For example, if connector 166 is an audio connector, then the signal in the connector is passed to audio object circuit 169 when the object is used. The design and construction of the isolation circuit are well known and thus need not be discussed in detail. By building the activation circuit part external to the object, more robust communication with the activation device is maintained, as well as more efficient RF or EM energy conversion when converting energy from an available RF or EM source.

[0084]参考图6A,表示电子装置对象200。电子装置202的效用在生产时被限制。这样在分销链中流通时,电子产品202对潜在的小偷几乎没有任何价值。因此,从根本上降低了被窃取的风险。如方框224所示,电子产品202通过逻辑电路、电源电路、存储于存储器中的值或者处理器的操作来激活其效用模块。当如方框222所示,电连接接地时,特定效用模块就没有任何效用。当加载工作电源226时,例如当对象的电源开关被激活时,开关219关闭,这样当印刷版电路迹线217接地短路时,将重启管脚接地。这样,尽管效用模块224被加载了工作电源,但是电子产品的处理器和逻辑电路一直处在重启状态,因此电子产品就没有任何效用。因此,当变更实现装置处在第一状态时,任何时候打开电子产品202,它的主要功用都被限制。[0084] Referring to FIG. 6A, an electronic device object 200 is shown. The utility of the electronic device 202 is limited at the time of manufacture. While thus circulating through the distribution chain, the electronic product 202 has little or no value to a potential thief. Therefore, the risk of being stolen is substantially reduced. As represented by block 224, the electronic product 202 activates its utility modules through logic circuits, power circuits, values stored in memory, or operation of a processor. When the electrical connection is grounded, as indicated by block 222, the particular utility module has no utility. When operating power 226 is applied, such as when the object's power switch is activated, switch 219 closes, thus grounding the reset pin when printed circuit trace 217 is shorted to ground. In this way, although the utility module 224 is loaded with working power, the processor and the logic circuit of the electronic product are always in the restart state, so the electronic product has no utility. Therefore, when the change implementing device is in the first state, whenever the electronic product 202 is turned on, its main function is restricted.

[0085]当顾客在零售商店购买此电子产品时,电子产品202就会接近激活装置。激活装置要求提供ID值,RF发送器204就把其ID值206传送给激活装置。虽然解释了RF通信,但是还可以使用其他可用的无线通信方式。激活装置可以和远程服务器、网络操作中心、店员和顾客一起确定授权恢复对象202的效用。假如激活终端获得正确授权,各权益方也确认该电子产品可恢复效用,激活装置就会发送授权密钥到RF接收器208。RF接收器208将收到的授权密钥传送给逻辑215,逻辑215比较授权密钥和受限访问密钥213。在生产过程中受限访问密钥213被存储在电子产品中。如果所存储的受限访问密钥213和授权密钥匹配,逻辑就会接通PCB电路。当电子产品不在工作状态,电源211用来向发送器204、接收器208、逻辑215和变更实现装置217供电。该电源可能是电池、RF/EM能量转换器或者连在工作电源226。例如,RF接收器208充当RF/EM电源转换器211的接收器。也可以使用其他类型的电源。[0085] When a customer purchases the electronic product at a retail store, the electronic product 202 is in proximity to the activation device. The activation device requires an ID value, and the RF transmitter 204 transmits its ID value 206 to the activation device. While RF communication is explained, other available wireless communication means can also be used. The activation device may work with remote servers, network operations centers, store personnel, and customers to determine the validity of the authorization recovery object 202 . If the activation terminal is properly authorized and the interested parties confirm that the electronic product can be restored, the activation device will send the authorization key to the RF receiver 208 . RF receiver 208 transmits the received authorization key to logic 215 , which compares the authorization key with restricted access key 213 . The restricted access key 213 is stored in the electronic product during production. If the stored restricted access key 213 and the authorization key match, the logic turns on the PCB circuit. When the electronic product is not working, the power supply 211 is used to supply power to the transmitter 204 , the receiver 208 , the logic 215 and the change implementing device 217 . The power source may be a battery, an RF/EM power converter or connected to the operating power source 226 . For example, RF receiver 208 acts as a receiver for RF/EM power converter 211 . Other types of power supplies can also be used.

[0086]一旦PCB迹线217打开,每次加载工作电源226时,开关219就会关闭。这样,重启管脚的电压就可达到流通并不被从地上拔出。因此逻辑就不会重启。打开电源或初始化逻辑和效用后电子产品就会正常运行,达到全部效用。还可采用多个授权密钥和多个变更实现装置。这样,可有选择的开启几种效用状态。[0086] Once the PCB trace 217 is open, the switch 219 is closed each time the operating power 226 is applied. In this way, the voltage on the reset pin can flow through and not be pulled from ground. So the logic doesn't restart. Once powered on or initialized logic and utility, the electronics will operate normally and achieve full utility. Multiple authorization keys and multiple change enablers may also be employed. In this way, several utility states can be selectively opened.

[0087]参考图6B,表示计算机处理器对象250。例如,处理器252可能是微处理器、门阵列装置、DSP或者其他处理器电路。尽管是以处理器进行说明的,但是也可用其他可用的逻辑和存储装置。生产处理器252时带有一个受限访问密钥261。受限访问密钥存储在数据库中并与处理器ID值256相关联。处理器252的变更实现装置以逻辑值265形式存在。逻辑值不能从外部读取,并且以非易失的和不可破坏的形式存储。当逻辑值设置在第一状态时,设置逻辑值使处理器的引导电路274引起引导失败。在另一实例中,初始设置值只能使处理器进入受限模式,因此只能进行简单操作而不能达到全部效用。通常,工作电源227将从外部电源接收电力的管脚或电路。激活电路受工作电源保护,并且通过隔离晶体管268将与激活电路与工作电路相隔离。例如,如果工作晶体管268进行适当的偏置并连接到工作电源277,以便当施加工作电源时引导电路274读取逻辑值。这样,处理器252每次加电时都会检查应提供什么样效用级别。[0087] Referring to FIG. 6B, a computer processor object 250 is shown. For example, processor 252 may be a microprocessor, gate array device, DSP, or other processor circuitry. Although illustrated in terms of a processor, other available logic and storage devices may also be used. Processor 252 is produced with a restricted access key 261 . The limited access key is stored in the database and associated with the processor ID value 256. Alternative implementations of the processor 252 exist in the form of logical values 265 . Logical values cannot be read externally and are stored in a non-volatile and indestructible form. When the logic value is set in the first state, setting the logic value causes the boot circuit 274 of the processor to cause a boot failure. In another example, the initial setting value can only put the processor into a limited mode, so that only simple operations can be performed but not full utility. Typically, the operating power supply 227 will be a pin or circuit that receives power from an external power source. The active circuit is protected by the operating power supply and is isolated from the active circuit by the isolation transistor 268 . For example, if operating transistor 268 is properly biased and connected to operating power supply 277 so that circuit 274 is directed to read a logic value when operating power is applied. In this way, the processor 252 checks what level of utility should be provided each time it is powered up.

[0088]处理器252可以作为分立部件或作为较大装置(例如计算机系统、照相机或者MP3播放器)的一个元件等销售。在一些情况下,将无线通信和电路安装在处理器装置外部是有用的。处理器或者具有处理器的整体装置需要被激活时,处理器用RF发送器254将处理器ID 256发送到激活装置。激活装置生成或获取与受限访问密钥261相同的授权密钥。RF接收器257接收授权密钥并和逻辑263一起将一个新的逻辑值输入逻辑值区域265。诸如RF/EM能量转换器259之类的电源被用来给激活电路加电并且帮助设置新的逻辑值。一旦处理器在逻辑值区域265设置一个新逻辑值,加电后处理器都以新逻辑值设置的效用级别工作。处理器在新的逻辑级别下通常具有全部效用。在这种模式下也可以有不同效用级别。还可根据收到的授权密钥从处理器增加或去除效用。这样,可以存储多个受限访问代码261,每个代码都与处理器不同级别的效用相关联。尽管举例说明了处理器252和RF发送器254、RF接收器257,以及整合在处理器中的电源259,但还可以把所有或部分构造安装在处理器外壳的外部。例如,发送器254、接收器257和电源259可以放置在处理器外壳外部或者处理器的包装内。另外,如果处理器252被集成到更大的装置中,一些结构可放在处理器外部的例如印刷版电路上。应当理解,可根据具体应用要求选择性地放置所示例的结构。[0088] Processor 252 may be sold as a discrete component or as an element of a larger device such as a computer system, camera, or MP3 player, and the like. In some cases it may be useful to mount the wireless communications and circuitry external to the processor device. When a processor or an entire device having a processor needs to be activated, the processor uses the RF transmitter 254 to send the processor ID 256 to the activation device. The activation means generates or obtains the same authorization key as the restricted access key 261 . RF receiver 257 receives the authorization key and together with logic 263 enters a new logic value into logic value field 265 . A power source such as RF/EM power converter 259 is used to power up the activation circuit and help set the new logic value. Once the processor sets a new logical value in the logical value field 265, the processor operates at the utility level set by the new logical value after power-up. Processors generally have full utility at the new logic level. Different utility levels are also possible in this mode. Utilities may also be added or removed from the processor based on received authorization keys. In this manner, multiple restricted access codes 261 may be stored, each associated with a different level of utility of the processor. Although processor 252 is illustrated with RF transmitter 254, RF receiver 257, and power supply 259 integrated in the processor, it is also possible to mount all or part of the configuration on the exterior of the processor housing. For example, transmitter 254, receiver 257, and power supply 259 may be placed outside of the processor housing or within the processor's packaging. Additionally, if the processor 252 is integrated into a larger device, some structure may be placed external to the processor, eg on a printed circuit board. It should be understood that the illustrated structures may be selectively placed according to specific application requirements.

[0089]参考图7A,表示用于受控分销系统中构建的对象。对象300是光盘302。尽管对象300被描述为光盘,但其也可以是其他有形介质。例如,对象300可能是DVD、VCD、信用卡、礼券、票据、游戏卡带、可读存储器、瓶子或者其他有形介质。播放器、驱动器或者游戏系统可读取光盘302的数据,这是光盘的主要效用。这样,播放器感知光盘中存储的内容从而表明光盘的效用。类似的,受限光盘将不能被播放器读取或者读取、写入光盘存储区。[0089] Referring to FIG. 7A, there is shown an object used in the construction of the controlled distribution system. The object 300 is an optical disc 302 . Although object 300 is described as an optical disc, it may be other tangible media. For example, object 300 may be a DVD, VCD, credit card, gift certificate, ticket, game cartridge, readable memory, bottle, or other tangible medium. The data of the optical disc 302 can be read by a player, drive or gaming system, which is the primary utility of the optical disc. In this way, the player perceives the content stored on the disc to indicate the utility of the disc. Similarly, restricted discs will not be read by the player or read from or written to the disc storage area.

[0090]光盘302的内容316中有内容区、索引、菜单、启动数据或者文档和工作控制。内容316可以是:电影文件、声音文件、游戏文件或其他需要察看或使用的信息。光盘中的变更实现装置315至少可以设置为两种状态。一种状态下,变更实现装置会干扰播放器303读取内容316的能力。更具体地,播放器303具有激光器319和用来读取内容316的相关读取和显示电路321。然而,如果变更实现装置315限制了光盘的效用,变更实现装置就通过干扰激光319的性能来读取索引、菜单、启动数据或文件信息或内容信息。这样,放置在目标播放器中的光盘的效用就完全受限。[0090] The content 316 of the optical disc 302 includes content areas, indexes, menus, startup data or documents, and job controls. Content 316 may be: movie files, sound files, game files or other information that needs to be viewed or used. The change implementing means 315 in the optical disk can be set to at least two states. In one state, changing implementations interferes with the ability of player 303 to read content 316 . More specifically, player 303 has laser 319 and associated reading and display circuitry 321 for reading content 316 . However, if the change implementation means 315 limits the utility of the disc, the change implementation means reads the index, menu, start data or file information or content information by interfering with the laser 319 performance. Thus, the utility of the disc placed in the target player is completely limited.

[0091]在一个实例中,变更实现装置315可以是电子可转换材料。更具体地,变更实现装置可以是利用电信号来改变其光学特性的电致变色材料。这样,当电致变色材料基本不透明或高折射率时,激光被充分干扰以至于读取或者显示播放器的电路不能正确读取光信号。但是,当变更实现装置被改变为光学非彩色的状态时,激光器就可以正确的读取索引、菜单、启动数据或文件,或者内容区,从而充分利用光盘。[0091] In one example, the alteration enabling device 315 may be an electronically switchable material. More specifically, the alteration enabling means may be an electrochromic material that uses an electrical signal to alter its optical properties. Thus, when the electrochromic material is substantially opaque or has a high index of refraction, the laser light is sufficiently disturbed that the circuitry that reads or displays the player cannot properly read the light signal. However, when the change implementation device is changed to an optically achromatic state, the laser can correctly read the index, menu, start data or file, or the content area, thereby making full use of the optical disc.

[0092]光盘中有用来接收授权密钥的RF或其他EM接收器308。逻辑313接收授权密钥并作出诸如是否应该改变光盘状态之类的决定。在一个实例中,逻辑313利用自带受限访问密钥311和接收到的授权密钥进行比较。如果密钥匹配,逻辑就利用辅助步骤使变更实现装置315转换到不同状态。光盘具有用来激活逻辑313和接收器308并影响变更实现装置315的转换的电源310。电源310可能是和光盘一起保存的电池或者保存在用于包装光盘的包装中;也可能是将无线能量转换为电能的RF/EM能量转换器。[0092] The optical disc has an RF or other EM receiver 308 for receiving the authorization key. Logic 313 receives the authorization key and makes decisions such as whether the state of the disc should be changed. In one example, the logic 313 compares the received authorization key with the own restricted access key 311 . If the keys match, the logic transitions the change implementer 315 to a different state using a secondary step. The disc has a power source 310 for activating the logic 313 and the receiver 308 and effecting the switching of the change implementing means 315 . The power source 310 may be a battery kept with the disc or in the packaging used to package the disc; it may also be an RF/EM power converter that converts wireless power to electrical power.

[0093]变更实现装置315可以被用来增加或限制光盘的效用。例如,光盘302的变更实现装置在出厂时就被设置在完全限制光盘效用的第一状态。这样就从充分降低了光盘302在分销链中流通时被盗的风险。任何窃取或者得到窃取或未授权光盘的拷贝的人不能在商业播放器中使用该光盘。因此被窃取的风险因被盗光盘没有效用或效用非常有限而大大降低。[0093] Alteration implementer 315 may be used to increase or limit the utility of the disc. For example, the change implementation device of the optical disc 302 is set in the first state that completely limits the utility of the optical disc when it leaves the factory. This substantially reduces the risk of the optical disc 302 being stolen when it circulates in the distribution chain. Anyone who steals or obtains a copy of a stolen or unauthorized disc cannot use the disc in a commercial player. The risk of being stolen is therefore greatly reduced as the stolen disc has no or very limited utility.

[0094]在诸如零售店的销售点终端之类的分销链中的一些场所,光盘可以被恢复全部效用。当光盘放置在销售点,靠近激活装置时,光盘可以收到提供ID 306的请求。该ID可能是条形码,也有可能被存储在可访问存储器中,等待被无线传输。在这种情况下,光盘ID通过RF发送器304传回激活装置。激活装置可能和远程工作中心一起执行确认和授权任务,从而确认是否许可恢复光盘效用。一旦授权后,激活装置将授权密钥传至RF接收器308。逻辑313使用存储在光盘中的受限访问密钥。在生产过程中,受限访问密钥311被存储在光盘中,并和光盘ID 306关联。激活装置可以请求访问相关光盘ID和授权密钥的文件。这些文件通常被安全保存在网络操作中心或其他安全服务器位置。这样,激活装置可以接收到光盘302的受限访问密钥。如果逻辑313确定受限访问密钥311和接收到的授权密钥相匹配,那么逻辑和电源310一起将变更实现装置转换到接近光学非彩色状态。这样,光盘就可在其对应的播放器303中使用。[0094] At some point in the distribution chain, such as a point-of-sale terminal in a retail store, the optical disc can be restored to full utility. When the disc is placed at the point of sale, near the activation device, the disc can receive a request to provide the ID 306. This ID may be a barcode, or it may be stored in accessible memory, waiting to be transmitted wirelessly. In this case, the disc ID is transmitted back to the activation device via the RF transmitter 304 . The activation device may perform validation and authorization tasks in conjunction with the telework center to validate whether the recovery disc is licensed. Once authorized, the activation device transmits the authorization key to the RF receiver 308 . Logic 313 uses a restricted access key stored on the disc. During the production process, the restricted access key 311 is stored in the disc and associated with the disc ID 306. The activation device may request access to the associated disc ID and authorization key files. These files are usually kept securely in a network operations center or other secure server location. In this way, the activation device can receive the restricted access key for the optical disc 302 . If the logic 313 determines that the restricted access key 311 and the received authorization key match, then the logic, along with the power supply 310, transitions the alter implementation device to a near optically achromatic state. In this way, the optical disc can be used in its corresponding player 303 .

[0095]参考图7B,表示具有附加特征的光盘302。图7B中的光盘和图7A中的光盘相似,不再详细说明。图7B所示光盘可以执行上文提到的可用效用的转换。但是光盘302具有用来决定是否将变更实现装置转换到新状态的附加条件。例如,逻辑313具有允许计数器输入的附加输入端。该计数器被用来计算光盘被激活的次数,如果达到最大值,就会限制恢复任何效用。在另一实例中,逻辑313具有时间信号,例如,该时间信号可以是正在计时的计时器,它提供了附加的输入信号。这样,光盘就可以恢复其全部效用,然后逻辑监视经过的时间,在设置好的时间经过之后,将光盘恢复到限制状态。这样,光盘就可按预设时间量激活。逻辑313也可具有额外的存储空间,用来执行逻辑功能,并且用来存储未来确定所需的值。[0095] Referring to FIG. 7B, an optical disc 302 having additional features is shown. The optical disc in FIG. 7B is similar to the optical disc in FIG. 7A , and will not be described in detail again. The optical disc shown in Fig. 7B can perform the conversion of the available utilities mentioned above. But the disc 302 has additional conditions that are used to decide whether to transition the change implementation device to the new state. For example, logic 313 has an additional input to allow a counter input. This counter is used to count the number of times the disc has been activated, and if the maximum value is reached, it will limit recovery to any effect. In another example, the logic 313 has a time signal, such as a ticking timer, which provides an additional input signal. This way the disc is restored to its full utility and the logic then monitors the elapsed time and after the set time has elapsed, restores the disc to the limit state. This allows the disc to activate for a preset amount of time. Logic 313 may also have additional storage space to perform logic functions and to store values needed for future determinations.

[0096]用来确认光盘是否转换状态的确认结构也随光盘302一起说明。在一个实例中,该确认系统以效用状态电路307的形式存在,该电路被用来通过RF发送器304将当前效用状态传送回激活装置。这样,激活装置可确认光盘在顾客离开零售点前处在预期恢复状态。在另一个实例中,一旦变更实现装置315发生改变,效用状态307还被用来自动传送信号。效用状态307可以通过监视或检测光盘中激活电路上一个或多个点来确定状态变化。例如,效用状态电路307可以监视供电和相关供电电路,以确定足够的电力能使变更实现装置315完成状态转换。在另一个实例中,效用状态可监控逻辑,从而确定状态是否发生适当的改变。在另一个实例中(未显示),效用状态可直接监视变更实现装置315的特性,并把变更实现装置当前的状态报告给RF发送器。[0096] A confirmation structure for confirming whether the optical disc has switched states is also explained along with the optical disc 302. In one example, the validation system is in the form of a utility status circuit 307 which is used to communicate the current utility status back to the activation device via the RF transmitter 304 . In this way, the activation device can confirm that the disc is in the intended restoration state before the customer leaves the retail location. In another example, the utility state 307 is also used to automatically signal whenever the change implementer 315 changes. The utility state 307 can determine a state change by monitoring or detecting one or more points on the active circuit in the disc. For example, utility state circuitry 307 may monitor the power supply and associated power supply circuitry to determine that there is sufficient power to enable change implementer 315 to complete a state transition. In another example, the utility state can monitor logic to determine if an appropriate change of state has occurred. In another example (not shown), the utility status can directly monitor the characteristics of the change implementation device 315 and report the current status of the change implementation device to the RF transmitter.

[0097]通过报告确认变化,激活装置可以确认光盘在顾客离开零售点之前已恢复效用。另外,准确的报告和付款授权在分销链内产生。也可以采用其他确认转换效用状态的方法。[0097] By reporting a confirmation change, the activation device can confirm that the disc has been reinstated before the customer leaves the retail location. Additionally, accurate reporting and payment authorizations are generated within the distribution chain. Other methods of confirming the utility status of the conversion may also be used.

[0098]参考图8,表示是分销控制方法。方法350具有用来将一组ID和一组相应的授权密钥联系在一起的一个或一系列数据库。这些ID和密钥可以分散在一个服务器上的几个服务器中,或者存储或生成在一个本地激活装置中。标识码和授权密钥之间是唯一一对一的关系,或者一对多关系。例如,每个光盘都有一个唯一的ID和与其相关的唯一的激活码。因为一个授权密钥只可以用来恢复一个特定的光盘的效用,这样可以加强安全设置。在另一个实例中,一个授权密钥可以应用一组识别号码。这样,可以发送一个授权密钥来激活一系列产品。尽管减少了安全性,但这种装置可以减少网络和授权的工作量。在另一个实例中,对象具有生成授权密钥的辅助信息。例如,可以在光盘中存储生产日期和时间,当激活装置读取光盘时,安全算法就会生成正确的授权密钥。这样,只有具有安全和预定义算法的实体才可以将可访问数据及时间信息关联于授权密钥。密钥及识别号码存储在密钥文件377中。这些密钥文件可以存储在零售点本地,也可以分布在相同物理地址的其他服务器中,或者分布在不同的装置和地址中。[0098] With reference to FIG. 8, the representation is a distribution control method. Method 350 has a database or series of databases used to associate a set of IDs with a corresponding set of authorization keys. These IDs and keys can be distributed among several servers on one server, or stored or generated in a local activation device. There is a unique one-to-one relationship or a one-to-many relationship between the identification code and the authorization key. For example, each disc has a unique ID and a unique activation code associated with it. Since an authorization key can only be used to restore the validity of a specific disc, this can enhance security settings. In another example, an authorization key may apply a set of identification numbers. In this way, a license key can be sent to activate a range of products. Although reducing security, this arrangement can reduce network and authorization workload. In another example, the object has auxiliary information to generate an authorization key. For example, the date and time of manufacture can be stored on the disc, and when the disc is read by an activation device, a security algorithm generates the correct authorization key. This way, only entities with security and predefined algorithms can associate accessible data and time information with authorization keys. Keys and identification numbers are stored in key file 377 . These key files may be stored locally at the point of sale, distributed among other servers at the same physical location, or distributed among different devices and locations.

[0099]如方框354所示,对象出厂时就有可访问识别号码和受限访问密钥。可访问识别号码可以条形码值形式存储,或者通过无线RF/EM系统存储在探询区。这样,激活装置就可以确认特定的对象。对象也具有一个存储在非易失、不可更改且外部不可读取的存储地址的受限访问密钥。通常,存储在对象中的受限访问密钥和方框352上面的授权密钥是一样的。还可以使用其他进程。厂商以方框356中所示的方法控制对象的效用。例如,厂商可以完全限制对象的效用以至于对象不能使用或者几乎不能使用,也可以将对象设置成演示或限制工作模式,还可以在分销链中激活其效用然后再限制其效用。对象就可以方框358所示的方式在分销渠道中流通。在分销渠道中,对象仅仅具有厂商激活的效用。这样,厂商可以切实限制其对象的效用直到被授权方改变对象的效用为止。从而,在厂商确认的地点、时间或事件中,可以允许把对象转换到不同的效用状态。通常,如方框361所示,对象被放置在靠近销售点终端的激活装置处。激活装置379具有获取ID和密钥文件信息的网络连接,或者具有本地存储的信息。激活装置通过RF或EM通信和对象进行无线通信。如方框361所示,激活装置379从对象读取可访问识别号码。如方框363所示,激活装置可以执行其他工作来确定允许激活装置改变对象的效用。例如,激活装置可以和销售点终端一起确定顾客已为对象付款或者输入了正确的密码。[0099] As indicated at block 354, the object is shipped with an accessible identification number and a restricted access key. The access identification number can be stored as a barcode value, or at the interrogation zone via a wireless RF/EM system. In this way, the activation device can identify a specific object. Objects also have a restricted-access key stored at a non-volatile, unchangeable, and externally unreadable storage address. Typically, the restricted access key stored in the object is the same as the authorization key at block 352 above. Other processes can also be used. The vendor controls the utility of the object in the manner shown in block 356 . For example, a vendor can completely limit the utility of an object so that it is unusable or barely usable, it can set the object into a demo or limited working mode, it can activate its utility in the distribution chain and then limit its utility. The object can then be circulated in the distribution channel in the manner shown in block 358 . In distribution channels, objects only have vendor-activated utility. In this way, the vendor can effectively limit the utility of its objects until the authorized party changes the utility of the object. Thus, at a place, time, or event identified by the vendor, it may be possible to allow the transition of an object to a different utility state. Typically, as indicated at block 361, the object is placed at the activation device proximate to the point-of-sale terminal. The activation device 379 has a network connection to obtain ID and key file information, or has locally stored information. The activation device communicates wirelessly with the subject via RF or EM communication. As indicated at block 361, the activation device 379 reads the accessible identification number from the subject. As indicated at block 363, the activation device may perform other work to determine the utility of allowing the activation device to change the object. For example, the activation device may work with the point-of-sale terminal to determine that the customer has paid for the object or entered the correct code.

[0100]网络操作中心也可授权激活装置。例如,授权装置具有授权ID或代码,它们必须由网络操作中心确认或者被限制成通过特殊的通信端口或装置来进行通信。在另一个示例中,激活装置379可具有完整全球定位系统功能,向网络授权中心报告其位置信息。这样,激活装置必须在授权激活装置前到达预期位置来激活对象。如方框365所示,如果收到网络操作中心的所有授权,激活装置379就会获取与对象的识别号码相关联的授权密钥。如方框367所示,激活装置通常用无线RF或EM通信进程来发送授权密钥给对象。如方框369所示,对象接收授权密钥并与受限访问密钥进行密钥比较。如方框371所示,如果密钥相匹配,对象就通过改变变更实现装置的状态来改变其效用。[0100] The network operations center may also authorize activation of the device. For example, authorized devices have authorized IDs or codes that must be validated by the network operations center or restricted to communicate through specific communication ports or devices. In another example, the activation device 379 may have full GPS functionality, reporting its location information to the network authorization center. As such, the activation device must arrive at the desired location to activate the object before the activation device is authorized. As shown in block 365, if all authorizations have been received from the network operation center, the activation means 379 obtains the authorization key associated with the object's identification number. As indicated at block 367, the activation device sends the authorization key to the subject, typically using a wireless RF or EM communication process. As represented by block 369, the subject receives the authorization key and performs a key comparison with the restricted access key. As shown in block 371, if the keys match, the object changes its utility by changing the state of the change implementation.

[0101]在某些情况下,对象可具有用来确认状态改变的内部电路。如方框372所示,在这种情况下,对象具有用来检测或监视变更实现装置状态的内部电路,并把该状态报告给激活装置,如方框372所示。确认信息被反馈给网络操作中心以完成报告和付款。[0101] In some cases, an object may have internal circuitry to acknowledge state changes. In this case, the object has internal circuitry to detect or monitor the state of the change implementer, as indicated by block 372, and reports this state to the active device, as indicated by block 372. Confirmation information is fed back to the NOC for reporting and payment.

[0102]参考图9A,表示用于分销控制的系统。系统400中的厂商402生产效用受控对象。更具体的是,厂商生产带有变更实现装置的对象,该装置可根据收到的授权密钥来改变状态。厂商具有和网络操作中心407相连接的网络通信。厂商上传用来确认厂商402生产的效用受控对象的一系列ID值409。这些识别的对象具有用来实施效用转换的一组协助授权密钥411,这些密钥由厂商402上传到网络操作中心407。对象可能有多个密钥,不同密钥可以设置不同的效用级别。厂商也可以给装置设置附加访问控制412。例如,厂商可限制特定产品在特定国家的或地区的销售。另外,厂商可能不想让特定DVD电影光盘在预定日期前在特定的国家被激活。这样,即便将对象放入分销链404,厂商仍可以控制对象。[0102] Referring to FIG. 9A, a system for distribution control is shown. A firm 402 in system 400 produces utility controlled objects. More specifically, a vendor produces an object with a change implementation that changes state based on receipt of an authorization key. The vendor has network communications connected to the network operation center 407 . The vendor uploads a series of ID values 409 used to identify utility controlled objects produced by the vendor 402 . These identified objects have a set of facilitation authorization keys 411 uploaded by the vendor 402 to the network operation center 407 to implement the utility transfer. Objects may have multiple keys, and different keys may have different utility levels set. The vendor may also place additional access controls 412 on the device. For example, a manufacturer may restrict the sale of certain products in certain countries or regions. Additionally, a manufacturer may not want a particular DVD movie disc to be activated in a particular country by a predetermined date. In this way, even if the object is placed into the distribution chain 404, the vendor can still control the object.

[0103]分销链404可包括一些实体,包括:发货人、货车司机、仓储人、分销人及其他分销实体。分销链404接收厂商402的受控对象并将受控对象发送给零售环境406。因此,在分销链404具有对象期间,对象一直处在效用受控级别。更具体的,厂商甚至可以在几乎整个分销链中控制装置的可用效用。零售实体406具有用来改变对象效用的激活装置402。零售公司可以确定在什么情况、地点和时间来改变对象的效用。例如,一些零售商可以在当顾客在销售终端购买产品时改变效用,而其他零售商则可以选择在对象进入零售商店时激活效用。进一步说,不同产品激活的时间也不同。例如,诸如大屏幕电视之类的大型耐用电子产品很难在零售场所被窃取,因此可以在运输码头激活效用。但是,在商店中容易被匿藏和拿走的光盘就只能在付款后在销售点终端激活效用。[0103] Distribution chain 404 may include entities including shippers, truck drivers, warehousers, distributors, and other distribution entities. Distribution chain 404 receives controlled objects from vendor 402 and sends the controlled objects to retail environment 406 . Thus, the object remains at a utility-controlled level for as long as the distribution chain 404 has the object. More specifically, manufacturers can even control the availability of devices throughout almost the entire distribution chain. Retail entity 406 has activation means 402 for changing object utility. A retail company can determine under what circumstances, where and when to change the utility of an object. For example, some retailers may change the utility when a customer purchases a product at a point of sale, while other retailers may choose to activate the utility when the object enters the retail store. Furthermore, different products have different activation times. For example, large durable electronics such as large-screen TVs are difficult to steal in retail locations, so utility activation can be done at shipping docks. However, discs that are easily concealed and taken away in stores can only be activated at point-of-sale terminals after payment.

[0104]不管是在销售点终端还是在其他位置,激活装置408都通过与对象之间的无线通信来获取对象识别信息,并发送授权密钥给对象。激活装置与网络操作中心407进行通信来执行这些操作。网络操作中心访问ID值409、授权密钥411和任何附加访问控制412。这些附加访问控制412可能包括对激活装置408自身进一步授权和安全的控制。例如,激活装置408在授权激活装置运行之前必须具有和预设标识符相匹配的标识符。在另一实例中,激活装置408需要和特定预设通信网络进行通信,例如,特定的TCP/IP端口。如果激活装置408通过非特定端口通信,那么激活装置处于未经授权的位置由未经授权的人进行操作,因此网络操作中心不会发送任何授权密钥。例如,激活装置有完整全球定位系统并且可以将其位置信息报告给网络操作中心407。如果激活装置408不是在预期的物理位置,网络操作中心407也不会发送授权密钥。例如,如果激活装置在预期位置被盗或挪走,并且盗窃者正尝试在其他地址激活该对象时,上述方法将会非常有用。[0104] Whether at a point-of-sale terminal or elsewhere, the activation device 408 obtains the subject's identification information through wireless communication with the subject, and sends the authorization key to the subject. The activation device communicates with the network operations center 407 to perform these operations. The NOC accesses the ID value 409 , the authorization key 411 and any additional access controls 412 . These additional access controls 412 may include further authorization and security controls on the activation device 408 itself. For example, the activation device 408 must have an identifier that matches a preset identifier before the activation device is authorized to operate. In another example, the activation device 408 needs to communicate with a specific preset communication network, for example, a specific TCP/IP port. If the activation device 408 communicates through a non-specific port, then the activation device is in an unauthorized location being operated by an unauthorized person, so the network operations center will not send any authorization keys. For example, an activated device has a full global positioning system and can report its location information to the network operations center 407 . The network operation center 407 also does not send the authorization key if the activation device 408 is not at the expected physical location. This can be useful, for example, if the activation device is stolen or removed from the intended location, and the thief is trying to activate the object at another address.

[0105]访问控制模块412也可能和交易控制系统415通信。交易控制系统415可能与网络操作中心407相关联并存在于本地零售商店,或者由第三方遥控。例如,交易控制415可能是一个信用卡授权公司,该公司从激活装置402接收信用卡授权请求,并且发送授权确认信息到激活装置。这样,直到收到交易控制系统415的确认后,激活装置408才能激活对象。授权请求可能包括支票、支票卡、借记卡或其他金融工具。交易控制也可能包括确认密码、会员资格、安全证明、年龄、生物计量数据或其他确认值。[0105] The access control module 412 may also communicate with the transaction control system 415. Transaction control system 415 may be associated with network operations center 407 and reside locally at the retail store, or be remotely controlled by a third party. For example, transaction control 415 may be a credit card authorization company that receives a credit card authorization request from activation device 402 and sends an authorization confirmation to the activation device. Thus, the activation means 408 cannot activate the object until a confirmation from the transaction control system 415 is received. Authorization requests may include checks, check cards, debit cards or other financial instruments. Transaction controls may also include confirmation of passwords, memberships, security credentials, age, biometric data, or other confirmation values.

[0106]激活装置408也可能接收来自已正确激活对象的确认信号。在这种情况下,激活装置可能把成功改变的信息传送给网络操作中心407或者交易控制415。这样,收到效用成功改变通知后,生成相应的报告和付款授权。[0106] The activation means 408 may also receive a confirmation signal from the object that it has been correctly activated. In this case, the activating device may transmit information of a successful change to the network operation center 407 or the transaction control 415 . In this way, upon receipt of notification of a successful change in utility, corresponding reports and payment authorizations are generated.

[0107]参考图9B,表示简化了的分销链。在这个分销链中,厂商426生产效用受控对象。如方框428所示,厂商在生产码头427将对象运出,分销中心的运输码头接收对象。如方框430所示,分销中心429将产品运至零售商的接货码头由零售商接收。如方框432所示,零售商可将对象存储在仓库431,然后将对象搬至零售场所的展柜。这里,顾客可以处理对象,并可能带着对象到销售点终端机的付款终端433。零售店员通常使用无线RF/EM激活装置来扫描对象。激活装置确认对象并获取该对象特定的授权密钥。店员和销售点终端在顾客的配合下接收付款并提供其他需要的信息,例如年龄、密码或会员资格等。这时,对象处在厂商所选择的效用状态下。一旦获取厂商许可并且被授权零售商选中,厂商便允许发送授权密钥。这样,厂家可以控制对象可卖给顾客的时间、地点和条件。因此,厂商可以允许只在特定日期或时间之后发送授权密钥到特定地理区域或者年龄群体。在一个实例中,厂商和零售商通过网路操作中心来协调必需的许可并把密钥送至激活装置。然后,零售商利用授权密钥将对象设置在第二效用状态。之后,如方框434所示,顾客就可以把对象带回家并在第二状态下操作对象。[0107] Referring to FIG. 9B, a simplified distribution chain is shown. In this distribution chain, the firm 426 produces utility controlled objects. As shown in block 428, the manufacturer ships the object at the production dock 427, and the distribution center's shipping dock receives the object. As shown at block 430, the distribution center 429 ships the product to the retailer's receiving dock for receipt by the retailer. As represented by block 432, the retailer may store the object in warehouse 431 and then move the object to a display case at the retail location. Here, the customer may dispose of the object and possibly take the object to the payment terminal 433 of the point-of-sale terminal. Retail clerks typically scan objects using wireless RF/EM activated devices. The activation device validates the object and obtains an authorization key specific to that object. Clerks and point-of-sale terminals work with customers to accept payments and provide other requested information, such as age, passwords or memberships. At this point, the object is in the utility state chosen by the vendor. Once licensed by the manufacturer and selected by an authorized retailer, the manufacturer allows the distribution of authorization keys. In this way, the manufacturer can control when, where and under what conditions the object can be sold to the customer. Thus, a vendor may allow authorization keys to be sent to certain geographic regions or age groups only after certain dates or times. In one example, the manufacturer and retailer coordinate the necessary licenses and deliver keys to the activation device through the network operations center. The retailer then places the object in a second utility state using the authorization key. Thereafter, as shown in block 434, the customer may take the object home and manipulate the object in the second state.

[0108]在一个实例中,厂商生产完全效用受控对象。完全效用受控对象在到达销售点终端之前在不同的运输码头、分销中心、仓库、展柜或购物车之间转移。在整个过程中,如果对象被盗,那么这种对象几乎或根本没有效用,因此对象被盗的风险大大降低。这样,不管在过程中有多少实体具有过对象,厂商都成功控制了从生产到销售终端各阶段中产品的分销和使用。一旦零售商激活了对象,顾客就可以使用其全部效用。[0108] In one example, a vendor produces full utility controlled objects. Full utility controlled objects are transferred between different shipping docks, distribution centers, warehouses, showcases or shopping carts before reaching the point-of-sale terminal. Throughout the process, if an object is stolen, the object has little or no utility, so the risk of the object being stolen is greatly reduced. In this way, no matter how many entities have objects in the process, the manufacturer has successfully controlled the distribution and use of the product in all stages from production to sales terminal. Once the retailer activates the object, its full utility is available to the customer.

[0109]参考图10,表示受限显示包装435。受限包装435具有包装着受限光盘438的包装436。包装436有一个以标签437形式存在的显著标记,用于标明光盘的效用受到限制。因为光盘的效用已被完全限制,这使得顾客、员工及任何潜在的小偷都知道在付款登记处激活光盘之前,光盘不能在相应的顾客的播放装置中播放。因此,通过提供效用受控对象438和明确标注该对象不可播放,从而大大降低了对象被窃的风险。[0109] Referring to FIG. 10, a constrained display wrapper 435 is shown. The limited package 435 has a package 436 in which a limited optical disc 438 is packaged. The package 436 has a distinctive indicia in the form of a label 437 indicating that the disc is of limited utility. Because the disc's utility is completely limited, this allows customers, employees, and any potential thieves to know that the disc cannot be played in the corresponding customer's playback device until the disc is activated at the checkout desk. Thus, by providing a utility controlled object 438 and clearly marking the object as non-playable, the risk of object theft is greatly reduced.

[0110]相似类型包装439中展示的是新发行的效用受控视频游戏。游戏442已被限制为不可玩,游戏包装440的显著标签441表明该游戏不可玩。因为游戏卡带在预期的游戏机中不能使用,所以被盗的风险也大大降低。作为最后一个示例,便携式MP3播放器445展示在其包装446中。MP3播放器448已被完全限制效用,所以处于不能工作的状态。贴在包装446上的标签447明确表示该MP3播放器不能工作。这样,被盗的MP3播放器就没有效用,因此被盗的风险也降低了。[0110] Shown in a similar type of package 439 is a newly released utility-controlled video game. The game 442 has been restricted from being playable, and a prominent label 441 on the game packaging 440 indicates that the game is not playable. Because the game cartridge cannot be used in the intended console, the risk of theft is also greatly reduced. As a final example, a portable MP3 player 445 is shown in its packaging 446 . The MP3 player 448 has been fully limited in utility and so is in a non-functional state. A label 447 affixed to the package 446 clearly indicates that the MP3 player is not working. This way, a stolen MP3 player has no utility, so the risk of theft is reduced.

[0111]参考诸如将对象卖给或移交给顾客之类的商业交易,已经初步描述了效用受控对象。然而,也可在其他领域或应用中使用效用受控对象。例如,受控对象可以用于军队或其他政府部门,从而控制装置和媒体的分销和使用。这样,可以在存储和运输的过程中限制装置或介质的效用,然后在受控的时间和地点恢复其全部或部分效用。在一个具体实例中,可以在生产、存储和运输武器的过程中关闭其破坏性效用。当武器到达战场分配点时,被授权的武器指挥官用激活装置恢复其全部工作性能。激活装置和安全网络操作中心一起确认该武器在允许的地点和时间由被授权的军官激活。类似的受控系统可用于其他电子产品和媒体对象。[0111] Utility controlled objects have been primarily described with reference to a business transaction such as selling or handing over an object to a customer. However, utility controlled objects may also be used in other fields or applications. For example, controlled objects may be used by the military or other government agencies to control the distribution and use of devices and media. In this way, the utility of a device or medium can be limited during storage and transport, and then restored to full or partial utility at a controlled time and place. In one specific example, a weapon's destructive utility could be turned off during production, storage and transport. When the weapon reaches the battlefield distribution point, the authorized weapon commander restores its full operational performance with the activation device. Together, the activation device and the Secure Network Operations Center confirm that the weapon was activated by authorized officers at the permitted location and time. Similar controlled systems can be used for other electronic products and media objects.

[0112]参考图11,表示受控电子对象装置450。电子装置450带有盒体452,该盒体装着并保护效用模块及其他工作电路和装置。在一个实例中,盒体452是金属的,因此会限制对象中元件和电路的无线通信。这样,对象的装置和元件的无线通信要求过强的RF或EM信号以进行强壮有效的通信。为了提高无线通信的性能,在外壳452外部安装天线455并且该天线电连接到外壳452内的激活电路。这样,虽然变更实现装置依然在对象外壳452中,但天线和激活装置之间的很容易达成无线通信。在一个具体实例中,连接器453放置在外壳452中。该连接器可能是专为天线452特制的,或者是对象的现有连接器。例如,如果对象是音频装置,对象有可能具有一些现有音频连接器。在另一个实例中,对象450可以通过外部交流或直流电源连接器供电。这样,连接器453可以是一个电源插头或适配器输入。也可以使用可用的诸如以太网数据端口、串行数据端口、USB接线或其他标准音频、视频和数据连接器之类的其他类型的连接器。[0112] Referring to FIG. 11, a controlled electronic object device 450 is shown. The electronic device 450 has a case 452 that houses and protects the utility module and other operating circuits and devices. In one example, housing 452 is metallic, thereby limiting wireless communication of components and circuits within the object. As such, wireless communication of devices and components of the subject requires excessively strong RF or EM signals for robust and efficient communication. In order to improve the performance of wireless communication, an antenna 455 is mounted on the outside of the housing 452 and is electrically connected to the activation circuit inside the housing 452 . In this way, wireless communication between the antenna and the activation device is easily achieved, although the change-implementing device remains within the subject housing 452 . In one particular example, connector 453 is placed within housing 452 . This connector may be custom made for antenna 452, or it may be an existing connector on the subject. For example, if the object is an audio device, the object likely has some existing audio connectors. In another example, object 450 may be powered through an external AC or DC power connector. Thus, connector 453 can be a power plug or adapter input. Other types of connectors such as Ethernet data ports, serial data ports, USB cables or other standard audio, video and data connectors may also be used as available.

[0113]在使用时,在生产和运输过程中天线455附在连接器453上。在销售点终端场所中,激活装置和天线445协作来发送或接收对象包装452中电路的信息或电能。具体地,天线可接收用于标识符值的请求,并且将标识符值传送至激活装置。在执行完授权步骤后,激活装置可通过天线445将授权密钥传送给对象。对象具有通过连接器453连接到天线上的逻辑。该逻辑确定是否改变其变更实现装置到其他状态。效用状态改变以后,对象可通过天线455向激活装置报告变化确认信息。通常,这时顾客会将电子装置450运往另一地点并将电子装置设置在可操作状态。顾客可取下并去除天线455。在另一例子中,天线455和外壳452是集成一体的,因此保留在外壳上。[0113] In use, the antenna 455 is attached to the connector 453 during production and shipping. In a point-of-sale terminal location, the activation device and antenna 445 cooperate to transmit or receive information or power to circuits in object packaging 452 . Specifically, the antenna may receive a request for an identifier value and transmit the identifier value to the activation device. After performing the authorization steps, the activation device can transmit the authorization key to the subject through the antenna 445 . The object has logic connected to the antenna via connector 453. This logic determines whether to change its change implementation to another state. After the utility state has changed, the object may report a confirmation of the change via the antenna 455 to the activation device. Typically, at this point the customer will ship the electronic device 450 to another location and place the electronic device in an operational state. The antenna 455 can be removed and removed by the customer. In another example, antenna 455 and housing 452 are integral and thus remain on the housing.

[0114]参考图12,表示天线的一个实例。在图12中,对象包装462内有一个印刷版电路板465。变更实现装置、逻辑和支持电路位于464。天线461通过连接器连接到内部电路464上面。还可以把逻辑和变更实现装置和天线或连接器设置在一起。这样,当内部电路464被RF或EM通信屏蔽时,外置天线461就可以为通信做好准备。尽管图示中天线元件461仅由对象包装箱外部的天线结构组成,但也可以将其他内部电路的零部件放在外部。例如,将RF/EM转换器形式的电源作为一个电池放置在天线元件461中。在另一个实例中,将一些或全部逻辑移至天线元件及对象密钥的限制访问存储中。当然,后者的设置可能安全性比较低,但是可能对一些应用设施有用。但是,由于通常变更实现装置和对象外壳内的效用模块连在一起,变更实现装置将一直在对象外壳内。[0114] Referring to FIG. 12, an example of an antenna is shown. In FIG. 12, the object package 462 has a printed circuit board 465 inside. Alter implementations, logic and support circuitry are located at 464 . The antenna 461 is connected to an internal circuit 464 through a connector. It is also possible to co-locate logic and modification implementation means with antennas or connectors. In this way, the external antenna 461 can be ready for communication when the internal circuitry 464 is shielded from RF or EM communication. Although the antenna element 461 in the illustration is only composed of the antenna structure outside the object packaging box, it is also possible to place other internal circuit components outside. For example, a power source in the form of an RF/EM converter is placed in the antenna element 461 as a battery. In another example, some or all logic is moved to restricted access storage of antenna elements and object keys. Of course, the latter setting may be less secure, but it may be useful for some applications. However, since change implementers are usually associated with utility modules within the object shell, the change implement means will always be within the object shell.

[0115]图13是天线元件471的另一例子。在这个实例中,外壳472具有印刷电路板475,印刷版电路板475包括内部电路474。受控系统470在使用对象现有的音频、视频、数据或电源连接器时特别有用。例如,有可能需要用音频连接器和天线471连接。但是,内部音频电路通常在相对较低的频率下工作,例如,低于100千赫,有时设计成在低于30千赫的频率下工作。因此,天线471接收到所需的900兆赫或者其他无线电频率信号将无法与内置电路474在无线电频率下进行强壮有效的通信。因此,使用调制解调器479将无线电频率信号解调成相对较低的频率。例如,当天线接收到900兆赫的RF通信信号时,该信号将被解调成可通过音频级别电路传输的相对较低的频率信号。这样,内置电路474将接收到一个相对较低频率的信号,并将其用来改变外壳472内变更实现装置的状态。[0115] FIG. 13 is another example of the antenna element 471. In this example, housing 472 has a printed circuit board 475 that includes internal circuitry 474 . The controlled system 470 is particularly useful when using the subject's existing audio, video, data or power connectors. For example, it may be necessary to use an audio connector and an antenna 471 connection. However, internal audio circuits typically operate at relatively low frequencies, eg, below 100 kHz, and are sometimes designed to operate at frequencies below 30 kHz. Therefore, antenna 471 receiving the desired 900 MHz or other radio frequency signals will not be able to communicate robustly and effectively at radio frequencies with built-in circuitry 474 . Therefore, the radio frequency signal is demodulated to a relatively lower frequency using a modem 479 . For example, when an antenna receives a 900 MHz RF communication signal, it will be demodulated to a relatively lower frequency signal that can be transmitted through audio-grade circuitry. Thus, built-in circuitry 474 will receive a relatively low frequency signal and use it to change the state of the change-implementing means within housing 472 .

[0116]参考图14,表示效用受控对象。对象425具有在包装427中的一个对象装置429。若对象装置429是一个电子装置,包装427就是例如放置对象装置429的盒体或运输箱子。举个例子,如果对象是有形介质,包装就可能是盒子,如用于DVD的Amaray盒子或者用于CD的透明盒子以保存媒体。在某些情况下,对象可能会被无线通信干扰。例如,即使通常情况下塑料介质盒不会被无线通信所干扰,但磁盘的金属层却可能被干扰,因此可能需要将外部控制部分439放于包装427之内、磁盘之外。因此,外部控制部分439就被附在对象429上,用来确保高效的无线通信。根据具体的对象和包装,外部控制部分439可能被放置在包装的内部,或者通过包装来进行扩展,或者被放置在包装的外部。外部控制部分与内部控制部分431连接起来,用于控制对象的效用。内部控制部分与外部控制部分两者或其中之一均有一个用于激活和操作控制电路的电源。例如,外部控制部分439可能具有RF/EM转换装置,而内部控制部分可能具有电池。对象装置可能还具有工作电源435。为了保护内部电路不受损害,隔离电路438需要连接到开关441。这样,效用装置433就被保护,从而免受内部控制部分431产生的电信号的干扰。而内部控制部分也在电流供应时受到电源435的保护。例如,当工作电源435被激活时,隔离装置441就是一个将内部控制部分431与效用装置433断开连接的开关。当需要额外保护时,还可以使用更加精密的隔离程序和装置。[0116] Referring to FIG. 14, a utility controlled object is shown. Object 425 has an object device 429 in packaging 427 . If the target device 429 is an electronic device, the package 427 is, for example, a box or a shipping box for placing the target device 429 . For example, if the object is a tangible medium, the packaging might be a box, such as an Amray box for DVDs or a clear box for CDs to hold the media. In some cases, objects may be disturbed by wireless communications. For example, even though a plastic media case would normally not be disturbed by wireless communications, the metal layer of the disk might, so it may be desirable to place the external control 439 inside the enclosure 427, outside of the disk. Therefore, an external control part 439 is attached to the object 429 to ensure efficient wireless communication. Depending on the specific object and package, the external control part 439 may be placed inside the package, or extended by the package, or placed outside the package. The external control part is connected with the internal control part 431 for controlling the utility of the object. Either or both the internal control section and the external control section have a power source for activating and operating the control circuit. For example, the external control section 439 may have an RF/EM conversion device, while the internal control section may have a battery. The target device may also have an operating power source 435 . In order to protect the internal circuits from damage, the isolation circuit 438 needs to be connected to the switch 441 . In this way, the utility device 433 is protected from the interference of the electrical signal generated by the internal control part 431 . The internal control part is also protected by the power supply 435 when the current is supplied. For example, the isolation device 441 is a switch that disconnects the internal control part 431 from the utility device 433 when the operating power source 435 is activated. More sophisticated isolation procedures and devices are also available when additional protection is required.

[0117]参考图15,表示效用受控对象。对象500具有设置于外壳或盒子502之内的对象电路504。外壳502可能干扰与对象电路504之间的通信,因此将效用控制电路的部分安装在对象外壳的外部比较合适。标准连接器521安装在外壳502上,并且外部控制部分518连接在标准连接器512上。外部控制部分有RF/EM天线结构,以及相对应的通信电路。例如,标准连接器521以及与其相关的内置电路在无线电频率下不能工作。因此,外部控制部分518所包括的解调电路就用来降低所接收信号的频率。这样,所接收的无线电频率信号就被解调成能够在对象装置电路504中进行有效强壮通信的频率信号。外部控制部分518与内部控制部分506共同用来实现调节对象装置的效用的改变。更具体地,变更实现装置与效用模块508连接起来实现特定级别的效用。由于激活信号在连接器线路中用于效用,因此效用电路的隔离和保护就变得很重要。这样,可以提供附加电路。例如,只有在激活电路未激活时,才提供与连接器521相连接的输入电路512。还有许多其他替代的公知方法可以提供效用电路的隔离。[0117] Referring to FIG. 15, a utility controlled object is shown. Object 500 has object circuitry 504 disposed within a housing or box 502 . Housing 502 may interfere with communications with subject circuitry 504, so it may be appropriate to mount portions of the utility control circuitry outside of the subject's housing. A standard connector 521 is mounted on the housing 502 , and an external control part 518 is connected to the standard connector 512 . The external control part has RF/EM antenna structure and corresponding communication circuit. For example, standard connector 521 and the built-in circuitry associated with it do not operate at radio frequencies. Therefore, the demodulation circuit included in the external control section 518 is used to reduce the frequency of the received signal. In this way, the received radio frequency signal is demodulated into a frequency signal capable of efficient and robust communication in the object device circuit 504 . The external control section 518 is used in common with the internal control section 506 to realize the change of the utility of the adjustment object device. More specifically, the change implementer interfaces with the utility module 508 to implement a particular level of utility. Since the activation signal is used for utility in the connector line, isolation and protection of the utility circuit becomes important. In this way, additional circuitry can be provided. For example, the input circuit 512 connected to the connector 521 is provided only when the activation circuit is not activated. There are many other alternative known methods to provide utility circuit isolation.

[0118]图16表示带有外置天线的电子装置,所述天线连接到AC连接器或电源线。该天线插入到悬空的AC电源线的头部。使用合适的物理连接器,同样的设计可用于IEC电源进入连接器。在该实施例中,通过使用适当的数字编码技术,收发器/解调器将使导入的经调制的RF(例如900兆赫)信号转换为较低频率(例如~500千赫)的经解调的数据流。这种低频率(~500千赫)的解调信号连接到对象装置上的电源线连接器。隔离网络由AC电力连接器和对象电源相连,所述隔离网络将激活数据流和对象电力输入模块相分离。该隔离网络包括两个电感和两个电容。这些器件的选取基于对象连接器所使用的信号频率(在此例中为60赫兹)与所使用的激活频率(~500千赫)之间的频率比率。在500千赫,电感对于激活信号呈现高阻抗,而电容呈现低阻抗。因此,激活信号连接激活电路,并且电感隔离低电源阻抗。当对象的供电频率是60赫兹时,情况相反。电感呈低阻抗,将60赫兹的能量耦合到电源上,而电容对60赫兹能量呈现高阻抗,从而防止将60赫兹耦合到激活电路。[0118] FIG. 16 shows an electronic device with an external antenna connected to an AC connector or power cord. The antenna plugs into the head of a dangling AC power cord. With the appropriate physical connector, the same design can be used for the IEC power entry connector. In this embodiment, the transceiver/demodulator will convert the incoming modulated RF (eg 900 MHz) signal to a lower frequency (eg ~500 kHz) demodulated data flow. This low frequency (˜500 kHz) demodulated signal is connected to a power line connector on the target device. An isolation network is connected by the AC power connector and the subject power supply, which separates the activation data flow from the subject power input module. The isolation network includes two inductors and two capacitors. The selection of these devices is based on the frequency ratio between the signal frequency used by the subject connector (60 Hz in this example) and the activation frequency used (~500 kHz). At 500 kHz, the inductor presents a high impedance to the activation signal, while the capacitor presents a low impedance. Thus, the activation signal connects the activation circuit and inductively isolates the low source impedance. The opposite is true when the subject is powered at 60 Hz. The inductor presents a low impedance, coupling the 60 Hz energy to the supply, while the capacitor presents a high impedance to the 60 Hz energy, preventing coupling of the 60 Hz to the active circuit.

[0119]图17表示带有外置天线的电子装置,所述外置天线连接到音频输入端口。音频信号需要的带宽高达20千赫,这就意味着激活信号相对于音频信号的比率是低于先前60赫兹电源的那个实例。这个较低的比率可能就需要一个更复杂的滤波器结构,来实现所需要的信号隔离。在这个实例的音频路径中,除了电感外还添加了一个并联电容,这使得经过滤波后的激活信号大大衰减(加快了截止特性)。由于音频输入信号电平较低,因此还需要附加的器件来避免对音频输入级损坏。这可以通过一个简单的双二极管钳位电路与一个合适大小的电阻来实现。当在正常工作状态对对象供电时,激活功率二极管D1由对象电源而反向偏置,因此对音频信号呈现高阻抗。这就使得音频信号与激活电路相隔离,同时也将音频电路与激活电路中的噪声源相隔离。[0119] FIG. 17 shows an electronic device with an external antenna connected to an audio input port. The audio signal requires a bandwidth of up to 20 kHz, which means that the ratio of the activation signal to the audio signal is lower than in the previous example of a 60 Hz supply. This lower ratio may require a more complex filter structure to achieve the required signal isolation. In the audio path of this example, a shunt capacitor is added in addition to the inductor, which greatly attenuates the filtered active signal (speeds up the cut-off characteristic). Due to the low audio input signal level, additional components are required to avoid damage to the audio input stage. This can be achieved with a simple two-diode clamp circuit with an appropriately sized resistor. When the subject is powered in normal operation, the active power diode D1 is reverse biased by the subject's power supply and therefore presents a high impedance to the audio signal. This isolates the audio signal from the active circuit and also isolates the audio circuit from noise sources in the active circuit.

[0120]图18表示带有外置天线的电子装置,所述天线连接到音频输出端口。如图17所述,对于音频信号,滤波器的拓扑会更复杂。在这种情况下,因为连接器是音频输出,就需要不同的拓扑来防止音频输出电路过载。虽然已经实现了简单的双极LC滤波器,但这里可能还需要更多的极点,从而实现所需的对激活信号的隔离而同时不影响音频信号的响应。另外,如图所示,还需要在所示的音频输出放大器的反馈回路中设置隔离滤波器,从而减轻对音频频率响应的影响。[0120] FIG. 18 shows an electronic device with an external antenna connected to an audio output port. As shown in Figure 17, for audio signals, the filter topology is more complex. In this case, since the connector is an audio output, a different topology is required to prevent overloading the audio output circuit. While a simple two-pole LC filter has been implemented, more poles may be required here to achieve the desired isolation of the active signal without affecting the response of the audio signal. In addition, as shown in the figure, an isolation filter needs to be placed in the feedback loop of the audio output amplifier shown, so as to reduce the influence on the frequency response of the audio.

[0121]图19表示带有外置天线的电子装置,所述天线连接到为其他装置提供DC电源的装置(即,电源装置,PSE)。由于大输出电容与DC电源相关,因此隔离网络就不需要其自带滤波器电容。增加的电感与PSE输出滤波电容器相结合,构成使对象电路与载入的RFA信号相隔离的隔离网络。在音频放大器输出的情况下,最好是在输出电压调节器的反馈回路中设置隔离网络,从而减小隔离网络对于电源装置正常运行的影响。[0121] FIG. 19 shows an electronic device with an external antenna connected to a device (ie, a power supply unit, PSE) that provides DC power to other devices. Due to the large output capacitance associated with the DC power supply, the isolation network does not require its own filter capacitor. The added inductance, combined with the PSE output filter capacitor, forms the isolation network that isolates the subject circuit from the loaded RFA signal. In the case of an audio amplifier output, it is desirable to have an isolation network in the feedback loop of the output voltage regulator to reduce the impact of the isolation network on the proper operation of the power supply unit.

[0122]图20表示带有外置天线的电子装置,所述天线连接到通过外部DC电源供电的对象,DC电源比如是通过墙壁上的AC电源插座整流得到DC电源。这种类型的对象被称为受电装置(PD)。如图所示,对象电源的隔离网络包括单个电感。对象供电电源的输入滤波电容与该电感一起形成一个低通滤波器,该滤波器对于激活信号呈现高阻抗,从而将激活信号与电源电路相隔离。当对象由正常运行的外部DC电源供电时,该电感有助于减小外部高频噪声。因为输入滤波电容通常都比较大(高电容值),因此也就不需要钳位二极管。[0122] FIG. 20 shows an electronic device with an external antenna connected to an object powered by an external DC power source, such as rectified DC power from an AC power outlet on a wall. This type of object is called a Powered Device (PD). As shown, the isolation network for the subject's power supply consists of a single inductor. The input filter capacitor of the object power supply together with the inductor forms a low-pass filter which presents a high impedance to the activation signal, thereby isolating the activation signal from the power circuit. This inductance helps reduce external high-frequency noise when the object is powered by a functioning external DC power source. Since the input filter capacitors are usually large (high capacitance), clamping diodes are not required.

[0123]图21表示带有外置天线的电子装置,所述天线连接到视频输入。由于视频信号和激活信号的在频域上有重叠,所以使用无源滤波隔离网络就不能够有效隔离这些信号。在这种情况下,隔离可以通过一个开关装置来完成,比如通过继电器或固态开关,该开关装置的能量供应来自于正常对象工作期间的对象电源。在激活过程中,当对象断电时,继电器K1发送激活信号到激活电路。当给对象供电时,将给继电器K1供电,从而由继电器K1将视频信号发送到正常对象电路而非激活输入端。这使得激活信号和对象电路之间达到了高度的隔离。对于所用连接器不是对象供电源的所有系统,这个办法都是可行的。还可以用固态开关而非继电器来完成信号切换。在这些情况下,两个固态开关可能需要背对背串联,使其底层的二极管在对象断电时不接通,并且呈现激活信号。[0123] FIG. 21 shows an electronic device with an external antenna connected to a video input. Since the video signal and the active signal overlap in the frequency domain, these signals cannot be effectively isolated using a passive filtering isolation network. In this case isolation can be accomplished by a switching device, such as a relay or solid state switch, which is powered from the object power supply during normal object operation. During activation, when the object is powered off, relay K1 sends an activation signal to the activation circuit. When power is applied to the object, power is applied to relay K1 so that the video signal is sent by relay K1 to the normal object circuit instead of the activation input. This enables a high degree of isolation between the active signal and the target circuit. This approach is possible for all systems where the connector used is not the power supply for the object. Signal switching can also be accomplished with solid state switches instead of relays. In these cases, two solid-state switches may need to be connected in series back-to-back so that their underlying diodes do not turn on and present an active signal when the object is powered off.

[0124]使用如上所述以及图16-21所说明的方法,可以将许多其他对象连接器用作激活信号的端口。许多连接器都有未使用的管脚,可以用于激活信号而且不需任何的隔离网络。这类连接器包括但不限于下面几类:USB端口、以太网端口,鼠标端口、键盘端口、PCMCIA端口、存储卡端口、S视频端口、游戏端口、串口、并口、电话插孔和电池连接器。[0124] Using the methods described above and illustrated in FIGS. 16-21, many other object connectors can be used as ports for activation signals. Many connectors have unused pins that can be used for active signals without any isolation network. Such connectors include, but are not limited to, the following: USB ports, Ethernet ports, mouse ports, keyboard ports, PCMCIA ports, memory card ports, S-video ports, game ports, serial ports, parallel ports, phone jacks, and battery connectors .

[0125]按照前面所述,在实现某些条件的情况下(即顾客已为产品付款的情况下),使用安全方法和系统来实现项(“对象”)效用的变更,将有益于日常工作的许多方面。正如以下例子所要说明的,这涉及了从在家中租借电影和视频游戏到防止厂商-零售商的供应链中的失窃的广泛范围。为方便厂家、零售商和消费者使用,非常需要一种对处于可操作状态的对象(例如DVD)或者处于不可操作状态的对象(如在密封纸箱中的DVD播放机)均适用的方法和系统。[0125] As previously stated, it would be beneficial in day-to-day work to use a secure method and system to effectuate changes in the utility of items ("objects") under certain conditions (i.e., when the customer has paid for the product) many aspects of. As the following examples illustrate, this ranges from renting movies and video games at home to preventing theft in the vendor-retailer supply chain. For the convenience of manufacturers, retailers, and consumers, there is a great need for a method and system that works with objects in an operable state, such as a DVD, or in an inoperable state, such as a DVD player in a sealed carton .

[0126]这里提出了实现对象效用变更的新颖方法和系统。对象可处于可操作状态或不可操作状态。通过与对象相结合来实现变更。变更取决于与临近的激活装置之间的通信。所描述的方法和系统是用来实现对象效用变更的实现过程。对象可处于可操作状态或不可操作状态。通过与对象相结合来实现变更,以及变更取决于与临近的激活装置之间的通信。这里所描述的方法和系统是用来实现对象中的变更,从而恢复其效用,对象的效用之前被有意限制。对象可处于可操作状态或不可操作状态。变更取决于与临近的激活装置之间的通信。[0126] Novel methods and systems for implementing object utility alteration are presented herein. Objects can be in an operable or inoperable state. Changes are effected by combining with objects. Changes are based on communication with nearby activating devices. The described methods and systems are implementations for implementing object utility changes. Objects can be in an operable or inoperable state. Changes are implemented in conjunction with objects and depend on communication with nearby activation devices. The methods and systems described herein are used to effect changes in objects, thereby restoring their utility, whose utility was previously intentionally limited. Objects can be in an operable or inoperable state. Changes are based on communication with nearby activating devices.

[0127]举一个例子,厂商发货的某一产品(对象)包括公共标识符(“对象ID”)和相关的私钥(“对象的密钥”)以及在对象内部“用于实现变更的装置”。厂商将对象的ID和私钥分别发送到网络操作中心(“NOC”)。在厂商或稍后的环节中,对象的效用被有意限制。这样做的原因可能是多方面的,如为了防止小偷该对象被购买之前将其盗取或者为了促成新的商业模式(如新的租赁模式)。为了恢复对象的效用,将其靠近一个“激活器”:装置可通信地连接到。激活器获得对象ID并将其传输NOC。NOC使用来自激活器的对象ID来查找与对象相关的密钥。NOC传送对象的密钥到激活器,而激活器继而又将信息传送给对象。对象接收到来自激活器的对象密钥,从而使对象内部根据适当条件使实现对象状态改变的装置发生作用,恢复对象的效用;该条件是接收到对象的私钥。[0127] As an example, a certain product (object) shipped by a manufacturer includes a public identifier ("object ID") and an associated private key ("object's key") as well as "keys for implementing changes" inside the object. device". The vendor sends the object's ID and private key to the Network Operations Center ("NOC"), respectively. The utility of the object is intentionally limited, either at the vendor or later. The reasons for doing this may be various, such as to prevent thieves from stealing the object before it is purchased or to facilitate new business models (such as a new rental model). To restore the object's utility, bring it close to an "activator": the device is communicatively connected to it. The activator obtains the Object ID and transfers it to the NOC. The NOC uses the object ID from the activator to look up the key associated with the object. The NOC transmits the object's key to the activator, which in turn transmits the information to the object. The object receives the object key from the activator, so that the device inside the object that realizes the state change of the object is activated according to appropriate conditions, and the utility of the object is restored; the condition is to receive the object's private key.

[0128]实现满足对象内部发生变化的条件,从逻辑上讲,需要在对象外部的装置上包括一个或者一个以上条件性事件。比如,一个对象(如计算器),可能需要附近激活器无线传输来的对象密钥,用以闭合其内部的某一电子开关,从而准许对象的电池作为电源来启动对象。如果接收到的不是正确的对象密钥,则电子开关保持断开状态,对象也就无法工作(对象的效用就保持被限制的状态,并且对象的持有者也无法从中获益)。激活器从NOC获取正确的对象密钥的首要条件是查询对象及获取对象ID。激活器向对象传送从NOC获取的对象密钥的可能的进一步条件是消费者已支付购买该对象。因此,激活器传送对象密钥的先决条件是通过“链接系统”(即收银机或其他付款系统)接收到已经付款的通知。[0128] To realize the condition of satisfying the change inside the object, logically speaking, it is necessary to include one or more conditional events on the device outside the object. For example, an object, such as a calculator, may require an object key wirelessly transmitted from a nearby activator to close an electronic switch inside the object, thereby allowing the object's battery to power the object. If the correct key for the object is not received, the electronic switch remains open and the object cannot function (the utility of the object remains limited and the holder of the object cannot benefit from it). The first condition for the activator to obtain the correct object key from the NOC is to query the object and obtain the object ID. A possible further condition for the activator to transfer the object key obtained from the NOC to the object is that the consumer has paid for the object. Therefore, a prerequisite for the activator to transmit the object key is to receive notification that payment has been made through the "link system" (ie cash register or other payment system).

[0129]NOC也会使用对象ID来查询信息,而不使用与激活交易关联的对象密钥(例如生产批号、货运日期、发行日期、价格与交易有关的决策规则等)。这样,NOC可以实现一次或多次交易,并传送一个或多个相关信号到对象(或对象和激活器)。来自NOC或者激活器的信号也与来自或发送至链接系统(例如支付处理器)、经销商或者厂商(例如为了帐单和存货管理之用)及零售商等的信号进行提通信。在此所描述的信号(例如图8中的信号751)可能是一个或多个无源(如条形码)和有源的(如RF信号或电信号)信号;将一个或多个数据部件(例如,装置标识符和IP地址)组织成一个或多个分离开的(附属的或者独立的)通信。通信可能包括数据(模拟形式或数字形式的信息)和/或电源。如图所示,图中采用一个或多个符号(箭头)来强调数据流向和电源方向。不过在这里,符号的数目并不定义或者限制两个实体之间的通信数目,也不定义或限制其中数据元件或电源元件的数目。[0129] The NOC will also use the object ID to look up information rather than the object key associated with the activation transaction (eg, production lot number, shipment date, issue date, price and transaction-related decision rules, etc.). In this way, the NOC can implement one or more transactions and transmit one or more related signals to the object (or object and activator). Signals from the NOC or activator also communicate with signals from or to linked systems (such as payment processors), dealers or vendors (such as for billing and inventory management purposes), retailers, and the like. Signals described herein (eg, signal 751 in FIG. 8 ) may be one or more passive (eg, barcode) and active (eg, RF or electrical) signals; , device identifier and IP address) into one or more separate (affiliated or independent) communications. Communications may include data (information in analog or digital form) and/or power. As shown, one or more symbols (arrows) are used in the figure to emphasize the direction of data flow and power supply. Here, however, the number of symbols does not define or limit the number of communications between two entities, nor the number of data elements or power elements therein.

[0130]通常,对象是有形实体,而数据或内容则无形。例如,光盘是一个对象,但光盘内存储的内容(例如软件、电影、音乐等)却不是。所有对象都有可操作状态(如一张DVD或者插上电源的DVD播放机)。很多对象,包括大多数电动装置,也都有不可操作状态(如还在包装盒中的没有供电的DVD播放机)。对象也可能是激活的或未激活的。有意采用一种或多种方法来限制未激活对象,从而影响其效用。激活对象的效用(全部或者其中部分元件)通过实现对象效用的变更而被恢复或再造。[0130] Generally, objects are tangible entities, while data or content is intangible. For example, an optical disc is an object, but the content stored on the disc (such as software, movies, music, etc.) is not. All objects have an operational state (such as a DVD or a DVD player plugged in). Many objects, including most motorized devices, also have an inoperable state (such as an unpowered DVD player still in the box). Objects may also be active or inactive. Deliberately restricting an inactive object in one or more ways, thereby affecting its utility. The utility of the activated object (all or some of its components) is restored or recreated by implementing a change in the utility of the object.

[0131]激活对象就是恢复或再造对象效用的过程。不管是工作或非工作状态下的对象都可以和“激活装置”或模块合作来进行运作。不管是工作还是非工作状态,对象都可以被激活。限制对象效用的效应器(变更实现装置)可能被逆转、重复或者永久改变。在一些实例中,效应器(以及限制结果)可能被其他模块(如分路)部分或全部地否定。限制对象效用的效应器(变更实现装置)可能有一种或者多种。例如,效应器可能是一个将DVD播放机开/关电路连接到电源的电路中打开的电子开关。再如,效用器可能是可以干预DVD播放机读取DVD内容的DVD薄电光膜层。效应器还可能是逻辑或数据及其存储的内容。[0131] Activating an object is the process of restoring or recreating the utility of the object. Objects in both working and non-working states can operate in cooperation with "activators" or modules. Objects can be activated regardless of their working or non-working state. Effectors (change-implementing devices) that limit an object's utility may be reversed, repeated, or permanently altered. In some instances, effectors (and thus limiting consequences) may be partially or fully negated by other modules (such as shunts). There may be one or more effectors (change realization devices) that limit the utility of the object. For example, an effector might be an electronic switch that turns on in a circuit that connects a DVD player's on/off circuit to a power source. As another example, the effector might be a thin electro-optic film layer on a DVD that can interfere with the DVD player's ability to read DVD content. Effectors can also be logic or data and what they store.

[0132]能够改变对象效用的效应器(变更实现装置)往往在发货之前就由厂商进行了设置,不过也有可能由分销商或者系统集成人员来完成设置。也可以在对象进入顾客手中时自动执行(重复)设置,如,可自动解激活的光盘,当使用一段时间(如租借期)后,它可以自动倒退到非激活状态,使得DVD播放机无法读取其中的内容。[0132] Effectors (change implementers) capable of changing object utility are often set by the manufacturer before shipment, but may also be set by distributors or system integrators. It is also possible to automatically perform (repeat) settings when the object comes into the hands of the customer, e.g. a disc that can be automatically deactivated, and when used for a certain period of time (such as a rental period), it can automatically fall back to the inactive state, making the DVD player unreadable Get its contents.

[0133]对象可能是消费电子产品和计算机产品(DVD播放机、视频游戏机和控制台、电视、数码相机、电话、个人数字助理(PDA)、电池、计算器、计算机、打印机、传真机、监视器、便携式音乐和视频录放器、车载音响等等)、仪器和工具(特别电控的)以及手表等。对象也可能是诸如光盘(如CD,DVD)之类的媒体,例如,该媒体具有改变其光学特性的装置。对象也可能是系统部件和替换元件(如硬盘驱动器,存储卡等)。对象也可能是工具、机械等。[0133] Objects may be consumer electronics and computer products (DVD players, video game consoles and consoles, televisions, digital cameras, telephones, personal digital assistants (PDAs), batteries, calculators, computers, printers, fax machines, monitors, portable music and video recorders, car stereos, etc.), instruments and tools (especially electronically controlled), and watches. The object may also be a medium such as an optical disc (eg CD, DVD), for example, which has means for changing its optical properties. Objects may also be system components and replacement elements (such as hard drives, memory cards, etc.). Objects may also be tools, machinery, etc.

[0134]对象的效用经常是其主要功用(例如:收音机播放音乐、打印机打印、光盘存储由播放机或驱动器访问的数据等等)。本文中“效用”一词可理解为对象的任何使用、功能、特性等。对象的效用也可以理解为任何从产品中获取的效益(包括感官效益),尤其是那些被拒绝就会影响对象的使用或价值的效益。[0134] An object's utility is often its primary function (for example: a radio plays music, a printer prints, a disc stores data accessed by a player or drive, etc.). The term "utility" herein may be understood as any use, function, property, etc. of an object. The utility of an object can also be understood as any benefit (including sensory benefit) obtained from a product, especially those benefits whose rejection would affect the use or value of the object.

[0135]对象整合激活装置以有条件地实施响应于一个或多个外部信号而进行的一个或多个改变。部分或全部激活装置可以是原产品的补充。这些装置可被部分或全部移除。一般的激活装置包括:通信装置、条件逻辑(“逻辑”)、存储器、变更实现模块、电源和公共对象标识符(“对象ID”)。激活装置也可能包括一个隐藏或私有的密钥(“对象密钥”)和其他执行激活的必要元件(如确认对象激活状态的装置)。在某些情况下,激活装置可以只包括存有对象ID的存储器、实现变更的模块和电源,或者只包括实现变更的模块和电源。[0135] An object integrates activation means to conditionally implement one or more changes in response to one or more external signals. Some or all of the activation means may be a supplement to the original product. These devices can be partially or completely removed. Typical activation means include: communication means, conditional logic ("logic"), memory, change implementation modules, power, and a common object identifier ("object ID"). The activation device may also include a hidden or private key (the "object key") and other elements necessary to perform activation (such as means for confirming the activation status of the object). In some cases, the activator may include only the memory storing the object ID, the module and power supply that effect the change, or only the module and power source that effect the change.

[0136]对象的部件(如通信模块、电源、对象ID等等)通常附在对象上,尽管这些部件可以全部或部分地使用对象固有的元件。例如,计算器现有电池可做为一个电源,以避免需要辅助电池或用来从外部电源获取电能的模块。图22是整合了激活装置710的对象700的图式,包括:[0136] Components of the object (eg, communication module, power supply, object ID, etc.) are typically attached to the object, although these components may use, in whole or in part, elements inherent to the object. For example, a calculator's existing battery can be used as a power source to avoid the need for an auxiliary battery or module to draw power from an external power source. Figure 22 is a diagram of an object 700 incorporating an activation device 710 comprising:

通信模块 771;communication module 771;

逻辑 712;logic 712;

存储器 713;memory 713;

变更实现模块 714;change implementation module 714;

电源 715;power supply 715;

对象ID 716;Object ID 716;

对象密钥 717。Object key 717.

[0137]通信模块711实现包括数据或外部装置电源的通信。通信模块711可能是一个或多个有线的或无线的系统。例如,红外线(IR)和射频(RF)发送器/接收器。通信模块711也支持单向或双向通信。逻辑712包括实现对象内隐形或显性决策规则的模块,其通过与外部装置的通信,有条件地对对象进行更改。逻辑712使用从外部装置接收到的信号有效地确定实现何种变更(如果有的话)。逻辑712可以单独使用几种不同模块中的任一模块,或者将其组合,如电子开关、门阵列电路或微处理器等。存储器713可以存储数据、决策规则、指令等,并与对象700或者激活过程关联。例如,存储器713可能存有:厂商在发货前存储的信息(如产品代码、生产日期和批号代码等等)、运输过程中接收的信息(如分销商标识符、路径代码等等)或在对象激活时接收到的信息(如销售日期、零售商标识符、激活装置标识符、顾客信息和偏好、使用参数/选项——对象被使用的次数和时长)等。存储器713可以是集中的或分开的(如,对象ID 716和对象密钥717的存储装置与在运输过程中接收到的数据的存储装置相分离)。存储器713可能是可编程的、可写入的、可擦除的、或者只读的等等。存储器713可能是电子的或其他形式,例如条形码之类的光学可读标签。[0137] The communications module 711 enables communications including data or power to external devices. The communication module 711 may be one or more wired or wireless systems. For example, infrared (IR) and radio frequency (RF) transmitter/receivers. The communication module 711 also supports one-way or two-way communication. Logic 712 includes modules implementing implicit or explicit decision rules within objects that conditionally make changes to objects through communication with external devices. Logic 712 effectively determines what alterations, if any, to implement using signals received from external devices. Logic 712 may use any of several different modules alone or in combination, such as electronic switches, gate array circuits, or microprocessors. The memory 713 may store data, decision rules, instructions, etc., and be associated with the object 700 or the activation process. For example, the memory 713 may store information (such as product code, production date and batch code, etc.) stored by the manufacturer before shipment, information received during transportation (such as distributor identifier, routing code, etc. Information received upon object activation (e.g. date of sale, retailer identifier, activation device identifier, customer information and preferences, usage parameters/options - how many times and for how long the object has been used), etc. Storage 713 may be centralized or separate (e.g., storage of object ID 716 and object key 717 separate from storage of data received in transit). The memory 713 may be programmable, writable, erasable, or read-only, among others. Memory 713 may be in electronic or other form, such as an optically readable label such as a barcode.

[0138]变更实现模块714可能是一种或多种类型的结合。例如:电力/电子开关、机电锁、可编程/可擦除存储器、电光薄膜等,以及所有实现变更所必需的相关元件。变更实现模块714的工作可能根据逻辑712来进行。本发明实施例的一个重要方面就是激活对象,传送的激活信息的装置并不需要知道对象中集成了什么激活装置,以及如何实现变更,实现了何种变更或者如何影响对象的效用等等。电源715为激活装置710的部件(如通信模块711,逻辑712等)供电。电源715可能是诸如在厂商发货前充电的电池之类的能量存储。电源714可能是无线接收来自外部源的电能的模块,外部源诸如是接收RF广播或电磁辐射的天线。电源715也可能是用来接收外部源电能的电接触器。电源715可能是用来给激活装置710的部件供电的不同的获取、存储和发送的模块的组合。应当理解,电源715应包括给激活装置710的其他部件提供适当可用电能的必备部件。[0138] The change implementation module 714 may be a combination of one or more types. For example: power/electronic switches, electromechanical locks, programmable/erasable memories, electro-optic films, etc., and all related components necessary to implement changes. The work of change implementation module 714 may be performed according to logic 712 . An important aspect of the embodiment of the present invention is to activate the object. The device that transmits the activation information does not need to know what activation device is integrated in the object, how to implement the change, what kind of change is implemented, or how to affect the utility of the object. The power supply 715 supplies power to the components of the activation device 710 (such as the communication module 711, the logic 712, etc.). Power source 715 may be an energy storage such as a battery that is charged prior to shipment from the manufacturer. The power supply 714 may be a module that wirelessly receives power from an external source, such as an antenna that receives RF broadcasts or electromagnetic radiation. The power supply 715 may also be an electrical contactor for receiving electrical power from an external source. The power supply 715 may be a combination of different acquisition, storage and transmission modules used to power the components of the activation device 710 . It should be understood that the power supply 715 should include the necessary components to provide appropriate available electrical power to the other components of the activation device 710 .

[0139]对象ID 716关联于激活装置710和/或对象700。特定情况下,对象ID 716可能包括激活装置710和对象700共用的标识符。外部(公共)装置通常可访问对象ID 716。对象ID 716可能对激活装置710或对象700(如一串数字)是唯一的,或者是具有相似特征或属性的激活装置和对象所共有的,或者属于同一群体或级别的成员。对象ID 716可能包括存储在存储器713中的一个或多个数据。这种对象ID 716也可能存储在一种或多种不同类型存储器或者一个或多个位置上。对象ID 716还可能储存在对象700或者其包装(如装有计算机的盒体)中。对象ID可以直接连接对象700或激活装置700,也可以不直接连接到对象700或激活装置700。对象密钥717和对象ID 716相关联,并且不能被与共用的对象ID 716相对应的外部(私有)装置所访问。对象密钥717可能被储存在存储器713中,而且可能包括实现安全交易所需的多种数据和/或算法等。[0139] Object ID 716 is associated with activation device 710 and/or object 700. In certain cases, object ID 716 may include an identifier that is common to activation device 710 and object 700. Object ID 716 is generally accessible by external (public) devices. Object ID 716 may be unique to activation device 710 or object 700 (such as a string of numbers), or be common to activation devices and objects having similar characteristics or attributes, or members of the same group or class. Object ID 716 may include one or more data stored in memory 713. Such object ID 716 may also be stored in one or more different types of memory or in one or more locations. Object ID 716 may also be stored in object 700 or its packaging (such as a box housing a computer). The object ID may or may not be directly connected to the object 700 or the activation device 700 . The object key 717 is associated with the object ID 716 and cannot be accessed by external (private) devices corresponding to the shared object ID 716. The object key 717 may be stored in the memory 713, and may include various data and/or algorithms, etc. required to implement a secure transaction.

[0140]图23表示激活装置710另一种结构的实例。通信模块711的无线实施例(如RF发送器或接收器)和电源715放置在对象700外部。逻辑712、存储器713、实现变更模块714、对象ID 716和对象密钥717都放置在对象700的内部。内部和外部元件通过连接模块718互相连接。连接模块可能是电线、带状电缆等,或者连接模块连接到对象周边(如通过连接装有对象700的盒体的连接器)。[0140] FIG. 23 shows an example of another configuration of the activation device 710. A wireless embodiment of communication module 711 (such as an RF transmitter or receiver) and power supply 715 are placed external to object 700 . Logic 712, memory 713, implementation change module 714, object ID 716, and object key 717 are all placed inside object 700. The internal and external components are connected to each other through connection modules 718 . The connection module may be a wire, ribbon cable, etc., or the connection module may be connected to the perimeter of the object (eg, by connecting a connector to a box housing the object 700).

[0141]当例如对象的设计干预与外部装置的无线通信时,图23所示的可选配置是例如激活对象所必需的。大部分消费电子产品被特别设计成最小化RF传输。针对这个问题,使用无线通信模块的激活装置的功能元件可分布在在两个或更多个位置;其中一些在对象内部,而另一些在对象外部。[0141] The optional configuration shown in FIG. 23 is necessary, for example, to activate the object when, for example, the design of the object interferes with wireless communication with an external device. Most consumer electronics products are specifically designed to minimize RF transmissions. In response to this problem, the functional elements of the activation device using the wireless communication module can be distributed in two or more locations; some of them are inside the object and others are outside the object.

[0142]图23是激活装置的一个配置实例,假设其是带有激活装置710的DVD播放机(对象700)。电子开关(变更实现模块714)被整合在DVD的印刷电路板的一个电路(迹线)中,该电路板和电源的开关断开。从工厂运出时开关是开着的,并且当开关开着时,除非闭合开关,否则DVD播放机不会上电。逻辑712中包括的微控制器和存储器713与开关及带状电缆连接(连接模块718)。带状电缆插入安装在DVD播放机金属外壳上的多针(凸出)插孔中。插入插孔的是能从外部RF源接收数据和电能的RF收发器和变压器(通信模块711和电源715)。当包括数据和电能的RF信号被对象700外面的子系统(元件群)接收时,这些信号就被传递给内部子系统,所述子系统通过闭合开关来有条件地实现对象700中的效用变更,从而恢复DVD播放机的效用;当电源开关闭合时就会上电。通信模块711、电源715和连接模块718(或者其部件)的组合体可无关于其他系统元件而进行大批量生产。这样的一个优点是每个子系统都可以与其他无关地进行大批量生产。此外,也可以轻松地去除外部系统。[0142] FIG. 23 is a configuration example of an activation device, which is assumed to be a DVD player with an activation device 710 (object 700). The electronic switch (change implementation module 714) is integrated in a circuit (trace) of the printed circuit board of the DVD, which is disconnected from the switch of the power supply. The switch is left open when shipped from the factory, and when the switch is open, the DVD player will not power up unless the switch is closed. Microcontroller and memory 713 included in logic 712 are interfaced with switches and ribbon cables (connection module 718). The ribbon cable plugs into a multi-pin (male) jack mounted on the DVD player's metal housing. Plugged into the jack is an RF transceiver and transformer (communication module 711 and power supply 715) capable of receiving data and power from an external RF source. When RF signals including data and power are received by subsystems (groups of components) outside object 700, these signals are passed on to internal subsystems that conditionally effectuate utility changes in object 700 by closing switches , thereby restoring the utility of the DVD player; power is applied when the power switch is closed. The combination of communication module 711, power supply 715 and connection module 718 (or parts thereof) can be mass-produced independently of other system components. An advantage of this is that each subsystem can be mass-produced independently of the other. In addition, external systems can also be easily removed.

[0143]图24表示的是对象700和激活710的一个实施例,其中包括了存储器713、变更实现模块714、电源715和对象ID 716。例如,对象700是放在纸质光盘套内的光盘,该光盘套具有包括DVD产品代码(对象ID 716)的印刷条形码(存储器713)。将DVD适当放置在电源715的电磁场中,以实现电光薄膜的变更(变更实现模块714)来使对象从第一状态变化到第二状态。当处于第一状态时,电光薄膜阻止DVD播放机的激光头来访问DVD里的内容。而当处于第二状态(激活状态)时,电光薄膜则允许DVD播放机的激光头来读取DVD里的内容。或者,将电子开关放置在DVD机上或其内部。电子开关用于控制电光薄膜的状态。可以使用本文所述的其他实施例介绍的方式来实现和控制电子开关。[0143] FIG. 24 represents an embodiment of an object 700 and an activation 710, which includes a memory 713, a change implementation module 714, a power source 715, and an object ID 716. For example, object 700 is an optical disc placed in a paper disc sleeve with a printed barcode (memory 713) including the DVD product code (object ID 716). The DVD is appropriately placed in the electromagnetic field of the power source 715 to effect a modification of the electro-optic film (alteration realization module 714) to change the object from a first state to a second state. When in the first state, the electro-optic film prevents the laser head of the DVD player from accessing the contents of the DVD. When in the second state (activated state), the electro-optic film allows the laser head of the DVD player to read the contents of the DVD. Alternatively, place the electronic switch on or inside the DVD player. Electronic switches are used to control the state of the electro-optic film. Electronic switches may be implemented and controlled in the manner described in other embodiments described herein.

[0144]图25表示激活器720。激活器720是一种装置,用于激活对象700;传输诸如图1-3中所示的激活装置之一的激活装置的数据和/或者电能;实现决策规则和安全;调解其他装置及系统和激活装置710之间的通信;以及支持用户进行交互等。激活器720的效用可能包括在单一实体或复合实体中,也可能根据应用而进行不同设置。激活器720也可能被整合进诸如条形码扫描器或其他激活发生地址常用装置之类的装置或者与其处于同一地点。例如,零售点的结帐柜台的激活器720通常被固定,通过115V(在美国)AC电源进行供电,并经由有线连接与NOC和/或诸如收银机之类的链路系统进行通信。然而,用于媒体/顾客中心应用的激活器720也可以是移动的、由电池供电的,并且和NOC进行无线通信。[0144] FIG. 25 shows the activator 720. Activator 720 is a device that activates object 700; transmits data and/or power to an activation device such as one of the activation devices shown in FIGS. 1-3; implements decision rules and security; mediates other devices and systems and activating communication between devices 710; and supporting user interaction, etc. The utility of the activator 720 may be included in a single entity or a composite entity, or may be configured differently depending on the application. The activator 720 may also be integrated into or co-located with a device such as a barcode scanner or other commonly used device where activation occurs. For example, an activator 720 at a checkout counter at a retail location is typically stationary, powered by a 115V (in the US) AC power source, and communicates via a wired connection with the NOC and/or a linked system such as a cash register. However, the activator 720 for media/customer centric applications may also be mobile, battery powered, and in wireless communication with the NOC.

[0145]独立于特定的系统实施例(如零售商、媒体/客户),激活器720包括邻近通信模块721、处理器722、存储器723,以及电源724。激活器720可能更进一步包括以下各项中的一项或几项:[0145] Independent of the particular system embodiment (eg, retailer, media/customer), activator 720 includes proximity communication module 721, processor 722, memory 723, and power supply 724. The activator 720 may further include one or more of the following:

标识符(“激活ID”) 725;identifier("Activation ID") 725;

激活器密钥 726;activator key 726;

通用通信模块 727;General communication module 727;

输入模块 728;input module 728;

可视输出模块 729;visual output module 729;

安全模块 730。Security module 730.

[0146]邻近通信模块721用来将数据和/或电力传送给激活装置710。邻近通信模块721可以支持一个或多个有线和无线方式,包括但不限于IR、UV、RF、电磁、声、电感应(借助直接接触)等。例如,电磁辐射可用于传送电力至激活装置710而RF用于用相同或不同的信号收发数据或数据及电力的组合。处理器722通常是通用微处理器或者特定用途集成电路或其他适合处理数据和指令的装置。当激活器726集成到销售点系统时,处理器722可以其他装置(激活器的其他元件)共享例如扫描仪或收银机等。[0146] The proximity communication module 721 is used to communicate data and/or power to the activation device 710. Proximity communication module 721 may support one or more wired and wireless means, including but not limited to IR, UV, RF, electromagnetic, acoustic, electrical induction (via direct contact), and the like. For example, electromagnetic radiation may be used to transmit power to the activation device 710 while RF is used to transmit and receive data or a combination of data and power with the same or different signals. Processor 722 is typically a general-purpose microprocessor or an application-specific integrated circuit or other suitable device for processing data and instructions. When the activator 726 is integrated into a point-of-sale system, the processor 722 may be shared with other devices (other elements of the activator), such as a scanner or cash register, etc.

[0147]存储器723通常是电子的,并且可以是可编程的、可写入的、可擦除的或只读的。存储在存储器723中的信息可以是暂时或永久的,其可以包括与激活器720、激活装置720、NOC及链路系统和交易等相关联的数据、决策规则、指令等。例如,存储器723可能包括厂商在运输前存储的信息(如,激活器ID 725,激活器密钥726、产品代码、生产日期和批号)。存储器723也可能包括与零售商或仓储前台有关的信息(如,零售商和仓储前台标识符、零售商专用产品/存货代码等)。存储器723还可能包括网络和拨号电话地址,用于与NOC和链路系统(如,收银机或条形码扫描仪)进行通信。存储器723也可能包括对象密钥。存储器723还可能包括和交易相关的信息(如,授权、激活和确认历史、经过时间等)。存储器723也可能包括从输入模块728(如,读卡器,键盘等)接收的信息。[0147] Memory 723 is typically electronic, and may be programmable, writable, erasable, or read-only. The information stored in memory 723 may be temporary or permanent, and may include data, decision rules, instructions, etc. associated with activator 720, activation device 720, NOC and link systems and transactions, and the like. For example, memory 723 may include information (e.g., activator ID 725, activator key 726, product code, date of manufacture, and batch number) stored by the manufacturer prior to shipment. Memory 723 may also include information related to retailers or warehouse fronts (eg, retailer and warehouse front identifiers, retailer specific product/stock codes, etc.). Memory 723 may also include network and dial-up telephone addresses for communicating with the NOC and linked systems such as cash registers or barcode scanners. Memory 723 may also include object keys. Memory 723 may also include transaction-related information (eg, authorization, activation and validation history, elapsed time, etc.). Memory 723 may also include information received from input modules 728 (eg, card readers, keypads, etc.).

[0148]尽管在某些诸如媒体/顾客应用(参见XYZ)之类应用中,是由电池供电,但电源724通常是715V(在美国)AC电源。激活器ID 725和激活器720相关联,并且通常可由外部装置(如,激活装置720、NOC或者链路系统)进行访问。激活器ID 725可能是激活器720唯一的ID或者是一组或一个级别装置的共用ID,例如和其他激活器一起属于一个特定商店或零售商。激活器ID 725通常存储在电存储器中。激活器密钥726是存储在激活器720中的数据,相对于通常可由外部装置访问的激活器ID 725(公有),激活器密钥726不能被外部装置访问(私有)。通常激活器密钥726是和激活器ID 725相关的数据,尽管其可能在后来被存储或改变,但该密钥可能和激活器ID 725同时存储在激活器720中。激活器密钥726也可能是与零售商、商店、分销商或外部装置或系统(如激活器)相关的或特定的数据。[0148] Power source 724 is typically a 715V (in the US) AC power source, although in some applications, such as media/consumer applications (see XYZ), battery powered. The activator ID 725 is associated with the activator 720 and is generally accessible by an external device (e.g., the activator 720, NOC, or link system). The activator ID 725 may be an ID unique to the activator 720 or a common ID for a group or class of devices, such as belonging to a particular store or retailer with other activators. Activator ID 725 is typically stored in electronic memory. The activator key 726 is data stored in the activator 720 that cannot be accessed by external devices (private), as opposed to the activator ID 725 (public), which is generally accessible by external devices. Typically the activator key 726 is data associated with the activator ID 725, although it may be stored or changed later, the key may be stored in the activator 720 at the same time as the activator ID 725. Activator key 726 may also be data associated or specific to a retailer, store, distributor, or external device or system such as an activator.

[0149]通用通信模块727是用于与外部装置且经常是诸如NOC或者链路系统之类的装置外的装置和系统进行通信的模块。通用通信模块727可支持局域和广域有线和/或无线网络。例如,通用通信模块726可以支持连接到广域电信网络(例如因特网或者虚拟专用网)的局域802.11无线网络,从而与远程NOC进行通信。[0149] The general communication module 727 is a module for communicating with external devices and often devices and systems outside the device such as NOC or link system. The general purpose communication module 727 can support local and wide area wired and/or wireless networks. For example, the general communication module 726 may support a local area 802.11 wireless network connected to a wide area telecommunications network such as the Internet or a virtual private network to communicate with a remote NOC.

[0150]输入模块728包括从已经访问了激活器720的人员(如,顾客、用户或者员工)那里接收输入的任意模块。例如是键盘、读卡器、生物计量传感器/扫描仪等等。经由输入模块728接收的输入可以存储在激活器720中和/或被激活器720使用,以实现交易或将其传送至对象700、NOC或者合适的链路系统中。激活器720还可以具有输出模块729,从而将信息传输给与激活器720进行交互的人员(例如,顾客、用户和员工)。输出模块729可能部分包括一个或多个装置,这些装置诸如是液晶显示器(LCD)、发光二极管(LED)、阴极射线管(CRT)及打印机等。[0150] Input module 728 includes any module that receives input from a person (eg, a customer, user, or employee) who has accessed activator 720. Examples are keyboards, card readers, biometric sensors/scanners, etc. Inputs received via the input module 728 may be stored in and/or used by the activator 720 to effectuate the transaction or communicate it to the object 700, the NOC, or a suitable link system. The activator 720 may also have an output module 729 to transmit information to persons interacting with the activator 720 (eg, customers, users, and employees). The output module 729 may include in part one or more devices such as liquid crystal displays (LCDs), light emitting diodes (LEDs), cathode ray tubes (CRTs), printers, and the like.

[0151]激活器也可能具有安全模块730,所述安全模块730用于在激活器720实现安全,特别是阻止未经授权的访问。安全模块730可以是物理上锁定的装置。安全模块730也可以是用于确定激活器720地理位置的模块(如GPS的应答器)。安全模块730可以有条件地(如与时间或信号相关)与其他装置或系统进行通信,这些装置或系统比如是收银机、局域网服务器或者NOC 740。[0151] The activator may also have a security module 730 for implementing security at the activator 720, in particular preventing unauthorized access. Security module 730 may be a physically locked device. The security module 730 may also be a module for determining the geographic location of the activator 720 (eg, a GPS transponder). The security module 730 may conditionally (eg, time or signal dependent) communicate with other devices or systems, such as a cash register, LAN server, or NOC 740.

[0152]图26表示可以实现交易的NOC 740。NOC 740是计算机系统,部分包括处理器742、存储器742和通信模块743。通常,NOC 740远离激活器720和对象740被激活的位置。但是,NOC 740也可以在激活器和激活地点(如零售店)附近。此外,NOC 740实现的某种性能或功能,尤其是对象密钥713的存储,可以分散在不同的地址和装置(如零售商、店面、销售点系统、激活器等)中。NOC 740可以利用从不同实体以及不同的装置和系统接收的数据、决策规则等来接收、存储并实现交易,这些不同的实体包括但不限于对象厂商、分销商、零售商、付款处理器、顾客等;这些不同的装置和系统例如是对象、激活器和链路系统。可以经由有线或无线电信网络与这些实体、装置和系统进行通信。[0152] FIG. 26 shows a NOC 740 that can effectuate transactions. NOC 740 is a computer system, including in part a processor 742, a memory 742, and a communication module 743. Typically, NOC 740 is remote from where activator 720 and object 740 are activated. However, the NOC 740 can also be near the activator and the location of activation, such as a retail store. Furthermore, certain capabilities or functions implemented by the NOC 740, especially the storage of the object key 713, may be distributed among different locations and devices (such as retailers, storefronts, point-of-sale systems, activators, etc.). NOC 740 may receive, store and effectuate transactions utilizing data, decision rules, etc. received from various entities including, but not limited to, target vendors, distributors, retailers, payment processors, customer etc.; these different devices and systems are eg objects, activators and link systems. Communication with these entities, devices and systems can be via wired or wireless telecommunications networks.

[0153]图27表示链路系统750,包括处理器745、存储器746和通信模块747。链路系统750可能临近激活器720或者与其在同一位置,也可能远离激活器720。链路系统例如是收银机、信用/借记卡付款处理系统和存货系统。[0153] FIG. The link system 750 may be adjacent to or co-located with the activator 720, or it may be remote from the activator 720. Link systems are, for example, cash registers, credit/debit card payment processing systems, and inventory systems.

[0154]图28表示用来激活对象700的系统A示意图。系统A包括:[0154] FIG. 28 shows a schematic diagram of a system A for activating an object 700. System A includes:

对象700(包括激活装置710);object 700 (including activation means 710);

激活器 720;activator 720;

邻近通信 750。Proximity Communications 750.

[0155]邻近通信750用于在对象700和激活器720之间传送数据和/或电能。邻近通信750可能是单向或双向的,并且使用一种或多种有线或无线的通信方法。邻近通信750可由通信模块715(对象700)或者邻近通信模块721(激活器720)发起。例如,邻近通信750可能通过将对象700移到电磁场或RF场内、将对象700放在红外传感器前、或直接和激活器720接触(如用电子或机械接触)而发起。邻近通信750也可由邻近通信模块721通过广播由通信模块711(对象700)所接收的RF信号而发起。邻近通信750也可由激活器720从链路系统接收输入而发起,这种链路系统比如是条形码阅读机、收银机或媒体播放器。[0155] Proximity communication 750 is used to transfer data and/or power between object 700 and activator 720. Proximity communication 750 may be one-way or two-way, and use one or more wired or wireless communication methods. Proximity communication 750 may be initiated by communication module 715 (object 700) or proximity communication module 721 (activator 720). For example, proximity communication 750 may be initiated by moving object 700 into an electromagnetic or RF field, placing object 700 in front of an infrared sensor, or making direct contact (eg, electronically or mechanically) with activator 720 . Proximity communication 750 may also be initiated by proximity communication module 721 by broadcasting RF signals received by communication module 711 (object 700). Proximity communication 750 may also be initiated by activator 720 receiving input from a linked system, such as a bar code reader, cash register, or media player.

[0156]图29表示的是系统A的第一个实施例,该系统可激活包括激活装置710的对象700。在系统A的一个实例中,激活器720接收包括对象ID 716的通信751,其中,对象ID 716用于将对象700与存储在存储器723中的数据和/或决策规则相关联。激活器720(处理器722)执行决策规则并用邻近通信模块727传送正确的激活信号752。对象700用通信模块711接收通信752。逻辑712实现条件逻辑和存储值(存储器713)并且适当启动实现对象700改变的变更实现模块714。[0156] FIG. 29 shows a first embodiment of a system A for activating an object 700 comprising an activation device 710. In one example of system A, activator 720 receives communication 751 including object ID 716, wherein object ID 716 is used to associate object 700 with data and/or decision rules stored in memory 723. The activator 720 (processor 722 ) executes the decision rules and communicates the correct activation signal 752 with the proximity communication module 727 . Object 700 receives communication 752 with communication module 711 . Logic 712 implements conditional logic and stores values (memory 713) and initiates change implementation modules 714 that implement changes to object 700 as appropriate.

[0157]激活器720可以向对象700询问对象ID 716。或者,激活器720可以接收对象716的广播或者由对象700经由通信模块711提供的信号。系统A的一个实例是零售系统,在该系统中,只有属于特地零售商的产品才可以由零售店(在零售店里有零售商、临近的对象以及付款台)里的激活器720激活。在这个实例中,激活器720接收来自对象700的信号751,其中对象700包括对象ID 716,对象ID 716用于将对象700标识成属于特定零售商(例如,零售商代码)。如果激活器720确认对象ID 716属于激活器720被授权激活的零售商,则激活器720就发送包括零售代码的激活信号(通信752)。对象700接收信号752并将零售代码和存储器713中所存储的值进行比较。如果二者相匹配,例如,处理器逻辑712就会启动变更实现模块714,例如来闭合电路,以使对象700正常工作(恢复其效用)。上文实例中提到的电源715可能是内部电池或外部电源(比如通信752)。[0157] The activator 720 may query the object 700 for the object ID 716. Alternatively, the activator 720 may receive a broadcast by the object 716 or a signal provided by the object 700 via the communication module 711 . An example of System A is a retail system where only products belonging to a specific retailer can be activated by the activator 720 in a retail store (where there is a retailer, an adjacent object, and a checkout station). In this example, activator 720 receives signal 751 from object 700, wherein object 700 includes object ID 716, which is used to identify object 700 as belonging to a particular retailer (e.g., a retailer code). If the activator 720 confirms that the object ID 716 belongs to a retailer that the activator 720 is authorized to activate, then the activator 720 sends an activation signal including the retail code (communication 752). Object 700 receives signal 752 and compares the retail code to the value stored in memory 713 . If there is a match, for example, processor logic 712 initiates change implementation module 714, eg, to close a circuit, so that object 700 works properly (restores its utility). The power source 715 mentioned in the examples above may be an internal battery or an external power source (such as communication 752).

[0158]图30表示系统B,系统B能够激活对象700(具有激活装置710),传送相关信息(通信753)至链路系统750。通信753可能包括一个或多个按照串行或并行方式传送给一个或多个链路系统的数据(未显示)。[0158] FIG. 30 represents a system B capable of activating an object 700 (with activation means 710), transmitting relevant information (communication 753) to a link system 750. Communication 753 may include one or more data transfers (not shown) in serial or parallel to one or more link systems.

[0159]通信753可以包括:与对象700相关的数据,和/或与激活器720相关的数据(例如激活器ID 725)。比如,通信753可以包括一个对象标识符716,其可以被连接系统750接收(例如收银机),从而实现金融交易(即向客户收取对象700的费用)并更新存货目录。一个具体的例子是,通信753模拟通常由条形码扫描器读取的条形码。通信753可以依赖于通信752的通信(例如,在通信753之前,激活信号已经被发送到对象700了,其中链路系统750使用通信753,从而向顾客收费),或通信752依赖于通信753的通信(如在激活对象700前向客户收取对象716的费用)。通信753可包括与对象700激活相关的数据,这些数据经由激活器720从对象700之外的其他来源获得(例如经由输入模块728输入的员工标识符或促销代码)。系统B的另一个例子是通信753包括与对象700的激活相关的系统,其中对象700与链路系统750通信,链路系统750是对象700的厂商或分销商的(比如用于存货/生产管理、审计等的)计算机系统。[0159] Communication 753 may include data related to object 700, and/or data related to activator 720 (e.g., activator ID 725). For example, communication 753 may include an object identifier 716, which may be received by connected system 750 (eg, a cash register) to effect a financial transaction (ie, charge a customer for object 700) and update an inventory. A specific example is that communication 753 simulates a barcode that is typically read by a barcode scanner. Communication 753 may be dependent on communication of communication 752 (e.g., an activation signal has been sent to object 700 prior to communication 753, wherein link system 750 uses communication 753, thereby billing the customer), or communication 752 may be dependent on communication 753. Communication (eg, billing the client for object 716 prior to activating object 700). Communications 753 may include data related to activation of object 700 obtained via activator 720 from sources other than object 700 (eg, employee identifiers or promotional codes entered via input module 728 ). Another example of system B is that communication 753 includes systems related to the activation of object 700, where object 700 communicates with link system 750, which is the manufacturer or distributor of object 700 (such as for inventory/production management , auditing, etc.) computer systems.

[0160]图31表示的是能够激活对象700的系统B的另一个实施例(具有激活装置710),在此系统中,激活通信(通信752)依赖于来自链路系统750的通信754。举例来说,通信752可依赖激活器720接收信号,该信号表示金融交易已由链路系统750完成,例如,客户在对象700激活之前就已经为所购买的对象700付了款。[0160] FIG. 31 shows another embodiment of a system B capable of activating an object 700 (with activation device 710), in which activation communication (communication 752) is dependent on communication 754 from link system 750. For example, communication 752 may rely on activator 720 receiving a signal that a financial transaction has been completed by link system 750, eg, that a customer has paid for an object 700 purchased before object 700 is activated.

[0161]系统B的另一个例子是一种系统,其中通信752依赖激活器720从链路系统750(存货系统)中接收通信754,确认存货中可供出售的对象700的数量。[0161] Another example of System B is a system in which communication 752 relies on activator 720 receiving communication 754 from link system 750 (inventory system) confirming the quantity of object 700 available for sale in inventory.

[0162]系统B的再一个例子是,其中对象700为受限类物品,比如适合成年人观看的电影(例如R级DVD)或者是分年龄级别的电子游戏。在这种情况下,链路系统750通过通信753接收对象ID 716,以决定在进行通信754之前是否需要其他输入(比如员工标识符或顾客生日)。同样的条件逻辑也可以通过激活器720完成,可通过人工输入或刷卡等,在激活器720处或链路系统750处获得员工输入。在系统B的另一个例子中,对象700的改变有条件地取决于通信752(比如以下一些变量:对象的激活时间段、对象的使用次数、可访问的内容、被激活的功能等),而通信752又有条件地取决于通信754中所包括的变量。[0162] Yet another example of system B is where object 700 is a restricted class of item, such as a movie suitable for adults (eg, an R-rated DVD) or an age-rated video game. In this case, link system 750 receives object ID 716 via communication 753 to determine whether additional input (such as an employee identifier or customer birthday) is required before communicating 754. The same conditional logic can also be accomplished through the activator 720, and employee input can be obtained at the activator 720 or at the link system 750 through manual input or card swiping. In another example of system B, the change of the object 700 conditionally depends on the communication 752 (such as some of the following variables: the activation time period of the object, the number of times the object is used, the accessible content, the function to be activated, etc.), and Communication 752 in turn conditionally depends on variables included in communication 754 .

[0163]除激活装置710之外,对象700还可以集成一个装置,用以决定某一对象中预期的变化是否发生(比如检查某一电路是否闭合,或者测量对象的电学或光学属性)。这种装置可以包括在对象700之内并与激活器720进行通信。该装置还可以位于对象700和激活器720之间(比如一个跨越对象和激活器的并在激活器中被检测/测量到的电路)。这种装置还可以连接到对象中的条件或布尔逻辑(比如如果测量值超过某一阈值,就向激活器发送信号),激活器向链路系统(收银机)等发送确认信号。使用从NOC接收的信息(数值或决策规则等)来实现条件逻辑。[0163] In addition to the activation device 710, the object 700 may also incorporate a device for determining whether an expected change in an object has occurred (such as checking that an electrical circuit is closed, or measuring an object's electrical or optical properties). Such a device may be included within object 700 and in communication with activator 720 . The device may also be located between the subject 700 and the activator 720 (eg, a circuit spanning the subject and the activator and being detected/measured in the activator). Such a device can also be connected to conditional or Boolean logic in the object (such as sending a signal to an activator if a measurement exceeds a certain threshold), which sends a confirmation signal to a link system (cash register), etc. Conditional logic is implemented using information received from the NOC (values or decision rules, etc.).

[0164]图32表示系统B的一个具体实例,其中通信753依赖于激活器720,所述激活器720(从决定对象700的可变特征的装置)接收通信751a,通信751a可以校验对象700是否已被改变(激活)。比如,收银机(链路系统750)接收通信753,依赖于激活器720接收通信751a,在向顾客收取对象700的付款之前,确认对象700已经被激活。FIG. 32 shows a specific example of system B, wherein communication 753 relies on activator 720, which receives communication 751a (from the device that determines the variable characteristics of object 700), which can verify object 700 has been changed (activated). For example, the cash register (link system 750) receives communication 753, relies on activator 720 to receive communication 751a, and confirms that object 700 has been activated before charging the customer for object 700.

[0165]图33表示系统C,系统C能够激活对象700(具有激活装置720),并包括对象700、激活器720和NOC 740。系统C的实例是一种系统,其中激活器720通过通信751收到对象ID 716。激活器720把包括对象ID 716的通信755传送至NOC 740。NOC 740收到通信755,然后通过与对象ID 716的关联来查询对象密钥717。NOC 740把部分包括对象密钥717的通信756传送至激活器720。收到通信756后,激活器720就传送其中部分包括有对象ID 713的激活通信(通信752)。对象700通过通信752接收到对象密钥716,逻辑712用对象密钥716来激活变更实现模块714,以此实现对象700中的变化。在系统C的另外一个例子中,通信755包括一个激活器ID 725,NOC 740用这个ID来认证激活器720。在系统C另一个的例子中,通信755包括有来自输入模块728的输入(比如用户身份证号码或PIN码,或信用卡刷卡等),NOC 740以此来有条件地实现通信756。[0165] FIG. 33 represents a system C capable of activating an object 700 (with an activation device 720) and comprising an object 700, an activator 720 and a NOC 740. An example of System C is a system in which activator 720 receives object ID 716 via communication 751. Activator 720 transmits communication 755 including object ID 716 to NOC 740. NOC 740 receives communication 755 and then queries object key 717 through association with object ID 716. NOC 740 transmits part of communication 756 including object key 717 to activator 720. Upon receipt of communication 756, activator 720 transmits an activation communication that partially includes object ID 713 (communication 752). Object 700 receives object key 716 via communication 752 , and logic 712 uses object key 716 to activate change implementation module 714 to implement changes in object 700 . In another example of System C, communication 755 includes an activator ID 725, which is used by NOC 740 to authenticate activator 720. In another example of the system C, the communication 755 includes input from the input module 728 (such as user ID number or PIN code, or credit card swiping, etc.), and the NOC 740 uses this to conditionally realize the communication 756.

[0166]图34表示系统D,在系统D中,通信753有条件地依赖于通信756。比如,通信756内可以包括链路系统750要收取顾客的价格的信息(借助激活器720,作为通信753进行传送)。通信753可以有条件地依赖于通信756,而通信756继而又有条件地依赖于通过通信755收到的激活器ID 725。比如,链路系统750要收取顾客的费用依赖于对象700和零售商(与激活器ID 725相关)。[0166] FIG. 34 shows System D in which communication 753 is conditionally dependent on communication 756. For example, communication 756 may include information (transmitted as communication 753 via activator 720) of the price that link system 750 is to charge the customer. Communication 753 may be conditionally dependent on Communication 756 which in turn is conditionally dependent on Activator ID 725 received via Communication 755. For example, it is up to the object 700 and the retailer (associated with the activator ID 725) that the link system 750 charges the customer.

[0167]通信756可能包括其他关于对象700的数据,这些数据供激活器720使用,在NOC 740传送授权代码(对象密钥717)时,用于实现交易(比如对象700的价格或费用)。通信753、通信754、通信755和通信756可以单独使用,也可以结合起来使用,从而用于识别、认证或者授权激活器720来阻止未经授权的使用。比如,NOC 740或者链路系统750可以通过一些方法来确保安全,这些方法例如,如果激活器没有首先被识别、验证并授权,则拒绝激活器要求参与交易的请求(例如提供对象密钥)。除了以此(比如,激活器密钥726)为目的的特定数据和算法之外,也可以使用其他模块(比如GPS发送机和接收机,相对和绝对时间信号等)。[0167] Communication 756 may include other data about object 700 that is used by activator 720 to effectuate a transaction (such as a price or fee for object 700) when NOC 740 transmits an authorization code (object key 717). Communication 753, communication 754, communication 755, and communication 756 may be used individually or in combination to identify, authenticate or authorize activator 720 to prevent unauthorized use. For example, NOC 740 or link system 750 may ensure security by methods such as denying an activator's request to participate in a transaction (e.g., providing an object key) if the activator has not first been identified, authenticated, and authorized. Besides specific data and algorithms for this purpose (eg activator key 726), other modules (eg GPS transmitter and receiver, relative and absolute time signals, etc.) may also be used.

[0168]图35表示系统D,其中通信756有条件地依赖于通信754;比如,NOC 740传送对象密钥716取决于NOC 740收到的通知,该通知为已经在链路系统750中(通过激活器720)支付了款项。在系统D的另一个实例中,通信752有条件地依赖于通信754和通信756;比如,激活器720只在接收到通信754和通信756两者之后才开始通信751。Fig. 35 shows system D, wherein communication 756 is conditionally dependent on communication 754; for example, NOC 740 transfer object key 716 depends on the notification that NOC 740 receives, and this notification is already in link system 750 (via The activator 720) makes the payment. In another example of system D, communication 752 is conditionally dependent on communication 754 and communication 756 ; eg, activator 720 initiates communication 751 only after receiving both communication 754 and communication 756 .

[0169]图36表示系统E,其中NOC 740从链路系统750接收到通信757。通信757可能包括来自对象700(比如对象ID 716)、激活器720(比如激活器ID)以及链路系统750(比如是否已付款的通知)的数据。通信758可能包括用于链路系统750(比如购买确认)、激活器720(例如激活器密钥726)和对象700(比如对象密钥717)的数据。[0169] FIG. 36 shows System E, wherein NOC 740 receives communication 757 from link system 750. Communication 757 may include data from object 700 (such as object ID 716), activator 720 (such as activator ID), and link system 750 (such as notification of whether payment has been made). Communication 758 may include data for link system 750 (eg, purchase confirmation), activator 720 (eg, activator key 726 ), and object 700 (eg, object key 717 ).

[0170]图37表示系统F,其中对象700包括对象ID 716和对象密钥717,该对象700被从厂商760传输(传输761)到商店770并在商店被激活。厂商760经由通信762将对象ID 716和对象密钥717发送到NOC 740。通信762通常经由电信网络。为了在商店770中激活对象700,对象被放置在接近激活器720的地方,激活器720和NOC740可通信地连接。经由通信751,激活器720从对象700处获得对象ID 716,并经由通信755把对象ID 716传送至NOC 740。NOC 740在存储器742中查找与对象ID 716相关联的对象密钥717,其中存储器至少部分包括经由通信762从厂商760所获得的信息。NOC 740经由通信756把对象密钥717传送至激活器720,激活器720继而经由通信752将对象密钥717传送至对象700。对象700中的逻辑712把激活器720传送的对象密钥717和存储在存储器713中的对象密钥717进行比较,如果二者匹配,那么逻辑712就会激活变更实现装置714,其随后将对象700恢复效用。[0170] FIG. 37 represents System F, wherein an object 700 comprising an object ID 716 and an object key 717 is transmitted (transmission 761) from a vendor 760 to a store 770 and activated at the store. Vendor 760 sends Object ID 716 and Object Key 717 to NOC 740 via communication 762. Communication 762 is typically via a telecommunications network. To activate object 700 in store 770, the object is placed in proximity to activator 720, which is communicatively connected to NOC 740. Activator 720 obtains object ID 716 from object 700 via communication 751 and transmits object ID 716 to NOC 740 via communication 755. NOC 740 looks up object key 717 associated with object ID 716 in memory 742, wherein the memory includes at least in part information obtained from vendor 760 via communication 762. NOC 740 communicates object key 717 to activator 720 via communication 756, which in turn communicates object key 717 to object 700 via communication 752. The logic 712 in the object 700 compares the object key 717 transmitted by the activator 720 with the object key 717 stored in the memory 713, and if the two match, the logic 712 activates the change implementer 714, which then converts the object 700 recovery utility.

[0171]图38表示系统G,该系统G是系统F的扩展实施例,它包括链路系统750(比如收银机),链路系统750与商店770中的激活器720可通信地相连接;系统G更进一步包括在NOC 740和厂商760之间的通信764。通信764可以包括与激活厂商706的对象相关的数据。[0171] FIG. 38 shows System G, which is an extended embodiment of System F and includes a link system 750 (such as a cash register) communicatively connected to an activator 720 in a store 770; System G further includes communication 764 between NOC 740 and vendor 760. Communications 764 may include data related to objects that activate vendor 706 .

[0172]图39表示系统H,其中包括对象ID 716和对象密钥717的对象700,通过零售分销渠道771,从厂商760传输到顾客住宅772中。零售分销渠道771可能由多个实体和地点构成,以适应不同的顾客零售模式,包括因特网/电话/邮购以及传统实体商店(bricks-and-mortar)的零售方式。系统H更进一步包括可通信地连接到NOC 773的链路系统773。链路系统773可能是对象700的零售商的计算机系统,并且包括与激活交易有关的顾客信息(比如授权购买)并经由通信763传送至NOC。[0172] FIG. 39 shows a system H in which an object 700 including an object ID 716 and an object key 717 is transported from a vendor 760 to a customer's residence 772 through a retail distribution channel 771. Retail distribution channel 771 may consist of multiple entities and locations to accommodate different customer retail models, including Internet/telephone/mail order as well as traditional bricks-and-mortar retailing. System H further includes a link system 773 communicatively connected to NOC 773. Link system 773 may be the computer system of the retailer of object 700 and includes customer information related to activating the transaction (such as authorizing a purchase) and communicates via communication 763 to the NOC.

[0173]图40表示在包装780内的对象700(例如简装DVD盒子里的DVD,纸板箱内的计算机等)。图41表示一个或多个通信,这些通信涉及桥接或穿过包装780并且在对象700和外部装置之间进行通信(数据和/或能量)。这种通信可以是无线或有线的介质或装置,也可以是各种适合中继数据和/或能量的不同的介质或装置的组合,这些介质或装置包括:导线、带状电缆、明窗或透镜(可见光、IR、UV辐射);RF、声音、电磁发送器/接收器、天线、整流器、能量辐射源(如发光二极管)。比如,通信781可以通过电磁场无线传输能量。通信782可以通过RF无线传输数据和能量。通信783和784可经由采用桥接包装的方法的线缆传输数据和能量。通信783和784可能通过不同的方法,比如有线/电子的(183)和UV(184)方法,或者RF(183)和电子/有线的(184)方法。[0173] FIG. 40 shows an object 700 within a package 780 (eg, a DVD in a compact DVD case, a computer in a cardboard box, etc.). Figure 41 represents one or more communications that involve bridging or passing through wrapper 780 and communicating (data and/or energy) between object 700 and an external device. Such communication may be by wireless or wired media or means, or a combination of various media or means suitable for relaying data and/or energy, including: wires, ribbon cables, open windows or Lenses (visible light, IR, UV radiation); RF, acoustic, electromagnetic transmitters/receivers, antennas, rectifiers, sources of energy radiation (e.g. light-emitting diodes). For example, communication 781 may transmit energy wirelessly through electromagnetic fields. Communication 782 may transmit data and power wirelessly via RF. Communications 783 and 784 may transmit data and power via cables using a bridge-pack approach. Communications 783 and 784 may be by different methods, such as wired/electronic (183) and UV (184) methods, or RF (183) and electronic/wired (184) methods.

[0174]图42表示在包装780内的对象700,包装780上或包装780中包括存储器713的分布元件。这种配置中的存储器713可能包括用以激活对象700的对象ID 716或者其他信息,这些信息按照诸如打印条形码或者RFID标签的形式存储。[0174] FIG. 42 shows an object 700 within a package 780, on or in which package 780 includes distributed elements of memory 713. The memory 713 in this configuration may include an object ID 716 or other information used to activate the object 700, stored in the form of, for example, a printed barcode or RFID tag.

[0175]外部装置和存储器713之间的通信方法可能与外部装置和对象700之间的直接通信的方法不同。比如,红外通信791(比如条形码扫描器)可能用来从存储器713中传输对象ID。另一个例子是,包括对象ID 716的存储器713集成到嵌入在包装780中的RFID标签,并经由RF通信792进行访问。在后一个实例中,可以增强RFID,以便可以利用通信模块793来桥接外部装置和对象700之间的通信。通信模块793可以不同于用于存储器713和外部装置之间的通信792。[0175] A communication method between the external device and the storage 713 may be different from a method of direct communication between the external device and the object 700. For example, infrared communication 791 (such as a barcode scanner) may be used to transfer the object ID from memory 713 . As another example, memory 713 including object ID 716 is integrated into an RFID tag embedded in packaging 780 and accessed via RF communication 792. In the latter instance, RFID can be enhanced so that communication module 793 can be utilized to bridge communication between the external device and object 700 . The communication module 793 may be used differently from the communication 792 between the memory 713 and an external device.

[0176]激活装置710可以合并成一个单独的、可批量生成的项,从而补充现有的工业标准:“RFID感应器”,包括:[0176] Activation means 710 may be combined into a single, mass-producible item, thereby supplementing the existing industry standard: "RFID Sensor", comprising:

通信模块711(RF收发器);Communication module 711 (RF transceiver);

逻辑712和存储器713(微控制器);logic 712 and memory 713 (microcontroller);

变更实现装置714:比如,带有两个输出端的电子开关;Alteration implementing means 714: for example, an electronic switch with two outputs;

电源715(RF收发器/整流器);Power supply 715 (RF transceiver/rectifier);

对象ID 716;Object ID 716;

对象密钥717。Object key 717.

[0177]上面的RFID效用器可以设定成一个单独的单元,可设置成桥接数据或电源电路中的缺口(例如,在印刷电路板迹线上的缺口);每一边结束于一个隆起焊盘,焊接实现变化的模块的输出端。当变更实现模块激活(开关闭合)时,电路完成,对象700的效用被恢复。[0177] The upper RFID effector can be configured as a single unit, and can be configured to bridge gaps in data or power circuits (e.g., gaps in printed circuit board traces); each side ends in a raised pad , Weld the output terminal of the module to realize the change. When the change implementation module is activated (switch closed), the circuit is complete and the utility of object 700 is restored.

[0178]可选地,变更实现模块714(开关)可以和RFID效用器分离,并且嵌入到对象700中不可访问或者未知的位置(比如在印刷电路板之内,或从RFID效用器去掉对象的某个部分下方或后方)。一旦满足正确的条件(比如收到适当的激活通信),RFID效用器就会闭合开关,恢复对象的效用。[0178] Optionally, the change implementation module 714 (switch) can be separated from the RFID effector and embedded in an inaccessible or unknown location in the object 700 (such as within a printed circuit board, or where the object is removed from the RFID effector). below or behind a section). Once the correct conditions are met (such as receipt of an appropriate activation communication), the RFID validator closes the switch, restoring the object's utility.

[0179]本文所述的各种系统和方法和先前系统相比,有很多优点和不同之处,其中包括:[0179] The various systems and methods described herein have a number of advantages and differences over previous systems, including:

激活不需要依赖于对象有条件地初始化激活模块;这些模块位于对象内部;activation does not need to depend on the object to conditionally initialize activation modules; these modules are inside the object;

不在网络级别上进行激活,排除了对对象的改变(比如,授权信用卡或预付款电话卡);Activation is not performed at the network level, excluding changes to objects (e.g. authorized credit cards or prepaid phone cards);

“激活”并不限于改变存储在对象存储器内的数据,外部的装置(比如计算机)或者网络(信用卡处理)也用其来实现变更如何使用对象的输出(比如,加密数据不会削弱DVD播放机“读取”DVD的能力;仅仅削弱了DVD播放机“解释”数据的能力);"Activation" is not limited to changing the data stored in the object's memory, external devices (such as computers) or networks (credit card processing) can also use it to achieve changes in how to use the output of the object (for example, encrypted data will not weaken the DVD player ability to "read" a DVD; merely impairs the DVD player's ability to "interpret" the data);

未对对象或对象操作模块进行不可逆的限制使其效用永久的改变;There is no irreversible restriction on the object or object manipulation module so that its utility is permanently changed;

在得到对象的信息(比如,响应于解激活信号)或者通用激活信号(比如,感应安全标签)之前,不进行改变;以及No changes are made until information about the object (e.g., in response to a deactivation signal) or a general activation signal (e.g., sensing a security tag) is available; and

对象可以在其非工作状态下被激活(比如,不需要首先将对象从包装里拿出来并插上电源)。Objects can be activated in their non-working state (eg, without first taking the object out of its packaging and plugging it in).

[0180]尽管本文已经公开本发明的特定优选实施例和可选实施例,但应当理解的是,利用本发明,可以对上述技术进行各种各样修改和扩展。所有这些修改及扩展都包括在所附权利要求的实质精神和范围内。[0180] While certain preferred and alternative embodiments of the present invention have been disclosed herein, it should be understood that various modifications and extensions to the techniques described above are possible using the present invention. All such modifications and extensions are included within the true spirit and scope of the appended claims.

Claims (216)

1. distribute control system for one kind, comprising:
Object, described object further comprises:
Change implement device, be used to change the effectiveness of described object;
Be stored in the key in the memory, described memory is used for the described key of limiting access;
Receiver is used to receive data; And
Be connected to the logic of described change implement device, and described logic utilizes described key and received data, optionally switch described change implement device; And
Activated terminals, described activated terminals further comprises:
The visit approach that leads to described data; And
Transmitter is used for described data are sent to the receiver of described object.
2. according to the distribution control system of claim 1, wherein, described activated terminals comes described data are conducted interviews by obtain described data from server.
3. according to the distribution control system of claim 1, wherein, described activated terminals comes described data are conducted interviews by obtain described data from the network operation center.
4. according to the distribution control system of claim 1, wherein, described activated terminals comes described data are conducted interviews, so that other data from described object acquisition are made response by generating described data.
5. according to the distribution control system of claim 1, wherein, described activated terminals comes described data are conducted interviews by obtaining described data, so that other data from described object acquisition are made response.
6. according to the distribution control system of claim 1, wherein, the receiver of described object and the transmitter of described activated terminals carry out radio communication.
7. according to the distribution control system of claim 1, wherein:
Described object comprises addressable identifier; And
Described activated terminals comprises the reader that is used to receive described addressable identifier.
8. according to the distribution control system of claim 7, further comprise:
Network operation center, described network operation center have the database that one group of data is associated with one group of addressable identifier;
Network between described network operation center and the described activated terminals connects; And
Wherein, described network operation center receives described addressable identifier from described activated terminals, discerns the described data that are associated with described addressable identifier, and described data are sent to described activated terminals.
9. distribution control system according to Claim 8, wherein, described activated terminals is sent to described object with described data.
10. according to the distribution control system of claim 1, further comprise:
The network operation center, described network operation center has the database of data; And
Network between described network operation center and the described activated terminals connects.
11. the distribution control system according to claim 1 further comprises:
The network operation center, described network operation center has the algorithm that is used to generate described data, so that other data that receive from described activated terminals are made response; And
Network between described network operation center and the described activated terminals connects.
12. the distribution control system according to claim 1 further comprises:
Described activated terminals further comprises terminal identifier;
Network operation center, described network operation center have the database of data and the activated terminals of one group of mandate;
Network between described network operation center and the described activated terminals connects;
Wherein, described network operation center receives described terminal identifier from described activated terminals, and and if only if described terminal identifier when described activated terminals being identified as one of activated terminals of described one group of mandate, described network operation center just sends to described activated terminals with described data.
13. the distribution control system according to claim 1 further comprises:
Described activated terminals further comprises secure identifier;
Network operation center, described network operation center have the database of data and the activated terminals of one group of mandate;
Network between described network operation center and the described activated terminals connects, and each activated terminals has relevant security admission tabulation;
Network between described network operation center and the described activated terminals connects;
Wherein, described network operation center receives described secure identifier from described activated terminals, and and if only if described secure identifier when being positioned among the security admission tabulation of described activated terminals, described network operation center just sends to described activated terminals with described data.
14. according to the distribution control system of claim 13, wherein, described secure identifier be absolute time signal, cycle time signal, handshake, locating information or mailing address.
15. according to the distribution control system of claim 1, wherein, described activated terminals further comprises payment affirmation device, is used to acknowledge receipt of customer payment.
16. according to the distribution control system of claim 1, wherein, described activated terminals further comprises:
The link of leading to remote server;
Communication module is used for receiving message from described remote server; And
Wherein, in response to the message of being received, described activated terminals sends to described object with described data.
17. according to the distribution control system of claim 16, wherein, described data storing is in described remote server.
18. according to the distribution control system of claim 16, wherein, described data storing is in being different from the server of described remote server.
19. according to the distribution control system of claim 16, wherein, described activated terminals and described remote server are all in local place.
20. according to the distribution control system of claim 16, wherein, described activated terminals is in local place, and described remote server is in different places.
21. according to the distribution control system of claim 16, wherein, described communication module is in response to receiving described message from described remote server, from the described data of another server requests.
22. according to the distribution control system of claim 16, wherein, described communication module is in response to receiving described message from described remote server, from the described data of described remote server request.
23. the distribution control system according to claim 16 further comprises:
Described communication module is further used for authorization request message is sent to described remote server, and
Wherein, received message is represented to confirm to authorize.
24. according to the distribution control system of claim 23, wherein, described authorization messages is the message of mandate, request membership mandate, request password authorization or the mandate of request personal code of requesting for payment.
25. according to the distribution control system of claim 23, wherein, described authorization requests is the request of requirement check, credit card, cheque card or debit card payment authorization, and received message is the affirmation of paying the bill and having authorized.
26. according to the distribution control system of claim 1, wherein, described activated terminals further comprises input unit, is used to receive the authorization message from client.
27. according to the distribution control system of claim 1, wherein, described to as if tangible medium, and described change implement device is electric convertible optical material.
28. distribution control system according to claim 27, wherein, described tangible medium can be one of following: bill, complimentary ticket, document, credit card product labelling and label, safety device, storage card, movably computer storage, CD, DVD, CD and recreation cassette tape.
29. it is, wherein, described to liking electronic installation according to the distribution control system of claim 1.
30. according to the electronic installation of claim 19, wherein, described electronic installation can be one of following: computer; Game machine; Integrated circuit (IC) chip; Processor; Camera; TV; Phone; PDA (personal data/digital assistants); Calculator; Portable music, video or game player; Control electronics or instrument; Wrist-watch; Printer; Facsimile machine; Machinery; Instrument; And computer peripheral equipment.
31. according to the distribution control system of claim 1, wherein, described change implement device is a switch that is mechanical, electronics, electric power, electric, dynamo-electric or logic, or the value in the memory location.
32. according to the distribution control system of claim 1, wherein, described to as if integrated circuit (IC) apparatus, and described change implement device is fuse, electric switch or logic switch.
33. an object comprises:
Mark can be observed in the outside, shows that described object has controlled effectiveness; And
Described object disposes controlled effectiveness.
34. according to the object of claim 33, wherein, described mark and change implement device make up together, so that described mark can be represented the slave mode of current described effectiveness.
35. according to the object of claim 33, wherein, described mark represents that described object can't use.
36. according to the object of claim 33, wherein, the effectiveness of described object is limited, till described object is activated.
37. it is, wherein, described to liking electronic installation according to the object of claim 33.
38. it is, wherein, described to liking tangible medium according to the object of claim 33.
39. it is, wherein, described to liking CD according to the object of claim 33.
40. a packing comprises:
Mark can be observed in the outside, and display object has controlled effectiveness;
Described object disposes controlled effectiveness, and described object is arranged in described packing; And
Wherein, described mark is positioned on the described packing.
41. a method that is used to distribute electronic installation comprises:
The electronic installation of receiving slave effectiveness under the first effectiveness state;
Described controlled electronic device is sent to the opposing party;
Confirm that described the opposing party is authorized to use described electronic installation under the second effectiveness state; And
The effectiveness of described electronic installation is controlled to be the described second effectiveness state.
42. according to the method for claim 41, wherein
Described first state is the effectiveness constrained state; And
Described controlled step comprises the limited effectiveness of recovering described electronic installation.
43. according to the method for claim 41, wherein:
Described first state is for recovering effectiveness; And
Described controlled step comprises the recovery effectiveness that limits described electronic installation.
44. the method according to claim 41 further comprises:
Show described controlled electronic installation in retail location; And
Described controlled electronic device is sold to client.
45. the method according to claim 44 further comprises: confirm described client's payment; And in response to confirming that payment controls the effectiveness of described electronic installation.
46. method according to claim 42, wherein, described limited electronic installation can be: limited computer, limited game machine, limited integrated circuit (IC) chip, limited processor, limited camera, limited TV, limited phone, limited PDA, limited calculator, limited portable music player, limited wrist-watch or limited computer peripheral equipment.
47. according to the method for claim 44, wherein, described retail location is a retail shop, and described controlled step is that point of sales terminal place in described retail shop carries out.
48. according to the method for claim 44, wherein, described retail location is an online shop, and described controlled step is carried out in the client location.
49. according to the method for claim 44, wherein, described retail location is the client location, and described controlled step is carried out in described client location.
50. a method of distributing medium comprises:
Receive constrained medium, thereby control specifies reader how can read described medium;
Send described constrained medium to the opposing party;
Confirm that described the opposing party is authorized to have the described constrained medium that is under returning to form, return to form down that described appointment reader can read described constrained medium described; And
According to how recovering described constrained medium, data are sent to described constrained medium.
51. the method according to claim 50 further comprises:
Show described constrained medium in retail location;
Described constrained medium is sold to client;
Confirm described client's payment.
52., wherein,, finish that described data are sent to described constrained medium in response to confirming described payment according to the method for claim 51.
53. according to the method for claim 51, wherein, described retail location is a retail shop, and described forwarding step is that point of sales terminal place in described retail shop carries out.
54. according to the method for claim 51, wherein, described retail location is an online shop, and described forwarding step is carried out in the client location.
55. according to the method for claim 51, wherein, described retail location is the client location, and described forwarding step is carried out in the client location.
56. according to the method for claim 50, wherein, described constrained medium can be tangible medium, CD, DVD, CD or recreation cassette tape.
57. the method for a controlling object distribution comprises:
Obtain one group of predefine key, comprise the predefine key that can change described object utility in the described key;
Receive identifier value;
Obtain the described predefine key that is associated with the described identifier value that receives; And
Send described predefine key.
58. the method according to claim 57 further may further comprise the steps: before sending described predefine key, authorize described object to go to change its effectiveness.
59. the method according to claim 57 further may further comprise the steps: before sending described predefine key, determine to authorize activated terminals to go to change its effectiveness.
60. according to the method for claim 58, wherein, described authorisation step comprises the payment of confirming described object.
61. according to the method for claim 58, wherein, described authorisation step comprises the buyer's who confirms licencing key, code or described object input.
62. the method according to claim 57 further may further comprise the steps: receive the affirmation that described object has changed its effectiveness.
63. the method according to claim 62 further may further comprise the steps: in response to receiving described affirmation, authority to pay is given the entity in the distribution chain.
64. the method according to claim 62 further may further comprise the steps: in response to receiving described affirmation, the entity in described distribution chain is reported described affirmation.
65. it is, wherein, described to liking electronic installation, CD or tangible medium according to the method for claim 57.
66. a point of sale device that is used to realize changing object utility comprises:
The module of authorization key is provided; And
Described authorization key is sent to the transmitter of described object.
67. the point of sale device according to claim 66 further comprises:
Reader is used for reading addressable identifier from described object; And
Wherein, the described module of authorization key that provides further comprises, with described authorization key and the described addressable identifier associated modules that reads from described object.
68. according to the point of sale device of claim 66, wherein, described reader and described transmitter carry out radio communication.
69. the point-of-sale activation device according to claim 66 further comprises:
Reader; And
Wherein, described reader is used for reading the affirmation value from described object, realizes in response to receiving described authorization key that to confirm described object effectiveness changes.
70. the point-of-sale activation device according to claim 66 further comprises:
Receiver; And
Wherein, described receiver is used for receiving the affirmation value of sending from described object, realizes in response to receiving described authorization key that to confirm described object effectiveness changes.
71. according to the point of sale device of claim 66, wherein, described transmitter is used for other data message is sent to described object.
72. according to the point of sale device of claim 66, further comprise input unit, be used to receive client's authorization message.
73. the point of sale device according to claim 66 further comprises:
Input unit is used to receive effectiveness and selects information; And
Wherein, according to described selection, select described authorization key to change described effectiveness.
74. according to the point of sale device of claim 66, further comprise input unit, be used to receive customer payment.
75. according to the point of sale device of claim 66, wherein, described transmitter has used radio communication.
76. according to the point of sale device of claim 66, wherein, the described module of authorization key that provides comprises that the network that leads to the network operation center connects.
77. according to the point of sale device of claim 76, wherein, the described module that authorization key is provided comprises the database of the authorization key that is stored in described network operation center.
78. according to the point of sale device of claim 66, wherein, the described module of authorization key that provides comprises that this locality is stored in the database of the authorization key of described point of sale device.
79. according to the point of sale device of claim 66, wherein, the described module of authorization key that provides comprises the connection of leading to remote server.
80. according to the point of sale device of claim 79, wherein, the described module that authorization key is provided comprises the database of the authorization key that is stored in remote server.
81. 0 point of sale device according to Claim 8, wherein, described point of sales terminal and described remote server are all in local place.
82. 0 point of sale device according to Claim 8, wherein, described point of sales terminal is in local place, and described remote server is in different places.
83. according to the point of sale device of claim 66, wherein, the described module of authorization key that provides is included in the local algorithm routine that generates described authorization key.
84. according to the point of sale device of claim 66, wherein, the described module that authorization key is provided is included in the algorithm routine of the described authorization key of long-range generation.
85. a distribution control system comprises:
Object, before entering its distribution chain, its effectiveness is to have a mind to restriction;
Authorization key, described authorization key can be sent to described object under authorising conditional; And
Wherein, select described authorization key, realize changing the limited effectiveness of described object.
86. 5 distribution control system according to Claim 8, wherein, described object stores has the limited accass key with described authorization key equivalent.
87. 5 distribution control system according to Claim 8, wherein, the limited accass key that the with good grounds described authorization key of described object stores is determined.
88. 5 distribution control system according to Claim 8, wherein, described object stores has the limited accass key, and described object uses described limited accass key and described authorization key to realize described change.
89. 5 distribution control system according to Claim 8, wherein, described object stores has the limited accass key, and described object before the described change compares described limited accass key and described authorization key realizing.
90. 5 distribution control system wherein, is the payment of confirming the point of sales terminal place at authorising conditional described in the retail shop according to Claim 8.
91. 5 distribution control system according to Claim 8, wherein, described to as if CD, and described authorization key can cause the variation of the electric convertible optical material in the described CD.
92. 5 distribution control system according to Claim 8, wherein, described to as if tangible medium, and described authorization key can cause that the sensitization in the described tangible medium changes.
93. 5 distribution control system according to Claim 8, wherein, described to as if electronic installation, and described authorization key can cause change mechanical, electric, electronics, switch electromechanics or logic.
94. 5 distribution control system according to Claim 8, wherein, described to as if integrated circuit (IC) apparatus, and described authorization key can cause the variation of fuse, electric or logic switch.
95. 5 distribution control system according to Claim 8, wherein, described effectiveness is meant the ability that the parts in described object or the described object power up.
96. 5 distribution control system according to Claim 8, wherein, described effectiveness is meant that the parts in described object or the described object finish the ability of its initialization cycle.
97. 5 distribution control system according to Claim 8, wherein, described effectiveness is meant the aesthetic appearance of described object.
98. 5 distribution control system according to Claim 8, wherein, described effectiveness is meant the ability that subsystem in described object or the described object or parts can operate as normal.
99. the method for a manufacturing object comprises:
The change implement device is installed on described object, so as to make object effectiveness under a kind of state be limited and under another kind of state described effectiveness be not limited;
Described change implement device is arranged under a certain state;
Storage limited accass key on described object;
Configuration is used for receiving the receiver of authorization key on described object; And
Configuration uses described authorization key and described limited accass key the state of described change implement device to be changed over the logic of other states.
100. the manufacture method according to claim 99 further comprises:
The a plurality of limited accass keys of storage on described object; And
Dispose described logic, change the state of described change implement device to use one of described authorization key and described limited accass key.
Manufacture method according to claim 99 further comprises:
A plurality of change implement devices are installed on described object, and each change implement device all is used to realize different effectiveness;
Dispose described logic, the state of at least one described change implement device is changed to other states to use described authorization key and described limited accass key.
Manufacture method according to claim 101 further comprises:
A plurality of change implement devices are installed on described object, and each change implement device all is used to realize different effectiveness;
Dispose described logic, the state of at least two described change implement devices is changed to other states to use described authorization key and described limited accass key.
Manufacture method according to claim 99 further may further comprise the steps: for described object provides addressable ident value.
Manufacture method according to claim 99 further may further comprise the steps: spanned file, described file is associated ident value and key.
According to the manufacture method of claim 99, wherein, described to as if tangible medium, and described change implement device is electric convertible optical material.
Manufacture method according to claim 105, wherein, described tangible medium can be for one of following: bill, complimentary ticket, document, credit card product labelling and label, safety device, storage card, movably computer storage, CD, DVD, CD and recreation cassette tape.
According to the manufacture method of claim 99, wherein, described to liking electronic installation.
According to the manufacture method of claim 107, wherein, described electronic installation can be for one of following: computer; Game machine; Integrated circuit (IC) chip; Processor; Camera; TV; Phone; PDA (personal data/digital assistants); Calculator; Portable music, video or game player; Control electronics or instrument; Wrist-watch; Printer; Facsimile machine; Machinery; Instrument; And computer peripheral equipment.
Manufacture method according to claim 99 further comprises:
Provide the described object utility of expression controlled mark; And
Described mark is affixed on outside observable place.
110. according to the manufacture method of claim 109, wherein, described mark is the label on the described object.
111. according to the manufacture method of claim 109, wherein, described mark is the label on the described object encapsulation.
112. the method for a controlling object effectiveness comprises:
Authorization object goes to change its effectiveness;
Request can change the authorization key of the mandate effectiveness of described object;
Send described authorization key.
113. according to the method for the controlling object effectiveness of claim 112, wherein, described authorisation step comprises from remote server confirmation of receipt message.
114. according to the method for the controlling object effectiveness of claim 113, wherein, described acknowledge message be confirm the message of payment, confirm password message, confirm clubbable message or confirm the message of biometric secure data.
115. the method according to the controlling object effectiveness of claim 112 further may further comprise the steps: receive described authorization key from remote server.
116. according to the method for the controlling object effectiveness of claim 112, wherein, the described request step comprises: receive the ident value relevant with described object.
117. method according to the controlling object effectiveness of claim 112:
Wherein, the described request step comprises: send ident value to remote server; And
Further may further comprise the steps: receive described authorization key from described remote server.
118. method according to the controlling object effectiveness of claim 112:
Wherein, the described request step comprises: send ident value to remote server; And
Further may further comprise the steps: receive described authorization key from another remote server.
119. method according to the controlling object effectiveness of claim 112:
Wherein, the described request step comprises the reception ident value; And
Produce described authorization key.
120. the method according to the controlling object effectiveness of claim 112 further may further comprise the steps:
Receive the affirmation message that described object utility has changed.
121. the method according to the controlling object effectiveness of claim 120 further may further comprise the steps:
The information of relevant described acknowledge message is added in the report.
122. the method according to the controlling object effectiveness of claim 120 further may further comprise the steps:
Generate payment with described acknowledge message.
123. a method of controlling larceny in the retail shop comprises:
The electronic installation that is provided for selling when in running order, is arranged to have commercial unavailable effectiveness with described electronic installation.
124. the method according to larceny in the control retail shop of claim 123 further may further comprise the steps: described electronic installation returned to commercial available effectiveness in the point of sale.
125. according to the method for larceny in the control retail shop of claim 123, it is one of following that wherein said electronic installation can be: computer; Game machine; Integrated circuit (IC) chip; Processor; Camera; TV; Phone; PDA (personal data/digital assistants); Calculator; Portable music, video or game player; Control electronics or instrument; Wrist-watch; Printer; Facsimile machine; Machinery; Instrument; And computer peripheral equipment.
126. a method of controlling larceny in the retail shop comprises:
The electronic installation that acceptance is sent when in running order, is arranged to have commercial unavailable effectiveness with described electronic installation.
127. the method according to larceny in the control retail shop of claim 126 further may further comprise the steps: behind the electronic installation of accepting to send, described electronic installation is returned to commercial available effectiveness.
128., wherein, before described electronic installation is put in storage, before described electronic installation is put on the shelf or at the point of sales terminal place that sells described electronic installation, carry out described recovering step according to the method for larceny in the control retail shop of claim 127.
129. method of controlling larceny in the retail shop:
Provide not readable CD to be used for selling.
130. according to the method for larceny in the control retail shop of claim 124, wherein, described not readable CD is DVD, CD or gameboard.
131. an anti-theft device comprises:
Object, at least one expected utility of described object is controlled; And
Sign, described sign is in the position that can read from the outside, and described sign is represented described controllable to liking.
132. an anti-theft device comprises:
The packing that comprises object, at least one expected utility of described object is controlled; And
Sign on the described packing, described sign are in the position that can read from the outside, and described sign is represented described controllable to liking.
133. the object with operating state and non operating state comprises:
The change implement device is configured to a kind of state in the various states;
Receiver is used to receive data;
Be connected to the logic of described change implement device, described logic utilizes described data optionally described change implement device to be switched to another kind of state from a kind of state;
Power supply, when described object was in non operating state, described power supply was to described receiver, described logic and the power supply of described change implement device;
Be connected to the effectiveness module of described change implement device, described effectiveness module is moved according to the state of described change implement device;
Wherein, described effectiveness module changes the effectiveness of described object when described object is in described operating state.
134. it is, wherein, described to liking electronic installation according to the object of claim 133.
135. the object according to claim 133 further comprises:
Be stored in the predefine secret cipher key code in the described object; And
Wherein, described logic uses described predefine secret cipher key code to come optionally described change implement device to be switched to another kind of state from a kind of state.
136. according to the object of claim 135, wherein, described predefine secret cipher key code is stored in the nonvolatile memory.
137. according to the object of claim 136, wherein, described nonvolatile memory can not be wiped, can not change, and maybe can not read from the outside.
138., further comprise the predefine secret cipher key code that is stored in the described object according to the object of claim 133; And
Wherein, described logic compares described predefine secret cipher key code and received data, thereby optionally switches described change implement device.
139., further comprise annex memory, be used to carry out described comparison, and wherein, described annex memory can not read from the outside according to the object of claim 138.
140. the object according to claim 133 further comprises: the predefined identifier that can be read by external reader.
141. according to the object of claim 140, wherein, described predefine identifier can be read by radio frequency (RF), infrared (IR) or electromagnetism reader.
142. according to the object of claim 133, wherein, described receiver is radio frequency (RF), infrared (IR) or electromagnetic receiver.
143. according to the object of claim 133, wherein, described change implement device is electronic switch, electric mechanical switch, relay or mains switch.
144. according to the object of claim 133, wherein, described change implement device is the logic state setting.
145. according to the object of claim 133, wherein, described change implement device is the value in the memory location.
146. according to the object of claim 133, wherein, described change implement device is the conditional breakpoint of setting in fuse or the trace on printed circuit board (PCB).
147. according to the object of claim 133, wherein, described power supply is different from the working power to described effectiveness module for power supply.
148. according to the object of claim 133, wherein, described power supply comprises battery.
149. according to the object of claim 133, wherein, described power supply comprises radio frequency (RF) converter apparatus or electromagnetic conversion apparatus.
150. according to the object of claim 149, wherein, described power supply comprises battery.
151. according to the object of claim 133, wherein, described power supply is single power supply.
152. it is, wherein, described to liking one of following electronic installation: computer according to the object of claim 133; Game machine; Integrated circuit (IC) chip; Processor; Camera; TV; Phone; PDA (personal data/digital assistants); Calculator; Portable music, video or game player; Control electronics or instrument; Wrist-watch; Printer; Facsimile machine; Machinery; Instrument; And computer peripheral equipment.
153. according to the object of claim 133, wherein, when described change implement device was in another kind of state, described logic used other data optionally described change implement device to be switched back described a kind of state.
154. according to the object of claim 133, wherein, when described change implement device was in another kind of state, described logic used other inputs optionally described change implement device to be switched back described a kind of state.
155. according to the object of claim 154, wherein, described other inputs receive from clock circuit.
156. according to the object of claim 154, wherein, described other inputs receive from counter circuit.
157. the object according to claim 133 further comprises:
Be arranged to the second change implement device of a kind of state in the various states;
Be connected to the second effectiveness module of the described second change implement device; And
Be connected to the described logic of the described second change implement device, and described logic uses data value optionally the described second change implement device to be switched to another state; And
Wherein, when described object was in described operating state, the described second effectiveness module changed second effectiveness of described object.
158. the object according to claim 133 further comprises:
Be connected to the second effectiveness module of described change implement device; And
Wherein, when described object was in described operating state, the described second effectiveness module changed second effectiveness of described object.
159. the object according to claim 133 further comprises:
Detect the module of the current state of described change implement device; And
Transmitter is used to send the signal of representing described current state.
160. the object according to claim 133 further comprises:
Detect the module that described change implement device state changes; And
Transmitter is used to send the signal of representing described current state.
161. the object according to claim 133 further comprises:
Detect the module of the current state of described effectiveness module; And
Transmitter is used to send the signal of representing described current state.
162. according to the object of claim 133, wherein, it is one of following that described effectiveness module can be: engine, power supply, executable code, memory, display, loud speaker, loudspeaker, printhead and lamp.
163. a readable media comprises:
Change implement device with first state and second state;
The content of being stored;
When described change implement device is in described first state, is arranged at described change implement device on the described medium and can intervenes described memory contents is conducted interviews;
Receive the receiver of data;
Be connected to the logic of described change implement device, described logic uses described data optionally described change implement device to be switched to other states from its current state;
Power supply is used for to described receiver, described logic and the power supply of described change implement device;
Wherein, when described change implement device was in described second state, described change implement device and nonintervention conducted interviews to described memory contents.
164., further comprise the predefine secret cipher key code that is stored in the described readable media according to the readable media of claim 163; And
Wherein, described logic uses described predefine key optionally described change implement device to be switched to described second state.
165. according to the readable media of claim 164, wherein, described predefine secret cipher key code is stored in the electronic memory.
166. according to the readable media of claim 165, wherein, described electronic memory can not read from the outside.
167. according to the readable media of claim 165, wherein, described memory be non-volatile, can not wipe or can not change.
168., further comprise the predefine secret cipher key code that is stored in the described readable media according to the readable media of claim 163; And
Wherein, described logic compares described predefine secret cipher key code and received data, thereby optionally described change implement device is switched to described second state.
169. according to the readable media of claim 168, further comprise the annex memory of carrying out described comparison, and wherein, described annex memory can't read from the outside.
170., further comprise the predefined identifier that can be read by external reader according to the readable media of claim 163.
171. according to the readable media of claim 163, wherein, described predefined identifier can be read by radio frequency (RF), infrared (IR) or electromagnetic radiation reader.
172. according to the readable media of claim 163, wherein, described receiver is radio frequency (RF), infrared (IR) or electromagnetic receiver.
173. according to the readable media of claim 163, wherein, described change implement device comprises electric convertible optical material.
174. according to the readable media of claim 173, wherein, the convertible optical material of described electricity is an electrochromic material.
175. according to the readable media of claim 163, wherein, described readable media is one of following: CD, Digital video disc (DVD), read-only optical disc (CD) and recreation cassette tape.
176. according to the readable media of claim 163, wherein, described power supply comprises battery.
177. according to the readable media of claim 163, wherein, described power supply comprises radio frequency (RF) converter apparatus, infrared (IR) converter apparatus or electromagnetic conversion apparatus.
178. according to the object of claim 177, wherein, described power supply comprises battery.
179. according to the readable media of claim 163, wherein, when described change implement device was in described second state, described logic used other data codes optionally described change implement device to be switched to described first state.
180. according to the readable media of claim 163, wherein, when described change implement device was in described second state, described logic used other inputs optionally described change implement device to be switched to described first state.
181., wherein, receive described other inputs from clock circuit according to the readable media of claim 180.
182., wherein, receive described other inputs from counter circuit according to the readable media of claim 180.
183. the readable media according to claim 163 further comprises:
The second change implement device with the first and second two states; And
Be connected to the logic of the described second change implement device, and described logic uses the data that receive optionally the described second change implement device to be switched to described second state.
184. the readable media according to claim 163 further comprises:
Detect the module of described change implement device current state; And
Send the transmitter of the signal of the described current state of expression.
185. the readable media according to claim 163 further comprises:
Detect the module that described change implement device state changes; And
Send the transmitter of the signal of the described current state of expression.
186. a method that is used to change object utility comprises:
Described object is set at non operating state;
Object place in described non operating state receives data value;
Definite data value that is received is represented to change described effectiveness;
In response to described determining step, the state of change implement device is set.
187. according to the method for claim 186, wherein, described receiving step comprises the described data value of wireless receiving.
188. according to the method for claim 186, wherein, described receiving step comprises that use radio frequency (RF), infrared (IR) or electromagnetic communication receive described data value.
189. according to the method for claim 186, wherein, described determining step comprises from described object acquisition secret cipher key code.
190. according to the method for claim 189, wherein, described determining step comprises the data of using described secret cipher key code and being received.
191. according to the method for claim 190, wherein, described determining step comprises more described secret cipher key code and the data that received.
192. according to the method for claim 186, wherein, described setting step comprises described object is provided as electronic installation.
193. according to the method for claim 186, wherein, described setting step comprises described object is provided as CD.
194. the method according to claim 186 further may further comprise the steps:
It is in running order that described object is set;
Detect the state of described change implement device; And
According to the state of described change implement device, described effectiveness is set.
195. according to the method for claim 194, wherein, the described step that is provided with comprises the described state that changes electronic switch, electric mechanical switch, relay or mains switch.
196. according to the method for claim 194, wherein, the described step that is provided with comprises the setting of change logic state.
197. according to the method for claim 194, wherein, the described step that is provided with comprises that change is in the value of memory location.
198. according to the method for claim 194, wherein, the described step that is provided with comprises in fusing fuse or the trace on printed circuit board (PCB) a conditional breakpoint is set.
199. the method according to claim 186 further comprises:
Send ident value, and correspondingly receive described data value at described object.
200. according to the method for claim 199, wherein, described forwarding step comprises that use radio frequency (RF), infrared (IR) or electromagnetic communication send described ident value.
According to the method for claim 199, wherein, described forwarding step comprises the transmission by the reflection bar font code, sends described ident value.
According to the method for claim 186, wherein, described determining step further comprises the secret cipher key code of more described data value and storage.
A kind of object with operating state and non operating state comprises:
Change implement device, be used for optionally being arranged to a kind of state of various states;
The power supply of wireless receiving electric energy, and described power supply is described change implement device power supply when described object is in described non operating state;
Be connected to the effectiveness module of described change implement device, described effectiveness module is moved according to the state of described change implement device;
Wherein, when described object was in described operating state, described effectiveness module changed the effectiveness of described object.
According to the object of claim 203, further comprise the module of determining whether described effectiveness has changed.
According to the object of claim 204, further comprise by electronics or the optical properties of measuring described object and determine the module whether described effectiveness has changed.
According to the object of claim 204, further comprise by the current state that detects described change implement device and determine the module whether described effectiveness has changed.
According to the object of claim 204, further comprise by the current configuration that detects described effectiveness module and determine the module whether described effectiveness has changed.
According to the object of claim 204, further comprise by measurement when the change implement device changes state and determine the module whether described effectiveness has changed.
According to the object of claim 204, further comprise in response to definite described effectiveness has changed the logic of action conditionally.
210. according to the object of claim 204, further comprise transmitter, be used to send the signal of determining that described effectiveness has changed.
211. the object according to claim 204 further comprises:, addressable memory is set then if described effectiveness changes.
80., further comprise receiver according to the object of claim 203, be used to receive data, the data that received are used for optionally being provided with described change implement device.
212. according to the object of claim 203, further comprise the logic that is connected to described change implement device, described logic optionally switches to another kind of state with described change implement device from a kind of state.
213., further comprise addressable identifier according to the object of claim 203.
214. according to the object of claim 203, further comprise addressable identifier, described addressable identifier is used for optionally being provided with described change implement device.
215. the object with operating state and non operating state comprises:
Be arranged to the change implement device of one of various states;
Receive the receiver of data;
Be connected to the logic of described change implement device, described logic uses described data to come optionally described change implement device to be switched to another kind of state from a kind of state;
Power supply is when described object is in described non operating state, to described receiver, described logic and the power supply of described change implement device;
Be connected to the effectiveness module of described change implement device, described effectiveness module responds changes the effectiveness of described object in the state of described change implement device;
Wherein, described effectiveness module changes the effectiveness of described object when described object is in described operating state.
CNA2005800447866A 2004-10-26 2005-10-26 Method, system, and network for selectively controlling the utility a target Pending CN101438528A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US62213704P 2004-10-26 2004-10-26
US60/622,137 2004-10-26
US60/633,971 2004-12-07
US60/654,384 2005-02-18

Publications (1)

Publication Number Publication Date
CN101438528A true CN101438528A (en) 2009-05-20

Family

ID=40711695

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2005800447866A Pending CN101438528A (en) 2004-10-26 2005-10-26 Method, system, and network for selectively controlling the utility a target

Country Status (1)

Country Link
CN (1) CN101438528A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103168310A (en) * 2010-03-18 2013-06-19 长威网络防盗有限公司 Operation of Mobile Communication Devices
CN109902450A (en) * 2019-03-14 2019-06-18 成都安恒信息技术有限公司 A kind of offline method for permitting to sign and issue management
CN114510687A (en) * 2020-10-27 2022-05-17 湖北希欧激光技术有限公司 A remote activation system and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103168310A (en) * 2010-03-18 2013-06-19 长威网络防盗有限公司 Operation of Mobile Communication Devices
CN109902450A (en) * 2019-03-14 2019-06-18 成都安恒信息技术有限公司 A kind of offline method for permitting to sign and issue management
CN109902450B (en) * 2019-03-14 2023-01-24 成都安恒信息技术有限公司 Method for off-line permission issuing management
CN114510687A (en) * 2020-10-27 2022-05-17 湖北希欧激光技术有限公司 A remote activation system and method

Similar Documents

Publication Publication Date Title
US20060095385A1 (en) Method and network for selectively controlling the utility a target
US20070194945A1 (en) Mobile Device for Selectively Activating a Target and Method of Using Same
US20060131432A1 (en) Method and system for identifying a target
US20060192653A1 (en) Device and method for selectively controlling the utility of an integrated circuit device
Boss RFID technology for libraries
US8973829B2 (en) Systems and methods for managing access to benefits associated with products
US10621592B2 (en) Methods for authenticating a products
US20070011033A1 (en) System and process for providing insurance
US9171298B2 (en) Systems and methods for managing access to benefits associated with products
US20170053293A1 (en) System and method for streamlined registration and management of products over a communication network related thereto
US8985465B2 (en) Systems and methods for controlling rights associated with a product
CA2978920A1 (en) Digital token system for physical medium digitalization and physical store optimization
US8955754B2 (en) Systems and methods for a content authorization service
US20080306874A1 (en) System and method for managing a product through a distribution chain
US8998093B2 (en) Systems and methods for a product authorization service
US20160125380A1 (en) Apparatus and methods for communicating asset information
CN101438528A (en) Method, system, and network for selectively controlling the utility a target
US20070016462A1 (en) System and process for distributing products
WO2009058122A1 (en) An rfid system for providing data and power
WO2008036546A2 (en) System and method for packaging and distributing media
CN101405805A (en) Method and apparatus for authenticating static data carriers
EP1854240A2 (en) Device and method for selectively controlling the utility of an integrated circuit device
CN101444034A (en) Apparatus and method for selectively controlling utility of a target
KR20010107069A (en) System for managing rental goods attaching rf chip and system for managing rental goods of revenue sharing manner
CN101084524A (en) Personal digital key and receiver/decoder circuit system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090520