The idea itself is simple: imagine that your things do not work when the thieves steal them.
How does this manifest itself?
It can be done in several ways. Man can make it so that one unit (A) communicates with another device (B) and if the distance becomes too large between A and B, A and / or B will stop working. It can also be done such that if A can turn off B whenever any independent distance, where A could be an app on a phone or an electronic device capable of communicating with B independent distance. B can be connected to non-electronic devices, but her will B might trigger a response so that the non-electronic device becomes less valuable, for example. if there was a color that ran beyond møbler, der blev stålet. Thus, the value of these furniture will fall, and it would be less attractive for the thief to steal such furniture.
If we assume that the app on any given phone (unit A) communicates via either Bluetooth, Wi-Fi, cellular network or NFC with B, which may be e.g. If one takes the distance, B will from a given distance X stop working, A will or will not notify B and visa versa A how far they are from each other, and a mechanism will e. g. prevent B from working by having a switch and/or key that is transmitted and / or compared from A to B or the other way around, meaning that B stops working. The connection between A and B can be encrypted. A and / or B can be either a software and / or hardware solution. If it is distance independent, B will for example. receive a key and / or a packet that is used to lock B, so B does not work. B will only work again for example. receiving a key and / or packet from A which unlocks B. B may be designed with or without a GPS. There may thus be a decoding device to be able to decode the transmitted signal in the form of a key and / or message. This decode arrangement can be both in A and B. A and / or B can also be microcontrollers.
In connection with the distance dependent solution, it may also be such that a measuring device for providing characteristics of the carrier of at least one signal received with the antenna elements on unit B and a control device for determining whether the mobile communication unit's position is within the limiting distance. The carrier wave characteristics include the phase, amplitude or frequency of the wave, or any combination thereof. Also it will include a decoder that is designed to transfer identity data in connection with the mobile communication unit by processing a received signal sent from the mobile communication unit A.
In connection with the distance-independent solution, there may be encapsulated packages and / or a signal sent from A to B and / or vice versa. These packages and / or signals may be encrypted. Når f.eks. B receiver and encapsulated package from A that asks B to turn off a device, this may occur because A must authenticate B and / or vice versa, which can be done by sending a key - here B and / or A may be have the key themselves and compare the hashed key with the unit's own stored hashing function to increase the speed of authentication. This was just a way to encrypt it in an elegant and easy way. It can of course be encrypted in other ways too.
Both processes can be done with or without authentication, identity data and / or encryption.
Practical
It is quite practical that it can manifest itself, like a citizen, for example. having an app that is connected to multiple units in one's home and/or other places (vehicles, tools etc.) and if you are off to see a friend somewhere else, it will also work for a given time or stop working (which in everyday life would not be particularly ideal). If we assume they work for a week, then it's so long that they can continue until they either get a signal from one's app or ask for a confirmation to hold another week. If the thief pops up while you're out to visit the family, and steal many of yours for simplicity - electronic stuff and you'll be back home that night and see that your stuff is gone, it will either work so at that point you can quit for them independent distance, and / or you can wait for your things to ask for another confirmation, and since they do not get this, they will stop working be itself. This will make it much more difficult for the thief to steal, as he should be a really skilled hacker to get things done.
What do you think about all this?
Best regards,
rekdaz