EP0171323B1 - Operating and controlling system for a plurality of accesses equipped with coded locks - Google Patents

Operating and controlling system for a plurality of accesses equipped with coded locks Download PDF

Info

Publication number
EP0171323B1
EP0171323B1 EP85401476A EP85401476A EP0171323B1 EP 0171323 B1 EP0171323 B1 EP 0171323B1 EP 85401476 A EP85401476 A EP 85401476A EP 85401476 A EP85401476 A EP 85401476A EP 0171323 B1 EP0171323 B1 EP 0171323B1
Authority
EP
European Patent Office
Prior art keywords
code
reader
lock
codes
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
EP85401476A
Other languages
German (de)
French (fr)
Other versions
EP0171323A1 (en
Inventor
Jacques Lewiner
Claude Hennion
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP0171323A1 publication Critical patent/EP0171323A1/en
Application granted granted Critical
Publication of EP0171323B1 publication Critical patent/EP0171323B1/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/0023Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks with encription of the transmittted data signal
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/04Access control involving a hierarchy in access rights

Definitions

  • the invention relates to installations for command and control of the different coded locks of an assembly comprising a relatively large number of such locks, this number preferably being greater than 50 and even more than 100.
  • the coded keys in question are preferably cards carrying a code recorded in magnetic or optical form, or even portable transmitters of codes in the form of electromagnetic or ultrasonic waves, and the codes considered are numbers expressed by sequences binary signals.
  • the coded keys may also consist of an intangible code intelligibly entrusted to an authorized user, for example in the form of a series of numbers and / or letters, and intended to be composed on a keyboard arranged near the lock or to be reproduced in any other desirable manner.
  • the code assigned to each key by a central key transmitter comprises two portions recorded respectively on two distinct areas of the key, namely a first portion directly assigned to unlocking the lock and a second portion assigned to the code change.
  • first key a key entrusted to a first user authorized to unlock a given lock
  • second key a key entrusted subsequently to a second user whom we wish to empower in turn by deleting the 'authorization of the first
  • the code portions recorded by the central key transmitter on the two ranges of the first key will be designated by A and B respectively and by B' and C the code portions recorded respectively on the two ranges of the second key.
  • the lock concerned originally comprises means for controlling its unlocking on reading the partial code A on the first range of a key, means for storing the partial code B carried on the second range of such a key carrying the partial code A on its first range, and means of comparison.
  • the reading of the partial code A of its first range directly ensures the unlocking of this lock and the partial code B only intervenes by its storage.
  • the unlocking section of the lock no longer reads the correct partial code A on the first range of this key, but the partial code B.
  • comparison means of the lock come into play: these compare the partial code (here B) previously stored in memory coming from the second range of the first key with the new partial code read on the first range of the second key.
  • the identification resulting from such a comparison has the effect of unlocking the lock, of making this lock adopt the code thus identified, that is to say here the partial code B, as the new unlocking code and of invalidating , by erasure or otherwise, the partial code A of initial unlocking.
  • algorithm is meant in the present text a set of numerical operations corresponding to a first number x a second number y.
  • Each of the transmitter and reader devices is then equipped so as to exploit the algorithm appropriately.
  • the transmitter working out the successive keys intended to unlock the lock equipped with the reader in turn is arranged so as to register respectively on these successive keys the codes x, f (x), f 2 (x) ... f (x) ...
  • n denotes an integer
  • f means f [f n ⁇ 1 (x)] and the symbol f (x) is equivalent to f (x).
  • the reader associated with the lock considered it is arranged so as to compare successively the codes read on the different keys with the codes x, f (x), f 2 (x), ..., f "(x). .. and unlock the lock when the comparison reveals an identity.
  • the reader is equipped with means for automatically invalidating each code fP (x) when the key bearing the code f p + 1 (x) is presented to it.
  • each reader-lock sub-assembly is arranged in such a way that at a given moment the lock can be unlocked by presenting to the reader one or the other of two codes f (x) and f P +1 (x), the presentation of the first of these two codes resulting in the only unlocking of the lock while the presentation of the second code results not only in this unlocking, but also in the invalidation of the first code and in the making the reader aware of the following code f p + 2 (x) of the series, the roles played respectively just before this presentation of the second code fP +1 (x) by the first two codes being played respectively from this instant by the two codes f P +1 (x) and fP + 2 ( x ) .
  • each reader is sensitive at each instant to only two codes, namely the codes fP (x) and f +1 (x) in the example above.
  • the invention overcomes this drawback.
  • each reader is made sensitive at all times to a number m greater than two of non-invalidated codes of the sequence of codes f P (x), f p + 1 (x), f p + 2 (x). deductible from each other by the algorithm f (x).
  • This reader is then arranged in such a way that by reading any of the valid codes of this sequence, it automatically invalidates all the codes of lower rank of said sequence.
  • the lock associated with said reader can be opened at any time by the last key produced by the transmitter intended for this lock.
  • the number m is chosen according to the real risk presented by the defect indicated above: it is preferably between 5 and 100, being for example of the order of 10.
  • the different codes of the suite in question can be recorded in advance in a memory of the reader concerned, the number of these valid codes gradually decreasing due to the successive invalidations of the keys.
  • the reader can be equipped with means for counting and recording the number of code changes which have occurred since the origin of the life of the lock or since a determined instant of reset.
  • the appropriate code sequence can be saved as previously in a memory of each reader: the identification of the first code, of this sequence, valid at a given time can then be obtained by simple counting, mentioned above. above, the number of code changes that have occurred since a given start time, which may be a reset time, counting of course supplemented by knowledge of the start code assigned to the lock concerned.
  • This simplification is very important since, for example for the application of the invention to the service of a hotel with 100 rooms, it amounts to dividing by 100 the number of algorithms recorded in the transmitter as well as the number of circuits corresponding calculation and transformation.
  • the installation proposed here overcomes the servitudes of "synchronization between the transmitter and the readers, the absence of use of certain" first keys "does not more reflected here by the neutralization of the “corresponding second keys.
  • the invention is in no way limited to those of its modes of application and embodiments which have been more especially envisaged; it embraces, on the contrary, all variants, in particular those where the algorithm allowing to develop the code y from the previous code x would be a function not only of this previous code, but also of a number assigned to the set lock-reader concerned, number recorded both in this set and in the transmitter, in particular in the case where the number of said sets is particularly high.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

1. Installation for controlling and monitoring the different coded locks of an assembly, comprising : an emitter capable of elaborating coded keys for controlling said locks and a reader associated with each lock, for unlocking this lock on simple presentation thereto of a correctly coded key, this emitter and this reader being adapted so that detection by said reader of the code y recorded by said emitter on each new key of order p assigned to the lock associated with this reader results in the invalidation of the code x recorded on the key of order p - 1 previously assigned to this lock, each code y being derived from code x by an algorithm y = f(x) stored in at least the emitter, characterized in that at any time the reader is responsive simultaneously to a number m greater than 2 of non invalidated codes of the succession x, f(x), f**2 (x)..., f**n (x), where f**n (x) = f[f**n-1 (x)], and is adapted so that by reading any one of these codes, it automatically invalidates all the lower rank codes of the succession considered.

Description

L'invention concerne les installations de commande et de contrôle des différentes serrures codées d'un ensemble comportant un nombre relativement élevé de telles serrures, ce nombre étant de préférence supérieur à 50 et même à 100.The invention relates to installations for command and control of the different coded locks of an assembly comprising a relatively large number of such locks, this number preferably being greater than 50 and even more than 100.

Elle concerne plus particulièrement, parce que c'est dans leur cas que son application semble devoir offrir le plus d'intérêt, mais non exclusivement, parmi ces installations, celles équipant les hôtels comprenant un grand nombre de chambres, chacune de ces chambres étant accessible par une porte équipée d'une serrure codée, laquelle serrure est commandable électriquement à l'aide d'une clé codée en correspondance.It concerns more particularly, because it is in their case that its application seems to offer the most interest, but not exclusively, among these installations, those equipping hotels comprising a large number of rooms, each of these rooms being accessible by a door fitted with a coded lock, which lock is electrically controllable using a corresponding coded key.

Les clés codées en question sont de préférence des cartes portant un code enregistré sous forme magnétique ou optique, ou encore des émetteurs portables de codes se présentant sous la forme d'ondes électromagnétiques ou ultrasonores, et les codes considérés sont des nombres exprimés par des suites de signaux binaires.The coded keys in question are preferably cards carrying a code recorded in magnetic or optical form, or even portable transmitters of codes in the form of electromagnetic or ultrasonic waves, and the codes considered are numbers expressed by sequences binary signals.

Les clés codées peuvent être également constituées par un code immatériel confié de façon intelligible à un usager habilité, par exemple sous la forme d'une suite de chiffres et/ou de lettres, et destiné à être composé sur un clavier disposé à proximité de la serrure ou à être reproduit de toute autre manière désirable.The coded keys may also consist of an intangible code intelligibly entrusted to an authorized user, for example in the form of a series of numbers and / or letters, and intended to be composed on a keyboard arranged near the lock or to be reproduced in any other desirable manner.

Dans les installations du genre indiqué, les personnes habilitées au déverrouillage d'une serrure donnée ne le sont que provisoirement et changent fréquemment.In installations of the type indicated, the persons authorized to unlock a given lock are only provisional and change frequently.

Il faut donc éviter qu'un utilisateur mal intentionné puisse continuer à déverrouiller la serrure considérée au-delà de l'expiration de la période au cours de laquelle il en détenait l'autorisation, et ce à l'aide d'une copie de la clé qui lui avait été confiée alors ou à l'aide de cette clé elle-même, conservée par lui au-delà de ladite expiration.It must therefore be avoided that a malicious user can continue to unlock the lock in question beyond the expiration of the period during which he held the authorization, and this using a copy of the key which had been entrusted to him then or using this key itself, kept by him beyond said expiration.

Pour obtenir un tel résultat, il a déjà été proposé d'invalider automatiquement la clé affectée à chaque serrure par simple présentation à cette serrure d'une nouvelle clé détenue par l'utilisateur habilité suivant.To obtain such a result, it has already been proposed to automatically invalidate the key assigned to each lock by simple presentation to this lock of a new key held by the next authorized user.

Dans certains modes de réalisation connus des installations conçues à cet effet, le code attribué à chaque clé par un émetteur central de clés comporte deux portions enregistrées respectivement sur deux plages distinctes de la clé, savoir une première portion affectée directement au déverrouillage de la serrure et une seconde portion affectée au changement de code.In certain known embodiments of installations designed for this purpose, the code assigned to each key by a central key transmitter comprises two portions recorded respectively on two distinct areas of the key, namely a first portion directly assigned to unlocking the lock and a second portion assigned to the code change.

Pour simplifier, on appellera ci-après « première clé une clé confiée à un premier utilisateur habilité au déverrouillage d'une serrure donnée et « seconde clé une clé confiée ultérieurement à un second utilisateur que l'on désire habiliter à son tour en supprimant l'habilitation du premier, et on désignera respectivement par A et B les portions de code enregistrées par l'émetteur central de clés sur les deux plages de la première clé et par B' et C les portions de code enregistrées respectivement sur les deux plages de la seconde clé.To simplify, the following will be called "first key a key entrusted to a first user authorized to unlock a given lock and" second key a key entrusted subsequently to a second user whom we wish to empower in turn by deleting the 'authorization of the first, and the code portions recorded by the central key transmitter on the two ranges of the first key will be designated by A and B respectively and by B' and C the code portions recorded respectively on the two ranges of the second key.

Dans les modes de réalisation connus, les codes B et B' sont identiques.In the known embodiments, the codes B and B 'are identical.

La serrure concernée comprend à l'origine des moyens pour asservir son déverrouillage à la lecture du code partiel A sur la première plage d'une clé, des moyens pour mettre en mémoire le code partiel B porté sur la seconde plage d'une telle clé portant le code partiel A sur sa première plage, et des moyens de comparaison.The lock concerned originally comprises means for controlling its unlocking on reading the partial code A on the first range of a key, means for storing the partial code B carried on the second range of such a key carrying the partial code A on its first range, and means of comparison.

Tant que la première clé correcte est présentée à la serrure, la lecture du code partiel A de sa première plage assure directement le déverrouillage de cette serrure et le code partiel B n'intervient que par sa mise en mémoire.As long as the first correct key is presented to the lock, the reading of the partial code A of its first range directly ensures the unlocking of this lock and the partial code B only intervenes by its storage.

Lors de la présentation de la seconde clé, la section de déverrouillage de la serrure ne lit plus le code partiel correct A sur la première plage de cette clé, mais le code partiel B.When presenting the second key, the unlocking section of the lock no longer reads the correct partial code A on the first range of this key, but the partial code B.

C'est alors qu'interviennent les moyens de comparaison de la serrure : ceux-ci comparent le code partiel (ici B) mis en mémoire précédemment en provenance de la seconde plage de la première clé au nouveau code partiel lu sur la première plage de la seconde clé.This is where the comparison means of the lock come into play: these compare the partial code (here B) previously stored in memory coming from the second range of the first key with the new partial code read on the first range of the second key.

L'identification résultant d'une telle comparaison a pour effet de déverrouiller la serrure, de faire adopter par cette serrure le code ainsi identifié, c'est-à-dire ici le code partiel B, comme nouveau code de déverrouillage et d'invalider, par effacement ou autrement, le code partiel A de déverrouillage initial.The identification resulting from such a comparison has the effect of unlocking the lock, of making this lock adopt the code thus identified, that is to say here the partial code B, as the new unlocking code and of invalidating , by erasure or otherwise, the partial code A of initial unlocking.

C'est alors le code partiel C de la seconde plage de la seconde clé qui assure le rôle du code partiel B précédent, et ainsi de suite.It is then the partial code C of the second range of the second key which ensures the role of the previous partial code B, and so on.

Une telle formule - qui a fait notamment l'objet des brevets US n° 3 821 704, n° 3 860 911, n° 4 207 555 et n° 4 213118 - présente l'important avantage de permettre une invalidation automatique des clés périmées par la simple utilisation ultérieure des clés valides sans qu'il soit nécessaire de procéder à d'autres interventions locales.Such a formula - which has been the subject, in particular, of US patents No. 3,821,704, No. 3,860,911, No. 4,207,555 and No. 4,213,118 - has the important advantage of allowing automatic invalidation of expired keys by the simple subsequent use of valid keys without the need for other local interventions.

Mais elle n'est pas à l'abri des fraudes.But it is not immune to fraud.

En effet, il est relativement facile pour un utilisateur mal intentionné qui réussit à se faire confier deux clés d'habilitation successives affectées à une même serrure de détecter par comparaison entre les codes enregistrés sur ces deux clés le code partiel commun à celles-ci, savoir B dans l'exemple ci-dessus, et donc d'en déduire le code partiel de déverrouillage (ici C) de la clé suivante de la série correspondant à la serrure considérée et d'établir lui-même une telle clé suivante à l'insu et à la place de l'émetteur central de clés.Indeed, it is relatively easy for a malicious user who succeeds in being entrusted with two successive authorization keys assigned to the same lock to detect by comparison between the codes recorded on these two keys the partial code common to them, to know B in the example above, and therefore to deduce therefrom the partial unlocking code (here C) of the next key of the series corresponding to the lock considered and to establish itself such a following key at l 'Unknowingly and in place of the central key transmitter.

Cette clé suivante, bien que « faussement émise, permet de déverrouiller la serrure considérée aussi bien que la « vraie » clé suivante.This next key, although "falsely issued, allows the lock considered to be unlocked as well as the next" real "key.

Pour bénéficier de l'avantage signalé ci-dessus tout en rendant impossible la fraude qui vient d'être indiquée, il a été proposé, par exemple dans la demande EP-A-0043270, une installation de commande et de contrôle comprenant encore, comme précédemment, un émetteur propre à élaborer des clés codées de commande de serrures et un lecteur associé à chaque serrure, propre à déverrouiller cette serrure sur simple présentation à celui-ci d'une clé codée correctement, cet émetteur et ce lecteur étant agencés de façon telle que la détection par ledit lecteur du code y enregistré par ledit émetteur sur chaque nouvelle clé d'ordre p affectée à la serrure associée à ce lecteur se traduise par l'invalidation du code x enregistré sur la clé d'ordre p― précédemment affectée à cette serrure, de rendre chaque code y déductible du code x par un algorithme y = f(x) mis en mémoire au moins dans l'émetteur.To take advantage of the advantage indicated above while making impossible the fraud which has just been indicated, it has been proposed, for example in application EP-A-0043270, a command and control installation also comprising, as before, a transmitter capable of developing coded keys for controlling locks and a reader associated with each lock, capable of unlocking this lock on simple presentation to this one of a correctly coded key, this transmitter and this reader being arranged in such a way that the detection by said reader of the code y recorded by said transmitter on each new key of order p assigned to the lock associated with this reader results in the invalidation of the code x recorded on the order key p― previously assigned to this lock, to make each code y deductible from the code x by an algorithm y = f (x) stored in memory at least in the transmitter.

Par « algorithme » on entend dans le présent texte un ensemble d'opérations numériques faisant correspondre à un premier nombre x un second nombre y.By "algorithm" is meant in the present text a set of numerical operations corresponding to a first number x a second number y.

Chacun des appareils émetteur et lecteur est alors équipé de façon à exploiter l'algorithme de manière appropriée.Each of the transmitter and reader devices is then equipped so as to exploit the algorithm appropriately.

C'est ainsi que l'émetteur élaborant les clés successives destinées à déverrouiller à tour de rôle la serrure équipée du lecteur considéré est agencé de façon à enregistrer respectivement sur ces clés successives les codes x, f(x), f2(x) ... f(x)...Thus the transmitter working out the successive keys intended to unlock the lock equipped with the reader in turn is arranged so as to register respectively on these successive keys the codes x, f (x), f 2 (x) ... f (x) ...

Dans l'alinéa précédent, n désigne un entier, f"(x) signifie f[fn―1(x)] et le symbole f(x) est équivalent à f(x).In the previous paragraph, n denotes an integer, f "(x) means f [f n ― 1 (x)] and the symbol f (x) is equivalent to f (x).

Quant au lecteur associé à la serrure considérée, il est agencé de façon à comparer successivement les codes lus sur les différentes clés avec les codes x, f(x), f2(x), ..., f"(x)... et à déverrouiller la serrure quand la comparaison effectuée révèle une identité.As for the reader associated with the lock considered, it is arranged so as to compare successively the codes read on the different keys with the codes x, f (x), f 2 (x), ..., f "(x). .. and unlock the lock when the comparison reveals an identity.

En outre le lecteur est équipé de moyens pour invalider automatiquement chaque code fP(x) lorsque la clé portant le code fp+1(x) lui est présentée.In addition, the reader is equipped with means for automatically invalidating each code fP (x) when the key bearing the code f p + 1 (x) is presented to it.

Dans ces conditions, chaque sous-ensemble lecteur-serrure est agencé de façon telle qu'à un instant donné la serrure puisse être déverrouillée par la présentation au lecteur de l'un ou l'autre de deux codes f(x) et fP +1(x), la présentation du premier de ces deux codes se traduisant par le déverrouillage seul de la serrure alors que la présentation du second code se traduit non seulement par ce déverrouillage, mais aussi par l'invalidation du premier code et par la sensibilisation du lecteur au code suivant fp + 2(x) de la série, les rôles joués respectivement juste avant cette présentation du second code fP +1(x) par les deux premiers codes étant joués respectivement à partir de cet instant par les deux codes fP +1(x) et fP + 2(x). Under these conditions, each reader-lock sub-assembly is arranged in such a way that at a given moment the lock can be unlocked by presenting to the reader one or the other of two codes f (x) and f P +1 (x), the presentation of the first of these two codes resulting in the only unlocking of the lock while the presentation of the second code results not only in this unlocking, but also in the invalidation of the first code and in the making the reader aware of the following code f p + 2 (x) of the series, the roles played respectively just before this presentation of the second code fP +1 (x) by the first two codes being played respectively from this instant by the two codes f P +1 (x) and fP + 2 ( x ) .

Dans les modes de réalisation connus d'une telle installation, chaque lecteur n'est sensible à chaque instant qu'à deux codes, savoir les codes fP(x) et f +1(x) dans l'exemple ci-dessus.In the known embodiments of such an installation, each reader is sensitive at each instant to only two codes, namely the codes fP (x) and f +1 (x) in the example above.

Une telle formule exige une synchronisation rigoureuse entre l'émetteur et chaque lecteur.Such a formula requires rigorous synchronization between the transmitter and each reader.

Il peut arriver en effet qu'une « première clé » élaborée par l'émetteur à destination d'une serrure donnée ne soit pas utilisée effectivement avant l'élaboration de la clé suivante ou « seconde clé par ledit émetteur.It may indeed happen that a "first key" produced by the transmitter intended for a given lock is not actually used before the preparation of the next key or "second key by said transmitter.

Il résulte d'un tel défaut d'utilisation un défaut de progression dans la suite des codes lisibles par le lecteur associé à ladite serrure, ce qui rend inopérante ladite « seconde clé » pour l'ouverture de cette serrure.The result of such a failure to use a progression failure in the series of codes readable by the reader associated with said lock, which makes said "second key" inoperative for the opening of this lock.

Cet inconvénient est particulièrement manifeste lorsque chacune des clés considérées est habilitée à l'ouverture d'une pluralité de serrures : dans un tel cas, il peut arriver que l'une au moins desdites serrures n'ait pas été effectivement actionnée par la « première clé correspondante au cours de la période d'habilitation de cette clé.This drawback is particularly manifest when each of the keys considered is authorized to open a plurality of locks: in such a case, it may happen that at least one of said locks was not actually actuated by the "first corresponding key during the authorization period of this key.

L'invention permet de remédier à cet inconvénient.The invention overcomes this drawback.

A cet effet chaque lecteur est rendu sensible à chaque instant à un nombre m supérieur à deux de codes non invalidés de la suite des codes fP(x), fp + 1(x), fp + 2(x)... déductibles les uns des autres par l'algorithme f(x).To this end, each reader is made sensitive at all times to a number m greater than two of non-invalidated codes of the sequence of codes f P (x), f p + 1 (x), f p + 2 (x). deductible from each other by the algorithm f (x).

Ce lecteur est alors agencé de façon telle qu'en lisant l'un quelconque des codes valides de cette suite, il invalide automatiquement tous les codes de rang inférieur de ladite suite.This reader is then arranged in such a way that by reading any of the valid codes of this sequence, it automatically invalidates all the codes of lower rank of said sequence.

Dans ces conditions, la serrure associée audit lecteur peut être ouverte à chaque instant par la dernière clé élaborée par l'émetteur à destination de cette serrure.Under these conditions, the lock associated with said reader can be opened at any time by the last key produced by the transmitter intended for this lock.

Le nombre m est choisi en fonction du risque réel présenté par le défaut signalé ci-dessus : il est de préférence compris entre 5 et 100, étant par exemple de l'ordre de 10.The number m is chosen according to the real risk presented by the defect indicated above: it is preferably between 5 and 100, being for example of the order of 10.

Les différents codes de la suite considérée peuvent être enregistrés à l'avance dans une mémoire du lecteur concerné, le nombre de ces codes valides diminuant progressivement à raison des invalidations successives des clés.The different codes of the suite in question can be recorded in advance in a memory of the reader concerned, the number of these valid codes gradually decreasing due to the successive invalidations of the keys.

Une telle solution présente certes l'avantage de rendre inutile l'exploitation locale réelle de l'algorithme f(x), mais elle exige de recharger chroniquement la mémoire du lecteur.Such a solution certainly has the advantage of making the real local exploitation of the algorithm f (x) unnecessary, but it requires chronically recharging the memory of the reader.

Dans tous les cas le lecteur peut être équipé de moyens pour compter et enregistrer le nombre des changements de codes intervenus depuis l'origine de la vie de la serrure ou depuis un instant déterminé de remise à zéro.In all cases the reader can be equipped with means for counting and recording the number of code changes which have occurred since the origin of the life of the lock or since a determined instant of reset.

Selon un mode de réalisation intéressant, l'algorithme y = f(x) adopté pour tous les lecteurs est le même, mais le code de départ x, de la suite x, f(x), f2(x)..., f"(x)..., qui est affecté initialement au déverrouillage de chaque serrure, diffère de ceux affectés initialement aux autres serrures.According to an interesting embodiment, the algorithm y = f (x) adopted for all the readers is the same, but the starting code x, of the sequence x , f (x), f 2 (x) ... , f "(x) ..., which is initially assigned to unlocking each lock, differs from those initially assigned to other locks.

Dans un tel cas, on peut enregistrer comme précédemment dans une mémoire de chaque lecteur la suite de codes adéquate : l'identification du premier code, de cette suite, valide à un instant donné peut alors être obtenue par le simple comptage, évoqué ci-dessus, du nombre des changements de codes intervenus depuis un instant de départ donné, qui peut être un instant de remise à zéro, comptage complété bien entendu par la connaissance du code de départ affecté à la serrure concernée.In such a case, the appropriate code sequence can be saved as previously in a memory of each reader: the identification of the first code, of this sequence, valid at a given time can then be obtained by simple counting, mentioned above. above, the number of code changes that have occurred since a given start time, which may be a reset time, counting of course supplemented by knowledge of the start code assigned to the lock concerned.

Cette solution simplifie également la construction de l'émetteur puisqu'elle fait appel à un seul algorithme en tout et pour tout pour l'établissement de la totalité des clés.This solution also simplifies the construction of the transmitter since it uses a single algorithm in all and for everything for the establishment of all the keys.

Cette simplification est très importante puisque, par exemple pour l'application de l'invention à la desserte d'un hôtel de 100 chambres, elle revient à diviser par 100 le nombre des algorithmes enregistrés dans l'émetteur ainsi que le nombre des circuits de calcul et de transformation correspondants.This simplification is very important since, for example for the application of the invention to the service of a hotel with 100 rooms, it amounts to dividing by 100 the number of algorithms recorded in the transmitter as well as the number of circuits corresponding calculation and transformation.

La contrepartie de cette simplification - savoir la nécessité d'identifier correctement les différents codes de départ affectés aux différentes serrures et les nombres des changements de codes subséquents - ne supprime qu'une faible partie de l'avantage ainsi obtenu.The counterpart of this simplification - knowing the need to correctly identify the different starting codes assigned to the different locks and the numbers of subsequent code changes - only removes a small part of the advantage thus obtained.

En suite de quoi, et quel que soit le mode de réalisation adopté, on dispose finalement d'une installation de commande et de contrôle des différentes serrures codées d'un ensemble, dont la constitution et le fonctionnement résultent suffisamment de ce qui précède.Following which, and whatever the embodiment adopted, there is finally an installation for command and control of the different coded locks of a set, the constitution and operation of which result sufficiently from the above.

Cette installation présente un certain nombre d'avantages par rapport à celles antérieurement connues.This installation has a number of advantages over those previously known.

En particulier, par rapport aux installations antérieures du premier type évoquées dans l'introduction,

  • - elle rend impossibles les fraudes signalées : en effet, l'utilisateur mal intentionné qui réussirait à se faire confier deux clés successivement habilitées au déverrouillage d'une serrure donnée peut certes en déduire les deux codes x et y enregistrés respectivement sur ces deux clés, mais il ne pourra pas en déduire l'algorithme f(x) qui relie ces deux codes car le nombre d'algorithmes reliant deux nombres entre eux est infini : il ne pourra donc pas élaborer « faussement une clé suivante de la série concernée ;
  • - la richesse de chaque code de déverrouillage enregistré sur une clé donnée est très supérieure à celles des codes partiels desdites installations antérieures du fait que la plage disponible pour l'enregistrement de ce code sur chaque clé est deux fois plus grande.
In particular, compared to the previous installations of the first type mentioned in the introduction,
  • - it makes reported fraud impossible: indeed, the malicious user who succeeds in being entrusted with two keys successively empowered to unlock a given lock can certainly deduce the two codes x and y registered respectively on these two keys, but he will not be able to deduce from it the algorithm f (x) which connects these two codes because the number of algorithms connecting two numbers between them is infinite: he will therefore not be able to “falsely elaborate a following key of the series concerned;
  • - The richness of each unlocking code recorded on a given key is much greater than that of the partial codes of said previous installations because the range available for recording this code on each key is twice as large.

Par rapport aux installations antérieures du second type évoquées dans l'introduction, l'installation ici proposée permet de s'affranchir des servitudes de la « synchronisation entre l'émetteur et les lecteurs, les absences d'usage de certaines « premières clés » ne se traduisant plus ici par la neutralisation des « secondes clés correspondantes.Compared to previous installations of the second type mentioned in the introduction, the installation proposed here overcomes the servitudes of "synchronization between the transmitter and the readers, the absence of use of certain" first keys "does not more reflected here by the neutralization of the “corresponding second keys.

Comme il va de soi, et comme il résulte d'ailleurs déjà de ce qui précède, l'invention ne se limite nullement à ceux de ses modes d'application et de réalisation qui ont été plus spécialement envisagés ; elle en embrasse, au contraire, toutes les variantes, notamment celles où l'algorithme permettant d'élaborer le code y à partir du code précédent x serait fonction non seulement de ce code précédent, mais également d'un numéro affecté à l'ensemble serrure-lecteur concerné, numéro enregistré à la fois dans cet ensemble et dans l'émetteur, notamment dans le cas où le nombre desdits ensembles serait particulièrement élevé.As is obvious, and as already follows from the foregoing, the invention is in no way limited to those of its modes of application and embodiments which have been more especially envisaged; it embraces, on the contrary, all variants, in particular those where the algorithm allowing to develop the code y from the previous code x would be a function not only of this previous code, but also of a number assigned to the set lock-reader concerned, number recorded both in this set and in the transmitter, in particular in the case where the number of said sets is particularly high.

Claims (5)

1. Installation for controlling and monitoring the different coded locks of an assembly, comprising : an emitter capable of elaborating coded keys for controlling said locks and a reader associated with each lock, for unlocking this lock on simple presentation thereto of a correctly coded key, this emitter and this reader being adapted so that detection by said reader of the code y recorded by said emitter on each new key of order p assigned to the lock associated with this reader results in the invalidation of the code x recorded on the key of order p-1 previously assigned to this lock, each code y being derived from code x by an algorithm y = f(x) stored in at least the emitter, characterized in that at any time the reader is responsive simultaneously to a number m greater than 2 of non invalidated codes of the succession x, f(x), f2(X)..., f(x). where f"(x) =f[f-i(x)], and is adapted so that by reading any one of these codes, it automatically invalidates all the lower rank codes of the succession considered.
2. Installation according to claim 1, characterized in that the number m is between 5 and 100.
3. Installation according to any one of the preceding claims, characterized in that the reader is equipped with means for counting and recording the number of code changes taking place from a starting or resetting time.
4. Installation according to any one of the preceding claims, characterized in that one and the same. algorithm is adopted for the different locks, the codes assigned to the unlocking of these different locks at any time differing from each other because of the different choices adopted for the respective starting codes.
5. Installation according to any one of the preceding claims, characterized in that the algorithm for elaborating the code y from the preceding code x is a function not only of this preceding code, but also of a number assigned to the lock-reader assembly concerned, which number is recorded both in this assembly and in the emitter.
EP85401476A 1984-07-18 1985-07-18 Operating and controlling system for a plurality of accesses equipped with coded locks Expired EP0171323B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR8411399A FR2568040B1 (en) 1984-07-18 1984-07-18 INSTALLATION FOR CONTROLLING AND CONTROLLING THE DIFFERENT LOCKED LOCKS OF AN ASSEMBLY
FR8411399 1984-07-18

Publications (2)

Publication Number Publication Date
EP0171323A1 EP0171323A1 (en) 1986-02-12
EP0171323B1 true EP0171323B1 (en) 1988-09-07

Family

ID=9306249

Family Applications (1)

Application Number Title Priority Date Filing Date
EP85401476A Expired EP0171323B1 (en) 1984-07-18 1985-07-18 Operating and controlling system for a plurality of accesses equipped with coded locks

Country Status (4)

Country Link
US (1) US4992785A (en)
EP (1) EP0171323B1 (en)
DE (1) DE3564842D1 (en)
FR (1) FR2568040B1 (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4837822A (en) * 1986-04-08 1989-06-06 Schlage Lock Company Cryptographic based electronic lock system and method of operation
DE3636822C2 (en) * 1986-10-29 1993-12-23 Ruf Kg Wilhelm Electronic remote control device, in particular for central locking systems of motor vehicles
US5506575A (en) * 1991-09-25 1996-04-09 Ormos; Zoltan S. Key-lock system and method using interchange of system-originated codes
DE69221165T2 (en) * 1992-01-09 1997-11-27 Supra Products, Inc., Salem, Oreg. SECURE ACCESS SYSTEM WITH RADIO CONNECTION
US5600324A (en) * 1992-05-11 1997-02-04 Rockwell International Corporation Keyless entry system using a rolling code
WO1994008320A1 (en) * 1992-09-28 1994-04-14 Ormos, Kleopatra Key-lock system
DE4411451C1 (en) * 1994-04-01 1995-05-04 Daimler Benz Ag Vehicle security device with electronic use authorisation encoding
DE4411450C1 (en) * 1994-04-01 1995-03-30 Daimler Benz Ag Vehicle security device with electronic use authorisation encoding
BE1008699A3 (en) * 1994-09-09 1996-07-02 Banksys Method and arrangement for selective give access to a security system.
US5873276A (en) * 1994-11-21 1999-02-23 Mas-Hamilton Group Keypad entry electronic combination lock with self-generated combination
US5709114A (en) * 1994-11-21 1998-01-20 Mas-Hamilton Group Keypad entry electronic combination lock with self-generated combination
US5628216A (en) * 1995-01-13 1997-05-13 Schlage Lock Company Locking device
DE19541116A1 (en) * 1995-10-26 1997-04-30 Elektronik Service & Vertrieb Method and arrangement for producing and recognizing the authenticity of command signals
FR2760874B1 (en) * 1997-03-11 2000-10-13 Fdi Matelec Sa NOUCEN
US20040160305A1 (en) * 2003-02-18 2004-08-19 Michael Remenih Electronic access control system
US8069512B2 (en) * 2006-09-14 2011-12-06 Martin B Rawls-Meehan Adjustable bed frame
US8618907B2 (en) * 2007-10-25 2013-12-31 The Chamberlain Group, Inc. Method and apparatus for coding identification information into a security transmission and method and apparatus for automatic learning of replacement security codes
FR3132373B1 (en) * 2022-02-03 2024-01-05 Cogelec Process for controlling access to buildings

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3800284A (en) * 1973-01-12 1974-03-26 Pitney Bowes Inc Electronic combination lock and lock system
US3860911A (en) * 1973-11-01 1975-01-14 Pitney Bowes Inc Electronic combination lock and lock system
FR2448826A1 (en) * 1979-02-06 1980-09-05 Telediffusion Fse SUBSCRIPTION CARD FOR VIDEOTEX RECEIVER AND CHARGING STATION FOR SAID CARD
US4385231A (en) * 1980-06-27 1983-05-24 Omron Tateisi Electronics Co. Unlocking system for use with cards
EP0044630B1 (en) * 1980-07-01 1984-03-21 Scovill Inc Electronic security device
GB2118614A (en) * 1982-04-16 1983-11-02 Leonard Joseph Genest Method of code changing for electronic lock
DE3225754A1 (en) * 1982-07-09 1984-01-12 Hülsbeck & Fürst GmbH & Co KG, 5620 Velbert METHOD FOR THE LOCKING EFFECTIVE INTERACTION OF A KEY-LIKE PART WITH A LOCK-LIKE PART
GB2124808B (en) * 1982-07-27 1986-06-11 Nat Res Dev Security system
US4558175A (en) * 1982-08-02 1985-12-10 Leonard J. Genest Security system and method for securely communicating therein
DE3244049C2 (en) * 1982-11-27 1986-06-26 Kiekert GmbH & Co KG, 5628 Heiligenhaus Central locking system for a motor vehicle
US4511946A (en) * 1983-01-14 1985-04-16 Schlage Lock Company Programmable combination electronic lock
US4494114B1 (en) * 1983-12-05 1996-10-15 Int Electronic Tech Security arrangement for and method of rendering microprocessor-controlled electronic equipment inoperative after occurrence of disabling event
US4630201A (en) * 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number
US4642631A (en) * 1984-11-01 1987-02-10 Rak Stanley C Interactive security system

Also Published As

Publication number Publication date
FR2568040A1 (en) 1986-01-24
EP0171323A1 (en) 1986-02-12
FR2568040B1 (en) 1989-12-01
US4992785A (en) 1991-02-12
DE3564842D1 (en) 1988-10-13

Similar Documents

Publication Publication Date Title
EP0171323B1 (en) Operating and controlling system for a plurality of accesses equipped with coded locks
EP0172765B1 (en) Access-control method and system involving the sensing of the texture of a surface
EP0805906A1 (en) Programmable electronic locking device
EP0926305B1 (en) Safety device, in particular for motor vehicle
FR2645303A1 (en) PORTABLE SECURITY SEMICONDUCTOR MEMORY DEVICE
US9613382B1 (en) Systems and methods for automatically synchronizing online communities
EP1905189A2 (en) System for managing authenticating data for access to a service
FR2722596A1 (en) SYSTEM FOR CONTROLLING ACCESS LIMITED TO AUTHORIZED AND RENEWABLE TIME PLACES USING A PORTABLE MEMORY MEDIUM
FR2864289A1 (en) Resource access controlling method, involves notifying comparison of biometric data and biometric references of user, to access terminal, by server that communicates simultaneously with terminal and access terminal
EP1055203B1 (en) Protocol between an electronic key and a lock
FR2678755A1 (en) OPTIMIZED SECURITY REMOTE.
EP2108165A1 (en) Temporary locking of an electronic circuit
EP0147284A1 (en) Operating and controlling systems for a plurality of accesses equipped with coded locks
WO2011101407A1 (en) Method for biometric authentication, authentication system and corresponding program
FR2519160A1 (en) Code recognition system for card operated lock - comprises memory on card accessed through microprocessor when correct procedure is followed by processor at lock
FR2774120A1 (en) Remote security lock for vehicles
EP1567978B1 (en) Secure electronic entity integrating life span management of an object
CA2694335C (en) Management and sharing of dematerialised safes
FR2834366A1 (en) SELF-LOCKING CHIP CARD, DEVICE FOR SECURING SUCH A CARD AND RELATED METHODS
WO2004029873A1 (en) Secure electronic unit comprising time management system
EP2266276A2 (en) Management of the identities of users in a system
WO2022184726A1 (en) Method for enabling users to deploy smart contracts in a blockchain using a deployment platform
CA2275940A1 (en) Dynamic data interpretation method for a chip card
WO2002082242A1 (en) Method for managing secure access to digital resources of a server and related system
FR2633653A1 (en) Actuating system, especially for locking an enclosure to be protected

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Designated state(s): DE GB IT

17P Request for examination filed

Effective date: 19860329

17Q First examination report despatched

Effective date: 19871028

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): DE GB IT

ITF It: translation for a ep patent filed
REF Corresponds to:

Ref document number: 3564842

Country of ref document: DE

Date of ref document: 19881013

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 19890731

Year of fee payment: 5

26N No opposition filed
PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Effective date: 19900718

GBPC Gb: european patent ceased through non-payment of renewal fee
ITTA It: last paid annual fee
PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 19950731

Year of fee payment: 11

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Effective date: 19970402