EP0171323B1 - Operating and controlling system for a plurality of accesses equipped with coded locks - Google Patents
Operating and controlling system for a plurality of accesses equipped with coded locks Download PDFInfo
- Publication number
- EP0171323B1 EP0171323B1 EP85401476A EP85401476A EP0171323B1 EP 0171323 B1 EP0171323 B1 EP 0171323B1 EP 85401476 A EP85401476 A EP 85401476A EP 85401476 A EP85401476 A EP 85401476A EP 0171323 B1 EP0171323 B1 EP 0171323B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- code
- reader
- lock
- codes
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired
Links
- 238000009434 installation Methods 0.000 claims abstract description 19
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 16
- 238000001514 detection method Methods 0.000 claims abstract description 3
- 238000012544 monitoring process Methods 0.000 claims abstract 2
- 238000013475 authorization Methods 0.000 description 4
- 240000008042 Zea mays Species 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 210000004027 cell Anatomy 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000006386 neutralization reaction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00904—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
- G07C2009/0023—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks with encription of the transmittted data signal
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/04—Access control involving a hierarchy in access rights
Definitions
- the invention relates to installations for command and control of the different coded locks of an assembly comprising a relatively large number of such locks, this number preferably being greater than 50 and even more than 100.
- the coded keys in question are preferably cards carrying a code recorded in magnetic or optical form, or even portable transmitters of codes in the form of electromagnetic or ultrasonic waves, and the codes considered are numbers expressed by sequences binary signals.
- the coded keys may also consist of an intangible code intelligibly entrusted to an authorized user, for example in the form of a series of numbers and / or letters, and intended to be composed on a keyboard arranged near the lock or to be reproduced in any other desirable manner.
- the code assigned to each key by a central key transmitter comprises two portions recorded respectively on two distinct areas of the key, namely a first portion directly assigned to unlocking the lock and a second portion assigned to the code change.
- first key a key entrusted to a first user authorized to unlock a given lock
- second key a key entrusted subsequently to a second user whom we wish to empower in turn by deleting the 'authorization of the first
- the code portions recorded by the central key transmitter on the two ranges of the first key will be designated by A and B respectively and by B' and C the code portions recorded respectively on the two ranges of the second key.
- the lock concerned originally comprises means for controlling its unlocking on reading the partial code A on the first range of a key, means for storing the partial code B carried on the second range of such a key carrying the partial code A on its first range, and means of comparison.
- the reading of the partial code A of its first range directly ensures the unlocking of this lock and the partial code B only intervenes by its storage.
- the unlocking section of the lock no longer reads the correct partial code A on the first range of this key, but the partial code B.
- comparison means of the lock come into play: these compare the partial code (here B) previously stored in memory coming from the second range of the first key with the new partial code read on the first range of the second key.
- the identification resulting from such a comparison has the effect of unlocking the lock, of making this lock adopt the code thus identified, that is to say here the partial code B, as the new unlocking code and of invalidating , by erasure or otherwise, the partial code A of initial unlocking.
- algorithm is meant in the present text a set of numerical operations corresponding to a first number x a second number y.
- Each of the transmitter and reader devices is then equipped so as to exploit the algorithm appropriately.
- the transmitter working out the successive keys intended to unlock the lock equipped with the reader in turn is arranged so as to register respectively on these successive keys the codes x, f (x), f 2 (x) ... f (x) ...
- n denotes an integer
- f means f [f n ⁇ 1 (x)] and the symbol f (x) is equivalent to f (x).
- the reader associated with the lock considered it is arranged so as to compare successively the codes read on the different keys with the codes x, f (x), f 2 (x), ..., f "(x). .. and unlock the lock when the comparison reveals an identity.
- the reader is equipped with means for automatically invalidating each code fP (x) when the key bearing the code f p + 1 (x) is presented to it.
- each reader-lock sub-assembly is arranged in such a way that at a given moment the lock can be unlocked by presenting to the reader one or the other of two codes f (x) and f P +1 (x), the presentation of the first of these two codes resulting in the only unlocking of the lock while the presentation of the second code results not only in this unlocking, but also in the invalidation of the first code and in the making the reader aware of the following code f p + 2 (x) of the series, the roles played respectively just before this presentation of the second code fP +1 (x) by the first two codes being played respectively from this instant by the two codes f P +1 (x) and fP + 2 ( x ) .
- each reader is sensitive at each instant to only two codes, namely the codes fP (x) and f +1 (x) in the example above.
- the invention overcomes this drawback.
- each reader is made sensitive at all times to a number m greater than two of non-invalidated codes of the sequence of codes f P (x), f p + 1 (x), f p + 2 (x). deductible from each other by the algorithm f (x).
- This reader is then arranged in such a way that by reading any of the valid codes of this sequence, it automatically invalidates all the codes of lower rank of said sequence.
- the lock associated with said reader can be opened at any time by the last key produced by the transmitter intended for this lock.
- the number m is chosen according to the real risk presented by the defect indicated above: it is preferably between 5 and 100, being for example of the order of 10.
- the different codes of the suite in question can be recorded in advance in a memory of the reader concerned, the number of these valid codes gradually decreasing due to the successive invalidations of the keys.
- the reader can be equipped with means for counting and recording the number of code changes which have occurred since the origin of the life of the lock or since a determined instant of reset.
- the appropriate code sequence can be saved as previously in a memory of each reader: the identification of the first code, of this sequence, valid at a given time can then be obtained by simple counting, mentioned above. above, the number of code changes that have occurred since a given start time, which may be a reset time, counting of course supplemented by knowledge of the start code assigned to the lock concerned.
- This simplification is very important since, for example for the application of the invention to the service of a hotel with 100 rooms, it amounts to dividing by 100 the number of algorithms recorded in the transmitter as well as the number of circuits corresponding calculation and transformation.
- the installation proposed here overcomes the servitudes of "synchronization between the transmitter and the readers, the absence of use of certain" first keys "does not more reflected here by the neutralization of the “corresponding second keys.
- the invention is in no way limited to those of its modes of application and embodiments which have been more especially envisaged; it embraces, on the contrary, all variants, in particular those where the algorithm allowing to develop the code y from the previous code x would be a function not only of this previous code, but also of a number assigned to the set lock-reader concerned, number recorded both in this set and in the transmitter, in particular in the case where the number of said sets is particularly high.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
L'invention concerne les installations de commande et de contrôle des différentes serrures codées d'un ensemble comportant un nombre relativement élevé de telles serrures, ce nombre étant de préférence supérieur à 50 et même à 100.The invention relates to installations for command and control of the different coded locks of an assembly comprising a relatively large number of such locks, this number preferably being greater than 50 and even more than 100.
Elle concerne plus particulièrement, parce que c'est dans leur cas que son application semble devoir offrir le plus d'intérêt, mais non exclusivement, parmi ces installations, celles équipant les hôtels comprenant un grand nombre de chambres, chacune de ces chambres étant accessible par une porte équipée d'une serrure codée, laquelle serrure est commandable électriquement à l'aide d'une clé codée en correspondance.It concerns more particularly, because it is in their case that its application seems to offer the most interest, but not exclusively, among these installations, those equipping hotels comprising a large number of rooms, each of these rooms being accessible by a door fitted with a coded lock, which lock is electrically controllable using a corresponding coded key.
Les clés codées en question sont de préférence des cartes portant un code enregistré sous forme magnétique ou optique, ou encore des émetteurs portables de codes se présentant sous la forme d'ondes électromagnétiques ou ultrasonores, et les codes considérés sont des nombres exprimés par des suites de signaux binaires.The coded keys in question are preferably cards carrying a code recorded in magnetic or optical form, or even portable transmitters of codes in the form of electromagnetic or ultrasonic waves, and the codes considered are numbers expressed by sequences binary signals.
Les clés codées peuvent être également constituées par un code immatériel confié de façon intelligible à un usager habilité, par exemple sous la forme d'une suite de chiffres et/ou de lettres, et destiné à être composé sur un clavier disposé à proximité de la serrure ou à être reproduit de toute autre manière désirable.The coded keys may also consist of an intangible code intelligibly entrusted to an authorized user, for example in the form of a series of numbers and / or letters, and intended to be composed on a keyboard arranged near the lock or to be reproduced in any other desirable manner.
Dans les installations du genre indiqué, les personnes habilitées au déverrouillage d'une serrure donnée ne le sont que provisoirement et changent fréquemment.In installations of the type indicated, the persons authorized to unlock a given lock are only provisional and change frequently.
Il faut donc éviter qu'un utilisateur mal intentionné puisse continuer à déverrouiller la serrure considérée au-delà de l'expiration de la période au cours de laquelle il en détenait l'autorisation, et ce à l'aide d'une copie de la clé qui lui avait été confiée alors ou à l'aide de cette clé elle-même, conservée par lui au-delà de ladite expiration.It must therefore be avoided that a malicious user can continue to unlock the lock in question beyond the expiration of the period during which he held the authorization, and this using a copy of the key which had been entrusted to him then or using this key itself, kept by him beyond said expiration.
Pour obtenir un tel résultat, il a déjà été proposé d'invalider automatiquement la clé affectée à chaque serrure par simple présentation à cette serrure d'une nouvelle clé détenue par l'utilisateur habilité suivant.To obtain such a result, it has already been proposed to automatically invalidate the key assigned to each lock by simple presentation to this lock of a new key held by the next authorized user.
Dans certains modes de réalisation connus des installations conçues à cet effet, le code attribué à chaque clé par un émetteur central de clés comporte deux portions enregistrées respectivement sur deux plages distinctes de la clé, savoir une première portion affectée directement au déverrouillage de la serrure et une seconde portion affectée au changement de code.In certain known embodiments of installations designed for this purpose, the code assigned to each key by a central key transmitter comprises two portions recorded respectively on two distinct areas of the key, namely a first portion directly assigned to unlocking the lock and a second portion assigned to the code change.
Pour simplifier, on appellera ci-après « première clé une clé confiée à un premier utilisateur habilité au déverrouillage d'une serrure donnée et « seconde clé une clé confiée ultérieurement à un second utilisateur que l'on désire habiliter à son tour en supprimant l'habilitation du premier, et on désignera respectivement par A et B les portions de code enregistrées par l'émetteur central de clés sur les deux plages de la première clé et par B' et C les portions de code enregistrées respectivement sur les deux plages de la seconde clé.To simplify, the following will be called "first key a key entrusted to a first user authorized to unlock a given lock and" second key a key entrusted subsequently to a second user whom we wish to empower in turn by deleting the 'authorization of the first, and the code portions recorded by the central key transmitter on the two ranges of the first key will be designated by A and B respectively and by B' and C the code portions recorded respectively on the two ranges of the second key.
Dans les modes de réalisation connus, les codes B et B' sont identiques.In the known embodiments, the codes B and B 'are identical.
La serrure concernée comprend à l'origine des moyens pour asservir son déverrouillage à la lecture du code partiel A sur la première plage d'une clé, des moyens pour mettre en mémoire le code partiel B porté sur la seconde plage d'une telle clé portant le code partiel A sur sa première plage, et des moyens de comparaison.The lock concerned originally comprises means for controlling its unlocking on reading the partial code A on the first range of a key, means for storing the partial code B carried on the second range of such a key carrying the partial code A on its first range, and means of comparison.
Tant que la première clé correcte est présentée à la serrure, la lecture du code partiel A de sa première plage assure directement le déverrouillage de cette serrure et le code partiel B n'intervient que par sa mise en mémoire.As long as the first correct key is presented to the lock, the reading of the partial code A of its first range directly ensures the unlocking of this lock and the partial code B only intervenes by its storage.
Lors de la présentation de la seconde clé, la section de déverrouillage de la serrure ne lit plus le code partiel correct A sur la première plage de cette clé, mais le code partiel B.When presenting the second key, the unlocking section of the lock no longer reads the correct partial code A on the first range of this key, but the partial code B.
C'est alors qu'interviennent les moyens de comparaison de la serrure : ceux-ci comparent le code partiel (ici B) mis en mémoire précédemment en provenance de la seconde plage de la première clé au nouveau code partiel lu sur la première plage de la seconde clé.This is where the comparison means of the lock come into play: these compare the partial code (here B) previously stored in memory coming from the second range of the first key with the new partial code read on the first range of the second key.
L'identification résultant d'une telle comparaison a pour effet de déverrouiller la serrure, de faire adopter par cette serrure le code ainsi identifié, c'est-à-dire ici le code partiel B, comme nouveau code de déverrouillage et d'invalider, par effacement ou autrement, le code partiel A de déverrouillage initial.The identification resulting from such a comparison has the effect of unlocking the lock, of making this lock adopt the code thus identified, that is to say here the partial code B, as the new unlocking code and of invalidating , by erasure or otherwise, the partial code A of initial unlocking.
C'est alors le code partiel C de la seconde plage de la seconde clé qui assure le rôle du code partiel B précédent, et ainsi de suite.It is then the partial code C of the second range of the second key which ensures the role of the previous partial code B, and so on.
Une telle formule - qui a fait notamment l'objet des brevets US n° 3 821 704, n° 3 860 911, n° 4 207 555 et n° 4 213118 - présente l'important avantage de permettre une invalidation automatique des clés périmées par la simple utilisation ultérieure des clés valides sans qu'il soit nécessaire de procéder à d'autres interventions locales.Such a formula - which has been the subject, in particular, of US patents No. 3,821,704, No. 3,860,911, No. 4,207,555 and No. 4,213,118 - has the important advantage of allowing automatic invalidation of expired keys by the simple subsequent use of valid keys without the need for other local interventions.
Mais elle n'est pas à l'abri des fraudes.But it is not immune to fraud.
En effet, il est relativement facile pour un utilisateur mal intentionné qui réussit à se faire confier deux clés d'habilitation successives affectées à une même serrure de détecter par comparaison entre les codes enregistrés sur ces deux clés le code partiel commun à celles-ci, savoir B dans l'exemple ci-dessus, et donc d'en déduire le code partiel de déverrouillage (ici C) de la clé suivante de la série correspondant à la serrure considérée et d'établir lui-même une telle clé suivante à l'insu et à la place de l'émetteur central de clés.Indeed, it is relatively easy for a malicious user who succeeds in being entrusted with two successive authorization keys assigned to the same lock to detect by comparison between the codes recorded on these two keys the partial code common to them, to know B in the example above, and therefore to deduce therefrom the partial unlocking code (here C) of the next key of the series corresponding to the lock considered and to establish itself such a following key at l 'Unknowingly and in place of the central key transmitter.
Cette clé suivante, bien que « faussement émise, permet de déverrouiller la serrure considérée aussi bien que la « vraie » clé suivante.This next key, although "falsely issued, allows the lock considered to be unlocked as well as the next" real "key.
Pour bénéficier de l'avantage signalé ci-dessus tout en rendant impossible la fraude qui vient d'être indiquée, il a été proposé, par exemple dans la demande EP-A-0043270, une installation de commande et de contrôle comprenant encore, comme précédemment, un émetteur propre à élaborer des clés codées de commande de serrures et un lecteur associé à chaque serrure, propre à déverrouiller cette serrure sur simple présentation à celui-ci d'une clé codée correctement, cet émetteur et ce lecteur étant agencés de façon telle que la détection par ledit lecteur du code y enregistré par ledit émetteur sur chaque nouvelle clé d'ordre p affectée à la serrure associée à ce lecteur se traduise par l'invalidation du code x enregistré sur la clé d'ordre p― précédemment affectée à cette serrure, de rendre chaque code y déductible du code x par un algorithme y = f(x) mis en mémoire au moins dans l'émetteur.To take advantage of the advantage indicated above while making impossible the fraud which has just been indicated, it has been proposed, for example in application EP-A-0043270, a command and control installation also comprising, as before, a transmitter capable of developing coded keys for controlling locks and a reader associated with each lock, capable of unlocking this lock on simple presentation to this one of a correctly coded key, this transmitter and this reader being arranged in such a way that the detection by said reader of the code y recorded by said transmitter on each new key of order p assigned to the lock associated with this reader results in the invalidation of the code x recorded on the order key p― previously assigned to this lock, to make each code y deductible from the code x by an algorithm y = f (x) stored in memory at least in the transmitter.
Par « algorithme » on entend dans le présent texte un ensemble d'opérations numériques faisant correspondre à un premier nombre x un second nombre y.By "algorithm" is meant in the present text a set of numerical operations corresponding to a first number x a second number y.
Chacun des appareils émetteur et lecteur est alors équipé de façon à exploiter l'algorithme de manière appropriée.Each of the transmitter and reader devices is then equipped so as to exploit the algorithm appropriately.
C'est ainsi que l'émetteur élaborant les clés successives destinées à déverrouiller à tour de rôle la serrure équipée du lecteur considéré est agencé de façon à enregistrer respectivement sur ces clés successives les codes x, f(x), f2(x) ... f(x)...Thus the transmitter working out the successive keys intended to unlock the lock equipped with the reader in turn is arranged so as to register respectively on these successive keys the codes x, f (x), f 2 (x) ... f (x) ...
Dans l'alinéa précédent, n désigne un entier, f"(x) signifie f[fn―1(x)] et le symbole f(x) est équivalent à f(x).In the previous paragraph, n denotes an integer, f "(x) means f [f n ― 1 (x)] and the symbol f (x) is equivalent to f (x).
Quant au lecteur associé à la serrure considérée, il est agencé de façon à comparer successivement les codes lus sur les différentes clés avec les codes x, f(x), f2(x), ..., f"(x)... et à déverrouiller la serrure quand la comparaison effectuée révèle une identité.As for the reader associated with the lock considered, it is arranged so as to compare successively the codes read on the different keys with the codes x, f (x), f 2 (x), ..., f "(x). .. and unlock the lock when the comparison reveals an identity.
En outre le lecteur est équipé de moyens pour invalider automatiquement chaque code fP(x) lorsque la clé portant le code fp+1(x) lui est présentée.In addition, the reader is equipped with means for automatically invalidating each code fP (x) when the key bearing the code f p + 1 (x) is presented to it.
Dans ces conditions, chaque sous-ensemble lecteur-serrure est agencé de façon telle qu'à un instant donné la serrure puisse être déverrouillée par la présentation au lecteur de l'un ou l'autre de deux codes f(x) et fP +1(x), la présentation du premier de ces deux codes se traduisant par le déverrouillage seul de la serrure alors que la présentation du second code se traduit non seulement par ce déverrouillage, mais aussi par l'invalidation du premier code et par la sensibilisation du lecteur au code suivant fp + 2(x) de la série, les rôles joués respectivement juste avant cette présentation du second code fP +1(x) par les deux premiers codes étant joués respectivement à partir de cet instant par les deux codes fP +1(x) et fP + 2(x). Under these conditions, each reader-lock sub-assembly is arranged in such a way that at a given moment the lock can be unlocked by presenting to the reader one or the other of two codes f (x) and f P +1 (x), the presentation of the first of these two codes resulting in the only unlocking of the lock while the presentation of the second code results not only in this unlocking, but also in the invalidation of the first code and in the making the reader aware of the following code f p + 2 (x) of the series, the roles played respectively just before this presentation of the second code fP +1 (x) by the first two codes being played respectively from this instant by the two codes f P +1 (x) and fP + 2 ( x ) .
Dans les modes de réalisation connus d'une telle installation, chaque lecteur n'est sensible à chaque instant qu'à deux codes, savoir les codes fP(x) et f +1(x) dans l'exemple ci-dessus.In the known embodiments of such an installation, each reader is sensitive at each instant to only two codes, namely the codes fP (x) and f +1 (x) in the example above.
Une telle formule exige une synchronisation rigoureuse entre l'émetteur et chaque lecteur.Such a formula requires rigorous synchronization between the transmitter and each reader.
Il peut arriver en effet qu'une « première clé » élaborée par l'émetteur à destination d'une serrure donnée ne soit pas utilisée effectivement avant l'élaboration de la clé suivante ou « seconde clé par ledit émetteur.It may indeed happen that a "first key" produced by the transmitter intended for a given lock is not actually used before the preparation of the next key or "second key by said transmitter.
Il résulte d'un tel défaut d'utilisation un défaut de progression dans la suite des codes lisibles par le lecteur associé à ladite serrure, ce qui rend inopérante ladite « seconde clé » pour l'ouverture de cette serrure.The result of such a failure to use a progression failure in the series of codes readable by the reader associated with said lock, which makes said "second key" inoperative for the opening of this lock.
Cet inconvénient est particulièrement manifeste lorsque chacune des clés considérées est habilitée à l'ouverture d'une pluralité de serrures : dans un tel cas, il peut arriver que l'une au moins desdites serrures n'ait pas été effectivement actionnée par la « première clé correspondante au cours de la période d'habilitation de cette clé.This drawback is particularly manifest when each of the keys considered is authorized to open a plurality of locks: in such a case, it may happen that at least one of said locks was not actually actuated by the "first corresponding key during the authorization period of this key.
L'invention permet de remédier à cet inconvénient.The invention overcomes this drawback.
A cet effet chaque lecteur est rendu sensible à chaque instant à un nombre m supérieur à deux de codes non invalidés de la suite des codes fP(x), fp + 1(x), fp + 2(x)... déductibles les uns des autres par l'algorithme f(x).To this end, each reader is made sensitive at all times to a number m greater than two of non-invalidated codes of the sequence of codes f P (x), f p + 1 (x), f p + 2 (x). deductible from each other by the algorithm f (x).
Ce lecteur est alors agencé de façon telle qu'en lisant l'un quelconque des codes valides de cette suite, il invalide automatiquement tous les codes de rang inférieur de ladite suite.This reader is then arranged in such a way that by reading any of the valid codes of this sequence, it automatically invalidates all the codes of lower rank of said sequence.
Dans ces conditions, la serrure associée audit lecteur peut être ouverte à chaque instant par la dernière clé élaborée par l'émetteur à destination de cette serrure.Under these conditions, the lock associated with said reader can be opened at any time by the last key produced by the transmitter intended for this lock.
Le nombre m est choisi en fonction du risque réel présenté par le défaut signalé ci-dessus : il est de préférence compris entre 5 et 100, étant par exemple de l'ordre de 10.The number m is chosen according to the real risk presented by the defect indicated above: it is preferably between 5 and 100, being for example of the order of 10.
Les différents codes de la suite considérée peuvent être enregistrés à l'avance dans une mémoire du lecteur concerné, le nombre de ces codes valides diminuant progressivement à raison des invalidations successives des clés.The different codes of the suite in question can be recorded in advance in a memory of the reader concerned, the number of these valid codes gradually decreasing due to the successive invalidations of the keys.
Une telle solution présente certes l'avantage de rendre inutile l'exploitation locale réelle de l'algorithme f(x), mais elle exige de recharger chroniquement la mémoire du lecteur.Such a solution certainly has the advantage of making the real local exploitation of the algorithm f (x) unnecessary, but it requires chronically recharging the memory of the reader.
Dans tous les cas le lecteur peut être équipé de moyens pour compter et enregistrer le nombre des changements de codes intervenus depuis l'origine de la vie de la serrure ou depuis un instant déterminé de remise à zéro.In all cases the reader can be equipped with means for counting and recording the number of code changes which have occurred since the origin of the life of the lock or since a determined instant of reset.
Selon un mode de réalisation intéressant, l'algorithme y = f(x) adopté pour tous les lecteurs est le même, mais le code de départ x, de la suite x, f(x), f2(x)..., f"(x)..., qui est affecté initialement au déverrouillage de chaque serrure, diffère de ceux affectés initialement aux autres serrures.According to an interesting embodiment, the algorithm y = f (x) adopted for all the readers is the same, but the starting code x, of the sequence x , f (x), f 2 (x) ... , f "(x) ..., which is initially assigned to unlocking each lock, differs from those initially assigned to other locks.
Dans un tel cas, on peut enregistrer comme précédemment dans une mémoire de chaque lecteur la suite de codes adéquate : l'identification du premier code, de cette suite, valide à un instant donné peut alors être obtenue par le simple comptage, évoqué ci-dessus, du nombre des changements de codes intervenus depuis un instant de départ donné, qui peut être un instant de remise à zéro, comptage complété bien entendu par la connaissance du code de départ affecté à la serrure concernée.In such a case, the appropriate code sequence can be saved as previously in a memory of each reader: the identification of the first code, of this sequence, valid at a given time can then be obtained by simple counting, mentioned above. above, the number of code changes that have occurred since a given start time, which may be a reset time, counting of course supplemented by knowledge of the start code assigned to the lock concerned.
Cette solution simplifie également la construction de l'émetteur puisqu'elle fait appel à un seul algorithme en tout et pour tout pour l'établissement de la totalité des clés.This solution also simplifies the construction of the transmitter since it uses a single algorithm in all and for everything for the establishment of all the keys.
Cette simplification est très importante puisque, par exemple pour l'application de l'invention à la desserte d'un hôtel de 100 chambres, elle revient à diviser par 100 le nombre des algorithmes enregistrés dans l'émetteur ainsi que le nombre des circuits de calcul et de transformation correspondants.This simplification is very important since, for example for the application of the invention to the service of a hotel with 100 rooms, it amounts to dividing by 100 the number of algorithms recorded in the transmitter as well as the number of circuits corresponding calculation and transformation.
La contrepartie de cette simplification - savoir la nécessité d'identifier correctement les différents codes de départ affectés aux différentes serrures et les nombres des changements de codes subséquents - ne supprime qu'une faible partie de l'avantage ainsi obtenu.The counterpart of this simplification - knowing the need to correctly identify the different starting codes assigned to the different locks and the numbers of subsequent code changes - only removes a small part of the advantage thus obtained.
En suite de quoi, et quel que soit le mode de réalisation adopté, on dispose finalement d'une installation de commande et de contrôle des différentes serrures codées d'un ensemble, dont la constitution et le fonctionnement résultent suffisamment de ce qui précède.Following which, and whatever the embodiment adopted, there is finally an installation for command and control of the different coded locks of a set, the constitution and operation of which result sufficiently from the above.
Cette installation présente un certain nombre d'avantages par rapport à celles antérieurement connues.This installation has a number of advantages over those previously known.
En particulier, par rapport aux installations antérieures du premier type évoquées dans l'introduction,
- - elle rend impossibles les fraudes signalées : en effet, l'utilisateur mal intentionné qui réussirait à se faire confier deux clés successivement habilitées au déverrouillage d'une serrure donnée peut certes en déduire les deux codes x et y enregistrés respectivement sur ces deux clés, mais il ne pourra pas en déduire l'algorithme f(x) qui relie ces deux codes car le nombre d'algorithmes reliant deux nombres entre eux est infini : il ne pourra donc pas élaborer « faussement une clé suivante de la série concernée ;
- - la richesse de chaque code de déverrouillage enregistré sur une clé donnée est très supérieure à celles des codes partiels desdites installations antérieures du fait que la plage disponible pour l'enregistrement de ce code sur chaque clé est deux fois plus grande.
- - it makes reported fraud impossible: indeed, the malicious user who succeeds in being entrusted with two keys successively empowered to unlock a given lock can certainly deduce the two codes x and y registered respectively on these two keys, but he will not be able to deduce from it the algorithm f (x) which connects these two codes because the number of algorithms connecting two numbers between them is infinite: he will therefore not be able to “falsely elaborate a following key of the series concerned;
- - The richness of each unlocking code recorded on a given key is much greater than that of the partial codes of said previous installations because the range available for recording this code on each key is twice as large.
Par rapport aux installations antérieures du second type évoquées dans l'introduction, l'installation ici proposée permet de s'affranchir des servitudes de la « synchronisation entre l'émetteur et les lecteurs, les absences d'usage de certaines « premières clés » ne se traduisant plus ici par la neutralisation des « secondes clés correspondantes.Compared to previous installations of the second type mentioned in the introduction, the installation proposed here overcomes the servitudes of "synchronization between the transmitter and the readers, the absence of use of certain" first keys "does not more reflected here by the neutralization of the “corresponding second keys.
Comme il va de soi, et comme il résulte d'ailleurs déjà de ce qui précède, l'invention ne se limite nullement à ceux de ses modes d'application et de réalisation qui ont été plus spécialement envisagés ; elle en embrasse, au contraire, toutes les variantes, notamment celles où l'algorithme permettant d'élaborer le code y à partir du code précédent x serait fonction non seulement de ce code précédent, mais également d'un numéro affecté à l'ensemble serrure-lecteur concerné, numéro enregistré à la fois dans cet ensemble et dans l'émetteur, notamment dans le cas où le nombre desdits ensembles serait particulièrement élevé.As is obvious, and as already follows from the foregoing, the invention is in no way limited to those of its modes of application and embodiments which have been more especially envisaged; it embraces, on the contrary, all variants, in particular those where the algorithm allowing to develop the code y from the previous code x would be a function not only of this previous code, but also of a number assigned to the set lock-reader concerned, number recorded both in this set and in the transmitter, in particular in the case where the number of said sets is particularly high.
Claims (5)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR8411399A FR2568040B1 (en) | 1984-07-18 | 1984-07-18 | INSTALLATION FOR CONTROLLING AND CONTROLLING THE DIFFERENT LOCKED LOCKS OF AN ASSEMBLY |
FR8411399 | 1984-07-18 |
Publications (2)
Publication Number | Publication Date |
---|---|
EP0171323A1 EP0171323A1 (en) | 1986-02-12 |
EP0171323B1 true EP0171323B1 (en) | 1988-09-07 |
Family
ID=9306249
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP85401476A Expired EP0171323B1 (en) | 1984-07-18 | 1985-07-18 | Operating and controlling system for a plurality of accesses equipped with coded locks |
Country Status (4)
Country | Link |
---|---|
US (1) | US4992785A (en) |
EP (1) | EP0171323B1 (en) |
DE (1) | DE3564842D1 (en) |
FR (1) | FR2568040B1 (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4837822A (en) * | 1986-04-08 | 1989-06-06 | Schlage Lock Company | Cryptographic based electronic lock system and method of operation |
DE3636822C2 (en) * | 1986-10-29 | 1993-12-23 | Ruf Kg Wilhelm | Electronic remote control device, in particular for central locking systems of motor vehicles |
US5506575A (en) * | 1991-09-25 | 1996-04-09 | Ormos; Zoltan S. | Key-lock system and method using interchange of system-originated codes |
DE69221165T2 (en) * | 1992-01-09 | 1997-11-27 | Supra Products, Inc., Salem, Oreg. | SECURE ACCESS SYSTEM WITH RADIO CONNECTION |
US5600324A (en) * | 1992-05-11 | 1997-02-04 | Rockwell International Corporation | Keyless entry system using a rolling code |
WO1994008320A1 (en) * | 1992-09-28 | 1994-04-14 | Ormos, Kleopatra | Key-lock system |
DE4411451C1 (en) * | 1994-04-01 | 1995-05-04 | Daimler Benz Ag | Vehicle security device with electronic use authorisation encoding |
DE4411450C1 (en) * | 1994-04-01 | 1995-03-30 | Daimler Benz Ag | Vehicle security device with electronic use authorisation encoding |
BE1008699A3 (en) * | 1994-09-09 | 1996-07-02 | Banksys | Method and arrangement for selective give access to a security system. |
US5873276A (en) * | 1994-11-21 | 1999-02-23 | Mas-Hamilton Group | Keypad entry electronic combination lock with self-generated combination |
US5709114A (en) * | 1994-11-21 | 1998-01-20 | Mas-Hamilton Group | Keypad entry electronic combination lock with self-generated combination |
US5628216A (en) * | 1995-01-13 | 1997-05-13 | Schlage Lock Company | Locking device |
DE19541116A1 (en) * | 1995-10-26 | 1997-04-30 | Elektronik Service & Vertrieb | Method and arrangement for producing and recognizing the authenticity of command signals |
FR2760874B1 (en) * | 1997-03-11 | 2000-10-13 | Fdi Matelec Sa | NOUCEN |
US20040160305A1 (en) * | 2003-02-18 | 2004-08-19 | Michael Remenih | Electronic access control system |
US8069512B2 (en) * | 2006-09-14 | 2011-12-06 | Martin B Rawls-Meehan | Adjustable bed frame |
US8618907B2 (en) * | 2007-10-25 | 2013-12-31 | The Chamberlain Group, Inc. | Method and apparatus for coding identification information into a security transmission and method and apparatus for automatic learning of replacement security codes |
FR3132373B1 (en) * | 2022-02-03 | 2024-01-05 | Cogelec | Process for controlling access to buildings |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3800284A (en) * | 1973-01-12 | 1974-03-26 | Pitney Bowes Inc | Electronic combination lock and lock system |
US3860911A (en) * | 1973-11-01 | 1975-01-14 | Pitney Bowes Inc | Electronic combination lock and lock system |
FR2448826A1 (en) * | 1979-02-06 | 1980-09-05 | Telediffusion Fse | SUBSCRIPTION CARD FOR VIDEOTEX RECEIVER AND CHARGING STATION FOR SAID CARD |
US4385231A (en) * | 1980-06-27 | 1983-05-24 | Omron Tateisi Electronics Co. | Unlocking system for use with cards |
EP0044630B1 (en) * | 1980-07-01 | 1984-03-21 | Scovill Inc | Electronic security device |
GB2118614A (en) * | 1982-04-16 | 1983-11-02 | Leonard Joseph Genest | Method of code changing for electronic lock |
DE3225754A1 (en) * | 1982-07-09 | 1984-01-12 | Hülsbeck & Fürst GmbH & Co KG, 5620 Velbert | METHOD FOR THE LOCKING EFFECTIVE INTERACTION OF A KEY-LIKE PART WITH A LOCK-LIKE PART |
GB2124808B (en) * | 1982-07-27 | 1986-06-11 | Nat Res Dev | Security system |
US4558175A (en) * | 1982-08-02 | 1985-12-10 | Leonard J. Genest | Security system and method for securely communicating therein |
DE3244049C2 (en) * | 1982-11-27 | 1986-06-26 | Kiekert GmbH & Co KG, 5628 Heiligenhaus | Central locking system for a motor vehicle |
US4511946A (en) * | 1983-01-14 | 1985-04-16 | Schlage Lock Company | Programmable combination electronic lock |
US4494114B1 (en) * | 1983-12-05 | 1996-10-15 | Int Electronic Tech | Security arrangement for and method of rendering microprocessor-controlled electronic equipment inoperative after occurrence of disabling event |
US4630201A (en) * | 1984-02-14 | 1986-12-16 | International Security Note & Computer Corporation | On-line and off-line transaction security system using a code generated from a transaction parameter and a random number |
US4642631A (en) * | 1984-11-01 | 1987-02-10 | Rak Stanley C | Interactive security system |
-
1984
- 1984-07-18 FR FR8411399A patent/FR2568040B1/en not_active Expired
-
1985
- 1985-07-18 EP EP85401476A patent/EP0171323B1/en not_active Expired
- 1985-07-18 DE DE8585401476T patent/DE3564842D1/en not_active Expired
-
1987
- 1987-07-08 US US07/071,601 patent/US4992785A/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
FR2568040A1 (en) | 1986-01-24 |
EP0171323A1 (en) | 1986-02-12 |
FR2568040B1 (en) | 1989-12-01 |
US4992785A (en) | 1991-02-12 |
DE3564842D1 (en) | 1988-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0171323B1 (en) | Operating and controlling system for a plurality of accesses equipped with coded locks | |
EP0172765B1 (en) | Access-control method and system involving the sensing of the texture of a surface | |
EP0805906A1 (en) | Programmable electronic locking device | |
EP0926305B1 (en) | Safety device, in particular for motor vehicle | |
FR2645303A1 (en) | PORTABLE SECURITY SEMICONDUCTOR MEMORY DEVICE | |
US9613382B1 (en) | Systems and methods for automatically synchronizing online communities | |
EP1905189A2 (en) | System for managing authenticating data for access to a service | |
FR2722596A1 (en) | SYSTEM FOR CONTROLLING ACCESS LIMITED TO AUTHORIZED AND RENEWABLE TIME PLACES USING A PORTABLE MEMORY MEDIUM | |
FR2864289A1 (en) | Resource access controlling method, involves notifying comparison of biometric data and biometric references of user, to access terminal, by server that communicates simultaneously with terminal and access terminal | |
EP1055203B1 (en) | Protocol between an electronic key and a lock | |
FR2678755A1 (en) | OPTIMIZED SECURITY REMOTE. | |
EP2108165A1 (en) | Temporary locking of an electronic circuit | |
EP0147284A1 (en) | Operating and controlling systems for a plurality of accesses equipped with coded locks | |
WO2011101407A1 (en) | Method for biometric authentication, authentication system and corresponding program | |
FR2519160A1 (en) | Code recognition system for card operated lock - comprises memory on card accessed through microprocessor when correct procedure is followed by processor at lock | |
FR2774120A1 (en) | Remote security lock for vehicles | |
EP1567978B1 (en) | Secure electronic entity integrating life span management of an object | |
CA2694335C (en) | Management and sharing of dematerialised safes | |
FR2834366A1 (en) | SELF-LOCKING CHIP CARD, DEVICE FOR SECURING SUCH A CARD AND RELATED METHODS | |
WO2004029873A1 (en) | Secure electronic unit comprising time management system | |
EP2266276A2 (en) | Management of the identities of users in a system | |
WO2022184726A1 (en) | Method for enabling users to deploy smart contracts in a blockchain using a deployment platform | |
CA2275940A1 (en) | Dynamic data interpretation method for a chip card | |
WO2002082242A1 (en) | Method for managing secure access to digital resources of a server and related system | |
FR2633653A1 (en) | Actuating system, especially for locking an enclosure to be protected |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Designated state(s): DE GB IT |
|
17P | Request for examination filed |
Effective date: 19860329 |
|
17Q | First examination report despatched |
Effective date: 19871028 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE GB IT |
|
ITF | It: translation for a ep patent filed | ||
REF | Corresponds to: |
Ref document number: 3564842 Country of ref document: DE Date of ref document: 19881013 |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 19890731 Year of fee payment: 5 |
|
26N | No opposition filed | ||
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Effective date: 19900718 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee | ||
ITTA | It: last paid annual fee | ||
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 19950731 Year of fee payment: 11 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Effective date: 19970402 |