EP0172765B1 - Access-control method and system involving the sensing of the texture of a surface - Google Patents

Access-control method and system involving the sensing of the texture of a surface Download PDF

Info

Publication number
EP0172765B1
EP0172765B1 EP85401498A EP85401498A EP0172765B1 EP 0172765 B1 EP0172765 B1 EP 0172765B1 EP 85401498 A EP85401498 A EP 85401498A EP 85401498 A EP85401498 A EP 85401498A EP 0172765 B1 EP0172765 B1 EP 0172765B1
Authority
EP
European Patent Office
Prior art keywords
support object
information
support
reader
texture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
EP85401498A
Other languages
German (de)
French (fr)
Other versions
EP0172765A1 (en
Inventor
Bertrand Causse D'agraives
Janny Mathieu
Patrick Jamar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
European Atomic Energy Community Euratom
ASSOCIATION POUR LA PROMOTION de la TECHNOLOGIE PROMOTECH
Original Assignee
European Atomic Energy Community Euratom
ASSOCIATION POUR LA PROMOTION de la TECHNOLOGIE PROMOTECH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by European Atomic Energy Community Euratom, ASSOCIATION POUR LA PROMOTION de la TECHNOLOGIE PROMOTECH filed Critical European Atomic Energy Community Euratom
Priority to AT85401498T priority Critical patent/ATE47458T1/en
Publication of EP0172765A1 publication Critical patent/EP0172765A1/en
Application granted granted Critical
Publication of EP0172765B1 publication Critical patent/EP0172765B1/en
Expired legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/086Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by passive credit-cards adapted therefor, e.g. constructive particularities to avoid counterfeiting, e.g. by inclusion of a physical or chemical security-layer

Definitions

  • the subject of the present invention is an access control system, that is to say a system making it possible to trigger an action equivalent to an authorization after checking the identity of an object introduced into this system.
  • the system of the invention constitutes a “key-lock” assembly provided that these terms are given a broad meaning: the word “key” must be understood as designating a support object provided with a single identity and the word “lock”, an organ capable of recognizing this identity and ordering an action. But the object-support of the invention does not necessarily take the traditional form of a key. It can be in any form, including a card. As for the function of the "control member”, it is not necessarily limited to action on the door bolt, but may correspond to an authorization to access any system, computer, telematics, banking, etc ...
  • the very principle of locksmithing is to give an portable object (the key) an identity (a profile for example) and to make an organ (the lock) capable of recognizing this identity and triggering an action.
  • the key is a reproducible object, for obvious reasons which are due to the fact that several people will have to have the same key (members of the same family, of the same society, etc.).
  • the lock being linked to a particular shape given to a key, it can only cooperate with one type of key.
  • the object of the invention is to remedy this drawback.
  • This goal is achieved by the use of a key which, by nature, is not reproducible.
  • This characteristic is obtained by choosing, as information capable of defining the identity of a key, no longer artificially manufactured information (such as a toothing or a magnetic or optical property of a band), but natural information which is the texture of the surface of a room. This information is so complex that it cannot be reproduced.
  • this information is unique, because two objects, even identical in the macroscopic sense, are actually different if we go down to their surface texture. It goes without saying that nothing prevents adding an artificial texture to the natural texture (scratches, streaks, marks, etc.).
  • the present invention takes up this idea by applying it to the field of access control systems.
  • the choice of surface texture as a means of identification means that the procedure for loading authorized information must be modified, in such a way that it is impossible to counterfeit it.
  • the lock of the invention which is provided, like electronic locks, with different memory locations is such that these locations can only receive the setpoint information by reading the keys authorized to open the lock. In other words, we no longer write information in the lock's memory that we have written on a medium.
  • the procedure is the opposite: keys are first manufactured with any texture and the locks are then conditioned, a posteriori, according to said keys.
  • the quantity used for identifying the key is a continuous analog quantity and not a digital value. It may therefore be possible to proceed analogically for the comparison operation between the setpoint quantity and the quantity read. But of course, it will often be better to convert the analog signal to digital and then proceed with digital processing.
  • Another originality of the lock of the invention is that the means responsible for reading the information contained in the support which is presented to it is a texture reader and no longer a magnetic reader.
  • documents US-A 4218674 and GB-A 2072390 describe authentication techniques which use random imperfections introduced into a support (magnetic elements, lines, color spots, etc.).
  • a reader capable of detecting these imperfections delivers a logical signal (the imperfection is or is not present) and the set of logical signals corresponding to a segment of the object forms a logical code which constitutes the identity of the document.
  • a bit-by-bit comparison between the code read and a code previously recorded makes it possible to ensure the authenticity of the document examined.
  • the use of the surface texture makes such fraud impossible, since it would be necessary to reproduce analog information (the topography of a surface is information which varies continuously as a function of space, whereas, in the prior art cited, the information is of the all or nothing type).
  • each support object has the form of a key with a head capable of being grasped manually and a body having at least one flat part from which the surface portion whose texture is read is taken.
  • the body of the key is metallic and preferably made of an alloy, which gives the texture a particular complexity.
  • each support object has the form of a map, part of the surface of which is used for reading the texture.
  • This card can be made of flexible plastic.
  • the key can have a cylindrical shape with a reading either rotatable along the circumference, or rectilinear according to a generator.
  • the key may have a tubular appearance, the reading taking place outside or inside the tube.
  • the key can consist of a usual object such as a pen.
  • the reader comprises a block for receiving the support object, a transducer capable of translating the relief of the key into an electrical signal (for example a piezoelectric tip), this transducer being arranged on an arm and a means of movement. relative of the arm and of the support object along a surface portion thereof.
  • the arm is connected to a displacement means which is set in motion when the support is immobilized in the receiving block.
  • This means of moving the arm can be a clockwork movement connected to an arming arm, one end of which is moved by the introduction of the support object into the receiving block.
  • this means of moving the arm can also be an electric motor.
  • the read tip is stationary and the texture of the support object is read during the introduction of the latter into the receiving block.
  • the reading can be carried out during the withdrawal of the key from the reception block.
  • the comparison circuit preferably consists of a correlator followed by a threshold circuit.
  • a correlator is particularly useful here because the measurement signal is of analog character and that it is sampled at a large number of points, for example 512 or 1024 or more.
  • the comparison between the signal read and the reference signal can therefore call upon the technique of correlation, whereas in the prior art of electronic locks, words of a few bytes are compared bit by bit. Other more or less complex digital processing methods can be used.
  • the device shown in FIGS. 1, 2 and 3 comprises a block 10 for receiving a key 12 with a trapezoidal section, a stop 14, a first arm 16 moved by the end of the key and movable about an axis 18 , this arm being articulated on a second arm 20 which cooperates with a toothed wheel 22 arming a spiral spring 24.
  • the arm 16 is in position 16 ′, the arm 18 in position 18 'and the wheel 22 escapes.
  • the spring 24 then controls the movement of a third arm 25 articulated on a fourth arm 26, pivoting about an axis 28 and the end of which carries a sensor 30 provided with a read tip 32.
  • the reassembly of the system corresponds at the angular displacement marked 31 in FIG. 2 and the reading phase at the displacement marked 33.
  • the latter corresponds to a reading range 34 located on the upper side of the key, and in the shape of an arc of a circle. But we can provide a system where the reading range would be straight.
  • the sensor 30 delivers an analog electrical signal which is applied to an electronic circuit 40. This circuit includes all or part of the processing means, which are illustrated in FIGS. 4 to 6.
  • FIG. 4 first of all, there is shown the general diagram of an installation implementing the invention.
  • a reader block 50 connected to a microprocessor 52 by a link bus 54.
  • the block 50 is connected to an autorelay 56, which is connected to a relay 58 which is the control relay of the member 60, which is either an electric strike or a lock.
  • the assembly is connected to a general power supply 62.
  • the block 50 can also be connected to an alarm circuit 64, and to an interface 66 allowing possible connection with another lock of the same type.
  • FIG. 5 Such a card is represented functionally in FIG. 5. It comprises a microprocessor 70 (for example of the 6800 or 6809 type), a clock 72, a random access memory 74 (of the RAM type) comprising several memory locations, an address decoder 75 , an analog-digital converter 76 connected to the sensor 30 of the reader.
  • the data circulates on a bus 80, the addresses on a bus 82 and the control orders (write-read in memory and sampling-conversion) on a bus 84.
  • the microprocessor 70 is connected to an input-output circuit 90 which is connected by a connection 91 to the electric strike to be controlled (through relays - see Figure 4) by the connection 92 to a switch and by the connection 93 to other locks or various bodies.
  • the operation of this system is as follows.
  • the analog signal delivered by the sensor 30 is sampled and each sample is converted to digital by the converter 76.
  • the microprocessor 70 receives all of the digital signals read and has access to the various reference signals stored in 74. With the aid of these two data, it performs a correlation and compares the result obtained with a degree of correlation fixed in advance.
  • this diagram can give rise to various embodiments depending on the applications.
  • a version with autonomous power supply and a standby of the microprocessor can be provided.
  • the memory contained in each reader then serves as a buffer, pending availability of the central unit.
  • the overall time for opening a lock after inserting a key is less than 3 s. for 10 keys and less than 9 s. for a number greater than and ten keys.
  • the card which has just been described is suitable for communicating with any computer peripheral: printer, keyboard, video screen, mass memory, etc.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Lock And Its Accessories (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Control Of Position, Course, Altitude, Or Attitude Of Moving Bodies (AREA)
  • Vehicle Body Suspensions (AREA)
  • Testing Of Coins (AREA)

Abstract

Surface texture reading access checking system. The identification information attached to each support object serving as a key is constituted by the texture of a surface portion of said object. A reader reads this information and communicates it to the processing means, which carry out a comparison between the signal read and recorded signals. Application to the production of locks or access checking means for data processing, telematic, banking and similar systems.

Description

La présente invention a pour objet un système de contrôle d'accès, c'est-à-dire un système permettant de déclencher une action équivalente à une autorisation après contrôle de l'identité d'un objet introduit dans ce système.The subject of the present invention is an access control system, that is to say a system making it possible to trigger an action equivalent to an authorization after checking the identity of an object introduced into this system.

D'une certaine manière, le système de l'invention constitue un ensemble «clé-serrure» à condition de donner à ces termes un sens large: le mot «clé» doit être entendu comme désignant un objet-support muni d'uni identité et le mot «serrure», un organe capable de reconnaître cette identité et de commander une action. Mais l'objet-support de l'invention ne prend pas nécessairement la forme traditionnelle d'une clé. Il peut se présenter sous une forme quelconque, notamment de carte. Quant à la fonction de «l'organe de commande», elle n'est pas nécessairement limitée à l'action sur le pène d'une porte, mais peut correspondre à une autorisation d'accès à un système quelconque, informatique, télématique, bancaire, etc....In a way, the system of the invention constitutes a “key-lock” assembly provided that these terms are given a broad meaning: the word “key” must be understood as designating a support object provided with a single identity and the word "lock", an organ capable of recognizing this identity and ordering an action. But the object-support of the invention does not necessarily take the traditional form of a key. It can be in any form, including a card. As for the function of the "control member", it is not necessarily limited to action on the door bolt, but may correspond to an authorization to access any system, computer, telematics, banking, etc ...

Quoi qu'il en soit, pour présenter l'originalité et les caractéristiques essentielles de l'invention, on s'appuiera sur la variante du système qui prend la forme d'un ensemble «clé-serrure» traditionnel, sans que cet exemple n'ait de caractère limitatif.Anyway, to present the originality and the essential characteristics of the invention, we will rely on the variant of the system which takes the form of a traditional "key-lock" assembly, without this example n 'is of a limiting nature.

Le principe même de la serrurerie est de conférer à un objet portatif (la clé) une identité (un profil par exemple) et de réaliser un organe (la serrure) capable de reconnaître cette identité et de déclencher une action. Selon ce principe connu, la clé est un objet reproductible, pour des raisons évidentes qui tiennent à ce que plusieurs personnes devront posséder la même clé (les membres d'une même famille, d'une même société, etc....). Quand à la serrure, étant liée à une forme particulière donnée à une clé, elle ne peut coopérer qu'avec un seul type de clé.The very principle of locksmithing is to give an portable object (the key) an identity (a profile for example) and to make an organ (the lock) capable of recognizing this identity and triggering an action. According to this known principle, the key is a reproducible object, for obvious reasons which are due to the fact that several people will have to have the same key (members of the same family, of the same society, etc.). When the lock, being linked to a particular shape given to a key, it can only cooperate with one type of key.

Récemment sont apparus des systèmes plus sophistiqués qu'on peut désigner par le terme générique de «serrures électroniques». Dans ces systèmes, l'idéntité est traduite en un code écrit sur une piste magnétique ou optique, cette piste étant fixée sur une carte genre «carte de crédit». Mais la philosophie du système reste la même: chaque clé (en l'occurrence chaque carte) est reproductible. Cependant, comme dans ces systèmes perfectionnés, l'information d'identité est de nature numérique et non plus mécanique, il est possible d'enregistrer plusieurs identités différentes dans une mémoire électronique. Plusieurs clés différentes sont alors capables d'ouvrir une même serrure. Ces clés peuvent être attribuées à différentes personnes habilitées. Mais elles peuvent aussi être utilisées par des services de maintenance ou de sécurité.Recently, more sophisticated systems have appeared which can be designated by the generic term of “electronic locks”. In these systems, the identity is translated into a code written on a magnetic or optical track, this track being fixed on a card like “credit card”. But the philosophy of the system remains the same: each key (in this case each card) is reproducible. However, as in these advanced systems, identity information is digital in nature and no longer mechanical, it is possible to store several different identities in an electronic memory. Several different keys are then able to open the same lock. These keys can be assigned to different authorized persons. But they can also be used by maintenance or security services.

Dans de tels systèmes, on écrit, dans une mémoire vive, plusieurs mots numériques qui servent en quelque sorte de référence ou de consigne et on écrit ces mêmes mots sur plusieurs cartes. Lorsque l'une de ces cartes est introduite dans un lecteur de carte, le code écrit sur la carte est détecté et le signal numérique qui en résulte est comparé aux divers mots de consigne écrits dans la mémoire. Un comparateur détermine s'il y a coïncidence ou non entre le mot lu et l'un des mots mémorisés. Dans l'affirmative, un signal est émis pour la commande d'une action quelconque, par exemple l'ouverture d'une gâche.In such systems, several digital words are written into a random access memory which serve as a sort of reference or instruction and these same words are written on several cards. When one of these cards is inserted into a card reader, the code written on the card is detected and the resulting digital signal is compared with the various reference words written in the memory. A comparator determines whether there is a coincidence or not between the word read and one of the stored words. If so, a signal is sent to command any action, for example opening a door release.

Un tel système est décrit par exemple dans les documents de brevets français FR-A 2107529, FR-A 2 325 992, FR-A 2 457 524 et FR-A 2 533 340.Such a system is described for example in the French patent documents FR-A 2107529, FR-A 2 325 992, FR-A 2 457 524 and FR-A 2 533 340.

Bien que satisfaisants à certains égards, ces systèmes présentent un inconvénient majeur lié à l'absence de confidentialité du code porté par la carte. Il est en effet facile, pour un fraudeur un tant soit peut averti, de lire le code inscrit sur une carte dérobée et de réécrire ce code sur une carte vierge. En d'autres termes, la duplication frauduleuse du support est un risque réel.Although satisfactory in certain respects, these systems have a major drawback linked to the lack of confidentiality of the code carried by the card. It is indeed easy, for a fraudster as much as can be warned, to read the code written on a stolen card and to rewrite this code on a blank card. In other words, fraudulent duplication of the medium is a real risk.

Le but de l'invention est de remédier à cet inconvénient. Ce but est atteint par l'utilisation d'une clé qui, par nature, n'est pas reproductible. Cette caractéristique est obtenue en choisissant, comme information capable de définir l'identité d'une clé, non plus information fabriqué artificiellement (comme une denture ou une propriété magnétique ou optique d'une bande), mais une information naturelle qui est la texture de la surface d'une pièce. Cette information est d'une complexité telle qu'elle n'est pas reproductible. En outre, cette information est unique, car deux objets, même identiques au sens macroscopique, sont en réalité différents si l'on descend au niveau de leur texture de surface. Il va de soi que rien n'empêche d'ajouter à la texture naturelle une texture artificielle (rayures, stries, marques, etc....).The object of the invention is to remedy this drawback. This goal is achieved by the use of a key which, by nature, is not reproducible. This characteristic is obtained by choosing, as information capable of defining the identity of a key, no longer artificially manufactured information (such as a toothing or a magnetic or optical property of a band), but natural information which is the texture of the surface of a room. This information is so complex that it cannot be reproduced. In addition, this information is unique, because two objects, even identical in the macroscopic sense, are actually different if we go down to their surface texture. It goes without saying that nothing prevents adding an artificial texture to the natural texture (scratches, streaks, marks, etc.).

L'idée d'utiliser la texture d'une surface, comme moyen d'identification de certains objets, n'est pas nouvelle. L'article de B.C. D'Agraives et al. intitulé «Surface Topography, a remarkable method for the identification of seals or structure in general», publié dans «Proceedings of the 3rd Esarda Symposium on Safeguards and Nuclear Material Management», Karlsruhe, F.R. Germa- ny», 6-8 May 1981, décrit déjà les propriétés et l'intérêt des textures des surfaces. Cet enseignement est par ailleurs repris dans la demande de brevet britannique no 2097979 publiée le 10 Novembre 1982, au nom de «European Atomic Ener- gy Community (EURATOM)» et intitulée «Utiliza- tion of surface textures as a random marking or unique identity».The idea of using the texture of a surface as a means of identifying certain objects is not new. The article by B.C. D'Agraives et al. entitled "Surface Topography, a remarkable method for the identification of seals or structure in general", published in "Proceedings of the 3rd Esarda Symposium on Safeguards and Nuclear Material Management", Karlsruhe, FR Germany ", 6-8 May 1981, already describes the properties and value of surface textures. This teaching is also reproduced in British patent application No. 2097979 published on November 10, 1982, in the name of “European Atomic Energy Community (EURATOM)” and entitled “Use of surface textures as a random marking or unique identity "

La présente invention reprend cette idée en l'appliquant au domaine des systèmes de contrôle d'accès.The present invention takes up this idea by applying it to the field of access control systems.

Le choix de la texture de surface comme source d'information pour le marquage d'une clé va à l'encontre de tous les principes connus rappelés plus haut puisque, par nature, cette information n'est pas reproductible. Dès lors, la serrure ne peut plus, comme par le passé, être conçue pour reconnaître une information définie à l'avance, puisqu'une texture est une grandeur quasiment aléatoire et, à ce titre, imprévisible. On ne peut donc plus charger la mémoire de la serrure avec une information prévue à l'avance comme pour les systèmes antérieurs. Il faut rappeler, à ce sujet, que dans les serrures électroniques classiques, et comme décrit en particulier dans le document FR-A 2325992 cité plus haut, le chargement s'effectue à l'aide d'une carte spéciale qui comprend des informations de programmation de la serrure. Ces informtions consistent en des listes de codes devant être admis et des listes de codes devant être refusés. Cette carte de programmation est introduite dans le lecteur, qui l'identifie comme telle, et elle est conçue pour modifier la liste des codes mémorisés.The choice of the surface texture as a source of information for marking a key goes against all the known principles mentioned above since, by nature, this information is not reproducible. Consequently, the lock can no longer, as in the past, be designed to recognize information defined in advance, since a texture is an almost random size and, as such, unpredictable. We can no longer load the memory of the lock with information planned in advance as for previous systems. It should be remembered, in this regard, that in conventional electronic locks, and as described in particular in the document FR-A 2325992 cited above, the loading is carried out using a special card which includes information of programming the lock. This information consists of lists of codes to be accepted and lists of codes to be refused. This programming card is inserted in the reader, which identifies it as such, and it is designed to modify the list of memorized codes.

Ce système connu présente encore un risque de fraude, car il est possible de falsifier une carte de programmation en lui conférant des codes contrefaits. Dès lors la serrure pourrait être commandée par des cartes portant ces codes contrefaits.This known system still presents a risk of fraud, since it is possible to falsify a programming card by giving it counterfeit codes. Therefore the lock could be ordered by cards bearing these counterfeit codes.

Le choix de la texture de surface comme moyen d'identification oblige à modifier la procédure de chargement des informations autorisées, de manière telle qu'il est impossible de contrefaire celles-ci. A cette fin, la serrure de l'invention, qui est munie, comme les serrures électroniques, de différents emplacements mémoire est telle que ces emplacements ne peuvent recevoir l'information de consigne que par lecture des clés habilitées à ouvrir la serrure. Autrement dit, on n'écrit plus dans la mémoire de la serrure une information qu'on a écrit sur un support. Selon l'invention on procède de manière inverse: des clés sont d'abord fabriquées avec une texture quelconque et les serrures sont ensuite conditionnées, a posteriori, en fonction desdites clés.The choice of surface texture as a means of identification means that the procedure for loading authorized information must be modified, in such a way that it is impossible to counterfeit it. To this end, the lock of the invention, which is provided, like electronic locks, with different memory locations is such that these locations can only receive the setpoint information by reading the keys authorized to open the lock. In other words, we no longer write information in the lock's memory that we have written on a medium. According to the invention, the procedure is the opposite: keys are first manufactured with any texture and the locks are then conditioned, a posteriori, according to said keys.

On observera accessoirement que, dans l'invention, la grandeur servant à l'identification de la clé est une grandeur analogique continue et non une valeur numérique. On pourra donc éventuellement procéder en analogique pour l'opération de comparaison entre la grandeur de consigne et la grandeur lue. Mais naturellement, il sera souvent préférable de convertir le signal analogique en numérique et de procéder ensuite par traitement numérique.It will be observed incidentally that, in the invention, the quantity used for identifying the key is a continuous analog quantity and not a digital value. It may therefore be possible to proceed analogically for the comparison operation between the setpoint quantity and the quantity read. But of course, it will often be better to convert the analog signal to digital and then proceed with digital processing.

Une autre originalité de la serrure de l'invention est que le moyen chargé de lire l'information contenue dans le support qui lui est présenté est un lecteur de texture et non plus un lecteur magnétique.Another originality of the lock of the invention is that the means responsible for reading the information contained in the support which is presented to it is a texture reader and no longer a magnetic reader.

Il faut observer que ces avantages du système de l'invention ne sont pas acquis au détriment des possibilités des systèmes électroniques classiques qui sont entièrement conservées: validation temporaire d'une clé, gestion centralisée d'un ensemble de serrures, comptabilisation du nombre d'interventions d'une clé particulière, etc....It should be noted that these advantages of the system of the invention are not acquired at the expense of the possibilities of conventional electronic systems which are entirely preserved: temporary validation of a key, centralized management of a set of locks, accounting for the number of interventions of a particular key, etc ...

Il faut noter également que les documents US-A 4218674 et GB-A 2072390 décrivent des techniques d'authentification qui utilisent des imperfections aléatoires introduites dans un support (éléments magnétiques, traits, taches de couleurs, etc....). Un lecteur apte à détecter ces imperfections délivre un signal logique (l'imperfection est ou n'est pas présente) et l'ensemble des signaux logiques correspondant à un segment de l'objet forme un code logique qui constitue l'identité du document. Une comparaison bit à bit entre le code lu et un code préalablement enregistré permet de s'assurer de l'authenticité du document examiné.It should also be noted that documents US-A 4218674 and GB-A 2072390 describe authentication techniques which use random imperfections introduced into a support (magnetic elements, lines, color spots, etc.). A reader capable of detecting these imperfections delivers a logical signal (the imperfection is or is not present) and the set of logical signals corresponding to a segment of the object forms a logical code which constitutes the identity of the document. A bit-by-bit comparison between the code read and a code previously recorded makes it possible to ensure the authenticity of the document examined.

Même si la fraude est difficile avec de telles techniques, elle reste cependant possible car, ayant lu un document authentique et connaissant son code numérique, on peut toujours reproduire ce code sur une partie limitée d'un contrefait, puisqu'il s'agit d'une information binaire.Even if fraud is difficult with such techniques, it remains possible because, having read an authentic document and knowing its digital code, one can always reproduce this code on a limited part of a counterfeit, since it involves 'binary information.

L'utilisation de la texture de surface rend une telle fraude impossible, puisqu'il faudrait reproduire une information analogique (la topographie d'une surface est une information qui varie de manière continue en fonction de l'espace, alors que, dans l'art antérieur cité, l'information est du type tout ou rien).The use of the surface texture makes such fraud impossible, since it would be necessary to reproduce analog information (the topography of a surface is information which varies continuously as a function of space, whereas, in the prior art cited, the information is of the all or nothing type).

De façon générale, la présente invention a donc pour objet un procédé de contrôle d'accès consistant à:

  • - constituer des objets-supports munis d'une information d'identification,
  • - mémoriser dans un organe de mémorisation comprenant plusieurs emplacements mémoire des informations de consigne correspondant à un ensemble d'objets-support habilités,
  • - lire l'information propre à un objet-support,
  • - comparer l'information lue et chacune des informations mémorisées dans les emplacements mémoire,
  • - déterminer le degré de coïncidence entre l'information lue et l'une des informations contenues dans les emplacements mémoire de l'organe de mémorisation, et
  • - délivrer, lorsque le degré de coïncidence est suffisante, un signal qui constitue un signal de déclenchement d'une action, ce procédé étant caractérisé par le fait qu'on choisit comme information d'identification de chaque objet-support la texture d'une portion de surface de cet objet-support, et en ce que les informations de consigne sont obtenues en lisant préalablement les informations des objet-support habilités et en mémorisant ces informations dans l'organe de mémorisation.
In general, the subject of the present invention is therefore an access control method consisting in:
  • - constitute support objects provided with identification information,
  • - store in a storage unit comprising several memory locations setpoint information corresponding to a set of authorized support objects,
  • - read the information specific to a support object,
  • - compare the information read and each of the information stored in the memory locations,
  • determining the degree of coincidence between the information read and one of the information contained in the memory locations of the storage unit, and
  • - deliver, when the degree of coincidence is sufficient, a signal which constitutes a signal for triggering an action, this method being characterized by the fact that as the identification information of each support object is chosen the texture of a surface portion of this support object, and in that the setpoint information is obtained by first reading the information from the authorized support object and by storing this information in the storage device.

La présente invention a également pour objet un système mettant en oeuvre ce procédé. Ce système comprend:

  • - un lecteur apte à recevoir un tel objet-support et à lire l'information propre à cet objet-support,
  • - un organe de mémorisation comprenant plusieurs emplacements mémoire chargés par des informations de consigne correspondant à un ensemble d'objet-support habilités,
  • - un moyen de comparaison entre, d'une part, le signal délivré par le lecteur lorsqu'un objet-support quelconque est introduit dans le poste et, d'autre part, chacune des informations mémorisées dans les emplacements mémoire, ce moyen de comparaison déterminant le degré de coïncidence entre l'information correspondant à l'objet-support introduit dans le lecteur et l'une des informations contenues dans les emplacements mémoire de l'organe de mémorisation, et
  • - un circuit relié au circuit de comparaison et délivrant, lorsque le degré de coïncidence est suffisant, un signal qui constitue un signal de déclenchement d'une action, ce système étant caractérisé par le fait que l'information d'identification attachée à chaque objet-support est constituée par la texture d'une portion de surface de cet objet-support, le lecteur étant alors un lecteur de texture de surface, le chargement d'une information de consigne s'effectuant par introduction d'un objet-support habilité dans le lecteur, lecture de cet objet-support et mémorisation du signal lu dans un des emplacements en question.
The present invention also relates to a system implementing this method. This system includes:
  • - a reader capable of receiving such a support object and of reading the information specific to this support object,
  • a storage unit comprising several memory locations loaded with setpoint information corresponding to a set of authorized support objects,
  • a means of comparison between, on the one hand, the signal delivered by the reader when any support object is introduced into the station and, on the other hand, each of the information stored in the memory locations, this means of comparison determining the degree of coincidence between the information corresponding to the ob jet-support introduced into the reader and one of the information contained in the memory locations of the storage device, and
  • a circuit connected to the comparison circuit and delivering, when the degree of coincidence is sufficient, a signal which constitutes a signal for triggering an action, this system being characterized by the fact that the identification information attached to each object -support consists of the texture of a surface portion of this support object, the reader then being a surface texture reader, the loading of instruction information being effected by introduction of an authorized support object in the reader, reading of this support object and memorization of the signal read in one of the locations in question.

Selon un premier mode de réalisation, chaque objet-support présente la forme d'une clé avec une tête apte à être saisie manuellement et un corps présentant au moins une partie plane où est prise la portion de surface dont la texture est lue.According to a first embodiment, each support object has the form of a key with a head capable of being grasped manually and a body having at least one flat part from which the surface portion whose texture is read is taken.

Selon une variante avantageuse, le corps de la clé est métallique et de préférence en alliage, ce qui confère à la texture une complexité particulière.According to an advantageous variant, the body of the key is metallic and preferably made of an alloy, which gives the texture a particular complexity.

Selon un autre mode de réalisation, chaque objet-support présente la forme d'une carte dont une partie de la surface est utilisée pour une lecture de texture. Cette carte peut être en matière plastique souple.According to another embodiment, each support object has the form of a map, part of the surface of which is used for reading the texture. This card can be made of flexible plastic.

Selon encore un autre mode de réalisation, la clé peut présenter une forme cylindrique avec une lecture soit rotative le long de la circonférence, soit rectiligne selon une génératrice. La clé peut présenter un aspect tubulaire, la lecture s'effectuant à l'extérieur ou à l'intérieur du tube.According to yet another embodiment, the key can have a cylindrical shape with a reading either rotatable along the circumference, or rectilinear according to a generator. The key may have a tubular appearance, the reading taking place outside or inside the tube.

Selon encore un autre mode de réalisation, la clé peut consister en un objet usuel comme un stylo.According to yet another embodiment, the key can consist of a usual object such as a pen.

Quant au lecteur, il comprend un bloc de réception de l'objet-support, un transducteur apte à traduire le relief de la clé en signal électrique (par exemple une pointe piézoélectrique), ce transducteur étant disposé sur un bras et un moyen de déplacement relatif du bras et de l'objet-support le long d'une portion de surface de celui-ci. Dans une variante avantageuse, le bras est relié à un moyen de déplacement qui est mis en mouvement lorsque le support est immobilisé dans le bloc de réception. Ce moyen de déplacement du bras peut être un mouvement d'horlogerie relié à un bras d'armement dont une extrémité est déplacée par l'introduction de l'objet support dans le bloc de réception. Mais ce moyen de déplacement du bras peut être également un moteur électrique.As for the reader, it comprises a block for receiving the support object, a transducer capable of translating the relief of the key into an electrical signal (for example a piezoelectric tip), this transducer being arranged on an arm and a means of movement. relative of the arm and of the support object along a surface portion thereof. In an advantageous variant, the arm is connected to a displacement means which is set in motion when the support is immobilized in the receiving block. This means of moving the arm can be a clockwork movement connected to an arming arm, one end of which is moved by the introduction of the support object into the receiving block. However, this means of moving the arm can also be an electric motor.

Selon un autre mode de réalisation, la pointe de lecture est immobile et la lecture de la texture de l'objet-support s'effectue pendant l'introduction de celui-ci dans le bloc de réception.According to another embodiment, the read tip is stationary and the texture of the support object is read during the introduction of the latter into the receiving block.

Mais dans un autre mode de réalisation, la lecture peut s'effectuer pendant le retrait de la clé du bloc de réception.However, in another embodiment, the reading can be carried out during the withdrawal of the key from the reception block.

En ce qui concerne le circuit de comparaison, il est constitué de préférence par un corrélateur suivi d'un circuit à seuil. L'utilisation d'un corrélateur est ici particulièrement utile du fait que le signal de mesure est de caractère analogique et qu'il est échantillonné en un grand nombre de points, par exemple 512 ou 1024 ou plus. La comparaison entre le signal lu et le signal de consigne peut donc faire appel à la technique de la corrélation, alors que dans l'art antérieur des serrures électroniques, on compare bit à bit des mots de quelques octets. D'autres méthodes de traitement numériques plus ou moins complexes peuvent être utilisées.As regards the comparison circuit, it preferably consists of a correlator followed by a threshold circuit. The use of a correlator is particularly useful here because the measurement signal is of analog character and that it is sampled at a large number of points, for example 512 or 1024 or more. The comparison between the signal read and the reference signal can therefore call upon the technique of correlation, whereas in the prior art of electronic locks, words of a few bytes are compared bit by bit. Other more or less complex digital processing methods can be used.

De tout façon les caractéristiques de l'invention apparaîtront mieux après la description qui suit, d'un exemple de réalisation donné à titre explicatif et nullement limitatif. Cette description se réfère à des dessins annexés sur lesquels:

  • - la figure 1 est un schéma du bloc de lecture de la clé,
  • - la figure 2 montre un détail du mécanisme d'armement du système d'horloge,
  • - la figure 3 est une coupe schématique au niveau de la pointe de lecture,
  • - la figure 4 est un schéma synoptique d'une installation conforme à l'invention,
  • - la figure 5 est un schéma d'une carte électronique,
  • - la figure 6 est un organigramme simplifié illustrant le programme de base mis en œuvre.
In any case, the characteristics of the invention will appear better after the description which follows, of an exemplary embodiment given by way of explanation and in no way limiting. This description refers to attached drawings in which:
  • FIG. 1 is a diagram of the key reading block,
  • FIG. 2 shows a detail of the arming mechanism of the clock system,
  • FIG. 3 is a diagrammatic section at the level of the reading tip,
  • FIG. 4 is a block diagram of an installation according to the invention,
  • FIG. 5 is a diagram of an electronic card,
  • - Figure 6 is a simplified flowchart illustrating the basic program implemented.

La description qui suit, et notamment celle qui se réfère aux figures 1 à 3, se place dans le cas particulier d'un objet-support en forme de barreau métallique lu par une pointe piézoélectrique disposée à l'extrémité d'un bras animé par un mouvement d'horlogerie. Mais, comme indiqué plus haut, d'autres modes de réalisation sont possibles.The description which follows, and in particular that which refers to FIGS. 1 to 3, takes place in the particular case of a support object in the form of a metal bar read by a piezoelectric point arranged at the end of an arm driven by a watch movement. However, as indicated above, other embodiments are possible.

D'une façon générale, le lecteur peut utiliser tous les capteurs de texture connus, lesquels ont fait l'objet de normes, notamment la norme française NF-E 05050 de décembre 1970, intitulée «Etat de surface des produits - Généralités sur les appareils électroniques à capteur».In general, the reader can use all known texture sensors, which have been the subject of standards, in particular the French standard NF-E 05050 of December 1970, entitled "Surface condition of products - General information on devices sensor electronics ”.

Le dispositif représenté sur les figures 1, 2 et 3 comprend un bloc de réception 10 d'une clé 12 à section trapézoïdale, une butée 14, un premier bras 16 déplacé par l'extrémité de la clé et mobile autour d'un axe 18, ce bras étant articulé sur un second bras 20 lequel coopère avec une roue dentée 22 armant un ressort spirale 24. Lorsque la clé 12 vient en butée sur 14 (voir figure 2), le bras 16 est en position 16', le bras 18 en position 18' et la roue 22 échappe. Le ressort 24 commande alors le déplacement d'un troisième bras 25 articulé sur un quatrième bras 26, pivotant autour d'un axe 28 et dont l'extrémité porte un capteur 30 muni d'une pointe de lecture 32. Le remontage du système correspond au déplacement angulaire marqué 31 sur la figure 2 et la phase de lecture au déplacement marqué 33. Cette dernière correspond à une plage de lecture 34 située sur la face supérieure de la clé, et en forme d'arc de cercle. Mais on peut prévoir un système ou la plage de lecture serait rectiligne. Le capteur 30 délivre un signal électrique analogique qui est appliqué à un circuit électronique 40. Ce circuit comprend tout ou partie des moyens de traitement, lesquels sont illustrés sur les figures 4 à 6.The device shown in FIGS. 1, 2 and 3 comprises a block 10 for receiving a key 12 with a trapezoidal section, a stop 14, a first arm 16 moved by the end of the key and movable about an axis 18 , this arm being articulated on a second arm 20 which cooperates with a toothed wheel 22 arming a spiral spring 24. When the key 12 abuts on 14 (see FIG. 2), the arm 16 is in position 16 ′, the arm 18 in position 18 'and the wheel 22 escapes. The spring 24 then controls the movement of a third arm 25 articulated on a fourth arm 26, pivoting about an axis 28 and the end of which carries a sensor 30 provided with a read tip 32. The reassembly of the system corresponds at the angular displacement marked 31 in FIG. 2 and the reading phase at the displacement marked 33. The latter corresponds to a reading range 34 located on the upper side of the key, and in the shape of an arc of a circle. But we can provide a system where the reading range would be straight. The sensor 30 delivers an analog electrical signal which is applied to an electronic circuit 40. This circuit includes all or part of the processing means, which are illustrated in FIGS. 4 to 6.

Sur la figure 4, tout d'abord, est représenté le schéma général d'une installation mettant en oeuvre l'invention. On y trouve un bloc de lecteur 50 relié à un microprocesseur 52 par un bus de liaison 54. Le bloc 50 est relié à un autorelais 56, lequel est connecté à un relais 58 qui est le relais de commande de l'organe 60, qui est soit une gâche électrique soit un verrou. L'ensemble est relié à une alimentation générale 62. Le bloc 50 peut également être relié à un circuit d'alarme 64, et à une interface 66 permettant la liaison éventuelle avec une autre serrure du même type.In FIG. 4, first of all, there is shown the general diagram of an installation implementing the invention. There is a reader block 50 connected to a microprocessor 52 by a link bus 54. The block 50 is connected to an autorelay 56, which is connected to a relay 58 which is the control relay of the member 60, which is either an electric strike or a lock. The assembly is connected to a general power supply 62. The block 50 can also be connected to an alarm circuit 64, and to an interface 66 allowing possible connection with another lock of the same type.

En pratique, l'essentiel des moyens de traitement est rassemblé sur une carte électronique, bien que, dans certaines applications, on puisse centraliser la totalité des traitements concernant une famille de serrures, dans un microcalculateur conçu à cet effet. Une telle carte est représentée fonctionnellement sur la figure 5. Elle comprend un microprocesseur 70 (par exemple de type 6800 ou 6809), une horloge 72, une mémoire vive 74 (de type RAM) comprenant plusieurs emplacements mémoire, un décodeur d'adresse 75, un convertisseur analogique-numérique 76 relié au capteur 30 du lecteur. Les données circulent sur un bus 80, les adresses sur un bus 82 et les ordres de commande (écriture-lecture en mémoire et échantillonnage-conversion) sur un bus 84. Le microprocesseur 70 est relié à un circuit d'entrée-sortie 90 lequel est relié par une connexion 91 à la gâche électrique à commander (à travers des relais - cf figure 4) par la connexion 92 à un interrupteur et par la connexion 93 à d'autres serrures ou organes divers.In practice, most of the processing means are gathered on an electronic card, although in certain applications, it is possible to centralize all the processing operations relating to a family of locks, in a microcomputer designed for this purpose. Such a card is represented functionally in FIG. 5. It comprises a microprocessor 70 (for example of the 6800 or 6809 type), a clock 72, a random access memory 74 (of the RAM type) comprising several memory locations, an address decoder 75 , an analog-digital converter 76 connected to the sensor 30 of the reader. The data circulates on a bus 80, the addresses on a bus 82 and the control orders (write-read in memory and sampling-conversion) on a bus 84. The microprocessor 70 is connected to an input-output circuit 90 which is connected by a connection 91 to the electric strike to be controlled (through relays - see Figure 4) by the connection 92 to a switch and by the connection 93 to other locks or various bodies.

Le fonctionnement de ce système est le suivant. Le signal analogique délivré par le capteur 30 est échantillonné et chaque échantillon est converti en numérique par le convertisseur 76. Le microprocesseur 70 reçoit la totalité des signaux numériques lus et a accès aux divers signaux de consigne mémorisés dans 74. A l'aide de ces deux données, il effectue une corrélation et compare le résultat obtenu à un degré de corrélation fixé à l'avance.The operation of this system is as follows. The analog signal delivered by the sensor 30 is sampled and each sample is converted to digital by the converter 76. The microprocessor 70 receives all of the digital signals read and has access to the various reference signals stored in 74. With the aid of these two data, it performs a correlation and compares the result obtained with a degree of correlation fixed in advance.

Le microprocesseur 70 assure également d'autres fonctions:

  • - déclenchement d'un signal en cas d'effraction du boîtier ou d'organes de surveillance avec effacement de toutes les mémoires, ce qui interdit la commande d'ouverture informatique et électrique,
  • - gestion du calendrier, des priorités, des interdictions,
  • - contrôle de présence.
The microprocessor 70 also performs other functions:
  • - triggering of a signal in the event of a breach of the box or of monitoring devices with erasure of all the memories, which prohibits the computer and electrical opening command,
  • - management of the calendar, priorities, prohibitions,
  • - presence control.

Ces fonctions peuvent être remplies soit par des circuits électroniques câblés, soit par programme informatique.These functions can be performed either by wired electronic circuits or by computer program.

Naturellement, ce schéma peut donner lieu à divers modes de réalisation selon les applications. Il peut être prévu une version avec alimentation autonome et une mise au repos du microprocesseur. On peut aussi disposer une partie de la mémoire vive dans un boîtier annexe situé à l'extérieur de la serrure ainsi qu'un microprocesseur supplémentaire faisant office de gestion centrale dans le cas d'un nombre élevé de clefs ou de lecteurs. La mémoire contenue dans chaque lecteur sert alors de tampon, en attente de disponibilité de l'unité centrale.Naturally, this diagram can give rise to various embodiments depending on the applications. A version with autonomous power supply and a standby of the microprocessor can be provided. One can also have part of the RAM in an annex box located outside the lock as well as an additional microprocessor acting as central management in the case of a high number of keys or readers. The memory contained in each reader then serves as a buffer, pending availability of the central unit.

Selon les mesures effectuées par les inventeurs, le temps global d'ouverture d'une serrure après introduction d'une clé est inférieur à 3 s. pour 10 clés et inférieur à 9 s. pour un nombre supérieur à und dizaine de clés.According to the measurements made by the inventors, the overall time for opening a lock after inserting a key is less than 3 s. for 10 keys and less than 9 s. for a number greater than and ten keys.

La carte qui vient d'être décrite est apte à communiquer avec tout périphérique informatique: imprimante, clavier, écran vidéo, mémoire de masse, etc....The card which has just been described is suitable for communicating with any computer peripheral: printer, keyboard, video screen, mass memory, etc.

L'organigramme simplifié d'un programme de base pour la mise en oeuvre de ces moyens de traitement, est illustré sur la figure 6, où les différentes opérations du programme ont la signification suivante:

  • 100: Début du programme.
  • 101: Introduction du programme et chargement des mémoires.
  • 102: Contrôle des circuits de surveillance et d'horloge.
  • 103: Alarme.
  • 104: Introduction de la clé.
  • 105: Demande d'interruption.
  • 106: Lecture de la clé.
  • 107: Enregistrement et comparaison.
  • 108: Traitement du résultat.
  • 109: Décision d'ouverture.
  • 110: Alarme.
  • 111: Retour au circuit de surveillance.
The simplified flowchart of a basic program for the implementation of these processing means is illustrated in FIG. 6, where the different operations of the program have the following meaning:
  • 100: Start of the program.
  • 101: Program introduction and memory loading.
  • 102: Control of the monitoring and clock circuits.
  • 103: Alarm.
  • 104: Key introduction.
  • 105: Request for interruption.
  • 106: Reading the key.
  • 107: Registration and comparison.
  • 108: Processing of the result.
  • 109: Opening decision.
  • 110: Alarm.
  • 111: Return to the monitoring circuit.

Claims (14)

1. Method for controlling the access comprising forming support objects provided with an identification information, storing reference informations corresponding to a group of authorized support objects in a storage means having several storage locations, reading the information relative to a particular support object, comparing the information read and each of the stored informations in the storage locations, determining the degree of coincidence between the information read and one of the informations contained in the storage locations of the storage member and, when the degree of coincidence is adequate, supplying a signal constituting a signal for triggering an action, said method being characterized in that the identification information of each support object is chosen as the texture of a surface portion of said support object and in that the reference informations are obtained by previously reading the information of authorized support objects and by storing said informations in the storage member.
2. Access control system making it possible to initiate an action after checking the identity of a support object introduced into said system and carrying an identification information, said system comprising in per se known manner a reader (30) able to receive such a support object (32) and read the information belonging to the same, a storage means (74) having several memory locations loaded by reference informations corresponding to an authorized support object system, a comparison means (70) between on the one hand a signal supplied by the reader (30) when a random support object (12) is introduced into the station and on the other hand each of the informations stored in the memory locations (74), said comparison means determining the degree of coincidence between the information corresponding to the support object introduced into the reader and one of the informations contained in the memory locations of the storage means and a circuit (70) connected to the comparison circuit and supplying, when the degree of coincidence is adequate, a signal constituting a signal for initiating an action, characterized in that the identification information attached to each support object is constituted by the texture of a surface portion (34) of said support object (12), the reader then being a surface texture reader (30, 32), the loading of a reference information taking place by introducing an authorized support object into the reader, reading said support object and storing the signal read in one of the locations in question.
3. System according to claim 2, characterized in that each support object has the form of a key (12) with a head which can be manually grasped and a body having at least one planar part which carries the surface portion (34) whose texture is to be read.
4. System according to claim 3, characterized in that the key body is metallic.
5. System according to claim 4, characterized in that the key body is made from an alloy.
6. System according to claim 2, characterized in that each support object is in the form of a card, whereof one surface part is used for a texture reading.
7. System according to claim 2, characterized in that the reader comprises a support object (12) reception block (10), a piezoelectric point (32) placed on an arm (26), a means for the relative displacement of the arm and the support object along a surface portion (34) thereof.
8. System according to claim 7, characterized in that the arm (26) is connected to a displacement means (22, 24) which is moved when the support abuts (14) in the reception block (10).
9. System according to claim 8, characterized in that the arm displacement means is a clockwork mechanism (22, 24) connected to an arming arm (16, 8), whereof one end is displaced by the introduction of the support object (12) into the reception block (10).
10. System according to claim 8, characterized in that the arm displacement means is an electric motor.
11. System according to claim 7, characterized in that the piezoelectric point (32) is stationary and support object (12) texture reading takes place during the introduction of the same into the reception block (10).
12. System according to claim 2, characterized in that the reader comprises an analog-digital converter (76), the signal supplied by the reader then being digital.
13. System according to claim 2, characterized in that the processing circuit comprises a microprocessor (70).
14. System according to claim 13, characterized in that microprocessor (70) performs a correlation between the signal read and the reference signals.
EP85401498A 1984-07-23 1985-07-19 Access-control method and system involving the sensing of the texture of a surface Expired EP0172765B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AT85401498T ATE47458T1 (en) 1984-07-23 1985-07-19 ACCESS CONTROL METHOD AND SYSTEM BASED ON THE FEATURE OF A SURFACE STRUCTURE.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR8411643A FR2567947B1 (en) 1984-07-23 1984-07-23 SURFACE TEXTURE READING ACCESS CONTROL SYSTEM
FR8411643 1984-07-23

Publications (2)

Publication Number Publication Date
EP0172765A1 EP0172765A1 (en) 1986-02-26
EP0172765B1 true EP0172765B1 (en) 1989-10-18

Family

ID=9306384

Family Applications (1)

Application Number Title Priority Date Filing Date
EP85401498A Expired EP0172765B1 (en) 1984-07-23 1985-07-19 Access-control method and system involving the sensing of the texture of a surface

Country Status (6)

Country Link
US (2) US4677435A (en)
EP (1) EP0172765B1 (en)
AT (1) ATE47458T1 (en)
CA (1) CA1235779A (en)
DE (1) DE3573819D1 (en)
FR (1) FR2567947B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7667570B1 (en) 2004-05-19 2010-02-23 Lockheed Martin Corporation Nanostructured combination key-lock

Families Citing this family (106)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8612467D0 (en) * 1986-05-22 1986-07-02 Unisafe Ltd Electronic locking devices
US5218528A (en) * 1990-11-06 1993-06-08 Advanced Technological Systems, Inc. Automated voting system
US5721788A (en) 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
US6449377B1 (en) * 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US5768426A (en) 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals
US6614914B1 (en) 1995-05-08 2003-09-02 Digimarc Corporation Watermark embedder and reader
US5748783A (en) * 1995-05-08 1998-05-05 Digimarc Corporation Method and apparatus for robust information coding
US5636292C1 (en) * 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US5822436A (en) 1996-04-25 1998-10-13 Digimarc Corporation Photographic products and methods employing embedded information
US5832119C1 (en) * 1993-11-18 2002-03-05 Digimarc Corp Methods for controlling systems using control signals embedded in empirical data
US5841886A (en) * 1993-11-18 1998-11-24 Digimarc Corporation Security system for photographic identification
US6408082B1 (en) 1996-04-25 2002-06-18 Digimarc Corporation Watermark detection using a fourier mellin transform
US5841978A (en) 1993-11-18 1998-11-24 Digimarc Corporation Network linking method using steganographically embedded data objects
US6983051B1 (en) 1993-11-18 2006-01-03 Digimarc Corporation Methods for audio watermarking and decoding
USRE40919E1 (en) * 1993-11-18 2009-09-22 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
US7044395B1 (en) 1993-11-18 2006-05-16 Digimarc Corporation Embedding and reading imperceptible codes on objects
US5710834A (en) * 1995-05-08 1998-01-20 Digimarc Corporation Method and apparatus responsive to a code signal conveyed through a graphic image
US6611607B1 (en) 1993-11-18 2003-08-26 Digimarc Corporation Integrating digital watermarks in multimedia content
US6944298B1 (en) 1993-11-18 2005-09-13 Digimare Corporation Steganographic encoding and decoding of auxiliary codes in media signals
US5862260A (en) * 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
US5748763A (en) 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
US6122403A (en) * 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US7171016B1 (en) * 1993-11-18 2007-01-30 Digimarc Corporation Method for monitoring internet dissemination of image, video and/or audio files
US6424725B1 (en) 1996-05-16 2002-07-23 Digimarc Corporation Determining transformations of media signals with embedded code signals
EP0959621B1 (en) * 1993-11-18 2001-02-28 Digimarc Corporation Video copy control with plural embedded signals
US6516079B1 (en) 2000-02-14 2003-02-04 Digimarc Corporation Digital watermark screening and detecting strategies
US6580819B1 (en) 1993-11-18 2003-06-17 Digimarc Corporation Methods of producing security documents having digitally encoded data and documents employing same
US6522770B1 (en) 1999-05-19 2003-02-18 Digimarc Corporation Management of documents and other objects using optical devices
US7039214B2 (en) 1999-11-05 2006-05-02 Digimarc Corporation Embedding watermark components during separate printing stages
US6968057B2 (en) * 1994-03-17 2005-11-22 Digimarc Corporation Emulsion products and imagery employing steganography
US6869023B2 (en) 2002-02-12 2005-03-22 Digimarc Corporation Linking documents through digital watermarking
DE4422016C2 (en) * 1994-06-16 1996-08-01 Foerderung Angewandter Informa Procedure for the automatic verification of magnetic cards
EP0803846B1 (en) * 1994-10-19 2003-10-01 Hitachi, Ltd. Transaction-oriented electronic accommodation system
US6560349B1 (en) * 1994-10-21 2003-05-06 Digimarc Corporation Audio monitoring using steganographic information
US7486799B2 (en) 1995-05-08 2009-02-03 Digimarc Corporation Methods for monitoring audio and images on the internet
US6760463B2 (en) 1995-05-08 2004-07-06 Digimarc Corporation Watermarking methods and media
US6721440B2 (en) 1995-05-08 2004-04-13 Digimarc Corporation Low visibility watermarks using an out-of-phase color
US6728390B2 (en) 1995-05-08 2004-04-27 Digimarc Corporation Methods and systems using multiple watermarks
US6577746B1 (en) 1999-12-28 2003-06-10 Digimarc Corporation Watermark-based object linking and embedding
US6411725B1 (en) 1995-07-27 2002-06-25 Digimarc Corporation Watermark enabled video objects
US6788800B1 (en) 2000-07-25 2004-09-07 Digimarc Corporation Authenticating objects using embedded data
US6965682B1 (en) 1999-05-19 2005-11-15 Digimarc Corp Data transmission by watermark proxy
US6408331B1 (en) * 1995-07-27 2002-06-18 Digimarc Corporation Computer linking methods using encoded graphics
US6829368B2 (en) 2000-01-26 2004-12-07 Digimarc Corporation Establishing and interacting with on-line media collections using identifiers in media signals
US7006661B2 (en) * 1995-07-27 2006-02-28 Digimarc Corp Digital watermarking systems and methods
US6230971B1 (en) 1996-04-29 2001-05-15 Hitachi, Ltd. Transaction-oriented electronic accommodation system
US6381341B1 (en) 1996-05-16 2002-04-30 Digimarc Corporation Watermark encoding method exploiting biases inherent in original signal
US6804376B2 (en) 1998-01-20 2004-10-12 Digimarc Corporation Equipment employing watermark-based authentication function
US7313253B2 (en) 1998-09-11 2007-12-25 Digimarc Corporation Methods and tangible objects employing machine readable data in photo-reactive materials
US7035428B1 (en) 1999-04-23 2006-04-25 The Escher Group, Ltd. Workpiece authentication based upon one or more workpiece images
US6584214B1 (en) * 1999-04-23 2003-06-24 Massachusetts Institute Of Technology Identification and verification using complex, three-dimensional structural features
US7164413B2 (en) * 1999-05-19 2007-01-16 Digimarc Corporation Enhanced input peripheral
US6608919B1 (en) 1999-11-10 2003-08-19 Digimarc Corporation Method and apparatus for encoding paper with information
US6625297B1 (en) 2000-02-10 2003-09-23 Digimarc Corporation Self-orienting watermarks
US6804377B2 (en) 2000-04-19 2004-10-12 Digimarc Corporation Detecting information hidden out-of-phase in color channels
US7027614B2 (en) 2000-04-19 2006-04-11 Digimarc Corporation Hiding information to reduce or offset perceptible artifacts
WO2003052680A1 (en) 2001-12-18 2003-06-26 Digimarc Id System, Llc Multiple image security features for identification documents and methods of making same
CA2470600C (en) 2001-12-24 2009-12-22 Digimarc Id Systems, Llc Systems, compositions, and methods for full color laser engraving of id documents
US7728048B2 (en) 2002-12-20 2010-06-01 L-1 Secure Credentialing, Inc. Increasing thermal conductivity of host polymer used with laser engraving methods and compositions
US7694887B2 (en) 2001-12-24 2010-04-13 L-1 Secure Credentialing, Inc. Optically variable personalized indicia for identification documents
ATE552120T1 (en) 2001-12-24 2012-04-15 L 1 Secure Credentialing Inc HIDDEN VARIABLE INFORMATION ON ID DOCUMENTS AND METHODS FOR PRODUCING THEM
US7824029B2 (en) 2002-05-10 2010-11-02 L-1 Secure Credentialing, Inc. Identification card printer-assembler for over the counter card issuing
US7045763B2 (en) * 2002-06-28 2006-05-16 Hewlett-Packard Development Company, L.P. Object-recognition lock
WO2004049242A2 (en) 2002-11-26 2004-06-10 Digimarc Id Systems Systems and methods for managing and detecting fraud in image databases used with identification documents
US7712673B2 (en) 2002-12-18 2010-05-11 L-L Secure Credentialing, Inc. Identification document with three dimensional image of bearer
US7225991B2 (en) 2003-04-16 2007-06-05 Digimarc Corporation Three dimensional data storage
US7192208B2 (en) * 2003-09-02 2007-03-20 Futurelogic, Inc. Rewritable card printer
US7494414B2 (en) 2003-09-12 2009-02-24 Igt Gaming device having a card management system for the management of circulating data cards
US8057296B2 (en) 2003-09-12 2011-11-15 Igt Gaming device including a card processing assembly having vertically-stacked card holders operable with thermally-printable data cards and portable card changeover machines
US7744002B2 (en) 2004-03-11 2010-06-29 L-1 Secure Credentialing, Inc. Tamper evident adhesive and identification document including same
FR2870376B1 (en) * 2004-05-11 2006-09-22 Yann Boutant METHOD FOR RECOGNIZING FIBROUS MEDIA, AND APPLICATIONS OF SUCH A METHOD IN THE COMPUTER FIELD, IN PARTICULAR
KR20070092739A (en) * 2004-12-17 2007-09-13 코닌클리케 필립스 일렉트로닉스 엔.브이. Optical identifier comprising randomly oriented partial faces
US7533062B2 (en) * 2005-05-27 2009-05-12 Pitney Bowes Inc. Method for creating self-authenticating documents
US8224018B2 (en) * 2006-01-23 2012-07-17 Digimarc Corporation Sensing data from physical objects
US8077905B2 (en) 2006-01-23 2011-12-13 Digimarc Corporation Capturing physical feature data
US8215553B2 (en) * 2006-11-15 2012-07-10 Digimarc Corporation Physical credentials and related methods
EP2153422B1 (en) 2007-04-24 2019-01-16 Sicpa Holding Sa Method of marking a document or item; method and device for identifying the marked document or item; use of circular polarizing particles
WO2008128714A1 (en) * 2007-04-24 2008-10-30 Sicpa Holding S.A. Method of marking a document or item; method and device for identifying the marked document or item; use of circular polarizing particles
US8197334B2 (en) 2007-10-29 2012-06-12 Igt Circulating data card apparatus and management system
US8526743B1 (en) 2010-11-01 2013-09-03 Raf Technology, Inc. Defined data patterns for object handling
US9152862B2 (en) 2011-09-15 2015-10-06 Raf Technology, Inc. Object identification and inventory management
US9443298B2 (en) 2012-03-02 2016-09-13 Authentect, Inc. Digital fingerprinting object authentication and anti-counterfeiting system
US8774455B2 (en) 2011-03-02 2014-07-08 Raf Technology, Inc. Document fingerprinting
DE102011110478B4 (en) 2011-08-17 2018-07-26 Gottfried Wilhelm Leibniz Universität Hannover Method for recognizing a three-dimensional object, device and computer program therefor
US10346852B2 (en) 2016-02-19 2019-07-09 Alitheon, Inc. Preserving authentication under item change
EP3236401A1 (en) 2016-04-18 2017-10-25 Alitheon, Inc. Authentication-triggered processes
US10614302B2 (en) 2016-05-26 2020-04-07 Alitheon, Inc. Controlled authentication of physical objects
US10740767B2 (en) 2016-06-28 2020-08-11 Alitheon, Inc. Centralized databases storing digital fingerprints of objects for collaborative authentication
US10915612B2 (en) 2016-07-05 2021-02-09 Alitheon, Inc. Authenticated production
US10902540B2 (en) 2016-08-12 2021-01-26 Alitheon, Inc. Event-driven authentication of physical objects
US10839528B2 (en) 2016-08-19 2020-11-17 Alitheon, Inc. Authentication-based tracking
US11062118B2 (en) 2017-07-25 2021-07-13 Alitheon, Inc. Model-based digital fingerprinting
US11087013B2 (en) 2018-01-22 2021-08-10 Alitheon, Inc. Secure digital fingerprint key object database
US10963670B2 (en) 2019-02-06 2021-03-30 Alitheon, Inc. Object change detection and measurement using digital fingerprints
EP3734506A1 (en) 2019-05-02 2020-11-04 Alitheon, Inc. Automated authentication region localization and capture
EP3736717A1 (en) 2019-05-10 2020-11-11 Alitheon, Inc. Loop chain digital fingerprint method and system
US11238146B2 (en) 2019-10-17 2022-02-01 Alitheon, Inc. Securing composite objects using digital fingerprints
EP3859603A1 (en) 2020-01-28 2021-08-04 Alitheon, Inc. Depth-based digital fingerprinting
EP3885984A1 (en) 2020-03-23 2021-09-29 Alitheon, Inc. Facial biometrics system and method of using digital fingerprints
US11341348B2 (en) 2020-03-23 2022-05-24 Alitheon, Inc. Hand biometrics system and method using digital fingerprints
EP3929806A3 (en) 2020-04-06 2022-03-09 Alitheon, Inc. Local encoding of intrinsic authentication data
US11663849B1 (en) 2020-04-23 2023-05-30 Alitheon, Inc. Transform pyramiding for fingerprint matching system and method
US11983957B2 (en) 2020-05-28 2024-05-14 Alitheon, Inc. Irreversible digital fingerprints for preserving object security
US11700123B2 (en) 2020-06-17 2023-07-11 Alitheon, Inc. Asset-backed digital security tokens
CN114550382B (en) * 2022-01-26 2023-07-04 南京科融数据系统股份有限公司 ATM cashbox management method and system

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3637990A (en) * 1969-10-31 1972-01-25 Jack E Bayha Credit card validator with transducer-readout
DE2144760A1 (en) * 1970-09-10 1972-03-16 Int Standard Electric Corp Magnetic card security system
US4218674A (en) * 1975-09-09 1980-08-19 Dasy Inter S.A. Method and a system for verifying authenticity safe against forgery
US3984658A (en) * 1975-09-26 1976-10-05 Cannon John W Programmable card actuated lock
IT1101623B (en) * 1977-11-22 1985-10-07 Bsg Schalttechnik LOCK DEVICE TO AVOID UNAUTHORIZED ACCESS
FR2457524B1 (en) * 1979-05-23 1985-11-15 Chauvat & Sofranq Reunis CODED CARD DOOR FOR SELECTIVE DOOR OPENING
DE3011317C2 (en) * 1980-03-24 1983-07-14 Hermann 7742 St Georgen Stockburger Method for identifying data carriers and device for carrying out the method
US4568936A (en) * 1980-06-23 1986-02-04 Light Signatures, Inc. Verification system for document substance and content
US4519228A (en) * 1981-04-01 1985-05-28 Trioving A/S Electronic recodeable lock
LU83333A1 (en) * 1981-05-04 1983-03-24 Euratom USE OF SURFACE TEXTURES AS A SINGLE IDENTITY MARK
FR2533340A1 (en) * 1982-09-17 1984-03-23 Chauvat & Sofranq Reunis Electronic lock with control by magnetic stripe card
US4721956A (en) * 1983-09-12 1988-01-26 Demster Stanley J Apparatus for converting key topography into electrical signals to effect key evaluation
FR2582129B1 (en) * 1985-02-21 1987-12-31 Despres Jean Albert METHOD FOR IDENTIFYING A VALUABLE OBJECT AND DEVICE FOR CARRYING OUT THIS METHOD

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7667570B1 (en) 2004-05-19 2010-02-23 Lockheed Martin Corporation Nanostructured combination key-lock

Also Published As

Publication number Publication date
CA1235779A (en) 1988-04-26
FR2567947B1 (en) 1986-12-26
FR2567947A1 (en) 1986-01-24
DE3573819D1 (en) 1989-11-23
ATE47458T1 (en) 1989-11-15
EP0172765A1 (en) 1986-02-26
USRE33553E (en) 1991-03-12
US4677435A (en) 1987-06-30

Similar Documents

Publication Publication Date Title
EP0172765B1 (en) Access-control method and system involving the sensing of the texture of a surface
CA1164565A (en) Personalized portable object such as a credit card
EP0589755B1 (en) Game terminal
FR2471632A1 (en) APPARATUS AND METHOD FOR ENCODING AND DECODING A CARD DELIVERED TO AN INDIVIDUAL BY AN ENTITY
FR2492135A1 (en) APPARATUS FOR DISTRIBUTING OBJECTS AND ACQUIRING SERVICES
WO1996002899A1 (en) Access control system for restricting access to authorised hours and renewing it using a portable storage medium
OA10739A (en) Programmable electronic closing device
CA2547811A1 (en) Method and system for automatically renting bicycles
FR2624285A1 (en) CAR MANAGEMENT SYSTEM FOR PAID PARKING IN VEHICLES
FR2654236A1 (en) METHOD FOR PROTECTING AGAINST THE FRAUDULENT USE OF MICROPROCESSOR CARDS, AND DEVICE FOR IMPLEMENTING SAME.
FR2568040A1 (en) INSTALLATION FOR CONTROLLING AND CONTROLLING THE DIFFERENT LOCKED LOCKS OF AN ASSEMBLY
FR2642544A1 (en) Data processing system with a security program
EP1012792B1 (en) Method and installation for producing a personalised user identification card which cannot be forged
FR2473755A1 (en) Secure electronic data processing for card terminal transactions - using non-erasable memory data for identification and controlled access erasable memory for transaction recording
EP0536040B1 (en) Method for recording a new coded message, instead of a previous coded one recorded on a magnetic strip on a support document, by manual displacement of said document and system for carrying out this method
FR2765979A1 (en) INDIVIDUAL COMPUTER TERMINAL CAPABLE OF COMMUNICATING WITH COMPUTER EQUIPMENT IN A SECURE WAY, AS WELL AS AN AUTHENTICATION PROCESS IMPLEMENTED BY SAID TERMINAL
FR2657793A1 (en) CENTRIFUGATION APPARATUS WITH REMOVABLE ROTOR AND MEANS OF IDENTIFYING ROTORS.
FR2766949A1 (en) SECURE MACHINE SYSTEM
EP1214695A1 (en) Electronic card comprising in storage its bearer's identification
CA2156791C (en) Process for transmitting information between a computerized control centre and a plurality of electronic postage machines
FR2770316A1 (en) Secure contactless communication between terminal and card
FR2710769A1 (en) System for processing the data from a microcircuit card, card and reader for this system and method of implementation
FR2911710A1 (en) SYSTEM FOR MANAGING A SET OF GAME MACHINES
EP1498841A1 (en) Multi application transponder chip and memory managing method therefore
WO1996038824A1 (en) Device for storing small objects and for managing and monitoring entry and removal of such objects

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE GB IT LI LU NL SE

17P Request for examination filed

Effective date: 19860728

17Q First examination report despatched

Effective date: 19880426

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH DE GB IT LI LU NL SE

REF Corresponds to:

Ref document number: 47458

Country of ref document: AT

Date of ref document: 19891115

Kind code of ref document: T

REF Corresponds to:

Ref document number: 3573819

Country of ref document: DE

Date of ref document: 19891123

ITF It: translation for a ep patent filed

Owner name: JACOBACCI & PERANI S.P.A.

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed
ITTA It: last paid annual fee
EPTA Lu: last paid annual fee
EAL Se: european patent in force in sweden

Ref document number: 85401498.2

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 19990708

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 19990713

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: AT

Payment date: 19990714

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 19990715

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: LU

Payment date: 19990719

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 19990720

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 19990726

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 19990728

Year of fee payment: 15

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000719

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000719

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000719

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000720

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000731

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000731

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000731

BERE Be: lapsed

Owner name: ASSOCIATION POUR LA PROMOTION DE LA TECHNOLOGIE P

Effective date: 20000731

Owner name: COMMUNAUTE EUROPEENNE DE L'ENERGIE ATOMIQUE EURAT

Effective date: 20000731

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20010201

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20000719

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

EUG Se: european patent has lapsed

Ref document number: 85401498.2

NLV4 Nl: lapsed or anulled due to non-payment of the annual fee

Effective date: 20010201

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20010501