EP1780680A1 - Verfahren zur Steuerung der Verriegelung von Türverschlüssen und Türverschluss - Google Patents
Verfahren zur Steuerung der Verriegelung von Türverschlüssen und Türverschluss Download PDFInfo
- Publication number
- EP1780680A1 EP1780680A1 EP20050109900 EP05109900A EP1780680A1 EP 1780680 A1 EP1780680 A1 EP 1780680A1 EP 20050109900 EP20050109900 EP 20050109900 EP 05109900 A EP05109900 A EP 05109900A EP 1780680 A1 EP1780680 A1 EP 1780680A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- lock
- user
- question
- response
- central
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 230000004044 response Effects 0.000 claims description 44
- 238000004422 calculation algorithm Methods 0.000 claims description 14
- 238000012795 verification Methods 0.000 claims description 14
- 230000006854 communication Effects 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 12
- 230000001413 cellular effect Effects 0.000 claims description 7
- 230000006399 behavior Effects 0.000 claims description 6
- 238000001514 detection method Methods 0.000 claims description 5
- 230000006378 damage Effects 0.000 claims description 3
- 238000013479 data entry Methods 0.000 claims description 2
- 230000001419 dependent effect Effects 0.000 claims 1
- 238000004364 calculation method Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 9
- 230000008901 benefit Effects 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 241000196324 Embryophyta Species 0.000 description 2
- 241000447437 Gerreidae Species 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 210000000038 chest Anatomy 0.000 description 2
- 230000003111 delayed effect Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000007620 mathematical function Methods 0.000 description 2
- 210000001525 retina Anatomy 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000006677 Appel reaction Methods 0.000 description 1
- 206010019233 Headaches Diseases 0.000 description 1
- 241000135309 Processus Species 0.000 description 1
- 240000008042 Zea mays Species 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000004907 flux Effects 0.000 description 1
- 231100000869 headache Toxicity 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000036962 time dependent Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00658—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
- G07C9/00674—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
- G07C9/00698—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons actuated in function of displayed informations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00388—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7051—Using a powered device [e.g., motor]
- Y10T70/7062—Electrical type [e.g., solenoid]
- Y10T70/7068—Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]
Definitions
- the present invention relates to an electronic lock lock control method.
- the present invention also relates to an electronic lock useful for the implementation of this method.
- the present invention relates in particular to a lock providing the required level of security for ATMs (Automatic Teller Machines) or safes.
- the front access is secured by a card reader and a keypad allowing different users to identify themselves before taking a limited number of tickets.
- Access to the rear face of the dispenser is generally closed by means of a conventional key lock.
- the bank employees, the bottom conveyors responsible for filling the distributor and the technical repairers all share copies of the same key that allows access to vaults frequently containing tens of thousands of Euros in cash or in a container .
- the risk is important that one of these keys is lost or stolen and falls into the wrong hands.
- a user who has fraudulently acquired a key may attempt to call the central office by impersonating the authorized key holder in order to obtain a valid OTC code.
- the security offered is therefore insufficient.
- the electronic key reader comprises electrical, electronic and / or electromechanical elements that offer possibilities for manipulation and additional fraud.
- the patent application EP0546701 discloses a lock unlocking verification method in which security is provided by means of different PIN codes and encoded messages that the user must enter into a terminal belonging to him. This terminal is then connected to the protected box to cause its unlocking.
- the terminal that is usually in the hands of the user is a target for hackers attempting to study it or to build a compatible terminal to access unauthorized vaults.
- An object of the present invention is therefore to provide a method and a lock which make it possible to avoid the disadvantages of the methods and locks of the prior art.
- This method has the advantage of forcing the user to transmit a question posed by the lock of the dispenser to the central. This additional operation makes it possible to provide additional tests, for example to check in the central if the question asked is indeed valid.
- This method also has the advantage of basing the identification of the user not necessarily on a physical key, but for example by means of password, PIN, or biometric data, more difficult to steal.
- this method has the advantage of making it possible to distribute, replace or invalidate very easily passwords, to distance by simple software manipulations from a central.
- the secret code used to identify the user is verified by the central unit 1, and not by the lock. This avoids the transmission of authorized user lists to different locks.
- This method also has the advantage that all the data and all the codes necessary to unlock the lock can be introduced directly into the lock, without passing through an intermediate device offering an additional vulnerability to the attacks.
- This lock is adapted to the method above; it also has the advantage of not necessarily requiring a key reader, vulnerable and expensive.
- This method can be implemented entirely automatically by a computer programmed for these different tasks, or in a manner assisted by a human operator, or a group of human operators, using a computer.
- FIG. 1 illustrates in the form of a block diagram a system comprising a central unit 1 to which different users 4 can connect using a mobile device 3 through a network 2.
- the system also comprises one or more locks 5 to protect devices not shown, for example cash dispensers, chests, rooms or other protected volumes.
- the central unit 1 may be constituted for example by a call center, animated by several human operators, or a server or server group executing a specific application.
- the network 2 is for example a telecommunications network, for example a conventional telephone network, an Internet or Intranet type network, or preferably a mobile cellular network. Users can get connect to control panel 1 by establishing voice or data communication through the network 2.
- the users connect to the central unit 1 via a mobile cellular network 2 and by sending data, for example SMS (Short Message System), e-mails or IP data packets through a network 2 of GSM, GPRS, HSCSD, EDGE or GPRS for example.
- the central station preferably automatically receives data via a modem or a suitable router, and can also respond to the user by sending his own data through the same channel, or a different channel.
- the data exchanged in one of the directions, or in both directions, can be electronically signed and / or encrypted by the central unit 1 and / or by the mobile equipment 3, for example by using a smart card in the mobile equipment 3 .
- the users 4 connect to the central unit 1 by means of a voice communication.
- the central unit 1 uses human operators to react to this voice call, and / or an IVR (Interactive Voice Response) voice recognition system to analyze the content of the user's requests and / or DTMF codes and to synthesize a voice response.
- IVR Interactive Voice Response
- the central unit 1 furthermore comprises a database of authorized users, which contains for each user at least one personal code - or personal code verification data - as well as authorizations, for example a list of locks that the user user is allowed to open.
- the record comprising each user may further indicate time windows during which access to one or more locks is authorized, a user profile, including for example its name, its coordinates, cryptographic keys for communication with each user, a history of system usage (number of successful trials, unsuccessful trials, dates, times, etc.), and other identification or authentication data, including for example a MSISDN caller number corresponding to its mobile equipment 3, biometric data, etc.
- Calculation means 11 in the central unit 1 make it possible to execute an application program for managing the various users and their rights in the data bank 10.
- the calculation means also make it possible to execute an algorithm making it possible to calculate the response to a number of requests.
- question (“challenge") received from a user.
- This algorithm can for example consult a read-only correspondence table that indicates the answer to each expected question, or preferably calculate a mathematical function from each question.
- the function performed is preferably chosen so that knowledge of any number of answers to previous questions does not predict what will be the answer to the next question (pseudo-random function).
- the chosen algorithm, or the values allowing to parameterize it are preferably kept confidential.
- a different algorithm, or different values are preferably used for each lock 5, and / or even for each user 4.
- the central unit 1 may further comprise a lock database (not shown), comprising for each lock 5 a profile with information such as the geographical location, the type of protected device, cryptographic communication keys, etc.
- the mobile equipment 3 depends on the type of network used.
- this equipment is constituted by cellular mobile equipment, for example a cellular telephone or a personal assistant, a smartphone or a personal computer equipped with a connection card to a cellular network, a modem or a personal computer. a router. It is also possible to use a dedicated communication device for this purpose.
- the mobile equipment 3 may comprise geolocation means 30, for example a satellite receiver of the GPS type to determine its position and possibly transmit it to the central 1.
- Insulated worker protection equipment (ITP) 31 makes it possible to check whether the user 4 of the mobile equipment 3 is awake, for example by checking whether move, if it is vertical, if it reacts to requests for answers, etc.
- the mobile equipment 3 may further comprise additional identification and / or authentication means 32, for example a smart card (SIM card for example), PIN code input and verification means, a sensor biometric, etc.
- the identification and / or user authentication 4 can be performed locally, that is to say in the mobile equipment or in a smart card inserted in the equipment, or remotely, that is, ie for example in the central 1 which then has means of verification of the data of the smart card, PIN codes and / or biometric data entered.
- the mobile equipment 3 can be for example portable or installed in a vehicle.
- a conventional mobile telephone as mobile equipment in the context of the invention; it is only necessary for the user to be able to connect by means of this equipment with a central unit 1 to send a question and receive a corresponding answer. It is even advantageous, to increase security, to establish communications between the different users and the central by different types of channels.
- the plant may for example use this additional information and agree with a conveyor, for example, that the question should be transmitted orally, even if the conveyor has equipment for data communication.
- the user 4 is for example a bank employee, a bottom conveyor, a technical repairer, or any natural person authorized by the central 1 to open the lock 5.
- the user 4 has the knowledge of a code secret personnel that has been transmitted to it by the central 1 and with which it can identify itself to one or more locks 5 of a park locks managed by the central 1.
- the user 4 is also preferably able to s' identify towards his mobile equipment 3 by means another secret code, for example the PIN code of the phone and / or the SIM card.
- identifying the user 4 to the lock 5 and / or to the mobile equipment 3 are conceivable within the scope of the invention; for example, the user could prove his identity by presenting a personal object, such as a key or a smart card, or by biometric identification using fingerprints, iris, retina, voice, face, etc.
- a personal object such as a key or a smart card
- biometric identification using fingerprints, iris, retina, voice, face, etc.
- different methods can be implemented to identify or authenticate the user 4 towards the mobile equipment 3 and the lock 5. It is also possible to accumulate several identification methods.
- the identification data entered in the mobile equipment 3 can be transmitted to the central 1 for verification.
- the lock 5 comprises an electromechanical element 52, for example a bolt, whose position is controlled by a logic device inside the lock 5 to act on a mechanical mechanism ("linkage") to lock or unlike to unlock access to the protected volume, for example inside a distributor.
- the lock is preferably intended to be used in combination with a device containing a volume to be protected, for example with a cash dispenser or a safe; it does not itself constitute such a safe, and has no protected volume, but has means not shown to associate it mechanically and / or electrically, so hardly removable with such a chest or such a dispenser.
- a numeric or alphanumeric keyboard 51 associated with the lock 5 allows the user to enter his personal code and the answer to the questions asked.
- Other data input elements for example a biometric sensor, a camera, a microphone, etc., may optionally be provided in the lock 5.
- the lock further comprises a screen 50 for displaying messages in text or matrix mode, including questions, invitations to reply, and status messages.
- the lock preferably further comprises one or more optional interfaces 53 which enable it to exchange data with the device it is to protect, for example a cash dispenser, and / or with the central unit 1 through any network, for example a telephone network or the Internet.
- the communication of data with the device to be protected in which the lock is mounted notably makes it possible to improve the security, thanks to the exchange of information making it possible to detect probable frauds using combinations of indices and thanks to the generation of log files taking into account data collected by both the lock and the protected device.
- This communication can also, if necessary, be used to control the lock 5 by means of the keypad of the dispenser, to display messages depending on the behavior of the lock 5 on the distributor screen, to echo alarms triggered by the lock by the distributor, or to trigger other actions performed by the distributor.
- the bidirectional communication preferably between the lock 5 and the central unit 10 makes it possible, for example, to remotely modify the list of authorized users to identify with each lock 5 (unless this check is made by the central), to modify the remote response verification algorithms, to consult the log files generated by the lock, and to remotely detect other events related to the use of the lock.
- This communication with the central unit 1 can also be carried out through the device protected by the lock, for example by using a modem or a router of this device.
- the data exchanged by the lock and the central unit 1 are electronically signed and encrypted, for example through a Virtual Private Network (VPN), so as to preserve their confidentiality and their very authenticity. to the distributor to be protected.
- VPN Virtual Private Network
- the lock 5 furthermore preferably comprises an electronic watch 54 which enables it to determine the date and time autonomously, and to calculate time intervals.
- Calculation means not shown, for example a microcontroller, a microprocessor with a memory, an industrial microcomputer, an asic type circuit and / or a FPGA circuit, etc., to manage the dialogs with the user, and to control the electromechanical device causing the locking or unlocking of the lock.
- the calculation means preferably furthermore comprise a module, for example a software module, for generating and displaying a question in response to the introduction of an accepted personal identification code, and a module, for example a software module, for checking if an answer to the question is correct, and to cause the unlocking of the lock in case of correct answer
- the calculation means are preferably protected against physical or software manipulations and may, for example, self-destruct, while keeping the lock closed, during fraudulent manipulations.
- the lock 5 may further comprise wireless connection elements with the mobile equipment 3, for example a Bluetooth-type interface, for example to detect and verify the presence of this equipment in the vicinity; however, these means can be dispensed with if they introduce an additional vulnerability.
- the lock 5 is preferably electrically autonomous and powered with batteries or battery; it remains mechanically locked when the batteries are discharged. Charging or replacing the batteries can then be done without unlocking the lock.
- the lock is electrically powered by the device in which it is mounted, for example a cash dispenser.
- it is powered by means of a generator actuated by the user; the watch 54 uses in its own power source case to keep the time even when the rest of the system is no longer electrically powered.
- a user 4 wishing to unlock the lock 5 is physically in front of this lock and introduced during step 100 a personal code on the keyboard 51, for example a numeric or alphanumeric code, for example a 6-digit code.
- the calculation means in the lock verify the personal code introduced.
- the personal code is compared with a list of accepted codes ("white list") stored in the lock.
- white list a list of accepted codes
- the lock is satisfied to check during step 101 if the personal code introduced is plausible, for example if the format of the code is admissible, if a possible parity code is correct, or if the entered personal code does not belong to a list of rejected codes ("black list”) because nonexistent or belonging to refused users.
- black list list of rejected codes
- the lock detects during the step 101 that the entered personal code is invalid, it is rejected, and an error message can be displayed on the display 50 to inform the user and invite him to introduce a new one. code.
- "brute force" attacks that is by successively testing a large number of different codes, it is possible, for example, to introduce a delay between each attempt and / or to limit the number of possible unsuccessful attempts to lock the lock for a longer period, or until an unlocking maneuver is introduced.
- the user identifies with the lock by proving the possession of an object, for example a key, an electronic key, a smart card, etc.
- the object presented may itself be protected by a code, especially in the case of a smart card.
- this solution has the disadvantage of requiring an organization to distribute and manage the objects to present.
- the user can also identify himself by means of biometric data acquired by means of a biometric sensor, for example by means of his fingerprints, the iris, the retina, the face, the voice, etc. .
- biometric data however have the disadvantage of not being able to be replaced with the ease of a personal code that can be transmitted at the last moment to the user; a user record is also required to acquire his reference biometric data.
- identification methods can further be combined. It is also possible to claim additional or different identification depending on the circumstances; for example, a biometric or key identification may be required when the personal code identification has not worked after a predetermined number of tests, or when the sum available in the protected volume exceeds a certain sum, or when other circumstances impose increased security.
- Access rights may be time dependent; for example, it is possible to authorize an unlocking of the lock only during a limited time window corresponding to the time at which the user is expected. This time window can be coded, along with other information, in the control panel response described below.
- the lock 5 can also check if a particular manipulation has been made during the introduction of the personal code by the user 4 to signal that he is under duress, for example because an attacker is forcing him to introduce the code.
- the particular handling may involve for example the introduction of a different personal code, the pressure of a key or an additional member, a prolonged press on a key, or other identifiable manipulations unambiguously by the lock 5 but difficult to detect for an assailant observing the maneuver.
- the detection of a particular manipulation leads to a different behavior of the lock, as will be seen below.
- the lock 5 displays in step 102 a question on the display 50.
- the question displayed may depend on the time, the date, the identified user, the lock , other parameters collected by the lock, and / or a possible manipulation detection to signal a constraint.
- the choice of the question may depend on a random factor.
- Each question is preferably displayed once and is not reused, or at least not for the same user.
- the displayed question can be generated by a mathematical function, for example a pseudo-random function, and / or chosen in a table of predefined questions.
- the pseudo-random function depends at least partially on the value of an incremented counter each time the trunk is opened and / or each unlocking attempt; the counter can never be decremented, and the maximum value that can be counted is sufficient to ensure that the counter does not loop back. It would also be possible to use the time counted by the lock clock to initialize the pseudo-random function; However, a clock must be able to be set on time, and thus be able to be delayed, which could be used to "go back in time” in order to force the lock to generate again a question whose answer is already known.
- Successful IDs and unsuccessful ID attempts are preferably stored in a log file in the lock, along with the date and time of the event.
- This file can be viewed by a technician, for example by introducing a particular code on the keyboard 51, by connecting a computer to a connector on the front face of the lock, and / or remotely from the central unit 1 through a communication network.
- the user 4 reads the question displayed during the step 103, then introduces it during the step 104 on the keyboard of his mobile equipment 3.
- the question displayed on the display 50 is unpredictable, and It is possible to distinguish the possible questions from the non-lawful questions, it is thus ensured that the user 4 is indeed close to the lock 5 to open.
- the question introduced by the user is transmitted by the mobile equipment 3 to the central station, for example in the form of a short message, for example SMS, e-mail, data packets, DTMF code, or voice message spoken by the user.
- a short message for example SMS, e-mail, data packets, DTMF code, or voice message spoken by the user.
- a dedicated application for example a Java (registered trademark) applet, can be executed by the mobile equipment 3 to facilitate the introduction of the question and its transmission to the central station 1.
- the question is simply introduced by the user. user and forwarded to a telephone number or to an e-mail address known to the user.
- Access to mobile equipment 3, or to the mobile equipment application, may be protected by a password, a pin code, or require other identification or authentication measures.
- user 4 may be protected by a password, a pin code, or require other identification or authentication measures.
- the message transmitted to the central unit 1 during the step 105 may include other information, including for example an identification of the mobile equipment 3 used (for example a number of calling MSISDN), user identification data (including his personal code, but also for example a password, a PIN code, biometric data, extracted data of a smart card in the mobile equipment, etc.), position information provided by the geolocation module 30, information provided by the PTI module 31, etc.
- the message can also be signed electronically by a smart card in the mobile equipment 3, to prove its authenticity and integrity, and / or encrypted to ensure its confidentiality.
- the central unit 1 receives the message transmitted by the user and verifies it. Verification involves, for example, checking whether the transmitted question is a lawful question, depending on the user who uses it, the lock in front of which he is, the time, etc. If the user's personal code has been transmitted with the question, or if it is implicitly contained in the question, the central unit 1 can also ensure that this user is actually authorized to access this lock at this time, by example according to a road map previously established for a conveyor moving between several locks. Other checks may take into account the geographic location of the user, the data provided by the PTI device, any data provided directly by the lock, information checks signaling manipulation to indicate a constraint, and so on.
- step 106 If the checks carried out in step 106 make it possible to determine that the question is a legitimate question transmitted at the right moment by an authorized user, the rights of this user are preferably determined.
- an answer to this question is computed during step 107, using an algorithm unknown to the users and executed by the calculation means 11.
- the response is preferably constituted by a numerical or alphanumerical sequence that does not allow a user to immediately determine if it contains implicit instructions for the lock.
- the question is not valid, or if it was transmitted by an unauthorized user, or when the user does not have the necessary access rights, or when other anomalies have been detected, no answer is calculated.
- an error message informing the user is then transmitted to the mobile equipment 3 and displayed by the latter, for example to allow the user to correct a typing error during the introduction of the question.
- the central can provide a modified response resulting in modified behavior of the lock. The reaction of the plant and the response sent may also depend on the anomaly detected, the number of unsuccessful attempts, or other conditions.
- control unit detects, for example from the question received, that the user has made a particular manipulation to indicate that it is under stress, it preferably calculates a response modified by the normal response, in order to cause a particular behavior. lock. Different modified responses can be chosen automatically or by human operators depending on the circumstances, in order to trigger different reactions.
- Additional information may be coded in the response, for example to define the user's access rights to the lock, for example as a function of time.
- the answer to the question is then transmitted to the mobile equipment in step 108, then displayed and read by the user in step 109.
- the response may include, for example, a numeric or alphanumeric code and is introduced by the user 4 on the keypad 51 of the lock 5 during the step 110.
- the calculation means in the lock 5 check whether the response received is correct.
- this verification involves a comparison with a response calculated by the lock itself, by executing the same algorithm as that executed by the central unit 1.
- the verification of the received response is performed without recalculating it independently, for example by checking the response received by means of a verification key to distinguish the possible answer (s) to the question of invalid answers, depending on the question and / or other parameters.
- This variant has the advantage of not requiring copies of the algorithm in a multitude of locks scattered over a territory; it is also compatible with algorithms that can provide several valid answers to the same question.
- the calculation means 5 furthermore verify in step 111 whether the response received takes into account a manipulation detection by a user under constraint, or whether other parameters are coded in this response.
- the user indicates a state of constraint to the lock 5 during the introduction of the answer on the keyboard during the step 110, for example by introducing an additional digit, etc.
- This solution is however less secure because a usurper could introduce the answer himself, without performing any additional manipulation.
- the central is not informed of a manipulation.
- a state of stress is directly detected by the lock 5 from sensors or additional data, data transmitted by the distributor to which the lock is associated, or data directly transmitted by the central unit 1.
- the lock determines during step 111 that the answer entered is correct, and that it does not correspond to a state of stress, the lock is unlocked during step 112, until the next manual lock or for a limited time.
- the user can thus access the protected volume, or a part of this volume.
- This event is logged in the log file, indicating the time and duration of the unlock.
- the counter used to initialize the pseudo-random function is irreversibly incremented.
- step 111 If the lock determines during step 111 that the answer entered is incorrect, the lock remains locked, and an error message may be displayed on the display 50. After a predetermined number of unsuccessful attempts, an alarm can be triggered locally or sent to Central 1 or to another predetermined address. In a variant, the tickets in the dispenser are automatically destroyed or marked with an indelible ink.
- a receipt code is preferably displayed during an additional step not shown on the display 50.
- the user enters this code of a receipt on his mobile equipment and transmits it to the central 1, in the same way as the question before, in order to indicate to the central the end of his mission.
- the required release code is preferably unique and unpredictable in advance, so as to ensure that the user has read it correctly as a result of the manipulation and has not deduced otherwise.
- the central office is however able to check whether the transmitted acknowledgment code is lawful.
- the release code generated by the lock or reintroduced by the user may contain indications indicating to the central particular events, for example to indicate whether the lock was opened, a new state of constraint, or any other event .
- the transmitted acknowledgment code can be signed, encrypted and accompanied by data such as date, time, user identification, mobile equipment, position information geographical, etc.
- the control unit can thus verify this data, or detect the absence of sending of a receipt message after a predetermined delay, to decide on an appropriate action, including the triggering of an alarm, the triggering of an intervention, and / or the locking of other locks nearby or on the intended course of the user even in case of correct operation.
- the receipt code generated is preferably, in the same way as the question or the answer, depending on the current user, the lock in progress and / or other parameters such as date, time, detection of possible manipulations.
- the lock 5 may itself allow or refuse the unlocking as a function of parameters acquired directly or through the protected device, for example by means of sensors, cameras or microphones associated with the device. lock or device, obtained by analyzing the user's manipulations on the keyboard 5, or according to an internal history of the manipulations of this user and / or the lock 5.
- the lock described above may be used to secure volumes other than ticket dispensers, for example weapon cabinets used in police stations or by the military, safes, or other volumes whose locking or unlocking by a local user must be authorized by a remote control panel.
- the lock of the invention can be programmed at any time, for example from the control panel and / or with the aid of a particular code introduced by a user nearby, to operate in a mode other than the interactive mode described above. For example, it would be possible to reprogram this lock to allow unlocking by some users, or even by all users, without establishing a connection with the central.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ES05109900.0T ES2664947T3 (es) | 2005-10-24 | 2005-10-24 | Procedimiento de control de bloqueo de cerradura, y cerradura |
EP05109900.0A EP1780680B1 (de) | 2005-10-24 | 2005-10-24 | Verfahren zur Steuerung der Verriegelung von Verschlüssen und Verschluss |
PCT/EP2006/067589 WO2007048749A1 (fr) | 2005-10-24 | 2006-10-19 | Procede de controle de verouillage de serrure, et serrure |
CN2006800397857A CN101297327B (zh) | 2005-10-24 | 2006-10-19 | 控制锁的锁定的方法以及锁 |
ZA200803528A ZA200803528B (en) | 2005-10-24 | 2006-10-19 | Method for controlling the locking of a lock, and lock |
MYPI20081235A MY149673A (en) | 2005-10-24 | 2006-10-19 | Method for controlling the locking of a lock, and lock |
AU2006307977A AU2006307977B2 (en) | 2005-10-24 | 2006-10-19 | Method for controlling the locking of a lock, and lock |
US12/104,967 US20090320538A1 (en) | 2005-10-24 | 2008-04-17 | Method for controlling the locking of a lock, and lock |
HK09103516A HK1125727A1 (en) | 2005-10-24 | 2009-04-16 | Method for controlling a lock locking state and a lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05109900.0A EP1780680B1 (de) | 2005-10-24 | 2005-10-24 | Verfahren zur Steuerung der Verriegelung von Verschlüssen und Verschluss |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1780680A1 true EP1780680A1 (de) | 2007-05-02 |
EP1780680B1 EP1780680B1 (de) | 2018-01-17 |
Family
ID=35840136
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05109900.0A Active EP1780680B1 (de) | 2005-10-24 | 2005-10-24 | Verfahren zur Steuerung der Verriegelung von Verschlüssen und Verschluss |
Country Status (9)
Country | Link |
---|---|
US (1) | US20090320538A1 (de) |
EP (1) | EP1780680B1 (de) |
CN (1) | CN101297327B (de) |
AU (1) | AU2006307977B2 (de) |
ES (1) | ES2664947T3 (de) |
HK (1) | HK1125727A1 (de) |
MY (1) | MY149673A (de) |
WO (1) | WO2007048749A1 (de) |
ZA (1) | ZA200803528B (de) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010097178A1 (de) * | 2009-02-25 | 2010-09-02 | Rittal Gmbh & Co. Kg | Zugangssteuerungseinrichtung |
WO2010134053A1 (en) * | 2009-05-21 | 2010-11-25 | Hakan Gurel | An authentication system |
CN106056713A (zh) * | 2016-06-08 | 2016-10-26 | 珠海明居智能科技有限公司 | 一种密码锁的远程授权方法 |
Families Citing this family (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5012247B2 (ja) * | 2007-06-21 | 2012-08-29 | ソニー株式会社 | 認証装置、入場管理装置、入退場管理装置、入場管理システム、入退場管理システム、認証処理方法およびプログラム |
US8665062B2 (en) * | 2008-06-30 | 2014-03-04 | Telecom Italia S.P.A. | Method and system for communicating access authorization requests based on user personal identification as well as method and system for determining access authorizations |
US9058474B2 (en) * | 2008-12-11 | 2015-06-16 | Northrop Grumman Systems Corporation | Biometric device, system, and method for individual access control |
US8542119B2 (en) * | 2009-01-13 | 2013-09-24 | Invue Security Products Inc. | Combination non-programmable and programmable key for security device |
US8797138B2 (en) * | 2009-01-13 | 2014-08-05 | Utc Fire & Security Americas Corporation, Inc. | One-time access for electronic locking devices |
US20110050419A1 (en) * | 2009-08-26 | 2011-03-03 | Kwanyuen Ng | Remote Intrusion Signaling Security System |
CN101866409B (zh) * | 2010-05-11 | 2015-04-01 | 中兴通讯股份有限公司 | 一种手持设备锁定、解锁方法和装置 |
US20110298584A1 (en) * | 2010-06-04 | 2011-12-08 | Kent Biggs | Securing a cash safe with a circuit |
EP2405650A1 (de) * | 2010-07-09 | 2012-01-11 | Nagravision S.A. | Verfahren für die sichere Übermittlung von Nachrichten |
KR20120058199A (ko) * | 2010-11-29 | 2012-06-07 | 한국전자통신연구원 | 위치정보를 이용한 사용자 인증방법 |
US8840020B2 (en) * | 2010-12-01 | 2014-09-23 | Lumidigm, Inc. | Biometric terminals |
WO2012128698A1 (en) * | 2011-03-24 | 2012-09-27 | Recludo Ab | Standalone biometric authorization control device and method |
US8856893B2 (en) | 2011-06-09 | 2014-10-07 | Hao Min | System and method for an ATM electronic lock system |
CN102360477A (zh) * | 2011-06-09 | 2012-02-22 | 闵浩 | 基于指纹识别技术和移动通信技术的指纹密码锁控制管理系统和方法 |
CN102324152A (zh) * | 2011-06-09 | 2012-01-18 | 闵浩 | 基于身份识别技术和移动通信技术的电子锁控制管理系统和方法 |
WO2013034671A1 (en) * | 2011-09-09 | 2013-03-14 | Param Technologies Corporation, S.L. | Apparatus and method for controlling the access of a visitor to a premises |
CN103021045A (zh) * | 2011-09-25 | 2013-04-03 | 边高伟 | 移动终端用户验证智能门禁系统 |
US20130090939A1 (en) * | 2011-10-11 | 2013-04-11 | Robert N. Robinson | Sytem and method for preventing healthcare fraud |
US20130090942A1 (en) * | 2011-10-11 | 2013-04-11 | Safe-Link, Llc | Sytem and method for preventing healthcare fraud |
CN102346945A (zh) * | 2011-10-28 | 2012-02-08 | 闵浩 | 基于双向加密认证技术和通信技术的电子锁控制管理系统和方法 |
CN102493722B (zh) * | 2011-12-05 | 2014-04-09 | 西安大唐电信有限公司 | 一种车辆运输电子锁应用系统及加解锁方法 |
CN104282068A (zh) * | 2012-03-15 | 2015-01-14 | 江苏省电力公司常州供电公司 | 变电所防误锁具的许可装置 |
MX342113B (es) | 2012-08-16 | 2016-09-14 | Schlage Lock Co Llc | Sistema y método inalámbrico de cerradura electrónica. |
CN102855427B (zh) * | 2012-08-31 | 2016-03-02 | 小米科技有限责任公司 | 一种设备解锁方法、装置及用户设备 |
CN103941971A (zh) * | 2013-01-17 | 2014-07-23 | 深圳富泰宏精密工业有限公司 | 屏幕解锁方法及系统 |
US20140279511A1 (en) * | 2013-03-14 | 2014-09-18 | Moneygram International, Inc. | Systems and Methods for Management of Local Devices |
AU2014237417B2 (en) | 2013-03-15 | 2016-05-12 | Assa Abloy Americas Residential Inc. | Wireless lockset with integrated antenna, touch activation and light communication device |
EP2976753A2 (de) * | 2013-03-18 | 2016-01-27 | SES Solutions GmbH | VERFAHREN ZUR ÜBERSTELLUNG VON TRANSPORTGUT IN EINEM ABSCHLIEßBAREN TRANSPORTBEHÄLTER, ABSCHLIEßBARER TRANSPORTBEHÄLTER UND TRANSPORTSYSTEM |
CN103761966A (zh) * | 2013-12-25 | 2014-04-30 | 苏州市邦成电子科技有限公司 | 一种语音开锁系统 |
US9600949B2 (en) | 2014-07-30 | 2017-03-21 | Master Lock Company Llc | Wireless key management for authentication |
US9996999B2 (en) | 2014-07-30 | 2018-06-12 | Master Lock Company Llc | Location tracking for locking device |
US9894066B2 (en) | 2014-07-30 | 2018-02-13 | Master Lock Company Llc | Wireless firmware updates |
US9489787B1 (en) | 2014-08-08 | 2016-11-08 | Live Nation Entertainment, Inc. | Short-range device communications for secured resource access |
US10008057B2 (en) | 2014-08-08 | 2018-06-26 | Live Nation Entertainment, Inc. | Short-range device communications for secured resource access |
KR102422372B1 (ko) * | 2014-08-29 | 2022-07-19 | 삼성전자 주식회사 | 생체 정보와 상황 정보를 이용한 인증 방법 및 장치 |
US20160116510A1 (en) | 2014-10-27 | 2016-04-28 | Master Lock Company | Predictive battery warnings for an electronic locking device |
CN104916022A (zh) * | 2015-06-16 | 2015-09-16 | 广州杰赛科技股份有限公司 | 一种智能锁控制方法、移动终端及智能锁系统 |
US9852562B2 (en) * | 2015-07-06 | 2017-12-26 | Acsys Ip Holding, Inc. | Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons |
CN105069874B (zh) * | 2015-07-28 | 2018-08-03 | 北京航空航天大学 | 一种移动互联网声纹门禁系统及其实现方法 |
CN105225317A (zh) * | 2015-10-03 | 2016-01-06 | 上海大学 | 一种多路集中管理的网络门禁控制系统 |
CN105577805A (zh) * | 2015-12-29 | 2016-05-11 | 宁波艾谱实业有限公司 | 保险箱的远程控制方法及实现该方法的控制系统 |
US9984524B2 (en) * | 2016-01-26 | 2018-05-29 | Acsys Ip Holding Inc | Systems and methods for remote access rights and verification |
CA3017635A1 (en) | 2016-03-22 | 2017-09-28 | Spectrum Brands, Inc. | Garage door opener with touch sensor authentication |
WO2017199180A2 (en) * | 2016-05-17 | 2017-11-23 | Peter Just | Access system and container for communal objects |
CN106023373A (zh) * | 2016-05-23 | 2016-10-12 | 三峡大学 | 一种基于大数据与人脸识别的校园宿舍门禁系统 |
CN105939193A (zh) * | 2016-06-22 | 2016-09-14 | 武汉市天晨翔云数据有限公司 | 控制智能锁的黑名单设置授权及加密方法 |
AR109978A1 (es) | 2016-10-19 | 2019-02-13 | Best Access Solutions Inc | Núcleo de cerradura electromecánica |
CN106773757A (zh) * | 2016-12-13 | 2017-05-31 | 广东美的制冷设备有限公司 | 智能装置及家电设备 |
EP3361457B1 (de) * | 2017-02-13 | 2023-07-12 | Diebold Nixdorf Systems GmbH | Eingabeeinrichtung, geldautomat und verfahren |
JP2018180624A (ja) * | 2017-04-04 | 2018-11-15 | グローリー株式会社 | 貨幣処理機、貨幣処理システムおよび貨幣処理方法 |
ES2927419T3 (es) | 2017-09-08 | 2022-11-07 | Dormakaba Usa Inc | Bombín de cerradura electromecánico |
CN108182739A (zh) * | 2017-12-21 | 2018-06-19 | 广东汇泰龙科技有限公司 | 一种基于虹膜识别和蓝牙功能的云锁解锁方法、系统 |
US11450158B2 (en) | 2018-01-05 | 2022-09-20 | Spectrum Brands, Inc. | Touch isolated electronic lock |
BR112020020946A2 (pt) | 2018-04-13 | 2021-03-02 | Dormakaba Usa Inc. | núcleo de fechadura eletromecânico |
US11466473B2 (en) | 2018-04-13 | 2022-10-11 | Dormakaba Usa Inc | Electro-mechanical lock core |
CN109190366B (zh) * | 2018-09-14 | 2021-11-19 | 郑州云海信息技术有限公司 | 一种程序处理方法以及相关装置 |
US11639617B1 (en) | 2019-04-03 | 2023-05-02 | The Chamberlain Group Llc | Access control system and method |
US20200372743A1 (en) * | 2019-05-20 | 2020-11-26 | Popid, Inc. | Face based door entry |
GB2590357B (en) * | 2019-11-28 | 2022-12-21 | Paxton Access Ltd | Access control system and method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0546701A2 (de) | 1991-12-09 | 1993-06-16 | Brink's Incorporated | Vorrichtung und Verfahren zum kontrollierten Zugang zu gesicherten Orten |
US5259029A (en) * | 1990-05-16 | 1993-11-02 | Duncan Jr F Jeff | Decoding device for computer software protection |
US5367572A (en) * | 1984-11-30 | 1994-11-22 | Weiss Kenneth P | Method and apparatus for personal identification |
EP0935041A1 (de) * | 1998-02-09 | 1999-08-11 | Christian Martineau | Vorrichtung und Verfahren zur physischen oder logischen Zugangskontrolle |
WO2001003078A1 (en) * | 1999-07-05 | 2001-01-11 | Hoeili Jens Petter | Method and system for payment transaction |
WO2001059725A1 (de) * | 2000-02-08 | 2001-08-16 | Siemens Aktiengesellschaft | Verfahren zur nutzeridentitätskontrolle |
EP1281588A2 (de) * | 2001-08-01 | 2003-02-05 | Siemens Aktiengesellschaft | Verfahren zum Übertragen eines Öffnungscodes, Verfahren zum Übertragen eines Verschlusscodes und zugehörige Einheiten |
US20030231103A1 (en) * | 2002-06-14 | 2003-12-18 | Fisher Scott R. | Electronic lock system and method for its use with card only mode |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB8813730D0 (en) * | 1988-06-10 | 1988-07-13 | Omni Services Ltd | Time defence system |
US5774058A (en) * | 1995-07-20 | 1998-06-30 | Vindicator Corporation | Remote access system for a programmable electronic lock |
-
2005
- 2005-10-24 EP EP05109900.0A patent/EP1780680B1/de active Active
- 2005-10-24 ES ES05109900.0T patent/ES2664947T3/es active Active
-
2006
- 2006-10-19 MY MYPI20081235A patent/MY149673A/en unknown
- 2006-10-19 AU AU2006307977A patent/AU2006307977B2/en active Active
- 2006-10-19 CN CN2006800397857A patent/CN101297327B/zh not_active Expired - Fee Related
- 2006-10-19 WO PCT/EP2006/067589 patent/WO2007048749A1/fr active Application Filing
- 2006-10-19 ZA ZA200803528A patent/ZA200803528B/xx unknown
-
2008
- 2008-04-17 US US12/104,967 patent/US20090320538A1/en not_active Abandoned
-
2009
- 2009-04-16 HK HK09103516A patent/HK1125727A1/xx unknown
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5367572A (en) * | 1984-11-30 | 1994-11-22 | Weiss Kenneth P | Method and apparatus for personal identification |
US5259029A (en) * | 1990-05-16 | 1993-11-02 | Duncan Jr F Jeff | Decoding device for computer software protection |
EP0546701A2 (de) | 1991-12-09 | 1993-06-16 | Brink's Incorporated | Vorrichtung und Verfahren zum kontrollierten Zugang zu gesicherten Orten |
EP0935041A1 (de) * | 1998-02-09 | 1999-08-11 | Christian Martineau | Vorrichtung und Verfahren zur physischen oder logischen Zugangskontrolle |
WO2001003078A1 (en) * | 1999-07-05 | 2001-01-11 | Hoeili Jens Petter | Method and system for payment transaction |
WO2001059725A1 (de) * | 2000-02-08 | 2001-08-16 | Siemens Aktiengesellschaft | Verfahren zur nutzeridentitätskontrolle |
EP1281588A2 (de) * | 2001-08-01 | 2003-02-05 | Siemens Aktiengesellschaft | Verfahren zum Übertragen eines Öffnungscodes, Verfahren zum Übertragen eines Verschlusscodes und zugehörige Einheiten |
US20030231103A1 (en) * | 2002-06-14 | 2003-12-18 | Fisher Scott R. | Electronic lock system and method for its use with card only mode |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010097178A1 (de) * | 2009-02-25 | 2010-09-02 | Rittal Gmbh & Co. Kg | Zugangssteuerungseinrichtung |
RU2519461C2 (ru) * | 2009-02-25 | 2014-06-10 | Ритталь Гмбх Унд Ко.Кг | Устройство управления доступом |
US8779891B2 (en) | 2009-02-25 | 2014-07-15 | Rittal Gmbh & Co. Kg | Access control device |
WO2010134053A1 (en) * | 2009-05-21 | 2010-11-25 | Hakan Gurel | An authentication system |
CN106056713A (zh) * | 2016-06-08 | 2016-10-26 | 珠海明居智能科技有限公司 | 一种密码锁的远程授权方法 |
CN106056713B (zh) * | 2016-06-08 | 2019-02-15 | 珠海明居智能科技有限公司 | 一种密码锁的远程授权方法 |
Also Published As
Publication number | Publication date |
---|---|
EP1780680B1 (de) | 2018-01-17 |
CN101297327A (zh) | 2008-10-29 |
MY149673A (en) | 2013-09-30 |
CN101297327B (zh) | 2013-04-03 |
AU2006307977B2 (en) | 2012-03-01 |
ZA200803528B (en) | 2009-08-26 |
ES2664947T3 (es) | 2018-04-24 |
WO2007048749A1 (fr) | 2007-05-03 |
AU2006307977A1 (en) | 2007-05-03 |
HK1125727A1 (en) | 2009-08-14 |
US20090320538A1 (en) | 2009-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1780680B1 (de) | Verfahren zur Steuerung der Verriegelung von Verschlüssen und Verschluss | |
ES2255111T3 (es) | Metodo y sistema para garantizar la seguridad de centros de gestion de llamadas telefonicas. | |
EP3420172B1 (de) | Sicheres gehäuse mit vorgegebenem inhalt und dynamischer verwaltung | |
KR101117314B1 (ko) | 휴대용 원격통신 장치 | |
EP0950303B1 (de) | Verfahren und einrichtung zur sicherung der ferndienstleistungen der finanzinstitute | |
EP2720199B1 (de) | Gesichertes Steuerungsverfahren zum Öffnen von Verschlussvorrichtungen mit Hilfe von Meldungen, die eine symmetrische Verschlüsselung auslösen | |
EP1549011A1 (de) | Kommunikationsverfahren und System zwischen einem Endgerät und mindestens einer Kommunikationsvorrichtung | |
FR2926938A1 (fr) | Procede d'authentification et de signature d'un utilisateur aupres d'un service applicatif, utilisant un telephone mobile comme second facteur en complement et independamment d'un premier facteur | |
CN102084369A (zh) | 用于监视对设备的未授权使用的系统 | |
WO2013079848A1 (fr) | Protocole d'authentification mutuelle d' entitees ayant prealablement initie une transaction en ligne | |
JP4104171B2 (ja) | 遠隔通信オペレータによって提供されるサービスのセキュリティシステムおよび方法 | |
EP3022867A1 (de) | Strenges authentifizierungsverfahren | |
CN111143889B (zh) | 基于区块链的兴奋剂检测信息管理方法、装置、设备 | |
EP2987124B1 (de) | Verfahren und system zur verbesserung der sicherheit elektronischer transaktionen | |
EP1813052B1 (de) | Verfahren zur Sicherung entfernt durchgeführter Transaktionen in einem offenen Kommunikationsnetzwerk | |
FR2944400A1 (fr) | Procede d'authentification aupres d'un serveur par un utilisateur d'un appareil mobile | |
EP3262553B1 (de) | Verfahren zur transaktion ohne körperliche unterstützung eines sicherheitsidentifikators und ohne token, abgesichert durch strukturelle entkopplung der persönlichen und dienstidentifikatoren | |
FR3002670A1 (fr) | Procede et systeme de traitement cryptographique utilisant une donnee sensible | |
US20130339224A1 (en) | Money transaction system and a method thereto | |
WO2007113669A1 (fr) | Securisation de transactions electroniques sur un reseau ouvert | |
EP0935041A1 (de) | Vorrichtung und Verfahren zur physischen oder logischen Zugangskontrolle | |
FR2788154A1 (fr) | Supports et systemes d'echange de donnees securises notamment pour paiements et telepaiements | |
FR3081663A1 (fr) | Procede de gestion a distance de l'ouverture d'une serrure electronique dotee d'une interface utilisateur, terminal, serrure et programme d'ordinateur associes | |
FR3038414A1 (fr) | Procede et systeme de controle d'acces a un service via un media mobile. | |
WO2012022856A1 (fr) | Procédé d'authentification d' un utilisateur du réseau internet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR MK YU |
|
17P | Request for examination filed |
Effective date: 20071009 |
|
AKX | Designation fees paid |
Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
17Q | First examination report despatched |
Effective date: 20120604 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20170503 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAJ | Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted |
Free format text: ORIGINAL CODE: EPIDOSDIGR1 |
|
GRAL | Information related to payment of fee for publishing/printing deleted |
Free format text: ORIGINAL CODE: EPIDOSDIGR3 |
|
INTC | Intention to grant announced (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: DORMAKABA SCHWEIZ AG |
|
GRAR | Information related to intention to grant a patent recorded |
Free format text: ORIGINAL CODE: EPIDOSNIGR71 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
INTG | Intention to grant announced |
Effective date: 20171207 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: FRENCH |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602005053387 Country of ref document: DE Ref country code: AT Ref legal event code: REF Ref document number: 964898 Country of ref document: AT Kind code of ref document: T Effective date: 20180215 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: NV Representative=s name: P&TS SA, CH |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2664947 Country of ref document: ES Kind code of ref document: T3 Effective date: 20180424 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: FP |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 964898 Country of ref document: AT Kind code of ref document: T Effective date: 20180117 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180417 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180517 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180418 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602005053387 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 14 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 |
|
26N | No opposition filed |
Effective date: 20181018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20181024 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20181024 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180117 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20051024 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 20221019 Year of fee payment: 18 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: TR Payment date: 20221020 Year of fee payment: 18 Ref country code: FI Payment date: 20221020 Year of fee payment: 18 Ref country code: DE Payment date: 20221019 Year of fee payment: 18 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20221026 Year of fee payment: 18 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20231020 Year of fee payment: 19 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: ES Payment date: 20231222 Year of fee payment: 19 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20231026 Year of fee payment: 19 Ref country code: FR Payment date: 20231023 Year of fee payment: 19 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BE Payment date: 20231019 Year of fee payment: 19 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602005053387 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MM Effective date: 20231101 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20231101 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20231031 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20231101 Ref country code: FI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20231024 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20240501 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20231031 |