EP1780680A1 - Verfahren zur Steuerung der Verriegelung von Türverschlüssen und Türverschluss - Google Patents

Verfahren zur Steuerung der Verriegelung von Türverschlüssen und Türverschluss Download PDF

Info

Publication number
EP1780680A1
EP1780680A1 EP20050109900 EP05109900A EP1780680A1 EP 1780680 A1 EP1780680 A1 EP 1780680A1 EP 20050109900 EP20050109900 EP 20050109900 EP 05109900 A EP05109900 A EP 05109900A EP 1780680 A1 EP1780680 A1 EP 1780680A1
Authority
EP
European Patent Office
Prior art keywords
lock
user
question
response
central
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP20050109900
Other languages
English (en)
French (fr)
Other versions
EP1780680B1 (de
Inventor
Pierre Pellaton
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dormakaba Schweiz AG
Original Assignee
Kaba AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to EP05109900.0A priority Critical patent/EP1780680B1/de
Application filed by Kaba AG filed Critical Kaba AG
Priority to ES05109900.0T priority patent/ES2664947T3/es
Priority to ZA200803528A priority patent/ZA200803528B/xx
Priority to PCT/EP2006/067589 priority patent/WO2007048749A1/fr
Priority to CN2006800397857A priority patent/CN101297327B/zh
Priority to MYPI20081235A priority patent/MY149673A/en
Priority to AU2006307977A priority patent/AU2006307977B2/en
Publication of EP1780680A1 publication Critical patent/EP1780680A1/de
Priority to US12/104,967 priority patent/US20090320538A1/en
Priority to HK09103516A priority patent/HK1125727A1/xx
Application granted granted Critical
Publication of EP1780680B1 publication Critical patent/EP1780680B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
    • G07C9/00674Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
    • G07C9/00698Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons actuated in function of displayed informations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00388Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T70/00Locks
    • Y10T70/70Operating mechanism
    • Y10T70/7051Using a powered device [e.g., motor]
    • Y10T70/7062Electrical type [e.g., solenoid]
    • Y10T70/7068Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]

Definitions

  • the present invention relates to an electronic lock lock control method.
  • the present invention also relates to an electronic lock useful for the implementation of this method.
  • the present invention relates in particular to a lock providing the required level of security for ATMs (Automatic Teller Machines) or safes.
  • the front access is secured by a card reader and a keypad allowing different users to identify themselves before taking a limited number of tickets.
  • Access to the rear face of the dispenser is generally closed by means of a conventional key lock.
  • the bank employees, the bottom conveyors responsible for filling the distributor and the technical repairers all share copies of the same key that allows access to vaults frequently containing tens of thousands of Euros in cash or in a container .
  • the risk is important that one of these keys is lost or stolen and falls into the wrong hands.
  • a user who has fraudulently acquired a key may attempt to call the central office by impersonating the authorized key holder in order to obtain a valid OTC code.
  • the security offered is therefore insufficient.
  • the electronic key reader comprises electrical, electronic and / or electromechanical elements that offer possibilities for manipulation and additional fraud.
  • the patent application EP0546701 discloses a lock unlocking verification method in which security is provided by means of different PIN codes and encoded messages that the user must enter into a terminal belonging to him. This terminal is then connected to the protected box to cause its unlocking.
  • the terminal that is usually in the hands of the user is a target for hackers attempting to study it or to build a compatible terminal to access unauthorized vaults.
  • An object of the present invention is therefore to provide a method and a lock which make it possible to avoid the disadvantages of the methods and locks of the prior art.
  • This method has the advantage of forcing the user to transmit a question posed by the lock of the dispenser to the central. This additional operation makes it possible to provide additional tests, for example to check in the central if the question asked is indeed valid.
  • This method also has the advantage of basing the identification of the user not necessarily on a physical key, but for example by means of password, PIN, or biometric data, more difficult to steal.
  • this method has the advantage of making it possible to distribute, replace or invalidate very easily passwords, to distance by simple software manipulations from a central.
  • the secret code used to identify the user is verified by the central unit 1, and not by the lock. This avoids the transmission of authorized user lists to different locks.
  • This method also has the advantage that all the data and all the codes necessary to unlock the lock can be introduced directly into the lock, without passing through an intermediate device offering an additional vulnerability to the attacks.
  • This lock is adapted to the method above; it also has the advantage of not necessarily requiring a key reader, vulnerable and expensive.
  • This method can be implemented entirely automatically by a computer programmed for these different tasks, or in a manner assisted by a human operator, or a group of human operators, using a computer.
  • FIG. 1 illustrates in the form of a block diagram a system comprising a central unit 1 to which different users 4 can connect using a mobile device 3 through a network 2.
  • the system also comprises one or more locks 5 to protect devices not shown, for example cash dispensers, chests, rooms or other protected volumes.
  • the central unit 1 may be constituted for example by a call center, animated by several human operators, or a server or server group executing a specific application.
  • the network 2 is for example a telecommunications network, for example a conventional telephone network, an Internet or Intranet type network, or preferably a mobile cellular network. Users can get connect to control panel 1 by establishing voice or data communication through the network 2.
  • the users connect to the central unit 1 via a mobile cellular network 2 and by sending data, for example SMS (Short Message System), e-mails or IP data packets through a network 2 of GSM, GPRS, HSCSD, EDGE or GPRS for example.
  • the central station preferably automatically receives data via a modem or a suitable router, and can also respond to the user by sending his own data through the same channel, or a different channel.
  • the data exchanged in one of the directions, or in both directions, can be electronically signed and / or encrypted by the central unit 1 and / or by the mobile equipment 3, for example by using a smart card in the mobile equipment 3 .
  • the users 4 connect to the central unit 1 by means of a voice communication.
  • the central unit 1 uses human operators to react to this voice call, and / or an IVR (Interactive Voice Response) voice recognition system to analyze the content of the user's requests and / or DTMF codes and to synthesize a voice response.
  • IVR Interactive Voice Response
  • the central unit 1 furthermore comprises a database of authorized users, which contains for each user at least one personal code - or personal code verification data - as well as authorizations, for example a list of locks that the user user is allowed to open.
  • the record comprising each user may further indicate time windows during which access to one or more locks is authorized, a user profile, including for example its name, its coordinates, cryptographic keys for communication with each user, a history of system usage (number of successful trials, unsuccessful trials, dates, times, etc.), and other identification or authentication data, including for example a MSISDN caller number corresponding to its mobile equipment 3, biometric data, etc.
  • Calculation means 11 in the central unit 1 make it possible to execute an application program for managing the various users and their rights in the data bank 10.
  • the calculation means also make it possible to execute an algorithm making it possible to calculate the response to a number of requests.
  • question (“challenge") received from a user.
  • This algorithm can for example consult a read-only correspondence table that indicates the answer to each expected question, or preferably calculate a mathematical function from each question.
  • the function performed is preferably chosen so that knowledge of any number of answers to previous questions does not predict what will be the answer to the next question (pseudo-random function).
  • the chosen algorithm, or the values allowing to parameterize it are preferably kept confidential.
  • a different algorithm, or different values are preferably used for each lock 5, and / or even for each user 4.
  • the central unit 1 may further comprise a lock database (not shown), comprising for each lock 5 a profile with information such as the geographical location, the type of protected device, cryptographic communication keys, etc.
  • the mobile equipment 3 depends on the type of network used.
  • this equipment is constituted by cellular mobile equipment, for example a cellular telephone or a personal assistant, a smartphone or a personal computer equipped with a connection card to a cellular network, a modem or a personal computer. a router. It is also possible to use a dedicated communication device for this purpose.
  • the mobile equipment 3 may comprise geolocation means 30, for example a satellite receiver of the GPS type to determine its position and possibly transmit it to the central 1.
  • Insulated worker protection equipment (ITP) 31 makes it possible to check whether the user 4 of the mobile equipment 3 is awake, for example by checking whether move, if it is vertical, if it reacts to requests for answers, etc.
  • the mobile equipment 3 may further comprise additional identification and / or authentication means 32, for example a smart card (SIM card for example), PIN code input and verification means, a sensor biometric, etc.
  • the identification and / or user authentication 4 can be performed locally, that is to say in the mobile equipment or in a smart card inserted in the equipment, or remotely, that is, ie for example in the central 1 which then has means of verification of the data of the smart card, PIN codes and / or biometric data entered.
  • the mobile equipment 3 can be for example portable or installed in a vehicle.
  • a conventional mobile telephone as mobile equipment in the context of the invention; it is only necessary for the user to be able to connect by means of this equipment with a central unit 1 to send a question and receive a corresponding answer. It is even advantageous, to increase security, to establish communications between the different users and the central by different types of channels.
  • the plant may for example use this additional information and agree with a conveyor, for example, that the question should be transmitted orally, even if the conveyor has equipment for data communication.
  • the user 4 is for example a bank employee, a bottom conveyor, a technical repairer, or any natural person authorized by the central 1 to open the lock 5.
  • the user 4 has the knowledge of a code secret personnel that has been transmitted to it by the central 1 and with which it can identify itself to one or more locks 5 of a park locks managed by the central 1.
  • the user 4 is also preferably able to s' identify towards his mobile equipment 3 by means another secret code, for example the PIN code of the phone and / or the SIM card.
  • identifying the user 4 to the lock 5 and / or to the mobile equipment 3 are conceivable within the scope of the invention; for example, the user could prove his identity by presenting a personal object, such as a key or a smart card, or by biometric identification using fingerprints, iris, retina, voice, face, etc.
  • a personal object such as a key or a smart card
  • biometric identification using fingerprints, iris, retina, voice, face, etc.
  • different methods can be implemented to identify or authenticate the user 4 towards the mobile equipment 3 and the lock 5. It is also possible to accumulate several identification methods.
  • the identification data entered in the mobile equipment 3 can be transmitted to the central 1 for verification.
  • the lock 5 comprises an electromechanical element 52, for example a bolt, whose position is controlled by a logic device inside the lock 5 to act on a mechanical mechanism ("linkage") to lock or unlike to unlock access to the protected volume, for example inside a distributor.
  • the lock is preferably intended to be used in combination with a device containing a volume to be protected, for example with a cash dispenser or a safe; it does not itself constitute such a safe, and has no protected volume, but has means not shown to associate it mechanically and / or electrically, so hardly removable with such a chest or such a dispenser.
  • a numeric or alphanumeric keyboard 51 associated with the lock 5 allows the user to enter his personal code and the answer to the questions asked.
  • Other data input elements for example a biometric sensor, a camera, a microphone, etc., may optionally be provided in the lock 5.
  • the lock further comprises a screen 50 for displaying messages in text or matrix mode, including questions, invitations to reply, and status messages.
  • the lock preferably further comprises one or more optional interfaces 53 which enable it to exchange data with the device it is to protect, for example a cash dispenser, and / or with the central unit 1 through any network, for example a telephone network or the Internet.
  • the communication of data with the device to be protected in which the lock is mounted notably makes it possible to improve the security, thanks to the exchange of information making it possible to detect probable frauds using combinations of indices and thanks to the generation of log files taking into account data collected by both the lock and the protected device.
  • This communication can also, if necessary, be used to control the lock 5 by means of the keypad of the dispenser, to display messages depending on the behavior of the lock 5 on the distributor screen, to echo alarms triggered by the lock by the distributor, or to trigger other actions performed by the distributor.
  • the bidirectional communication preferably between the lock 5 and the central unit 10 makes it possible, for example, to remotely modify the list of authorized users to identify with each lock 5 (unless this check is made by the central), to modify the remote response verification algorithms, to consult the log files generated by the lock, and to remotely detect other events related to the use of the lock.
  • This communication with the central unit 1 can also be carried out through the device protected by the lock, for example by using a modem or a router of this device.
  • the data exchanged by the lock and the central unit 1 are electronically signed and encrypted, for example through a Virtual Private Network (VPN), so as to preserve their confidentiality and their very authenticity. to the distributor to be protected.
  • VPN Virtual Private Network
  • the lock 5 furthermore preferably comprises an electronic watch 54 which enables it to determine the date and time autonomously, and to calculate time intervals.
  • Calculation means not shown, for example a microcontroller, a microprocessor with a memory, an industrial microcomputer, an asic type circuit and / or a FPGA circuit, etc., to manage the dialogs with the user, and to control the electromechanical device causing the locking or unlocking of the lock.
  • the calculation means preferably furthermore comprise a module, for example a software module, for generating and displaying a question in response to the introduction of an accepted personal identification code, and a module, for example a software module, for checking if an answer to the question is correct, and to cause the unlocking of the lock in case of correct answer
  • the calculation means are preferably protected against physical or software manipulations and may, for example, self-destruct, while keeping the lock closed, during fraudulent manipulations.
  • the lock 5 may further comprise wireless connection elements with the mobile equipment 3, for example a Bluetooth-type interface, for example to detect and verify the presence of this equipment in the vicinity; however, these means can be dispensed with if they introduce an additional vulnerability.
  • the lock 5 is preferably electrically autonomous and powered with batteries or battery; it remains mechanically locked when the batteries are discharged. Charging or replacing the batteries can then be done without unlocking the lock.
  • the lock is electrically powered by the device in which it is mounted, for example a cash dispenser.
  • it is powered by means of a generator actuated by the user; the watch 54 uses in its own power source case to keep the time even when the rest of the system is no longer electrically powered.
  • a user 4 wishing to unlock the lock 5 is physically in front of this lock and introduced during step 100 a personal code on the keyboard 51, for example a numeric or alphanumeric code, for example a 6-digit code.
  • the calculation means in the lock verify the personal code introduced.
  • the personal code is compared with a list of accepted codes ("white list") stored in the lock.
  • white list a list of accepted codes
  • the lock is satisfied to check during step 101 if the personal code introduced is plausible, for example if the format of the code is admissible, if a possible parity code is correct, or if the entered personal code does not belong to a list of rejected codes ("black list”) because nonexistent or belonging to refused users.
  • black list list of rejected codes
  • the lock detects during the step 101 that the entered personal code is invalid, it is rejected, and an error message can be displayed on the display 50 to inform the user and invite him to introduce a new one. code.
  • "brute force" attacks that is by successively testing a large number of different codes, it is possible, for example, to introduce a delay between each attempt and / or to limit the number of possible unsuccessful attempts to lock the lock for a longer period, or until an unlocking maneuver is introduced.
  • the user identifies with the lock by proving the possession of an object, for example a key, an electronic key, a smart card, etc.
  • the object presented may itself be protected by a code, especially in the case of a smart card.
  • this solution has the disadvantage of requiring an organization to distribute and manage the objects to present.
  • the user can also identify himself by means of biometric data acquired by means of a biometric sensor, for example by means of his fingerprints, the iris, the retina, the face, the voice, etc. .
  • biometric data however have the disadvantage of not being able to be replaced with the ease of a personal code that can be transmitted at the last moment to the user; a user record is also required to acquire his reference biometric data.
  • identification methods can further be combined. It is also possible to claim additional or different identification depending on the circumstances; for example, a biometric or key identification may be required when the personal code identification has not worked after a predetermined number of tests, or when the sum available in the protected volume exceeds a certain sum, or when other circumstances impose increased security.
  • Access rights may be time dependent; for example, it is possible to authorize an unlocking of the lock only during a limited time window corresponding to the time at which the user is expected. This time window can be coded, along with other information, in the control panel response described below.
  • the lock 5 can also check if a particular manipulation has been made during the introduction of the personal code by the user 4 to signal that he is under duress, for example because an attacker is forcing him to introduce the code.
  • the particular handling may involve for example the introduction of a different personal code, the pressure of a key or an additional member, a prolonged press on a key, or other identifiable manipulations unambiguously by the lock 5 but difficult to detect for an assailant observing the maneuver.
  • the detection of a particular manipulation leads to a different behavior of the lock, as will be seen below.
  • the lock 5 displays in step 102 a question on the display 50.
  • the question displayed may depend on the time, the date, the identified user, the lock , other parameters collected by the lock, and / or a possible manipulation detection to signal a constraint.
  • the choice of the question may depend on a random factor.
  • Each question is preferably displayed once and is not reused, or at least not for the same user.
  • the displayed question can be generated by a mathematical function, for example a pseudo-random function, and / or chosen in a table of predefined questions.
  • the pseudo-random function depends at least partially on the value of an incremented counter each time the trunk is opened and / or each unlocking attempt; the counter can never be decremented, and the maximum value that can be counted is sufficient to ensure that the counter does not loop back. It would also be possible to use the time counted by the lock clock to initialize the pseudo-random function; However, a clock must be able to be set on time, and thus be able to be delayed, which could be used to "go back in time” in order to force the lock to generate again a question whose answer is already known.
  • Successful IDs and unsuccessful ID attempts are preferably stored in a log file in the lock, along with the date and time of the event.
  • This file can be viewed by a technician, for example by introducing a particular code on the keyboard 51, by connecting a computer to a connector on the front face of the lock, and / or remotely from the central unit 1 through a communication network.
  • the user 4 reads the question displayed during the step 103, then introduces it during the step 104 on the keyboard of his mobile equipment 3.
  • the question displayed on the display 50 is unpredictable, and It is possible to distinguish the possible questions from the non-lawful questions, it is thus ensured that the user 4 is indeed close to the lock 5 to open.
  • the question introduced by the user is transmitted by the mobile equipment 3 to the central station, for example in the form of a short message, for example SMS, e-mail, data packets, DTMF code, or voice message spoken by the user.
  • a short message for example SMS, e-mail, data packets, DTMF code, or voice message spoken by the user.
  • a dedicated application for example a Java (registered trademark) applet, can be executed by the mobile equipment 3 to facilitate the introduction of the question and its transmission to the central station 1.
  • the question is simply introduced by the user. user and forwarded to a telephone number or to an e-mail address known to the user.
  • Access to mobile equipment 3, or to the mobile equipment application, may be protected by a password, a pin code, or require other identification or authentication measures.
  • user 4 may be protected by a password, a pin code, or require other identification or authentication measures.
  • the message transmitted to the central unit 1 during the step 105 may include other information, including for example an identification of the mobile equipment 3 used (for example a number of calling MSISDN), user identification data (including his personal code, but also for example a password, a PIN code, biometric data, extracted data of a smart card in the mobile equipment, etc.), position information provided by the geolocation module 30, information provided by the PTI module 31, etc.
  • the message can also be signed electronically by a smart card in the mobile equipment 3, to prove its authenticity and integrity, and / or encrypted to ensure its confidentiality.
  • the central unit 1 receives the message transmitted by the user and verifies it. Verification involves, for example, checking whether the transmitted question is a lawful question, depending on the user who uses it, the lock in front of which he is, the time, etc. If the user's personal code has been transmitted with the question, or if it is implicitly contained in the question, the central unit 1 can also ensure that this user is actually authorized to access this lock at this time, by example according to a road map previously established for a conveyor moving between several locks. Other checks may take into account the geographic location of the user, the data provided by the PTI device, any data provided directly by the lock, information checks signaling manipulation to indicate a constraint, and so on.
  • step 106 If the checks carried out in step 106 make it possible to determine that the question is a legitimate question transmitted at the right moment by an authorized user, the rights of this user are preferably determined.
  • an answer to this question is computed during step 107, using an algorithm unknown to the users and executed by the calculation means 11.
  • the response is preferably constituted by a numerical or alphanumerical sequence that does not allow a user to immediately determine if it contains implicit instructions for the lock.
  • the question is not valid, or if it was transmitted by an unauthorized user, or when the user does not have the necessary access rights, or when other anomalies have been detected, no answer is calculated.
  • an error message informing the user is then transmitted to the mobile equipment 3 and displayed by the latter, for example to allow the user to correct a typing error during the introduction of the question.
  • the central can provide a modified response resulting in modified behavior of the lock. The reaction of the plant and the response sent may also depend on the anomaly detected, the number of unsuccessful attempts, or other conditions.
  • control unit detects, for example from the question received, that the user has made a particular manipulation to indicate that it is under stress, it preferably calculates a response modified by the normal response, in order to cause a particular behavior. lock. Different modified responses can be chosen automatically or by human operators depending on the circumstances, in order to trigger different reactions.
  • Additional information may be coded in the response, for example to define the user's access rights to the lock, for example as a function of time.
  • the answer to the question is then transmitted to the mobile equipment in step 108, then displayed and read by the user in step 109.
  • the response may include, for example, a numeric or alphanumeric code and is introduced by the user 4 on the keypad 51 of the lock 5 during the step 110.
  • the calculation means in the lock 5 check whether the response received is correct.
  • this verification involves a comparison with a response calculated by the lock itself, by executing the same algorithm as that executed by the central unit 1.
  • the verification of the received response is performed without recalculating it independently, for example by checking the response received by means of a verification key to distinguish the possible answer (s) to the question of invalid answers, depending on the question and / or other parameters.
  • This variant has the advantage of not requiring copies of the algorithm in a multitude of locks scattered over a territory; it is also compatible with algorithms that can provide several valid answers to the same question.
  • the calculation means 5 furthermore verify in step 111 whether the response received takes into account a manipulation detection by a user under constraint, or whether other parameters are coded in this response.
  • the user indicates a state of constraint to the lock 5 during the introduction of the answer on the keyboard during the step 110, for example by introducing an additional digit, etc.
  • This solution is however less secure because a usurper could introduce the answer himself, without performing any additional manipulation.
  • the central is not informed of a manipulation.
  • a state of stress is directly detected by the lock 5 from sensors or additional data, data transmitted by the distributor to which the lock is associated, or data directly transmitted by the central unit 1.
  • the lock determines during step 111 that the answer entered is correct, and that it does not correspond to a state of stress, the lock is unlocked during step 112, until the next manual lock or for a limited time.
  • the user can thus access the protected volume, or a part of this volume.
  • This event is logged in the log file, indicating the time and duration of the unlock.
  • the counter used to initialize the pseudo-random function is irreversibly incremented.
  • step 111 If the lock determines during step 111 that the answer entered is incorrect, the lock remains locked, and an error message may be displayed on the display 50. After a predetermined number of unsuccessful attempts, an alarm can be triggered locally or sent to Central 1 or to another predetermined address. In a variant, the tickets in the dispenser are automatically destroyed or marked with an indelible ink.
  • a receipt code is preferably displayed during an additional step not shown on the display 50.
  • the user enters this code of a receipt on his mobile equipment and transmits it to the central 1, in the same way as the question before, in order to indicate to the central the end of his mission.
  • the required release code is preferably unique and unpredictable in advance, so as to ensure that the user has read it correctly as a result of the manipulation and has not deduced otherwise.
  • the central office is however able to check whether the transmitted acknowledgment code is lawful.
  • the release code generated by the lock or reintroduced by the user may contain indications indicating to the central particular events, for example to indicate whether the lock was opened, a new state of constraint, or any other event .
  • the transmitted acknowledgment code can be signed, encrypted and accompanied by data such as date, time, user identification, mobile equipment, position information geographical, etc.
  • the control unit can thus verify this data, or detect the absence of sending of a receipt message after a predetermined delay, to decide on an appropriate action, including the triggering of an alarm, the triggering of an intervention, and / or the locking of other locks nearby or on the intended course of the user even in case of correct operation.
  • the receipt code generated is preferably, in the same way as the question or the answer, depending on the current user, the lock in progress and / or other parameters such as date, time, detection of possible manipulations.
  • the lock 5 may itself allow or refuse the unlocking as a function of parameters acquired directly or through the protected device, for example by means of sensors, cameras or microphones associated with the device. lock or device, obtained by analyzing the user's manipulations on the keyboard 5, or according to an internal history of the manipulations of this user and / or the lock 5.
  • the lock described above may be used to secure volumes other than ticket dispensers, for example weapon cabinets used in police stations or by the military, safes, or other volumes whose locking or unlocking by a local user must be authorized by a remote control panel.
  • the lock of the invention can be programmed at any time, for example from the control panel and / or with the aid of a particular code introduced by a user nearby, to operate in a mode other than the interactive mode described above. For example, it would be possible to reprogram this lock to allow unlocking by some users, or even by all users, without establishing a connection with the central.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
EP05109900.0A 2005-10-24 2005-10-24 Verfahren zur Steuerung der Verriegelung von Verschlüssen und Verschluss Active EP1780680B1 (de)

Priority Applications (9)

Application Number Priority Date Filing Date Title
ES05109900.0T ES2664947T3 (es) 2005-10-24 2005-10-24 Procedimiento de control de bloqueo de cerradura, y cerradura
EP05109900.0A EP1780680B1 (de) 2005-10-24 2005-10-24 Verfahren zur Steuerung der Verriegelung von Verschlüssen und Verschluss
PCT/EP2006/067589 WO2007048749A1 (fr) 2005-10-24 2006-10-19 Procede de controle de verouillage de serrure, et serrure
CN2006800397857A CN101297327B (zh) 2005-10-24 2006-10-19 控制锁的锁定的方法以及锁
ZA200803528A ZA200803528B (en) 2005-10-24 2006-10-19 Method for controlling the locking of a lock, and lock
MYPI20081235A MY149673A (en) 2005-10-24 2006-10-19 Method for controlling the locking of a lock, and lock
AU2006307977A AU2006307977B2 (en) 2005-10-24 2006-10-19 Method for controlling the locking of a lock, and lock
US12/104,967 US20090320538A1 (en) 2005-10-24 2008-04-17 Method for controlling the locking of a lock, and lock
HK09103516A HK1125727A1 (en) 2005-10-24 2009-04-16 Method for controlling a lock locking state and a lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP05109900.0A EP1780680B1 (de) 2005-10-24 2005-10-24 Verfahren zur Steuerung der Verriegelung von Verschlüssen und Verschluss

Publications (2)

Publication Number Publication Date
EP1780680A1 true EP1780680A1 (de) 2007-05-02
EP1780680B1 EP1780680B1 (de) 2018-01-17

Family

ID=35840136

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05109900.0A Active EP1780680B1 (de) 2005-10-24 2005-10-24 Verfahren zur Steuerung der Verriegelung von Verschlüssen und Verschluss

Country Status (9)

Country Link
US (1) US20090320538A1 (de)
EP (1) EP1780680B1 (de)
CN (1) CN101297327B (de)
AU (1) AU2006307977B2 (de)
ES (1) ES2664947T3 (de)
HK (1) HK1125727A1 (de)
MY (1) MY149673A (de)
WO (1) WO2007048749A1 (de)
ZA (1) ZA200803528B (de)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010097178A1 (de) * 2009-02-25 2010-09-02 Rittal Gmbh & Co. Kg Zugangssteuerungseinrichtung
WO2010134053A1 (en) * 2009-05-21 2010-11-25 Hakan Gurel An authentication system
CN106056713A (zh) * 2016-06-08 2016-10-26 珠海明居智能科技有限公司 一种密码锁的远程授权方法

Families Citing this family (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5012247B2 (ja) * 2007-06-21 2012-08-29 ソニー株式会社 認証装置、入場管理装置、入退場管理装置、入場管理システム、入退場管理システム、認証処理方法およびプログラム
US8665062B2 (en) * 2008-06-30 2014-03-04 Telecom Italia S.P.A. Method and system for communicating access authorization requests based on user personal identification as well as method and system for determining access authorizations
US9058474B2 (en) * 2008-12-11 2015-06-16 Northrop Grumman Systems Corporation Biometric device, system, and method for individual access control
US8542119B2 (en) * 2009-01-13 2013-09-24 Invue Security Products Inc. Combination non-programmable and programmable key for security device
US8797138B2 (en) * 2009-01-13 2014-08-05 Utc Fire & Security Americas Corporation, Inc. One-time access for electronic locking devices
US20110050419A1 (en) * 2009-08-26 2011-03-03 Kwanyuen Ng Remote Intrusion Signaling Security System
CN101866409B (zh) * 2010-05-11 2015-04-01 中兴通讯股份有限公司 一种手持设备锁定、解锁方法和装置
US20110298584A1 (en) * 2010-06-04 2011-12-08 Kent Biggs Securing a cash safe with a circuit
EP2405650A1 (de) * 2010-07-09 2012-01-11 Nagravision S.A. Verfahren für die sichere Übermittlung von Nachrichten
KR20120058199A (ko) * 2010-11-29 2012-06-07 한국전자통신연구원 위치정보를 이용한 사용자 인증방법
US8840020B2 (en) * 2010-12-01 2014-09-23 Lumidigm, Inc. Biometric terminals
WO2012128698A1 (en) * 2011-03-24 2012-09-27 Recludo Ab Standalone biometric authorization control device and method
US8856893B2 (en) 2011-06-09 2014-10-07 Hao Min System and method for an ATM electronic lock system
CN102360477A (zh) * 2011-06-09 2012-02-22 闵浩 基于指纹识别技术和移动通信技术的指纹密码锁控制管理系统和方法
CN102324152A (zh) * 2011-06-09 2012-01-18 闵浩 基于身份识别技术和移动通信技术的电子锁控制管理系统和方法
WO2013034671A1 (en) * 2011-09-09 2013-03-14 Param Technologies Corporation, S.L. Apparatus and method for controlling the access of a visitor to a premises
CN103021045A (zh) * 2011-09-25 2013-04-03 边高伟 移动终端用户验证智能门禁系统
US20130090939A1 (en) * 2011-10-11 2013-04-11 Robert N. Robinson Sytem and method for preventing healthcare fraud
US20130090942A1 (en) * 2011-10-11 2013-04-11 Safe-Link, Llc Sytem and method for preventing healthcare fraud
CN102346945A (zh) * 2011-10-28 2012-02-08 闵浩 基于双向加密认证技术和通信技术的电子锁控制管理系统和方法
CN102493722B (zh) * 2011-12-05 2014-04-09 西安大唐电信有限公司 一种车辆运输电子锁应用系统及加解锁方法
CN104282068A (zh) * 2012-03-15 2015-01-14 江苏省电力公司常州供电公司 变电所防误锁具的许可装置
MX342113B (es) 2012-08-16 2016-09-14 Schlage Lock Co Llc Sistema y método inalámbrico de cerradura electrónica.
CN102855427B (zh) * 2012-08-31 2016-03-02 小米科技有限责任公司 一种设备解锁方法、装置及用户设备
CN103941971A (zh) * 2013-01-17 2014-07-23 深圳富泰宏精密工业有限公司 屏幕解锁方法及系统
US20140279511A1 (en) * 2013-03-14 2014-09-18 Moneygram International, Inc. Systems and Methods for Management of Local Devices
AU2014237417B2 (en) 2013-03-15 2016-05-12 Assa Abloy Americas Residential Inc. Wireless lockset with integrated antenna, touch activation and light communication device
EP2976753A2 (de) * 2013-03-18 2016-01-27 SES Solutions GmbH VERFAHREN ZUR ÜBERSTELLUNG VON TRANSPORTGUT IN EINEM ABSCHLIEßBAREN TRANSPORTBEHÄLTER, ABSCHLIEßBARER TRANSPORTBEHÄLTER UND TRANSPORTSYSTEM
CN103761966A (zh) * 2013-12-25 2014-04-30 苏州市邦成电子科技有限公司 一种语音开锁系统
US9600949B2 (en) 2014-07-30 2017-03-21 Master Lock Company Llc Wireless key management for authentication
US9996999B2 (en) 2014-07-30 2018-06-12 Master Lock Company Llc Location tracking for locking device
US9894066B2 (en) 2014-07-30 2018-02-13 Master Lock Company Llc Wireless firmware updates
US9489787B1 (en) 2014-08-08 2016-11-08 Live Nation Entertainment, Inc. Short-range device communications for secured resource access
US10008057B2 (en) 2014-08-08 2018-06-26 Live Nation Entertainment, Inc. Short-range device communications for secured resource access
KR102422372B1 (ko) * 2014-08-29 2022-07-19 삼성전자 주식회사 생체 정보와 상황 정보를 이용한 인증 방법 및 장치
US20160116510A1 (en) 2014-10-27 2016-04-28 Master Lock Company Predictive battery warnings for an electronic locking device
CN104916022A (zh) * 2015-06-16 2015-09-16 广州杰赛科技股份有限公司 一种智能锁控制方法、移动终端及智能锁系统
US9852562B2 (en) * 2015-07-06 2017-12-26 Acsys Ip Holding, Inc. Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons
CN105069874B (zh) * 2015-07-28 2018-08-03 北京航空航天大学 一种移动互联网声纹门禁系统及其实现方法
CN105225317A (zh) * 2015-10-03 2016-01-06 上海大学 一种多路集中管理的网络门禁控制系统
CN105577805A (zh) * 2015-12-29 2016-05-11 宁波艾谱实业有限公司 保险箱的远程控制方法及实现该方法的控制系统
US9984524B2 (en) * 2016-01-26 2018-05-29 Acsys Ip Holding Inc Systems and methods for remote access rights and verification
CA3017635A1 (en) 2016-03-22 2017-09-28 Spectrum Brands, Inc. Garage door opener with touch sensor authentication
WO2017199180A2 (en) * 2016-05-17 2017-11-23 Peter Just Access system and container for communal objects
CN106023373A (zh) * 2016-05-23 2016-10-12 三峡大学 一种基于大数据与人脸识别的校园宿舍门禁系统
CN105939193A (zh) * 2016-06-22 2016-09-14 武汉市天晨翔云数据有限公司 控制智能锁的黑名单设置授权及加密方法
AR109978A1 (es) 2016-10-19 2019-02-13 Best Access Solutions Inc Núcleo de cerradura electromecánica
CN106773757A (zh) * 2016-12-13 2017-05-31 广东美的制冷设备有限公司 智能装置及家电设备
EP3361457B1 (de) * 2017-02-13 2023-07-12 Diebold Nixdorf Systems GmbH Eingabeeinrichtung, geldautomat und verfahren
JP2018180624A (ja) * 2017-04-04 2018-11-15 グローリー株式会社 貨幣処理機、貨幣処理システムおよび貨幣処理方法
ES2927419T3 (es) 2017-09-08 2022-11-07 Dormakaba Usa Inc Bombín de cerradura electromecánico
CN108182739A (zh) * 2017-12-21 2018-06-19 广东汇泰龙科技有限公司 一种基于虹膜识别和蓝牙功能的云锁解锁方法、系统
US11450158B2 (en) 2018-01-05 2022-09-20 Spectrum Brands, Inc. Touch isolated electronic lock
BR112020020946A2 (pt) 2018-04-13 2021-03-02 Dormakaba Usa Inc. núcleo de fechadura eletromecânico
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
CN109190366B (zh) * 2018-09-14 2021-11-19 郑州云海信息技术有限公司 一种程序处理方法以及相关装置
US11639617B1 (en) 2019-04-03 2023-05-02 The Chamberlain Group Llc Access control system and method
US20200372743A1 (en) * 2019-05-20 2020-11-26 Popid, Inc. Face based door entry
GB2590357B (en) * 2019-11-28 2022-12-21 Paxton Access Ltd Access control system and method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0546701A2 (de) 1991-12-09 1993-06-16 Brink's Incorporated Vorrichtung und Verfahren zum kontrollierten Zugang zu gesicherten Orten
US5259029A (en) * 1990-05-16 1993-11-02 Duncan Jr F Jeff Decoding device for computer software protection
US5367572A (en) * 1984-11-30 1994-11-22 Weiss Kenneth P Method and apparatus for personal identification
EP0935041A1 (de) * 1998-02-09 1999-08-11 Christian Martineau Vorrichtung und Verfahren zur physischen oder logischen Zugangskontrolle
WO2001003078A1 (en) * 1999-07-05 2001-01-11 Hoeili Jens Petter Method and system for payment transaction
WO2001059725A1 (de) * 2000-02-08 2001-08-16 Siemens Aktiengesellschaft Verfahren zur nutzeridentitätskontrolle
EP1281588A2 (de) * 2001-08-01 2003-02-05 Siemens Aktiengesellschaft Verfahren zum Übertragen eines Öffnungscodes, Verfahren zum Übertragen eines Verschlusscodes und zugehörige Einheiten
US20030231103A1 (en) * 2002-06-14 2003-12-18 Fisher Scott R. Electronic lock system and method for its use with card only mode

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8813730D0 (en) * 1988-06-10 1988-07-13 Omni Services Ltd Time defence system
US5774058A (en) * 1995-07-20 1998-06-30 Vindicator Corporation Remote access system for a programmable electronic lock

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5367572A (en) * 1984-11-30 1994-11-22 Weiss Kenneth P Method and apparatus for personal identification
US5259029A (en) * 1990-05-16 1993-11-02 Duncan Jr F Jeff Decoding device for computer software protection
EP0546701A2 (de) 1991-12-09 1993-06-16 Brink's Incorporated Vorrichtung und Verfahren zum kontrollierten Zugang zu gesicherten Orten
EP0935041A1 (de) * 1998-02-09 1999-08-11 Christian Martineau Vorrichtung und Verfahren zur physischen oder logischen Zugangskontrolle
WO2001003078A1 (en) * 1999-07-05 2001-01-11 Hoeili Jens Petter Method and system for payment transaction
WO2001059725A1 (de) * 2000-02-08 2001-08-16 Siemens Aktiengesellschaft Verfahren zur nutzeridentitätskontrolle
EP1281588A2 (de) * 2001-08-01 2003-02-05 Siemens Aktiengesellschaft Verfahren zum Übertragen eines Öffnungscodes, Verfahren zum Übertragen eines Verschlusscodes und zugehörige Einheiten
US20030231103A1 (en) * 2002-06-14 2003-12-18 Fisher Scott R. Electronic lock system and method for its use with card only mode

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010097178A1 (de) * 2009-02-25 2010-09-02 Rittal Gmbh & Co. Kg Zugangssteuerungseinrichtung
RU2519461C2 (ru) * 2009-02-25 2014-06-10 Ритталь Гмбх Унд Ко.Кг Устройство управления доступом
US8779891B2 (en) 2009-02-25 2014-07-15 Rittal Gmbh & Co. Kg Access control device
WO2010134053A1 (en) * 2009-05-21 2010-11-25 Hakan Gurel An authentication system
CN106056713A (zh) * 2016-06-08 2016-10-26 珠海明居智能科技有限公司 一种密码锁的远程授权方法
CN106056713B (zh) * 2016-06-08 2019-02-15 珠海明居智能科技有限公司 一种密码锁的远程授权方法

Also Published As

Publication number Publication date
EP1780680B1 (de) 2018-01-17
CN101297327A (zh) 2008-10-29
MY149673A (en) 2013-09-30
CN101297327B (zh) 2013-04-03
AU2006307977B2 (en) 2012-03-01
ZA200803528B (en) 2009-08-26
ES2664947T3 (es) 2018-04-24
WO2007048749A1 (fr) 2007-05-03
AU2006307977A1 (en) 2007-05-03
HK1125727A1 (en) 2009-08-14
US20090320538A1 (en) 2009-12-31

Similar Documents

Publication Publication Date Title
EP1780680B1 (de) Verfahren zur Steuerung der Verriegelung von Verschlüssen und Verschluss
ES2255111T3 (es) Metodo y sistema para garantizar la seguridad de centros de gestion de llamadas telefonicas.
EP3420172B1 (de) Sicheres gehäuse mit vorgegebenem inhalt und dynamischer verwaltung
KR101117314B1 (ko) 휴대용 원격통신 장치
EP0950303B1 (de) Verfahren und einrichtung zur sicherung der ferndienstleistungen der finanzinstitute
EP2720199B1 (de) Gesichertes Steuerungsverfahren zum Öffnen von Verschlussvorrichtungen mit Hilfe von Meldungen, die eine symmetrische Verschlüsselung auslösen
EP1549011A1 (de) Kommunikationsverfahren und System zwischen einem Endgerät und mindestens einer Kommunikationsvorrichtung
FR2926938A1 (fr) Procede d'authentification et de signature d'un utilisateur aupres d'un service applicatif, utilisant un telephone mobile comme second facteur en complement et independamment d'un premier facteur
CN102084369A (zh) 用于监视对设备的未授权使用的系统
WO2013079848A1 (fr) Protocole d'authentification mutuelle d' entitees ayant prealablement initie une transaction en ligne
JP4104171B2 (ja) 遠隔通信オペレータによって提供されるサービスのセキュリティシステムおよび方法
EP3022867A1 (de) Strenges authentifizierungsverfahren
CN111143889B (zh) 基于区块链的兴奋剂检测信息管理方法、装置、设备
EP2987124B1 (de) Verfahren und system zur verbesserung der sicherheit elektronischer transaktionen
EP1813052B1 (de) Verfahren zur Sicherung entfernt durchgeführter Transaktionen in einem offenen Kommunikationsnetzwerk
FR2944400A1 (fr) Procede d'authentification aupres d'un serveur par un utilisateur d'un appareil mobile
EP3262553B1 (de) Verfahren zur transaktion ohne körperliche unterstützung eines sicherheitsidentifikators und ohne token, abgesichert durch strukturelle entkopplung der persönlichen und dienstidentifikatoren
FR3002670A1 (fr) Procede et systeme de traitement cryptographique utilisant une donnee sensible
US20130339224A1 (en) Money transaction system and a method thereto
WO2007113669A1 (fr) Securisation de transactions electroniques sur un reseau ouvert
EP0935041A1 (de) Vorrichtung und Verfahren zur physischen oder logischen Zugangskontrolle
FR2788154A1 (fr) Supports et systemes d'echange de donnees securises notamment pour paiements et telepaiements
FR3081663A1 (fr) Procede de gestion a distance de l'ouverture d'une serrure electronique dotee d'une interface utilisateur, terminal, serrure et programme d'ordinateur associes
FR3038414A1 (fr) Procede et systeme de controle d'acces a un service via un media mobile.
WO2012022856A1 (fr) Procédé d'authentification d' un utilisateur du réseau internet

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK YU

17P Request for examination filed

Effective date: 20071009

AKX Designation fees paid

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

17Q First examination report despatched

Effective date: 20120604

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20170503

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAJ Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR1

GRAL Information related to payment of fee for publishing/printing deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR3

INTC Intention to grant announced (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: DORMAKABA SCHWEIZ AG

GRAR Information related to intention to grant a patent recorded

Free format text: ORIGINAL CODE: EPIDOSNIGR71

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

INTG Intention to grant announced

Effective date: 20171207

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: FRENCH

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602005053387

Country of ref document: DE

Ref country code: AT

Ref legal event code: REF

Ref document number: 964898

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180215

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: P&TS SA, CH

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2664947

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20180424

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 964898

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180117

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180417

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180517

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602005053387

Country of ref document: DE

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 14

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

26N No opposition filed

Effective date: 20181018

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181024

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181024

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20051024

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20221019

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: TR

Payment date: 20221020

Year of fee payment: 18

Ref country code: FI

Payment date: 20221020

Year of fee payment: 18

Ref country code: DE

Payment date: 20221019

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20221026

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20231020

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: ES

Payment date: 20231222

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20231026

Year of fee payment: 19

Ref country code: FR

Payment date: 20231023

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 20231019

Year of fee payment: 19

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602005053387

Country of ref document: DE

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: NL

Ref legal event code: MM

Effective date: 20231101

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20231101

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20231031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20231101

Ref country code: FI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20231024

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20240501

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20231031