EP1780680A1 - Procedure for control of interlock and lock - Google Patents

Procedure for control of interlock and lock Download PDF

Info

Publication number
EP1780680A1
EP1780680A1 EP20050109900 EP05109900A EP1780680A1 EP 1780680 A1 EP1780680 A1 EP 1780680A1 EP 20050109900 EP20050109900 EP 20050109900 EP 05109900 A EP05109900 A EP 05109900A EP 1780680 A1 EP1780680 A1 EP 1780680A1
Authority
EP
European Patent Office
Prior art keywords
lock
user
question
response
central
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP20050109900
Other languages
German (de)
French (fr)
Other versions
EP1780680B1 (en
Inventor
Pierre Pellaton
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dormakaba Schweiz AG
Original Assignee
Kaba AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to EP05109900.0A priority Critical patent/EP1780680B1/en
Application filed by Kaba AG filed Critical Kaba AG
Priority to ES05109900.0T priority patent/ES2664947T3/en
Priority to PCT/EP2006/067589 priority patent/WO2007048749A1/en
Priority to CN2006800397857A priority patent/CN101297327B/en
Priority to AU2006307977A priority patent/AU2006307977B2/en
Priority to ZA200803528A priority patent/ZA200803528B/en
Priority to MYPI20081235A priority patent/MY149673A/en
Publication of EP1780680A1 publication Critical patent/EP1780680A1/en
Priority to US12/104,967 priority patent/US20090320538A1/en
Priority to HK09103516A priority patent/HK1125727A1/en
Application granted granted Critical
Publication of EP1780680B1 publication Critical patent/EP1780680B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
    • G07C9/00674Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
    • G07C9/00698Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons actuated in function of displayed informations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00388Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T70/00Locks
    • Y10T70/70Operating mechanism
    • Y10T70/7051Using a powered device [e.g., motor]
    • Y10T70/7062Electrical type [e.g., solenoid]
    • Y10T70/7068Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]

Definitions

  • the present invention relates to an electronic lock lock control method.
  • the present invention also relates to an electronic lock useful for the implementation of this method.
  • the present invention relates in particular to a lock providing the required level of security for ATMs (Automatic Teller Machines) or safes.
  • the front access is secured by a card reader and a keypad allowing different users to identify themselves before taking a limited number of tickets.
  • Access to the rear face of the dispenser is generally closed by means of a conventional key lock.
  • the bank employees, the bottom conveyors responsible for filling the distributor and the technical repairers all share copies of the same key that allows access to vaults frequently containing tens of thousands of Euros in cash or in a container .
  • the risk is important that one of these keys is lost or stolen and falls into the wrong hands.
  • a user who has fraudulently acquired a key may attempt to call the central office by impersonating the authorized key holder in order to obtain a valid OTC code.
  • the security offered is therefore insufficient.
  • the electronic key reader comprises electrical, electronic and / or electromechanical elements that offer possibilities for manipulation and additional fraud.
  • the patent application EP0546701 discloses a lock unlocking verification method in which security is provided by means of different PIN codes and encoded messages that the user must enter into a terminal belonging to him. This terminal is then connected to the protected box to cause its unlocking.
  • the terminal that is usually in the hands of the user is a target for hackers attempting to study it or to build a compatible terminal to access unauthorized vaults.
  • An object of the present invention is therefore to provide a method and a lock which make it possible to avoid the disadvantages of the methods and locks of the prior art.
  • This method has the advantage of forcing the user to transmit a question posed by the lock of the dispenser to the central. This additional operation makes it possible to provide additional tests, for example to check in the central if the question asked is indeed valid.
  • This method also has the advantage of basing the identification of the user not necessarily on a physical key, but for example by means of password, PIN, or biometric data, more difficult to steal.
  • this method has the advantage of making it possible to distribute, replace or invalidate very easily passwords, to distance by simple software manipulations from a central.
  • the secret code used to identify the user is verified by the central unit 1, and not by the lock. This avoids the transmission of authorized user lists to different locks.
  • This method also has the advantage that all the data and all the codes necessary to unlock the lock can be introduced directly into the lock, without passing through an intermediate device offering an additional vulnerability to the attacks.
  • This lock is adapted to the method above; it also has the advantage of not necessarily requiring a key reader, vulnerable and expensive.
  • This method can be implemented entirely automatically by a computer programmed for these different tasks, or in a manner assisted by a human operator, or a group of human operators, using a computer.
  • FIG. 1 illustrates in the form of a block diagram a system comprising a central unit 1 to which different users 4 can connect using a mobile device 3 through a network 2.
  • the system also comprises one or more locks 5 to protect devices not shown, for example cash dispensers, chests, rooms or other protected volumes.
  • the central unit 1 may be constituted for example by a call center, animated by several human operators, or a server or server group executing a specific application.
  • the network 2 is for example a telecommunications network, for example a conventional telephone network, an Internet or Intranet type network, or preferably a mobile cellular network. Users can get connect to control panel 1 by establishing voice or data communication through the network 2.
  • the users connect to the central unit 1 via a mobile cellular network 2 and by sending data, for example SMS (Short Message System), e-mails or IP data packets through a network 2 of GSM, GPRS, HSCSD, EDGE or GPRS for example.
  • the central station preferably automatically receives data via a modem or a suitable router, and can also respond to the user by sending his own data through the same channel, or a different channel.
  • the data exchanged in one of the directions, or in both directions, can be electronically signed and / or encrypted by the central unit 1 and / or by the mobile equipment 3, for example by using a smart card in the mobile equipment 3 .
  • the users 4 connect to the central unit 1 by means of a voice communication.
  • the central unit 1 uses human operators to react to this voice call, and / or an IVR (Interactive Voice Response) voice recognition system to analyze the content of the user's requests and / or DTMF codes and to synthesize a voice response.
  • IVR Interactive Voice Response
  • the central unit 1 furthermore comprises a database of authorized users, which contains for each user at least one personal code - or personal code verification data - as well as authorizations, for example a list of locks that the user user is allowed to open.
  • the record comprising each user may further indicate time windows during which access to one or more locks is authorized, a user profile, including for example its name, its coordinates, cryptographic keys for communication with each user, a history of system usage (number of successful trials, unsuccessful trials, dates, times, etc.), and other identification or authentication data, including for example a MSISDN caller number corresponding to its mobile equipment 3, biometric data, etc.
  • Calculation means 11 in the central unit 1 make it possible to execute an application program for managing the various users and their rights in the data bank 10.
  • the calculation means also make it possible to execute an algorithm making it possible to calculate the response to a number of requests.
  • question (“challenge") received from a user.
  • This algorithm can for example consult a read-only correspondence table that indicates the answer to each expected question, or preferably calculate a mathematical function from each question.
  • the function performed is preferably chosen so that knowledge of any number of answers to previous questions does not predict what will be the answer to the next question (pseudo-random function).
  • the chosen algorithm, or the values allowing to parameterize it are preferably kept confidential.
  • a different algorithm, or different values are preferably used for each lock 5, and / or even for each user 4.
  • the central unit 1 may further comprise a lock database (not shown), comprising for each lock 5 a profile with information such as the geographical location, the type of protected device, cryptographic communication keys, etc.
  • the mobile equipment 3 depends on the type of network used.
  • this equipment is constituted by cellular mobile equipment, for example a cellular telephone or a personal assistant, a smartphone or a personal computer equipped with a connection card to a cellular network, a modem or a personal computer. a router. It is also possible to use a dedicated communication device for this purpose.
  • the mobile equipment 3 may comprise geolocation means 30, for example a satellite receiver of the GPS type to determine its position and possibly transmit it to the central 1.
  • Insulated worker protection equipment (ITP) 31 makes it possible to check whether the user 4 of the mobile equipment 3 is awake, for example by checking whether move, if it is vertical, if it reacts to requests for answers, etc.
  • the mobile equipment 3 may further comprise additional identification and / or authentication means 32, for example a smart card (SIM card for example), PIN code input and verification means, a sensor biometric, etc.
  • the identification and / or user authentication 4 can be performed locally, that is to say in the mobile equipment or in a smart card inserted in the equipment, or remotely, that is, ie for example in the central 1 which then has means of verification of the data of the smart card, PIN codes and / or biometric data entered.
  • the mobile equipment 3 can be for example portable or installed in a vehicle.
  • a conventional mobile telephone as mobile equipment in the context of the invention; it is only necessary for the user to be able to connect by means of this equipment with a central unit 1 to send a question and receive a corresponding answer. It is even advantageous, to increase security, to establish communications between the different users and the central by different types of channels.
  • the plant may for example use this additional information and agree with a conveyor, for example, that the question should be transmitted orally, even if the conveyor has equipment for data communication.
  • the user 4 is for example a bank employee, a bottom conveyor, a technical repairer, or any natural person authorized by the central 1 to open the lock 5.
  • the user 4 has the knowledge of a code secret personnel that has been transmitted to it by the central 1 and with which it can identify itself to one or more locks 5 of a park locks managed by the central 1.
  • the user 4 is also preferably able to s' identify towards his mobile equipment 3 by means another secret code, for example the PIN code of the phone and / or the SIM card.
  • identifying the user 4 to the lock 5 and / or to the mobile equipment 3 are conceivable within the scope of the invention; for example, the user could prove his identity by presenting a personal object, such as a key or a smart card, or by biometric identification using fingerprints, iris, retina, voice, face, etc.
  • a personal object such as a key or a smart card
  • biometric identification using fingerprints, iris, retina, voice, face, etc.
  • different methods can be implemented to identify or authenticate the user 4 towards the mobile equipment 3 and the lock 5. It is also possible to accumulate several identification methods.
  • the identification data entered in the mobile equipment 3 can be transmitted to the central 1 for verification.
  • the lock 5 comprises an electromechanical element 52, for example a bolt, whose position is controlled by a logic device inside the lock 5 to act on a mechanical mechanism ("linkage") to lock or unlike to unlock access to the protected volume, for example inside a distributor.
  • the lock is preferably intended to be used in combination with a device containing a volume to be protected, for example with a cash dispenser or a safe; it does not itself constitute such a safe, and has no protected volume, but has means not shown to associate it mechanically and / or electrically, so hardly removable with such a chest or such a dispenser.
  • a numeric or alphanumeric keyboard 51 associated with the lock 5 allows the user to enter his personal code and the answer to the questions asked.
  • Other data input elements for example a biometric sensor, a camera, a microphone, etc., may optionally be provided in the lock 5.
  • the lock further comprises a screen 50 for displaying messages in text or matrix mode, including questions, invitations to reply, and status messages.
  • the lock preferably further comprises one or more optional interfaces 53 which enable it to exchange data with the device it is to protect, for example a cash dispenser, and / or with the central unit 1 through any network, for example a telephone network or the Internet.
  • the communication of data with the device to be protected in which the lock is mounted notably makes it possible to improve the security, thanks to the exchange of information making it possible to detect probable frauds using combinations of indices and thanks to the generation of log files taking into account data collected by both the lock and the protected device.
  • This communication can also, if necessary, be used to control the lock 5 by means of the keypad of the dispenser, to display messages depending on the behavior of the lock 5 on the distributor screen, to echo alarms triggered by the lock by the distributor, or to trigger other actions performed by the distributor.
  • the bidirectional communication preferably between the lock 5 and the central unit 10 makes it possible, for example, to remotely modify the list of authorized users to identify with each lock 5 (unless this check is made by the central), to modify the remote response verification algorithms, to consult the log files generated by the lock, and to remotely detect other events related to the use of the lock.
  • This communication with the central unit 1 can also be carried out through the device protected by the lock, for example by using a modem or a router of this device.
  • the data exchanged by the lock and the central unit 1 are electronically signed and encrypted, for example through a Virtual Private Network (VPN), so as to preserve their confidentiality and their very authenticity. to the distributor to be protected.
  • VPN Virtual Private Network
  • the lock 5 furthermore preferably comprises an electronic watch 54 which enables it to determine the date and time autonomously, and to calculate time intervals.
  • Calculation means not shown, for example a microcontroller, a microprocessor with a memory, an industrial microcomputer, an asic type circuit and / or a FPGA circuit, etc., to manage the dialogs with the user, and to control the electromechanical device causing the locking or unlocking of the lock.
  • the calculation means preferably furthermore comprise a module, for example a software module, for generating and displaying a question in response to the introduction of an accepted personal identification code, and a module, for example a software module, for checking if an answer to the question is correct, and to cause the unlocking of the lock in case of correct answer
  • the calculation means are preferably protected against physical or software manipulations and may, for example, self-destruct, while keeping the lock closed, during fraudulent manipulations.
  • the lock 5 may further comprise wireless connection elements with the mobile equipment 3, for example a Bluetooth-type interface, for example to detect and verify the presence of this equipment in the vicinity; however, these means can be dispensed with if they introduce an additional vulnerability.
  • the lock 5 is preferably electrically autonomous and powered with batteries or battery; it remains mechanically locked when the batteries are discharged. Charging or replacing the batteries can then be done without unlocking the lock.
  • the lock is electrically powered by the device in which it is mounted, for example a cash dispenser.
  • it is powered by means of a generator actuated by the user; the watch 54 uses in its own power source case to keep the time even when the rest of the system is no longer electrically powered.
  • a user 4 wishing to unlock the lock 5 is physically in front of this lock and introduced during step 100 a personal code on the keyboard 51, for example a numeric or alphanumeric code, for example a 6-digit code.
  • the calculation means in the lock verify the personal code introduced.
  • the personal code is compared with a list of accepted codes ("white list") stored in the lock.
  • white list a list of accepted codes
  • the lock is satisfied to check during step 101 if the personal code introduced is plausible, for example if the format of the code is admissible, if a possible parity code is correct, or if the entered personal code does not belong to a list of rejected codes ("black list”) because nonexistent or belonging to refused users.
  • black list list of rejected codes
  • the lock detects during the step 101 that the entered personal code is invalid, it is rejected, and an error message can be displayed on the display 50 to inform the user and invite him to introduce a new one. code.
  • "brute force" attacks that is by successively testing a large number of different codes, it is possible, for example, to introduce a delay between each attempt and / or to limit the number of possible unsuccessful attempts to lock the lock for a longer period, or until an unlocking maneuver is introduced.
  • the user identifies with the lock by proving the possession of an object, for example a key, an electronic key, a smart card, etc.
  • the object presented may itself be protected by a code, especially in the case of a smart card.
  • this solution has the disadvantage of requiring an organization to distribute and manage the objects to present.
  • the user can also identify himself by means of biometric data acquired by means of a biometric sensor, for example by means of his fingerprints, the iris, the retina, the face, the voice, etc. .
  • biometric data however have the disadvantage of not being able to be replaced with the ease of a personal code that can be transmitted at the last moment to the user; a user record is also required to acquire his reference biometric data.
  • identification methods can further be combined. It is also possible to claim additional or different identification depending on the circumstances; for example, a biometric or key identification may be required when the personal code identification has not worked after a predetermined number of tests, or when the sum available in the protected volume exceeds a certain sum, or when other circumstances impose increased security.
  • Access rights may be time dependent; for example, it is possible to authorize an unlocking of the lock only during a limited time window corresponding to the time at which the user is expected. This time window can be coded, along with other information, in the control panel response described below.
  • the lock 5 can also check if a particular manipulation has been made during the introduction of the personal code by the user 4 to signal that he is under duress, for example because an attacker is forcing him to introduce the code.
  • the particular handling may involve for example the introduction of a different personal code, the pressure of a key or an additional member, a prolonged press on a key, or other identifiable manipulations unambiguously by the lock 5 but difficult to detect for an assailant observing the maneuver.
  • the detection of a particular manipulation leads to a different behavior of the lock, as will be seen below.
  • the lock 5 displays in step 102 a question on the display 50.
  • the question displayed may depend on the time, the date, the identified user, the lock , other parameters collected by the lock, and / or a possible manipulation detection to signal a constraint.
  • the choice of the question may depend on a random factor.
  • Each question is preferably displayed once and is not reused, or at least not for the same user.
  • the displayed question can be generated by a mathematical function, for example a pseudo-random function, and / or chosen in a table of predefined questions.
  • the pseudo-random function depends at least partially on the value of an incremented counter each time the trunk is opened and / or each unlocking attempt; the counter can never be decremented, and the maximum value that can be counted is sufficient to ensure that the counter does not loop back. It would also be possible to use the time counted by the lock clock to initialize the pseudo-random function; However, a clock must be able to be set on time, and thus be able to be delayed, which could be used to "go back in time” in order to force the lock to generate again a question whose answer is already known.
  • Successful IDs and unsuccessful ID attempts are preferably stored in a log file in the lock, along with the date and time of the event.
  • This file can be viewed by a technician, for example by introducing a particular code on the keyboard 51, by connecting a computer to a connector on the front face of the lock, and / or remotely from the central unit 1 through a communication network.
  • the user 4 reads the question displayed during the step 103, then introduces it during the step 104 on the keyboard of his mobile equipment 3.
  • the question displayed on the display 50 is unpredictable, and It is possible to distinguish the possible questions from the non-lawful questions, it is thus ensured that the user 4 is indeed close to the lock 5 to open.
  • the question introduced by the user is transmitted by the mobile equipment 3 to the central station, for example in the form of a short message, for example SMS, e-mail, data packets, DTMF code, or voice message spoken by the user.
  • a short message for example SMS, e-mail, data packets, DTMF code, or voice message spoken by the user.
  • a dedicated application for example a Java (registered trademark) applet, can be executed by the mobile equipment 3 to facilitate the introduction of the question and its transmission to the central station 1.
  • the question is simply introduced by the user. user and forwarded to a telephone number or to an e-mail address known to the user.
  • Access to mobile equipment 3, or to the mobile equipment application, may be protected by a password, a pin code, or require other identification or authentication measures.
  • user 4 may be protected by a password, a pin code, or require other identification or authentication measures.
  • the message transmitted to the central unit 1 during the step 105 may include other information, including for example an identification of the mobile equipment 3 used (for example a number of calling MSISDN), user identification data (including his personal code, but also for example a password, a PIN code, biometric data, extracted data of a smart card in the mobile equipment, etc.), position information provided by the geolocation module 30, information provided by the PTI module 31, etc.
  • the message can also be signed electronically by a smart card in the mobile equipment 3, to prove its authenticity and integrity, and / or encrypted to ensure its confidentiality.
  • the central unit 1 receives the message transmitted by the user and verifies it. Verification involves, for example, checking whether the transmitted question is a lawful question, depending on the user who uses it, the lock in front of which he is, the time, etc. If the user's personal code has been transmitted with the question, or if it is implicitly contained in the question, the central unit 1 can also ensure that this user is actually authorized to access this lock at this time, by example according to a road map previously established for a conveyor moving between several locks. Other checks may take into account the geographic location of the user, the data provided by the PTI device, any data provided directly by the lock, information checks signaling manipulation to indicate a constraint, and so on.
  • step 106 If the checks carried out in step 106 make it possible to determine that the question is a legitimate question transmitted at the right moment by an authorized user, the rights of this user are preferably determined.
  • an answer to this question is computed during step 107, using an algorithm unknown to the users and executed by the calculation means 11.
  • the response is preferably constituted by a numerical or alphanumerical sequence that does not allow a user to immediately determine if it contains implicit instructions for the lock.
  • the question is not valid, or if it was transmitted by an unauthorized user, or when the user does not have the necessary access rights, or when other anomalies have been detected, no answer is calculated.
  • an error message informing the user is then transmitted to the mobile equipment 3 and displayed by the latter, for example to allow the user to correct a typing error during the introduction of the question.
  • the central can provide a modified response resulting in modified behavior of the lock. The reaction of the plant and the response sent may also depend on the anomaly detected, the number of unsuccessful attempts, or other conditions.
  • control unit detects, for example from the question received, that the user has made a particular manipulation to indicate that it is under stress, it preferably calculates a response modified by the normal response, in order to cause a particular behavior. lock. Different modified responses can be chosen automatically or by human operators depending on the circumstances, in order to trigger different reactions.
  • Additional information may be coded in the response, for example to define the user's access rights to the lock, for example as a function of time.
  • the answer to the question is then transmitted to the mobile equipment in step 108, then displayed and read by the user in step 109.
  • the response may include, for example, a numeric or alphanumeric code and is introduced by the user 4 on the keypad 51 of the lock 5 during the step 110.
  • the calculation means in the lock 5 check whether the response received is correct.
  • this verification involves a comparison with a response calculated by the lock itself, by executing the same algorithm as that executed by the central unit 1.
  • the verification of the received response is performed without recalculating it independently, for example by checking the response received by means of a verification key to distinguish the possible answer (s) to the question of invalid answers, depending on the question and / or other parameters.
  • This variant has the advantage of not requiring copies of the algorithm in a multitude of locks scattered over a territory; it is also compatible with algorithms that can provide several valid answers to the same question.
  • the calculation means 5 furthermore verify in step 111 whether the response received takes into account a manipulation detection by a user under constraint, or whether other parameters are coded in this response.
  • the user indicates a state of constraint to the lock 5 during the introduction of the answer on the keyboard during the step 110, for example by introducing an additional digit, etc.
  • This solution is however less secure because a usurper could introduce the answer himself, without performing any additional manipulation.
  • the central is not informed of a manipulation.
  • a state of stress is directly detected by the lock 5 from sensors or additional data, data transmitted by the distributor to which the lock is associated, or data directly transmitted by the central unit 1.
  • the lock determines during step 111 that the answer entered is correct, and that it does not correspond to a state of stress, the lock is unlocked during step 112, until the next manual lock or for a limited time.
  • the user can thus access the protected volume, or a part of this volume.
  • This event is logged in the log file, indicating the time and duration of the unlock.
  • the counter used to initialize the pseudo-random function is irreversibly incremented.
  • step 111 If the lock determines during step 111 that the answer entered is incorrect, the lock remains locked, and an error message may be displayed on the display 50. After a predetermined number of unsuccessful attempts, an alarm can be triggered locally or sent to Central 1 or to another predetermined address. In a variant, the tickets in the dispenser are automatically destroyed or marked with an indelible ink.
  • a receipt code is preferably displayed during an additional step not shown on the display 50.
  • the user enters this code of a receipt on his mobile equipment and transmits it to the central 1, in the same way as the question before, in order to indicate to the central the end of his mission.
  • the required release code is preferably unique and unpredictable in advance, so as to ensure that the user has read it correctly as a result of the manipulation and has not deduced otherwise.
  • the central office is however able to check whether the transmitted acknowledgment code is lawful.
  • the release code generated by the lock or reintroduced by the user may contain indications indicating to the central particular events, for example to indicate whether the lock was opened, a new state of constraint, or any other event .
  • the transmitted acknowledgment code can be signed, encrypted and accompanied by data such as date, time, user identification, mobile equipment, position information geographical, etc.
  • the control unit can thus verify this data, or detect the absence of sending of a receipt message after a predetermined delay, to decide on an appropriate action, including the triggering of an alarm, the triggering of an intervention, and / or the locking of other locks nearby or on the intended course of the user even in case of correct operation.
  • the receipt code generated is preferably, in the same way as the question or the answer, depending on the current user, the lock in progress and / or other parameters such as date, time, detection of possible manipulations.
  • the lock 5 may itself allow or refuse the unlocking as a function of parameters acquired directly or through the protected device, for example by means of sensors, cameras or microphones associated with the device. lock or device, obtained by analyzing the user's manipulations on the keyboard 5, or according to an internal history of the manipulations of this user and / or the lock 5.
  • the lock described above may be used to secure volumes other than ticket dispensers, for example weapon cabinets used in police stations or by the military, safes, or other volumes whose locking or unlocking by a local user must be authorized by a remote control panel.
  • the lock of the invention can be programmed at any time, for example from the control panel and / or with the aid of a particular code introduced by a user nearby, to operate in a mode other than the interactive mode described above. For example, it would be possible to reprogram this lock to allow unlocking by some users, or even by all users, without establishing a connection with the central.

Abstract

The method involves identifying a user (4) close to an electronic lock (5), displaying a question by the lock, and transmitting, via e.g. e-mail, short message system (SMS) message, the question to an electronic locks managing central computer (1). The central computer computes the answer to the question and transmits the computed answer to the user who presents the answer in the lock. The lock verifies the answer and decides on unlocking of the lock based on the answer. A receipt code is displayed by the lock and transmitted to the central computer by the user. Independent claims are also included for the following: (1) an electronic lock (2) a method for an electronic locks managing central.

Description

Domaine techniqueTechnical area

La présente invention concerne un procédé de contrôle de verrouillage de serrure électronique. La présente invention concerne également une serrure électronique utile à la mise en oeuvre de ce procédé. La présente invention concerne en particulier une serrure offrant le niveau de sécurité requis pour des distributeurs d'argent (ATM, Automatic Teller Machines) ou des coffres-forts.The present invention relates to an electronic lock lock control method. The present invention also relates to an electronic lock useful for the implementation of this method. The present invention relates in particular to a lock providing the required level of security for ATMs (Automatic Teller Machines) or safes.

Etat de la techniqueState of the art

Les serrures conventionnelles sont verrouillées ou déverrouillées au moyen de clés mécaniques ou électroniques. La distribution des clés est restreinte aux utilisateurs autorisées à accéder au contenu protégé par la serrure. Le niveau de protection dépend de la facilité avec laquelle les clés peuvent être falsifiées et de la confiance accordée aux porteurs de la clé.Conventional locks are locked or unlocked by means of mechanical or electronic keys. Key distribution is restricted to users who are authorized to access lock-protected content. The level of protection depends on the ease with which the keys can be falsified and the trust given to the key holders.

Dans le cas de distributeurs de billets de banque, l'accès par la face avant est sécurisé au moyen d'un lecteur de carte et d'un clavier permettant à différents utilisateurs de s'identifier avant de prélever un nombre limité de billets. L'accès à la face arrière du distributeur est en revanche généralement fermé au moyen d'une serrure à clé conventionnelle. Les employés de banque, les convoyeurs de fond chargés de remplir le distributeur et les réparateurs techniques se partagent tous des copies de la même clé qui permet d'accéder à des coffres contenant fréquemment des dizaines de milliers d'Euros en cash ou dans un container. Le risque est important qu'une de ces clés soit perdue ou volée et qu'elle tombe dans de mauvaises mains. En outre, il est extrêmement difficile de retrouver le coupable en cas de vol par un employé indélicat lorsqu'une clé est distribuée à de nombreux utilisateurs.In the case of cash dispensers, the front access is secured by a card reader and a keypad allowing different users to identify themselves before taking a limited number of tickets. Access to the rear face of the dispenser, however, is generally closed by means of a conventional key lock. The bank employees, the bottom conveyors responsible for filling the distributor and the technical repairers all share copies of the same key that allows access to vaults frequently containing tens of thousands of Euros in cash or in a container . The risk is important that one of these keys is lost or stolen and falls into the wrong hands. In addition, it is extremely difficult to find the culprit in case of theft by an unscrupulous employee when a key is distributed to many users.

Afin de remédier à ces problèmes, la société Kaba Mas (marque déposée) propose depuis plusieurs années une serrure vendue sous le nom de Cencon System 2000 (marque déposée). Cette serrure peut être ouverte au moyen d'une clé électronique conventionnelle, permettant d'identifier son porteur, et d'un code secret à usage unique OTC (One Time Combination, marque déposée). Le code OTC est communiqué à l'utilisateur depuis une centrale, par exemple au travers d'un appel téléphonique. Seul un utilisateur qui parvient à présenter à la fois une clé électronique et un code OTC valide est autorisé à accéder au contenu du distributeur protégé.To remedy these problems, the company Kaba Mas (registered trademark) has been offering for several years a lock sold under the name of Cencon System 2000 (registered trademark). This lock can be opened by means of a conventional electronic key, to identify its holder, and a secret code OTC (One Time Combination, registered trademark). The OTC code is communicated to the user from a central, for example through a telephone call. Only a user who successfully submits both an electronic key and a valid OTC code is authorized to access the contents of the protected distributor.

Cette solution présente cependant l'inconvénient de toujours requérir des clés physiques associées à chaque distributeur. Un convoyeur nécessite autant de clés que de distributeurs à réapprovisionner au cours de sa tournée, ou alors une clé programmée pour ouvrir plusieurs distributeurs en combinaisons avec différents codes OTC. La gestion et la programmation des clés à distribuer aux différents utilisateurs est un casse-tête administratif, notamment lorsqu'une clé est perdue.However, this solution has the disadvantage of always requiring physical keys associated with each distributor. A conveyor requires as many keys as distributors to replenish during its tour, or a key programmed to open several distributors in combination with different OTC codes. The management and programming of keys to be distributed to different users is an administrative headache, especially when a key is lost.

Par ailleurs, un utilisateur ayant acquis frauduleusement une clé pourrait tenter d'appeler la centrale en usurpant l'identité du porteur autorisé de la clé afin d'obtenir un code OTC valide. La sécurité offerte est donc insuffisante.In addition, a user who has fraudulently acquired a key may attempt to call the central office by impersonating the authorized key holder in order to obtain a valid OTC code. The security offered is therefore insufficient.

D'autre part, le lecteur de clé électronique comporte des éléments électriques, électroniques et/ou électromécaniques qui offrent des possibilités de manipulations et de fraudes supplémentaires.On the other hand, the electronic key reader comprises electrical, electronic and / or electromechanical elements that offer possibilities for manipulation and additional fraud.

La demande de brevet EP0546701 décrit un procédé de contrôle de déverrouillage de coffres dans lequel la sécurité est assurée au moyen de différents codes PIN et de messages encodés que l'utilisateur doit introduire dans un terminal qui lui appartient. Ce terminal est ensuite connecté au coffre protégé afin de provoquer son déverrouillage. Le terminal qui se trouve habituellement entre les mains de l'utilisateur constitue une cible pour des hackers tentés de l'étudier ou de fabriquer un terminal compatible pour accéder à des coffres non autorisés.The patent application EP0546701 discloses a lock unlocking verification method in which security is provided by means of different PIN codes and encoded messages that the user must enter into a terminal belonging to him. This terminal is then connected to the protected box to cause its unlocking. The terminal that is usually in the hands of the user is a target for hackers attempting to study it or to build a compatible terminal to access unauthorized vaults.

Un but de la présente invention est donc de proposer un procédé et une serrure qui permettent d'éviter les inconvénients des procédés et des serrures de l'art antérieur.An object of the present invention is therefore to provide a method and a lock which make it possible to avoid the disadvantages of the methods and locks of the prior art.

Selon l'invention, ces objectifs sont notamment atteints au moyen d'un procédé de contrôle de verrouillage de serrure électronique, comportant les étapes suivantes :

  • un utilisateur s'identifie auprès de la serrure électronique,
  • la serrure électronique affiche une question, de préférence une question à usage unique,
  • l'utilisateur transmet la question à une centrale,
  • la centrale calcule la réponse à la question et transmet cette réponse à l'utilisateur,
  • l'utilisateur introduit la réponse dans la serrure,
  • la serrure vérifie si la réponse est correcte et décide en fonction de cette réponse du déverrouillage de la porte.
According to the invention, these objectives are achieved in particular by means of an electronic lock lock control method, comprising the following steps:
  • a user identifies himself with the electronic lock,
  • the electronic lock displays a question, preferably a single-use question,
  • the user sends the question to a central,
  • the central calculates the answer to the question and transmits this answer to the user,
  • the user enters the answer in the lock,
  • the lock checks if the answer is correct and decides according to this response of unlocking the door.

Ce procédé a notamment l'avantage de forcer l'utilisateur à transmettre une question posée par la serrure du distributeur à la centrale. Cette opération supplémentaire permet de prévoir des tests supplémentaires, par exemple pour vérifier dans la centrale si la question posée est bel et bien valide.This method has the advantage of forcing the user to transmit a question posed by the lock of the dispenser to the central. This additional operation makes it possible to provide additional tests, for example to check in the central if the question asked is indeed valid.

Ce procédé a également l'avantage de baser l'identification de l'utilisateur non plus nécessairement sur une clé physique, mais par exemple au moyen de mot de passe, PIN, ou de données biométriques, plus difficiles à dérober.This method also has the advantage of basing the identification of the user not necessarily on a physical key, but for example by means of password, PIN, or biometric data, more difficult to steal.

Dans le cas d'une identification de l'utilisateur au moyen d'un mot de passe ou d'un PIN, ce procédé a l'avantage de permettre de distribuer, de remplacer ou d'invalider très facilement des mots de passe, à distance par de simples manipulations logicielles depuis une centrale.In the case of an identification of the user by means of a password or a PIN, this method has the advantage of making it possible to distribute, replace or invalidate very easily passwords, to distance by simple software manipulations from a central.

Dans une variante, le code secret utilisé pour identifier l'utilisateur est vérifié par la centrale 1, et pas par la serrure. On évite ainsi la transmission de listes d'utilisateurs autorisés aux différentes serrures.In a variant, the secret code used to identify the user is verified by the central unit 1, and not by the lock. This avoids the transmission of authorized user lists to different locks.

Ce procédé a également l'avantage que toutes les données et tous les codes nécessaires pour déverrouiller la serrure peuvent être introduits directement dans la serrure, sans transiter par un équipement intermédiaire offrant une vulnérabilité supplémentaire aux attaques.This method also has the advantage that all the data and all the codes necessary to unlock the lock can be introduced directly into the lock, without passing through an intermediate device offering an additional vulnerability to the attacks.

La présente invention concerne aussi une serrure électronique comportant :

  • des moyens d'introduction de données pour l'introduction d'un code d'identification personnel, et des moyens de vérification dudit code d'identification personnel,
  • un module pour générer puis afficher une question en réponse à l'introduction d'un code d'identification personnel accepté,
  • un module pour vérifier si une réponse à ladite question introduite sur ledit clavier est correcte, et pour provoquer le déverrouillage de ladite serrure en cas de réponse correcte.
The present invention also relates to an electronic lock comprising:
  • data entry means for the introduction of a personal identification code, and means for verifying said personal identification code,
  • a module for generating and displaying a question in response to the introduction of an accepted personal identification code,
  • a module for checking whether a response to said question entered on said keyboard is correct, and for causing the unlocking of said lock in case of correct answer.

Cette serrure est adaptée au procédé ci-dessus ; elle présente en outre l'avantage de ne pas nécessiter impérativement de lecteur de clé, vulnérable et coûteux.This lock is adapted to the method above; it also has the advantage of not necessarily requiring a key reader, vulnerable and expensive.

La présente invention concerne aussi un procédé pour une centrale de gestion de parc de serrures électroniques, comportant les étapes de :

  • distribution de codes personnels à une pluralité d'utilisateurs afin de leur permettre de s'identifier envers au moins certaines desdites serrures,
  • détermination des droits d'accès de chaque utilisateur à chaque serrure,
  • réception d'une question transmise par undit utilisateur au travers d'un réseau de télécommunication,
  • vérification de la plausibilité de ladite question,
  • calcul d'une réponse à ladite question au moyen d'un algorithme confidentiel,
  • transmission de ladite réponse audit utilisateur.
The present invention also relates to a method for an electronic lock park management center, comprising the steps of:
  • distributing personal codes to a plurality of users in order to enable them to identify themselves with at least some of said locks,
  • determination of the access rights of each user to each lock,
  • receiving a question transmitted by a user through a telecommunication network,
  • verification of the plausibility of the said question,
  • calculating a response to said question using an algorithm confidential,
  • transmitting said response to said user.

Ce procédé peut être mis en oeuvre de manière entièrement automatique par un ordinateur programmé pour ces différentes tâches, ou de manière assistée par un opérateur humain, ou un groupe d'opérateurs humains, mettant en oeuvre un ordinateur.This method can be implemented entirely automatically by a computer programmed for these different tasks, or in a manner assisted by a human operator, or a group of human operators, using a computer.

Brève description des dessinsBrief description of the drawings

Des exemples de mise en oeuvre de l'invention sont indiqués dans la description illustrée par les figures annexées dans lesquelles :

  • La figure 1 illustre sous forme de schéma bloc un système mettant en oeuvre le procédé et la serrure de l'invention.
  • La figure 2 illustre sous forme de diagramme de flux les échanges d'information au cours du processus de l'invention.
Examples of implementation of the invention are indicated in the description illustrated by the appended figures in which:
  • Figure 1 illustrates in block diagram form a system implementing the method and the lock of the invention.
  • FIG. 2 illustrates in the form of a flow diagram the exchanges of information during the process of the invention.

Exemple(s) de mode de réalisation de l'inventionExample (s) of embodiment of the invention

La figure 1 illustre sous forme de schéma bloc un système comprenant une centrale 1 à laquelle différents utilisateurs 4 peuvent se connecter à l'aide d'un équipement mobile 3 au travers d'un réseau 2. Le système comporte en outre une ou plusieurs serrures 5 pour protéger des dispositifs non représentés, par exemple des distributeurs de billets, des coffres, des salles ou d'autres volumes protégés.FIG. 1 illustrates in the form of a block diagram a system comprising a central unit 1 to which different users 4 can connect using a mobile device 3 through a network 2. The system also comprises one or more locks 5 to protect devices not shown, for example cash dispensers, chests, rooms or other protected volumes.

La centrale 1 peut être constituée par exemple par une centrale d'appel, animée par plusieurs opérateurs humains, ou un serveur ou groupe de serveur exécutant une application spécifique. Le réseau 2 est par exemple un réseau de télécommunication, par exemple un réseau téléphonique conventionnel, un réseau de type Internet ou Intranet, ou de préférence un réseau cellulaire mobile. Les utilisateurs peuvent se connecter à la centrale 1 en établissant une communication vocale ou de données au travers du réseau 2.The central unit 1 may be constituted for example by a call center, animated by several human operators, or a server or server group executing a specific application. The network 2 is for example a telecommunications network, for example a conventional telephone network, an Internet or Intranet type network, or preferably a mobile cellular network. Users can get connect to control panel 1 by establishing voice or data communication through the network 2.

Dans une variante préférentielle, les utilisateurs se connectent à la centrale 1 au travers d'un réseau cellulaire mobile 2 et en envoyant des données, par exemple des SMS (Short Message System), des e-mails ou des paquets de données IP au travers d'un réseau 2 de type GSM, GPRS, HSCSD, EDGE ou GPRS par exemple. La centrale reçoit de préférence automatiquement des données au moyen d'un modem ou d'un routeur adapté, et peut également répondre à l'utilisateur en lui envoyant ses propres données au travers du même canal, ou d'un canal différent. Les données échangées dans un des sens, ou dans les deux sens, peuvent être signées électroniquement et/ou encryptées par la centrale 1 et/ou par l'équipement mobile 3, par exemple en utilisant une carte à puce dans l'équipement mobile 3.In a preferred embodiment, the users connect to the central unit 1 via a mobile cellular network 2 and by sending data, for example SMS (Short Message System), e-mails or IP data packets through a network 2 of GSM, GPRS, HSCSD, EDGE or GPRS for example. The central station preferably automatically receives data via a modem or a suitable router, and can also respond to the user by sending his own data through the same channel, or a different channel. The data exchanged in one of the directions, or in both directions, can be electronically signed and / or encrypted by the central unit 1 and / or by the mobile equipment 3, for example by using a smart card in the mobile equipment 3 .

Dans une autre variante, les utilisateurs 4 se connectent à la centrale 1 au moyen d'une communication vocale. La centrale 1 emploie dans ce cas des opérateurs humains pour réagir à cet appel vocal, et/ou un système de reconnaissance vocal IVR (Interactive Voice Response) pour analyser le contenu des requêtes et/ou des codes DTMFs de l'utilisateur et pour synthétiser une réponse vocale.In another variant, the users 4 connect to the central unit 1 by means of a voice communication. In this case, the central unit 1 uses human operators to react to this voice call, and / or an IVR (Interactive Voice Response) voice recognition system to analyze the content of the user's requests and / or DTMF codes and to synthesize a voice response.

La centrale 1 comporte en outre une banque de données 10 d'utilisateurs autorisés, qui contient pour chaque utilisateur au moins un code personnel - ou des données de vérification de code personnel - ainsi que des autorisations, par exemple une liste de serrures que l'utilisateur est autorisé à ouvrir. L'enregistrement comportant à chaque utilisateur peut en outre indiquer des fenêtres temporelles durant lesquelles un accès à une ou plusieurs serrures est autorisé, un profil d'utilisateur, incluant par exemple son nom, ses coordonnées, des clés cryptographiques de communication avec chaque utilisateur, un historique d'utilisation du système (nombre d'essais fructueux, d'essais infructueux, dates, heures, etc), et d'autres données d'identification ou d'authentification, y compris par exemple un numéro d'appelant MSISDN correspondant à son équipement mobile 3, des données biométriques, etc.The central unit 1 furthermore comprises a database of authorized users, which contains for each user at least one personal code - or personal code verification data - as well as authorizations, for example a list of locks that the user user is allowed to open. The record comprising each user may further indicate time windows during which access to one or more locks is authorized, a user profile, including for example its name, its coordinates, cryptographic keys for communication with each user, a history of system usage (number of successful trials, unsuccessful trials, dates, times, etc.), and other identification or authentication data, including for example a MSISDN caller number corresponding to its mobile equipment 3, biometric data, etc.

Des moyens de calcul 11 dans la centrale 1 permettent d'exécuter un programme applicatif pour gérer les différents utilisateurs et leurs droits dans la banque de données 10. Les moyens de calcul permettent en outre d'exécuter un algorithme permettant de calculer la réponse à une question (« challenge ») reçue d'un utilisateur. Cet algorithme peut par exemple consulter une table de correspondance en mémoire morte qui indique la réponse à chaque question attendue, ou de préférence calculer une fonction mathématique à partir de chaque question. La fonction exécutée est de préférence choisie de manière à ce que la connaissance d'un nombre quelconque de réponses à des questions précédentes ne permet pas de prédire quelle sera la réponse à la prochaine question (fonction pseudo-aléatoire). L'algorithme choisi, ou les valeurs permettant de le paramétrer (par exemple le seed dans le cas d'une fonction pseudo-aléatoire) sont de préférence maintenus confidentiels. En outre, un algorithme différent, ou des valeurs différentes, sont de préférence employés pour chaque serrure 5, et/ou même pour chaque utilisateur 4.Calculation means 11 in the central unit 1 make it possible to execute an application program for managing the various users and their rights in the data bank 10. The calculation means also make it possible to execute an algorithm making it possible to calculate the response to a number of requests. question ("challenge") received from a user. This algorithm can for example consult a read-only correspondence table that indicates the answer to each expected question, or preferably calculate a mathematical function from each question. The function performed is preferably chosen so that knowledge of any number of answers to previous questions does not predict what will be the answer to the next question (pseudo-random function). The chosen algorithm, or the values allowing to parameterize it (for example the seed in the case of a pseudo-random function) are preferably kept confidential. In addition, a different algorithm, or different values, are preferably used for each lock 5, and / or even for each user 4.

La centrale 1 peut en outre comporter une banque de données de serrures (non représentée), comportant pour chaque serrure 5 un profil avec des informations telles que l'emplacement géographique, le type de dispositif protégé, des clés cryptographiques de communication, etc.The central unit 1 may further comprise a lock database (not shown), comprising for each lock 5 a profile with information such as the geographical location, the type of protected device, cryptographic communication keys, etc.

L'équipement mobile 3 dépend du type de réseau employé. Dans une variante préférentielle, cet équipement est constitué par un équipement mobile cellulaire, par exemple un téléphone cellulaire ou un assistant personnel, un smartphone ou un ordinateur personnel muni d'une carte de connexion à un réseau cellulaire, d'un modem ou d'un routeur. II est aussi possible d'employer un appareil de communication dédié à cet usage.The mobile equipment 3 depends on the type of network used. In a preferred embodiment, this equipment is constituted by cellular mobile equipment, for example a cellular telephone or a personal assistant, a smartphone or a personal computer equipped with a connection card to a cellular network, a modem or a personal computer. a router. It is also possible to use a dedicated communication device for this purpose.

L'équipement mobile 3 peut comporter des moyens de géolocalisation 30, par exemple un récepteur satellitaire de type GPS permettant de déterminer sa position et éventuellement de la transmettre à la centrale 1. Un équipement de protection de travailleur isolé (PTI) 31 permet de vérifier si l'utilisateur 4 de l'équipement mobile 3 est éveillé, par exemple en vérifiant s'il bouge, s'il est vertical, s'il réagit à des demandes de réponse, etc. L'équipement mobile 3 peut en outre comporter des moyens d'identification et/ou d'authentification 32 supplémentaires, par exemple une carte à puce (carte SIM par exemple), des moyens d'introduction et de vérification de code PIN, un capteur biométrique, etc. L'identification et/ou l'authentification d'utilisateur 4 peut être effectuée localement, c'est-à-dire dans l'équipement mobile ou dans une carte à puce insérée dans l'équipement, ou à distance, c'est-à-dire par exemple dans la centrale 1 qui dispose alors de moyens de vérifications des données de la carte à puce, des codes PIN et/ou des données biométriques saisies. L'équipement mobile 3 peut être par exemple portable ou installé dans un véhicule.The mobile equipment 3 may comprise geolocation means 30, for example a satellite receiver of the GPS type to determine its position and possibly transmit it to the central 1. Insulated worker protection equipment (ITP) 31 makes it possible to check whether the user 4 of the mobile equipment 3 is awake, for example by checking whether move, if it is vertical, if it reacts to requests for answers, etc. The mobile equipment 3 may further comprise additional identification and / or authentication means 32, for example a smart card (SIM card for example), PIN code input and verification means, a sensor biometric, etc. The identification and / or user authentication 4 can be performed locally, that is to say in the mobile equipment or in a smart card inserted in the equipment, or remotely, that is, ie for example in the central 1 which then has means of verification of the data of the smart card, PIN codes and / or biometric data entered. The mobile equipment 3 can be for example portable or installed in a vehicle.

Il est cependant possible d'employer un téléphone mobile conventionnel comme équipement mobile dans le cadre de l'invention ; il est seulement nécessaire que l'utilisateur puisse se mettre en relation au moyen de cet équipement avec une centrale 1 pour envoyer une question et recevoir une réponse correspondante. Il est même avantageux, pour augmenter la sécurité, d'établir des communications entre les différents utilisateurs et la centrale par des canaux de type différents. La centrale peut par exemple employer cette information supplémentaire et convenir avec un convoyeur, par exemple, que la question devra être transmise oralement, même si le convoyeur dispose d'un équipement permettant une communication de données.It is however possible to use a conventional mobile telephone as mobile equipment in the context of the invention; it is only necessary for the user to be able to connect by means of this equipment with a central unit 1 to send a question and receive a corresponding answer. It is even advantageous, to increase security, to establish communications between the different users and the central by different types of channels. The plant may for example use this additional information and agree with a conveyor, for example, that the question should be transmitted orally, even if the conveyor has equipment for data communication.

L'utilisateur 4 est par exemple un employé de banque, un convoyeur de fond, un réparateur technique, ou n'importe quelle personne physique autorisée par la centrale 1 à ouvrir la serrure 5. L'utilisateur 4 a la connaissance d'un code personnel secret qui lui a été transmis par la centrale 1 et avec lequel il peut s'identifier envers une ou plusieurs serrures 5 d'un parc de serrures gérées par la centrale 1. L'utilisateur 4 est en outre de préférence apte à s'identifier envers son équipement mobile 3 au moyen d'un autre code secret, par exemple le code PIN du téléphone et/ou de la carte SIM. D'autres moyens d'identification de l'utilisateur 4 envers la serrure 5 et/ou envers l'équipement mobile 3 sont envisageables dans le cadre de l'invention ; par exemple, l'utilisateur pourrait prouver son identité en présentant un objet personnel, tel qu'une clé ou une carte à puce, ou par identification biométriques à l'aide d'empreintes digitales, de l'iris, de la rétine, de la voix, du visage, etc. Bien entendu, des procédés différents peuvent être mis en oeuvre pour identifier ou authentifier l'utilisateur 4 envers l'équipement mobile 3 et envers la serrure 5. Il est en outre possible de cumuler plusieurs procédés d'identification. Par ailleurs, les données d'identification introduites dans l'équipement mobile 3 peuvent être transmises à la centrale 1 pour vérification.The user 4 is for example a bank employee, a bottom conveyor, a technical repairer, or any natural person authorized by the central 1 to open the lock 5. The user 4 has the knowledge of a code secret personnel that has been transmitted to it by the central 1 and with which it can identify itself to one or more locks 5 of a park locks managed by the central 1. The user 4 is also preferably able to s' identify towards his mobile equipment 3 by means another secret code, for example the PIN code of the phone and / or the SIM card. Other means of identifying the user 4 to the lock 5 and / or to the mobile equipment 3 are conceivable within the scope of the invention; for example, the user could prove his identity by presenting a personal object, such as a key or a smart card, or by biometric identification using fingerprints, iris, retina, voice, face, etc. Of course, different methods can be implemented to identify or authenticate the user 4 towards the mobile equipment 3 and the lock 5. It is also possible to accumulate several identification methods. Furthermore, the identification data entered in the mobile equipment 3 can be transmitted to the central 1 for verification.

La serrure 5 comporte un élément électromécanique 52, par exemple un pêne, dont la position est contrôlée par un dispositif logique à l'intérieur de la serrure 5 pour agir sur un mécanisme mécanique (« tringlerie ») permettant de verrouiller ou au contraire de déverrouiller l'accès au volume protégé, par exemple à l'intérieur d'un distributeur. La serrure est de préférence destinée à être utilisée en combinaison avec un dispositif contenant un volume à protéger, par exemple avec un distributeur de billets ou un coffre ; elle ne constitue donc pas elle-même un tel coffre, et ne comporte pas de volume protégé, mais dispose de moyens non représentés pour l'associer mécaniquement et/ou électriquement, de manière difficilement démontable avec un tel coffre ou un tel distributeur.The lock 5 comprises an electromechanical element 52, for example a bolt, whose position is controlled by a logic device inside the lock 5 to act on a mechanical mechanism ("linkage") to lock or unlike to unlock access to the protected volume, for example inside a distributor. The lock is preferably intended to be used in combination with a device containing a volume to be protected, for example with a cash dispenser or a safe; it does not itself constitute such a safe, and has no protected volume, but has means not shown to associate it mechanically and / or electrically, so hardly removable with such a chest or such a dispenser.

Un clavier numérique ou alphanumérique 51 associé à la serrure 5 permet à l'utilisateur d'introduire son code personnel et la réponse aux questions posées. D'autres éléments d'introduction de données (non représentés), par exemple un capteur biométrique, une caméra, un microphone, etc, peuvent éventuellement être prévus dans la serrure 5. La serrure comporte en outre un écran 50 pour afficher des messages en mode texte ou matriciel, y compris des questions, des invitations à introduire une réponse, et des messages d'état.A numeric or alphanumeric keyboard 51 associated with the lock 5 allows the user to enter his personal code and the answer to the questions asked. Other data input elements (not shown), for example a biometric sensor, a camera, a microphone, etc., may optionally be provided in the lock 5. The lock further comprises a screen 50 for displaying messages in text or matrix mode, including questions, invitations to reply, and status messages.

La serrure comporte en outre de préférence une ou plusieurs interfaces 53 optionnelles qui lui permettent d'échanger des données avec le dispositif qu'elle doit protéger, par exemple un distributeur monétique, et/ou avec la centrale 1 au travers de n'importe quel réseau adapté, par exemple un réseau téléphonique ou Internet. La communication de données avec le dispositif à protéger dans lequel la serrure est montée permet notamment d'améliorer la sécurité, grâce à l'échange d'informations permettant de détecter des fraudes probables à l'aide de combinaisons d'indices et grâce à la génération des fichiers de logs tenant compte de données récoltées aussi bien par la serrure que par le dispositif protégé. Cette communication peut aussi, le cas échéant, être employée pour commander la serrure 5 au moyen du clavier du distributeur, d'afficher des messages dépendant du comportement de la serrure 5 sur l'écran du distributeur, de répercuter des alarmes déclenchées par la serrure au moyen du distributeur, ou de déclencher d'autres actions effectuées par le distributeur. La communication de préférence bidirectionnelle entre la serrure 5 et la centrale 10 permet par exemple de modifier à distance la liste des utilisateurs autorisés à s'identifier envers chaque serrure 5 (à moins que cette vérification ne soit faite par la centrale), de modifier les algorithmes de vérification de réponse à distance, de consulter les fichiers de logs générés par la serrure, et de détecter à distance d'autres événements liés à l'utilisation de la serrure. Cette communication avec la centrale 1 peut aussi être effectuée au travers du dispositif protégé par la serrure, par exemple en utilisant un modem ou un routeur de ce dispositif. Dans un mode de réalisation, les données échangées par la serrure et la centrale 1 sont signées et encryptées électroniquement, par exemple au travers d'un tunnel privé virtuel (VPN, virtual private network) de manière à préserver leur confidentialité et leur authenticité même vis-à-vis du distributeur à protéger.The lock preferably further comprises one or more optional interfaces 53 which enable it to exchange data with the device it is to protect, for example a cash dispenser, and / or with the central unit 1 through any network, for example a telephone network or the Internet. The communication of data with the device to be protected in which the lock is mounted notably makes it possible to improve the security, thanks to the exchange of information making it possible to detect probable frauds using combinations of indices and thanks to the generation of log files taking into account data collected by both the lock and the protected device. This communication can also, if necessary, be used to control the lock 5 by means of the keypad of the dispenser, to display messages depending on the behavior of the lock 5 on the distributor screen, to echo alarms triggered by the lock by the distributor, or to trigger other actions performed by the distributor. The bidirectional communication preferably between the lock 5 and the central unit 10 makes it possible, for example, to remotely modify the list of authorized users to identify with each lock 5 (unless this check is made by the central), to modify the remote response verification algorithms, to consult the log files generated by the lock, and to remotely detect other events related to the use of the lock. This communication with the central unit 1 can also be carried out through the device protected by the lock, for example by using a modem or a router of this device. In one embodiment, the data exchanged by the lock and the central unit 1 are electronically signed and encrypted, for example through a Virtual Private Network (VPN), so as to preserve their confidentiality and their very authenticity. to the distributor to be protected.

La serrure 5 comporte en outre de préférence une montre électronique 54 qui lui permet de déterminer la date et l'heure de façon autonome, et de calculer des intervalles de temps. Des moyens de calcul non représentés, par exemple un microcontrôleur, un microprocesseur avec une mémoire, un microordinateur industriel, un circuit de type asic et/ou un circuit FPGA, etc, permettent de gérer les dialogues avec l'utilisateur, et de commander le dispositif électromécanique provoquant le verrouillage ou le déverrouillage de la serrure. Les moyens de calcul comportent en outre de préférence un module, par exemple un module logiciel, pour générer puis afficher une question en réponse à l'introduction d'un code d'identification personnel accepté, et un module, par exemple logiciel, pour vérifier si une réponse à la question est correcte, et pour provoquer le déverrouillage de la serrure en cas de réponse correcteThe lock 5 furthermore preferably comprises an electronic watch 54 which enables it to determine the date and time autonomously, and to calculate time intervals. Calculation means not shown, for example a microcontroller, a microprocessor with a memory, an industrial microcomputer, an asic type circuit and / or a FPGA circuit, etc., to manage the dialogs with the user, and to control the electromechanical device causing the locking or unlocking of the lock. The calculation means preferably furthermore comprise a module, for example a software module, for generating and displaying a question in response to the introduction of an accepted personal identification code, and a module, for example a software module, for checking if an answer to the question is correct, and to cause the unlocking of the lock in case of correct answer

Les moyens de calcul sont de préférence protégés contre les manipulations physiques ou logicielles et peuvent par exemple s'autodétruire, en maintenant la serrure fermée, lors de manipulations frauduleuses. La serrure 5 peut en outre comporter des éléments de connexion sans fils avec l'équipement mobile 3, par exemple une interface de type Bluetooth, afin par exemple de détecter et de vérifier la présence de cet équipement à proximité ; on peut cependant renoncer à ces moyens s'ils introduisent une vulnérabilité supplémentaire.The calculation means are preferably protected against physical or software manipulations and may, for example, self-destruct, while keeping the lock closed, during fraudulent manipulations. The lock 5 may further comprise wireless connection elements with the mobile equipment 3, for example a Bluetooth-type interface, for example to detect and verify the presence of this equipment in the vicinity; however, these means can be dispensed with if they introduce an additional vulnerability.

La serrure 5 est de préférence autonome électriquement et alimentée à l'aide de piles ou de batterie ; elle reste mécaniquement verrouillée lorsque les piles ou batteries sont déchargés. La recharge ou le remplacement des piles ou batteries peut alors être effectué sans déverrouiller la serrure. Dans une variante, la serrure est alimentée électriquement par le dispositif dans lequel elle est montée, par exemple un distributeur de billets. Dans encore une autre variante, elle est alimentée au moyen d'une génératrice actionnée par l'utilisateur ; la montre 54 utilise dans cas sa propre source d'énergie afin de conserver l'heure même lorsque le reste du système n'est plus alimenté électriquement.The lock 5 is preferably electrically autonomous and powered with batteries or battery; it remains mechanically locked when the batteries are discharged. Charging or replacing the batteries can then be done without unlocking the lock. In a variant, the lock is electrically powered by the device in which it is mounted, for example a cash dispenser. In yet another variant, it is powered by means of a generator actuated by the user; the watch 54 uses in its own power source case to keep the time even when the rest of the system is no longer electrically powered.

Nous allons maintenant décrire à l'aide de la figure 2 un exemple de mise en oeuvre du procédé de l'invention.We will now describe with the help of Figure 2 an example of implementation of the method of the invention.

Initialement, un utilisateur 4 souhaitant déverrouiller la serrure 5 se trouve physiquement devant cette serrure et introduit au cours de l'étape 100 un code personnel sur le clavier 51, par exemple un code numérique ou alphanumérique, par exemple un code à 6 chiffres.Initially, a user 4 wishing to unlock the lock 5 is physically in front of this lock and introduced during step 100 a personal code on the keyboard 51, for example a numeric or alphanumeric code, for example a 6-digit code.

Au cours de l'étape 101, les moyens de calcul dans la serrure vérifient le code personnel introduit. Dans une première variante, le code personnel est comparé avec une liste de codes acceptés (« liste blanche ») stockée dans la serrure. Cette variante a cependant l'inconvénient de devoir transmettre une telle liste à la serrure, par exemple au travers d'un réseau de télécommunication ou par le biais des convoyeurs. Une telle transmission est sujette à des risques d'interception ou d'espionnage. Afin d'éviter ce risque, dans une deuxième variante préférentielle, la serrure se contente de vérifier au cours de l'étape 101 si le code personnel introduit est plausible, par exemple si le format du code est admissible, si un éventuel code de parité est correct, ou si le code personnel introduit n'appartient pas une liste de codes rejetés (« liste noire ») parce que inexistants ou appartenant à des utilisateurs refusés. La vérification du code personnel particulier introduit par l'utilisateur est dans cette deuxième variante déléguée à la centrale, à qui le code devra être transmis implicitement ou explicitement ultérieurement.During step 101, the calculation means in the lock verify the personal code introduced. In a first variant, the personal code is compared with a list of accepted codes ("white list") stored in the lock. This variant however has the disadvantage of having to transmit such a list to the lock, for example through a telecommunications network or through the conveyors. Such a transmission is subject to risks of interception or espionage. To avoid this risk, in a second preferred embodiment, the lock is satisfied to check during step 101 if the personal code introduced is plausible, for example if the format of the code is admissible, if a possible parity code is correct, or if the entered personal code does not belong to a list of rejected codes ("black list") because nonexistent or belonging to refused users. The verification of the particular personal code introduced by the user is in this second variant delegated to the central office, to which the code must be transmitted implicitly or explicitly later.

Si la serrure détecte au cours de l'étape 101 que le code personnel introduit est invalide, il est rejeté, et un message d'erreur peut être affiché sur l'affichage 50 pour informer l'utilisateur et l'inviter à introduire un nouveau code. Afin d'empêcher des attaques par « force brute », c'est-à-dire en testant successivement un grand nombre de codes différents, il est possible par exemple d'introduire un délai entre chaque tentative et/ou de limiter le nombre de tentatives infructueuses possibles avant de bloquer la serrure pour une plus longue période, ou jusqu'à l'introduction d'une manoeuvre de déblocage.If the lock detects during the step 101 that the entered personal code is invalid, it is rejected, and an error message can be displayed on the display 50 to inform the user and invite him to introduce a new one. code. In order to prevent "brute force" attacks, that is by successively testing a large number of different codes, it is possible, for example, to introduce a delay between each attempt and / or to limit the number of possible unsuccessful attempts to lock the lock for a longer period, or until an unlocking maneuver is introduced.

Dans une variante, l'utilisateur s'identifie envers la serrure en prouvant la possession d'un objet, par exemple une clé, une clé électronique, une carte à puce, etc. L'objet présenté peut être lui-même protégé par un code, notamment dans le cas d'une carte à puce. Cette solution a cependant l'inconvénient de nécessiter une organisation pour distribuer et gérer les objets à présenter. L'utilisateur peut aussi s'identifier au moyen de données biométriques acquises au moyen d'un capteur biométrique, par exemple à l'aide de ses empreintes digitales, de l'iris, de la rétine, du visage, de la voix, etc. Ces données biométriques ont cependant l'inconvénient de ne pas pouvoir être remplacées avec la facilité d'un code personnel qui peut être transmis au dernier moment à l'utilisateur; un enregistrement de l'utilisateur est en outre requis pour acquérir ses données biométriques de référence.In a variant, the user identifies with the lock by proving the possession of an object, for example a key, an electronic key, a smart card, etc. The object presented may itself be protected by a code, especially in the case of a smart card. However, this solution has the disadvantage of requiring an organization to distribute and manage the objects to present. The user can also identify himself by means of biometric data acquired by means of a biometric sensor, for example by means of his fingerprints, the iris, the retina, the face, the voice, etc. . These biometric data however have the disadvantage of not being able to be replaced with the ease of a personal code that can be transmitted at the last moment to the user; a user record is also required to acquire his reference biometric data.

Différents procédés d'identification peuvent en outre être combinés. Il est aussi possible de réclamer une identification supplémentaire ou différente selon les circonstances ; par exemple, une identification biométrique, ou par clé, peut être exigée lorsque l'identification par code personnel n'a pas fonctionné après un nombre d'essais prédéterminé, ou lorsque la somme à disposition dans le volume protégé dépasse une certaine somme, ou lorsque d'autres circonstances imposent une sécurité accrue.Different identification methods can further be combined. It is also possible to claim additional or different identification depending on the circumstances; for example, a biometric or key identification may be required when the personal code identification has not worked after a predetermined number of tests, or when the sum available in the protected volume exceeds a certain sum, or when other circumstances impose increased security.

Si le code personnel est valide, les moyens de calcul de la serrure (ou, ultérieurement, ceux de la centrale) vérifient les droits d'accès attachés à l'utilisateur identifié par ce code. Les droits d'accès peuvent dépendre du temps ; par exemple, il est possible de n'autoriser un déverrouillage de la serrure que pendant une fenêtre temporelle limitée correspondant à l'heure à laquelle l'utilisateur est attendu. Cette fenêtre temporelle peut être codée, avec d'autres informations, dans la réponse de la centrale décrite plus bas.If the personal code is valid, the means of calculation of the lock (or, later, those of the central) verify the access rights attached to the user identified by this code. Access rights may be time dependent; for example, it is possible to authorize an unlocking of the lock only during a limited time window corresponding to the time at which the user is expected. This time window can be coded, along with other information, in the control panel response described below.

Selon l'objet protégé, il est aussi possible de permettre un accès à des parties différentes du volume protégé à différents utilisateurs ; il est par exemple envisageable d'autoriser un technicien à accéder uniquement à différents organes d'un distributeur, par exemple pour recharger le papier, prélever des fichiers de logs ou effectuer d'autres opérations de maintenance, tandis que l'accès au coffre est réservé à d'autres utilisateurs identifiés à l'aide d'autres codes.Depending on the protected object, it is also possible to allow access to different parts of the protected volume to different users; for example, it is conceivable to allow a technician to access only different parts of a distributor, for example to reload the paper, take log files or perform other maintenance operations, while access to the trunk is reserved for other users identified by other codes.

La serrure 5 peut aussi vérifier si une manipulation particulière a été effectuée lors de l'introduction du code personnel par l'utilisateur 4 afin de signaler qu'il est sous contrainte, par exemple parce qu'un assaillant est en train de le forcer à introduire le code. La manipulation particulière peut impliquer par exemple l'introduction d'un code personnel différent, la pression d'une touche ou d'un organe supplémentaire, un appui prolongé sur une touche, ou d'autres manipulations identifiables sans ambiguïtés par la serrure 5 mais difficile à détecter pour un assaillant observant la manoeuvre. La détection d'une manipulation particulière entraîne un comportement différent de la serrure, comme on le verra plus bas.The lock 5 can also check if a particular manipulation has been made during the introduction of the personal code by the user 4 to signal that he is under duress, for example because an attacker is forcing him to introduce the code. The particular handling may involve for example the introduction of a different personal code, the pressure of a key or an additional member, a prolonged press on a key, or other identifiable manipulations unambiguously by the lock 5 but difficult to detect for an assailant observing the maneuver. The detection of a particular manipulation leads to a different behavior of the lock, as will be seen below.

En cas d'identification valide, la serrure 5 affiche ensuite au cours de l'étape 102 une question sur l'affichage 50. La question affichée peut dépendre de l'heure, de la date, de l'utilisateur identifié, de la serrure, d'autres paramètres collectés par la serrure, et/ou d'une éventuelle détection de manipulation pour signaler une contrainte. Par ailleurs, le choix de la question peut dépendre d'un facteur aléatoire. Chaque question est de préférence affichée une seule fois et n'est pas réutilisée, ou au moins pas pour le même utilisateur. La question affichée peut être générée par une fonction mathématique, par exemple une fonction pseudo-aléatoire, et/ou choisie dans une table de questions prédéfinies. Dans une variante préférentielle, la fonction pseudo-aléatoire dépend au moins partiellement de la valeur d'un compteur incrémentée à chaque ouverture du coffre et/ou à chaque tentative de déverrouillage ; le compteur ne peut jamais être décrémenté, et la valeur maximale qui peut être comptée est suffisante pour assurer que le compteur ne reboucle. II serait aussi possible d'employer l'heure comptée par l'horloge de la serrure pour initialiser la fonction pseudo-aléatoire ; toutefois, une horloge doit pouvoir être mise à l'heure, et donc pouvoir être retardée, ce qui pourrait être utilisé pour « remonter dans le temps » afin de forcer la serrure à générer à nouveau une question dont la réponse est déjà connue.In case of valid identification, the lock 5 then displays in step 102 a question on the display 50. The question displayed may depend on the time, the date, the identified user, the lock , other parameters collected by the lock, and / or a possible manipulation detection to signal a constraint. In addition, the choice of the question may depend on a random factor. Each question is preferably displayed once and is not reused, or at least not for the same user. The displayed question can be generated by a mathematical function, for example a pseudo-random function, and / or chosen in a table of predefined questions. In a preferred embodiment, the pseudo-random function depends at least partially on the value of an incremented counter each time the trunk is opened and / or each unlocking attempt; the counter can never be decremented, and the maximum value that can be counted is sufficient to ensure that the counter does not loop back. It would also be possible to use the time counted by the lock clock to initialize the pseudo-random function; However, a clock must be able to be set on time, and thus be able to be delayed, which could be used to "go back in time" in order to force the lock to generate again a question whose answer is already known.

Les identifications fructueuses et les tentatives d'identifications infructueuses sont de préférence enregistrées dans un fichier de log dans la serrure, avec la date et l'heure de l'événement. Ce fichier peut être consulté par un technicien, par exemple en introduisant un code particulier sur le clavier 51, en branchant un ordinateur sur un connecteur sur la face frontale de la serrure, et/ou à distance depuis la centrale 1 au travers d'un réseau de communication.Successful IDs and unsuccessful ID attempts are preferably stored in a log file in the lock, along with the date and time of the event. This file can be viewed by a technician, for example by introducing a particular code on the keyboard 51, by connecting a computer to a connector on the front face of the lock, and / or remotely from the central unit 1 through a communication network.

L'utilisateur 4 lit la question affichée au cours de l'étape 103, puis l'introduit au cours de l'étape 104 sur le clavier de son équipement mobile 3. Comme la question affichée sur l'affichage 50 est imprévisible, et qu'il est possible de distinguer les questions possibles des questions non licites, on s'assure ainsi que l'utilisateur 4 se trouve bel et bien à proximité de la serrure 5 à ouvrir.The user 4 reads the question displayed during the step 103, then introduces it during the step 104 on the keyboard of his mobile equipment 3. As the question displayed on the display 50 is unpredictable, and It is possible to distinguish the possible questions from the non-lawful questions, it is thus ensured that the user 4 is indeed close to the lock 5 to open.

Au cours de l'étape 105, la question introduite par l'utilisateur est transmise par l'équipement mobile 3 à la centrale, par exemple sous forme de message court, par exemple de SMS, de e-mail, de paquets de données, de code DTMF, ou de message vocal parlé par l'utilisateur.During the step 105, the question introduced by the user is transmitted by the mobile equipment 3 to the central station, for example in the form of a short message, for example SMS, e-mail, data packets, DTMF code, or voice message spoken by the user.

Une application dédiée, par exemple un applet Java (marque déposée), peut être exécutée par l'équipement mobile 3 pour faciliter l'introduction de la question et sa transmission vers la centrale 1. Dans une variante, la question est simplement introduite par l'utilisateur et transmise à un numéro téléphonique ou vers une adresse e-mail connus de l'utilisateur.A dedicated application, for example a Java (registered trademark) applet, can be executed by the mobile equipment 3 to facilitate the introduction of the question and its transmission to the central station 1. In a variant, the question is simply introduced by the user. user and forwarded to a telephone number or to an e-mail address known to the user.

L'accès à l'équipement mobile 3, ou à l'application de l'équipement mobile, peut être protégé par un mot de passe, un code pin, ou requérir d'autres mesures d'identification ou d'authentification de l'utilisateur 4.Access to mobile equipment 3, or to the mobile equipment application, may be protected by a password, a pin code, or require other identification or authentication measures. user 4.

Outre la question introduite par l'utilisateur, le message transmis à la centrale 1 au cours de l'étape 105 peut inclure d'autres informations, y compris par exemple une identification de l'équipement mobile 3 employé (par exemple un numéro d'appelant MSISDN), des données d'identification d'utilisateur (y compris son code personnel, mais aussi par exemple un mot de passe, un code PIN, des données biométriques, des données extraites d'une carte à puce dans l'équipement mobile, etc), des informations de positions fournies par le module de géolocalisation 30, des informations fournies par le module PTI 31, etc. Le message peut en outre être signé électroniquement par une carte à puce dans l'équipement mobile 3, afin de prouver son authenticité et son intégrité, et/ou encrypté afin de garantir sa confidentialité.In addition to the question entered by the user, the message transmitted to the central unit 1 during the step 105 may include other information, including for example an identification of the mobile equipment 3 used (for example a number of calling MSISDN), user identification data (including his personal code, but also for example a password, a PIN code, biometric data, extracted data of a smart card in the mobile equipment, etc.), position information provided by the geolocation module 30, information provided by the PTI module 31, etc. The message can also be signed electronically by a smart card in the mobile equipment 3, to prove its authenticity and integrity, and / or encrypted to ensure its confidentiality.

Au cours de l'étape 106, la centrale 1 reçoit le message transmis par l'utilisateur et le vérifie. La vérification implique par exemple de contrôler si la question transmise est une question licite, en fonction de l'utilisateur qui l'emploie, de la serrure devant laquelle il se trouve, de l'heure, etc. Si le code personnel de l'utilisateur a été transmis avec la question, ou s'il est implicitement contenu dans la question, la centrale 1 peut aussi s'assurer que cet utilisateur est effectivement autorisé à accéder à cette serrure à ce moment, par exemple en fonction d'un plan de route préalablement établi pour un convoyeur se déplaçant entre plusieurs serrures. D'autres vérifications peuvent tenir compte de l'emplacement géographique de l'utilisateur, des données fournies par le dispositif PTI, d'éventuelles données fournies directement par la serrure, des vérifications d'informations signalant une manipulation pour indiquer une contrainte, etc.During step 106, the central unit 1 receives the message transmitted by the user and verifies it. Verification involves, for example, checking whether the transmitted question is a lawful question, depending on the user who uses it, the lock in front of which he is, the time, etc. If the user's personal code has been transmitted with the question, or if it is implicitly contained in the question, the central unit 1 can also ensure that this user is actually authorized to access this lock at this time, by example according to a road map previously established for a conveyor moving between several locks. Other checks may take into account the geographic location of the user, the data provided by the PTI device, any data provided directly by the lock, information checks signaling manipulation to indicate a constraint, and so on.

Si les vérifications effectuées au cours de l'étape 106 permettent de déterminer que la question est une question légitime transmise au bon moment par un utilisateur autorisé, les droits de cet utilisateur sont de préférence déterminés. Lorsque l'utilisateur possède au moins certains droits, une réponse à cette question est calculée au cours de l'étape 107, au moyen d'un algorithme inconnu des utilisateurs et exécuté par les moyens de calcul 11. La réponse est de préférence constituée par une suite numérique ou alphanumérique ne permettant pas à un utilisateur de déterminer immédiatement si elle contient des instructions implicites pour la serrure.If the checks carried out in step 106 make it possible to determine that the question is a legitimate question transmitted at the right moment by an authorized user, the rights of this user are preferably determined. When the user has at least some rights, an answer to this question is computed during step 107, using an algorithm unknown to the users and executed by the calculation means 11. The response is preferably constituted by a numerical or alphanumerical sequence that does not allow a user to immediately determine if it contains implicit instructions for the lock.

Dans le cas contraire où la question reçue n'est pas valide, ou si elle a été transmise par un utilisateur non autorisé, ou lorsque l'utilisateur ne possède pas les droits d'accès nécessaires, ou lorsque d'autres anomalies ont été détectées, aucune réponse n'est calculée. Dans une variante, un message d'erreur informant l'utilisateur est alors transmis à l'équipement mobile 3 et affiché par ce dernier, afin par exemple de permettre à l'utilisateur de corriger une erreur de frappe lors de l'introduction de la question. Alternativement, la centrale peut fournir une réponse modifiée entraînant un comportement modifié de la serrure. La réaction de la centrale et la réponse envoyée peut aussi dépendre de l'anomalie détectée, du nombre d'essais infructueux, ou d'autres conditions.If the question is not valid, or if it was transmitted by an unauthorized user, or when the user does not have the necessary access rights, or when other anomalies have been detected, no answer is calculated. Alternatively, an error message informing the user is then transmitted to the mobile equipment 3 and displayed by the latter, for example to allow the user to correct a typing error during the introduction of the question. Alternatively, the central can provide a modified response resulting in modified behavior of the lock. The reaction of the plant and the response sent may also depend on the anomaly detected, the number of unsuccessful attempts, or other conditions.

Si la centrale détecte, par exemple à partir de la question reçue, que l'utilisateur a effectué une manipulation particulière pour indiquer qu'il est sous contrainte, elle calcule de préférence une réponse modifiée par la réponse normale, afin de provoquer un comportement particulier de la serrure. Différentes réponses modifiées peuvent être choisies automatiquement ou par des opérateurs humains selon les circonstances, afin de déclencher différentes réactions.If the control unit detects, for example from the question received, that the user has made a particular manipulation to indicate that it is under stress, it preferably calculates a response modified by the normal response, in order to cause a particular behavior. lock. Different modified responses can be chosen automatically or by human operators depending on the circumstances, in order to trigger different reactions.

D'autres informations complémentaires peuvent être codées dans la réponse, par exemple pour définir les droits d'accès de l'utilisateur à la serrure, par exemple en fonction du temps.Other additional information may be coded in the response, for example to define the user's access rights to the lock, for example as a function of time.

La réponse à la question est ensuite transmise à l'équipement mobile au cours de l'étape 108, puis affichée et lue par l'utilisateur au cours de l'étape 109. La réponse peut comporter par exemple un code numérique ou alphanumérique et est introduite par l'utilisateur 4 sur le clavier 51 de la serrure 5 au cours de l'étape 110.The answer to the question is then transmitted to the mobile equipment in step 108, then displayed and read by the user in step 109. The response may include, for example, a numeric or alphanumeric code and is introduced by the user 4 on the keypad 51 of the lock 5 during the step 110.

Au cours de l'étape 111, les moyens de calcul dans la serrure 5 vérifient si la réponse reçue est correcte. Dans une variante, cette vérification implique une comparaison avec une réponse calculée par la serrure elle-même, en exécutant le même algorithme que celui exécuté par la centrale 1. Dans une variante, la vérification de la réponse reçue est effectuée sans la recalculer indépendamment, par exemple en vérifiant la réponse reçue au moyen d'une clé de vérification permettant de distinguer la ou les réponses possibles à la question des réponses non valides, en fonction de la question et/ou d'autres paramètres. Cette variante a l'avantage de ne pas requérir de copies de l'algorithme dans une multitude de serrures disséminées sur un territoire ; elle est en outre compatible avec des algorithmes susceptibles de fournir plusieurs réponses valides à une même question.During step 111, the calculation means in the lock 5 check whether the response received is correct. In a variant, this verification involves a comparison with a response calculated by the lock itself, by executing the same algorithm as that executed by the central unit 1. In a variant, the verification of the received response is performed without recalculating it independently, for example by checking the response received by means of a verification key to distinguish the possible answer (s) to the question of invalid answers, depending on the question and / or other parameters. This variant has the advantage of not requiring copies of the algorithm in a multitude of locks scattered over a territory; it is also compatible with algorithms that can provide several valid answers to the same question.

Les moyens de calcul 5 vérifient en outre au cours de l'étape 111 si la réponse reçue tient compte d'une détection de manipulation par un utilisateur sous contrainte, ou si d'autres paramètres sont codés dans cette réponse.The calculation means 5 furthermore verify in step 111 whether the response received takes into account a manipulation detection by a user under constraint, or whether other parameters are coded in this response.

Dans une variante, l'utilisateur indique un état de contrainte à la serrure 5 lors de l'introduction de la réponse sur le clavier au cours de l'étape 110, par exemple en introduisant un chiffre supplémentaire, etc. Cette solution est cependant moins sûre car un usurpateur pourrait introduire lui-même la réponse, sans effectuer de manipulation supplémentaire. En outre la centrale n'est pas informée d'une manipulation.In a variant, the user indicates a state of constraint to the lock 5 during the introduction of the answer on the keyboard during the step 110, for example by introducing an additional digit, etc. This solution is however less secure because a usurper could introduce the answer himself, without performing any additional manipulation. In addition the central is not informed of a manipulation.

Dans une variante supplémentaire, un état de contrainte est directement détecté par la serrure 5 à partir de capteurs ou de données supplémentaires, de données transmises par le distributeur auquel la serrure est associée, ou de données directement transmises par la centrale 1.In a further variant, a state of stress is directly detected by the lock 5 from sensors or additional data, data transmitted by the distributor to which the lock is associated, or data directly transmitted by the central unit 1.

Si la serrure détermine au cours de l'étape 111 que la réponse introduite est correcte, et qu'elle ne correspond pas à un état de contrainte, la serrure est déverrouillée au cours de l'étape 112, jusqu'au prochain verrouillage manuel ou pendant une durée limitée. L'utilisateur peut ainsi accéder au volume protégé, ou à une partie de ce volume. Cet événement est protocolé dans le fichier de log, en indiquant l'heure et la durée du déverrouillage. Par ailleurs, le compteur employé pour initialiser la fonction pseudo-aléatoire est incrémenté de façon irréversible.If the lock determines during step 111 that the answer entered is correct, and that it does not correspond to a state of stress, the lock is unlocked during step 112, until the next manual lock or for a limited time. The user can thus access the protected volume, or a part of this volume. This event is logged in the log file, indicating the time and duration of the unlock. Moreover, the counter used to initialize the pseudo-random function is irreversibly incremented.

Si la serrure détermine au cours de l'étape 111 que la réponse introduite est incorrecte, la serrure reste verrouillée, et un message d'erreur peut s'afficher sur l'affichage 50. Après un nombre prédéterminé d'essais infructueux, une alarme peut être déclenchée localement ou envoyée à la centrale 1 ou vers une autre adresse prédéterminée. Dans une variante, les billets dans le distributeur sont automatiquement détruits ou marqués avec une encre indélébile.If the lock determines during step 111 that the answer entered is incorrect, the lock remains locked, and an error message may be displayed on the display 50. After a predetermined number of unsuccessful attempts, an alarm can be triggered locally or sent to Central 1 or to another predetermined address. In a variant, the tickets in the dispenser are automatically destroyed or marked with an indelible ink.

Si la serrure détermine au cours de l'étape 111 que la réponse introduite est correcte, mais qu'elle correspond à un état de contrainte, elle effectue l'une des actions suivantes selon la réponse :

  • verrouillage de la serrure, ou maintien du verrouillage, éventuellement même si une réponse correcte et introduite ultérieurement pendant une durée limitée,
  • déverrouillage normal de la serrure,
  • déverrouillage retardé de la serrure après un délai court, mais plus long que le délai usuel
  • déverrouillage retardé de la serrure après un délai long, par exemple supérieur à trois minutes,
  • affichage d'un message particulier sur l'affichage 50 de la serrure, par exemple pour indiquer à l'assaillant qu'il a été repéré.
  • déclenchement d'une alarme, par exemple une alarme sonore
  • destruction du contenu du volume protégé par la serrure, par exemple par marquage des billets au moyen d'une encre indélébile
  • etc
If the lock determines during step 111 that the answer entered is correct, but that it corresponds to a state of constraint, it performs one of the following actions depending on the answer:
  • locking the lock, or maintaining the lock, possibly even if a correct answer and subsequently introduced for a limited time,
  • normal unlocking of the lock,
  • delayed unlocking of the lock after a short delay, but longer than the usual delay
  • unlocking the lock after a long delay, for example greater than three minutes,
  • display of a particular message on the display 50 of the lock, for example to indicate to the attacker that he was spotted.
  • triggering an alarm, for example an audible alarm
  • destruction of the contents of the volume protected by the lock, for example by marking the notes with an indelible ink
  • etc.

Les deux dernières options doivent cependant être utilisées avec parcimonie pour éviter le risque que l'utilisateur légitime soit pris en otage ou victime de représailles.The latter two options should however be used sparingly to avoid the risk of the legitimate user being held hostage or retaliated.

Ces différentes mesures peuvent en outre être combinées.These different measures can also be combined.

Après l'introduction d'une réponse correcte, ou d'une réponse indiquant une manipulation, un code de quittance est de préférence affiché au cours d'une étape supplémentaire non illustrée sur l'affichage 50. L'utilisateur introduit ensuite ce code de quittance sur son équipement mobile et le transmet à la centrale 1, de la même façon que la question auparavant, afin d'indiquer à la centrale la fin de sa mission. Le code de quittance requis est de préférence unique et imprévisible à l'avance, de manière à s'assurer que l'utilisateur l'a bien lu à la suite de la manipulation et qu'il ne l'a pas déduit autrement. La centrale est cependant en mesure de vérifier si le code de quittance transmis est licite.After the introduction of a correct answer, or a response indicating a manipulation, a receipt code is preferably displayed during an additional step not shown on the display 50. The user then enters this code of a receipt on his mobile equipment and transmits it to the central 1, in the same way as the question before, in order to indicate to the central the end of his mission. The required release code is preferably unique and unpredictable in advance, so as to ensure that the user has read it correctly as a result of the manipulation and has not deduced otherwise. The central office is however able to check whether the transmitted acknowledgment code is lawful.

A nouveau, le code de quittance généré par la serrure ou réintroduit par l'utilisateur peut contenir des indications signalant à la centrale des événements particuliers, par exemple pour indiquer si la serrure a été ouverte, un nouvel état de contrainte, ou tout autre événement. Le code de quittance transmis peut en outre, de la même façon que la question auparavant, être signé, encrypté, et accompagné de données telles que la date, l'heure, l'identification d'utilisateur, d'équipement mobile, de position géographique, etc. La centrale peut ainsi vérifier ces données, ou détecter l'absence d'envoi de message de quittance après un délai prédéterminé, pour décider d'une action appropriée, y compris le déclenchement d'une alarme, le déclenchement d'une intervention, et/ou le verrouillage d'autres serrures à proximité ou sur le parcours prévu de l'utilisateur même en cas de manoeuvre correcte.Again, the release code generated by the lock or reintroduced by the user may contain indications indicating to the central particular events, for example to indicate whether the lock was opened, a new state of constraint, or any other event . In addition, the transmitted acknowledgment code can be signed, encrypted and accompanied by data such as date, time, user identification, mobile equipment, position information geographical, etc. The control unit can thus verify this data, or detect the absence of sending of a receipt message after a predetermined delay, to decide on an appropriate action, including the triggering of an alarm, the triggering of an intervention, and / or the locking of other locks nearby or on the intended course of the user even in case of correct operation.

Le code de quittance généré est de préférence, de la même façon que la question ou la réponse, dépendant de l'utilisateur en cours, de la serrure en cours et/ou d'autres paramètres tels que la date, l'heure, la détection de manipulations éventuelles.The receipt code generated is preferably, in the same way as the question or the answer, depending on the current user, the lock in progress and / or other parameters such as date, time, detection of possible manipulations.

Dans le procédé ci-dessus, une autorisation de déverrouillage d'une serrure particulière par un utilisateur particulier peut être modifiée par la centrale 1 de l'une des façons suivantes :

  • En communiquant un nouveau code personnel à l'utilisateur, par exemple par le biais d'un appel téléphonique, d'un SMS, d'un e-mail ou d'un autre message envoyé à l'équipement mobile 3, ou transmis oralement à l'utilisateur
  • En modifiant les codes personnels acceptés par les serrures 5, par exemple en envoyant de nouvelles listes de codes acceptés (liste blanche ; seulement dans la variante où ces listes sont stockées dans la serrure), de nouvelles listes de codes refusés (liste noire), de nouvelles listes de codes suspects, nécessitant des vérifications supplémentaires (liste grise), ou en modifiant les droits d'accès associés à ces codes. Les listes de codes et les droits d'accès peuvent être transmis par un canal de télécommunication au travers d'une interface de télécommunication dans la serrure, et/ou au moyen d'une interface de télécommunication liée au dispositif protégé par la serrure, ou introduit directement, au travers d'un support de données physique, par un technicien chargé de la maintenance.
  • En modifiant les codes personnels acceptés par la centrale, en fonction de listes blanches, grises ou noires, ou d'autres paramètres tels que le plan de route prévu de l'utilisateur.
  • En modifiant la réponse donnée à une question transmise par un utilisateur, ou en refusant de répondre à ces questions.
  • En envoyant un ordre directement à la serrure, par exemple un ordre de maintenir le verrouillage pendant un intervalle.
In the above method, an authorization to unlock a particular lock by a particular user can be changed by the central 1 in one of the following ways:
  • By communicating a new personal code to the user, for example by means of a telephone call, an SMS, an e-mail or another message sent to the mobile equipment 3, or transmitted orally to the user
  • By modifying the personal codes accepted by the locks 5, for example by sending new lists of accepted codes (white list, only in the variant where these lists are stored in the lock), new lists of refused codes (blacklist), new lists of suspicious codes, requiring additional checks (gray list), or by modifying the access rights associated with these codes. The code lists and the access rights may be transmitted by a telecommunication channel through a telecommunication interface in the lock, and / or by means of a telecommunication interface linked to the device protected by the lock, or introduced directly, through a physical data carrier, by a technician responsible for maintenance.
  • By modifying the personal codes accepted by the control panel, according to white, gray or black lists, or other parameters such as the user's planned route plan.
  • By modifying the answer given to a question sent by a user, or by refusing to answer these questions.
  • By sending an order directly to the lock, for example an order to hold the lock during an interval.

Par ailleurs, indépendamment du comportement de la centrale, la serrure 5 peut elle-même autoriser ou refuser le déverrouillage en fonction de paramètres acquis directement ou au travers du dispositif protégé, par exemple à l'aide de capteurs, caméras ou microphones associés à la serrure ou au dispositif, obtenus en analysant les manipulations de l'utilisateur sur le clavier 5, ou selon un historique interne des manipulations de cet utilisateur et/ou de la serrure 5.Moreover, regardless of the behavior of the central unit, the lock 5 may itself allow or refuse the unlocking as a function of parameters acquired directly or through the protected device, for example by means of sensors, cameras or microphones associated with the device. lock or device, obtained by analyzing the user's manipulations on the keyboard 5, or according to an internal history of the manipulations of this user and / or the lock 5.

Il est cependant possible, dans le cadre de l'invention, de ne prévoir qu'une partie des possibilités d'autorisation de déverrouillage mentionnées ci-dessus.It is however possible, in the context of the invention, to provide only part of the unlocking authorization possibilities mentioned above.

La serrure décrite ci-dessus peut être employée pour sécuriser des volumes autres que des distributeurs de billet, par exemple des armoires d'armes employées dans les commissariats ou par l'armée, des coffres-forts, ou d'autres volumes dont le verrouillage ou le déverrouillage par un utilisateur local doit être autorisé par une centrale à distance.The lock described above may be used to secure volumes other than ticket dispensers, for example weapon cabinets used in police stations or by the military, safes, or other volumes whose locking or unlocking by a local user must be authorized by a remote control panel.

Par ailleurs, la serrure de l'invention peut être programmée à n'importe quel moment, par exemple depuis la centrale et/ou à l'aide d'un code particulier introduit par un utilisateur à proximité, pour fonctionner dans un mode autre que le mode interactif décrit plus haut. Par exemple, il serait possible de reprogrammer cette serrure pour autoriser son déverrouillage par certains utilisateurs, ou même par tous les utilisateurs, sans établir de connexion avec la centrale.Furthermore, the lock of the invention can be programmed at any time, for example from the control panel and / or with the aid of a particular code introduced by a user nearby, to operate in a mode other than the interactive mode described above. For example, it would be possible to reprogram this lock to allow unlocking by some users, or even by all users, without establishing a connection with the central.

Claims (32)

Procédé de contrôle de verrouillage de serrure électronique (5), comportant les étapes suivantes : un utilisateur (4) s'identifie auprès de la serrure électronique, la serrure électronique (5) affiche une question, l'utilisateur transmet la question à une centrale (1), la centrale calcule la réponse à la question et transmet cette réponse à l'utilisateur, l'utilisateur introduit la réponse dans la serrure, la serrure vérifie si la réponse est correcte et décide en fonction de cette réponse du déverrouillage de la serrure. An electronic lock lock control method (5), comprising the steps of: a user (4) identifies himself with the electronic lock, the electronic lock (5) displays a question, the user transmits the question to a central (1), the central calculates the answer to the question and transmits this answer to the user, the user enters the answer in the lock, the lock checks if the answer is correct and decides according to this response of unlocking the lock. Le procédé la revendication 1, dans lequel à la fin de la manipulation un code de quittance est affiché par ladite serrure (5) et transmis par ledit utilisateur à la centrale (1) à l'aide d'un équipement mobile (3).The method of claim 1, wherein at the end of the manipulation a receipt code is displayed by said lock (5) and transmitted by said user to the central (1) using a mobile equipment (3). Le procédé de l'une des revendications 1 ou 2, dans lequel une question différente est affichée à chaque accès à la serrure.The method of one of claims 1 or 2, wherein a different question is displayed at each access to the lock. Le procédé de l'une des revendications 1 à 3, dans lequel ladite centrale vérifie si ladite question est valide.The method of one of claims 1 to 3, wherein said control panel verifies whether said question is valid. Le procédé de l'une des revendications 1 à 4, dans lequel les questions affichées dépendent desdits utilisateurs.The method of one of claims 1 to 4, wherein the displayed questions depend on said users. Le procédé de l'une des revendications 1 à 5, dans lequel ladite réponse à ladite question est calculée au moyen d'un algorithme dans ladite centrale (1),
et dans lequel ladite serrure vérifie au moyen du ou d'un algorithme exécuté dans la serrure si ladite réponse est correcte.
The method of one of claims 1 to 5, wherein said response to said question is calculated by means of an algorithm in said central (1),
and wherein said lock verifies by means of the or an algorithm executed in the lock if said response is correct.
Le procédé de l'une des revendications 1 à 6, dans lequel ledit utilisateur (4) transmet ladite réponse à ladite centrale au moyen d'une communication établie au travers d'un réseau cellulaire (2) indépendant de ladite serrure.The method of one of claims 1 to 6, wherein said user (4) transmits said response to said plant by means of a communication established through a cellular network (2) independent of said lock. Le procédé de la revendication 7, dans lequel ledit utilisateur (4) transmet ladite réponse à ladite centrale (1) au moyen d'un équipement mobile (3) apte à se connecter dans un réseau cellulaire,
ledit équipement mobile déterminant la position dudit utilisateur au moyen d'un dispositif de géolocalisation (30),
ladite position étant transmise à ladite centrale (1),
ladite centrale vérifiant ladite position avant de transmettre ladite réponse à ladite question.
The method of claim 7, wherein said user (4) transmits said response to said central (1) by means of a mobile equipment (3) able to connect in a cellular network,
said mobile equipment determining the position of said user by means of a geolocation device (30),
said position being transmitted to said central unit (1),
said central unit verifying said position before transmitting said response to said question.
Le procédé de l'une des revendications 7 à 8, ledit équipement mobile (3) mettant en oeuvre un équipement de protection de travailleur isolé (31) afin de déterminer si ledit utilisateur est vivant et/ou s'il est éveillé.The method of one of claims 7 to 8, said mobile equipment (3) employing isolated worker protection equipment (31) to determine whether said user is alive and / or awake. Le procédé de l'une des revendications 7 à 9, ledit équipement mobile (3) authentifiant ledit utilisateur au moyen d'une carte à puce, d'un code personnel et/ou de données biométriques (32).The method of one of claims 7 to 9, said mobile equipment (3) authenticating said user by means of a smart card, a personal code and / or biometric data (32). Le procédé de la revendication 10, l'identité dudit utilisateur (4) déterminée dans ledit équipement mobile (3) étant transmise à ladite centrale (1) pour vérification.The method of claim 10, the identity of said user (4) determined in said mobile equipment (3) being transmitted to said central (1) for verification. Le procédé de l'une des revendications 1 à 11, dans lequel ledit utilisateur (4) s'identifie auprès de la serrure électronique (5) au moyen d'un code personnel introduit sur un clavier (51) de la serrure (5).The method of one of claims 1 to 11, wherein said user (4) identifies with the electronic lock (5) by means of a personal code introduced on a keyboard (51) of the lock (5) . Le procédé de la revendication 12, dans lequel un nouveau code personnel est transmis par ladite centrale audit utilisateur (4.The method of claim 12, wherein a new personal code is transmitted by said central to said user (4. Le procédé de l'une des revendications 1 à 13, comportant une étape préalable de définition de droits d'accès des utilisateurs identifiées à ladite serrure.The method of one of claims 1 to 13, comprising a prior step of defining user access rights identified to said lock. Le procédé de l'une des revendications 1 à 14, dans lequel ledit utilisateur (4) effectue une manipulation particulière lors de l'introduction de ladite question dans ladite serrure lorsqu'elle souhaite signaler qu'elle est sous contrainte,
ladite centrale (1) réagissant alors en générant une réponse modifiée à ladite question, ladite réponse modifiée étant différente de la réponse générée lorsque ladite manipulation n'est pas effectuée,
ladite serrure modifiant lesdites conditions de verrouillage lorsque ledit utilisateur introduit ladite réponse modifiée.
The method of one of claims 1 to 14, wherein said user (4) performs a particular manipulation when introducing said question in said lock when it wishes to signal that it is under stress,
said central unit (1) then reacts by generating a modified response to said question, said modified response being different from the response generated when said manipulation is not performed,
said lock modifying said lock conditions when said user introduces said modified response.
Le procédé de la revendication 15, dans lequel ladite centrale (1) choisit une réponse modifiée parmi plusieurs lorsqu'une dite manipulation a été détectée, l'introduction d'au moins certaines des différentes réponses modifiées provoquant au moins certains des comportements suivants : maintien du verrouillage de la serrure (5) ; temporisation du déverrouillage de la serrure (5) ; affichage d'un message sur l'affichage (50) de ladite serrure (5) ; déclenchement d'une alarme ; destruction ou marquage du contenu du dispositif protégé par ladite serrure (5). The method of claim 15, wherein said central (1) selects one of a plurality of modified response when said manipulation has been detected, introducing at least some of the different modified responses causing at least some of the following behaviors: maintaining the lock of the lock (5); unlocking delay of the lock (5); displaying a message on the display (50) of said lock (5); triggering an alarm; destruction or marking of the contents of the device protected by said lock (5). Le procédé de l'une des revendications 2 à 16, dans lequel un code de quittance différent est affiché à la fin de chaque manipulation.The method of one of claims 2 to 16, wherein a different release code is displayed at the end of each manipulation. Le procédé de l'une des revendications 2 à 17, dans lequel ledit code de quittance dépend de l'utilisateur en cours, de l'ouverture de la serrure, de la serrure en cours, de la date, de l'heure, et/ou de la détection de manipulations éventuelles.The method of one of claims 2 to 17, wherein said release code is dependent on the current user, the opening of the lock, the current lock, the date, the time, and / or the detection of possible manipulations. Serrure électronique (5) comportant : des moyens d'introduction de données (51) pour l'introduction d'un code d'identification personnel, un module pour générer puis afficher une question en réponse à l'introduction d'un code d'identification personnel, un module pour vérifier si une réponse à ladite question introduite sur ledit clavier est correcte, et pour provoquer le déverrouillage de ladite serrure en cas de réponse correcte. Electronic lock (5) comprising: data entry means (51) for the introduction of a personal identification code, a module to generate and then display a question in response to the introduction of a personal identification code, a module for checking whether a response to said question entered on said keyboard is correct, and for causing the unlocking of said lock in case of correct answer. La serrure de la revendication 19, comportant des moyens pour générer et afficher un code de quittance après une tentative de déverrouillage.The lock of claim 19 including means for generating and displaying a release code after an unlocking attempt. La serrure de l'une des revendications 19 à 20, comportant des moyens pour vérifier la plausibilité dudit code personnel, lesdits moyens étant dépourvus de liste d'utilisateurs autorisés.The lock of one of claims 19 to 20, comprising means for verifying the plausibility of said personal code, said means being devoid of a list of authorized users. La serrure de l'une des revendications 19 à 21, comportant des moyens pour détecter des manipulations de l'utilisateur, ladite question générée étant modifiée lorsqu'une telle manipulation a été détectée.The lock of one of claims 19 to 21 including means for detecting manipulations of the user, said generated question being modified when such manipulation has been detected. La serrure de l'une des revendications 19 à 22, comportant des moyens pour temporiser le déverrouillage de la serrure selon la réponse introduite.The lock of one of claims 19 to 22, comprising means for delaying the unlocking of the lock according to the response introduced. La serrure de l'une des revendications 19 à 23, comportant un fichier de log pour répertorier les événements provoqués par lesdits utilisateurs.The lock of one of claims 19 to 23, comprising a log file for listing the events caused by said users. La serrure de l'une des revendications 19 à 24, comportant une horloge alimentée en permanence pour déterminer l'heure et la date.The lock of one of claims 19 to 24, including a clock fed continuously to determine the time and date. La serrure de l'une des revendications 19 à 25, comportant un compteur incrémentable de façon irréversible pour initialiser une fonction pseudo-aléatoire employée pour générer ladite question.The lock of one of claims 19 to 25, comprising an irreversibly incrementable counter for initializing a pseudo-random function employed to generate said question. La serrure de l'une des revendications 19 à 26, comportant une interface pour échanger des données avec un dispositif protégé par ladite serrure.The lock of one of claims 19 to 26, comprising an interface for exchanging data with a device protected by said lock. La serrure de l'une des revendications 19 à 27, comportant une interface pour échanger des données avec une centrale à distance.The lock of one of claims 19 to 27, comprising an interface for exchanging data with a remote control unit. Procédé pour une centrale (1) de gestion de parc de serrures électroniques, comportant les étapes de : distribution de codes personnels à une pluralité d'utilisateurs (4) afin de leur permettre de s'identifier envers au moins certaines desdites serrures, détermination des droits d'accès de chaque utilisateur (4) à chaque serrure (5), réception d'une question transmise par un dit utilisateur au travers d'un réseau de télécommunication (2), vérification de la plausibilité de ladite question, calcul d'une réponse à ladite question au moyen d'un algorithme confidentiel, transmission de ladite réponse audit utilisateur. Method for an electronic lock park management center (1), comprising the steps of: distributing personal codes to a plurality of users (4) in order to enable them to identify themselves with at least some of said locks, determination of the access rights of each user (4) to each lock (5), receiving a question transmitted by a said user through a telecommunication network (2), verification of the plausibility of the said question, calculating a response to said question by means of a confidential algorithm, transmitting said response to said user. Le procédé de la revendication 29, dans lequel ledit algorithme est différent pour chaque utilisateur (4).The method of claim 29, wherein said algorithm is different for each user (4). Le procédé de l'une des revendications 29 ou 30, comportant une étape de détection d'indications dans ladite question que ledit utilisateur (4) est sous contrainte, et de modification de ladite réponse dans ce cas.The method of one of claims 29 or 30, comprising a step of detecting indications in said question that said user (4) is under stress, and modifying said response in this case. Le procédé de l'une des revendications 29 à 31, comportant une étape de vérification de la position géographique dudit utilisateur à l'aide d'informations transmises par ce dernier.The method of one of claims 29 to 31, including a step of verifying the geographical position of said user with information transmitted by the latter.
EP05109900.0A 2005-10-24 2005-10-24 Procedure for control of interlock and lock Active EP1780680B1 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
ES05109900.0T ES2664947T3 (en) 2005-10-24 2005-10-24 Lock lock and lock control procedure
EP05109900.0A EP1780680B1 (en) 2005-10-24 2005-10-24 Procedure for control of interlock and lock
CN2006800397857A CN101297327B (en) 2005-10-24 2006-10-19 Procedure for control of interlock and lock
AU2006307977A AU2006307977B2 (en) 2005-10-24 2006-10-19 Method for controlling the locking of a lock, and lock
PCT/EP2006/067589 WO2007048749A1 (en) 2005-10-24 2006-10-19 Method for controlling a lock locking state and a lock
ZA200803528A ZA200803528B (en) 2005-10-24 2006-10-19 Method for controlling the locking of a lock, and lock
MYPI20081235A MY149673A (en) 2005-10-24 2006-10-19 Method for controlling the locking of a lock, and lock
US12/104,967 US20090320538A1 (en) 2005-10-24 2008-04-17 Method for controlling the locking of a lock, and lock
HK09103516A HK1125727A1 (en) 2005-10-24 2009-04-16 Method for controlling a lock locking state and a lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP05109900.0A EP1780680B1 (en) 2005-10-24 2005-10-24 Procedure for control of interlock and lock

Publications (2)

Publication Number Publication Date
EP1780680A1 true EP1780680A1 (en) 2007-05-02
EP1780680B1 EP1780680B1 (en) 2018-01-17

Family

ID=35840136

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05109900.0A Active EP1780680B1 (en) 2005-10-24 2005-10-24 Procedure for control of interlock and lock

Country Status (9)

Country Link
US (1) US20090320538A1 (en)
EP (1) EP1780680B1 (en)
CN (1) CN101297327B (en)
AU (1) AU2006307977B2 (en)
ES (1) ES2664947T3 (en)
HK (1) HK1125727A1 (en)
MY (1) MY149673A (en)
WO (1) WO2007048749A1 (en)
ZA (1) ZA200803528B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010097178A1 (en) * 2009-02-25 2010-09-02 Rittal Gmbh & Co. Kg Access control device
WO2010134053A1 (en) * 2009-05-21 2010-11-25 Hakan Gurel An authentication system
CN106056713A (en) * 2016-06-08 2016-10-26 珠海明居智能科技有限公司 Remote authorization method for combination locks

Families Citing this family (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5012247B2 (en) * 2007-06-21 2012-08-29 ソニー株式会社 Authentication device, entrance management device, entrance / exit management device, entrance management system, entrance / exit management system, authentication processing method and program
EP2313870B1 (en) * 2008-06-30 2013-12-04 Telecom Italia S.p.A. Method and system for communicating access authorization requests based on user personal identification as well as method and system for determining access authorizations
US9058474B2 (en) * 2008-12-11 2015-06-16 Northrop Grumman Systems Corporation Biometric device, system, and method for individual access control
US8542119B2 (en) * 2009-01-13 2013-09-24 Invue Security Products Inc. Combination non-programmable and programmable key for security device
US8797138B2 (en) * 2009-01-13 2014-08-05 Utc Fire & Security Americas Corporation, Inc. One-time access for electronic locking devices
US20110050419A1 (en) * 2009-08-26 2011-03-03 Kwanyuen Ng Remote Intrusion Signaling Security System
CN101866409B (en) * 2010-05-11 2015-04-01 中兴通讯股份有限公司 Method and device for locking and unlocking handheld equipment
US20110298584A1 (en) * 2010-06-04 2011-12-08 Kent Biggs Securing a cash safe with a circuit
EP2405650A1 (en) * 2010-07-09 2012-01-11 Nagravision S.A. A method for secure transfer of messages
KR20120058199A (en) * 2010-11-29 2012-06-07 한국전자통신연구원 User authentication method using location information
US9122856B2 (en) * 2010-12-01 2015-09-01 Hid Global Corporation Updates of biometric access systems
EP2689399B1 (en) * 2011-03-24 2016-11-16 Recludo AB Standalone biometric authorization control device and method
CN102360477A (en) * 2011-06-09 2012-02-22 闵浩 Fingerprint coded lock control management system based on fingerprint identification technology and mobile communication technology and method thereof
US8856893B2 (en) 2011-06-09 2014-10-07 Hao Min System and method for an ATM electronic lock system
CN102324152A (en) * 2011-06-09 2012-01-18 闵浩 Electronic lock control and management system and method based on identity recognizing technology and mobile communication technology
WO2013034671A1 (en) * 2011-09-09 2013-03-14 Param Technologies Corporation, S.L. Apparatus and method for controlling the access of a visitor to a premises
CN103021045A (en) * 2011-09-25 2013-04-03 边高伟 Intelligent entrance guard system for mobile terminal user verification
US20130090939A1 (en) * 2011-10-11 2013-04-11 Robert N. Robinson Sytem and method for preventing healthcare fraud
US20130090942A1 (en) * 2011-10-11 2013-04-11 Safe-Link, Llc Sytem and method for preventing healthcare fraud
CN102346945A (en) * 2011-10-28 2012-02-08 闵浩 Control system and method of electronic lock based on bidirectional encryption authentication technique and communication technique
CN102493722B (en) * 2011-12-05 2014-04-09 西安大唐电信有限公司 Electronic lock application system for vehicle transportation and locking and unlocking method
CN104282068A (en) * 2012-03-15 2015-01-14 江苏省电力公司常州供电公司 Permission device for error prevention locks of substation
MX342113B (en) 2012-08-16 2016-09-14 Schlage Lock Co Llc Wireless electronic lock system and method.
CN102855427B (en) * 2012-08-31 2016-03-02 小米科技有限责任公司 A kind of equipment unlock method, device and subscriber equipment
CN103941971A (en) * 2013-01-17 2014-07-23 深圳富泰宏精密工业有限公司 Screen unlocking method and system
US20140279511A1 (en) * 2013-03-14 2014-09-18 Moneygram International, Inc. Systems and Methods for Management of Local Devices
AU2014237417B2 (en) 2013-03-15 2016-05-12 Assa Abloy Americas Residential Inc. Wireless lockset with integrated antenna, touch activation and light communication device
EP2976753A2 (en) 2013-03-18 2016-01-27 SES Solutions GmbH Method for transferring transport goods in a lockable transport container, lockable transport container, and transport system
CN103761966A (en) * 2013-12-25 2014-04-30 苏州市邦成电子科技有限公司 Voice unlocking system
US9894066B2 (en) 2014-07-30 2018-02-13 Master Lock Company Llc Wireless firmware updates
US9996999B2 (en) 2014-07-30 2018-06-12 Master Lock Company Llc Location tracking for locking device
US9600949B2 (en) 2014-07-30 2017-03-21 Master Lock Company Llc Wireless key management for authentication
US9489787B1 (en) * 2014-08-08 2016-11-08 Live Nation Entertainment, Inc. Short-range device communications for secured resource access
US10008057B2 (en) 2014-08-08 2018-06-26 Live Nation Entertainment, Inc. Short-range device communications for secured resource access
KR102422372B1 (en) * 2014-08-29 2022-07-19 삼성전자 주식회사 Authentication method and device using biometric information and context information
US20160116510A1 (en) 2014-10-27 2016-04-28 Master Lock Company Predictive battery warnings for an electronic locking device
CN104916022A (en) * 2015-06-16 2015-09-16 广州杰赛科技股份有限公司 Intelligent lock control method, mobile terminal and intelligent lock system
US9852562B2 (en) * 2015-07-06 2017-12-26 Acsys Ip Holding, Inc. Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons
CN105069874B (en) * 2015-07-28 2018-08-03 北京航空航天大学 A kind of mobile Internet sound-groove gate inhibition system and its implementation
CN105225317A (en) * 2015-10-03 2016-01-06 上海大学 A kind of network access control system of multichannel centralized management
CN105577805A (en) * 2015-12-29 2016-05-11 宁波艾谱实业有限公司 Remote control method of safe box and control system for realizing the method
US9984524B2 (en) * 2016-01-26 2018-05-29 Acsys Ip Holding Inc Systems and methods for remote access rights and verification
WO2017165349A1 (en) 2016-03-22 2017-09-28 Spectrum Brands, Inc. Garage door opener with touch sensor authentication
AU2017267543A1 (en) 2016-05-17 2019-01-17 Peter Just Access system and container for communal objects
CN106023373A (en) * 2016-05-23 2016-10-12 三峡大学 Big data and human face identification based access control system for school dormitory
CN105939193A (en) * 2016-06-22 2016-09-14 武汉市天晨翔云数据有限公司 Authorization and encryption method for controlling blacklist setting of intelligent lock
TWI745456B (en) 2016-10-19 2021-11-11 美商貝斯特艾瑟斯解決方案股份有限公司 Electromechanical core apparatus, system, and methods of operating an electromechanical core apparatus
CN106773757A (en) * 2016-12-13 2017-05-31 广东美的制冷设备有限公司 Intelligent apparatus and home appliance
EP3361457B1 (en) * 2017-02-13 2023-07-12 Diebold Nixdorf Systems GmbH Input means, cash maschine and method
JP2018180624A (en) * 2017-04-04 2018-11-15 グローリー株式会社 Currency processor, currency processing system and currency processing method
EP3679207B1 (en) 2017-09-08 2022-08-03 Dormakaba USA Inc. Electro-mechanical lock core
CN108182739A (en) * 2017-12-21 2018-06-19 广东汇泰龙科技有限公司 It is a kind of that unlocking method, system are locked based on the cloud of iris recognition and Bluetooth function
US11450158B2 (en) 2018-01-05 2022-09-20 Spectrum Brands, Inc. Touch isolated electronic lock
EP3775445A4 (en) 2018-04-13 2022-01-05 Dormakaba USA Inc. Electro-mechanical lock core
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
CN109190366B (en) * 2018-09-14 2021-11-19 郑州云海信息技术有限公司 Program processing method and related device
US11639617B1 (en) 2019-04-03 2023-05-02 The Chamberlain Group Llc Access control system and method
US20200372743A1 (en) * 2019-05-20 2020-11-26 Popid, Inc. Face based door entry
GB2590357B (en) * 2019-11-28 2022-12-21 Paxton Access Ltd Access control system and method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0546701A2 (en) 1991-12-09 1993-06-16 Brink's Incorporated Apparatus and method for controlled access to secured location
US5259029A (en) * 1990-05-16 1993-11-02 Duncan Jr F Jeff Decoding device for computer software protection
US5367572A (en) * 1984-11-30 1994-11-22 Weiss Kenneth P Method and apparatus for personal identification
EP0935041A1 (en) * 1998-02-09 1999-08-11 Christian Martineau Apparatus and method for physical or logical access control
WO2001003078A1 (en) * 1999-07-05 2001-01-11 Hoeili Jens Petter Method and system for payment transaction
WO2001059725A1 (en) * 2000-02-08 2001-08-16 Siemens Aktiengesellschaft Method for controlling the identity of users
EP1281588A2 (en) * 2001-08-01 2003-02-05 Siemens Aktiengesellschaft Method for transmitting an opening or a locking code and associated units
US20030231103A1 (en) * 2002-06-14 2003-12-18 Fisher Scott R. Electronic lock system and method for its use with card only mode

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8813730D0 (en) * 1988-06-10 1988-07-13 Omni Services Ltd Time defence system
US5774058A (en) * 1995-07-20 1998-06-30 Vindicator Corporation Remote access system for a programmable electronic lock

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5367572A (en) * 1984-11-30 1994-11-22 Weiss Kenneth P Method and apparatus for personal identification
US5259029A (en) * 1990-05-16 1993-11-02 Duncan Jr F Jeff Decoding device for computer software protection
EP0546701A2 (en) 1991-12-09 1993-06-16 Brink's Incorporated Apparatus and method for controlled access to secured location
EP0935041A1 (en) * 1998-02-09 1999-08-11 Christian Martineau Apparatus and method for physical or logical access control
WO2001003078A1 (en) * 1999-07-05 2001-01-11 Hoeili Jens Petter Method and system for payment transaction
WO2001059725A1 (en) * 2000-02-08 2001-08-16 Siemens Aktiengesellschaft Method for controlling the identity of users
EP1281588A2 (en) * 2001-08-01 2003-02-05 Siemens Aktiengesellschaft Method for transmitting an opening or a locking code and associated units
US20030231103A1 (en) * 2002-06-14 2003-12-18 Fisher Scott R. Electronic lock system and method for its use with card only mode

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010097178A1 (en) * 2009-02-25 2010-09-02 Rittal Gmbh & Co. Kg Access control device
RU2519461C2 (en) * 2009-02-25 2014-06-10 Ритталь Гмбх Унд Ко.Кг Access control device
US8779891B2 (en) 2009-02-25 2014-07-15 Rittal Gmbh & Co. Kg Access control device
WO2010134053A1 (en) * 2009-05-21 2010-11-25 Hakan Gurel An authentication system
CN106056713A (en) * 2016-06-08 2016-10-26 珠海明居智能科技有限公司 Remote authorization method for combination locks
CN106056713B (en) * 2016-06-08 2019-02-15 珠海明居智能科技有限公司 A kind of remote-authorization method of coded lock

Also Published As

Publication number Publication date
MY149673A (en) 2013-09-30
AU2006307977B2 (en) 2012-03-01
ES2664947T3 (en) 2018-04-24
CN101297327A (en) 2008-10-29
WO2007048749A1 (en) 2007-05-03
CN101297327B (en) 2013-04-03
ZA200803528B (en) 2009-08-26
HK1125727A1 (en) 2009-08-14
EP1780680B1 (en) 2018-01-17
US20090320538A1 (en) 2009-12-31
AU2006307977A1 (en) 2007-05-03

Similar Documents

Publication Publication Date Title
EP1780680B1 (en) Procedure for control of interlock and lock
ES2255111T3 (en) METHOD AND SYSTEM TO GUARANTEE THE SECURITY OF TELEPHONE CALL MANAGEMENT CENTERS.
KR101117314B1 (en) Portable telecommunications apparatus
EP3420172B1 (en) Secure housing with predetermined contents and dynamic management
EP0950303B1 (en) Method and system for ensuring the security of the remote supply of services of financial institutions
EP2720199B1 (en) Secured method for controlling the opening of locking devices by means of messages using symmetric encryption
EP1549011A1 (en) Communication method and system between a terminal and at least a communication device
FR2926938A1 (en) METHOD OF AUTHENTICATING AND SIGNING A USER TO AN APPLICATION SERVICE USING A MOBILE PHONE AS A SECOND FACTOR IN COMPLEMENT AND INDEPENDENTLY OF A FIRST FACTOR
CN102084369A (en) System for monitoring the unauthorized use of a device
JP4104171B2 (en) Security system and method for services provided by telecommunications operators
WO2013079848A1 (en) Method for the mutual authentication of entities having previously initiated an online transaction
EP2987124B1 (en) Method and system for improving the security of electronic transactions
EP1813052B1 (en) Method of securing transactions performed remotely over an open communication network
FR2944400A1 (en) METHOD OF AUTHENTICATING A SERVER FROM A USER OF A MOBILE DEVICE
CN111143889B (en) Block chain-based stimulant detection information management method, device and equipment
FR3002670A1 (en) METHOD AND SYSTEM FOR CRYPTOGRAPHIC PROCESSING USING SENSITIVE DATA
CN114079666A (en) Equipment control system, method and device
WO2016135419A1 (en) Method of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers
EP0935041A1 (en) Apparatus and method for physical or logical access control
FR2788154A1 (en) Secure data exchange for electronic or internet payments
FR3081663A1 (en) METHOD FOR REMOTELY MANAGING THE OPENING OF AN ELECTRONIC LOCK WITH A USER INTERFACE, TERMINAL, LOCK AND COMPUTER PROGRAM
WO2007113669A1 (en) Method for securing electronic transactions on an open network
WO2017005644A1 (en) Method and system for controlling access to a service via a mobile media without a trusted intermediary
WO2012022856A1 (en) Method of authenticating a user of the internet network
AU2004323374A1 (en) Authentication system and method based upon random partial digitized path recognition

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK YU

17P Request for examination filed

Effective date: 20071009

AKX Designation fees paid

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

17Q First examination report despatched

Effective date: 20120604

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20170503

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAJ Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR1

GRAL Information related to payment of fee for publishing/printing deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR3

INTC Intention to grant announced (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: DORMAKABA SCHWEIZ AG

GRAR Information related to intention to grant a patent recorded

Free format text: ORIGINAL CODE: EPIDOSNIGR71

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

INTG Intention to grant announced

Effective date: 20171207

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: FRENCH

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602005053387

Country of ref document: DE

Ref country code: AT

Ref legal event code: REF

Ref document number: 964898

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180215

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: P&TS SA, CH

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2664947

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20180424

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 964898

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180117

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180417

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180517

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602005053387

Country of ref document: DE

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 14

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

26N No opposition filed

Effective date: 20181018

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181024

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181024

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180117

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20051024

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20221019

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: TR

Payment date: 20221020

Year of fee payment: 18

Ref country code: FI

Payment date: 20221020

Year of fee payment: 18

Ref country code: DE

Payment date: 20221019

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20221026

Year of fee payment: 18

Ref country code: BE

Payment date: 20221019

Year of fee payment: 18

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20231020

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: ES

Payment date: 20231222

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20231026

Year of fee payment: 19

Ref country code: FR

Payment date: 20231023

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 20231019

Year of fee payment: 19