EP2306407A1 - Secure system for programming electronically controlled lock devices using encoded acoustic verifications - Google Patents
Secure system for programming electronically controlled lock devices using encoded acoustic verifications Download PDFInfo
- Publication number
- EP2306407A1 EP2306407A1 EP09170475A EP09170475A EP2306407A1 EP 2306407 A1 EP2306407 A1 EP 2306407A1 EP 09170475 A EP09170475 A EP 09170475A EP 09170475 A EP09170475 A EP 09170475A EP 2306407 A1 EP2306407 A1 EP 2306407A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- acoustic
- accreditation
- data
- cac
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00801—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by acoustic waves
Definitions
- the invention relates to lock devices electrically controlled by means of a dematerialized and encrypted key, this key being able to be conveyed by a portable object held by the user such as a magnetic card, a smart card, a badge or a card. contactless card, etc.
- lock device is meant not only a lock stricto sensu, that is to say a mechanism placed for example on a door to condemn the opening, but also any device to achieve a comparable result, for example a lock gun considered in isolation, or a more specific locking device comprising various members not grouped in the same lock box, the ultimate goal being to obtain the conviction by mechanical means of physical access to a place or given space, and access to this place or space by unlocking the lock device, on the order of a user, after verification that this user has access rights (i) that are specific to him and (ii) who are specific to the lock device.
- the lock device may also include, or be associated with, an alarm system that is to disable to allow access to a given space, or conversely activate to protect this space before or after the to have left.
- the portable object when approached from the lock, acts as a key for ordering the opening by means of a given hereinafter "certification” (credential).
- certification credential
- Various coding and encryption techniques can be implemented in the lock and / or in the portable object to provide protection against fraudulent manipulations and secure communication between the portable object and the lock.
- Numerous magnetic card systems are known, or cards or badges with microcircuit implementing with the lock a galvanic coupling (smart card contacts) or non-galvanic (inductive coupling card or RFID type card). This coupling ensures between lock and badge communication allowing in particular the lock to read in the memory of the badge accreditation data to control the opening if this data is recognized as compliant.
- Another drawback is related to the variety of techniques used, each manufacturer having its own specifications both at the level of the physical layer (technological choice of coupling: inductive, RF, magnetic, galvanic, etc.) at the level of format of the data and protocols for exchanging this data between the reader and the portable object.
- This variety of techniques linked to technological choices and implementations specific to different manufacturers, is a brake on interoperability, the standardization of materials and procedures and technological evolution, which prevents the rapid spread of these techniques, despite their indisputable advantages.
- the system is a fixed system, because if one wishes to update the authorizations, to delete existing authorizations or to create new ones, it is necessary either to proceed to the exchange of the portable object, or to update the memory of the latter by means of a protocol and / or a specific reader, with the need for physical manipulations and displacements.
- One of the aims of the invention is to propose an alternative technique of management and control of locks that can complement the existing techniques, or even replace them, without requiring substantial changes in both hardware and software, and which offers a maximum level of security, a great flexibility of implementation and is usable without recourse to a specific portable object.
- the technique of the invention can be used by means of any conventional mobile phone serving the portable object carrying the key to control the lock, without the user needs to use a specific and dedicated portable object, such as a badge or card.
- the system of the invention can thus be immediately generalized to the greatest number, being usable by anyone from a telephone standard model, unmodified, but enjoying all the security and flexibility of modern cryptographic techniques.
- the technique of the invention will allow to adapt without major modification the existing locks, without having to replace the hardware elements or the software already integrated in the lock. It will be seen that the invention is perfectly compatible with the pre-existing techniques implemented by the various current manufacturers, insofar as it limits the intervention to a single layer of the communication protocol (the transmission of the accreditation to the lock), thus maintaining the same logical management of the different levels of security already provided by the manufacturer.
- the principle of the invention is based on the use, for the transmission of the accreditation data to the lock, encrypted acoustic accreditations type information.
- acoustic accreditations are for example in the form of a coded series of tones (DTMF tones or other), emitted by the speaker of a transmitting device and picked up by the microphone of a receiving device.
- DTMF tones coded series of tones
- the present invention consists in translating, at the level of a secure site, the conventional accreditation used for access management (a data block comprising a manufacturer's identifier, a unique identifier of the lock and possibly additional information ) and translate them into an encrypted acoustic accreditation format.
- This acoustic accreditation is in the form of an audio signal that can be conveyed by audio transmission channels, including telephone transmission channels, and reproduced as such by acoustic transducers.
- the acoustic accreditation is sent in this manner to the mobile phone of the user, which is listed in a database of the secure site.
- the user approaches his phone lock and triggers the transmission by the speaker of his phone in the series of tones corresponding to encrypted acoustic accreditation, so that these tones can be captured by a microphone incorporated or coupled to the lock.
- the latter operates a translation inverse of the acoustic accreditation allowing to restore the original format of the conventional accreditation, which is then applied to the circuits of the lock to be treated in the same way as if this accreditation had been read by a standard reader coupled to the lock (magnetic or smart card reader, inductive coupling reader or RFID, etc.).
- This document describes a technique for securing logical access to a computer network by a remote terminal, for example by a computer connected to this network via the Internet.
- the user connects to the network with his computer, simultaneously lights his mobile phone, and calls through it a control site interfaced with the network to which access is requested.
- the network sends a sound signal (Acoustic Accreditation) to the remote computer that has just connected, a signal that is reproduced by the speaker of the computer.
- This sound signal is picked up by the telephone, transmitted to the remote control site via the mobile telephone network operator and "listened to" by the control site, who can then check accreditation and authorize access to the computer network by the terminal.
- the acoustic accreditation is captured by the microphone of the phone which retransmits it to the control site. Knowing the recipient of the phone call, the control site can identify the user through the mobile phone used for this operation, and thus allow logical access to the network by the terminal located near the phone identified.
- the encrypted acoustic accreditations are on the contrary “downward” accreditations, that is to say that they come from a remote management site and transmitted to the mobile phone of the user.
- the invention relates, in a manner known per se, to a secure locking device opening control system, comprising at least one lock device provided with electronic circuits. for the conditional control of mechanical locking / unlocking devices from digital accreditation data.
- This lock device comprises means for recognizing, analyzing and authenticating said digital accreditation data, and means for controlling the unlocking of the mechanical members on recognition of conforming digital accreditation data.
- the system also comprises a mobile phone available to a user authorized to open the lock device, a remote manager site, and a mobile network operator.
- the management site comprises a database of authorized users, with for each user an identifier associated with a mobile telephone number, means for receiving, as input, digital accreditation data suitable for allowing the opening of specific lock devices.
- an encrypted acoustic accreditation generator comprising means for converting the digital accreditation data into encrypted acoustic accreditations in the form of single-use audio signals.
- the mobile network operator is coupled to the management site and to the mobile telephone, with means for securely transmitting the encrypted acoustic accreditations from the management site to the mobile telephone of the user, the telephone comprising an electro-acoustic transducer able to reproduce these accreditations. acoustic numbers.
- the system of the invention is also characterized in that the lock device comprises an acoustic module comprising an electro-acoustic transducer capable of capturing encrypted acoustic accreditations reproduced by the transducer of the telephone previously placed near the lock device.
- the acoustic module further comprises means for extracting the digital accreditation data from the encrypted acoustic accreditations captured by the transducer, and means for applying to the recognition, analysis and authentication means the digital accreditation data. thus extracted.
- the encrypted acoustic accreditation produced by the acoustic accreditation generator comprises a field resulting from the conversion of the digital accreditation data, and a variable field, with different content for each encrypted acoustic accreditation generated.
- This variable field can in particular be a sequence number or a time stamp, in which case the acoustic module also comprises means for storing, at each use, the sequence number or timestamp of the encrypted acoustic accreditation which has enabled the unlocking of the mechanical members. , and to compare and verify the conformity of the sequence number or the timestamp of any subsequent encrypted acoustic accreditation.
- the digital accreditation data may be: data from the management site database, the latter also memorizing lock device information, with for each lock device an associated unique identifier, a list of authorized users with corresponding data of access rights, and possibly additional information; data transmitted online to the management site by a third party site; data transmitted offline, in batches, to the management site by a third party site; data delivered by a reader coupled to a physical medium storing the digital accreditation data; and combinations of the above data.
- the acoustic module further comprises means for producing acoustic signals in return, on digital data acquisition accreditation, and an electro-acoustic transducer adapted to reproduce these acoustic signals back.
- These may include a time stamp issued during, or immediately after, the receipt of acoustic accreditation, the marker being issued at a time corresponding to a predetermined temporal position, specific to the lock device, with respect to acoustic accreditation .
- the acoustic module further comprises means for defining an additional parameter for transmitting the accreditation, means for, prior to any acoustic accreditation broadcast, producing an acoustic message coded by said additional parameter, and an electro-acoustic transducer capable of reproducing this acoustic message.
- the telephone comprises, for its part, an electro-acoustic transducer capable of capturing the acoustic message, and means for transmitting to the management site a message coded by this acoustic message.
- the encrypted acoustic accreditation produced by the acoustic accreditation generator includes the additional parameter, and the acoustic module also includes means for verifying the compliance of the additional parameter included in the acoustic accreditation received.
- This additional parameter can be a password generated by the acoustic module and added as a variable field to the acoustic accreditation produced by the cryptographic generator. It can also be a time offset applied to the emission of the acoustic accreditation produced by the cryptographic generator.
- One of the essential elements of the invention is a secure management site 10 centralizing in a database DB 12 information to identify and identify a number of locks and authorized users for each of these locks. For each user, the database lists a unique mobile phone number associated with this user, as well as access right data and conditions of use (access reserved for certain days or certain time slots, expiry date right of access, etc.).
- the database also lists for each lock a Unique IDentifier (UID) that is uniquely assigned and uniquely identifies the lock in the various data exchange protocols.
- UID Unique IDentifier
- Other data may also be stored by the database, including the algorithms used by the lock, one or more cryptographic keys, a simplified free name ("entry”, “garage”, “cellar”, etc.) to facilitate the selection by a user of one of several locks, etc.
- the management site 10 also comprises a cryptographic engine forming a generator 14 of accreditation data.
- the "accreditation data" are encrypted acoustic accreditations or CAC (Crypto Acoustic Credential) in the form of single-use audio signals, for example (but not limited to) made of a succession of dual DTMF tones. These audio signals are designed so that they can be conveyed after digitization by telephone audio transmission channels and reproduced as such by acoustic transducers.
- the site manager 10 is coupled to a network 16 of a mobile network operator MNO (Mobile Network Operator) via an audio telephone gateway PGW (Phone GateWay) 18 and a secure connection 20, e.g. IP link type https , so as to convey acoustic accreditations from the generator 14 to telephone 22 of the user through the audio transmission channels (voice channel) of the mobile network.
- MNO Mobile Network Operator
- PGW Packet GateWay
- secure connection 20 e.g. IP link type https
- the mobile telephone network 16 is used in a conventional manner by its various subscribers, each user being in possession of a mobile phone 22 of his own, individualized by the information of the SIM card contained in the telephone set or by another unique feature if the phone operates without a SIM card.
- a user is recognized and identified by the network 16 by means of his subscriber number, and therefore in the same way by the management site 10.
- Securing the link between the network 16 and the mobile phone 22 can be operated via a trusted service provider or TSM ( Trusted Service Manager ), able to ensure efficiently and safely the various procedures that the description will be exchange or transmission of information between the management site 10 and the mobile phone 22 via the mobile network operator 16.
- TSM Trusted Service Manager
- the object used is a mobile phone, so a trivialized object. But it is recognized and authenticated by the SIM card it contains (or by another single element) and which, above all, identifies the user via his phone number (subscriber number).
- the management site 10 can thus identify a telephone to which it has been connected via the mobile network operator 16 as being that of the authorized user, listed in his database 12.
- the implementation of the invention involves reproducing by the speaker 24 of the mobile telephone 22, as an audio signal, the encrypted acoustic accreditation generated by the cryptographic generator 14 and transmitted as a voice signal by the intermediary of the telephone gateway 18 and the operator of the mobile network 16.
- Accreditation reproduced by the speaker 24 of the mobile phone is intended to be picked up by a microphone 26 of a lock 28 so as to control the opening of this lock. It's about allowing the user, holder of the mobile phone number 22 known from the database 12, to prove to the lock 28 that he has the identity that he proclaims, and that he has the rights of access allowing the opening of this lock.
- the reproduced sound signal thus constitutes a proof of the user's identity and of his opening rights, hence the terminology "acoustic accreditation”.
- This acoustic accreditation is also encrypted (by cryptographic means in themselves known), and it is disposable to avoid any fraud by recording and duplication, otherwise it would be very easy to record the acoustic signal and then reproduce it at will.
- the Figure 2 illustrates in the form of block diagram the main organs of the mobile telephone 22 and the lock 28.
- the telephone 22 comprises a microcontroller 30 coupled to various peripheral devices such as a transmission / reception circuit 32, a display 34, a keyboard 36, a data memory 38, a corresponding UICC card ( Universal In-tegrated circuit card). the "SIM card” for GSM telephony functions) 40, and the acoustic transducer 24.
- peripheral devices such as a transmission / reception circuit 32, a display 34, a keyboard 36, a data memory 38, a corresponding UICC card ( Universal In-tegrated circuit card). the "SIM card” for GSM telephony functions) 40, and the acoustic transducer 24.
- Various precautions may be provided to increase the security of the process, in particular by an additional validation requested by the user, for example the input of a personal code of the "PIN code” type, or a validation of biometric type, by a biometric reader incorporated in the telephone or by means of a voice recognition system using the telephone microphone (the specific biometric fingerprint that can be stored in the memory 38 of the telephone, or in the UICC card 40, or in the database 12).
- an additional validation requested by the user, for example the input of a personal code of the "PIN code” type, or a validation of biometric type, by a biometric reader incorporated in the telephone or by means of a voice recognition system using the telephone microphone (the specific biometric fingerprint that can be stored in the memory 38 of the telephone, or in the UICC card 40, or in the database 12).
- This accreditation in DDC digital data read by the module 52 in a key or badge that the user has coupled with this module, is analyzed by the microcontroller 44 which conditionally issues an authorization to open the lock 46 if the required criteria are met. completed, including the conformity of the UID.
- the invention proposes to replace the module 52, or to complete this module 52, by a module 54 able to process accreditations sent to the lock in the form of acoustic accreditations CAC transmitted by a mobile phone 22, instead of DDC digital accreditations read from a card or badge coupled to module 52.
- the acoustic module 54 is provided with an acoustic transducer in the form of a microphone 56 making it possible to pick up the surrounding sound signals, in particular the acoustic accreditation which will be reproduced by the loudspeaker 24 of the telephone 22, and to transform the signals acoustics captured in digital signals applied to a stage 58 forming a translator, for converting the acoustic accreditations CAC into signals of the same format as the accreditations in digital data DDC would have provided the module 52 by reading a badge or a card.
- the acoustic module 54 also comprises, advantageously, a transducer 60 making it possible to reproduce a sound signal emitted by the stage 58 and audible from outside the lock, this transducer 60 possibly comprising a loudspeaker or, in a version simplified, a simple component type buzzer (buzzer). It is also possible to use the transducer 46 of the acoustic module 54 by operating it in inverted mode (to emit sound signals instead of sensing them).
- the primary object of the invention is to replace, or supplement, the "proprietary" technology, specific to the manufacturer and implemented in the reader module 52, with a universal technology based on CAC encrypted acoustic accreditations, which can be implemented without substantial modification of the lock components, both hardware and software.
- the basic principle is to retain original digital data (DDC) accreditations with their own manufacturer's content and format, and to convert these DDC accreditations into CAC Accreditations, to transmit CACs to the phone, then to have them reproduced by the manufacturer. the user, by means of the loudspeaker of his mobile phone, the acoustic accreditation CAC thus transmitted.
- Accreditation captured by the acoustic module 54 is then subject to an inverse conversion, performed by the translation stage 58 incorporated in the acoustic module 54, in order to reconstitute the original DDC digital data accreditation from the Acoustic Accreditation CAC that has been captured.
- a preliminary step is therefore to convert the DDC digital accreditation into a CAC encrypted acoustic accreditation.
- DDC accreditations in the form of digital data blocks are converted by the cryptographic engine 14 of the secure site 10 into acoustic accreditations CAC.
- the conversion can be carried out from a data block in which the fields VID, UID and DATA are presented explicitly, to a field CORE / CAC of the acoustic accreditation CAC (of the line a towards the line c of the Figure 3 ).
- the cryptographic engine may well receive at this stage the information in a non-explicit form (CORE), which is directly converted to give the CORE / CAC field of acoustic accreditation CAC (from line b to line c of the Figure 3 ).
- CORE non-explicit form
- the cryptographic engine 14 also adds to the field CORE / CAC containing the actual accreditation data a variable field, different at each generation of an acoustic accreditation, so as to make this acoustic accreditation unique. It may be data generated by a pseudo-random generator or, preferably, a sequence number SEQ.
- the field SEQ may be a counter incremented each generation of an accreditation by the cryptographic generator 14, or a time stamp that will be functionally equivalent to the incrementation of a counter.
- the cryptographic generator 14 may also provide for the addition to the acoustic accreditation CAC of a password PWD making it possible to further increase the security of the process.
- the user comes into contact with the management site by any appropriate means. This can be achieved by calling a phone number, or sending a message (SMS, MMS, e-mail, instant messaging, etc.) to the server, which will call back the user's phone for issue the authorization in the form of encrypted acoustic accreditation.
- the transmission of this accreditation is executed immediately and directly.
- it can also be executed by a method of "call back” type: in this case, the user makes telephone contact with the management site, which does not respond immediately, but after hanging up rings the mobile phone for that the user establishes again the contact with the site, and it is at this moment that the acoustic accreditation is delivered to him. Regardless of how the user comes into contact with the remote site, the latter delivers the acoustic accreditation directly to the user, without intermediate storage.
- This mode is particularly simple to implement, insofar as it is sufficient to use the existing infrastructure, without prior adaptation of the phone, including without any need to load an applet or applet, including midlet or cardlet type .
- the invention can thus be implemented with any type of mobile phone, even very simple, and without any prior intervention on it.
- Another advantage lies in the ability to check in real time the validity of the accreditation, for example with the possibility of immediately taking into account a "blacklist" of users.
- this online mode it is possible to have at the managerial site a large amount of information on the use made of acoustic accreditation, including the date and time of use. , and possibly the geographical location of the user (by identification of the cell of the network from which the user calls).
- this mode implies having access to the mobile network, which is not always possible (underground car parks, uncovered areas, etc.).
- it does not in principle allow to have, at the user's choice, several accreditations corresponding to several possible locks, to the extent that it is necessary to have a "one for one" correspondence between accreditation and lock.
- “offline” is used especially if access to the network is not assured at the time of use.
- the user connects in advance to the management site and receives from it a predetermined number of acoustic accreditations.
- These accreditations are stored securely in the phone or in a peripheral memory of the phone (for example an SD or MicroSD card).
- the user wants to reproduce an acoustic accreditation to open a lock, he launches an application integrated in his phone that searches for the first accreditation among those that have been stored, reproduces it to open the door, and removes it from memory. And so on to use the following accreditations.
- the application allowing this implementation is an applet stored in the phone, previously sent to it via the mobile network operator, or by downloading to an external medium (SD or MicroSD card), or via a connection Internet.
- the management site will have previously sent a message such as "SMS", "push SMS” or "WAP push” to the phone, in order to identify the brand and the model of it and present to the user a link allowing the download of the applet.
- the acoustic module 54 of the lock receives this accredited acoustic accreditation CAC (corresponding at line c of the Figure 3 ).
- the translation stage 58 then extracts the data block CORE (line d from the Figure 3 ), that is to say, in pictorial terms, that he "opens the envelope (acoustic)" containing these data. It is then possible to obtain, directly or after decoding, the digital data accreditation DDC (line e of the Figure 3 ) with its various useful fields VID, UID and DATA, which is identical to the corresponding accreditation DDC before it has been converted by the cryptographic engine (line a of the Figure 3 ).
- the DDC accreditation which is in all respects identical to that read by the module 52 from a conventional key or badge according to the manufacturer's own instructions, is applied to the microcontroller 44 for analysis, verification and conditional unlocking of the lock control system 46.
- the various checks performed by the microcontroller 44 are identical to those which would have been made from information read in a conventional manner by the module 52, according to the specifications of each manufacturer.
- the role of the translator stage 58 is simply to "open the envelope" of the acoustic accreditation CAC to extract the digital information DDC which had been previously placed in this envelope by the cryptographic engine 14, but without intervening on the content of this DDC digital accreditation.
- the signal heard near the telephone, and therefore likely to be recorded, is that shown in line c , with superposition of the CAC signal emitted by the telephone and BEEP1 signal issued by the acoustic module of the lock.
- the combined signal received by the acoustic module of this other lock will therefore be that illustrated line e of the Figure 4 , that is to say a signal comprising two acoustic parasites BEEP1 and BEEP2.
- the presence of these two parasites will be immediately recognized by the acoustic module, which will refuse the opening.
- sequence number SEQ1 would be equal to, or less than, that already stored in the memory of the acoustic module of the lock, which will thus be able to detect fraud due to this non-compliant sequence number SEQ1.
- a bidirectional communication can be established with the secure site 10 if it is possible on the phone to obtain a link with the network at the time of use, which can be traced back to it from the phone.
- the acoustic module 54 of the lock can produce in acoustic form a password, which is picked up by the microphone of the telephone, then transmitted to the network and to the remote site 10 for to be incorporated in the acoustic accreditation CAC that will be generated by the cryptographic engine 14 (PWD field of the line c of the Figure 3 ).
- Acoustic accreditation CAC then reproduced by the telephone will include this password, which can then be decoded by the acoustic module 54, which will verify that it matches well with the one just generated by the same module just before.
- another security consists in causing the acoustic module 54 to generate a delay value or time offset ⁇ t 1 , which is different each time (for example a random delay), and to transmit it to the secure site 10 so that it adds this time offset ⁇ t 1 to the acoustic accreditation CAC during the broadcast of it (line g of the Figure 4 ).
- the acoustic module 54 verifies, upon receipt of the acoustic accreditation CAC, that it starts well with a time shift ⁇ t 1 , introduced by the remote server, which is equal to the offset value that it had itself. generated just before and sent to the server.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
L'invention concerne les dispositifs de serrure commandés électriquement au moyen d'une clé dématérialisée et chiffrée, cette clé pouvant être véhiculée par un objet portatif détenu par l'utilisateur tel qu'une carte magnétique, une carte à puce, un badge ou une carte sans contact, etc.The invention relates to lock devices electrically controlled by means of a dematerialized and encrypted key, this key being able to be conveyed by a portable object held by the user such as a magnetic card, a smart card, a badge or a card. contactless card, etc.
Par "dispositif de serrure" on entendra non seulement une serrure stricto sensu, c'est-à-dire un mécanisme posé par exemple sur une porte pour en condamner l'ouverture, mais également tout dispositif permettant d'aboutir à un résultat comparable, par exemple un canon de serrure considéré isolément, ou un dispositif de verrouillage plus spécifique comprenant divers organes non regroupés dans un même coffre de serrure, le but final étant d'obtenir la condamnation par des moyens mécaniques de l'accès physique à un lieu ou espace donné, et l'accès à ce lieu ou espace par déverrouillage du dispositif de serrure, sur commande d'un utilisateur, après vérification que cet utilisateur dispose bien des droits d'accès (i) qui lui sont propres et (ii) qui sont propres au dispositif de serrure. Le dispositif de serrure peut également comprendre, ou être associé à, un système d'alarme qu'il s'agit de désactiver pour permettre l'accès à un espace donné, ou inversement d'activer pour protéger cet espace avant ou après l'avoir quitté.By "lock device" is meant not only a lock stricto sensu, that is to say a mechanism placed for example on a door to condemn the opening, but also any device to achieve a comparable result, for example a lock gun considered in isolation, or a more specific locking device comprising various members not grouped in the same lock box, the ultimate goal being to obtain the conviction by mechanical means of physical access to a place or given space, and access to this place or space by unlocking the lock device, on the order of a user, after verification that this user has access rights (i) that are specific to him and (ii) who are specific to the lock device. The lock device may also include, or be associated with, an alarm system that is to disable to allow access to a given space, or conversely activate to protect this space before or after the to have left.
Pour la simplicité de la description, on parlera par la suite simplement de "serrure", mais ce terme doit être entendu dans son sens le plus large, sans aucun caractère restrictif à un type d'équipement particulier.For simplicity of description, we will speak later simply "lock", but this term must be understood in its broadest sense, without any restrictive character to a particular type of equipment.
L'objet portatif, lorsqu'il est approché de la serrure, joue le rôle d'une clé permettant d'en commander l'ouverture au moyen d'une donnée ci-après désignée "accréditation" (credential). Diverses techniques de codage et de cryptage peuvent être implémentées dans la serrure et/ou dans l'objet portatif pour assurer une protection à l'encontre de manipulations frauduleuses et sécuriser la communication entre l'objet portatif et la serrure. On connaît de nombreux systèmes à cartes magnétiques, ou encore à cartes ou badges à microcircuit mettant en oeuvre avec la serrure un couplage galvanique (carte à puce à contacts) ou non galvanique (carte à couplage inductif ou carte de type RFID). Ce couplage assure entre serrure et badge une communication permettant notamment à la serrure de lire dans la mémoire du badge la donnée d'accréditation afin de commander l'ouverture si cette donnée est reconnue conforme.The portable object, when approached from the lock, acts as a key for ordering the opening by means of a given hereinafter "certification" (credential). Various coding and encryption techniques can be implemented in the lock and / or in the portable object to provide protection against fraudulent manipulations and secure communication between the portable object and the lock. Numerous magnetic card systems are known, or cards or badges with microcircuit implementing with the lock a galvanic coupling (smart card contacts) or non-galvanic (inductive coupling card or RFID type card). This coupling ensures between lock and badge communication allowing in particular the lock to read in the memory of the badge accreditation data to control the opening if this data is recognized as compliant.
L'un des inconvénients de cette technique est la nécessité de disposer d'un objet portatif spécifique, qui doit être remis à l'utilisateur et que celui-ci doit conserver avec lui. Ceci aboutit en outre à la multiplication des objets portatifs, chacun correspondant à une serrure différente (domicile, bureau, porte d'immeuble, garage, etc.), ce qui rend au final l'ensemble malcommode et sujet au risque d'oublis.One of the disadvantages of this technique is the need to have a specific portable object, which must be given to the user and that it must keep with him. This also results in the multiplication of portable objects, each corresponding to a different lock (home, office, building door, garage, etc.), which ultimately makes the whole inconvenient and subject to the risk of forgetting.
Un autre inconvénient est lié à la variété des techniques mises en oeuvre, chaque fabricant ayant ses spécifications propres aussi bien au niveau de la couche physique (choix technologique du couplage : inductif, RF, magnétique, galvanique, etc.) qu'au niveau du format des données et des protocoles d'échange de ces données entre le lecteur et l'objet portatif. Cette variété des techniques, liée aux choix technologiques et aux implémentations propres aux différents constructeurs, est un frein à l'interopérabilité, à la standardisation des matériels et des procédures et à l'évolution technologique, ce qui empêche la généralisation rapide de ces techniques, malgré leurs avantages incontestables.Another drawback is related to the variety of techniques used, each manufacturer having its own specifications both at the level of the physical layer (technological choice of coupling: inductive, RF, magnetic, galvanic, etc.) at the level of format of the data and protocols for exchanging this data between the reader and the portable object. This variety of techniques, linked to technological choices and implementations specific to different manufacturers, is a brake on interoperability, the standardization of materials and procedures and technological evolution, which prevents the rapid spread of these techniques, despite their indisputable advantages.
De plus, le système est un système figé, car si l'on souhaite mettre à jour les habilitations, supprimer des habilitations existantes ou en créer de nouvelles, il faut soit procéder à l'échange de l'objet portatif, soit mettre à jour la mémoire de celui-ci au moyen d'un protocole et/ou d'un lecteur spécifique, avec nécessité de manipulations physiques et de déplacements.Moreover, the system is a fixed system, because if one wishes to update the authorizations, to delete existing authorizations or to create new ones, it is necessary either to proceed to the exchange of the portable object, or to update the memory of the latter by means of a protocol and / or a specific reader, with the need for physical manipulations and displacements.
L'un des buts de l'invention est de proposer une technique alternative de gestion et de commande de serrures qui puisse compléter les techniques existantes, ou même se substituer à elles, sans nécessiter de modifications substantielles tant au niveau du matériel que du logiciel, et qui offre un niveau de sécurité maximal, une très grande souplesse de mise en oeuvre et soit utilisable sans recours à un objet portatif spécifique. Comme on le verra par la suite, la technique de l'invention est utilisable au moyen de n'importe quel téléphone mobile conventionnel servant l'objet portatif véhiculant la clé de commande de la serrure, sans que l'utilisateur n'ait besoin de recourir à un objet portatif spécifique et dédié, tel que badge ou carte.One of the aims of the invention is to propose an alternative technique of management and control of locks that can complement the existing techniques, or even replace them, without requiring substantial changes in both hardware and software, and which offers a maximum level of security, a great flexibility of implementation and is usable without recourse to a specific portable object. As will be seen later, the technique of the invention can be used by means of any conventional mobile phone serving the portable object carrying the key to control the lock, without the user needs to use a specific and dedicated portable object, such as a badge or card.
Le système de l'invention pourra être ainsi immédiatement généralisé au plus grand nombre, en étant utilisable par tout un chacun à partir d'un téléphone de modèle standard, non modifié, mais en bénéficiant de toute la sécurité et de toute la souplesse propres aux techniques cryptographiques modernes.The system of the invention can thus be immediately generalized to the greatest number, being usable by anyone from a telephone standard model, unmodified, but enjoying all the security and flexibility of modern cryptographic techniques.
Du point de vue du fabricant de serrures, la technique de l'invention permettra d'adapter sans modification majeure le parc de serrures existantes, sans devoir remplacer ni les éléments matériels ni le logiciel déjà intégrés à la serrure. On verra en effet que l'invention est parfaitement compatible avec les techniques préexistantes mises en oeuvre par les différents fabricants actuels, dans la mesure où elle limite l'intervention à une seule couche du protocole de communication (la transmission de l'accréditation à la serrure), donc en conservant la même gestion logique des différents niveaux de sécurité déjà prévus par le fabricant.From the point of view of the lock manufacturer, the technique of the invention will allow to adapt without major modification the existing locks, without having to replace the hardware elements or the software already integrated in the lock. It will be seen that the invention is perfectly compatible with the pre-existing techniques implemented by the various current manufacturers, insofar as it limits the intervention to a single layer of the communication protocol (the transmission of the accreditation to the lock), thus maintaining the same logical management of the different levels of security already provided by the manufacturer.
Le principe de l'invention repose sur l'utilisation, pour la transmission de la donnée d'accréditation à la serrure, d'informations de type accréditations acoustiques chiffrées.The principle of the invention is based on the use, for the transmission of the accreditation data to the lock, encrypted acoustic accreditations type information.
Ces accréditations acoustiques se présentent par exemple sous forme d'une série codée de tonalités (tonalités DTMF ou autres), émises par le haut-parleur d'un dispositif émetteur et captées par le microphone d'un dispositif récepteur.These acoustic accreditations are for example in the form of a coded series of tones (DTMF tones or other), emitted by the speaker of a transmitting device and picked up by the microphone of a receiving device.
Essentiellement, la présente invention consiste à traduire, au niveau d'un site sécurisé, l'accréditation conventionnelle utilisée pour la gestion d'accès (un bloc de données comprenant un identifiant du fabricant, un identifiant unique de la serrure et éventuellement des informations additionnelles) et de les traduire dans un format d'accréditation acoustique chiffrée. Cette accréditation acoustique se présente sous forme d'un signal audio qui peut être véhiculé par des canaux de transmission audio, notamment des canaux de transmission téléphonique, et reproduits tels quels par des transducteurs acoustiques.Essentially, the present invention consists in translating, at the level of a secure site, the conventional accreditation used for access management (a data block comprising a manufacturer's identifier, a unique identifier of the lock and possibly additional information ) and translate them into an encrypted acoustic accreditation format. This acoustic accreditation is in the form of an audio signal that can be conveyed by audio transmission channels, including telephone transmission channels, and reproduced as such by acoustic transducers.
L'accréditation acoustique est envoyée de cette manière au téléphone mobile de l'utilisateur, qui est répertorié dans une base de données du site sécurisé. Pour utiliser l'accréditation, l'utilisateur approche son téléphone de la serrure et déclenche l'émission par le haut-parleur de son téléphone de la série de tonalités correspondant à l'accréditation acoustique chiffrée, de manière que ces tonalités puissent être captées par un microphone incorporé ou couplé à la serrure. Cette dernière opère une traduction inverse de l'accréditation acoustique permettant de restituer le format original de l'accréditation conventionnelle, qui est ensuite appliquée aux circuits de la serrure pour y être traitée de la même manière que si cette accréditation avait été lue par un lecteur standard couplé à la serrure (lecteur de cartes magnétiques ou à puce, lecteur à couplage inductif ou RFID, etc.).The acoustic accreditation is sent in this manner to the mobile phone of the user, which is listed in a database of the secure site. To use the accreditation, the user approaches his phone lock and triggers the transmission by the speaker of his phone in the series of tones corresponding to encrypted acoustic accreditation, so that these tones can be captured by a microphone incorporated or coupled to the lock. The latter operates a translation inverse of the acoustic accreditation allowing to restore the original format of the conventional accreditation, which is then applied to the circuits of the lock to be treated in the same way as if this accreditation had been read by a standard reader coupled to the lock (magnetic or smart card reader, inductive coupling reader or RFID, etc.).
L'utilisation d'accréditations acoustiques n'est pas en elle-même nouvelle, elle a déjà été proposée dans d'autres contextes et pour d'autres applications, par exemple par le
Ce document décrit une technique de sécurisation de l'accès logique à un réseau informatique par un terminal distant, par exemple par un ordinateur relié à ce réseau via internet. L'utilisateur se connecte au réseau avec son ordinateur, allume en même temps son téléphone mobile, et appelle au moyen de celui-ci un site de contrôle interfacé avec le réseau auquel l'accès est demandé. Pour vérifier l'habilitation de l'utilisateur, le réseau envoie un signal sonore (l'accréditation acoustique) vers l'ordinateur distant qui vient de se connecter, signal qui est reproduit par le haut-parleur de l'ordinateur. L'utilisateur ayant placé son téléphone devant ce haut-parleur, ce signal sonore est capté par le téléphone, transmis au site de contrôle distant via l'opérateur de réseau téléphonique mobile et "écouté" par le site de contrôle, qui peut alors vérifier l'accréditation et autoriser l'accès au réseau informatique par le terminal.This document describes a technique for securing logical access to a computer network by a remote terminal, for example by a computer connected to this network via the Internet. The user connects to the network with his computer, simultaneously lights his mobile phone, and calls through it a control site interfaced with the network to which access is requested. To verify the user's authorization, the network sends a sound signal (Acoustic Accreditation) to the remote computer that has just connected, a signal that is reproduced by the speaker of the computer. The user having placed his telephone in front of this loudspeaker, this sound signal is picked up by the telephone, transmitted to the remote control site via the mobile telephone network operator and "listened to" by the control site, who can then check accreditation and authorize access to the computer network by the terminal.
On notera que dans ce cas il s'agit d'une accréditation "remontante" : l'accréditation acoustique est captée par le microphone du téléphone qui la retransmet au site de contrôle. Connaissant le destinataire de l'appel téléphonique, le site de contrôle peut identifier l'utilisateur par le biais du téléphone mobile utilisé pour cette opération, et ainsi autoriser l'accès logique au réseau par le terminal situé à proximité du téléphone ainsi identifié. Dans le cas de l'invention, les accréditations acoustiques chiffrées sont au contraire des accréditations "descendantes", c'est-à-dire qu'elles sont issues d'un site gestionnaire distant et transmises au téléphone mobile de l'utilisateur.Note that in this case it is a "rising" accreditation: the acoustic accreditation is captured by the microphone of the phone which retransmits it to the control site. Knowing the recipient of the phone call, the control site can identify the user through the mobile phone used for this operation, and thus allow logical access to the network by the terminal located near the phone identified. In the case of the invention, the encrypted acoustic accreditations are on the contrary "downward" accreditations, that is to say that they come from a remote management site and transmitted to the mobile phone of the user.
Plus précisément, l'invention concerne, de façon en elle-même connue, un système sécurisé de commande d'ouverture de dispositifs de serrure, comportant au moins un dispositif de serrure muni de circuits électroniques pour la commande conditionnelle d'organes mécaniques de verrouillage/déver-rouillage à partir de données numériques d'accréditation. Ce dispositif de serrure comprend des moyens de reconnaissance, d'analyse et d'authentification desdites données numériques d'accréditation, et des moyens de commande du déverrouillage des organes mécaniques sur reconnaissance de données numériques d'accréditation conformes.More specifically, the invention relates, in a manner known per se, to a secure locking device opening control system, comprising at least one lock device provided with electronic circuits. for the conditional control of mechanical locking / unlocking devices from digital accreditation data. This lock device comprises means for recognizing, analyzing and authenticating said digital accreditation data, and means for controlling the unlocking of the mechanical members on recognition of conforming digital accreditation data.
De façon caractéristique de l'invention, le système comprend également un téléphone mobile à disposition d'un utilisateur habilité à ouvrir le dispositif de serrure, un site gestionnaire distant, et un opérateur de réseau mobile. Le site gestionnaire comprend une base de données d'utilisateurs habilités, avec pour chaque utilisateur un identifiant associé à un numéro de téléphone mobile, des moyens pour recevoir en entrée des données numériques d'accréditation propres à permettre l'ouverture de dispositifs de serrure spécifiques, et un générateur d'accréditations acoustiques chiffrées comportant des moyens de conversion des données numériques d'accréditation en accréditations acoustiques chiffrées sous forme de signaux audio à usage unique. L'opérateur de réseau mobile est couplé au site gestionnaire et au téléphone mobile, avec des moyens de transmission sécurisée des accréditations acoustiques chiffrées du site gestionnaire au téléphone mobile de l'utilisateur, le téléphone comprenant un transducteur électro-acoustique apte à reproduire ces accréditations acoustiques chiffrées.In a characteristic manner of the invention, the system also comprises a mobile phone available to a user authorized to open the lock device, a remote manager site, and a mobile network operator. The management site comprises a database of authorized users, with for each user an identifier associated with a mobile telephone number, means for receiving, as input, digital accreditation data suitable for allowing the opening of specific lock devices. , and an encrypted acoustic accreditation generator comprising means for converting the digital accreditation data into encrypted acoustic accreditations in the form of single-use audio signals. The mobile network operator is coupled to the management site and to the mobile telephone, with means for securely transmitting the encrypted acoustic accreditations from the management site to the mobile telephone of the user, the telephone comprising an electro-acoustic transducer able to reproduce these accreditations. acoustic numbers.
Le système de l'invention est également caractérisé en ce que le dispositif de serrure comporte un module acoustique comprenant un transducteur électro-acoustique apte à capter des accréditations acoustiques chiffrées reproduites par le transducteur du téléphone préalablement placé à proximité du dispositif de serrure. Le module acoustique comprend en outre des moyens pour extraire les données numériques d'accréditation à partir des accréditations acoustiques chiffrées captées par le transducteur, et des moyens pour appliquer aux moyens de reconnaissance, d'analyse et d'authentification les données numériques d'accréditation ainsi extraites.The system of the invention is also characterized in that the lock device comprises an acoustic module comprising an electro-acoustic transducer capable of capturing encrypted acoustic accreditations reproduced by the transducer of the telephone previously placed near the lock device. The acoustic module further comprises means for extracting the digital accreditation data from the encrypted acoustic accreditations captured by the transducer, and means for applying to the recognition, analysis and authentication means the digital accreditation data. thus extracted.
Avantageusement, l'accréditation acoustique chiffrée produite par le générateur d'accréditations acoustiques comprend un champ résultant de la conversion des données numériques d'accréditation, et un champ variable, avec un contenu différent pour chaque accréditation acoustique chiffrée générée. Ce champ variable peut notamment être un numéro de séquence ou un horodatage, auquel cas le module acoustique comprend en outre des moyens pour mémoriser à chaque utilisation le numéro de séquence ou l'horodatage de l'accréditation acoustique chiffrée ayant permis le déverrouillage des organes mécaniques, et pour comparer et vérifier la conformité du numéro de séquence ou de l'horodatage de toute accréditation acoustique chiffrée ultérieure.Advantageously, the encrypted acoustic accreditation produced by the acoustic accreditation generator comprises a field resulting from the conversion of the digital accreditation data, and a variable field, with different content for each encrypted acoustic accreditation generated. This variable field can in particular be a sequence number or a time stamp, in which case the acoustic module also comprises means for storing, at each use, the sequence number or timestamp of the encrypted acoustic accreditation which has enabled the unlocking of the mechanical members. , and to compare and verify the conformity of the sequence number or the timestamp of any subsequent encrypted acoustic accreditation.
Les données numériques d'accréditation peuvent être : des données issues de la base de données du site gestionnaire, celle-ci mémorisant également des informations de dispositifs de serrure, avec pour chaque dispositif de serrure un identifiant unique associé, une liste d'utilisateurs habilités avec des données correspondantes de droits d'accès, et éventuellement des informations additionnelles ; des données transmises en ligne au site gestionnaire par un site tiers ; des données transmises hors ligne, par lots, au site gestionnaire par un site tiers ; des données délivrées par un lecteur couplé à un support physique mémorisant les données numériques d'accréditation ; et des combinaisons des données ci-dessus.The digital accreditation data may be: data from the management site database, the latter also memorizing lock device information, with for each lock device an associated unique identifier, a list of authorized users with corresponding data of access rights, and possibly additional information; data transmitted online to the management site by a third party site; data transmitted offline, in batches, to the management site by a third party site; data delivered by a reader coupled to a physical medium storing the digital accreditation data; and combinations of the above data.
Dans une forme de réalisation avantageuse, le module acoustique comprend en outre des moyens pour produire des signaux acoustiques en retour, sur captation de données numériques d'accréditation, et un transducteur électro-acoustique apte à reproduire ces signaux acoustiques en retour. Ces derniers peuvent notamment comprendre un marqueur temporel émis pendant, ou immédiatement après, la réception de l'accréditation acoustique, ce marqueur étant émis à un instant correspondant à une position temporelle prédéterminée, propre au dispositif de serrure, par rapport à l'accréditation acoustique.In an advantageous embodiment, the acoustic module further comprises means for producing acoustic signals in return, on digital data acquisition accreditation, and an electro-acoustic transducer adapted to reproduce these acoustic signals back. These may include a time stamp issued during, or immediately after, the receipt of acoustic accreditation, the marker being issued at a time corresponding to a predetermined temporal position, specific to the lock device, with respect to acoustic accreditation .
En variante ou en complément, le module acoustique comprend en outre des moyens pour définir un paramètre additionnel de transmission de l'accréditation, des moyens pour, préalablement à toute émission d'accréditation acoustique, produire un message acoustique codé par ledit paramètre additionnel, et un transducteur électro-acoustique apte à reproduire ce message acoustique. Le téléphone comprend, quant à lui, un transducteur électro-acoustique apte à capter le message acoustique, et des moyens pour transmettre au site gestionnaire un message codé par ce message acoustique. L'accréditation acoustique chiffrée produite par le générateur d'accréditations acoustiques inclut le paramètre additionnel, et le module acoustique comprend également des moyens pour vérifier la conformité du paramètre additionnel inclus dans l'accréditation acoustique captée.As a variant or in addition, the acoustic module further comprises means for defining an additional parameter for transmitting the accreditation, means for, prior to any acoustic accreditation broadcast, producing an acoustic message coded by said additional parameter, and an electro-acoustic transducer capable of reproducing this acoustic message. The telephone comprises, for its part, an electro-acoustic transducer capable of capturing the acoustic message, and means for transmitting to the management site a message coded by this acoustic message. The encrypted acoustic accreditation produced by the acoustic accreditation generator includes the additional parameter, and the acoustic module also includes means for verifying the compliance of the additional parameter included in the acoustic accreditation received.
Ce paramètre additionnel peut être un mot de passe généré par le module acoustique et ajouté en tant que champ variable à l'accréditation acoustique produite par le générateur cryptographique. Ce peut également être un décalage temporel appliqué à l'émission de l'accréditation acoustique produite par le générateur cryptographique.This additional parameter can be a password generated by the acoustic module and added as a variable field to the acoustic accreditation produced by the cryptographic generator. It can also be a time offset applied to the emission of the acoustic accreditation produced by the cryptographic generator.
On va maintenant décrire un exemple de mise en oeuvre du dispositif de l'invention, en référence aux dessins annexés où les mêmes références numériques désignent d'une figure à l'autre des éléments identiques ou fonctionnellement semblables.
- La
Figure 1 illustre de façon schématique les principaux éléments contribuant au fonctionnement du système selon l'invention. - La
Figure 2 illustre plus précisément, sous forme de schéma par blocs, les principaux organes constitutifs du téléphone mobile et de la serrure avec laquelle ce dernier est couplé. - La
Figure 3 illustre les différentes transformations subies par l'accréditation au cours des étapes mises en oeuvre par l'invention. - La
Figure 4 est une série de chronogrammes illustrant les diverses techniques de sécurité permettant d'assurer l'utilisation unique de l'accréditation acoustique dans le cadre de l'invention.
- The
Figure 1 schematically illustrates the main elements contributing to the operation of the system according to the invention. - The
Figure 2 illustrates more precisely, in block diagram form, the main components of the mobile phone and the lock with which it is coupled. - The
Figure 3 illustrates the various transformations experienced by the accreditation during the steps implemented by the invention. - The
Figure 4 is a series of timing diagrams illustrating the various security techniques to ensure the unique use of acoustic accreditation in the context of the invention.
On vatout d'abord décrire en référence aux
L'un des éléments essentiels de l'invention est un site gestionnaire sécurisé 10 centralisant dans une base de données DB 12 les informations permettant de recenser et d'identifier un certain nombre de serrures et d'utilisateurs habilités pour chacune de ces serrures. Pour chaque utilisateur, la base de données répertorie un numéro de téléphone mobile unique associé à cet utilisateur, ainsi que des données de droit d'accès et de conditions d'utilisation (accès réservé à certains jours ou certaines plages horaires, date d'expiration d'un droit accès, etc.).One of the essential elements of the invention is a
Outre les utilisateurs habilités, la base de données recense également pour chaque serrure un identifiant UID (Unique IDentifier) qui est attribué de manière unique et permet d'identifier de façon univoque la serrure dans les divers protocoles d'échange de données.In addition to the authorized users, the database also lists for each lock a Unique IDentifier (UID) that is uniquely assigned and uniquely identifies the lock in the various data exchange protocols.
D'autres données peuvent également être conservées par la base de données, notamment les algorithmes utilisés par la serrure, une ou plusieurs clés cryptographiques, une dénomination libre simplifiée ("entrée", "garage", "cave", etc.) pour faciliter la sélection par un utilisateur d'une serrure parmi plusieurs, etc.Other data may also be stored by the database, including the algorithms used by the lock, one or more cryptographic keys, a simplified free name ("entry", "garage", "cellar", etc.) to facilitate the selection by a user of one of several locks, etc.
Le site gestionnaire 10 comprend également un moteur cryptographique formant générateur 14 de données d'accréditation.The
De façon caractéristique de l'invention, les "données d'accréditation" (credentials) sont des accréditations acoustiques chiffrées ou CAC (Crypto Acoustic Credential) en forme de signaux audio à usage unique, par exemple (mais de façon non limitative) constitués d'une succession de tonalités doubles DTMF. Ces signaux audio sont conçus de manière à pouvoir être véhiculés après numérisation par des canaux de transmission audio téléphonique et reproduits tels quels par des transducteurs acoustiques.Typically of the invention, the "accreditation data" (credentials) are encrypted acoustic accreditations or CAC (Crypto Acoustic Credential) in the form of single-use audio signals, for example (but not limited to) made of a succession of dual DTMF tones. These audio signals are designed so that they can be conveyed after digitization by telephone audio transmission channels and reproduced as such by acoustic transducers.
Le site gestionnaire 10 est couplé à un réseau 16 d'un opérateur de téléphonie mobile MNO (Mobile Network Operator) par l'intermédiaire d'une passerelle téléphonique audio PGW (Phone GateWay) 18 et d'une liaison sécurisée 20, par exemple une liaison IP de type https, de manière à pouvoir véhiculer les accréditations acoustiques depuis le générateur 14 jusqu'au téléphone 22 de l'utilisateur par les canaux de transmission audio (canal voix) du réseau de téléphonie mobile.The
Le réseau de téléphonie mobile 16 est utilisé de façon conventionnelle par ses divers abonnés, chaque utilisateur étant en possession d'un téléphone mobile 22 qui lui est propre, individualisé par les informations de la carte SIM contenue dans l'appareil téléphonique ou par un autre élément unique si le téléphone opère sans carte SIM. Ainsi, lorsqu'il utilise son téléphone mobile personnel, un utilisateur est reconnu et identifié par le réseau 16 au moyen de son numéro d'abonné, et donc de la même façon par le site gestionnaire 10.The
La sécurisation de la liaison entre le réseau 16 et le téléphone mobile 22 peut être opérée par l'intermédiaire d'un fournisseur de services de confiance ou TSM (Trusted Service Manager), propre à assurer de manière efficace et sûre les diverses procédures que l'on décrira d'échange ou de transmission d'informations entre le site gestionnaire 10 et le téléphone mobile 22 via l'opérateur de réseau mobile 16.Securing the link between the
Dans le cas d'une clé matérialisée par un support tel qu'une carte ou un badge, une part importante de la sécurité est assurée par la remise physique de cet objet à l'utilisateur légitime, de la même façon que la remise d'un jeu de clés. En revanche, dans le cadre de l'invention, l'objet utilisé est un téléphone mobile, donc un objet banalisé. Mais celui-ci est reconnu et authentifié par la carte SIM qu'il contient (ou par un autre élément unique) et qui, surtout, identifie l'utilisateur via son numéro de téléphone (numéro d'abonné). Le site gestionnaire 10 peut donc ainsi identifier tel téléphone auquel il a été relié via l'opérateur de réseau mobile 16 comme étant bien celui de l'utilisateur habilité, répertorié dans sa base de données 12.In the case of a key materialized by a medium such as a card or a badge, a significant part of the security is ensured by the physical delivery of this object to the legitimate user, in the same way that the delivery of a set of keys. In contrast, in the context of the invention, the object used is a mobile phone, so a trivialized object. But it is recognized and authenticated by the SIM card it contains (or by another single element) and which, above all, identifies the user via his phone number (subscriber number). The
La mise en oeuvre de l'invention implique de faire reproduire par le haut-parleur 24 du téléphone mobile 22, en tant que signal audio, l'accréditation acoustique chiffrée générée par le générateur cryptographique 14 et transmise sous forme de signal vocal par l'intermédiaire de la passerelle téléphonique 18 et de l'opérateur du réseau mobile 16.The implementation of the invention involves reproducing by the
L'accréditation reproduite par le haut-parleur 24 du téléphone mobile est destinée à être captée par un microphone 26 d'une serrure 28 de manière à commander l'ouverture de cette serrure. Il s'agit de permettre à l'utilisateur, détenteur du numéro du téléphone mobile 22 connu de la base de données 12, de prouver à la serrure 28 qu'il a bien l'identité qu'il proclame, et qu'il bénéficie des droits d'accès permettant l'ouverture de cette serrure. Le signal sonore reproduit constitue ainsi un justificatif de l'identité de l'utilisateur et de ses droits d'ouverture, d'où la terminologie "accréditation acoustique". Cette accréditation acoustique est en outre chiffrée (par des moyens cryptographiques en eux-mêmes connus), et elle est à usage unique afin d'éviter toute fraude par enregistrement et duplication, car sinon il serait très aisé d'enregistrer le signal acoustique et de le reproduire ensuite à volonté.Accreditation reproduced by the
La
Le téléphone 22 comporte un microcontrôleur 30 couplé à divers organes périphériques tels qu'un circuit d'émission/réception 32, un afficheur 34, un clavier 36, une mémoire de données 38, une carte UICC (Universal In-tegrated Circuit Card, correspondant à la "carte SIM" pour les fonctions de téléphonie GSM) 40, et le transducteur acoustique 24.The
Diverses précautions, en elles-mêmes connues, peuvent être prévues pour augmenter la sécurité du processus, notamment par une validation supplémentaire demandée l'utilisateur, par exemple l'entrée d'un code personnel de type "PIN code", ou une validation de type biométrique, par un lecteur biométrique incorporé au téléphone ou au moyen d'un système de reconnaissance d'empreintes vocales utilisant le microphone du téléphone (l'empreinte biométrique spécifique pouvant être stockée dans la mémoire 38 du téléphone, ou bien dans la carte UICC 40, ou encore dans la base de données 12).Various precautions, known per se, may be provided to increase the security of the process, in particular by an additional validation requested by the user, for example the input of a personal code of the "PIN code" type, or a validation of biometric type, by a biometric reader incorporated in the telephone or by means of a voice recognition system using the telephone microphone (the specific biometric fingerprint that can be stored in the
La serrure 28, quant à elle, comprend un microcontrôleur 44 ainsi qu'un système électromécanique 46 permettant de commander le déverrouillage d'un pêne ou d'une poignée 48 sur ordre du microcontrôleur 44. Une mémoire de données 50 conserve diverses données modifiables propres à la serrure, notamment :
- l'identifiant unique UID (Unique IDentifier) permettant de reconnaître cette serrure entre toutes, de manière univoque ;
- des algorithmes de reconnaissance et de décodage ;
- des clés cryptographiques ;
- ainsi que d'autre paramètres spécifiques à la mise en oeuvre de l'invention et qui seront décrits par la suite.
- the unique identifier UID ( Unique IDentifier ) to recognize this lock between all, unequivocally;
- recognition and decoding algorithms;
- cryptographic keys;
- and other parameters specific to the implementation of the invention and which will be described later.
II existe de nombreux modèles de serrures de ce type, proposés par un grand nombre de fabricants. L'ouverture en est commandée par un module lecteur 52 intégré à la serrure, qui comprend une interface de communication avec une clé ou un badge, par un couplage qui peut être galvanique (lecteur de carte à puce) ou non galvanique (lecteur optique pour badge portant un code à barres, lecteur de carte magnétique, lecteur sans contact à couplage inductif ou RF, etc.). Le lecteur 52 délivre au microcontrôleur 44 une accréditation en données numériques, ci-après désignée DDC (Digital Data Credential), selon un format et un contenu propres à chaque fabricant et qui comprend typiquement (mais non exclusivement), comme illustré sur la ligne a de la
- un identifiant de fabricant VID (Vendor ID),
- l'identifiant unique UID de la carte,
- et un champ DATA (facultatif) contenant diverses données nécessaires ou utiles au contrôle du fonctionnement de la serrure.
- a manufacturer ID VID ( Vendor ID ),
- the unique identifier UID of the card,
- and a DATA field (optional) containing various data necessary or useful for controlling the operation of the lock.
Cette accréditation en données numériques DDC, lue par le module 52 dans une clé ou badge que l'utilisateur a couplé avec ce module, est analysée par le microcontrôleur 44 qui délivre conditionnellement une autorisation d'ouverture de la serrure 46 si les critères requis sont remplis, notamment la conformité de l'identifiant UID.This accreditation in DDC digital data, read by the
L'invention propose de substituer au module 52, ou de compléter ce module 52, par un module 54 apte à traiter des accréditations envoyées à la serrure sous forme d'accréditations acoustiques CAC émises par un téléphone mobile 22, en lieu et place d'accréditations numériques DDC lues dans une carte ou un badge couplé au module 52.The invention proposes to replace the
Le module acoustique 54 est pourvu d'un transducteur acoustique sous forme d'un microphone 56 permettant de capter les signaux sonores environnants, en particulier l'accréditation acoustique qui sera reproduite par le haut-parleur 24 du téléphone 22, et de transformer les signaux acoustiques captés en signaux numériques appliqués à un étage 58 formant traducteur, pour convertir les accréditations acoustiques CAC en signaux de même format que les accréditations en données numériques DDC qu'aurait fourni le module 52 par lecture d'un badge ou d'une carte.The
Le module acoustique 54 comprend également, de façon avantageuse, un transducteur 60 permettant de reproduire un signal sonore émis par l'étage 58 et audible depuis l'extérieur de la serrure, ce transducteur 60 pouvant comprendre un haut-parleur ou, dans une version simplifiée, un simple composant de type buzzer (ronfleur). Il est également possible d'utiliser le transducteur 46 du module acoustique 54 en le faisant fonctionner en mode inversé (pour émettre des signaux sonores au lieu de les capter).The
On va maintenant décrire plusieurs modes opératoires pour la mise en oeuvre de l'invention au moyen des différents éléments du système que l'on vient de décrire.Several procedures will now be described for the implementation of the invention by means of the various elements of the system that has just been described.
Le but premier de l'invention est de remplacer, ou compléter, la technologie "propriétaire", spécifique au fabricant et implémentée dans le module lecteur 52, par une technologie universelle à base d'accréditations acoustiques chiffrées CAC, pouvant être mise en oeuvre sans modification substantielle des organes de la serrure, tant matériels que logiciels.The primary object of the invention is to replace, or supplement, the "proprietary" technology, specific to the manufacturer and implemented in the
Le principe de base consiste à conserver les accréditations en données numériques (DDC) originelles avec leur contenu et leur format propres au fabricant, et à convertir ces accréditations DDC en accréditations acoustiques CAC, à transmettre les CAC au téléphone, puis à faire reproduire par l'utilisateur, au moyen du haut-parleur de son téléphone mobile, l'accréditation acoustique CAC ainsi transmise. L'accréditation captée par le module acoustique 54 fait alors l'objet d'une conversion inverse, opérée par l'étage 58 de traduction incorporé au module acoustique 54, afin de reconstituer l'accréditation en données numériques DDC originelle à partir de l'accréditation acoustique CAC qui a été captée.The basic principle is to retain original digital data (DDC) accreditations with their own manufacturer's content and format, and to convert these DDC accreditations into CAC Accreditations, to transmit CACs to the phone, then to have them reproduced by the manufacturer. the user, by means of the loudspeaker of his mobile phone, the acoustic accreditation CAC thus transmitted. Accreditation captured by the
Une étape préliminaire consiste donc à convertir l'accréditation numérique DDC en une accréditation acoustique chiffrée CAC.A preliminary step is therefore to convert the DDC digital accreditation into a CAC encrypted acoustic accreditation.
L'accréditation numérique DDC peut avoir plusieurs origines (voir
- en temps réel par
un site tiers 62, c'est-à-dire à la demande de l'utilisateur au moment où celui-ci veut ouvrir la serrure ; - par
le site tiers 62 en mode "hors ligne", les accréditations étant délivrées à l'avance sous forme de lots ; - de façon manuelle au moyen d'un lecteur 64, à partir d'une clé
ou badge conventionnel 66 ; - ou bien directement par
le site sécurisé 10, l'accréditation numérique DDC étant conservée dans la base de données 12.
- in real time by a
third party site 62, that is to say at the request of the user when it wants to open the lock; - by the
third party site 62 in "offline" mode, the accreditations being delivered in advance in the form of lots; - manually by means of a
reader 64, from a conventional key orbadge 66; - or directly by the
secure site 10, the DDC digital accreditation being stored in thedatabase 12.
Ces accréditations DDC sous forme de blocs de données numériques sont converties par le moteur cryptographique 14 du site sécurisé 10 en accréditations acoustiques CAC.These DDC accreditations in the form of digital data blocks are converted by the
Comme illustré
Le moteur cryptographique 14 ajoute également au champ CORE/CAC contenant les données d'accréditation proprement dites un champ variable, différent à chaque génération d'une accréditation acoustique, de façon à rendre unique cette accréditation acoustique. Il peut s'agir d'une donnée produite par un générateur pseudo-aléatoire ou, de préférence, d'un numéro de séquence SEQ. Le champ SEQ peut être un compteur incrémenté à chaque génération d'une accréditation par le générateur cryptographique 14, ou encore un horodatage qui sera fonctionnellement équivalent à l'incrémentation d'un compteur.The
Le générateur cryptographique 14 peut également prévoir l'adjonction à l'accréditation acoustique CAC d'un mot de passe PWD permettant d'augmenter encore la sécurisation du processus.The
Lorsqu'il souhaite obtenir l'ouverture de la serrure devant laquelle il se trouve, l'utilisateur entre en contact avec le site gestionnaire par tout moyen approprié. Ceci peut être obtenu par l'appel d'un numéro téléphonique, ou par l'envoi d'un message (SMS, MMS, e-mail, messagerie instantanée, etc.) au serveur, qui rappellera le téléphone de l'utilisateur pour lui délivrer l'autorisation sous forme d'une accréditation acoustique chiffrée.When he wishes to obtain the opening of the lock in front of which he is, the user comes into contact with the management site by any appropriate means. This can be achieved by calling a phone number, or sending a message (SMS, MMS, e-mail, instant messaging, etc.) to the server, which will call back the user's phone for issue the authorization in the form of encrypted acoustic accreditation.
Dans un mode de mise en oeuvre "en ligne", la transmission de cette accréditation est exécutée immédiatement et directement. En variante, elle peut également être exécutée par un procédé de type "call back" : dans ce cas, l'utilisateur entre en contact téléphonique avec le site gestionnaire, qui ne lui répond pas immédiatement, mais après raccrochage fait sonner le téléphone mobile pour que l'utilisateur établisse à nouveau le contact avec le site, et c'est à ce moment que l'accréditation acoustique lui est délivrée. Quelle que soit la manière dont l'utilisateur entre en contact avec le site distant, celui-ci délivre l'accréditation acoustique directement à l'utilisateur, sans stockage intermédiaire.In an "online" implementation mode, the transmission of this accreditation is executed immediately and directly. Alternatively, it can also be executed by a method of "call back" type: in this case, the user makes telephone contact with the management site, which does not respond immediately, but after hanging up rings the mobile phone for that the user establishes again the contact with the site, and it is at this moment that the acoustic accreditation is delivered to him. Regardless of how the user comes into contact with the remote site, the latter delivers the acoustic accreditation directly to the user, without intermediate storage.
Ce mode est particulièrement simple à mettre en oeuvre, dans la mesure où il suffit d'utiliser l'infrastructure existante, sans adaptation préalable du téléphone, notamment sans aucun besoin de charger une appliquette ou applet, notamment de type midlet ou cardlet. L'invention peut être ainsi mise en oeuvre avec n'importe quel type de téléphone mobile, même très simple, et sans aucune intervention préalable sur celui-ci. Un autre avantage réside dans la possibilité de vérifier en temps réel la validité de l'accréditation, avec par exemple la possibilité de prendre en compte immédiatement une "liste noire" d'utilisateurs. De plus, grâce à ce mode en ligne, il est possible de disposer au niveau du site gestionnaire d'un grand nombre d'informations sur l'utilisation faite de l'accréditation acoustique, notamment la date et l'heure de l'utilisation, et éventuellement la situation géographique de l'utilisateur (par identification de la cellule du réseau d'où l'utilisateur appelle). En revanche, ce mode implique de disposer d'un accès au réseau mobile, ce qui n'est pas toujours possible (parkings souterrains, zones non couvertes, etc.). D'autre part il ne permet pas en principe de disposer, au choix de l'utilisateur, de plusieurs accréditations correspondant à plusieurs serrures possibles, dans la mesure où il est nécessaire d'avoir une correspondance "un pour un" entre accréditation et serrure.This mode is particularly simple to implement, insofar as it is sufficient to use the existing infrastructure, without prior adaptation of the phone, including without any need to load an applet or applet, including midlet or cardlet type . The invention can thus be implemented with any type of mobile phone, even very simple, and without any prior intervention on it. Another advantage lies in the ability to check in real time the validity of the accreditation, for example with the possibility of immediately taking into account a "blacklist" of users. Moreover, thanks to this online mode, it is possible to have at the managerial site a large amount of information on the use made of acoustic accreditation, including the date and time of use. , and possibly the geographical location of the user (by identification of the cell of the network from which the user calls). On the other hand, this mode implies having access to the mobile network, which is not always possible (underground car parks, uncovered areas, etc.). On the other hand it does not in principle allow to have, at the user's choice, several accreditations corresponding to several possible locks, to the extent that it is necessary to have a "one for one" correspondence between accreditation and lock.
Un autre mode de mise en oeuvre, "hors ligne", est utilisable notamment si l'accès au réseau n'est pas assuré au moment de l'utilisation. Dans ce cas, l'utilisateur se connecte à l'avance au site gestionnaire et reçoit de celui-ci un nombre prédéterminé d'accréditations acoustiques. Ces accréditations sont stockées de façon sûre dans le téléphone ou dans une mémoire périphérique du téléphone (par exemple une carte SD ou MicroSD). Lorsque l'utilisateur veut reproduire une accréditation acoustique pour ouvrir une serrure, il lance une application intégrée à son téléphone qui recherche la première accréditation parmi celles qui ont été stockées, la reproduit pour ouvrir la porte, puis la supprime de la mémoire. Et ainsi de suite pour utiliser les accréditations suivantes. L'application permettant cette mise en oeuvre est une appliquette conservée dans le téléphone, préalablement envoyée à celui-ci via l'opérateur de réseau mobile, ou bien par téléchargement sur un support externe (carte SD ou MicroSD), ou encore via une connexion internet. Dans le cas d'un téléchargement via l'opérateur de réseau mobile, le site gestionnaire aura envoyé au préalable un message par exemple de type "SMS", "push SMS" ou "WAP push" au téléphone, afin d'identifier la marque et le modèle de celui-ci et présenter à l'utilisateur un lien permettant le téléchargement de l'appliquette. Lorsque la provision d'accréditations mémorisées dans le téléphone sera épuisée, ou sera en voie d'épuisement, et que l'utilisateur sera à nouveau capable d'accéder au réseau, cette réserve d'accréditations sera rechargée, pour permettre des utilisations ultérieures. Il est possible de bénéficier de la liaison au réseau pour, au même moment, faire remonter vers le site gestionnaire un certain nombre d'informations, notamment un historique daté de l'utilisation des accréditations précédentes.Another mode of implementation, "offline", is used especially if access to the network is not assured at the time of use. In this case, the user connects in advance to the management site and receives from it a predetermined number of acoustic accreditations. These accreditations are stored securely in the phone or in a peripheral memory of the phone (for example an SD or MicroSD card). When the user wants to reproduce an acoustic accreditation to open a lock, he launches an application integrated in his phone that searches for the first accreditation among those that have been stored, reproduces it to open the door, and removes it from memory. And so on to use the following accreditations. The application allowing this implementation is an applet stored in the phone, previously sent to it via the mobile network operator, or by downloading to an external medium (SD or MicroSD card), or via a connection Internet. In the case of a download via the mobile network operator, the management site will have previously sent a message such as "SMS", "push SMS" or "WAP push" to the phone, in order to identify the brand and the model of it and present to the user a link allowing the download of the applet. When the provision of accreditations stored in the phone will be exhausted, or will be running out, and the user will be able to access the network again, this credential pool will be reloaded for later use. It is possible to benefit from the link to the network for, at the same time, to trace back to the management site a certain amount of information, including a dated history of the use of previous accreditations.
En tout état de cause, et quel que soit le mode de transmission de l'accréditation acoustique chiffrée CAC, lorsqu'il souhaite obtenir l'ouverture de la serrure, l'utilisateur place son téléphone mobile à proximité de la serrure qu'il souhaite déverrouiller et déclenche l'émission, sous forme de signal sonore, de l'accréditation acoustique CAC.In any case, and whatever the mode of transmission of CAC encrypted acoustic accreditation, when it wishes to obtain the opening of the lock, the user places his mobile phone near the lock he wishes Unlock and trigger the acoustic signal broadcast of CAC Acoustic Accreditation.
Comme cela a été expliqué précédemment, le module acoustique 54 de la serrure reçoit cette accréditation acoustique chiffrée CAC (correspondant à la ligne c de la
L'accréditation DDC, qui est en tous points identique à celle qui aurait été lue par le module 52 à partir d'une clé ou d'un badge conventionnel selon les prescriptions propres du fabricant, est appliquée au microcontrôleur 44 pour analyse, vérification et déverrouillage conditionnel du système 46 de commande de la serrure.The DDC accreditation, which is in all respects identical to that read by the
On notera que les différentes vérifications opérées par le microcontrôleur 44 sont identiques à celles qui auraient été effectuées à partir d'informations lues de manière conventionnelle par le module 52, selon les spécifications propres à chaque fabricant. Le rôle de l'étage traducteur 58 est simplement d"'ouvrir l'enveloppe" de l'accréditation acoustique CAC pour en extraire les informations numériques DDC qui avaient été auparavant placées dans cette enveloppe par le moteur cryptographique 14, mais sans intervenir sur le contenu de cette accréditation numérique DDC.Note that the various checks performed by the
Diverses mesures peuvent être envisagées pour éviter des fraudes, notamment celle qui consisterait à enregistrer le signal audio reproduit par le téléphone au moment de l'utilisation, puis utiliser ce signal enregistré pour ouvrir une autre serrure, ou pour tenter d'obtenir une nouvelle ouverture de la même serrure (alors que l'accréditation est normalement à usage unique et doit être renouvelée à chaque fois).
- 1°) Contrôle de l'unicité de l'accréditation acoustique : du fait de la présence du champ unique SEQ généré différent à chaque version de l'accréditation acoustique CAC, le système ne doit jamais produire deux accréditations acoustiques identiques. De ce fait, le module acoustique de la serrure doit pouvoir détecter et refuser une accréditation qui aurait déjà été produite, et qui serait donc une accréditation frauduleusement captée et réutilisée.
A cet effet, lors de l'initialisation de la serrure (au moment de l'installation dumodule acoustique 54 ou à l'occasion d'une réinitialisation de celui-ci), un registre dumodule 54 est mis à zéro. Lors de la première utilisation, c'est-à-dire lorsque la première accréditation acoustique CAC est captée, lemodule 54 mémorise le numéro de séquence SEQ inclus dans cette accréditation acoustique (ou la date et l'heure, dans le cas d'un horodatage).
A chaque utilisation ultérieure, lemodule 54 vérifie que le numéro de séquence de l'accréditation captée est supérieur au numéro de séquence qu'il avait conservé en mémoire dans le registre (ou vérifie que la date et l'heure sont postérieures aux informations correspondantes mémorisées). Si tel n'est pas le cas, l'ouverture est refusée, car il s'agit d'une fraude. En revanche, si la condition est bien remplie, la serrure est déverrouillée et le registre est mis à jour avec le nouveau numéro de séquence (ou avec les nouvelles valeurs de date et d'heure). - 2°) Génération d'un marquage temporel par la serrure : une autre mesure de précaution, expliquée notamment en référence à la
Figure 4 , consiste à faire émettre par leHP ou buzzer 60du module acoustique 54, pendant la réception de l'accréditation acoustique CAC ou juste après celle-ci, un parasite acoustique ou "bip" à un instant prédéfini, toujours le même pour une serrure donnée mais toujours différent d'une serrure à l'autre.
- 1 °) Control of the uniqueness of Acoustic Accreditation : Due to the presence of the unique SEQ field generated different to each version of Acoustic Accreditation CAC, the system must never produce two identical acoustic accreditations. Therefore, the acoustic module of the lock must be able to detect and refuse an accreditation that would have already been produced, which would be fraudulently received and reused.
For this purpose, during the initialization of the lock (at the time of installation of theacoustic module 54 or during a reset thereof), a register of themodule 54 is set to zero. At the first use, that is to say when the first acoustic accreditation CAC is received, themodule 54 stores the sequence number SEQ included in this acoustic accreditation (or the date and time, in the case of a time stamp).
At each subsequent use, themodule 54 verifies that the sequence number of the accreditation received is greater than the sequence number that it had kept in memory in the register (or verifies that the date and time are subsequent to the corresponding information stored). If this is not the case, the opening is refused because it is a fraud. On the other hand, if the condition is fulfilled, the lock is unlocked and the register is updated with the new sequence number (or with the new date and time values). - 2 °) Generation of a temporal marking by the lock : another precautionary measure, explained in particular with reference to the
Figure 4 , consists in having the HP orbuzzer 60 transmit theacoustic module 54, during the reception of acoustic accreditation CAC or just after it, an acoustic noise or "beep" at a predefined time, always the same for a lock given but still different from one lock to another.
Sur la ligne a du chronogramme de la
Le signal entendu à proximité du téléphone, et donc susceptible d'être enregistré, est celui illustré ligne c, avec superposition du signal CAC émis par le téléphone et du signal BEEP1 émis par le module acoustique de la serrure.The signal heard near the telephone, and therefore likely to be recorded, is that shown in line c , with superposition of the CAC signal emitted by the telephone and BEEP1 signal issued by the acoustic module of the lock.
Si un fraudeur enregistre ce signal combiné et le présente à une autre serrure en tant qu'accréditation acoustique, cette autre serrure va émettre un parasite BEEP2 selon la même technique que la première, mais à une position temporelle T2 différente (ligne d de la
Le signal combiné reçu par le module acoustique de cette autre serrure sera donc celui illustré ligne e de la
On notera que, si le fraudeur avait représenté sur la même serrure (et non plus une autre serrure) l'accréditation acoustique CAC qu'il avait enregistrée, celle-ci correspondrait à la ligne f de la
Une communication bidirectionnelle peut être établie avec le site sécurisé 10 s'il est possible au téléphone d'obtenir une liaison avec le réseau au moment de l'utilisation, ce qui permet de faire remonter vers celui-ci des informations provenant du téléphone.A bidirectional communication can be established with the
En particulier, préalablement à la génération de l'accréditation acoustique CAC, le module acoustique 54 de la serrure peut produire sous forme acoustique un mot de passe, qui est capté par le microphone du téléphone, puis transmis au réseau et au site distant 10 pour être incorporé à l'accréditation acoustique CAC qui va être générée par le moteur cryptographique 14 (champ PWD de la ligne c de la
En variante ou en complément de ce mot de passe, une autre sécurité consiste à faire générer par le module acoustique 54 une valeur de retard ou décalage temporel Δt1, différente à chaque fois (par exemple un retard aléatoire), et à la transmettre au site sécurisé 10 afin que celui-ci ajoute ce décalage temporel Δt1 à l'accréditation acoustique CAC lors de l'émission de celle-ci (ligne g de la
Claims (9)
le système étant également caractérisé en ce que le dispositif de serrure (28) comporte un module acoustique (54) comprenant :
the system being further characterized in that the lock device (28) comprises an acoustic module (54) comprising:
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP09170475.9A EP2306407B1 (en) | 2009-09-16 | 2009-09-16 | Secure system for programming electronically controlled lock devices using encoded acoustic verifications |
ES09170475T ES2428004T3 (en) | 2009-09-16 | 2009-09-16 | Secured digital control locks management system, adapted to operation through encrypted acoustic accreditations |
PCT/FR2010/051502 WO2011033199A1 (en) | 2009-09-16 | 2010-08-16 | System for the secure management of digitally controlled locks, operating by means of crypto acoustic credentials |
US13/394,855 US8712365B2 (en) | 2009-09-16 | 2010-08-16 | System for the secure management of digitally controlled locks, operating by means of crypto acoustic credentials |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP09170475.9A EP2306407B1 (en) | 2009-09-16 | 2009-09-16 | Secure system for programming electronically controlled lock devices using encoded acoustic verifications |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2306407A1 true EP2306407A1 (en) | 2011-04-06 |
EP2306407B1 EP2306407B1 (en) | 2013-06-19 |
Family
ID=41285267
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP09170475.9A Not-in-force EP2306407B1 (en) | 2009-09-16 | 2009-09-16 | Secure system for programming electronically controlled lock devices using encoded acoustic verifications |
Country Status (4)
Country | Link |
---|---|
US (1) | US8712365B2 (en) |
EP (1) | EP2306407B1 (en) |
ES (1) | ES2428004T3 (en) |
WO (1) | WO2011033199A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2720199A1 (en) | 2012-10-11 | 2014-04-16 | Openways Sas | Secured method for controlling the opening of locking devices by means of messages using symmetric encryption |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012064263A1 (en) * | 2010-11-09 | 2012-05-18 | Zaplox Ab | Method and system for remote operation of an installation |
EP2500872A1 (en) * | 2011-03-08 | 2012-09-19 | Openways Sas | Secured method for controlling the opening of locking devices by means of a communication object such as a mobile phone |
FR2974695B1 (en) * | 2011-04-29 | 2013-06-07 | Tagattitude | MODULE FOR MANAGING A TRANSACTION BETWEEN A TERMINAL AND AN ELECTRONIC DEVICE |
US20140068247A1 (en) * | 2011-12-12 | 2014-03-06 | Moose Loop Holdings, LLC | Security device access |
US9330514B2 (en) | 2012-07-25 | 2016-05-03 | Utc Fire & Security Corporation | Systems and methods for locking device management |
US8919024B2 (en) * | 2013-02-06 | 2014-12-30 | Karl F. Milde, Jr. | Secure smartphone-operated gun trigger lock |
EP3087774B1 (en) | 2013-12-23 | 2022-01-05 | Assa Abloy Inc. | Method for utilizing a wireless connection to unlock an opening |
KR101567333B1 (en) * | 2014-04-25 | 2015-11-10 | 주식회사 크레스프리 | Mobile communication terminal and module for establishing network communication of IoT device and method of establishing network communication of IoT device with using mobile communication terminal |
CN110264182B (en) * | 2014-06-02 | 2023-08-29 | 施拉奇锁有限责任公司 | Electronic certificate management system |
WO2018075605A1 (en) | 2016-10-19 | 2018-04-26 | Best Access Solutions, Inc. | Electro-mechanical lock core |
AU2018330295B2 (en) | 2017-09-08 | 2023-11-30 | Dormakaba Usa Inc. | Electro-mechanical lock core |
WO2019200257A1 (en) | 2018-04-13 | 2019-10-17 | Dormakaba Usa Inc. | Electro-mechanical lock core |
US11466473B2 (en) | 2018-04-13 | 2022-10-11 | Dormakaba Usa Inc | Electro-mechanical lock core |
WO2020132458A1 (en) * | 2018-12-20 | 2020-06-25 | Schlage Lock Company Llc | Audio-based access control |
US11317748B2 (en) * | 2020-01-23 | 2022-05-03 | Jacqueline Foster | Programmable lock box |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5933090A (en) * | 1996-08-23 | 1999-08-03 | Ut Automotive Dearborn, Inc. | Method and apparatus for field programming a remote control system |
WO2003093997A1 (en) * | 2002-04-30 | 2003-11-13 | Ge Interlogix, Inc. | Lock box security system with improved communication |
WO2007046804A1 (en) * | 2005-10-20 | 2007-04-26 | Harrow Products Llc | Lock programming device |
WO2008107595A2 (en) | 2007-01-18 | 2008-09-12 | Tagattitude | Method and telecommunication system for providing a service to the user of personal equipment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6161005A (en) * | 1998-08-10 | 2000-12-12 | Pinzon; Brian W. | Door locking/unlocking system utilizing direct and network communications |
AU1513301A (en) * | 1999-11-30 | 2001-06-12 | Bording Data A/S | An access control system |
US7916641B2 (en) * | 2006-06-29 | 2011-03-29 | Wi-Lan, Inc. | System and process for packet delineation |
-
2009
- 2009-09-16 EP EP09170475.9A patent/EP2306407B1/en not_active Not-in-force
- 2009-09-16 ES ES09170475T patent/ES2428004T3/en active Active
-
2010
- 2010-08-16 WO PCT/FR2010/051502 patent/WO2011033199A1/en active Application Filing
- 2010-08-16 US US13/394,855 patent/US8712365B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5933090A (en) * | 1996-08-23 | 1999-08-03 | Ut Automotive Dearborn, Inc. | Method and apparatus for field programming a remote control system |
WO2003093997A1 (en) * | 2002-04-30 | 2003-11-13 | Ge Interlogix, Inc. | Lock box security system with improved communication |
WO2007046804A1 (en) * | 2005-10-20 | 2007-04-26 | Harrow Products Llc | Lock programming device |
WO2008107595A2 (en) | 2007-01-18 | 2008-09-12 | Tagattitude | Method and telecommunication system for providing a service to the user of personal equipment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2720199A1 (en) | 2012-10-11 | 2014-04-16 | Openways Sas | Secured method for controlling the opening of locking devices by means of messages using symmetric encryption |
Also Published As
Publication number | Publication date |
---|---|
WO2011033199A1 (en) | 2011-03-24 |
ES2428004T3 (en) | 2013-11-05 |
EP2306407B1 (en) | 2013-06-19 |
US8712365B2 (en) | 2014-04-29 |
US20120172018A1 (en) | 2012-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2306407B1 (en) | Secure system for programming electronically controlled lock devices using encoded acoustic verifications | |
EP2284803B1 (en) | Secure system for programming electronically controlled lock devices using encoded acoustic verifications | |
EP2720199B1 (en) | Secured method for controlling the opening of locking devices by means of messages using symmetric encryption | |
EP2500872A1 (en) | Secured method for controlling the opening of locking devices by means of a communication object such as a mobile phone | |
EP2282297A1 (en) | Security system to control the opening of locking devices using encoded acoustic verifications | |
EP2008483B1 (en) | Method of securing access to a proximity communication module in a mobile terminal | |
EP1549011A1 (en) | Communication method and system between a terminal and at least a communication device | |
WO2016102887A1 (en) | Method for automatic recognition between a mobile device and a motor vehicle, capable of functioning according to the ble protocol | |
WO2009112693A2 (en) | Method for authentication and signature of a user in an application service using a mobile telephone as a second factor in addition to and independently from a first factor | |
FR2864289A1 (en) | Resource access controlling method, involves notifying comparison of biometric data and biometric references of user, to access terminal, by server that communicates simultaneously with terminal and access terminal | |
EP3707857A1 (en) | Device for storing digital keys for signing transactions on a blockchain | |
FR2861236A1 (en) | Mobile telephone telecommunications network Internet user access having secure communications channel receiving remotely loaded authentication code and user authorised from sound signals/mobile phone identifying | |
EP0950307B1 (en) | Method and system for ensuring the security of the supply of services of telecommunication operators | |
FR2987150A1 (en) | SECURING A DATA TRANSMISSION. | |
EP1336287B1 (en) | Calling from a radiotelephone terminal | |
WO2020169570A1 (en) | Method for processing a payment transaction, and corresponding device, system and programs | |
EP3262553B1 (en) | Method of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers | |
WO2013034865A1 (en) | Authentication method | |
EP2084679A1 (en) | Portable electronic entity and method for remotely blocking a functionality of said portable electronic entity | |
FR3145049A1 (en) | METHOD FOR RECORDING ON A BIOMETRIC DATA CARD OF A HOLDER OF THIS CARD | |
FR3105482A1 (en) | Method of obtaining a password for access to a service | |
FR3087023A1 (en) | SECURE VEHICLE ACCESS SYSTEM USING A SMARTPHONE |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
17P | Request for examination filed |
Effective date: 20110705 |
|
17Q | First examination report despatched |
Effective date: 20110721 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 618023 Country of ref document: AT Kind code of ref document: T Effective date: 20130715 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: FRENCH |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602009016486 Country of ref document: DE Effective date: 20130814 |
|
REG | Reference to a national code |
Ref country code: SE Ref legal event code: TRGR |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: T3 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130919 Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130920 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2428004 Country of ref document: ES Kind code of ref document: T3 Effective date: 20131105 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 618023 Country of ref document: AT Kind code of ref document: T Effective date: 20130619 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130919 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130717 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131021 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20131019 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 |
|
26N | No opposition filed |
Effective date: 20140320 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602009016486 Country of ref document: DE Effective date: 20140320 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20130916 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130619 Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20130916 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20090916 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 8 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 9 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 10 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 20190726 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20190917 Year of fee payment: 11 Ref country code: SE Payment date: 20190917 Year of fee payment: 11 Ref country code: DE Payment date: 20190726 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BE Payment date: 20190925 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20190725 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20190816 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: ES Payment date: 20191016 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20200723 Year of fee payment: 12 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602009016486 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MM Effective date: 20201001 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20200916 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20200930 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20201001 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210401 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200917 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200916 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200930 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200930 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200930 |
|
REG | Reference to a national code |
Ref country code: SE Ref legal event code: EUG |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200916 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FD2A Effective date: 20220118 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200917 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210930 |