EP2710561A1 - Dispositif de contrôle d'accès, système de contrôle d'accès et procédé de contrôle d'accès - Google Patents

Dispositif de contrôle d'accès, système de contrôle d'accès et procédé de contrôle d'accès

Info

Publication number
EP2710561A1
EP2710561A1 EP12719716.8A EP12719716A EP2710561A1 EP 2710561 A1 EP2710561 A1 EP 2710561A1 EP 12719716 A EP12719716 A EP 12719716A EP 2710561 A1 EP2710561 A1 EP 2710561A1
Authority
EP
European Patent Office
Prior art keywords
persons
group
token
person
receiving space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP12719716.8A
Other languages
German (de)
English (en)
Other versions
EP2710561B1 (fr
Inventor
Klaus Herrmann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bundesdruckerei GmbH
Original Assignee
Bundesdruckerei GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bundesdruckerei GmbH filed Critical Bundesdruckerei GmbH
Publication of EP2710561A1 publication Critical patent/EP2710561A1/fr
Application granted granted Critical
Publication of EP2710561B1 publication Critical patent/EP2710561B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/10Movable barriers with registering means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Definitions

  • Access control device access control system and method
  • the invention relates to a device for access control of a group of persons, an access control system and a method for access control of a group of persons with the aid of ID tokens.
  • DE 101 464 59 A1 discloses a method for securing access to a secure area, in which not every single person necessarily has to be checked. For this purpose, a number of persons located in a check area are determined and a number of existing in the area Authorization cards to verify that the number of people matches the number of credentials.
  • the object of the invention is to provide an improved access control device, an access control system and a method for access control of a group of persons.
  • a device for access control of a group of people which serves for example to control the access to a protected area, a border control or other sovereign or non-sovereign applications.
  • the device for access control includes locking means for locking and unlocking a receiving space for a group of people.
  • the locking means may have a suitable locking device, such as a controllable lock, a lock door or the like.
  • the receiving space can be formed as an access lock with an entrance and an exit door, the locking and unlocking, i.
  • the control of the entrance and exit doors for opening and closing the access lock can be designed controllable by control means of the device.
  • the device also has sensor center! for detecting the number of persons of the group of persons accommodated in the reception room.
  • the sensor means may be designed such that the heat radiation of the persons, in particular their face temperature, their weight and / or another parameter is detected in order to determine the number of persons who have entered the receiving space. In particular, this can be done optically by monitoring the receiving space with the aid of a camera which has a CCD sensor and the number of people is determined with the help of image processing software.
  • At least one first reading device for signaling a successful authentication of a person of the group of persons in the recording room to an ID token assigned to this person belongs to the device.
  • the ID token can be a portable electronic device, such as a so-called USB stick, or a document, in particular a value or security document.
  • the ID token can be a paper-based and / or plastic-based document, such as an identity document, in particular a passport, identity card, visa, driver's license, company ID card, health card, bank card and a vehicle registration document, bill of lading or other proof of entitlement ,
  • the ID token can be designed as a chip card with a contact-based and / or contactless interface or as an RFID token.
  • it can also be contained in a means of payment, in particular a banknote, a bank card or a credit card.
  • the ID token may have a data memory for storing at least one attribute of a person, which is assigned to the ID token, and in particular for storing reference data and image data, in particular a digital passport photo, may be formed.
  • the ID token also has means for authenticating the person to the ID token so that the person concerned can prove that it is actually associated with the ID token.
  • authentication methods known per se from the prior art can be used, in particular authentication by entering a secret identifier, ie a so-called personal identification number (PIN), and / or biometric authentication methods.
  • PIN personal identification number
  • protocols known per se from the prior art can also be used, such as, for example, the basic access control (BAC) -, Extended Access Control!
  • the first reader is a so-called Class 2 or Class 3 Reader with a Keyboard
  • the keypad of the first reader to authenticate against the ID token Transfer the reader to the ID token where the entered PIN is compared to stored reference data If the entered PIN matches the stored reference data, the person is considered authenticated to the ID token and the ID token gives a corresponding authentication sign!
  • the first reader may have other input devices.
  • the device also has control means for unlocking the interlocking device, provided that the detected number of persons equals the number of authenticated signatures.
  • the control means are thus coupled to the sensor means and the at least first reading device, so that the control means can compare the detected number of persons for agreement with the number of authentications made with respect to the first reading device (s). If both numbers match, the control means effect unlocking of the receiving space so that the group of people can leave the receiving space, for example to enter a protected building area or to pass a national border.
  • the control means may comprise a single computer or a computer network.
  • the communication between the control means, the locking means, the sensor means and the at least one first reading device can also take place via a network, in particular an Ethernet.
  • the "nailing agent" can be, for example, a controllable door trap into which an access door of the receiving space can fall in. By a corresponding signal from the control means, the door latch is released so that the door of the receiving space can be opened.
  • a turnstile which can be locked, that is locked, can be, and unlocked by a corresponding signal of the control means, that is, released, can be.
  • the locking means may comprise an electric motor driven door, wherein the electric motor for opening and closing the door, as well as to hold the door in the closed locking position, can be controlled by the control means.
  • the receiving space has a single access door for the group of people.
  • the receiving space is designed as an access lock with at least one entrance door and one exit door.
  • the exit door is locked, the entrance door is unlocked so that the group of people can enter the reception room. Subsequently, the front door is locked. If the condition for unlocking has been fulfilled, the control center will control! the exit door to unlock or open so that the group of people can leave the reception room through the exit door.
  • a plurality of the first readers are arranged distributed in the receiving space.
  • the multiple first readers can be operated in parallel, so that at the same time the authentification of several persons can take place.
  • the sensor means have first sensors for each of the first readers to detect the presence of each person of the group of persons at a location of the respective first reader.
  • the authentication of the persons against the ID token via the first readers is only released by the control means after the first sensors have detected the presence of one person on each of the readers.
  • the throughput can be greatly increased due to the parallel operation of several of the first readers.
  • the sensory detection of the number of persons is facilitated by the fact that the presence of each person is not detected somewhere in the recording room, but at the respective locations of the readers.
  • the first sensors at the location of each of the first readers namely a separation of persons within the recording room is inevitably made, which greatly facilitates the sensory detection of the number of people and designed very safe.
  • a camera may be disposed on each of the readers to detect the presence of a person at the location of the particular reader, such as a thermal imaging camera and / or a camera operating in the visible range.
  • a weight sensor may be present at each location of the first readers. A person wishing to authenticate to one of the first readers must then enter the coverage area of the particular weight sensor of the selected first reader so that the weight of the person can detect their presence at the location of the selected reader.
  • a stool in front of each of the readers, a stool can be firmly fixed, on which a person must sit, so that the authentication can take place with respect to the selected first reading device. In each of the stools is a sensor to sense the burden of the stool with the weight of a person.
  • the sensor means comprise at least one second sensor for detecting persons who are not at the location of one of the first readers in the receiving space.
  • the receiving space is monitored outside the locations of the first readers by a suitable sensor, such as a thermal imaging camera, a CCD camera or the like. It is of particular advantage that on the one hand, the sensing of the residence of one or no person at the locations of the readers and the sense that no person is in the receiving space outside the locations of the readers, technically safe and inexpensive to implement.
  • the ID tokens of the persons are designed for authentication to a second reading device.
  • this may include a so-called chip authentication of the electronic chip of the ID token relative to the second reader and optionally also an authentication of the second reader to the ID token, that is, the so-called terminal authentication.
  • the second reading device is arranged outside the receiving space, for example in a waiting area.
  • the person's ID token stores that person's biometric reference data, such as fingerprint data, facial biometrics, iris scan data, and / or other biometric data. Furthermore, the ID token has an identifier which uniquely identifies the ID token. The identifier may be of the ID token, for example, optically or via an electronic
  • MMRZ Machine Readable Zone
  • the second reading device is designed to detect this identifier from the ID token and to perform at least one-sided authentication of the ID token against this second reading device, for example according to the BAC and / or EAC protocol. After successful authentication, the second reading device reads out the biometric reference data stored in the ID token and stores it with the identifier as an access key in a memory, for example the control means.
  • the first readers which are located in the receiving space are also formed in this embodiment for detecting the identifier, which previously had already detected the second readers outside the recording room.
  • the first readers are further adapted to capture the biometric feature for which biometric reference data is stored in the ID token.
  • the procedure is such that the identifiers are again recorded in the recording room with the aid of the first readers, and then with the help of the identifiers the respective biometric reference data are read from the memory in order to match those of the first readers each to compare recorded biometric features.
  • the unlocking then takes place under the further condition that the recorded biometric characteristics of the persons with the respective biometric reference data sufficiently match.
  • This embodiment has the particular advantage that the security against manipulation at high throughput is further increased. This is made possible by the fact that the waiting time of the persons outside the recording room is used to read out the biometric reference data from the ID tokens safely, taking account of data protection requirements. must not take place within the recording room.
  • the residence time of the group of people in the recording room can therefore be kept very short even with a biometric check.
  • the biometric reference data read from the ID tokens and buffered in the memory are deleted after the authentication has been carried out, for example immediately before or after the unlocking. In this way it is ensured that the biometric reference data can not be collected and stored at central locations.
  • the device has inlet limiting means for limiting the number of persons of the group of persons, the number of persons to whom the inlet is limited in the receiving space being limited to the number of persons for whom the at least one second reading device has stored the biometric reference data in the memory.
  • the number of persons who authenticate themselves outside the recording space in the waiting area in relation to the second reading device and whose biometric reference data are read and buffered while the recording space is still locked is counted.
  • the number of persons admitted to the receiving room after unlocking is then limited to the number of persons for whom the biometric reference data has already been read. This is to prevent persons entering the recording room for whom no biometric reference data has yet been stored in the memory since this would lead to a delay in the procedure.
  • the receiving capacity of the waiting area in which the persons have access to the second reading device (s) can be chosen, for example, to be similar to the receiving capacity of the receiving space.
  • the inlet limiting means have at least one turnstile to limit the number of persons who can enter the receiving space.
  • An additional turnstile can be installed at the be arranged gangway of the waiting area in order to limit the number of people in the waiting area to the maximum recording capacity of the recording room.
  • the inlet limiting means can also be realized by one or more automatic doors.
  • Embodiments of the invention are particularly advantageous for applications involving groups of people who want simultaneous access to a protected area, such as border crossing, especially at airports, entering security zones of specially protected facilities, entering company premises, strongrooms of banks or lounges, for example in football stadiums,
  • Embodiments of the invention are of particular advantage in that an efficient access control of such groups of people can take place, without loss of security.
  • Embodiments of the invention are also of particular advantage for the access control of persons who can not operate the readers independently, such as, for example, children or persons with disabilities. Since a separation of the persons according to the invention does not take place or only within the same reception room, such persons within the reception room can be assisted by other persons of the group of persons.
  • the first readers may be advantageous to arrange the first readers close to one another in order to facilitate such assistance.
  • the first readers form a structural unit, in particular the antenna areas for supporting the ID tokens, if it is RFID tokens, the antenna areas, for example, as an elongated support surface with multiple PIN-input keyboards can be made side by side, or which For example, like a handrail run, built into the antenna, display and control panels are integrated.
  • the invention relates to an access control system comprising an embodiment of a device according to the invention and a plurality of 1D Token.
  • To the access control system may also include the receiving space, wherein the receiving space may be formed, for example, as an access lock.
  • the invention relates to a method for access control of a group of persons with the aid of a device or access control system according to the invention comprising the following steps: locking of the recording room after recording the group of people, recording the number of persons, the group of people recorded in the recording room, authenticating each of the persons of the group of persons accommodated in the recording room to an respectively assigned ID token within the recording room and signaling the successful authentications by the at least one first reading device, unlocking the recording room, provided that the number of persons recorded corresponds to the number of signa - authenticated authentications match.
  • FIG. 1 shows a block diagram of a first embodiment of a device according to the invention
  • FIG. 2 shows a flowchart of a first embodiment of a method according to the invention
  • FIG. 3 shows a block diagram of a second embodiment of a device according to the invention
  • FIG. 4 shows a flow chart of a second embodiment of a method according to the invention
  • FIG. 5 shows a block diagram of a third embodiment of a device according to the invention
  • 6 shows a flow chart of a third embodiment of a method according to the invention.
  • FIG. 1 shows a receiving space 100 for receiving a group of persons with a maximum number N of persons.
  • the receiving space has an automatic door 102, which may be operated by an electric motor, for example, to open and close an input and output 104 of the receiving space 100.
  • a controllable latch 106 such as a door latch, may be provided.
  • the receiving space 100 is monitored by at least one sensor 108.
  • the sensor 108 is for detecting the number of persons located in the accommodating space 100.
  • the sensor 108 may be, for example, a camera or a thermal sensor.
  • At least one reader 1 10 which with the ID tokens 112, 1 4, 1 6, 1 18, ... a group of people, such as persons 120, 122, 124, 126, .. interoperabe! is.
  • Each of the ID tokens is associated with exactly one of these persons, such as the ID token 12 of the person 120, the ID token 1 14 of the person 122, etc.
  • the ID tokens 1 14, 16, 1 18, ... are in principle the same as the ID token 1 12 shown in more detail in Figure 1 constructed.
  • the ID token 1 12 has an interface 128 to a corresponding interface 130 of the reader 1 10.
  • the interfaces 128, 130 may be contact-based or non-contact, in particular as RFI D interfaces formed.
  • the ID token 1 12 further has a processor 132 for executing program instructions 134 and an electronic memory 136 for storing reference data 138.
  • the reference data 138 may be, for example, at a secret identifier, such as a PIN, which should be known only to the person who is associated with the ID token 1 12, in this case only the person 120.
  • the reference data 138 may include biometric reference data of the person concerned .
  • the electronic memory 36 is a protected memory which only the processor 132 of the ID token 12 can internally access. A direct access via the interface 128 to the memory 136 and in particular the reference data 138 stored therein either depending on the embodiment, or only after release by the processor 132 is possible.
  • the reader 110 has a processor 140 for executing program instructions 142 and an interface 144 for communicating with a controller 146, which is designed as a computer, for example, and has a corresponding interface 148.
  • the interfaces 144 and 148 may be, for example, network interfaces, in particular Ethemet interfaces.
  • the reader 110 further has input or detection means, such as a keyboard 150 and / or a sensor 152.
  • the keyboard 150 may be configured to input the PIN into the reader 10, and the sensor 152 may be a biometric sensor for detecting a biometric feature from the subject.
  • the controller 146 has a processor 154 for executing program instructions 156. By executing the program instructions 156, the controller 146 may, for example, generate a signal 158 to actuate the latch 106 and / or the door 102 or their electromotive drive so as to open the door 102 to lock or unlock,
  • the controller may sense, for example via the line 160, the locking or unlocking state of the door 102.
  • the controller 146 is also connected to the sensor 108 via a line 162 through which the controller 146 receives a signal 164.
  • the signal 164 may be a sensor signal of the sensor. sors 104, which is then subsequently evaluated by the controller 146 by execution of the program instructions 156 to determine the number of persons in the recording room.
  • the processing of the sensor signal can already be carried out by a digital signal processing of the sensor itself, so that the signal 164 already indicates the detected number of persons. It is also possible ischformen, after which a preprocessing of the detected sensor signal by the Ausncee! Ektronik of the sensor 108 is carried out, so that correspondingly further evaluation by the controller 146 is reduced.
  • the interfaces 144 and 148 may be coupled to one another via further separate lines 166.
  • the controller 146 receives from the reader 1 10 a signal 168, which signals that an authentication of a person has taken place.
  • the lines 160, 162 and 166 may be wholly or partially replaced by a network, such as an Ethernet, via soft the various components, that is, the controller on the one hand and the latch / door 102, the sensor 108 and the reader 1 10 on the other can communicate with each other.
  • a network such as an Ethernet
  • a person group of M persons enters the reception room 100.
  • the persons of this group of people each carry their ID token, as also shown in FIG.
  • the door 102 After the entrance of the group of people in the receiving space 1 10, the door 102 is closed and locked. This can be done automatically or manually. With the aid of the sensor 108, the number M of persons is determined. Furthermore, the persons of this group of persons authenticate themselves with respect to their ID tokens with the aid of the reader 1 10. For example, the person 120 brings their ID token 1 12 into the detection area of the interface 130. The person 120 gives via the keyboard 150 of the reader 1 10 then insert your PIN into the reader.
  • the PIN is transmitted by execution of the program instructions 142 via the interface 130 to the ID token 1 12 and evaluated there by execution of the program instructions 134 by the processor 132 accesses the reference data 38 and these are compared with the received via the interface 128 PIN , If the received PIN matches the reference data 138, the processor 132 generates a corresponding signal which is transmitted via the interface 128 to the interface 130 of the reader 1 10 and forwarded to the controller 146 via the interface 144 as a signal 168 by execution of the program instructions 142 ,
  • the detected number of people M and the number of signals 68, each signaling a successful authentication of a person against an ID token are processed by execution of the program instructions 156 by the controller 146 by the number M of persons detected with the number of signals 168 is compared.
  • the processor 154 then generates the signal 158 to unlock the door 102.
  • the group of people can then leave the reception room 100, for example to pass a border or to enter a protected building area.
  • a biometric feature for example of the person 120
  • the sensor 152 instead of the PIN via the keyboard 150 and transmitted via the interface 130 to the ID token 1 12, so that there the received biometric data with the reference data 138 sufficient conformity can be checked, for example by a so-called match on card procedure.
  • the reference data 138 is read from the ID token 1 12 by the reader 1 10 or the controller 146 to the review of a sufficient match of the detected biometric features with the reference data 138 by the reader 1 10 and by to make the controller 146.
  • both the biometric reference data read from the ID token 12 and the biometric features sensed by the person 120 are transmitted from the reading device 110 to the controller 146 in order to evaluate them there.
  • FIG. 2 shows a corresponding flow chart.
  • step 200 a number of M persons are admitted into a receiving space of an access control device according to the invention.
  • the number M of persons in the recording room is sensed ⁇ step 202).
  • step 204 the persons of the group of people within the recording room respectively authenticate to their ID tokens, each of the successful authentications being signaled to a control unit.
  • the control unit compares the number of authentications made with the detected number M in step 206. If both counts match, then in step 208, a release signal is generated by the controller to signal that the group of people can pass; the release signal can unlock the receiving space, so that the M people can leave this again.
  • a message is generated in step 210, which is directed, for example, to a border official so that he can intervene.
  • FIG. 3 shows a further embodiment of a device according to the invention.
  • a number of N readers 10.1 to 1 10.N are distributed in the receiving space 110.
  • the readers can be monitored, for example by means of a camera.
  • a separate sensor for example a camera, a thermal sensor and / or a weight sensor, is preferably located on each of the reading devices in order to detect the presence of a person at the location of the relevant reading device.
  • a traffic area of the receiving space by a further Sen ⁇ sor 170 can be monitored to ensure that except at the readers no other persons in the receiving space.
  • the readers 110.1 - 1 10.N are designed in the embodiment considered here so that an authentication of a person against the relevant ID tokens will only be possible after the reader concerned a Freigabesigna! 172 received from the controller 146. Previously, it is not possible to enter the PIN via the keyboard 150 or to detect the biometric feature via the sensor 152 (see FIG.
  • the signals 164 of the sensors 08.1 - 108. N are evaluated by the control 146, whether they have the presence of exactly one or none Show person at the location of the respective reader. Furthermore, a signal 174 of the sensor 170 is checked by the controller 146 as to whether there are no further persons in the receiving space 110. If, therefore, the persons 120, 122, 124 and 126 move to the readers 1 10.1, 1 10.2, 10.3 or 110.4, as shown in FIG. 3, this is detected by the corresponding sensors 108.1, 108.2, 108.3 and 108.4 and signaled to the controller 146.
  • the processor 154 of the controller 146 generates the enable signals 172 by executing the program instructions 156 only on condition that all of the sensors 108 signal the presence of one or more persons on one of the readers 10, and further that the sensor 170 does not detect the presence of any further Person in the reception room 100 signals. In the case under consideration, the person 76 must therefore first leave the receiving space 100 before the authentications can take place.
  • the unlocking of the door 102 takes place here then on the condition that on each of the readers 1 10.1 to 1 10.4, in which the presence of a person has been detected, a successful authentication was carried out.
  • FIG. 4 shows a corresponding flow chart.
  • step 300 persons are admitted.
  • the number M is detected in step 302 by a number of N sensors (see the readers 1 10.1 - 1 10.N of Figure 3).
  • step 304 it is checked in step 304 whether there is otherwise a person in the receiving room who has not gone to one of the readers. If this is the case, a message is generated in step 306, so that, for example, a border official can intervene.
  • step 308 the authentication of the M persons to the respective readers to which they are located is released. For a reader, for which the presence of a person has not been detected, no authentication is released, so that the authentications can be made only on those readers on which actually lent a person in the recording room.
  • the unlocking takes place in step 314, otherwise a message is again generated in step 312.
  • a predetermined maximum time may be defined within which all of the authentications must have taken place. If this time is exceeded, then the message 312 is branched.
  • the embodiment according to FIG. 5 is further developed in comparison to the embodiment according to FIG. 3 such that a waiting area 180 is located in front of the receiving space 100, which serves for receiving a further group of people, as long as there is still a group of people in the receiving space 100.
  • the reading device 10 Outside the receiving space 00 there is at least one reading device 10 'with an interface piece 130', which in principle can be constructed like the interface 130 of the readers 1 10 in the receiving space 100.
  • the reading device 110 ' has a processor 140' for executing program instructions 142 'and an interface 144' for communication with the corresponding interface 148 'of the controller 146.
  • the reader 1 0' has an optical sensor 186, for example, for performing a so-called BAC, namely one of the ID tokens on the ID To visually capture tokens printed information, such as the so-called MRZ.
  • the ID tokens 1 12 to 118 or 1 12 'to 18' may be particularly preferably machine-readable travel documents, in particular electronic passports or electronic identity cards, in particular according to one from the Federal Office for Information Security (BSI) and / or or the International Aviation authorities (ICAO) defined standard act.
  • BSI Federal Office for Information Security
  • IAO International Aviation authorities
  • the waiting area 180 may be defined, for example, by a turnstile 188 and a turnstile 190.
  • the hubs 188 and 190 are connected via lines 192 and 194, respectively, to the controller 146, which blocks the turnstiles. Due to the turnstile 188, the door 102 may be omitted or the door 02 is formed so that the various people can pass only one after another, so access to the receiving space 100 on the maximum personah! to limit.
  • the receiving space 100 is here preferably designed as an access lock, that is, the door 102 serves only to enter the receiving space 100 and another door 102 'with a corresponding latch 106' is used exclusively for leaving the receiving space 100th
  • the controller 146 is here designed to include an electronic memory 196 for storing a database 198.
  • the further group of persons 184 is let into the waiting area 180, for example by release of the turnstile 190 by the control 146.
  • the persons 120 'to 126' of this further group of persons 184 bring each successively their ID tokens in the detection range of the reader 1 0 ', for example, to carry out a BAC and subsequent EAC for a one-sided or mutual authentication of the ID token and the reader 1 0'.
  • the reader 110 'obtains the read rights to reference data 138 stored in the respective memory 136 of one of the ID tokens, the embodiment considered here being biometric reference data.
  • unprotected data can also be read from the memory 136, such as a facial image.
  • an identifier of the ID token is detected by the relevant ID token, for example with the aid of the optical sensor 186 or via the interface 130 '.
  • the reference data 138 read from one of the ID tokens are then transferred together with the associated identifier from the reader 10 'to the controller 146 and stored in the database 198, the identifier being used as a database key for a later database access to the reference data.
  • a reading device 1 10 ' a plurality of reading devices can also be arranged in the waiting area 180, such as, for example, a number of N reading devices 1 10' in order to paralyze this process.
  • the controller 146 then lets the group of people 184 pass through the turnstile 188 so that it enters the receiving space 100.
  • the number of persons who can pass the turnstile 188 can be further restricted besides N in that a maximum of the number of persons for whom the reference data was previously stored within the waiting area 180 in the database 198 is transmitted. This prevents persons from the waiting area 180 from entering the receiving space 00, which previously had not been on the reading device 1 10 '.
  • the group of people 184 is separated in the receiving space 100 by the persons 120 'to 126' go to the various readers 1 10.1 - 1 10.4. With the help of the readers then only the respective identifier of the ID token is recorded and the biometric feature of the person.
  • the identifier together with the biometric feature detected in each case is transmitted from the reader to the controller 146.
  • the controller accesses the database 198 with the identifier received by the reader as a key in order to read the corresponding reference data from the database and to compare it with the recorded biometric data received by the respective reader. If in this manner a successful authentication of all M persons of the group of persons 184 has taken place, the controller 146 activates the latch 106 'to open the door 102'.
  • FIG. 6 shows a corresponding flowchart.
  • step 400 a number of M persons are admitted to the waiting area.
  • the second readers see reader 1 10 'of Figure 5
  • the second readers which are used to authenticate the ID token of the people admitted in the waiting area against the or the second Lesege- rates and an identifier and Read reference data from the ID tokens.
  • step 404 the reference data with the identifier as access key is stored in a database (see database 198 of Fig. 5).
  • the M persons are admitted from the waiting area into the receiving space.
  • the number is then recorded in the receiving space in step 408 by N sensors, with one sensor each being located on one of the reading devices (see the embodiment of FIG.
  • step 410 If it is determined in step 410 that there is another person besides the readers in the recording room, a corresponding message is generated in step 412. In the opposite case, the use of the first readers in the recording room is released in step 414 to enable authentication of the persons. For this purpose, first in step 416, the identifier is detected by the ID token and in the
  • Step 418 the biometric features of each of the persons are sensed.
  • step 420 the identifier used in the
  • Step 416 has been accessed, the database is accessed to read the respective stored reference data and to compare in step 422 with the respective biometric features. This results in an authentication of each person of the group of people, namely, in each case in the
  • Step 414 sensorially detected characteristics of one of the persons with the reference data stored for this person sufficiently match.
  • step 424 a check is then made as to whether the number of successful authentications equals the number M of persons as detected in step 408. If this is not the case, then in step 426 a corresponding Message generated and in the opposite case, an unlocking of the exit door of the recording room is made in step 428.
  • the database 198 is then cleared to prevent central collection of the reference data.
  • steps 400 to 404 can be carried out in the sense of pipelined processing for a subsequent further group of persons.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

L'invention concerne un dispositif de contrôle d'accès d'un groupe de personnes (182, 184), comprenant des moyens de verrouillage (106, 102, 188) pour verrouiller et déverrouiller un espace d'accueil (100) destiné à un groupe de personnes, des moyens de détection (108) pour détecter le nombre de personnes du groupe accueilli dans l'espace d'accueil, au moins un premier lecteur (110) pour signaliser une authentification réussie d'une personne dudit groupe se trouvant dans l'espace d'accueil relativement à un jeton ID affecté à cette personne, des moyens de commande (146) pour déverrouiller le moyen de verrouillage sous réserve que ledit nombre de personnes soit identique aux authentifications signalisées.
EP12719716.8A 2011-05-17 2012-05-09 Dispositif de contrôle d'accès, système de contrôle d'accès et procédé de contrôle d'accès Active EP2710561B1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102011076004A DE102011076004A1 (de) 2011-05-17 2011-05-17 Vorrichtung zur Zugangskontrolle, Zugangskontrollsystem und Verfahren zur Zugangskontrolle
PCT/EP2012/058487 WO2012156238A1 (fr) 2011-05-17 2012-05-09 Dispositif de contrôle d'accès, système de contrôle d'accès et procédé de contrôle d'accès

Publications (2)

Publication Number Publication Date
EP2710561A1 true EP2710561A1 (fr) 2014-03-26
EP2710561B1 EP2710561B1 (fr) 2017-01-04

Family

ID=46046211

Family Applications (1)

Application Number Title Priority Date Filing Date
EP12719716.8A Active EP2710561B1 (fr) 2011-05-17 2012-05-09 Dispositif de contrôle d'accès, système de contrôle d'accès et procédé de contrôle d'accès

Country Status (6)

Country Link
EP (1) EP2710561B1 (fr)
CN (1) CN103534734B (fr)
AU (1) AU2012257871B2 (fr)
DE (1) DE102011076004A1 (fr)
PT (1) PT2710561T (fr)
WO (1) WO2012156238A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3611659A1 (fr) * 2018-08-14 2020-02-19 Bundesdruckerei GmbH Dispositif de fourniture d'une pluralité de caractéristiques biométriques d'une pluralité de personnes d'un groupe de personnes

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106256744B (zh) 2015-06-19 2019-12-10 奥的斯电梯公司 电梯乘坐用户管理方法及系统
CN105374096A (zh) * 2015-12-07 2016-03-02 天津博威动力设备有限公司 一种多检测手段门禁系统
CN105827639A (zh) * 2016-05-13 2016-08-03 上海迅饶自动化科技有限公司 X2BACnet协议转换网关软件
US10370877B2 (en) * 2016-09-22 2019-08-06 Lenovo (Singapore) Pte. Ltd. Destination criteria for unlocking a vehicle door
US11024105B1 (en) * 2017-10-16 2021-06-01 Cybra Corporation Safety and security methods and systems
CN108921979A (zh) * 2018-04-10 2018-11-30 浙江易云物联科技有限公司 一种人行通道管理系统及其方法
CN109559409B (zh) * 2018-10-11 2020-06-02 江苏农林职业技术学院 一种果蔬自助采摘温室用的云控制门禁系统及其图像识别方法
CN109407601B (zh) * 2018-10-29 2021-04-30 北京东华合创科技有限公司 基于数据分析的智能实验室监控报警系统
CN111554028B (zh) * 2020-05-19 2022-03-25 青岛聚好联科技有限公司 一种蓝牙门禁系统及其交互方法

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3617373B2 (ja) * 1999-06-03 2005-02-02 オムロン株式会社 ゲート装置
DE10146459B4 (de) 2001-09-20 2005-03-03 Deutsche Post Ag Verfahren zur Zutrittssicherung, Vorrichtung zur Zutrittskontrolle und Aufzugskabine
CN1696982A (zh) * 2005-04-11 2005-11-16 中华人民共和国珠海出入境边防检查总站 一种边检自动查验方法
DE102005025806B4 (de) 2005-06-02 2008-04-17 Bundesdruckerei Gmbh Verfahren zum Zugriff von einer Datenstation auf ein elektronisches Gerät
WO2007036057A1 (fr) * 2005-09-30 2007-04-05 Inventio Ag Systeme d'ascenseur pour transporter des utilisateurs dans une partie de batiment
TWI336054B (en) * 2006-02-15 2011-01-11 Toshiba Kk Person identification device and person identification method
DE102006036108A1 (de) * 2006-05-19 2007-11-22 Siemens Ag Vorrichtung und Verfahren zur Kontrolle von Personen
JP4751442B2 (ja) * 2008-12-24 2011-08-17 株式会社東芝 映像監視システム
CN101706976A (zh) * 2009-08-26 2010-05-12 深圳市飞瑞斯科技有限公司 一种基于视频人数统计防尾随的系统和装置
CN101774501B (zh) * 2009-10-19 2013-07-24 秦皇岛开发区前景电子科技有限公司 一种具有安防功能的入户电梯管理方法及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2012156238A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3611659A1 (fr) * 2018-08-14 2020-02-19 Bundesdruckerei GmbH Dispositif de fourniture d'une pluralité de caractéristiques biométriques d'une pluralité de personnes d'un groupe de personnes

Also Published As

Publication number Publication date
EP2710561B1 (fr) 2017-01-04
DE102011076004A1 (de) 2012-11-22
CN103534734B (zh) 2016-11-23
CN103534734A (zh) 2014-01-22
AU2012257871B2 (en) 2016-06-30
PT2710561T (pt) 2017-02-21
WO2012156238A1 (fr) 2012-11-22
AU2012257871A1 (en) 2013-11-21

Similar Documents

Publication Publication Date Title
EP2710561B1 (fr) Dispositif de contrôle d'accès, système de contrôle d'accès et procédé de contrôle d'accès
DE69815272T2 (de) Durch Fingerabdruckvergleich kontrollierter Zugang zu Türen und Maschinen
DE69530569T2 (de) Zu- und Ausgangs-Kontrollsystem
EP1669941B1 (fr) Système de contrôle d'accès
EP3304501B1 (fr) Procédé de contrôle d'accès électronique
EP2203900B1 (fr) Système de contrôle des personnes et procédé en vue d'exécuter un contrôle de personnes
DE102010016098A1 (de) Zugangskontrollvorrichtung
WO2001039133A1 (fr) Systeme et procede de controle automatique du passage d'une frontiere
DE102004048403A1 (de) Zugangskontrollvorrichtung
WO2013127625A1 (fr) Procédé d'identification d'une personne
DE102015225778A1 (de) Vorrichtung und Verfahren für die personalisierte Bereitstellung eines Schlüssels
EP3942535A1 (fr) Système et procédé de contrôle de bagages
EP1102216A2 (fr) Système et procédé de contrôle automatique du passage d'une frontière
EP2820624B1 (fr) Procédé d'identification d'une personne
EP1752931A1 (fr) Méthode pour déverrouiller automatiquement la barrière d'un passage pour personnes
DE102015220798A1 (de) Zugangskontrollsystem für einen Lagerbereich sowie Verfahren zur Zugangskontrolle
DE102017009430B4 (de) System zur Kontrolle einer Person
EP2137705B1 (fr) Procédé pour transmettre les données concernant une personne à un dispositif de contrôle
EP1306815B1 (fr) Dispositif de contrôle d'accès
EP3032501B1 (fr) Procédé destiné au fonctionnement d'un système de contrôle d'accès ID
DE102005029714B3 (de) Bank-Mietfachanlage
EP4300384A1 (fr) Système d'arrière-plan pour un système de transport de personnes
EP1385116A1 (fr) Méthode pour accorder une autorisation d'accès
DE102005033043A1 (de) Verfahren zur Prüfung der Berechtigung einer Person durch dezentralen Vergleich von Gesichtsfelddaten, eine Einrichtung zu nutzen und/oder zu betreten.
DE102011054449B4 (de) Selbstlernende personallose biometrische Zutrittskontrolle

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20131217

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20160201

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAJ Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR1

INTG Intention to grant announced

Effective date: 20160622

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTC Intention to grant announced (deleted)
INTG Intention to grant announced

Effective date: 20160801

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 859916

Country of ref document: AT

Kind code of ref document: T

Effective date: 20170115

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: PT

Ref legal event code: SC4A

Ref document number: 2710561

Country of ref document: PT

Date of ref document: 20170221

Kind code of ref document: T

Free format text: AVAILABILITY OF NATIONAL TRANSLATION

Effective date: 20170215

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502012009211

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 6

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170504

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170404

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170405

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170404

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502012009211

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

26N No opposition filed

Effective date: 20171005

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170509

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20170531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170509

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 7

REG Reference to a national code

Ref country code: AT

Ref legal event code: MM01

Ref document number: 859916

Country of ref document: AT

Kind code of ref document: T

Effective date: 20170509

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170509

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20120509

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170104

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230526

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PT

Payment date: 20230428

Year of fee payment: 12

Ref country code: NL

Payment date: 20230519

Year of fee payment: 12

Ref country code: IT

Payment date: 20230531

Year of fee payment: 12

Ref country code: FR

Payment date: 20230517

Year of fee payment: 12

Ref country code: DE

Payment date: 20230519

Year of fee payment: 12

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230522

Year of fee payment: 12