EP2710561B1 - Vorrichtung zur zugangskontrolle, zugangskontrollsystem und verfahren zur zugangskontrolle - Google Patents

Vorrichtung zur zugangskontrolle, zugangskontrollsystem und verfahren zur zugangskontrolle Download PDF

Info

Publication number
EP2710561B1
EP2710561B1 EP12719716.8A EP12719716A EP2710561B1 EP 2710561 B1 EP2710561 B1 EP 2710561B1 EP 12719716 A EP12719716 A EP 12719716A EP 2710561 B1 EP2710561 B1 EP 2710561B1
Authority
EP
European Patent Office
Prior art keywords
people
receiving space
token
group
readers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP12719716.8A
Other languages
German (de)
English (en)
French (fr)
Other versions
EP2710561A1 (de
Inventor
Klaus Herrmann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bundesdruckerei GmbH
Original Assignee
Bundesdruckerei GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bundesdruckerei GmbH filed Critical Bundesdruckerei GmbH
Publication of EP2710561A1 publication Critical patent/EP2710561A1/de
Application granted granted Critical
Publication of EP2710561B1 publication Critical patent/EP2710561B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/10Movable barriers with registering means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Definitions

  • the invention relates to a device for access control of a group of people, an access control system and a method for access control of a group of people using ID tokens.
  • a method for securing access to a secured area which does not necessarily mean that every single person has to be checked. For this purpose, a number of persons located in a checking area are determined and a number of authorization cards present in the area are checked as to whether the number of persons matches the number of authorization cards.
  • a device for the identification of persons known collects information that contains at least one person's biometric information and recognizes that biometric information. To identify a person, the device connects the recognized biometric data to a reported person's biometric data stored in association with group information. Furthermore, the device classifies a plurality of successively identified persons in candidate groups based on predetermined conditions. Further, the apparatus groups the persons from the candidate groups according to the group information stored for each person, and outputs this grouping to an external unit.
  • the invention is the object of the invention to provide an improved access control device, an access control system and a method for access control of a group of people.
  • a device for access control of a group of people which serves for example to control the access to a protected area, a border control or other sovereign or non-sovereign applications.
  • the device for access control includes locking means for locking and unlocking a receiving space for a group of people.
  • the locking means may have a suitable locking device, such as a controllable lock, a lock door or the like.
  • the receiving space can be formed as an access lock with an entrance and an exit door, the locking and unlocking, i.
  • the control of the entrance and exit door to open and close the access lock can be designed controlled by control means of the device.
  • the device further has sensor means for detecting the number of persons of the group of persons accommodated in the receiving space.
  • the sensor means may be designed such that the thermal radiation of the persons, in particular their face temperature, their weight and / or another parameter is detected in order to determine the number of persons entered into the receiving space. In particular, this can be done optically by monitoring the receiving space with the aid of a camera which has a CCD sensor and the number of people is determined with the help of image processing software.
  • At least one first reading device for signaling a successful authentication of a person of the group of persons in the recording room to an ID token assigned to this person belongs to the device.
  • the ID token can be a portable electronic device, such as a so-called USB stick, or a document, in particular a value or security document.
  • the ID token can be a paper-based and / or plastic-based document, such as an identity document, in particular a passport, identity card, visa, driver's license, company ID card, health card, bank card and a vehicle registration document, bill of lading or other proof of entitlement.
  • the ID token can be designed as a chip card with a contact-based and / or contactless interface or as an RFID token.
  • it can also be contained in a means of payment, in particular a banknote, a bank card or a credit card.
  • the ID token may have a data memory for storing at least one attribute of a person, which is assigned to the ID token, and in particular for storing reference data and image data, in particular a digital passport photo, may be formed.
  • the ID token also has means for authenticating the person to the ID token so that the person concerned can prove that it is actually associated with the ID token.
  • authentication methods known per se from the prior art can be used, in particular authentication by entering a secret identifier, ie a so-called personal identification number (PIN), and / or biometric authentication methods.
  • protocols known from the prior art may also be used, such as the Basic Access Control (BAC), Extended Access Control (EAC) and the Password Authenticated Connection Establishment (PACE) protocol, cf. Federal Office for Security in Information Technology, Technical Guideline TR-03110, "Advanced Security Mechanism for Machine-Readable Travel Documents", Version 2.05 such as EP 1 891 607 B1 ,
  • the first reader is a so-called class 2 or class 3 reader with a keyboard. After the person has brought their ID token into the scope of the first reader, it enters its PIN via the keyboard of the first reader to authenticate against the ID token. The PIN is transmitted from the first reader to the ID token where the entered PIN is compared with stored reference data. If the entered PIN matches the stored reference data, the person is considered to be authenticated to the ID token and the ID token issues a corresponding authentication signal to the first reader.
  • the first reader may include or be connected to other input or detection means, such as a biometric sensor for detecting a biometric feature of the person, such as fingerprints, an iris scanner, facial biometrics data, or the like.
  • the device also has control means for unlocking the locking device, provided that the detected number of persons equals the number of authenticated signatures.
  • the control means are thus coupled to the sensor means and the at least first reading device, so that the control means can compare the detected number of persons in accordance with the number of authentications made with respect to the first reading device (s). If both numbers match, the control means effect unlocking of the receiving space so that the group of people can leave the receiving space, for example to enter a protected building area or to pass a national border.
  • the control means may comprise a single computer or a computer network.
  • the communication between the control means, the locking means, the sensor means and the at least one first reading device can also take place via a network, in particular an Ethernet.
  • the "locking means" may be, for example, a controllable door trap into which an access door of the receiving space may fall. By a corresponding signal of the control means, the door latch is released, so that the door of the receiving space can be opened.
  • a turnstile which can be locked, that is locked, can be, and unlocked by a corresponding signal of the control means, that is, released, can be.
  • the locking means may comprise an electric motor driven door, wherein the electric motor for opening and closing the door, as well as to hold the door in the closed locking position, can be controlled by the control means.
  • the receiving space has a single access door for the group of people.
  • the receiving space is designed as an access lock with at least one entrance door and one exit door.
  • the exit door is locked, the entrance door is unlocked so that the group of people can enter the reception room. Subsequently, the front door is locked.
  • the control means controls the exit door to unlock it so that the group of people can leave the reception room through the exit door.
  • a plurality of the first readers are arranged distributed in the receiving space.
  • the multiple first readers can be operated in parallel, so that at the same time the authentification of several persons can take place.
  • the sensor means have first sensors for each of the first readers to detect the presence of each person of the group of persons at a location of the respective first reader.
  • the authentication of the persons against the ID token via the first readers is only released by the control means after the first sensors have detected the presence of one person on each of the readers.
  • the throughput can be greatly increased due to the parallel operation of several of the first readers.
  • the sensory detection of the number of persons is facilitated by the fact that the presence of each person is not detected somewhere in the recording room, but at the respective locations of the readers.
  • the first sensors at the location of each of the first readers namely a separation of persons within the recording room is inevitably made, which greatly facilitates the sensory detection of the number of people and designed very safe.
  • a camera may be disposed on each of the readers to detect the presence of a person at the location of the particular reader, such as a thermal imaging camera and / or a camera operating in the visible range.
  • a weight sensor may be present at each location of the first readers. A person wishing to authenticate to one of the first readers must then enter the coverage area of the particular weight sensor of the selected first reader so that the weight of the person can detect their presence at the location of the selected reader.
  • a stool in front of each of the readers, a stool can be firmly fixed, on which a person must sit, so that the authentication can take place with respect to the selected first reading device. In each of the stools is a sensor to sense the burden of the stool with the weight of a person.
  • the sensor means comprise at least one second sensor for detecting persons who are not at the location of one of the first readers in the receiving space. It is thus additionally checked here whether a person who would like to escape access control in this way is not located at a position remote from the first readers in the reception room.
  • the receiving space is monitored outside the locations of the first readers by a suitable sensor, such as a thermal imaging camera, a CCD camera or the like. It is of particular advantage that on the one hand, the sensing of the residence of one or no person at the locations of the readers and the sense that no person is in the receiving space outside the locations of the readers, technically safe and inexpensive to implement.
  • the ID tokens of the persons are designed for authentication to a second reading device.
  • this may include a so-called chip authentication of the electronic chip of the ID token relative to the second reader and optionally also an authentication of the second reader to the ID token, that is, the so-called terminal authentication.
  • the second reading device is arranged outside the receiving space, for example in a waiting area.
  • the person's ID token stores that person's biometric reference data, such as fingerprint data, facial biometrics, iris scan data, and / or other biometric data. Furthermore, the ID token has an identifier which uniquely identifies the ID token. The identifier may be read from the ID token, for example, optically or via an electronic interface.
  • the so-called machine readable zone (MRZ) of an ID token which is embodied as a machine-readable travel document, can be used to record the identifier, a serial number the chip of the ID token, which can be read out, for example, via RFID or the personal details of the person, which can be read optically from the ID token, for example, and also identify it clearly.
  • the second reading device is designed to detect this identifier from the ID token and to perform at least one-sided authentication of the ID token against this second reading device, for example according to the BAC and / or EAC protocol. After successful authentication, the second reading device reads out the biometric reference data stored in the ID token and stores it with the identifier as an access key in a memory, for example the control means.
  • the first readers which are located in the receiving space are also formed in this embodiment for detecting the identifier, which previously had already detected the second readers outside the recording room.
  • the first readers are further adapted to capture the biometric feature for which biometric reference data is stored in the ID token.
  • the procedure is such that the identifiers are again recorded in the recording room with the aid of the first readers, and then with the help of the identifiers the respective biometric reference data are read from the memory in order to match those of the first readers each to compare recorded biometric features.
  • the unlocking then takes place under the further condition that the recorded biometric characteristics of the persons with the respective biometric reference data sufficiently match.
  • This embodiment has the particular advantage that the security against manipulation at high throughput is further increased. This is made possible by using the waiting time of the persons outside the recording room to securely read out the biometric reference data from the ID tokens, taking into account data protection requirements, so that this process does not have to take place within the recording room.
  • the residence time of the group of people in the recording room can therefore be kept very short even with a biometric check.
  • the biometric reference data read from the ID tokens and buffered in the memory are deleted after the authentication has been carried out, for example immediately before or after the unlocking. In this way it is ensured that the biometric reference data can not be collected and stored in central locations.
  • the device has inlet limiting means for limiting the number of persons of the group of persons, wherein the number of persons to whom the inlet is limited in the receiving space is limited to the number of persons for whom the at least one second reading device stored biometric reference data in the memory.
  • the number of persons who authenticate themselves outside the recording space in the waiting area in relation to the second reading device and whose biometric reference data are read and buffered while the recording space is still locked is counted.
  • the number of persons admitted to the receiving room after unlocking is then limited to the number of persons for whom the biometric reference data has already been read. This is to prevent persons entering the recording room for whom no biometric reference data has yet been stored in the memory since this would lead to a delay in the procedure.
  • the storage capacity of the waiting area in which the persons have access to the second reading device (s) can, for example, be selected so that it matches the receiving capacity of the receiving space.
  • the inlet limiting means have at least one turnstile to limit the number of persons who can enter the receiving space.
  • An additional turnstile may be at the entrance of the waiting area to limit the number of people in the waiting area to the maximum capacity of the receiving space.
  • the inlet limiting means can also be realized by one or more automatic doors.
  • Embodiments of the invention are particularly advantageous for applications involving groups of people who want simultaneous access to a protected area, such as border crossing, especially at airports, entering security zones of specially protected facilities, entering company buildings, bank vaults or lounges, for example in football stadiums.
  • Embodiments of the invention are of particular advantage in that an efficient access control of such groups of people can take place, without loss of security.
  • Embodiments of the invention are also of particular advantage for the access control of persons who can not operate the readers independently, such as, for example, children or persons with disabilities. Since a separation of the persons according to the invention does not take place or only within the same receiving space, such persons can be assisted within the receiving space by other persons of the group of persons.
  • the first readers may be advantageous to arrange the first readers close to each other in order to facilitate such assistance.
  • the first readers form a structural unit, in particular the antenna areas for supporting the ID tokens, if it is RFID tokens, the antenna areas, for example, as an elongated support surface with multiple PIN-input keyboards can be made side by side, or which for example, how a handrail run are built in the antenna, display and control panels are integrated.
  • the invention relates to an access control system comprising an embodiment of a device according to the invention and a plurality of ID tokens.
  • To the access control system may also include the receiving space, wherein the receiving space may be formed, for example, as an access lock.
  • the invention relates to a method for access control of a group of persons using a device or access control system according to the invention with the following steps: locking of the recording room after recording the group of people, recording the number of persons, the group of people recorded in the recording room, authentication of each the persons of the recorded in the recording space group against a respectively assigned ID token within the recording room and signaling the successful authentications by the at least one first reader, unlocking the recording room on the assumption that the number of detected persons with the number of signaled authentications ,
  • the FIG. 1 shows a receiving space 100 for receiving a group of persons a maximum number N of persons.
  • the receiving space has an automatic door 102, which may be operated by an electric motor, for example, to open and close an input and output 104 of the receiving space 100.
  • a controllable latch 106 such as a door latch, may be provided.
  • the receiving space 100 is monitored by at least one sensor 108.
  • the sensor 108 is for detecting the number of persons located in the accommodating space 100.
  • the sensor 108 may be, for example, a camera or a thermal image sensor.
  • each of the ID tokens is assigned to exactly one of these persons, such as the ID token 112 of the person 120, the ID token 114 of the person 122, etc.
  • the ID tokens 114, 116, 118, ... are basically the same as those in FIG FIG. 1 constructed in more detail ID tokens 112.
  • the ID token 112 has an interface 128 to a corresponding interface 130 of the reader 110.
  • the interfaces 128, 130 may be contact-based or contactless, in particular as RFID interfaces.
  • the ID token 112 further includes a processor 132 for executing program instructions 134 and an electronic memory 136 for storing reference data 138.
  • the reference data 138 may include, for example, a secret identifier, such as a PIN, which should be known only to the person who is associated with the ID token 112, in this case only the person 120.
  • the reference data 138 may include biometric reference data of the person concerned.
  • the electronic memory 136 is a proprietary memory that only the processor 132 of the ID token 112 can internally access. A direct access via the interface 128 to the memory 136 and in particular the reference data 138 stored therein either depending on the embodiment, or only after release by the processor 132 is possible.
  • the reader 110 has a processor 140 for executing program instructions 142 and an interface 144 for communicating with a controller 146, which is designed, for example, as a computer, and has a corresponding interface 148.
  • the interfaces 144 and 148 may be, for example, network interfaces, in particular Ethernet interfaces.
  • the reader 110 further has input or detection means, such as a keyboard 150 and / or a sensor 152.
  • the keyboard 150 may be configured to input the PIN into the reader 110, and the sensor 152 may be a biometric sensor for detecting a biometric feature from the subject.
  • the controller 146 has a processor 154 for executing program instructions 156. By executing the program instructions 156, the controller 146 may, for example, generate a signal 158 to actuate the latch 106 and / or the door 102 or their electromotive drive so as to open the door 102 to lock or unlock.
  • the controller may sense, for example via the line 160, the locking or unlocking state of the door 102.
  • the controller 146 is also connected to the sensor 108 via a line 162 through which the controller 146 receives a signal 164.
  • the signal 164 may be a sensor signal of the sensor 104, which is then subsequently evaluated by the controller 146 by execution of the program instructions 156 to determine the number of persons in the recording room.
  • the processing of the sensor signal may already be effected by a digital signal processing of the sensor 108 itself, so that the signal 164 already indicates the detected number of persons.
  • Mixed forms are also possible, according to which preprocessing of the detected sensor signal is effected by the evaluation electronics of the sensor 108, so that the further evaluation by the controller 146 is correspondingly reduced.
  • the interfaces 144 and 148 may be coupled to one another via further separate lines 166.
  • the controller 146 receives from the reader 110 a signal 168, which signals that an authentication of a person has taken place.
  • the lines 160, 162 and 166 may be wholly or partially replaced by a network, such as an Ethernet, via which the various components, that is, the controller on the one hand and the latch / door 102, the sensor 108 and the reader 110 on the other to be able to communicate.
  • a network such as an Ethernet
  • the door 102 Upon entry of the group of persons into the receiving space 110, the door 102 is closed and locked. This can be done automatically or manually. With the aid of the sensor 108, the number M of persons is determined.
  • the persons of this group of persons authenticate themselves with respect to their ID tokens with the aid of the reader 110.
  • the person 120 brings their ID token 112 into the coverage area of the interface 130.
  • the person 120 gives his PIN into the reader.
  • the PIN is transmitted by execution of the program instructions 142 via the interface 130 to the ID token 112 and evaluated there by execution of the program instructions 134 by the processor 132 accessing the reference data 138 and these are compared with the received via the interface 128 PIN.
  • the processor 132 If the received PIN matches the reference data 138, the processor 132 generates a corresponding signal, which is transmitted via the interface 128 to the interface 130 of the reader 110 and forwarded by the execution of the program instructions 142 via the interface 144 as a signal 168 to the controller 146.
  • the detected number of people M and the number of signals 168, each signaling a successful authentication of a person against an ID token, are processed by execution of the program instructions 156 by the controller 146 by the number M of persons detected with the number of signals 168 is compared. If the two numbers agree with each other, this means that all persons of the admitted group of persons have in each case authenticated against their ID token.
  • the processor 154 then generates the signal 158 to unlock the door 102.
  • the group of people can then leave the reception room 100, for example to pass a border or to enter a protected building area.
  • a biometric feature for example, the person 120 is detected by the sensor 152 and transmitted via the interface 130 to the ID tokens 112, so that there the received biometric data with the reference data 138 to sufficient Agreement can be checked, for example by a so-called match on card method.
  • the reference data 138 is read out of the ID token 112 by the reader 110 or the controller 146 in order to check the adequacy of the detected biometric features with the reference data 138 by the reader 110 or by to make the controller 146.
  • both the biometric reference data read from the ID token 112 and the biometric features sensed by the person 120 are transmitted from the reading device 110 to the controller 146 in order to evaluate them there.
  • FIG. 2 shows a corresponding flow chart.
  • step 200 a number of M persons are admitted into a receiving space of an access control device according to the invention.
  • the number M of persons in the receiving space is sensed (step 202).
  • step 204 the M persons of the group of persons within the recording room respectively authenticate to their ID tokens, each of the successful authentications being signaled to a control unit.
  • the controller compares in step 206 the number of authentications made with the detected number M. If both numbers match, then in step 208 the controller generates an enable signal to signal that the group of people can pass; the release signal can unlock the receiving space, so that the M persons can leave it again.
  • a message is generated in step 210, which is directed to a border official, for example, so that he can intervene.
  • the FIG. 3 shows a further embodiment of a device according to the invention.
  • a number of N readers 110.1 to 110.N are distributed in the receiving space 110.
  • the readers can be monitored, for example by means of a camera.
  • a separate sensor for example a camera, a thermal sensor and / or a weight sensor, is preferably located on each of the reading devices in order to detect the presence of a person at the location of the relevant reading device.
  • a traffic area of the receiving space may be monitored by another sensor 170 to ensure that there are no other persons in the receiving space except for the readers.
  • the readers 110.1 - 110.N are designed in the embodiment considered here so that an authentication of a person to the relevant ID token is enabled only after the reader in question has received a release signal 172 from the controller 146. Previously, an input of the PIN via the keyboard 150 or a detection of the biometric feature via the sensor 152 (see FIG. FIG. 1 ) not possible.
  • the procedure is such that the signals 164 of the sensors 108.1-108.N are evaluated by the controller 146 as to whether they indicate the presence of either exactly one person or no person at the location of the respective reader. Furthermore, a signal 174 of the sensor 170 is checked by the controller 146 as to whether there are no further persons in the receiving space 110.
  • the persons 120, 122, 124 and 126 go to the readers 110.1, 110.2, 110.3 and 110.4, as in the FIG. 3 shown, this is detected by the corresponding sensors 108.1, 108.2, 108.3 and 108.4 and signaled to the controller 146. If there is another person 176 in the receiving room 100 next to it who may have no or an invalid ID token 178, this is detected by the sensor 170.
  • the processor 154 of the controller 146 generates the enable signals 172 by executing the program instructions 156 only on condition that all of the sensors 108 signal the presence of one or more persons on one of the readers 110, and further that the sensor 170 does not detect the presence of any other person the receiving room 100 signals. In the case considered here, the person 176 must therefore first leave the receiving space 100 before the authentications can take place.
  • the unlocking of the door 102 takes place here then on the condition that on each of the readers 110.1 to 110.4, in which the presence of a person has been detected, a successful authentication was done.
  • FIG. 4 shows a corresponding flow chart.
  • step 300 the admission of M persons takes place.
  • the number M is determined in step 302 by a number of N sensors (see the readers 110.1 - 110.N of the FIG. 3 ) detected. Furthermore, it is checked in step 304 whether there is otherwise a person in the receiving room who has not gone to one of the readers. If this is the case, a message is generated in step 306, so that, for example, a border official can intervene.
  • step 308 the authentication of the M persons to the respective readers to which they are located is released. For a reader, for which the presence of a person has not been detected, no authentication is released, so that the authentications can only be done on those readers, in which there is actually a person in the recording room. If the number of authenticated authentications is M, that is to say equal to the number of persons sensed in the recording room, the unlocking takes place in step 314, otherwise a message is again generated in step 312.
  • a predetermined maximum time may be defined within which all of the authentications must have taken place. If this time is exceeded, then the message 312 is branched.
  • the embodiment according to FIG. 5 is compared to the embodiment according to FIG. 3 further developed such that in front of the receiving space 100, a waiting area 180 is located, which serves to accommodate a further group of people, as long as there is still a group of people in the receiving space 100.
  • the group of persons 182 includes the persons 120, 122, 124 and 126
  • the reading device 110 outside the receiving space 100 there is at least one reading device 110 'with an interface 130', which in principle can be constructed like the interface 130 of the readers 110 in the receiving space 100.
  • the reading device 110 ' has a processor 140' for executing program instructions 142 '. and an interface 144 'for communicating with the corresponding interface 148' of the controller 146.
  • the reader 110 ' has an optical sensor 186, for example for performing a so-called BAC, namely one of the ID tokens printed on the ID token To capture information visually, such as the so-called MRZ.
  • the ID tokens 112 to 118 or 112 'to 118' may be particularly preferably machine-readable travel documents, in particular electronic passports or electronic identity cards, in particular according to one from the Federal Office for Information Security (BSI) and / or the international aviation authority (ICAO) defined standard act.
  • BSI Federal Office for Information Security
  • IOU international aviation authority
  • the waiting area 180 may be defined, for example, by a turnstile 188 and a turnstile 190.
  • the hubs 188 and 190 are connected via lines 192 and 194, respectively, to the controller 146, which blocks the turnstiles. Due to the turnstile 188, the door 102 may be omitted or the door 102 is formed so that the various people can pass only one after the other, so as to limit the access to the receiving space 100 to the maximum number of people.
  • the receiving space 100 is here preferably designed as an access lock, that is, the door 102 serves only to enter the receiving space 100 and another door 102 'with a corresponding latch 106' is used exclusively for leaving the receiving space 100th
  • the controller 146 is here designed to include an electronic memory 196 for storing a database 198.
  • the reference data 138 read from one of the ID tokens are then transferred together with the associated identifier from the reader 110 'to the controller 146 and stored in the database 198, the identifier being used as a database key for later database access to the reference data.
  • a reading device 110 ' a plurality of reading devices can also be arranged in the waiting area 180, such as a number of N reading devices 110', in order to parallelize this process.
  • the controller 146 After the verification of the group of persons 182 in the receiving space 100 has been successfully completed, the controller 146 generates a release signal for the latch 106 'so that this group of persons 182 leaves the receiving space. The door 102 'is then closed again and the door 102 is opened. The controller 146 then lets the group of people 184 pass through the turnstile 188 so that it enters the receiving space 100.
  • the number of persons who can pass the turnstile 188 can be further restricted besides N in that a maximum of the number of persons for whom the reference data was previously stored within the waiting area 180 in the database 198 is transmitted. This avoids that people from the waiting area 180 get into the receiving space 100, which were not previously on the reader 110 '.
  • the group of people 184 is separated in the receiving space 100 by the persons 120 'to 126' go to the various readers 110.1 - 110.4. With the help of the readers then only the respective identifier of the ID token is recorded and the biometric feature of the person.
  • the identifier together with the biometric feature detected in each case is transmitted from the reader to the controller 146.
  • the controller accesses the database 198 with the identifier received from the reader as a key to read the corresponding reference data from the database and compare it with the acquired biometric data received from the respective reader. If in this manner a successful authentication of all M persons of the group of persons 184 has taken place, the controller 146 activates the latch 106 'to open the door 102'.
  • FIG. 6 shows a corresponding flow chart.
  • step 400 a number of M persons are admitted to the waiting area.
  • the second readers see reader 110 'of FIG. 5 ) which are used to authenticate the ID tokens of persons admitted to the waiting area to the second reader (s) and to read an identifier and reference data from the ID tokens.
  • the reference data with the identifier as the access key is stored in a database (see database 198 of FIG. 5 ).
  • step 406 the M persons are admitted from the waiting area into the receiving space.
  • the detection of the number M then takes place in the receiving space in the step 408 by N sensors, wherein one sensor can each be located on one of the readers (cf the embodiment of FIG. 5 ).
  • step 412 If it is determined in step 410 that there is another person besides the readers in the recording room, a corresponding message is generated in step 412. In the opposite case, the use of the first readers in the recording room is released in step 414 to enable authentication of the persons.
  • the identifier is detected by the ID token and in the Step 418, the biometric features of each of the persons are sensed.
  • step 420 the database accessed by the identifier detected in step 416 is accessed to read the respective stored reference data and compare it to the respective biometric features in step 422. In this way, an authentication of each person of the group of persons takes place, namely if in each case the features of one of the persons sensory detected in step 414 sufficiently match those reference data stored for this person.
  • step 424 a check is then made as to whether the number of successful authentications equals the number M of persons as detected in step 408. If this is not the case, then in step 426 a corresponding Message generated and in the opposite case, an unlocking of the exit door of the recording room is made in step 428.
  • the database 198 is then cleared to prevent central collection of the reference data.
  • steps 400 to 404 can be carried out in the sense of pipelined processing for a subsequent further group of persons.
EP12719716.8A 2011-05-17 2012-05-09 Vorrichtung zur zugangskontrolle, zugangskontrollsystem und verfahren zur zugangskontrolle Active EP2710561B1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102011076004A DE102011076004A1 (de) 2011-05-17 2011-05-17 Vorrichtung zur Zugangskontrolle, Zugangskontrollsystem und Verfahren zur Zugangskontrolle
PCT/EP2012/058487 WO2012156238A1 (de) 2011-05-17 2012-05-09 Vorrichtung zur zugangskontrolle, zugangskontrollsystem und verfahren zur zugangskontrolle

Publications (2)

Publication Number Publication Date
EP2710561A1 EP2710561A1 (de) 2014-03-26
EP2710561B1 true EP2710561B1 (de) 2017-01-04

Family

ID=46046211

Family Applications (1)

Application Number Title Priority Date Filing Date
EP12719716.8A Active EP2710561B1 (de) 2011-05-17 2012-05-09 Vorrichtung zur zugangskontrolle, zugangskontrollsystem und verfahren zur zugangskontrolle

Country Status (6)

Country Link
EP (1) EP2710561B1 (pt)
CN (1) CN103534734B (pt)
AU (1) AU2012257871B2 (pt)
DE (1) DE102011076004A1 (pt)
PT (1) PT2710561T (pt)
WO (1) WO2012156238A1 (pt)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106256744B (zh) 2015-06-19 2019-12-10 奥的斯电梯公司 电梯乘坐用户管理方法及系统
CN105374096A (zh) * 2015-12-07 2016-03-02 天津博威动力设备有限公司 一种多检测手段门禁系统
CN105827639A (zh) * 2016-05-13 2016-08-03 上海迅饶自动化科技有限公司 X2BACnet协议转换网关软件
US10370877B2 (en) * 2016-09-22 2019-08-06 Lenovo (Singapore) Pte. Ltd. Destination criteria for unlocking a vehicle door
US11024105B1 (en) * 2017-10-16 2021-06-01 Cybra Corporation Safety and security methods and systems
CN108921979A (zh) * 2018-04-10 2018-11-30 浙江易云物联科技有限公司 一种人行通道管理系统及其方法
DE102018119767A1 (de) * 2018-08-14 2020-02-20 Bundesdruckerei Gmbh Vorrichtung zum Bereitstellen einer Mehrzahl von biometrischen Merkmalen einer Mehrzahl von Personen einer Personengruppe
CN109559409B (zh) * 2018-10-11 2020-06-02 江苏农林职业技术学院 一种果蔬自助采摘温室用的云控制门禁系统及其图像识别方法
CN109407601B (zh) * 2018-10-29 2021-04-30 北京东华合创科技有限公司 基于数据分析的智能实验室监控报警系统
CN111554028B (zh) * 2020-05-19 2022-03-25 青岛聚好联科技有限公司 一种蓝牙门禁系统及其交互方法

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3617373B2 (ja) * 1999-06-03 2005-02-02 オムロン株式会社 ゲート装置
DE10146459B4 (de) 2001-09-20 2005-03-03 Deutsche Post Ag Verfahren zur Zutrittssicherung, Vorrichtung zur Zutrittskontrolle und Aufzugskabine
CN1696982A (zh) * 2005-04-11 2005-11-16 中华人民共和国珠海出入境边防检查总站 一种边检自动查验方法
DE102005025806B4 (de) 2005-06-02 2008-04-17 Bundesdruckerei Gmbh Verfahren zum Zugriff von einer Datenstation auf ein elektronisches Gerät
ES2534035T3 (es) * 2005-09-30 2015-04-16 Inventio Ag Instalación de ascensor para el transporte de usuarios del ascensor en un área edificada
US8064651B2 (en) * 2006-02-15 2011-11-22 Kabushiki Kaisha Toshiba Biometric determination of group membership of recognized individuals
DE102006036108A1 (de) * 2006-05-19 2007-11-22 Siemens Ag Vorrichtung und Verfahren zur Kontrolle von Personen
JP4751442B2 (ja) * 2008-12-24 2011-08-17 株式会社東芝 映像監視システム
CN101706976A (zh) * 2009-08-26 2010-05-12 深圳市飞瑞斯科技有限公司 一种基于视频人数统计防尾随的系统和装置
CN101774501B (zh) * 2009-10-19 2013-07-24 秦皇岛开发区前景电子科技有限公司 一种具有安防功能的入户电梯管理方法及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
AU2012257871A1 (en) 2013-11-21
EP2710561A1 (de) 2014-03-26
CN103534734A (zh) 2014-01-22
DE102011076004A1 (de) 2012-11-22
CN103534734B (zh) 2016-11-23
WO2012156238A1 (de) 2012-11-22
AU2012257871B2 (en) 2016-06-30
PT2710561T (pt) 2017-02-21

Similar Documents

Publication Publication Date Title
EP2710561B1 (de) Vorrichtung zur zugangskontrolle, zugangskontrollsystem und verfahren zur zugangskontrolle
DE69815272T2 (de) Durch Fingerabdruckvergleich kontrollierter Zugang zu Türen und Maschinen
DE69530569T2 (de) Zu- und Ausgangs-Kontrollsystem
EP2203900B1 (de) Personenkontrollsystem und verfahren zum durchführen einer personenkontrolle
EP3304501B1 (de) Elektronisches zugangskontrollverfahren
DE102010016098A1 (de) Zugangskontrollvorrichtung
EP3327679A1 (de) Verfahren zur zutrittskontrolle einer personengruppe mittels mehreren lesegeräten und mehreren token
EP3103057A1 (de) Verfahren zum zugang zu einem physisch abgesicherten rack sowie computernetz-infrastruktur
DE102004048403A1 (de) Zugangskontrollvorrichtung
EP2820623A1 (de) Verfahren zum identifizieren einer person
DE102015225778A1 (de) Vorrichtung und Verfahren für die personalisierte Bereitstellung eines Schlüssels
EP2691330B1 (de) Zugangsüberwachungsvorrichtung mit mindestens einer videoeinheit
EP1680769B1 (de) Verfahren und einrichtung für durchgangskontrolle und/oder personenvereinzelung
EP1102216B1 (de) System und Verfahren zur automatisierten Kontrolle des Passierens einer Grenze
EP2820624B1 (de) Verfahren zum identifizieren einer person
WO1999060531A1 (de) Vorrichtung zur erkennung von lebewesen oder gegenständen
EP2137705B1 (de) Verfahren zur übertragung von daten einer person an eine kontrolleinrichtung
DE102012216396A1 (de) Ermitteln einer IT-Berechtigungsinformation unter Verwendung eines mechanischen Schlüssels
EP4300384A1 (de) Hintergrundsystem für ein personentransportsystem
DE102005033043A1 (de) Verfahren zur Prüfung der Berechtigung einer Person durch dezentralen Vergleich von Gesichtsfelddaten, eine Einrichtung zu nutzen und/oder zu betreten.
EP1385116A1 (de) Verfahren zur Erteilung einer Zugangsberechtigung
DE102011054449B4 (de) Selbstlernende personallose biometrische Zutrittskontrolle
WO2019149490A1 (de) Verfahren zur gewährung eines personenzugangs zu von der person zu betretenen geschützten bereichen
WO2000048133A1 (de) Anordnung zur erfassung und auswertung von daten oder signalen und verfahren zur prüfung der identität oder berechtigung einer person
WO2009059595A1 (de) Verfahren und steuerungseinheit zum erkennen von berechtigten personen

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20131217

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20160201

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAJ Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR1

INTG Intention to grant announced

Effective date: 20160622

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTC Intention to grant announced (deleted)
INTG Intention to grant announced

Effective date: 20160801

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 859916

Country of ref document: AT

Kind code of ref document: T

Effective date: 20170115

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: PT

Ref legal event code: SC4A

Ref document number: 2710561

Country of ref document: PT

Date of ref document: 20170221

Kind code of ref document: T

Free format text: AVAILABILITY OF NATIONAL TRANSLATION

Effective date: 20170215

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502012009211

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 6

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170504

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170404

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170405

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170404

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502012009211

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

26N No opposition filed

Effective date: 20171005

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170509

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20170531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170509

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 7

REG Reference to a national code

Ref country code: AT

Ref legal event code: MM01

Ref document number: 859916

Country of ref document: AT

Kind code of ref document: T

Effective date: 20170509

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170509

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20120509

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170104

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170104

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230526

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PT

Payment date: 20230428

Year of fee payment: 12

Ref country code: NL

Payment date: 20230519

Year of fee payment: 12

Ref country code: IT

Payment date: 20230531

Year of fee payment: 12

Ref country code: FR

Payment date: 20230517

Year of fee payment: 12

Ref country code: DE

Payment date: 20230519

Year of fee payment: 12

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230522

Year of fee payment: 12