EP2842091A1 - Method of access to a local service of a device communicating via a terminal - Google Patents
Method of access to a local service of a device communicating via a terminalInfo
- Publication number
- EP2842091A1 EP2842091A1 EP13723838.2A EP13723838A EP2842091A1 EP 2842091 A1 EP2842091 A1 EP 2842091A1 EP 13723838 A EP13723838 A EP 13723838A EP 2842091 A1 EP2842091 A1 EP 2842091A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- access
- terminal
- service
- communicating device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000004891 communication Methods 0.000 claims description 28
- 238000012546 transfer Methods 0.000 claims description 11
- 238000012545 processing Methods 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims description 3
- 238000013500 data storage Methods 0.000 claims description 3
- 230000001419 dependent effect Effects 0.000 abstract 1
- 230000001413 cellular effect Effects 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 101150079125 DCN1 gene Proteins 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000010267 cellular communication Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009792 diffusion process Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000010152 pollination Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/346—Cards serving only as information carrier of service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/403—Solvency checks
- G06Q20/4033—Local solvency checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Definitions
- the present invention relates to access to a local service delivered from a base station, which access terminal distributes data associated with the service on communicating devices accessing it.
- access points allow access to the service after authentication of a user with an access means.
- access means may be a smart card provided for exchanging information with the base station.
- an automatic cash dispensing service allows a user, via access terminals such as vending machines, to withdraw money through an access means like his bank card (conventionally including a chip).
- the access terminals are connected to at least one central system for managing and supervising the service delivered by the terminals.
- This connection can be provided via a wired link, a cellular telecommunication network or the like, and this in order to exchange information relating to the service between the server and the access terminals.
- the central system can, for example, retrieve information contained in the access means, authorize access to the service to a user based on the information of the access means, or else control on the access terminals the information associated with a user.
- connection between an access point and a central server may be complex or even technically unobtainable under certain installation conditions (no cellular telecommunication network coverage or provision of a location that does not make it possible to carry out a connection wired for example).
- a connection is an expensive infrastructure to implement limiting the number of access terminals deployed for a service (less access to service).
- Document US 6,726,100 discloses a system comprising a plurality of access terminals to a service some of which are not connected to the aforementioned central system. This document describes that information related to the service can be directly stored on the means of access. On the one hand, the stored information is information retrieved by the access means from access terminal connected to the central system, which groups the information related to the service.
- the unconnected access terminals are broadcast service information through the data stored in the access means.
- the access means can retrieve information contained on a database of an unconnected base station, so as to trace information to be updated at the central system.
- the service is correctly delivered by the terminals on the basis of the data exchanged via the access means and this, without necessarily having all the access terminals connected to the central system.
- the aforementioned means of access generally have low storage capacity that can not recover a large amount of information relating to the service. Consequently, for a service comprising, for example, a large number of users and / or a lot of information about each of the users, the information communicated by the base station may be lost or overwritten at the level of means of access presenting insufficient storage. Such events are then likely to cause malfunctions of the service with regard to poorly disseminated, incomplete or erroneous information.
- the service information contained by the means of access is likely to be retrieved and decrypted by a malicious user, thereby compromising the security and integrity of the system.
- the present invention improves the situation.
- the invention proposes a method of access to a local service, comprising the steps of: access to the service via an access terminal by a communicating device; reading by the data access terminal of the communicating device, the data being personal data relating to the communicating device and / or third-party service data; writing by the terminal of the data of the communicating device, the written third data being selected from a set of third-party service data, the choice of third-party data to be written by the access terminal being a function of selection criteria.
- the reading of the data on the communicating device allows the base station to retrieve data relating to the local service and / or other services as will be detailed more far.
- the service data is propagated between the access terminals via an asynchronous broadcast provided by the communicating devices that are available. This distribution of service data then replaces the connection usually required with a central system. It will therefore be understood that an access terminal devoid of connection to the central system can thus properly deliver said local service on the basis of the data read from the communicating devices.
- the third-party data write initiated by the terminal on the communicating devices makes it possible to communicate data to be broadcast to the other entities associated with the service such as, for example: other access points, or a central service management system (typically an information system), which is accessible from a terminal called “connected” (having a wired connection with the central system for example).
- a central service management system typically an information system
- the communicating device, the access terminals and the central system are capable of communicating with each other via remote communication means.
- a physical connection between the central system and the access terminals is no longer useful.
- the so-called "unconnected" access terminals are terminals having no direct connection with the aforementioned central system.
- the unconnected access terminals are terminals receiving / broadcasting the service data by the simple intermediate data read / written on the communicating devices acceding.
- the data written by the unconnected access terminals can be "raised” indirectly to the central system via the communicating devices. Indeed, when an unconnected terminal writes data to a device, the device can remount them to other terminals to which it subsequently accesses. In this way, the data is distributed to the other terminals (connected or not), and can in particular be repatriated to the central system during a reading by a connected terminal.
- the implemented method thus allows a service data broadcast comparable to a synchronous broadcast via asynchronous communication means such as communicating devices.
- the local service data is distributed by the access terminals on the communicating devices so as to broadcast the data of the service without necessarily deploying a communication infrastructure for each of the terminals.
- the base station can therefore be installed regardless of a link to be established with the central system of the service.
- the access terminal can then be arranged: in an underground car park for the delivery of electrical energy for recharging vehicle batteries; in an individual at the level of his electric meter so as to offer additional services; inside shops, for example for the delivery of electrical energy at power outlets for charging an electronic device or the power supply of a computer; Or other.
- the third data is distributed to the writing by the access terminals (connected or not) on the communicating devices according to selection criteria.
- the selection criteria allow the appropriate selection of the data to be written from among a set of service data.
- the written data is likely to be data deemed useful, advantageous or even indispensable for broadcasting to other service entities such as other access terminals and / or the central system.
- the selection of data to be written makes it possible to choose the essential or even urgent data taking into account the limited capacities of the memory space of the communicating devices.
- the selection criteria can be determined relative to an index of attendance of the terminals by a communicating device, a level of urgency of data dissemination, a type of device communicant accessing (administrator or user for example) or other.
- the selection criteria are advantageously provided for distributing and distributing data to be broadcast according to several pieces of data, for example a set of data bits constituting an instruction or information. Each chip may be broadcast on one or more communicating devices. It will then be understood that the service data contained on a communicating device does not make it possible to completely reconstruct the instruction or the relative information, the bits of data necessary for this reconstruction being distributed among several devices. A malicious user can only recover part of the instruction or the aforementioned information.
- the data is distributed in a pseudo-random distribution (governed by the choice criteria determined by the terminals) between the communicating devices, making any attempt at malicious attack difficult for recovery. of the set of snippets of data.
- the selection criteria may also be provided to ensure redundancy of distributed data on the communicating devices.
- the data or the same piece of data can be written by a terminal on several communicating devices.
- at least one other device may include personal data and / or third-party service data of the communicating device destroyed / lost.
- the local service continues to be delivered correctly on the basis of distributed data on the other devices.
- the distribution of data according to the selection criteria makes it possible to make the security of the information broadcast and the reliability of data dissemination via the communicating devices more robust.
- said selection criteria are defined by the access terminal relative to the data read from the communicating device.
- the selection criteria are relative to: the type of card accessing, administrator or user (information provided in the personal data of a communicating device for example); history of use of the service (information entered in the personal data and which can be compared to similar user histories entered in the third data of the same communicating device); available memory capabilities of the communicating device; services subscribed by the user of the service; Or other.
- said selection criteria are defined by the access terminal relative to the data read from communicating devices having previously accessed said access terminal.
- the selection criteria are thus related to: the criticality of information to be broadcast in relation to the data read by the terminal; the redundancy of a scrap of data to implement; a communication of new services subscribed by users; - Or other.
- the selection criteria adapt the amount of data to be written by the terminal according to the available memory capacity (indicated in the personal data, for example) of an accessing communicating device. Thus, it avoids overwriting or losing data to write due to insufficient memory. Moreover, the selection criteria determine, depending on the remaining memory space, the estimated priority or critical data to write, in particular in order to trace this data as quickly as possible to the central system.
- the base station writes the third-party data according to selection criteria based on the usage behavior of the service by the user of the accessing device (access terminals usually consulted, provision of the most requested service , etc.).
- the written data are then update data to a terminal that the user frequents regularly.
- the third data of the communicating device comprises personal data of at least one other device.
- personal data means any type of data associated with information concerning the communicating device itself and / or relative to the user of the device in question.
- the personal data of communicating device may be of the type: credits in progress of a prepaid user account; history of use and / or consumption of the service; profile, behavior or characteristic of the user; - identity and coordinates of the user of the device; references of the user's home electricity meter; list of services subscribed or accessible; validity chain of invoicing; type of device (administrator device for example); - Total memory capacity and / or remaining device; Or other.
- “Third-party data” means data that does not belong to the user of the communicating device and does not directly concern him. These data are therefore advantageously not accessible (via an access restriction solution by authentication for example) or secured by a cryptography technique (in particular by data encryption or impossibility of reconstruction of information without the possession of n among m information) .
- the third-party service data may be of the type: lists of communicating devices authorized to access (called “whitelists” in English) or not (so-called “blacklists” in English) at the local service; - historical use of the terminals by the communicating devices; data of ancillary services or services other than local service; incident reporting from an access point; Or other.
- the communicating devices also act as a data broadcast medium for other access terminals, the central system and / or other systems relating to other services in question, this according to the method implemented by the invention.
- said third-party data of the communicating device comprise transfer data destined for the base station.
- Transfer data means update data, configuration, service message of the base station, or instructions to one or more terminals.
- said personal data of the communicating device may include information relating to a user account of the local service.
- the personal data is for example information about a user credit available to the user, a number of access tokens to the service terminals, a period of validity of use or a prepaid amount remaining.
- a user N sets a charging time T at an unconnected terminal. If the user N does not use all of his recharge time, his credit time of use can be updated on his user account via the user N + 1 subsequently accessing the same terminal. Indeed, the user N + 1 retrieves the personal information of the user N (and therefore the information of the unused time) when the terminal writes the personal data of the user N in the third data of the user N + l. Then, when the user N + 1 arrives at a connected access terminal, the third data read by the terminal makes it possible to obtain the information of the time not used by the user N so as to trace them back to the central system. and update them accordingly on the account of the user N.
- said data written by the base station are encrypted and the data read from the communicating device are decrypted by the access terminal, this according to a cryptographic technique adapted to the communicating device.
- the security of access to the data contained in memory of the communicating device is enhanced.
- said data read from said communicating device is secured by an access control.
- the data are made accessible to the terminal after having filled predetermined authentication criteria (secret code typed on the terminal by the user of the device for example).
- the data contained by the communicating device can be secured by an authentication request process or other security methods that will be apparent to those skilled in the art.
- the invention also relates to a computer program comprising instructions for implementing the aforementioned method when the program is executed by an electronic data processing unit.
- this electronic data processing unit may be a processor, a microcontroller or other means capable of processing computer data.
- An example of the main steps implemented by this computer program are shown in Figure 2.
- the invention also relates to a terminal for access to a local service comprising: means for managing access to the service; a read / write module for data contained in a communicating device; data storage means adapted to record at least a part of the data read in the communicating device, the read data of the device being personal data relating to the communicating device and / or third-party service data; a controller adapted to control the writing in the communicating device of third data selected from a set of third-party data of the service recorded in said storage means, the choice of third-party data to be written being a function of selection criteria.
- the controller may be provided to control the reading in the communicating device of third-party data.
- this read command reads all or part of the personal data of the communicating device or third-party service data that it includes, or personal data and third data jointly.
- the base station can update a database constituted by its storage means. However, if the read data is already present in the terminal database, the read data updates the database only if it is newer than the one already saved.
- the base station updates the data contained by a communicating device according to the aforementioned selection criteria (data redundancy, criticality of data to be broadcast, remaining memory space, etc.).
- the read data updates the terminal database and the written data constitutes data to be updated at other base stations or the central system.
- the data of the service are properly relayed between the service entities then allowing to properly deliver the service on the basis of the data broadcast by the communicating devices.
- the terminal is provided for establishing at least one local communication with a communicating device.
- Local communication means a communication between the terminal and the device in a perimeter of a few meters.
- this communication can be implemented according to: a local wireless link according to the IEEE 802.11 standard (such as Wi-Fi), the IEEE 802.15.4 standard (such as ZigBee), infrared, Bluetooth, or other; in the near field according to a radiofrequency identification technology RFID for example (for "Radio Frequency IDentification" in English); Or other.
- said selection criteria are determined by the controller relative to the data read from the communicating device.
- said selection criteria are determined by the controller relative to the read data recorded in said storage means.
- said third-party data read from the communicating device comprises instructions to the terminal for execution by the controller. These instructions are advantageously included in the aforementioned transfer data.
- the data communicated or to be communicated by the devices can be: data of software updates of the terminals; service messages; order data or particular services to be implemented by terminals; Or other.
- the access terminal may comprise data encryption / decryption means provided for the implementation of the aforementioned cryptographic technique of data read / written according to the method.
- Such a technique can furthermore make it possible to verify the source of the read / written data and the integrity of this data so as to further secure access to the data contained on the communicating devices.
- the terminal may include means for controlling access to said read data.
- This means of access control may be provided to authenticate a user (for example via a secret code) in order then to authorize access to said aforementioned secure read data.
- the access terminal advantageously comprises a remote communication means.
- the communicating device and / or the central system may comprise a corresponding communication means so as to establish a remote communication with the access terminal.
- the reading / writing of data of the device communicating via the terminal can be carried out remotely, as the updates made with the central system.
- the aforementioned remote communication means may be a cellular network communication module (adapted to the 3G telephone standard for example).
- only the central system and the communicating devices comprise a remote communication means. In this way, service data updates between the access terminals and the central system can be performed remotely directly via the communicating devices.
- the service data are communicated by communicating devices in a manner that is invisible to the user (for example, via an OTA technology, "Over The Air”).
- the invention further relates to a local service access system comprising: at least one information system (previously referred to as a central system) comprising service data; at least one communicating device; and at least the aforementioned terminal of access to the service.
- a local service access system comprising: at least one information system (previously referred to as a central system) comprising service data; at least one communicating device; and at least the aforementioned terminal of access to the service.
- FIG. access to a local service according to the invention is a flowchart of the method according to the invention
- FIGS. 3a and 3b illustrate an example of access to local service of a communicating device via a connected terminal
- FIGS. 4a, 4b and 4c illustrate an example of access to local service of the communicating device via an unconnected terminal
- FIGS. 5a, 5b and 5c illustrate an example of access to local service of the communicating device via the connected terminal, after consulting an unconnected terminal
- Figure 6 illustrates the distribution and redundancy of third-party data written by the terminals on the communicating devices.
- FIG. 1 shows an example of a local service access system according to the invention and comprising: the central system SC, which includes service data including local service in question ; local service access terminals, including at least one access terminal BC connected to the central system SC and at least one non-connected access terminal BNC; communicating devices DC1 to DC4, each having a MEM memory space intended to be read and / or written by BC and BNC access terminals and thus comprise personal data (represented by empty circles) of the communicating device and / or third-party service data (represented by solid circles).
- the central system SC which includes service data including local service in question
- local service access terminals including at least one access terminal BC connected to the central system SC and at least one non-connected access terminal BNC
- communicating devices DC1 to DC4 each having a MEM memory space intended to be read and / or written by BC and BNC access terminals and thus comprise personal data (represented by empty circles) of the communicating device and / or third-party service data (represented by solid circles).
- the local service may relate to the delivery of electrical energy at the access terminals or rental of a vehicle from these terminals.
- the local service may relate to other services that will be apparent to those skilled in the art with regard to the subject of the invention.
- the central system SC is typically a server-type remote information system. A role of the central system SC is notably to collect, control and disseminate the data associated with services and in this case data related to the local service.
- the access terminal BC is connected to the central system SC via a link L1 that can be physical, such as a high-speed wired connection.
- the terminal BC is connected to the central server SC via a cellular communication link, also detailed below.
- the access terminal BNC is a terminal not connected to the central system SC, not having, by definition, a direct communication link with it.
- the communicating devices represented for illustrative purposes are such that: the communicating device DC1 here only includes personal data relating to the communicating device; the communicating device DC2 does not have access rights to the local service; the communicating device DC3 comprises personal data and transfer data to be communicated to an unconnected access terminal BNC; and the communicating device DC4 comprises personal data and third-party service data (including personal data from another device) to be broadcast to the other access terminals so as to go back to the central system SC.
- the communicating device DC2 is read / written by the base station in order to retrieve / write the data it includes, this without, however, delivering the service for which it does not have the rights to access. 'access.
- devices other than those capable of being delivered the service can also propagate the data between different access terminals.
- the communicating devices relate directly to the communicating device (access rights, type of administrator / user device, memory size, etc.), a user account (remaining credit, subscribed service, etc. .) or the user of the device (identity and coordinates, attachment counter reference, etc.).
- the communicating devices are represented in the form of a card with a memory space MEM, which card is able to establish local communication with the access terminals BC and BNC.
- this card can be of the smart card type.
- the communicating devices can also be: mobile phones or digital tablets, which have a near field communication module meeting the NFC standard for example (for "Near Field Communication ”) electronic devices with a Bluetooth type communication module; - Laptops with Wi-Fi connection Or other.
- NFC Near Field Communication
- the access terminals BC and BNC which are the entry points to access the local service, include: a service access management means (not shown in the figures); a data COM read / write module contained in a communicating device; DB data storage means adapted to record at least a portion of the data read from the communicating device, the read data of the device being personal data relating to the communicating device and / or third-party service data; a controller CTRL adapted to control the writing in the communicating device of third data selected from a set of third-party service data recorded in said storage means, the choice of third-party data to be written depending on selection criteria.
- a service access management means not shown in the figures
- DB data storage means adapted to record at least a portion of the data read from the communicating device, the read data of the device being personal data relating to the communicating device and / or third-party service data
- a controller CTRL adapted to control the writing in the communicating device of third data selected from a set of third-party service data recorded in said storage means, the choice of third-party
- the COM module is adapted to read / write data locally on communicating devices seeking access to the local service.
- "Locally” means a reading / writing that can be done within a range of a few meters, depending on the limitations of the communication technology used by the base stations and the communicating devices (NFC, Bluetooth, Wi-Fi, etc.).
- the controller CTRL can be a means of implementing a cryptographic technique including encryption / decryption securing access to data contained in the MEM memory space of communicating devices.
- the access terminals BC comprise a remote communication means (not shown in the figures).
- the terminals can communicate remotely with the central system SC via a network NET and a link L2 type mobile cellular network.
- remote communication directly established between the terminals and the communicating devices (which would have a long-range communication means).
- Third-party service data does not directly affect the user of the communicating device. These data are therefore advantageously inaccessible and / or secure.
- the third service data may be for example: personal data of at least one other communicating device; lists of communicating devices authorized to access the local service or not; terminal usage histories by communicating devices; transfer data to access terminals; or data from various services, alternatively or in addition to those provided by the access terminals.
- the user receives and disseminates third-party service data when using the local service with its communicating device.
- the data contained in the memory MEM of the communicating device can be recorded on the storage means DB of the terminal and communicated to the central system SC which integrates them with the data related to the local service and / or to other services if they are associated therewith.
- the data can be written according to selection criteria determined by the controller CTRL of the thick headed.
- the written data can complete, replace or erase the data contained in the MEM memory of the communicating devices by data to be broadcast to the other terminals, especially the unconnected ones.
- a communicating device of the administrator type may comprise a memory space MEM larger than a communicating device of the user type.
- communicating "administrator" devices may contain more third party service data, more third party data transfer or other.
- FIG. 2 shows the main steps of the method implemented by the BC and BNC access terminals.
- a communicating device DC is approached from the access terminal with the intention of accessing the service.
- the communicating device DC is then detected by the COM module when it is at a distance sufficient to establish local communication.
- the controller CTRL commands the COM module to read at least part of the data of the communicating device to determine whether the accessing device has rights and / or authorization to access the service and / or to thick headed. If necessary, the data read by the COM module can be decrypted by the CTRL controller according to a cryptography technique appropriate to that performed by the terminals when writing data to the devices.
- the controller CTRL commands the COM module at a step S 3 to read the entire MEM da ta data of the communicating device DC contained in its memory space MEM, which data include the personal data of the communicating device accessing and / or third-party service data.
- the data MEM data are compared with the DB data data , the latter being stored in the DB storage means of the terminal.
- the DB da ta can be data read on communicating devices having previously accessed the terminal or data from the central system if the terminal is connected.
- the controller orders at a step S5 the setting updating data DB data by the data read MEM more recent data , this via a update function update for example.
- step S6 the controller CTRL of the chosen terminal of the data DB ⁇ according to the selection criteria, here named CC, among the data read MEM data and data DB data .
- the choice criteria CC determined by the controller CTRL are defined relatively: to the read data MEM data of the communicating device accessing, which may have been updated in the storage means DB; to data read from communicating devices having previously accessed the base station, data DB data already contained in DB.
- the selection criteria may be an information dissemination emergency, a redundancy or a distribution of data to be carried out, the memory capacities of the communicating device or the like.
- the controller CTRL commands the COM module to write to the communicating device DC accessing selected data DB data cc .
- the data written by the module COM then updates the data MEM data contained in the memory space MEM of the device DC, this according to an equivalent function update.
- the data written by the COM module can be encrypted by the CTRL controller at this stage.
- the terminal can terminate the communication with the communicating device DC according to a step S 8 and deliver the service or service required by the user.
- the selected DB data cc data written on the DC device will be communicated by the communicating device DC itself to other access terminals to which the user of the device will appear later.
- the DB data cc data can also be sent back to the central system SC if one of the terminals to which the user accesses is a base station BC connected.
- the flow chart of FIG. 2 is in no way limiting and the steps can be implemented according to a different scheduling.
- the step S2 for determining the access rights of the device DC can take place following the steps S3 to S7.
- the data of a device having no access rights to the service (such as the aforementioned device DC2) can still be read / written by the terminals so as to propagate data. on duty.
- Figures 3 to 10 there is illustrated an example of practicing the method on the terminals of the access system.
- a user presents his communicating device DC to access the local service at the connected terminal BC.
- the device DC is here detected by the COM module of the terminal BC, the controller CTRL then controlling the reading of at least a part of the data contained in the space MEM memory of the DC device.
- personal data (empty circles in MEM) actually include an authorization to access the service.
- the personal data of the device DC are already included in the storage means DB of the terminal BC (the user having for example previously accessed this terminal at least once). As such, the personal data has already been sent via the link L1 or L2 to the central system SC, which has internally recorded them as third-party data related to the local service.
- step S4 the data read in MEM update the data. corresponding in DB (according to step S5). Subsequently, the updated data in DB will be sent back from the BC terminal to the central system SC.
- the controller CTRL commands the writing (according to the steps S6 and S7) of third data of the transfer data type, which are intended for other terminals (for example for their software update).
- the transfer data included on DB of the BC terminal is written by the COM module on the MEM of the DC device.
- This base station includes the personal data of a user who has previously accessed this terminal.
- FIG. 4b After detection of the DC device by the COM module of the BNC terminal, reference is now made to FIG. 4b in which the controller CTRL of the BNC terminal controls the reading of the data of the accessing device DC.
- the BNC terminal retrieves the transfer data that was intended for it according to the example for a software update.
- the controller CTRL is adapted to implement the instructions relating to the transfer data and actually update the terminal.
- the controller CTRL controls the writing of the chosen third data (in this case the personal data of the previous user) on the device DC.
- the user of the DC device subscribes to the BNC terminal to a new service of the local service.
- the CTRL controller of the BNC terminal then also controls the writing via the COM module of the personal data relating to this new subscription (represented in the figure by two additional empty circles).
- FIG. 5a the user of the communicating device DC requests access to the local service again from a connected terminal BC.
- the COM module reads on the device DC the new data related to the aforementioned subscription and to the third data concerning the user who preceded it on the BNC terminal. This read data is recorded by the controller CTRL on the means DB of the terminal BC.
- the connected terminal BC can trace the new data read on the device DC to the central system SC which stores them as new data associated with said local service.
- the third data written by the terminal according to the selection criteria may be only a part of necessary data (in the form of bits of data) to reconstruct an instruction or complete information during a reading.
- the chosen selection criteria are intended to distribute the various bits of data constituting instruction / information to be broadcast among different devices accessing the terminals. A single piece of data can be written on several communicating devices, whether consecutive or not, ensuring redundancy of the chip.
- FIG. 6 an example of the distribution and redundancy of data is illustrated. It will be understood that the scheduling with respect to N is relative to the order of passage of the devices from the unconnected BNC terminal.
- third-party data is read on the DCN-4 device.
- the third-party data read is in this case information to be broadcast to a particular base station.
- the BNC terminal then stores this third-party data in its storage means DB.
- the selection criterion then determined by the BNC terminal controller is to write the third-party data from DCN-4 to the devices having the habit of consulting the particular access terminal mentioned above.
- the BNC terminal does not write said third data to broadcast on DCN-1.
- the CTRL controller then commands the writing of a first piece of data from third-party data from DCN-4.
- the CTRL controller commands the writing of a second piece of data on DCN + 8.
- the controller CTRL will be able to control, in redundancy, the writing of the first chip of data on a DCN + device 10 accessing thereafter.
- the present invention has been described according to some embodiments but can be applied to other embodiments that will be apparent to those skilled in the art.
- the validity of the access rights of a communicating device could be temporary (validity of only a few weeks for example) so that the user is forced to regularly report to a connected terminal and get a bet updating service data according to the service data directly from the central system.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Finance (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1253703A FR2989857B1 (en) | 2012-04-23 | 2012-04-23 | METHOD FOR ACCESSING A LOCAL SERVICE OF A COMMUNICATOR DEVICE THROUGH A TERMINAL. |
PCT/FR2013/050874 WO2013160595A1 (en) | 2012-04-23 | 2013-04-19 | Method of access to a local service of a device communicating via a terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2842091A1 true EP2842091A1 (en) | 2015-03-04 |
Family
ID=48468618
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP13723838.2A Ceased EP2842091A1 (en) | 2012-04-23 | 2013-04-19 | Method of access to a local service of a device communicating via a terminal |
Country Status (5)
Country | Link |
---|---|
US (1) | US9852307B2 (en) |
EP (1) | EP2842091A1 (en) |
JP (1) | JP6207590B2 (en) |
FR (1) | FR2989857B1 (en) |
WO (1) | WO2013160595A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140344796A1 (en) * | 2013-05-20 | 2014-11-20 | General Electric Company | Utility meter with utility-configurable sealed data |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE9313736U1 (en) * | 1993-09-10 | 1994-01-20 | Siemens AG, 80333 München | Device for data transmission by means of chip cards |
DE19611632A1 (en) * | 1996-03-25 | 1997-10-02 | Deutsche Telekom Ag | Off-line data stations with virtual on-line capability |
NL1002733C2 (en) * | 1996-03-28 | 1997-09-30 | Gerrit Vriend | Information network and an electronic map applicable in such a network. |
AU2000229016A1 (en) | 2000-03-15 | 2001-09-24 | Swisscom Mobile Ag | Method for distributing parameters in offline chipcard terminals and appropriatechipcard terminals and user chipcards |
FR2820525B1 (en) * | 2001-02-05 | 2003-03-21 | Schlumberger Systems & Service | METHOD FOR TRANSFERRING DATA BETWEEN SERVICE TERMINALS AND TRANSACTIONAL MEANS |
JP2003330829A (en) * | 2002-05-17 | 2003-11-21 | Toppan Printing Co Ltd | Information delivery system and information storage display medium |
US8351350B2 (en) * | 2007-05-28 | 2013-01-08 | Honeywell International Inc. | Systems and methods for configuring access control devices |
US8052060B2 (en) * | 2008-09-25 | 2011-11-08 | Utc Fire & Security Americas Corporation, Inc. | Physical access control system with smartcard and methods of operating |
US9019070B2 (en) * | 2009-03-19 | 2015-04-28 | Honeywell International Inc. | Systems and methods for managing access control devices |
US9280365B2 (en) * | 2009-12-17 | 2016-03-08 | Honeywell International Inc. | Systems and methods for managing configuration data at disconnected remote devices |
US8707414B2 (en) * | 2010-01-07 | 2014-04-22 | Honeywell International Inc. | Systems and methods for location aware access control management |
-
2012
- 2012-04-23 FR FR1253703A patent/FR2989857B1/en active Active
-
2013
- 2013-04-19 US US14/396,461 patent/US9852307B2/en active Active
- 2013-04-19 EP EP13723838.2A patent/EP2842091A1/en not_active Ceased
- 2013-04-19 WO PCT/FR2013/050874 patent/WO2013160595A1/en active Application Filing
- 2013-04-19 JP JP2015507581A patent/JP6207590B2/en active Active
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2013160595A1 * |
Also Published As
Publication number | Publication date |
---|---|
US9852307B2 (en) | 2017-12-26 |
FR2989857A1 (en) | 2013-10-25 |
US20150135334A1 (en) | 2015-05-14 |
JP6207590B2 (en) | 2017-10-04 |
FR2989857B1 (en) | 2014-12-26 |
WO2013160595A1 (en) | 2013-10-31 |
JP2015523616A (en) | 2015-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2941313C (en) | Method of controlling access to a reserve zone with control of the validity of an access entitlement installed in the memory of a mobile terminal | |
EP3189485A1 (en) | Electronic ticket management | |
EP3476056A1 (en) | Device, system and method for selectively receiving data broadcast in a network | |
WO2014207404A1 (en) | Method for changing an authentication key | |
WO2009083658A1 (en) | Radiofrequency dispensing of electronic tickets | |
EP2047698B1 (en) | Customization of a radio communication terminal | |
FR3037754A1 (en) | SECURE MANAGEMENT OF ELECTRONIC TOKENS IN A MOBILE TELEPHONE | |
EP2842091A1 (en) | Method of access to a local service of a device communicating via a terminal | |
FR2979731A1 (en) | METHOD AND SYSTEM FOR DIGITAL CERTIFICATION OF THE ASSOCIATION BETWEEN AN ENTITY AND A PLACE | |
EP1413158B1 (en) | Method of accessing a specific service offered by a virtual operator and the chip card for a corresponding device | |
EP1859417A1 (en) | Transfer method made secure with secured card | |
EP2911365B1 (en) | Method and system for protecting transactions offered by a plurality of services between a mobile device of a user and an acceptance point | |
EP3552136B1 (en) | Technique for managing a right of access to a service for a communicating device | |
WO2023232633A1 (en) | Management of the charging of an electric vehicle, corresponding charging terminal and corresponding charging management server | |
EP1479255A1 (en) | Method for access control to at least certain functions of a mobile telephone terminal | |
FR2853785A1 (en) | Electronic entity e.g. subscriber identification module card, for mobile communication, has recording unit to update and store maximal number of data, and receiving unit to verify whether received command is from authorized party | |
WO2002063575A2 (en) | Method for transferring data between service terminals and transactional means | |
FR3038176A1 (en) | PROVIDING AND MANAGING PROFILES ON A SECURE ELEMENT, SECURE ELEMENT AND ASSOCIATED SERVER | |
WO2015193623A1 (en) | Data transfer method, and associated fluid meter, passive communication device, support and transfer assembly | |
FR2967001A1 (en) | ELECTRONIC ENTITY MANAGING A CREDIT FOR USE OF A RESOURCE WHOSE ACCESS IS CONTROLLED BY A CONTROL DEVICE |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20141030 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20170612 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20191003 |