EP3382657A1 - Procédé de fonctionnement d'un système d'accès - Google Patents

Procédé de fonctionnement d'un système d'accès Download PDF

Info

Publication number
EP3382657A1
EP3382657A1 EP17164187.1A EP17164187A EP3382657A1 EP 3382657 A1 EP3382657 A1 EP 3382657A1 EP 17164187 A EP17164187 A EP 17164187A EP 3382657 A1 EP3382657 A1 EP 3382657A1
Authority
EP
European Patent Office
Prior art keywords
access
gate
mobile terminal
signal
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP17164187.1A
Other languages
German (de)
English (en)
Other versions
EP3382657B1 (fr
Inventor
Norbert Miller
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Scheidt and Bachmann GmbH
Original Assignee
Scheidt and Bachmann GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Scheidt and Bachmann GmbH filed Critical Scheidt and Bachmann GmbH
Priority to PL17164187.1T priority Critical patent/PL3382657T3/pl
Priority to EP17164187.1A priority patent/EP3382657B1/fr
Priority to HUE17164187A priority patent/HUE059098T2/hu
Priority to ES17164187T priority patent/ES2919127T3/es
Publication of EP3382657A1 publication Critical patent/EP3382657A1/fr
Application granted granted Critical
Publication of EP3382657B1 publication Critical patent/EP3382657B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/10Movable barriers with registering means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves

Definitions

  • the application relates to a method for operating an access system, an access system, a code generator for a mobile terminal and a mobile terminal.
  • Access to a particular area and / or the exit from a particular area can be controlled using an access system.
  • An access system may have at least one gate.
  • a gate is in particular a passage barrier.
  • a gate can be used to ensure that only authorized users can pass through the gate, for example, to reach the designated area.
  • a user at a ticket vending machine acquires a (paper) ticket with a readable access record, for example in the form of a readable code.
  • a readable access record for example in the form of a readable code.
  • the ticket in particular the access record, is received by the gate and then checked. Access through the gate is released or denied depending on the test result.
  • access systems are known in which the access record is transmitted from a remote central computing device (eg, a backend system) via a remote communication network (eg, mobile network) to a mobile terminal of a user.
  • a remote central computing device eg, a backend system
  • a remote communication network eg, mobile network
  • the user can then use his mobile device instead of a separate (paper) ticket.
  • the readable access record can be read out of the mobile terminal by an interface device of the gate.
  • a corresponding system and method is used in the US 9 317 976 B2 disclosed.
  • a first signal in particular a beacon signal
  • the application starts communication with a remote central computing device via a remote communication network (in particular, a cellular network).
  • a remote communication network in particular, a cellular network.
  • a readable access record is transmitted both to the mobile terminal and to the gate.
  • the access record is now read by an interface device of the gate from the mobile terminal and compared with the access record transmitted by the central computing device. In the case of a positive test result, the access or passage through the gate is released in a conventional manner.
  • a disadvantage of this method is that for the implementation of the method always both a communication link between the mobile terminal and the remote central computing device and between the gate and the remote central computing device must be present. For example, when a malfunction occurs in the cellular network (or other used remote communication network), there is no communication between the mobile terminal and the remote central computing device and / or the gate and the remote central computing device.
  • an access system for a particular area to be controlled may be in a geographical area where a mobile network is only of poor quality. This may be the case in particular for underground access systems (eg subway stations and the like).
  • underground access systems eg subway stations and the like.
  • the problem may arise that the access record already exists on the mobile terminal, but due to a delay in the Transmission of the access record to the corresponding gate of this gate does not yet have the access record. In this case access through the gate remains disabled even though the user has a valid access record.
  • a first signal is transmitted via a wireless channel, such that on a first terminal receiving the mobile terminal, a local generation of an access record, at least based on a transmitted first transmitter identifier and stored on the mobile terminal Access identifier, which causes both the Improved usability and reliability of the access system.
  • no communication takes place between a remote central computing device and a mobile terminal.
  • no communication is required between a remote central computing device and the gate.
  • the present access system may be operated without communication with a remote central computing device.
  • the present access system may be used to control access to and / or exit from at least one particular area.
  • exemplary and non-exhaustive uses of an access system include buildings and / or building areas such as office buildings, airports, railway stations, platforms, piers, residential homes, theme parks, swimming pools, and the like, and vehicles such as rail vehicles, buses, or airplanes.
  • An access system may have one or more gate (s).
  • a gate is a passage barrier to and / or from a certain area.
  • Exemplary gates are doors or turnstiles.
  • the access system may include one or more first transmitting devices.
  • the first transmitting device is assigned to the at least one gate or a gate arrangement (also called a gate array), comprising the at least one gate.
  • An association may in particular comprise a (wireless and / or preferably wired) communication connection between the gate and the first transmission device.
  • At least the emitted first transmitter identifier can be provided to the gate, in particular a test device of the gate, via the communication connection.
  • an association should be understood to mean that the first transmission field of the one or more first transmission device (s) covers the uncontrolled region in front of the gate or the gate arrangement with the gate. In other words, a user usually only reaches the gate by passing the first transmission field in advance.
  • the present method comprises the preferably (quasi) continuous transmission of a first signal by the first transmission device.
  • the first signal may include at least a first transmitter identifier of the first transmitter.
  • a first sender identification for example a specific character code, is in particular unambiguously assigned to a first sender device which transmits the corresponding first signal.
  • the first transmission device can be uniquely identified by the first transmission identifier.
  • the first signal causes the generation of an access data set.
  • the first signal may comprise instructions which, after receiving the first signal and extracting the instructions and the first sender identifier, cause the local generation of a readable access data record on the mobile terminal.
  • the access record comprises at least one key corresponding to the received sender identification and an access identifier.
  • the key may be identical to the first sender identifier.
  • a key that can be uniquely assigned to the first sender identification can be created from the first sender identification.
  • the access identifier can be a unique identifier, in particular a unique user identifier. In other words, the access identifier can be unambiguously assigned to the user of the mobile terminal at least indirectly.
  • Exemplary and non-terminating access identifiers are user name, mobile terminal number, mobile terminal equipment IMEI number, mobile terminal media access control (MAC) address, credit card number, and / or one SIM (Subscriber Identity Module).
  • a mobile terminal has processing means, such as processor (s), memory, receiving means, such as an antenna, etc., for wireless communication receive first signal and process so that the access record can be created locally.
  • processing means such as processor (s), memory, receiving means, such as an antenna, etc.
  • receiving means such as an antenna, etc.
  • exemplary and non-terminating mobile devices include smartphones, tablet computers, mobile game consoles, laptops, netbooks, data glasses, smart watches, and similar wearables.
  • the method includes receiving an access record from a mobile terminal through an interface of the gate via preferably a wireless channel.
  • Receiving comprises in particular a detection of the access data record by the interface device.
  • the at least one interface device of the gate can correspond at least to an interface device of the mobile terminal.
  • At least the key can be extracted from the received access data record and used for authentication of the received access data record.
  • the received key is compared in a first test step with the one or more provided first sender identification (s) of the one or more first sender (s) associated with the gate.
  • access by the gate is then enabled. For example, a release can at least only take place if it is determined in the first checking step that the received key corresponds to a provided first sender identification. If no such adjustment is detected in the first test step, the gate remains locked.
  • various interface devices for receiving the access record may be provided and / or used by a mobile terminal, such as e.g. a Bluetooth interface or a WLAN interface.
  • the gate interface device is preferably provided for communication distances of less than 10 cm, preferably less than 2 cm. This ensures that the gate is opened only when the user is in close proximity to the gate.
  • an RFID Radio Frequency Identification
  • NFC near field communication
  • receiving the access data record from the mobile terminal by the interface device of the gate may comprise reading out a barcode and / or QR code displayed by the mobile terminal by the interface device of the gate.
  • an (already provided) bar code reader and / or QR code reader of the gate can be used as the interface device.
  • An installation of a special interface device can be omitted.
  • a barcode and / or QR code can be displayed by an interface device, in particular a display of the mobile terminal, and can be detected by the barcode reader and / or QR code reader of the gate.
  • an access record comprising at least the key and the access identifier can be easily represented by a barcode and / or QR code.
  • the key and the access identifier can be easily extracted from the detected bar code and / or QR code by the processing means (e.g., processor, memory, etc.) of the gate for further testing.
  • a first transmitting device may in particular be a near-field transmitting device.
  • the first transmitting device may have a minimum range of at least 5 m, preferably at least 8 m, and a maximum range of at most 20 m, preferably at most 12 m.
  • RFID technology infrared technology, WLAN technology and / or sound technology can be used.
  • the first signal may be a Bluetooth signal transmitted by a Bluetooth beacon.
  • a BLE (Bluetooth Low Energy) beacon can be used as the first transmitting device.
  • a received access identifier can be checked, the security of the access system can be improved. Access by unauthorized users can be at least made more difficult.
  • a local authorization list may be stored in a local memory device associated with the gate (eg, all gates of a gate device may access this memory device).
  • the memory device may for example be integrated in the gate or connected via a communication connection.
  • the local authorization list can in particular be a so-called negative list.
  • the authorization list can comprise at least one access identifier of unauthorized users / mobile terminals. At least as a function of the second check result of the second checking step, access through the gate can be enabled.
  • a release can at least only take place if it is determined in the second checking step that the received access identifier does not correspond to any identifier stored in the authorization list. If it is determined in the second checking step that the received access identifier corresponds to an access identifier of the authorization list, then the gate remains locked (despite a possibly positive first test result).
  • a so-called positive list can also be stored in the memory device of the gate and used for the second checking step.
  • Another advantage of using a local authorization list is that no communication with a remote central computing device is required when performing the second checking step.
  • the local authorization list can be updatable. Updatable means in particular that the data content of the authorization list can be changed, added and / or deleted.
  • an access identifier received by the gate can be transmitted from a suitable transmitting device of the gate to a corresponding receiving device of the central computing device.
  • the central computing device may include one or more servers (eg, cloud servers).
  • the central computing device may also be referred to as a "backend system".
  • the central computing device may comprise at least one test device for carrying out the third test step.
  • a comparison of the received access identifier with stored permissible access identifiers can be carried out.
  • the third checking step can take place, for example, in the context of a (conventional) accounting step; in particular, the third checking step can be carried out downstream, after granting access by the gate. If it is determined that the received access code is an unauthorized access code, then the central computing device cause a corresponding update of the authorization list.
  • a locally generated access record may have a limited time validity (e.g., maximum x min).
  • the gate checks whether a received access data record is (or is not) a time-valid access data record.
  • the at least one transmitting device and the gate associated with the at least one transmitting device can be synchronized in time.
  • the first signal preferably has a time stamp corresponding to the emission time of the first signal. Based on the received timestamp, time information may be inserted in the access record. Furthermore, a maximum permissible time duration (eg x min from the time of emission) can be specified. In the fourth checking step, for example, first the difference between the time of receipt of the access data record and the received time stamp can be determined.
  • the determined difference can be compared with the predetermined maximum permissible time duration. This can be used to check whether the access data record is (still) valid.
  • access through the gate can be enabled. For example, a release can at least take place only if it is determined in the fourth checking step that the determined difference between the reception time of the access data record and the received time stamp is less than or equal to the predetermined maximum permissible time duration. If it is determined in the fourth test step that the difference is greater, the gate remains locked.
  • the first signal can be set up to activate a code generator arranged on the mobile terminal.
  • the code generation device may comprise at least one generation means configured to generate the access record (previously described).
  • the code generation device can be formed in particular in the form of a software module, such as a so-called "app".
  • the code generation device can be a computer program with instructions executable on a processor of the mobile terminal, such that locally a previously described access data record is generated.
  • Such a code generating device can be arranged, in particular installed, on a mobile terminal.
  • registration of the user / mobile terminal with the central computing device may be required prior to or during installation or during initial use. During the registration, a unique access identifier can be defined and stored both in a storage device of the mobile terminal (if not already there) as also stored in a memory device of the central computing device.
  • the first signal may comprise instructions which cause an activation or awakening of the code generation device on the mobile terminal and in particular a subsequent automatic generation of the access data record described above.
  • This can in particular include an automatic representation of a bar code or QR code corresponding to the access data record on a display of the mobile terminal.
  • an access data record can be created and made available for reading out.
  • the second signal may be a signal that can be received and processed by a plurality of different terminals.
  • the first signal may be a signal which can be processed by a mobile terminal only if the mobile station previously received the second signal.
  • the first signal can be set up to effect the generation of the access data record on the mobile terminal only after a previous receipt of the reception information of the second signal.
  • a second BLE beacon may be configured to emit a second signal coming from almost any mobile device, in particular a market standard operating system (eg Apple iOS, Google Android, Microsoft Windows Mobile, Microsoft Mobile Phone, Blackberry OS, Symbian OS, Firefox OS , Tizen, Aliyun OS), is receivable.
  • the second signal comprises a configuration data record, set up for the configuration of the mobile terminal, in particular a code generating device arranged on the mobile terminal.
  • the mobile terminal in particular the code generation device, can process a first signal from a first BLE beacon.
  • the configuration data set may preferably be a reception information in the form of a UUID (Universally Unique Identifier) of the first transmission device.
  • the UUID of the first transmitting device may be formed as a function of a hash value of the variable data of the receiving information.
  • the code generation device can be started and in particular configured on the mobile terminal.
  • the mobile terminal including the code generating means is arranged to scan for signals comprising the reception information.
  • the third signal can be transmitted by a third transmitting device (eg a Bluetooth beacon).
  • the third transmitting device may be associated with the gate.
  • the third transmitting device may include a communication link to the central computing device.
  • the location-related data record can be generated, for example, by the central computing device (eg after receipt and evaluation of the access code).
  • the gate is a terminal configured in the central computing device whose operating data, in particular its location, can be known to the central computing device.
  • the central computing device may generate the location-related (and preferably user-related) data set.
  • location-related (and preferably user-related) data set Preferably, individual user information can be stored in the central computing device for the respective access identifiers.
  • the desired use of a particular train may be stored as user information.
  • the location-related data record may include navigation data that indicates to the user the route to the departure track of the particular train.
  • the central computing device can be set up to detect change (s) with regard to the specific train (eg delay, change of carriage sequence, track change, etc.) and to generate a location-related data record with corresponding data.
  • This data record can be transmitted from the central computing device to the at least one third transmission device.
  • the third signal may, based on the access identifier, be arranged such that it can only be processed by the mobile terminal which has stored the access identifier.
  • the location-related data set can be generated based on a detected movement data record of the mobile terminal. If, for example, due to the movement data record and / or the location of the gate and the stored user information, the central computing device detects that the mobile terminal or the user is (probably) moving in the wrong direction, a location-related data record with corresponding data can be generated. As previously described, a third signal may be sent out with this data set.
  • the movement data record can be detected and transmitted by sensors of the mobile terminal or detected, for example, by the passage of certain transmitting devices and / or gates and / or the like.
  • the access system comprises at least one first transmitting device assigned to at least one gate, configured to emit at least one first signal, comprising at least one first transmitter identification of the first transmitting device.
  • the first signal is set up to effect a generation of an access data record on a mobile terminal with at least one key corresponding to the first sender identification and an access identifier stored on the mobile terminal.
  • the gate comprises at least one interface device configured to receive the access record from the mobile terminal.
  • the gate comprises at least one checking device, at least configured for checking the access authorization, at least by comparing the received key with the at least one provided first sender identification in a first checking step.
  • the gate comprises at least one release device, set up for Enabling access through the gate, at least depending on the first test result.
  • the method described above can preferably be used to operate the access system.
  • the first transmission device may be a Bluetooth beacon.
  • the (at least one) interface device of the gate may be a bar code reader and / or a QR code reader.
  • a further aspect of the application is a code generating device for a mobile terminal for (local) generation of an access data record.
  • the code generating device comprises at least one receiving means, configured to receive at least one first transmitter identification transmitted by a first signal.
  • the code generating device in particular the receiving means, is set up to receive at least one access identifier stored in a memory device of the mobile terminal.
  • the code generation device comprises at least one generation means, set up for generating the access data record with at least one key corresponding to the received sender identification and the received access identifier.
  • the code generating device comprises at least one provisioning means, configured to provide the generated access data record such that the access data record can be received by an interface device of a gate.
  • the code generating device can be formed in particular in the form of a software module, such as a so-called "app".
  • the code generating device can be a computer program with instructions executable on a processor (of the mobile terminal) such that locally a previously described access data record is generated.
  • Such a code generating device can be arranged, in particular installed, on a mobile terminal.
  • the first (or second) signal may include instructions that cause an activation or awakening of the code generating device on the mobile terminal and in particular a subsequent automatic generation of the access record described above.
  • the code generating device can be provided with the received first sender identification and the stored access identifier via the receiving means. After the access data record has been generated, it can be made available to an interface device of the mobile terminal by the provisioning means.
  • an access data record can be created and made available for reading out. This allows local generation of an access record without the use of a central computing device.
  • the mobile terminal comprises at least one previously described code generating device.
  • the code generation device can be implemented on the mobile terminal.
  • the mobile terminal comprises at least one memory device configured to store at least one access identifier for at least one access system.
  • FIG. 1 shows a schematic view of an embodiment of an access system 100 according to the present application.
  • the access system 100 comprises at least a first transmitting device 102 and at least one gate 104.
  • two or more first transmitting devices and / or at least one gate device having two or more gates may be provided.
  • the first transmitting device 102 is associated with the gate 104.
  • a communication link 112 is provided between the first transmitting device 102 and the gate 104, for example via a wired channel.
  • the first transmission field covers in particular the area in front of the gate. Data can be exchanged between the first transmitting device 102 and the gate 104 via the communication link 112. For example, time data for temporal synchronization of the respective time means can be transmitted and / or the first transmitter identifier can be provided by the first transmitter 102 for the gate 104.
  • the first transmission device 102 in particular a transmission device with a defined transmission range (for example approximately 10 m), is set up to transmit a first signal.
  • the signal can preferably be sent out (almost) continuously.
  • the first signal comprises at least a first transmitter identifier (which is uniquely assigned to the transmitting transmitter).
  • the first signal may include further data, such as a time stamp. For example, the first sender identification may be changed regularly to improve security.
  • the access system 100 can ensure that only authorized users 110 can access a particular area controlled by the access system 100 (behind the gate 104). For authentication at the gate 104, it is proposed herein to use a mobile terminal 106. In addition to using a mobile terminal 106, the access system 100 may also be configured to use other media (such as a paper ticket, magnetic stripe ticket, etc.).
  • a mobile terminal 106 has a first interface device (not shown) (eg, a Bluetooth transceiver) configured to receive the first signal.
  • a mobile terminal 106 arrives in the first transmission field of the first transmission device 102, it receives the first signal.
  • the first signal is set up on the mobile terminal 106, in particular below Cooperating with a code generating device installed on the mobile terminal 106 to effect generation of an access record having at least one key corresponding to the first sending ID and an access ID stored on the mobile terminal 106.
  • the gate 104 has at least one interface device 108.
  • the interface device 108 preferably a bar code reader 108 and / or QR code reader 108, is set up to receive the access record from the mobile terminal 106, in particular to detect it.
  • the mobile terminal 106 may have a further interface device (not shown) corresponding to the interface device 108, for example a display for displaying a barcode or QR code.
  • the interface device 108 the access data record can be read out.
  • Gate 104 includes means (not shown) for extracting the data (e.g., key, timestamp, access identifier, etc.) from the retrieved access record formed, for example, by a bar code or QR code.
  • data e.g., key, timestamp, access identifier, etc.
  • a test device 114 may check the received data. Depending on the at least one check result, access / passage through the gate 104 may be enabled by a release device 118 (in known manner).
  • the checking device 114 for checking the access authorization may be set up in a first checking step, at least by comparing the received key with the at least one first sender identification provided by the first transmitting device 102. If the key corresponds to the first sender identification provided (positive first check result), a release can take place. With a negative first check result, the gate 104 remains disabled and access is denied.
  • FIG. 4 shows a diagram of an embodiment of a method according to the application.
  • a first signal is transmitted by the first transmitting device 102.
  • the first signal causes the generation of an access data record with at least one key corresponding to the first sender identification and an access identifier stored on the mobile terminal 106.
  • step 403 the generated access data record is read out by an interface device 108 of the gate 104, and the access data of the received access data record is made available to the test device 114.
  • step 404 at least a first test step is performed.
  • the access authorization is checked at least by comparing the received key with the at least one provided first sender identification.
  • step 405 the gate 104 will release on a positive check result.
  • an authorized user 110 may pass gate 104.
  • FIG. 2 shows a schematic view of another embodiment of an application according to the access system 200. To avoid repetition, essentially only the differences from the embodiment below after FIG. 1 described. For the other components of the access system 200 reference is made to the above statements.
  • the gate 204 has a memory device 216.
  • the test device 214 can access the memory device 216.
  • an updatable (local) authorization list may be stored.
  • a negative list may be stored which does not include access authorizations that are permitted access.
  • the access system 200 comprises, in addition to at least one first transmitting device 202, at least one second transmitting device 226.
  • the second transmitting device 226 is in particular a (near field) transmitting device 226 with a defined transmitting range (for example approximately 10 m).
  • the second transmitting device 226 may be a Bluetooth beacon.
  • the second transmitting device 226 may be associated with at least the first transmitting device 202.
  • a communication connection 234 between the second transmitting device 226 and the first transmitting device may be provided directly or indirectly (eg via the gate 204). In this way, for example, the reception information of the configuration data set contained in the second signal can be adjusted between the transmission devices 202, 226.
  • the second transmitting device 226 may be configured to transmit the second signal.
  • the present access system 200 includes at least one third transmitting device 232. While the first transmitting device 202 and / or second transmitting device 226 may substantially cover with their respective transmitting field the uncontrolled region in front of the gate 204, the at least one Third transmitting device 232 cover the controlled area behind the gate 204 with its transmission field.
  • the third transmitting device 232 (e.g., a Bluetooth beacon 232) may transmit a third signal.
  • the third transmitting device 232 may have at least one communication link 236 with a remote communication data network 220 (e.g., Internet).
  • a remotely located central computing device 222 is disposed. Via an interface device 230, the central computing device 222 to the Fernkommunikationskornetz 220 be connected, for example, to exchange data with the gate 204, in particular via an interface module 220 of the gate 204, and / or with the third transmitting device 232. Furthermore, the central computing device 222 may have at least one checking device 224 and at least one memory device 228 (for example, a database for storing access identifiers, user information, etc.).
  • FIG. 3 shows a schematic view of an embodiment of a code generator 350 according to the present application, which is arranged on a mobile terminal 306 according to the present application.
  • the code generator 350 may be installed on the mobile terminal 306.
  • the code generating device 350 comprises a receiving means 338.
  • the illustrated receiving means 338 is set up to receive a received first sender identification and an access identifier provided by a storage device 344 for further processing by a generating means 340.
  • the generation means 340 further processes the received data by creating a readable access record locally (according to a predetermined generation scheme).
  • the generated access record is provided by a provisioning module 342 of an interface device 352 of the mobile terminal 306.
  • the interface device 352 is a display 352 of the mobile terminal 306.
  • other interface devices eg an NFC transceiver, a Bluetooth interface or a WLAN interface
  • FIG. 5 shows a diagram of another embodiment of a method according to the present application.
  • the first transmitting device 202 may receive a first signal having a first sender identification and / or a reception information, and from the second transmitting device 226 a second signal having a configuration data record comprising a receive information corresponding to the received information contained in the first signal to be sent out.
  • the first signal and the second signal are in particular configured such that a processing of the data content of the first signal only at a previous reception of the second signal and in particular after a configuration of the mobile terminal 306, in particular the code generator 350, according to the received configuration data set of the second signal , can be carried out.
  • the second signal is received by the mobile terminal 306 in step 502.
  • the configuration record is extracted and the mobile terminal 306, in particular the code generator 350, is configured accordingly.
  • the mobile terminal 306 may receive the first signal and extract and process the data contained therein.
  • at least the first transmitter identifier and a time stamp can be extracted from the first signal and made available to the code generator 350 for further processing.
  • the second signal may include a UUID (eg according to the iBeacon standard) and so-called major and minor data (eg according to the iBeacon standard).
  • the UUID data may be selected so that a mobile terminal recognizes the second signal as originating from an iBeacon.
  • the major and minor data may be used to represent receive information in the form of a UUID of the first transmitting device 202.
  • the UUID of the first transmitting device 202 may be a function of a hash value from the major and minor data be formed of the second signal.
  • the code generator 350 knows which UUIDs to scan to receive and process the first signal. Due to the assignment, the second signal can be matched to the first signal accordingly.
  • the at least one receiving means 338 may receive the first sender identification, the time stamp and an access identifier (in particular a user identifier valid for the access system 200 from the memory device 344).
  • the generation module 340 may generate an access record based on the data obtained in step 503 and corresponding to the instructions stored in the mobile terminal 306.
  • the stored instructions can, for example, specify the generation of a barcode or QR code (or another code) and the integration of the received data in this code.
  • an access record is generated that includes a key corresponding to the first sender identification (e.g., the received first sender identifier), time information (e.g., the received timestamp), and the access identifier.
  • the provisioning means 342 may provide the generated access record to an interface device 352 of the mobile terminal 306.
  • the barcode or QR code can be made available to a display 352 and automatically displayed by it for a readout. It is understood that a user confirmation may be required for the display of the code.
  • the interface device 352 of the mobile terminal 306 may also be another suitable interface device, such as For example, an NFC transceiver, a Bluetooth interface or a WLAN interface.
  • the generated access record is received by an interface device 208 (e.g., a bar code reader and / or QR code reader) of the gate 204 corresponding to the interface device 352.
  • the gate 204 is set up to extract the data encoded in a code (in particular, key, time information and access identifier) and to make it available to at least one checking device 214.
  • the corresponding interface device 208 of the gate 204 may also be another suitable interface device, such as an NFC reader, a Bluetooth interface or a WLAN interface.
  • step 508 which may comprise a plurality of test steps, in particular the checking device 214 of the gate 204 may check the validity of the received access data record, in particular the data mentioned above.
  • a first test step it can be checked whether the key corresponds to at least one provided first sender identification. If the first test result is negative (ie, if no correspondence is detected), the gate 204 is disabled in step 511 or remains locked (regardless of the result of the other test steps).
  • the access code can be compared with the access codes stored in the authorization list. If a correspondence between received and stored access identifier is detected (negative second check result), the method (in the case of a negative list) is terminated with step 511: the gate 204 is locked.
  • the second check section is exactly the reverse when using a positive list: If a correspondence between received and stored access ID is detected (positive second check result), the method is continued.
  • the received time information can be checked.
  • the emission time of the first signal can at least be derived from the time information.
  • This broadcast time may be compared to the time the access record was received by the gate 204.
  • the determined difference can be compared with a maximum allowable duration. If the determined difference is greater than the maximum allowable time (negative fourth test result), the process is terminated with step 511: the gate 204 is locked.
  • access by the gate 204 is enabled by the release device 218 in step 510 only if the first check result, the second check result, and the fourth check result are positive.
  • a third signal may be transmitted (step 515) which may be encoded so that it can only be received and processed by the mobile terminal 306 that previously transmitted the allowed access record to the gate 204.
  • the access identifier can be used for this purpose.
  • the data content of the third signal may be a location-related and preferably user-related data record, which may comprise, for example, navigation data.
  • the generation may in particular depend on the location data of the gate 204, which has been passed by the user, and, for example, user information stored in the central computing device 222 and / or acquired movement data of the mobile terminal 306.
  • At step 512 at least the access identifier received from the gate 204 may be transmitted to the central computing device 222 for further processing.
  • the transmitted access identifier can be checked by the checking device 224 of the central computing device 222 in step 513, for example as part of a settlement step. For example, if billing is not possible (e.g., no credit on the user's account) and / or the received access identifier does not correspond to allowable (registered) access identifiers stored in the storage device 228, the third check result of the third check step is negative. In this case, an update of the authorization list stored in the memory device 216 of the gate 204 may be performed in step 514.
  • the central computing device 222 may effect a corresponding update, for example, by transmitting an updated authorization list to the gate 204.
  • the corresponding access identifier can be added in order to prevent at least another unauthorized access by the gate 204 or the gate arrangement. It is understood that a corresponding update of all locally stored authorization lists of an access system 200 can take place.
  • central computing device 222 is provided for the control of two or more access systems, further local authorization lists of the gates of the further access systems may be updated accordingly.
  • step 515 may be performed after steps 512 and 513. It is further understood that some of the steps described above may be omitted, at least partially eliminated, in a different order or in parallel.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Selective Calling Equipment (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
EP17164187.1A 2017-03-31 2017-03-31 Procédé de fonctionnement d'un système d'accès Active EP3382657B1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PL17164187.1T PL3382657T3 (pl) 2017-03-31 2017-03-31 Sposób obsługi systemu dostępu
EP17164187.1A EP3382657B1 (fr) 2017-03-31 2017-03-31 Procédé de fonctionnement d'un système d'accès
HUE17164187A HUE059098T2 (hu) 2017-03-31 2017-03-31 Eljárás hozzáférési rendszer üzemeltetésére
ES17164187T ES2919127T3 (es) 2017-03-31 2017-03-31 Procedimiento para hacer funcionar un sistema de acceso

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP17164187.1A EP3382657B1 (fr) 2017-03-31 2017-03-31 Procédé de fonctionnement d'un système d'accès

Publications (2)

Publication Number Publication Date
EP3382657A1 true EP3382657A1 (fr) 2018-10-03
EP3382657B1 EP3382657B1 (fr) 2022-06-08

Family

ID=58548971

Family Applications (1)

Application Number Title Priority Date Filing Date
EP17164187.1A Active EP3382657B1 (fr) 2017-03-31 2017-03-31 Procédé de fonctionnement d'un système d'accès

Country Status (4)

Country Link
EP (1) EP3382657B1 (fr)
ES (1) ES2919127T3 (fr)
HU (1) HUE059098T2 (fr)
PL (1) PL3382657T3 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113454288A (zh) * 2019-06-06 2021-09-28 熵基科技股份有限公司 道闸
US11631329B2 (en) 2020-07-08 2023-04-18 Honda Motor Co., Ltd Venue location identification for vehicular access control
DE102021130970A1 (de) 2021-11-25 2023-05-25 Scheidt & Bachmann Gmbh Fest montierte Ticketerfassungsvorrichtung für ein Zugangskontrollsystem

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100307206A1 (en) * 2009-06-08 2010-12-09 Harrow Products Llc Electronic door lock for reduced power consumption
US20120115512A1 (en) * 2010-11-09 2012-05-10 Apple Inc. Beacon-Based Geofencing
EP2575091A1 (fr) * 2011-09-29 2013-04-03 Delphi Technologies, Inc. Système et procédé de sécurité automatique de véhicule de parc
US20140255036A1 (en) * 2013-03-06 2014-09-11 Qualcomm Incorporated Methods and apparatus for using visible light communications for controlling access to an area
US9317976B2 (en) 2013-10-29 2016-04-19 Cubic Corporation Fare collection using wireless beacons
WO2016089837A1 (fr) * 2014-12-02 2016-06-09 Carrier Corporation Capture d'intention d'utilisateur lors d'une interaction avec une pluralité de commandes d'accès

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102013013391A1 (de) * 2013-08-13 2015-02-19 Huf Hülsbeck & Fürst Gmbh & Co. Kg Authentifizierungsverfahren zur Berechtigungsüberprüfung eines Benutzers bei einem Kraftfahrzeugschließsystem

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100307206A1 (en) * 2009-06-08 2010-12-09 Harrow Products Llc Electronic door lock for reduced power consumption
US20120115512A1 (en) * 2010-11-09 2012-05-10 Apple Inc. Beacon-Based Geofencing
EP2575091A1 (fr) * 2011-09-29 2013-04-03 Delphi Technologies, Inc. Système et procédé de sécurité automatique de véhicule de parc
US20140255036A1 (en) * 2013-03-06 2014-09-11 Qualcomm Incorporated Methods and apparatus for using visible light communications for controlling access to an area
US9317976B2 (en) 2013-10-29 2016-04-19 Cubic Corporation Fare collection using wireless beacons
WO2016089837A1 (fr) * 2014-12-02 2016-06-09 Carrier Corporation Capture d'intention d'utilisateur lors d'une interaction avec une pluralité de commandes d'accès

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113454288A (zh) * 2019-06-06 2021-09-28 熵基科技股份有限公司 道闸
US11631329B2 (en) 2020-07-08 2023-04-18 Honda Motor Co., Ltd Venue location identification for vehicular access control
DE102021130970A1 (de) 2021-11-25 2023-05-25 Scheidt & Bachmann Gmbh Fest montierte Ticketerfassungsvorrichtung für ein Zugangskontrollsystem
EP4187511A1 (fr) * 2021-11-25 2023-05-31 Scheidt & Bachmann GmbH Dispositif de capture de ticket fixé pour système de contrôle d'accès

Also Published As

Publication number Publication date
ES2919127T3 (es) 2022-07-22
HUE059098T2 (hu) 2022-10-28
EP3382657B1 (fr) 2022-06-08
PL3382657T3 (pl) 2022-08-01

Similar Documents

Publication Publication Date Title
DE102013203949B4 (de) Kommunikationssystem, Kommunikationsverfahren und tragbares Gerät
EP3382657B1 (fr) Procédé de fonctionnement d'un système d'accès
EP3704674B1 (fr) Système et procédé de contrôle d'accès de personnes
DE212014000079U1 (de) Tragbare Kommunikationsvorrichtung sowie System dafür
WO2016070872A1 (fr) Procédé pour fournir un code d'accès à un appareil portable, et appareil portable
EP3407307B1 (fr) Système de stationnement et son procédé de fonctionnement
EP3955219A2 (fr) Procédé de fonctionnement d'un dispositif de stationnement
EP2732398A1 (fr) Procédé permettant d'exploiter un dispositif de réseau
EP3910606A1 (fr) Système d'accès pourvu d'au moins un portail
EP3621042B1 (fr) Procédé de vérification
DE102010047257A1 (de) Mobilfunkbasiertes Transaktionssystem
EP2081140A1 (fr) Procédé et système destinés à la protection d'une transaction
EP3306578A1 (fr) Autorisation d'ouverture d'un compartiment de réception d'un véhicule téléguidé
WO2017025193A1 (fr) Procédé et dispositif pour effectuer un contrôle de personnes
EP3252697B1 (fr) Dispositif de validation pour un systeme de ticket
WO2016041843A1 (fr) Procédé et agencement permettant d'autoriser une action au niveau d'un système en libre-service
WO2013110407A1 (fr) Commande d'accès
EP3910603A1 (fr) Système de stationnement
EP3817406B1 (fr) Procédé de fonctionnement d'une application de service installée sur un dispositif terminal mobile
DE102014225484A1 (de) Anordnung und Verfahren zur Positionsbestimmung in Gebäuden
EP3404627A1 (fr) Système d'accès et son procédé de fonctionnement
DE102016117981B4 (de) Vorrichtung und Verfahren zur Auswertung von Zugangsinformationen
DE102014209191A1 (de) System und Verfahren zum Herunterladen von auf einem Tachografen gespeicherten Daten
EP1768316B1 (fr) Déblocage d'une carte mobile
DE102011004505B4 (de) Verfahren zur sicheren Fahrzeug-zu-X Kommunikation

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20180206

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20190604

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

RIC1 Information provided on ipc code assigned before grant

Ipc: G07C 9/00 20200101ALN20211115BHEP

Ipc: G07C 9/20 20200101ALI20211115BHEP

Ipc: G07C 9/10 20200101AFI20211115BHEP

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 502017013267

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: G07C0009000000

Ipc: G07C0009100000

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20220119

RIC1 Information provided on ipc code assigned before grant

Ipc: G07C 9/00 20060101ALN20220107BHEP

Ipc: G07C 9/20 20200101ALI20220107BHEP

Ipc: G07C 9/10 20200101AFI20220107BHEP

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1497452

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220615

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502017013267

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2919127

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20220722

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

REG Reference to a national code

Ref country code: HU

Ref legal event code: AG4A

Ref document number: E059098

Country of ref document: HU

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220908

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220909

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220908

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20221010

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20221008

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502017013267

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IE

Payment date: 20230323

Year of fee payment: 7

Ref country code: FR

Payment date: 20230323

Year of fee payment: 7

Ref country code: CZ

Payment date: 20230228

Year of fee payment: 7

26N No opposition filed

Effective date: 20230310

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PL

Payment date: 20230322

Year of fee payment: 7

Ref country code: IT

Payment date: 20230323

Year of fee payment: 7

Ref country code: HU

Payment date: 20230303

Year of fee payment: 7

Ref country code: GB

Payment date: 20230322

Year of fee payment: 7

Ref country code: DE

Payment date: 20230322

Year of fee payment: 7

Ref country code: BE

Payment date: 20230322

Year of fee payment: 7

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230427

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20230322

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: ES

Payment date: 20230421

Year of fee payment: 7

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220608

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20230331

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20230331

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20230331

REG Reference to a national code

Ref country code: AT

Ref legal event code: MM01

Ref document number: 1497452

Country of ref document: AT

Kind code of ref document: T

Effective date: 20230331