EP3567555B1 - Method for operating an access system - Google Patents

Method for operating an access system Download PDF

Info

Publication number
EP3567555B1
EP3567555B1 EP18173626.5A EP18173626A EP3567555B1 EP 3567555 B1 EP3567555 B1 EP 3567555B1 EP 18173626 A EP18173626 A EP 18173626A EP 3567555 B1 EP3567555 B1 EP 3567555B1
Authority
EP
European Patent Office
Prior art keywords
data
communication apparatus
access
user
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP18173626.5A
Other languages
German (de)
French (fr)
Other versions
EP3567555A1 (en
Inventor
Stefan Pindl
Herbert Altenhofer
Klaus Plößl
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
emz Hanauer GmbH and Co KGaA
Original Assignee
emz Hanauer GmbH and Co KGaA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by emz Hanauer GmbH and Co KGaA filed Critical emz Hanauer GmbH and Co KGaA
Publication of EP3567555A1 publication Critical patent/EP3567555A1/en
Application granted granted Critical
Publication of EP3567555B1 publication Critical patent/EP3567555B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65FGATHERING OR REMOVAL OF DOMESTIC OR LIKE REFUSE
    • B65F1/00Refuse receptacles; Accessories therefor
    • B65F1/14Other constructional features; Accessories
    • B65F1/1484Other constructional features; Accessories relating to the adaptation of receptacles to carry identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65FGATHERING OR REMOVAL OF DOMESTIC OR LIKE REFUSE
    • B65F1/00Refuse receptacles; Accessories therefor
    • B65F1/10Refuse receptacles; Accessories therefor with refuse filling means, e.g. air-locks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65FGATHERING OR REMOVAL OF DOMESTIC OR LIKE REFUSE
    • B65F2210/00Equipment of refuse receptacles
    • B65F2210/128Data transmitting means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65FGATHERING OR REMOVAL OF DOMESTIC OR LIKE REFUSE
    • B65F2210/00Equipment of refuse receptacles
    • B65F2210/138Identification means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65FGATHERING OR REMOVAL OF DOMESTIC OR LIKE REFUSE
    • B65F2210/00Equipment of refuse receptacles
    • B65F2210/148Locking means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/0088Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed centrally

Definitions

  • garbage containers For the disposal of household waste, large-scale garbage containers are often provided, which are used by several households. Such garbage containers can, for example, belong to a house community or also to a municipality. Such garbage containers usually include an access device so that authorized users have access to such garbage containers. The authorization can also be blocked again, for example if the disposal costs are not paid.
  • This type of access can be implemented using a wide variety of electronic systems. It is known from the prior art, for example, that an identification code is assigned to a user. This identification code is entered, for example, via a number pad arranged on the garbage container. However, such systems are impractical for the user, since he must always have the access data at hand. Furthermore, a loss of the access data entails a complex administrative process.
  • the object of the present invention is to provide an improved method for operating an access system for an access device.
  • Access to a garbage container with restricted access by an access device is thus granted to the user as comfortably as possible, since he only needs to have a communication device at hand.
  • the solution works without additional hardware and without additional knowledge on the part of the customer.
  • an active connection to the central system for data transmission and authentication
  • Protection against misuse is guaranteed, as the copying of commercially available cards (and thus misuse) is eliminated.
  • access can be restricted regionally and time-wise.
  • the solution is easily scalable and easily configurable for changing users.
  • the authentication data preferably authorize access to several access devices, in particular garbage containers.
  • a predetermined area of validity is preferably to be understood as a period of validity. For example, this is to be understood as the term of the contract between a user and a corresponding disposal company.
  • a predetermined area of validity can cumulatively or alternatively also be understood to be a spatial area of validity. Accordingly, the access of a user could be restricted to several access devices, preferably garbage containers, in a certain spatial area, such as a house community, a ses or the like.
  • a communication channel should be understood as a transmission path. Such a transmission path connects a transmitter and a receiver. This transmitter or receiver is advantageously part of a communication interface.
  • the communication device accordingly has a first communication interface.
  • the first communication interface is connected to a third communication interface of the data management system via a first communication channel, the connection being understood to mean the possibility of data exchange.
  • the communication device also has a second communication interface which is connected to the fourth communication interface of the access device by means of the second communication channel, whereby at least the authentication data is transmitted to the access device by means of wireless technology.
  • Access to the access device can be understood to mean, for example, unlocking a garbage lock or unlocking a lock that closes the garbage container.
  • the communication device is a portable data processing device, for example a mobile phone, a smartphone, a tablet or a laptop.
  • a portable data processing device for example a mobile phone, a smartphone, a tablet or a laptop.
  • the present invention is not restricted to this list and other similar data processing devices can also be considered for the application.
  • the use of mobile telephones or smartphones is so widespread that the vast majority of the members of a corresponding house community or municipality own such a smartphone. The user therefore does not need any further devices for registration or authentication, or he has to memorize the corresponding access data.
  • the communication device preferably has a control device on which software, also known as an app, is installed, by means of which the registration of the user with the data management system is enabled and / or by means of which the data exchange via a second communication channel between the communication device and the access device, respectively can be controlled between the first communication interface of the communication device and the third communication interface of the data management system.
  • the communication device advantageously comprises a display device.
  • the first communication channel is a cellular connection.
  • the cellular connection is preferably a GSM connection or a UMTS connection or a GPRS connection or an LTE connection.
  • GSM connection preferably a GSM connection or a UMTS connection or a GPRS connection or an LTE connection.
  • other connections such as radio connections, for example in the ISM band or WLAN, can also be considered.
  • the wireless connection of the second communication channel, or the wireless technology is an NFC (near field communication) connection / technology or an RFID (radio-frequency identification) connection / technology.
  • NFC near field communication
  • RFID radio-frequency identification
  • the second communication interface of the communication device and the fourth communication interface of the file management system are accordingly equipped with the corresponding wireless technology.
  • NFC technology and RFID technology use high-frequency alternating magnetic fields for data transmission.
  • RFID technology is usually a so-called “connectionless” transmission.
  • a passive transponder is used here, which is supplied with energy by the alternating field of a reader.
  • NFC technology also provides what is known as "connection-based” transmission. In connection-based transmission or also peer-to-peer transmission, a transmission is established between two equivalent transmitters.
  • NFC technology also provides "connectionless" transmission analogous to RFID technology. Such a transmission is often referred to as a passive transmission. Here only the initiator generates the high-frequency magnetic field. The receiver can transmit data by means of load modulation. Energy is absorbed from the magnetic field by a specially tuned oscillating circuit of the receiver, whereupon the initiator reacts.
  • both the initiator and the receiver generate a high-frequency magnetic field.
  • a so-called “handshake” is carried out in which authentication takes place and in which various settings, such as the optimal transmission speed, are selected.
  • the data exchange is then carried out. Due to the authentication, this active transmission is considered to be much more secure compared to the passive transmission.
  • the access device is activated before the data exchange is initiated. This can be done, for example, using a button or a similar element. Alternatively, it can be activated by a "Low Power Card Detection” (LPCD), which automatically detects the presence of an NFC-enabled communication device in the immediate vicinity.
  • LPCD Low Power Card Detection
  • the second communication interface of the communication device must be activated, i.e. the NFC function is activated.
  • the software / app preferably remains active in the background so that the NFC function remains activated. The user can thus obtain access to the access device by means of the communication device at any time after successful registration.
  • the access device has a second control device which, if the user is authorized, controls an unlocking device accordingly.
  • a garbage container In the preferred embodiment as a garbage container, a garbage lock is thus unlocked. The user can thus throw his rubbish into the container.
  • the communication device does not have to be connected to the data management system by means of a first communication channel in order to unlock the access device.
  • user identification data, device identification data of the communication device and a registration code which is made available by an operator, transmitted to the data management system through the communication device.
  • the authentication data preferably include key data, validity information and a region code.
  • the control device of the access device can use this data to check whether access is granted. If the current time is available on the control device of the access device, this data can also be used to check the temporal validity independently of the control device of the communication device.
  • the operator is a waste disposal company, a municipality or the like.
  • the file management system first imports the user data from the operator.
  • This user data includes the name and address of the user, user identification data such as the contract number, a region code and two registration codes.
  • the registration codes are transmitted to the user, for example by means of a letter, email or the like.
  • the spatial area of validity is preferably determined by means of the region code.
  • a predetermined number of authentication data can preferably be made available to a user.
  • the user can accordingly equip several communication devices with corresponding authentication data, so that they can access the access device by means of several communication devices.
  • the user identification data and the registration code can be read in using a QR scanner of the communication device. This enables particularly fast registration.
  • the communication device preferably has no connection to the file management system via the first communication channel. This ensures that the access device can be opened even if there is poor or no network coverage on the access device.
  • a regular connection to the data management system is preferably required in order to regularly extend the time-limited authentication of the communication device.
  • the communication device comprises a control device which controls the transmission of the authentication data on the basis of the validity data. Accordingly, no authentication data are sent to an access device if the user is in a non-permitted area of validity.
  • the communication device automatically carries out a request for the authorization of the user in the data management system at a predetermined time interval.
  • the communication device preferably communicates with the data management system via a first communication channel. For security reasons, it makes sense for the communication device to make contact with the data management system at regular intervals in order to update the user's authorization.
  • the authentication data are deleted in the event of a lack of authorization. This is done by the control device of the communication device or the software. The authentication data are accordingly no longer transmitted to the access device.
  • the user preferably receives a notification that the access authorization has been withdrawn.
  • the predetermined time interval can be the predetermined period of validity (contract term) or a smaller time interval. This time interval can be predetermined globally or can be specified for specific groups of authentication data, for example for specific regions.
  • the request for authorization of the user is preferably attempted after approximately 50% of the predetermined time interval or the period of validity. If a connection to the data management system cannot be established, further attempts will be made.
  • the user Shortly before the remaining time, the user is presented with a corresponding notification that a connection to the data management system is required.
  • the user can deregister using the
  • the control unit of the communication device preferably deletes the authentication data on the communication device.
  • the data management system preferably continues to assign the deregistered authentication data to the user, so a history of the user remains visible.
  • the user can block the authentication data assigned to a communication device.
  • the access device preferably uses the second communication channel to send commands for overwriting the authentication data on the communication device. This function is required when the communication device is no longer authorized to gain access to the access device. This can be the case, for example, if the communication device is lost or sold, or if the owner moves to another area.
  • the communication device can be identified on the basis of the device identification data. The associated authentication data are thus set to lost in the data management system.
  • the period of validity is preferably no longer extended and the user is given appropriate feedback that this communication device may no longer be used.
  • the communication by means of the second communication channel is an HCE (host based card emulation) communication.
  • HCE communication has been offered by Android since version 4.4.
  • the HCE communication is based on ISO 14443-A and ISO 7816. That is, a so-called command is always sent by the NFC hardware of the access device, to which the communication device responds with a so-called "response".
  • Contact is preferably established between the access device and the communication device using an ISO 7816 Select Aid command. Any data can then be exchanged in the command-response pairs.
  • the communication device replies with the (latest) version of the HCE protocol supported on the communication device and the (virtual) UID of the communication device.
  • the Select Aid command is processed by the Android system and the app that has registered for the given Aid in the system is started. If several apps have registered for the same aid, the user is asked which app should be addressed.
  • the access device preferably asks the communication device actively by means of a command whether a “response” response is available on the communication device. This means that the communication device cannot initiate a data transfer during HCE communication.
  • the response from the communication device is preferably immediate.
  • the data exchange between the communication device and the access device preferably consists of the transmission of application commands, which consist of a command and data to be transmitted.
  • a transport protocol is used to transmit application commands, whereby the application commands are broken down into one or more segment (s) and transmitted as a function of the data size of the application command.
  • the object is achieved by an access system for carrying out a method according to one of the preceding embodiments.
  • the access system can have one or more features already mentioned for the method. Accordingly, all features of the method should also be considered disclosed with regard to the access system.
  • the communication device (5) comprises a control device (10) which controls the transmission of the authentication data on the basis of the validity data.
  • the term app can also be understood to mean the control device (10) of the communication device (5), since the app is installed on this control device (10) and the control device carries out the corresponding actions.
  • the app (10) should open automatically and disappear again after a specified time.
  • the apps need to be distributed.
  • the app is stored in a web shop (15) (e.g. Google Play Store).
  • the user (4) Based on the information letter (14), the user (4) knows in which app store (15) the virtual key app for the access device can be purchased and how the smartphone (5) can be registered.
  • NFC To open a garbage lock (2) via smartphone (5), NFC only needs to be activated. The app runs in the background and therefore does not have to be restarted specifically for disposal. It is enough to switch on the smartphone (5).
  • the smartphone (5) can be held in the detection area of the antenna immediately (i.e. without further action at the garbage lock (2) or by pressing a button). As soon as the smartphone (5) has been recognized by the garbage lock (2), a message appears on the smartphone screen. The lock opens if the region code and key status match.
  • the smartphone (5) When using a smartphone (5) at a lock (2), the smartphone (5) does not necessarily have to have a GSM connection. This ensures that it can be opened even if there is poor or no network coverage at the location of the garbage lock (2).
  • a regular connection to the data management system (6) is required in order to regularly extend the time-limited authentication of the app (10).
  • the required regeneration of the authentication data takes place automatically in the background using the Virtual Key App (10). This means that the virtual key apps (10) can be deactivated again via the portal if users (4) change or lose their smartphone (5) or are no longer authorized for other reasons.
  • a virtual key app (10) can also be deactivated using the existing blacklist function of a garbage lock (2). To do this, the status must be set to "lost" in the data management system (6) for the key ID of the smartphone concerned (5). After the blacklist has been transferred to the garbage locks concerned (2), the opening function of the app (10) is deactivated if a lost key is detected.
  • the invention provides that the app (10) makes contact with the portal at time intervals (validity period) and obtains the authorization to open locks (2) again.
  • the smartphone (5) no longer receives this authorization - thus opening the lock (2) with this smartphone (5) is also included this unique identification number is no longer possible.
  • the app (10) deletes the authentication data so that it can no longer be transferred to a garbage lock (2).
  • the user (4) receives a message that the authorization to open garbage locks (2) has been withdrawn.
  • Figures 2a to 2i an exemplary sequence of a display on the smartphone when the app (10) is started for the first time is shown. If the app is not yet (or no longer) registered, the user will be asked to register: Figure 2a : Has the device not yet been registered. The screen for unlocking the device then appears. The contract number and registration code are entered. The data management system (6) checks whether the data are valid. A QR code scanner is provided so that the user does not have to enter the required information by hand ( Figure 2b ).
  • NFC NFC
  • the user is informed and given the opportunity to switch to the settings ( Figure 2c ).
  • the screen after Figure 2d shown: If the period of validity of the authentication data has expired, a corresponding message is displayed. If the authentication data has been deleted, the user is informed of this fact and then asked to re-register.
  • a help wizard will appear in accordance with the Figures 2e to 2g appears, which briefly shows the use of the app.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mechanical Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

Die Erfindung betrifft ein Verfahren zum Bedienen eines Zugangssystems für eine Zugangsvorrichtung, insbesondere für einen Müllcontainer.The invention relates to a method for operating an access system for an access device, in particular for a garbage container.

Zur Entsorgung von Hausmüll werden oft großräumige Müllcontainer bereitgestellt, welche von mehreren Haushalten benutzt werden. Derartige Müllcontainer können beispielsweise einer Hausgemeinschaft oder auch einer Kommune zugehörig sein. Derartige Müllcontainer umfassen in der Regel eine Zugangsvorrichtung, so dass berechtigte Nutzer einen Zugang zu solchen Müllcontainern erhalten. Die Berechtigung kann auch wieder gesperrt werden, beispielsweise bei Nichtzahlung der Entsorgungskosten. Ein solcher Zugang kann mittels verschiedenster elektronischer Systeme realisiert werden. Aus dem Stand der Technik ist beispielsweise bekannt, dass einem Benutzer ein Identifikationscode zugewiesen wird. Dieser Identifikationscode wird beispielsweise über einen an dem Müllcontainer angeordneten Ziffernblock eingegeben. Derartige Systeme sind jedoch für den Nutzer unpraktisch, da dieser die Zugangsdaten immer zur Hand haben muss. Ferner zieht ein Verlust der Zugangsdaten einen aufwändigen Verwaltungsprozess nach sich.For the disposal of household waste, large-scale garbage containers are often provided, which are used by several households. Such garbage containers can, for example, belong to a house community or also to a municipality. Such garbage containers usually include an access device so that authorized users have access to such garbage containers. The authorization can also be blocked again, for example if the disposal costs are not paid. This type of access can be implemented using a wide variety of electronic systems. It is known from the prior art, for example, that an identification code is assigned to a user. This identification code is entered, for example, via a number pad arranged on the garbage container. However, such systems are impractical for the user, since he must always have the access data at hand. Furthermore, a loss of the access data entails a complex administrative process.

Die bisherige Verwendung von PIN-Eingabefeldern oder RFID-Tags und -Karten hat zudem den Nachteil, dass zusätzliche Hardware und / oder zusätzliches Wissen beim Benutzer benötigt werden. Es ist ein zusätzlicher Kosten- und Verwaltungsaufwand notwendig, da der Nutzer die Hardware ausgehändigt bzw. zugesandt bekommen muss. Ferner gestaltet sich ein Schutz vor Missbrauch je nach konkretem Verfahren als schwierig. Eine zeitliche Begrenzung des Zugriffs ist nur schwer bis gar nicht umsetzbar; bei einem schlüsselbasierten Zugang müssten z.B. alle Schlösser getauscht und alle Schlüssel neu verteilt werden.The previous use of PIN input fields or RFID tags and cards also has the disadvantage that additional hardware and / or additional knowledge is required on the part of the user. Additional costs and administrative expenses are necessary because the user has to be handed or sent the hardware. Furthermore, protection against abuse turns out to be difficult, depending on the specific procedure. A time limit for access is difficult or even impossible to implement; With key-based access, for example, all locks would have to be exchanged and all keys redistributed.

Die US 2015/307273 A1 offenbart ein Verfahren gemäß dem Oberbegriff des Anspruchs 1.the US 2015/307273 A1 discloses a method according to the preamble of claim 1.

Aufgabe der vorliegenden Erfindung ist es ein verbessertes Verfahren zum Bedienen eines Zugangssystems für eine Zugangsvorrichtung bereitzustellen.The object of the present invention is to provide an improved method for operating an access system for an access device.

Diese Aufgabe wird gelöst durch ein Verfahren gemäß Anspruch 1.This object is achieved by a method according to claim 1.

Der Zugang zu einem durch eine Zugangsvorrichtung zugangsbeschränkten Müllcontainer wird dem Benutzer somit möglichst komfortabel gewährt, da dieser lediglich ein Kommunikationsgerät zur Hand haben muss. Die Lösung kommt ohne zusätzliche Hardware und ohne zusätzliches Wissen beim Kunden aus. Zum Zeitpunkt des Zugangs wird nicht zwingend eine aktive Verbindung zum Zentralsystem (zur Datenübertragung und Authentifizierung) benötigt. Es wird ein Schutz vor Missbrauch gewährleistet, da die Kopierbarkeit von handelsüblichen Karten (und somit Missbrauch) eliminiert wird. Ferner ist der Zugriff regional sowie zeitlich beschränkbar. Die Lösung ist gut skalierbar und leicht für wechselnde Nutzer konfigurierbar.Access to a garbage container with restricted access by an access device is thus granted to the user as comfortably as possible, since he only needs to have a communication device at hand. The solution works without additional hardware and without additional knowledge on the part of the customer. At the time of access, an active connection to the central system (for data transmission and authentication) is not absolutely necessary. Protection against misuse is guaranteed, as the copying of commercially available cards (and thus misuse) is eliminated. Furthermore, access can be restricted regionally and time-wise. The solution is easily scalable and easily configurable for changing users.

Vorzugsweise berechtigen die Authentifikationsdaten den Zugang zu mehreren Zugangsvorrichtungen, insbesondere Müllcontainern.The authentication data preferably authorize access to several access devices, in particular garbage containers.

Unter einem vorbestimmten Gültigkeitsbereich ist vorzugsweise ein zeitlicher Gültigkeitsbereich zu verstehen. Beispielsweise ist hierunter die Vertragslaufzeit eines Nutzers mit einem entsprechenden Entsorgungsunternehmen zu verstehen.A predetermined area of validity is preferably to be understood as a period of validity. For example, this is to be understood as the term of the contract between a user and a corresponding disposal company.

Unter einem vorbestimmten Gültigkeitsbereich kann kumulativ oder alternativ auch ein räumlicher Gültigkeitsbereich verstanden werden. Demnach könnte der Zugang eines Nutzers auf mehrere Zugangsvorrichtungen, vorzugsweise Müllcontainer, in einem bestimmten räumlichen Gebiet, wie beispielsweise eine Hausgemeinschaft, einer Kommune oder Ähnlichem, beschränkt werden.A predetermined area of validity can cumulatively or alternatively also be understood to be a spatial area of validity. Accordingly, the access of a user could be restricted to several access devices, preferably garbage containers, in a certain spatial area, such as a house community, a commune or the like.

Unter einem Kommunikationskanal soll ein Übertragungsweg verstanden werden. Ein solcher Übertragungsweg verbindet einen Sender und einen Empfänger. Dieser Sender beziehungsweise Empfänger ist vorteilhafterweise Teil einer Kommunikationsschnittstelle. Das Kommunikationsgerät weist demnach eine erste Kommunikationsschnittstelle auf. Die erste Kommunikationsschnittstelle ist über einen ersten Kommunikationskanal mit einer dritten Kommunikationsschnittstelle des Datenmanagementsystems verbunden, wobei unter der Verbindung die Möglichkeit eines Datenaustauschs zu verstehen ist. Das Kommunikationsgerät weist ferner eine zweite Kommunikationsschnittstelle auf, welche mit der vierten Kommunikationsschnittstelle der Zugangsvorrichtung mittels des zweiten Kommunikationskanals verbunden ist, wodurch zumindest die Authentifikationsdaten an die Zugangsvorrichtung mittels einer Drahtlostechnologie übertragen werden.A communication channel should be understood as a transmission path. Such a transmission path connects a transmitter and a receiver. This transmitter or receiver is advantageously part of a communication interface. The communication device accordingly has a first communication interface. The first communication interface is connected to a third communication interface of the data management system via a first communication channel, the connection being understood to mean the possibility of data exchange. The communication device also has a second communication interface which is connected to the fourth communication interface of the access device by means of the second communication channel, whereby at least the authentication data is transmitted to the access device by means of wireless technology.

Unter einem Zugang zu der Zugangsvorrichtung kann beispielsweise ein Entsperren einer Müllschleuse oder das Entriegeln eines Schlosses, welche den Müllcontainer verschließt, verstanden werden.Access to the access device can be understood to mean, for example, unlocking a garbage lock or unlocking a lock that closes the garbage container.

Nach einer besonders bevorzugten Ausführungsform ist das Kommunikationsgerät ein portables Datenverarbeitungsgerät, beispielsweise ein Mobiltelefon, ein Smartphone, ein Tablet oder ein Laptop. Selbstverständlich ist die vorliegende Erfindung nicht beschränkt auf diese Aufzählung und es können auch weitere ähnliche Datenverarbeitungsgeräte für die Anwendung in Betracht gezogen werden. Die Verwendung von Mobiltelefonen beziehungsweise von Smartphones ist derart weit verbreitet, so dass die überwiegende Mehrheit der Mitglieder einer entsprechenden Hausgemeinschaft oder Kommune ein solches Smartphone besitzt. Der Nutzer benötigt demnach zur Registrierung oder zur Authentifikation keine weiteren Vorrichtungen, oder muss sich entsprechende Zugangsdaten merken.According to a particularly preferred embodiment, the communication device is a portable data processing device, for example a mobile phone, a smartphone, a tablet or a laptop. Of course, the present invention is not restricted to this list and other similar data processing devices can also be considered for the application. The use of mobile telephones or smartphones is so widespread that the vast majority of the members of a corresponding house community or municipality own such a smartphone. The user therefore does not need any further devices for registration or authentication, or he has to memorize the corresponding access data.

Vorzugsweise weist das Kommunikationsgerät eine Steuereinrichtung auf, auf welcher eine Software, auch App genannt, installiert ist, mittels welcher die Registrierung des Nutzers bei dem Datenmanagementsystem ermöglicht ist und/oder mittels welcher der Datenaustausch über einen zweiten Kommunikationskanal zwischen dem Kommunikationsgerät und der Zugangsvorrichtung, beziehungsweise zwischen der ersten Kommunikationsschnittstelle des Kommunikationsgeräts und der dritten Kommunikationsschnittstelle des Datenmanagementsystems steuerbar ist. Vorteilhafterweise umfasst das Kommunikationsgerät eine Anzeigeeinrichtung.The communication device preferably has a control device on which software, also known as an app, is installed, by means of which the registration of the user with the data management system is enabled and / or by means of which the data exchange via a second communication channel between the communication device and the access device, respectively can be controlled between the first communication interface of the communication device and the third communication interface of the data management system. The communication device advantageously comprises a display device.

Nach einer weiteren bevorzugten Ausführungsform ist der erste Kommunikationskanal eine Mobilfunkverbindung. Bevorzugt ist die Mobilfunkverbindung eine GSM-Verbindung oder eine UMTS-Verbindung oder eine GPRS-Verbindung oder eine LTE-Verbindung. Selbstverständlich kommen auch noch weitere Verbindungen wie Funkverbindungen, beispielsweise im ISM-Band oder WLAN, in Betracht.According to a further preferred embodiment, the first communication channel is a cellular connection. The cellular connection is preferably a GSM connection or a UMTS connection or a GPRS connection or an LTE connection. Of course, other connections such as radio connections, for example in the ISM band or WLAN, can also be considered.

Nach einer besonders bevorzugten Ausführungsform ist die drahtlose Verbindung des zweiten Kommunikationskanals, beziehungsweise die Drahtlostechnologie, eine NFC-(Nahfeldkommunikations-) Verbindung/Technologie oder eine RFID- ( radio-frequency identification) Verbindung/Technologie. Es wäre jedoch auch denkbar, weitere Drahtlostechnologien wie Bluetooth oder Wireless-LAN zu nutzen. Die zweite Kommunikationsschnittstelle des Kommunikationsgeräts und die vierte Kommunikationsschnittstelle des Dateimanagementsystems sind demnach mit der entsprechenden Drahtlostechnologie ausgestattet.According to a particularly preferred embodiment, the wireless connection of the second communication channel, or the wireless technology, is an NFC (near field communication) connection / technology or an RFID (radio-frequency identification) connection / technology. However, it would also be conceivable to use other wireless technologies such as Bluetooth or wireless LAN. The second communication interface of the communication device and the fourth communication interface of the file management system are accordingly equipped with the corresponding wireless technology.

Die NFC-Technologie als auch die RFID-Technologie verwenden hochfrequente magnetische Wechselfeldern zur Datenübertragung. Die RFID-Technologie ist in der Regel eine sogenannte "verbindungslose" Übertragung. Hierbei wird ein passiver Transponder verwendet, welcher durch das Wechselfeld eines Lesegeräts mit Energie versorgt wird. Die NFC-Technologie stellt darüber hinaus auch eine sogenannte "verbindungsbehaftete" Übertragung zur Verfügung. Bei der verbindungsbehafteten Übertragung oder auch Peer-to-Peer-Übertragung wird eine Übertragung zwischen zwei gleichwertigen Transmittern etabliert.NFC technology and RFID technology use high-frequency alternating magnetic fields for data transmission. RFID technology is usually a so-called "connectionless" transmission. A passive transponder is used here, which is supplied with energy by the alternating field of a reader. NFC technology also provides what is known as "connection-based" transmission. In connection-based transmission or also peer-to-peer transmission, a transmission is established between two equivalent transmitters.

Zwischenzeitlich ist eine Vielzahl kommerziell erhältlicher Smartphones mit einer NFC-Einrichtung ausgestattet. An einer Datenübertragung können lediglich zwei Teilnehmer beteiligt sein, ein sogenannter Initiator, welcher als Sender von Information fungiert und ein Empfänger, welcher diese Information empfängt.In the meantime, a large number of commercially available smartphones have been equipped with an NFC facility. Only two participants can be involved in a data transmission, a so-called initiator who acts as a sender of information and a receiver who receives this information.

Die NFC-Technologie stellt auch eine "verbindungslose" Übertragung analog zur RFID-Technik bereit. Eine solche Übertragung wird oft auch als passive Übertragung bezeichnet. Hier erzeugt lediglich der Initiator das hochfrequente Magnetfeld. Der Empfänger kann Daten mittels einer Lastmodulation übertragen. Dabei findet eine Energieaufnahme aus dem Magnetfeld durch einen speziell abgestimmten Schwingkreis des Empfängers statt, woraufhin der Initiator reagiert.NFC technology also provides "connectionless" transmission analogous to RFID technology. Such a transmission is often referred to as a passive transmission. Here only the initiator generates the high-frequency magnetic field. The receiver can transmit data by means of load modulation. Energy is absorbed from the magnetic field by a specially tuned oscillating circuit of the receiver, whereupon the initiator reacts.

Bei der "verbindungsbehafteten" oder auch aktiven Übertragung erzeugt sowohl der Initiator als auch der Empfänger ein hochfrequentes Magnetfeld. Es wird zunächst ein sogenanntes "Handshake" durchgeführt, in dem eine Authentifizierung stattfindet und in dem verschieden Einstellungen, wie beispielsweise die optimale Übertragungsgeschwindigkeit, ausgewählt werden. Anschließend wird der Datenaustausch durchgeführt. Aufgrund der Authentifizierung gilt diese aktive Übertragung als wesentlich sicherer im Vergleich zu der passiven Übertragung.In the case of "connected" or active transmission, both the initiator and the receiver generate a high-frequency magnetic field. First, a so-called "handshake" is carried out in which authentication takes place and in which various settings, such as the optimal transmission speed, are selected. The data exchange is then carried out. Due to the authentication, this active transmission is considered to be much more secure compared to the passive transmission.

Nach einer bevorzugten Ausführungsform wird die Zugangsvorrichtung vor dem Initiieren des Datenaustauschs aktiviert. Dies kann beispielsweise über einen Taster oder ein ähnliches Element erfolgen. Alternativ kann die Aktivierung durch eine "Low Power Card Detection" (LPCD), durch welche die Präsenz eines NFC-fähigen Kommunikationsgeräts in unmittelbarer Nähe automatisch erkannt wird.According to a preferred embodiment, the access device is activated before the data exchange is initiated. This can be done, for example, using a button or a similar element. Alternatively, it can be activated by a "Low Power Card Detection" (LPCD), which automatically detects the presence of an NFC-enabled communication device in the immediate vicinity.

Nach einer weiteren bevorzugten Ausführungsform muss die zweite Kommunikationsschnittstelle des Kommunikationsgeräts aktiviert werden, d.h. die NFC-Funktion wird aktiviert.According to a further preferred embodiment, the second communication interface of the communication device must be activated, i.e. the NFC function is activated.

Vorzugsweise bleibt die Software/App im Hintergrund aktiv, so dass die NFC-Funktion aktiviert bleibt. Der Nutzer kann somit nach einer erfolgreichen Registrierung jederzeit einen Zugang zu der Zugangsvorrichtung mittels des Kommunikationsgeräts erhalten.The software / app preferably remains active in the background so that the NFC function remains activated. The user can thus obtain access to the access device by means of the communication device at any time after successful registration.

Nach einer bevorzugten Ausführungsform weist die Zugangsvorrichtung eine zweite Steuereinrichtung auf, welche bei Berechtigung des Nutzers eine Entsperreinrichtung entsprechend ansteuert. Bei der bevorzugten Ausgestaltung als Müllcontainer wird somit eine Müllschleuse entriegelt. Der Nutzer kann somit seinen Müll in den Container einwerfen. Zum Zeitpunkt des Datenaustauschs über den zweiten Kommunikationskanal muss keine Verbindung des Kommunikationsgeräts mit dem Datenmanagementsystem mittels eines ersten Kommunikationskanals bestehen, um die Zugangsvorrichtung zu entsperren.According to a preferred embodiment, the access device has a second control device which, if the user is authorized, controls an unlocking device accordingly. In the preferred embodiment as a garbage container, a garbage lock is thus unlocked. The user can thus throw his rubbish into the container. At the time of data exchange via the second communication channel, the communication device does not have to be connected to the data management system by means of a first communication channel in order to unlock the access device.

Nach einer weiteren bevorzugten Ausführungsform werden in Schritt a) Nutzeridentifikationsdaten, Geräteidentifikationsdaten des Kommunikationsgeräts und ein Registrierungscode, welcher von einem Betreiber zur Verfügung gestellt wird, an das Datenmanagementsystem durch das Kommunikationsgerät übermittelt.According to a further preferred embodiment, user identification data, device identification data of the communication device and a registration code, which is made available by an operator, transmitted to the data management system through the communication device.

Vorzugsweise umfassen die Authentifikationsdaten Schlüsseldaten, Gültigkeitsinformationen sowie einen Regionscode. Die Steuereinrichtung der Zugangsvorrichtung kann anhand dieser Daten prüfen, ob ein Zugang gewährt wird. Ist auf der Steuereinrichtung der Zugangsvorrichtung die aktuelle Zeit vorhanden, kann mit diesen Daten auch die zeitliche Gültigkeit unabhängig von der Steuereinrichtung des Kommunikationsgeräts geprüft werden.The authentication data preferably include key data, validity information and a region code. The control device of the access device can use this data to check whether access is granted. If the current time is available on the control device of the access device, this data can also be used to check the temporal validity independently of the control device of the communication device.

Der Betreiber ist hierbei ein Entsorgungsunternehmen, eine Kommune oder Ähnliches. Das Dateimanagementsystem importiert zunächst die Nutzerdaten von dem Betreiber. Diese Nutzerdaten umfassen den Namen und die Adresse des Nutzers, Nutzeridentifikationsdaten, wie beispielsweise die Vertragsnummer, einen Regionscode und zwei Registrierungscodes. Die Registrierungscodes werden dem Nutzer beispielsweise mittels eines Briefes, Email oder Ähnlichem übermittelt.The operator is a waste disposal company, a municipality or the like. The file management system first imports the user data from the operator. This user data includes the name and address of the user, user identification data such as the contract number, a region code and two registration codes. The registration codes are transmitted to the user, for example by means of a letter, email or the like.

Mittels des Regionscodes wird vorzugsweise der räumliche Gültigkeitsbereich festgelegt.The spatial area of validity is preferably determined by means of the region code.

Vorzugsweise kann einem Nutzer eine vorbestimmte Anzahl an Authentifikationsdaten zur Verfügung gestellt werden. Der Nutzer kann demnach mehrere Kommunikationsgeräte mit entsprechenden Authentifikationsdaten ausstatten, so dass dieser mittels mehrerer Kommunikationsgeräte einen Zugang bei der Zugangsvorrichtung erhält.A predetermined number of authentication data can preferably be made available to a user. The user can accordingly equip several communication devices with corresponding authentication data, so that they can access the access device by means of several communication devices.

Nach einer bevorzugten Ausführungsform können die Nutzeridentifikationsdaten und der Registrierungscode mittels eines QR-Scanners des Kommunikationsgeräts eingelesen werden. Somit wird eine besonders schnelle Registrierung ermöglicht.According to a preferred embodiment, the user identification data and the registration code can be read in using a QR scanner of the communication device. This enables particularly fast registration.

Vorzugsweise hat während der Benutzung des Kommunikationsgeräts (5) an der Zugangsvorrichtung das Kommunikationsgerät keine Verbindung zum Dateimanagementsystem über den ersten Kommunikationskanal. Somit wird auch bei schlechter oder fehlender Netzabdeckung am der Zugangsvorrichtung das Öffnen sichergestellt. Vorzugsweise ist eine regelmäßige Verbindung mit dem Datenmanagementsystem erforderlich, um die zeitlich begrenzte Authentifizierung des Kommunikationsgeräts regelmäßig zu verlängern.During the use of the communication device (5) on the access device, the communication device preferably has no connection to the file management system via the first communication channel. This ensures that the access device can be opened even if there is poor or no network coverage on the access device. A regular connection to the data management system is preferably required in order to regularly extend the time-limited authentication of the communication device.

Nach einer bevorzugten Ausführungsform umfasst das Kommunikationsgerät eine Steuereinrichtung, welche ein Übermitteln der Authentifikationsdaten anhand der Gültigkeitsdaten steuert. Demnach werden keine Authentifikationsdaten an eine Zugangsvorrichtung gesendet, sollte sich der Nutzer in einem nicht zulässigen Gültigkeitsbereich befinden.According to a preferred embodiment, the communication device comprises a control device which controls the transmission of the authentication data on the basis of the validity data. Accordingly, no authentication data are sent to an access device if the user is in a non-permitted area of validity.

Erfindungsgemäß führt das Kommunikationsgerät in einem vorbestimmten Zeitintervall automatisch eine Anfrage zu der Berechtigung des Nutzers bei dem Datenmanagementsystem durch. Vorzugsweise kommuniziert das Kommunikationsgerät über einen ersten Kommunikationskanal mit dem Datenmanagementsystem. Aus Sicherheitsgründen ist es sinnvoll, dass das Kommunikationsgerät in zeitlichen Abständen Kontakt mit dem Datenmanagementsystem aufnimmt, um die Berechtigung des Nutzers zu aktualisieren. Erfindungsgemäß werden bei einem Fehlen der Berechtigung die Authentifikationsdaten gelöscht. Dies erfolgt durch die Steuereinrichtung des Kommunikationsgeräts beziehungsweise der Software. Die Authentifikationsdaten werden demnach nicht mehr an die Zugangsvorrichtung übertragen. Bevorzugt erhält der Nutzer einen Hinweis, dass die Berechtigung zum Zugang entzogen wurde.According to the invention, the communication device automatically carries out a request for the authorization of the user in the data management system at a predetermined time interval. The communication device preferably communicates with the data management system via a first communication channel. For security reasons, it makes sense for the communication device to make contact with the data management system at regular intervals in order to update the user's authorization. According to the invention, the authentication data are deleted in the event of a lack of authorization. This is done by the control device of the communication device or the software. The authentication data are accordingly no longer transmitted to the access device. The user preferably receives a notification that the access authorization has been withdrawn.

Das vorbestimmte Zeitintervall kann die vorbestimmte Gültigkeitsdauer (Vertragslaufzeit) oder ein kleineres Zeitintervall sein. Dieses Zeitintervall kann global vorbestimmt sein oder für bestimmte Gruppen von Authentifikationsdaten festgelegt werden, beispielsweise für bestimmte Regionen.The predetermined time interval can be the predetermined period of validity (contract term) or a smaller time interval. This time interval can be predetermined globally or can be specified for specific groups of authentication data, for example for specific regions.

Vorzugsweise wird nach ca. 50% des vorbestimmten Zeitintervalls oder der Gültigkeitsdauer die Anfrage zur der Berechtigung des Nutzers versucht durchzuführen. Sollte keine Verbindung zum Datenmanagementsystem etablierbar sein, werden weitere Versuche unternommen.The request for authorization of the user is preferably attempted after approximately 50% of the predetermined time interval or the period of validity. If a connection to the data management system cannot be established, further attempts will be made.

Kurz vor der Restzeit wird dem Benutzer ein entsprechender Hinweis präsentiert, dass eine Verbindung zum Datenmanagementsystem benötigt wird.Shortly before the remaining time, the user is presented with a corresponding notification that a connection to the data management system is required.

Vorzugsweise wird auch nach Ablauf des Zeitintervalls beziehungsweise der Gültigkeitsdauer versucht weiterhin periodisch das Datenmanagementsystem zu kontaktieren und die Authentifizierungsdaten zu erneuern. Zudem wird dem Nutzer ein entsprechender Hinweis präsentiert. Nach einer bevorzugten Ausführungsform kann der Nutzer eine Deregistrierung mittels desPreferably, even after the time interval or the period of validity has expired, attempts are made to periodically contact the data management system and renew the authentication data. A corresponding note is also presented to the user. According to a preferred embodiment, the user can deregister using the

Kommunikationsgeräts durchführen . Vorzugsweise löscht dabei die Steuereinheit des Kommunikationsgeräts die Authentifikationsdaten auf dem Kommunikationsgerät. Bevorzugt ordnet das Datenmanagementsystem die deregistrierten Authentifikationsdaten dem Nutzer weiterhin zu, so bleibt eine Historie des Nutzers weiterhin ersichtlich.Communication device. The control unit of the communication device preferably deletes the authentication data on the communication device. The data management system preferably continues to assign the deregistered authentication data to the user, so a history of the user remains visible.

Nach einer bevorzugten Ausführungsform kann der Nutzer die einem Kommunikationsgerät zugeordneten Authentifikationsdaten sperren. Vorzugsweise sendet bei erstmaliger Nutzung des Kommunikationsgeräts nach der Sperrung die Zugangsvorrichtung mittels des zweiten Kommunikationskanals Befehle zum Überschreiben der Authentifikationsdaten auf dem Kommunikationsgerät. Diese Funktion ist erforderlich, wenn das Kommunikationsgerät nicht mehr berechtigt ist einen Zugang zu der Zugangsvorrichtung zu erhalten. Dies kann beispielsweise bei einem Verlust oder Verkauf des Kommunikationsgeräts der Fall sein oder bei Umzug des Besitzers in ein anderes Gebiet. Das Kommunikationsgerät ist aufgrund der Geräteidentifikationsdaten identifizierbar. In dem Datenmanagementsystem werden somit die gehörigen Authentifikationsdaten auf verloren gesetzt.According to a preferred embodiment, the user can block the authentication data assigned to a communication device. When the communication device is used for the first time after it has been blocked, the access device preferably uses the second communication channel to send commands for overwriting the authentication data on the communication device. This function is required when the communication device is no longer authorized to gain access to the access device. This can be the case, for example, if the communication device is lost or sold, or if the owner moves to another area. The communication device can be identified on the basis of the device identification data. The associated authentication data are thus set to lost in the data management system.

Sollte das Kommunikationsgerät das Datenmanagementsystem kontaktieren, wird vorzugsweise die Gültigkeitsdauer nicht mehr verlängert und dem Nutzer eine entsprechende Rückmeldung gegeben, dass dieses Kommunikationsgerät nicht mehr genutzt werden darf.Should the communication device contact the data management system, the period of validity is preferably no longer extended and the user is given appropriate feedback that this communication device may no longer be used.

Nach einer bevorzugten Ausführungsform ist die Kommunikation mittels des zweiten Kommunikationskanals eine HCE (Host based Card Emulation) - Kommunikation. Die HCE - Kommunikation wird von Android seit Version 4.4 angeboten. Die HCE-Kommunikation basiert auf ISO 14443-A und ISO 7816. D.h. von der NFC-Hardware der Zugangsvorrichtung wird immer ein sog. Command versendet, auf den das Kommunikationsgerät mit einer sog. "Response" antwortet. Vorzugsweise erfolgt die Kontaktaufnahme zwischen der Zugangsvorrichtung und dem Kommunikationsgerät durch ein ISO 7816 Select Aid-Kommando. Danach können beliebige Daten in den Command-Response-Paaren ausgetauscht werden.According to a preferred embodiment, the communication by means of the second communication channel is an HCE (host based card emulation) communication. HCE communication has been offered by Android since version 4.4. The HCE communication is based on ISO 14443-A and ISO 7816. That is, a so-called command is always sent by the NFC hardware of the access device, to which the communication device responds with a so-called "response". Contact is preferably established between the access device and the communication device using an ISO 7816 Select Aid command. Any data can then be exchanged in the command-response pairs.

Nach dem Select AID Kommando, antwortet das Kommunikationsgerät mit der (neusten) Version des auf dem Kommunikationsgerät unterstützten HCE-Protokolls sowie der (virtuellen) UID des Kommunikationsgeräts. Das Select Aid-Kommando wird vom Android-System verarbeitet und diejenige App gestartet, die sich für die gegebene Aid im System registriert hat. Sollten sich mehrere Apps für die gleiche Aid registriert haben, wird der Benutzer gefragt, welche App angesprochen werden soll.After the Select AID command, the communication device replies with the (latest) version of the HCE protocol supported on the communication device and the (virtual) UID of the communication device. The Select Aid command is processed by the Android system and the app that has registered for the given Aid in the system is started. If several apps have registered for the same aid, the user is asked which app should be addressed.

Vorzugsweise fragt die Zugangsvorrichtung aktiv bei dem Kommunikationsgerät mittels eines Command -Befehls an, ob eine Antwort "Response" auf dem Kommunikationsgerät vorhanden ist. Somit kann das Kommunikationsgerät bei der HCE-Kommunikation keinen Datentransfer anstoßen. Vorzugsweise erfolgt die Antwort des Kommunikationsgeräts unmittelbar.The access device preferably asks the communication device actively by means of a command whether a “response” response is available on the communication device. This means that the communication device cannot initiate a data transfer during HCE communication. The response from the communication device is preferably immediate.

Bevorzugt besteht der Datenaustausch zwischen dem Kommunikationsgerät und der Zugangsvorrichtung aus einer Übermittlung von Anwendungskommandos, welche aus einem Befehl und zu übermittelnden Daten bestehen.The data exchange between the communication device and the access device preferably consists of the transmission of application commands, which consist of a command and data to be transmitted.

Nach einer weiteren bevorzugten Ausführungsform wird zur Übermittlung von Anwendungskommandos ein Transportprotokoll verwendet, wodurch die Anwendungskommandos in Abhängigkeit der Datengröße des Anwendungskommandos in ein oder mehrere Segment(e) zerlegt und übermittelt wird/werden.According to a further preferred embodiment, a transport protocol is used to transmit application commands, whereby the application commands are broken down into one or more segment (s) and transmitted as a function of the data size of the application command.

Nach einem weiteren Aspekt der Erfindung wird die Aufgabe gelöst durch ein Zugangssystem zur Durchführung eines Verfahrens nach einem der vorhergehenden Ausführungsformen.According to a further aspect of the invention, the object is achieved by an access system for carrying out a method according to one of the preceding embodiments.

Das Zugangssystem kann ein oder mehrere bereits zu dem Verfahren genannte Merkmale aufweisen. Demnach sollen alle Merkmale des Verfahrens auch hinsichtlich des Zugangssystems als offenbart gelten.The access system can have one or more features already mentioned for the method. Accordingly, all features of the method should also be considered disclosed with regard to the access system.

Weitere Vorteile, Ziele und Eigenschaften der vorliegenden Erfindung werden anhand nachfolgender Beschreibung der anliegenden Figuren erläutert. Gleichartige Komponenten können in den verschiedenen Ausführungsformen gleiche Bezugszeichen aufweisen.Further advantages, objectives and properties of the present invention are explained on the basis of the following description of the attached figures. Components of the same type can have the same reference symbols in the various embodiments.

In den Figuren zeigen:

Fig.1
eine Übersichtsdarstellung des Zugangssystems;
Fig.2a bis 2i
beispielhafte Abfolge einer Anzeige auf dem Smartphone beim ersten Start der App.
In the figures show:
Fig.1
an overview of the access system;
Fig. 2a to 2i
exemplary sequence of a display on the smartphone when the app is started for the first time.

In Figur 1 ist eine Übersichtsdarstellung des Zugangssystems (1) gezeigt. Auf dem Zugangssystem erfolgt ein Verfahren zum Bedienen eines Zugangssystems (1) mit einer Zugangsvorrichtung (2), insbesondere für einen Müllcontainer (3) umfassend folgende Schritte:

  1. a. Registrieren des Nutzers (4) durch ein Kommunikationsgerät (5) bei einem Datenmanagementsystem (6) mittels eines ersten Kommunikationskanals (7);
  2. b. Übersenden eines Datensatzes durch das Datenmanagementsystem (6) über den ersten Kommunikationskanal (7) an das Kommunikationsgerät (5), wobei der Datensatz Authentifikationsdaten und Gültigkeitsdaten umfasst;
  3. c. Initiieren eines Datenaustauschs über einen zweiten Kommunikationskanal (8) zwischen dem Kommunikationsgerät (5) und der Zugangsvorrichtung (2), wobei zumindest die Authentifikationsdaten an die Zugangsvorrichtung (2) übertragen werden, wobei der zweite Kommunikationskanal (8) eine drahtlose Verbindung ist und
  4. d. Überprüfen der Authentifikationsdaten durch eine Steuereinrichtung (9) der Zugangsvorrichtung (2) auf eine Berechtigung des Nutzers;
wobei die Registrierung einmalig erfolgt und die Authentifikationsdaten in einem vorbestimmten Gültigkeitsbereich zum Zugang der Zugangsvorrichtung (2) berechtigen.In Figure 1 an overview of the access system (1) is shown. On the access system there is a method for operating an access system (1) with an access device (2), in particular for a garbage container (3), comprising the following steps:
  1. a. Registering the user (4) by a communication device (5) in a data management system (6) by means of a first communication channel (7);
  2. b. Sending a data record by the data management system (6) via the first communication channel (7) to the communication device (5), the data record comprising authentication data and validity data;
  3. c. Initiating a data exchange via a second communication channel (8) between the communication device (5) and the access device (2), at least the authentication data being transmitted to the access device (2), the second communication channel (8) being a wireless connection and
  4. d. Checking the authentication data by a control device (9) of the access device (2) for authorization of the user;
the registration being carried out once and the authentication data authorizing access to the access device (2) in a predetermined range of validity.

Das Kommunikationsgerät (5) umfasst eine Steuereinrichtung (10), welche ein Übermitteln der Authentifikationsdaten anhand der Gültigkeitsdaten steuert.The communication device (5) comprises a control device (10) which controls the transmission of the authentication data on the basis of the validity data.

Im Folgenden kann unter dem Begriff App auch die Steuereinrichtung (10) des Kommunikationsgeräts (5) verstanden werden, da die App auf dieser Steuereinrichtung (10) installiert ist und die Steuereinrichtung die entsprechenden Handlungen durchführt.In the following, the term app can also be understood to mean the control device (10) of the communication device (5), since the app is installed on this control device (10) and the control device carries out the corresponding actions.

Ein manuelles Starten der App (10) für das Öffnen der Schleuse ist nicht nötig. Die App (10) soll automatisch geöffnet werden und nach einem festgelegten Zeitpunkt wieder verschwinden.It is not necessary to start the app (10) manually to open the lock. The app (10) should open automatically and disappear again after a specified time.

Alle registrierten Schlüsselbesitzer werden im Datenmanagementsystem oder auch Web-Portal verwaltet. Deren Smartphone-IDs (im Folgenden auch (virtuelle) Schlüssel-IDs genannt) entsprechen den bisher verwendeten Tag-IDs. Diese können dort auch wieder deaktiviert/gesperrt werden. Dies kann erforderlich sein, wenn ein Nutzer sein Smartphone wechselt, verliert oder zu Müllschleusen nicht mehr zugangsberechtigt ist. In diesem Falle wird die ID der App (10) in einer Verbotsliste (schwarze Liste) eingetragen.All registered key owners are managed in the data management system or web portal. Their smartphone IDs (also called (virtual) key IDs in the following) correspond to the tag IDs used to date. These can also be deactivated / blocked again there. This may be necessary if a user changes or loses his smartphone or is no longer authorized to access garbage locks. In this case, the ID of the app (10) is entered in a prohibited list (black list).

Weitere notwendige Informationen, die den Schlüsseln noch zugeordnet werden müssen, sind Identifizierungsmerkmale des Smartphones (5) (eindeutige Device-ID und Name des Smartphones) und Funktionen, die am Web-Portal umgesetzt werden müssen.Other necessary information that still has to be assigned to the keys are the identification features of the smartphone (5) (unique device ID and name of the smartphone) and functions that must be implemented on the web portal.

Die Apps müssen verteilt werden. Hierzu wird die App in einem Web-Shop (15) hinterlegt (z.B. Google Play Store).The apps need to be distributed. For this purpose, the app is stored in a web shop (15) (e.g. Google Play Store).

Die (virtuellen) Schlüssel-IDs für die Smartphone-App (10) können beispielsweise von einem Key-Generator erzeugt werden, der die Eindeutigkeit der erzeugten Schlüssel-IDs sicherstellt. Um ein Smartphone (5) als Zugangsschlüssel für die Zugangsvorrichtung (2) verwenden zu können, bedarf es eines Registrierungs- und Authentifizierungsprozesses und einer Zuordnung der Nutzer-ID (in der Regel die Vertragsnummer). Hierfür müssen im Datenmanagementsystem (6) und von der Kommune bzw. vom Entsorgungsunternehmen (12) Vorbereitungen getroffen werden:

  • Importieren der Nutzerdaten (13) (Name, Adresse, Vertragsnummer, Regionscode, Registrierungscode, Registrierungscode 2).
  • Informationsschreiben (14) mit Registrierungscode und Registrierungscode 2 an Nutzer (4) durch die Kommune bzw. Entsorger (12). In diesem Schreiben sollte auch die Vertragsnummer ersichtlich sein. Die Vertragsnummer und der zugehörige Registrierungscode sollten im Schreiben auch als QR-Code enthalten sein, um die Anmeldung mit der App (10) zu vereinfachen. Es muss dann zur Anmeldung mit der App (10) lediglich der QR-Code gescannt werden. Das Informationsschreiben (14) enthält zudem eine Beschreibung, wo die App heruntergeladen werden kann (Empfehlung: inkl. zweiter QR-Code mit Link zur App im Web-Shop (15) und wie der Registrierungsprozess erfolgt.
The (virtual) key IDs for the smartphone app (10) can be generated, for example, by a key generator which ensures the uniqueness of the generated key IDs. In order to be able to use a smartphone (5) as an access key for the access device (2), a registration and authentication process and an assignment of the user ID (usually the contract number) are required. For this, preparations must be made in the data management system (6) and by the municipality or the waste disposal company (12):
  • Import the user data (13) (name, address, contract number, region code, registration code, registration code 2).
  • Information letter (14) with registration code and registration code 2 to user (4) from the municipality or disposal company (12). This letter should also include the contract number. The contract number and the corresponding registration code should also be included in the letter as a QR code to simplify registration with the app (10). To register with the app (10), all you have to do is scan the QR code. The information letter (14) also contains a description of where the app can be downloaded (recommendation: including a second QR code with a link to the app in the web shop (15) and how the registration process takes place.

Aufgrund des Informationsschreibens (14) ist dem Nutzer (4) bekannt, in welchem App-Store (15) die Virtual Key App für die Zugangsvorrichtung zu erwerben ist und wie die Registrierung des Smartphones (5) durchgeführt werden kann.Based on the information letter (14), the user (4) knows in which app store (15) the virtual key app for the access device can be purchased and how the smartphone (5) can be registered.

Nach dem Download und der Installation der App, wird der Nutzer (4) aufgefordert seine Vertragsnummer zusammen mit dem erhaltenen Registrierungscode einzugeben. Diese Informationen werden zusammen mit einer eindeutigen ID des Smartphones und dem Gerätenamen an das Datenmanagementsystem über eine gesicherte Verbindung (https) übertragen und dort auf Übereinstimmung überprüft. Zur Erhöhung der Sicherheit werden die folgenden weiteren Vorkehrungen getroffen:

  • Der Registrierungsprozess wird abgebrochen, wenn der Registrierungscode mehrfach falsch eingegeben wurde. Dann muss eine erneute Freischaltung des Registrierungscodes bei der Supportstelle angefordert werden.
  • Für jede Nutzer-ID (Vertragsnummer) ist die maximale Anzahl an erlaubten Keys (5) anzugeben. Ein Key (5) ist ein Tag, eine Karte oder ein Smartphone (5) mit installierter App und aktiviertem NFC. Hiermit authentifiziert sich der Benutzer (4). Diese maximale Anzahl erlaubter Keys (5) zählt nur die dem Nutzer (4) zugeordneten Keys (5) mit dem Status "aktiv". Einem Nutzer (4) können somit beliebig viele Keys (5) in einem anderen Status (z.B. "verloren") zugeordnet sein. Jedes registrierte Smartphone (5) wird dabei vom Web-Portal als Key (5) gezählt und es können somit mit einem Registrierungscode keine Smartphones (5) mehr registriert werden, wenn das Maximum an (aktiven) Keys (5) erreicht ist.
After downloading and installing the app, the user (4) is asked to enter his contract number along with the registration code received. This information is transmitted to the data management system via a secure connection (https) together with a unique ID of the smartphone and the device name, where it is checked for compliance. The following additional precautions are taken to increase security:
  • The registration process will be canceled if the registration code has been entered incorrectly several times. Then a renewed activation of the registration code must be requested from the support center.
  • The maximum number of allowed keys (5) must be specified for each user ID (contract number). A key (5) is a tag, a card or a smartphone (5) with an installed app and activated NFC. This is used to authenticate the user (4). This maximum number of allowed keys (5) only counts the keys (5) assigned to the user (4) with the status "active". Any number of keys (5) in a different status (eg "lost") can thus be assigned to a user (4). Every registered smartphone (5) is counted as a key (5) by the web portal and cannot be used with a registration code Smartphones (5) can be registered more when the maximum number of (active) keys (5) is reached.

Stimmen Vertragsnummer und Registrierungscode überein und ist die maximale Anzahl an aktiven Schlüsseln noch nicht erreicht, werden an die App (10) zugangsrelevante Informationen übertragen, u.a. sind das eindeutige Schlüssel-IDs (die vom Web-Portal aus dem Pool der verfügbaren virtuellen Schlüssel-IDs gewählt und auf aktiv gesetzt wird), Regionscode, Schlüsseltyp, Verschlüsselungs- und Gültigkeitsdaten. Diese Informationen werden teilweise innerhalb eines Authentifizierungsdatensatzes an die App (10) übertragen, der durch das Datenmanagementsystem erstellt wird. Erst dadurch wird es möglich mit dem Smartphone (5) eine Zugangsvorrichtung mit gleichem Regionscode zu öffnenIf the contract number and registration code match and the maximum number of active keys has not yet been reached, information relevant to access is transferred to the app (10), including unique key IDs (those from the web portal from the pool of available virtual key IDs is selected and set to active), region code, key type, encryption and validity dates. This information is partially transmitted to the app (10) within an authentication data record that is created by the data management system. Only then is it possible to use the smartphone (5) to open an access device with the same region code

Um eine Müllschleuse (2) per Smartphone (5) zu öffnen muss lediglich NFC aktiviert sein. Die App läuft im Hintergrund und muss daher nicht eigens für eine Entsorgung erneut gestartet werden. Es reicht bereits, das Smartphone (5) einzuschalten. Je nach Ausführungsform kann das Smartphone (5) sofort (d.h. ohne weitere Aktion an der Müllschleuse (2) oder durch Drücken eines Tasters) in den Erfassungsbereich der Antenne gehalten werden. Sobald das Smartphone (5) von der Müllschleuse (2) erkannt wurde, erscheint am Bildschirm des Smartphones ein Hinweis. Die Schleuse öffnet, sofern der Regionscode und Schlüsselstatus übereinstimmen.To open a garbage lock (2) via smartphone (5), NFC only needs to be activated. The app runs in the background and therefore does not have to be restarted specifically for disposal. It is enough to switch on the smartphone (5). Depending on the embodiment, the smartphone (5) can be held in the detection area of the antenna immediately (i.e. without further action at the garbage lock (2) or by pressing a button). As soon as the smartphone (5) has been recognized by the garbage lock (2), a message appears on the smartphone screen. The lock opens if the region code and key status match.

Während der Benutzung eines Smartphones (5) an einer Schleuse (2) muss das Smartphone (5) nicht zwingend eine GSM-Verbindung haben. Somit wird auch bei schlechter oder fehlender Netzabdeckung am Standort der Müllschleuse (2) das Öffnen sichergestellt. Es ist allerdings eine regelmäßige Verbindung mit dem Datenmanagementsystem (6) erforderlich, um die zeitlich begrenzte Authentifizierung der App (10) regelmäßig zu verlängern. Die erforderliche Regeneration der Authentifizierungsdaten erfolgt durch die Virtual Key App (10) automatisch im Hintergrund. Dadurch können über das Portal die Virtual Key Apps (10) wieder deaktiviert werden, wenn Nutzer (4) das Smartphone (5) wechseln, verlieren oder aus anderen Gründen nicht mehr zugangsberechtigt sind.When using a smartphone (5) at a lock (2), the smartphone (5) does not necessarily have to have a GSM connection. This ensures that it can be opened even if there is poor or no network coverage at the location of the garbage lock (2). However, a regular connection to the data management system (6) is required in order to regularly extend the time-limited authentication of the app (10). The required regeneration of the authentication data takes place automatically in the background using the Virtual Key App (10). This means that the virtual key apps (10) can be deactivated again via the portal if users (4) change or lose their smartphone (5) or are no longer authorized for other reasons.

Eine Virtual Key App (10) kann zudem über die bereits vorhandene Sperrlistenfunktion einer Müllschleuse (2) deaktiviert werden. Dazu muss im Datenmanagementsystem (6) für die Schlüssel-ID des betroffenen Smartphones (5) der Status auf "verloren" gesetzt werden. Nachdem die Sperrliste an die betroffenen Müllschleusen (2) übertragen wurde, wird beim Erkennen eines verlorenen Schlüssels die Öffnungsfunktion der App (10) deaktiviert.A virtual key app (10) can also be deactivated using the existing blacklist function of a garbage lock (2). To do this, the status must be set to "lost" in the data management system (6) for the key ID of the smartphone concerned (5). After the blacklist has been transferred to the garbage locks concerned (2), the opening function of the app (10) is deactivated if a lost key is detected.

Aus Sicherheitsgründen ist es erfindungsgemäß vorgesehen, dass die App (10) in zeitlichen Abständen (Gültigkeitsdauer) Kontakt mit dem Portal aufnimmt und sich die Berechtigung zum Öffnen von Schleusen (2) erneut holt.For security reasons, the invention provides that the app (10) makes contact with the portal at time intervals (validity period) and obtains the authorization to open locks (2) again.

Ist die Schlüssel-ID eines Smartphones (5) im Web-Portal (6) nicht mehr als aktiv gekennzeichnet, erhält das Smartphone (5) diese Berechtigung nicht mehr - somit ist ein Öffnen der Schleuse (2) mit diesem Smartphone (5) mit dieser eindeutigen Identifizierungsnummer nicht mehr möglich. Die App (10) löscht beim Entzug der Berechtigung zum Öffnen die Authentifizierungsdaten, so dass diese nicht mehr an eine Müllschleuse (2) übertragen werden (können). Der Benutzer (4) erhält einen Hinweis, dass die Berechtigung zum Öffnen von Müllschleusen (2) entzogen wurde.If the key ID of a smartphone (5) is no longer marked as active in the web portal (6), the smartphone (5) no longer receives this authorization - thus opening the lock (2) with this smartphone (5) is also included this unique identification number is no longer possible. When the authorization to open is withdrawn, the app (10) deletes the authentication data so that it can no longer be transferred to a garbage lock (2). The user (4) receives a message that the authorization to open garbage locks (2) has been withdrawn.

Im Folgenden wird anhand der Figuren 2a bis 2i eine beispielhafte Abfolge einer Anzeige auf dem Smartphone beim ersten Start der App (10) gezeigt. Ist die App noch nicht (oder nicht mehr) registriert, wird der Nutzer zur Registrierung aufgefordert:
Figur 2a: Wurde das Gerät noch nicht registriert. Demnach erscheint der Screen zum Freischalten des Geräts. Die Vertragsnummer und der Registrierungscode werden eingegeben. Das Datenmanagementsystem (6) prüft, ob die Daten gültig sind. Damit der Nutzer die benötigten Informationen nicht per Hand eingeben muss, wird ein QR-Code-Scanner bereitgestellt (Figur 2b).
The following is based on the Figures 2a to 2i an exemplary sequence of a display on the smartphone when the app (10) is started for the first time is shown. If the app is not yet (or no longer) registered, the user will be asked to register:
Figure 2a : Has the device not yet been registered. The screen for unlocking the device then appears. The contract number and registration code are entered. The data management system (6) checks whether the data are valid. A QR code scanner is provided so that the user does not have to enter the required information by hand ( Figure 2b ).

Bei jedem Start der App wird geprüft, ob NFC aktiv ist. Ist NFC nicht aktiv, wird der Nutzer darauf hingewiesen und erhält die Möglichkeit zu den Settings zu wechseln (Figur 2c). Ist die App bereits registriert (und NFC aktiv), wird der Screen nach Figur 2d gezeigt: Ist die Gültigkeitsdauer der Authentifizierungsdaten abgelaufen wird ein entsprechender Hinweis eingeblendet. Wurden die Authentifizierungsdaten gelöscht, wird der Nutzer auf diesen Umstand hingewiesen und dann zur Neuregistrierung aufgefordert. Nach dem erfolgreichen Registrieren der App wird ein Hilfe-Wizzard gemäß den Figuren 2e bis 2g eingeblendet, der kurz die Verwendung der App darstellt.Each time the app is started, it is checked whether NFC is active. If NFC is not active, the user is informed and given the opportunity to switch to the settings ( Figure 2c ). If the app is already registered (and NFC is active), the screen after Figure 2d shown: If the period of validity of the authentication data has expired, a corresponding message is displayed. If the authentication data has been deleted, the user is informed of this fact and then asked to re-register. After the app has been successfully registered, a help wizard will appear in accordance with the Figures 2e to 2g appears, which briefly shows the use of the app.

Beim Öffnungsvorgang wird je nach Status eine Erfolgsmeldung gemäß Figur 2h oder ein Screen mit einem Fehlerhinweis gemäß Figur 2i angezeigt.During the opening process, depending on the status, a success message is sent according to Figure 2h or a screen with an error message according to Figure 2i displayed.

BezugszeichenlisteList of reference symbols

11
ZugangssystemAccess system
22
ZugangsvorrichtungAccess device
33
MüllcontainerDumpster
44th
NutzerUsers
55
KommunikationsgerätCommunication device
66th
DatenmanagementsystemData management system
77th
erster Kommunikationskanalfirst communication channel
88th
zweiter Kommunikationskanalsecond communication channel
99
Steuereinrichtung der ZugangsvorrichtungControl device of the access device
1010
Steuereinrichtung des KommunikationsgerätsControl device of the communication device

Claims (13)

  1. Method for operating an access system (1) that comprises an access device (2), in particular for a refuse container (3), said method comprising the following steps:
    a. registering the user (4) using a communication apparatus (5) of a data management system (6) by means of a first communication channel (7);
    b. sending a data record to the communication apparatus (5) by means of the data management system (6) via the first communication channel (7), wherein the data record comprises authentication data and validation data;
    c. initiating the exchange of data between the communication apparatus (5) and the access device (2) via a second communication channel (8), wherein at least the authentication data are transferred to the access device (2), wherein the second communication channel (8) is a wireless connection;
    d. checking the authentication data for the authorisation of the user using a control means (9) of the access device (2);
    wherein the registration is carried out only once and the authentication data authorise access to the access device (2) in a predetermined validity range, wherein, when data are exchanged via the second communication channel (8), the communication apparatus (5) does not have to be connected to the data management system (6) by means of the first communication channel (7), characterised in that the communication apparatus (5) automatically queries the authorisation of the user from the data management system (6) within a predetermined period, the authentication data on the communication apparatus (5) being deleted and no longer transferred to the access device (2) if the user does not have authorisation.
  2. Method for operating an access system (1) according to claim 1,
    characterised in that
    the communication apparatus (5) is a portable data-processing apparatus, for example a mobile phone, a smartphone, a tablet or a laptop, the communication apparatus (5) comprising a control means (10) on which software is installed, which makes it possible to register the user with the data management system and/or by means of which the exchange of data between the communication apparatus (5) and the access device (2) via a second communication channel (8) can be controlled.
  3. Method for operating an access system (1) according to either claim 1 or claim 2,
    characterised in that
    the first communication channel (7) is a mobile connection and the wireless connection of the second communication channel is an NFC connection or an RFID connection, the mobile connection being a GSM connection or a UMTS connection or a GPRS connection or an LTE connection, for example.
  4. Method for operating an access system (1) according to any of the preceding claims,
    characterised in that,
    in step a), user identification data, device identification data relating to the communication apparatus and a registration code, which is provided by an operator, are transmitted to the data management system (6) by means of the communication apparatus (5), the user identification data and the registration code being read in by means of a QR scanner of the communication apparatus (5).
  5. Method for operating an access system (1) according to any of the preceding claims,
    characterised in that,
    when the communication apparatus (5) is used on the access device (2), the communication apparatus (5) is not connected to the data management system (6) via the first communication channel (7).
  6. Method for operating an access system (1) according to any of the preceding claims,
    characterised in that
    the communication apparatus (5) comprises a control means (10), which controls the transmission of the authentication data on the basis of the validity data.
  7. Method for operating an access system (1) according to any of the preceding claims,
    characterised in that
    a deregistration can be performed by means of the communication apparatus (5) by the user (4), the control means (10) of the communication apparatus (5) deleting the authentication data on the communication apparatus (5), the data management system (6) continuing to assign the deregistered authentication data to the user (6).
  8. Method for operating an access system (1) according to any of the preceding claims,
    characterised in that
    the authentication data assigned to a communication apparatus (5) can be blocked by the user (4), the access device (2) sending commands to overwrite the authentication data on the communication apparatus (5) by means of the second communication channel (8) when the communication apparatus (5) is used for the first time since the authentication data were blocked.
  9. Method for operating an access system (1) according to any of the preceding claims,
    characterised in that
    the communication via the second communication channel (8) is an HCE (Host based Card Emulation) communication, the contact between the access device (2) and the communication apparatus (5) being made by means of an ISO 7816 Select AID command.
  10. Method for operating an access system (1) according to claim 9,
    characterised in that,
    by means of a command, the access device (2) actively asks the communication apparatus (5) whether a response on the communication apparatus (5) is given, the communication apparatus (5) responding directly.
  11. Method for operating an access system (1) according to either preceding claim 9 or preceding claim 10,
    characterised in that,
    the exchange of data between the communication apparatus (5) and the access device (2) consists of transmitting application commands, which consist of both a command and data to be transmitted.
  12. Method for operating an access system (1) according to any of preceding claims 9 to 11,
    characterised in that,
    in order to transmit application commands, a transport protocol is used, by means of which the application commands are broken down into one or more segments, depending on the data size of the application command, and transmitted.
  13. Access system (1), comprising an access device (2) with a control means (9), a communication apparatus (5), a data management system (6) and a first (7) and a second communication channel (8), wherein the access system is configured for carrying out a method according to any of the preceding claims.
EP18173626.5A 2018-05-09 2018-05-22 Method for operating an access system Active EP3567555B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP18171576 2018-05-09

Publications (2)

Publication Number Publication Date
EP3567555A1 EP3567555A1 (en) 2019-11-13
EP3567555B1 true EP3567555B1 (en) 2021-12-29

Family

ID=62148224

Family Applications (1)

Application Number Title Priority Date Filing Date
EP18173626.5A Active EP3567555B1 (en) 2018-05-09 2018-05-22 Method for operating an access system

Country Status (3)

Country Link
EP (1) EP3567555B1 (en)
ES (1) ES2906890T3 (en)
PT (1) PT3567555T (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3189255A1 (en) * 2020-08-14 2022-02-17 Ethan Matthew Schwartz System and method of providing remote management of access to a group of devices

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2013302381B2 (en) * 2012-08-16 2016-03-17 Xceedid Corporation Cloud-based wireless communication system and method
US10152737B2 (en) * 2014-04-25 2018-12-11 Vivint, Inc. Automated waste management
KR20150051931A (en) * 2014-12-22 2015-05-13 (주)솔루션아이티 Pick-up device to charge the taxes at a food garbage and control method thereof
US9652910B2 (en) * 2015-06-26 2017-05-16 Fmr Llc Access system employing dynamic badges

Also Published As

Publication number Publication date
EP3567555A1 (en) 2019-11-13
PT3567555T (en) 2022-01-31
ES2906890T3 (en) 2022-04-20

Similar Documents

Publication Publication Date Title
EP2238576B1 (en) Method and device for regulating access control
EP3262859B1 (en) System for using mobile terminals as keys for vehicles
EP2606621B1 (en) Method for providing wireless vehicle access
DE102017210523B3 (en) A method of operating a passive radio-based locking device and passive radio-based locking device
DE102016215021B4 (en) Method and server device for configuring a forwarding operation of an access authorization to a motor vehicle
DE102015005232B4 (en) Controlling a clearance authorization of a motor vehicle
EP2936469B1 (en) Cellular phone for remotely controlling a function of a security device of a motor vehicle
EP3215974B1 (en) Method for providing an access code in a portable device, and portable device
WO2007033940A2 (en) Log-on between a communication system subscribers and subscribers and a subscriber
DE102016206571A1 (en) Electronic vehicle key and communication system
EP3567555B1 (en) Method for operating an access system
EP1317824A2 (en) Method and system for controlling access
DE102016201786A1 (en) An accessory for use with a smart device and system and method with such an accessory
DE102018202173A1 (en) Method and device for authenticating a user of a vehicle
EP3530022B1 (en) Machine for processing foods and packaging products
WO2021228537A1 (en) Method for coupling an authentication means to a vehicle
WO2017032452A1 (en) Transaction system
EP2768199B1 (en) Method for transferring authorization information through a telecommunications network or an authorization associated with a telecommunication terminal. telecommunications terminal, system. computer program and a computer program product
EP1768316B1 (en) Deblocking of a wireless card
WO2018219922A1 (en) Method and device for detecting a relay attack
DE102023001311B3 (en) Method for establishing a communication connection between a new vehicle key and a vehicle and system for carrying out the method
EP2063380A2 (en) Communication device for contactless data transmission over a near field
WO2016008581A1 (en) Participant identity module having a number of services
WO2020234459A1 (en) Method for authenticating a user, and authentication system
DE102023100377A1 (en) Computer-implemented procedure for authorizing a change to device settings of a radio gateway

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20191204

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20210802

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1459265

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220115

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502018008304

Country of ref document: DE

REG Reference to a national code

Ref country code: PT

Ref legal event code: SC4A

Ref document number: 3567555

Country of ref document: PT

Date of ref document: 20220131

Kind code of ref document: T

Free format text: AVAILABILITY OF NATIONAL TRANSLATION

Effective date: 20220125

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2906890

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20220420

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220329

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220329

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220330

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220429

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502018008304

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20220930

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20220531

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20220522

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220522

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220531

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220522

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220522

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220531

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PT

Payment date: 20230516

Year of fee payment: 6

Ref country code: IT

Payment date: 20230531

Year of fee payment: 6

Ref country code: FR

Payment date: 20230517

Year of fee payment: 6

Ref country code: ES

Payment date: 20230621

Year of fee payment: 6

Ref country code: DE

Payment date: 20230516

Year of fee payment: 6

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20180522

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211229

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20240522

Year of fee payment: 7