EP4181094A1 - Procédé de contrôle d'accès, dispositif de lecture et système de contrôle d'accès - Google Patents

Procédé de contrôle d'accès, dispositif de lecture et système de contrôle d'accès Download PDF

Info

Publication number
EP4181094A1
EP4181094A1 EP21207733.3A EP21207733A EP4181094A1 EP 4181094 A1 EP4181094 A1 EP 4181094A1 EP 21207733 A EP21207733 A EP 21207733A EP 4181094 A1 EP4181094 A1 EP 4181094A1
Authority
EP
European Patent Office
Prior art keywords
mobile device
reader
correction value
indicator
reader device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP21207733.3A
Other languages
German (de)
English (en)
Inventor
Dieter Saken
Tom MEIER
Martin Wolf
Andreas Schmidt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dormakaba Schweiz AG
Original Assignee
Dormakaba Schweiz AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dormakaba Schweiz AG filed Critical Dormakaba Schweiz AG
Priority to EP21207733.3A priority Critical patent/EP4181094A1/fr
Publication of EP4181094A1 publication Critical patent/EP4181094A1/fr
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle

Definitions

  • the present invention is related to the field of access control systems for controlling access to one or more specific areas in a building.
  • EAC systems electronic access control systems are often used to control access to certain areas or physical spaces within the building.
  • These electronic access control systems (which will be also referred to in the following as EAC systems) usually comprise a door lock that gives access to that specific physical space of the building; a user who wants to access this space is in possession of some sort of mobile data carrier with an identification code stored therein.
  • a communication channel is established between the mobile data carrier and the reader for the exchange of authentication data. After this authentication process, access to the space secured by the door lock may be given to the holder of the mobile data carrier.
  • the exchange of data between the mobile data carrier and the reader starts whenever it is determined that the mobile data carrier is within a specific distance from the reader.
  • Some solutions evaluate the proximity of the mobile data carrier to the reader based on the received signal strength.
  • Patent document WO-2014/028893-A2 discloses an access control system including a mobile device that communicates with a reader device associated with an electronic lock.
  • the system can cause the electronic lock to perform a specific function, such as an auto-unlock feature, or an auto-open feature, or other feature that is automatically performed (wirelessly transmitting a message, ringing a doorbell, etc.).
  • the position of the mobile device with respect to the reader device can be determined by processing position data received via the GPS capability, or RSSI data received and/or determined via the BLE capability.
  • the determination of the position based on these data may prove not to be sufficiently reliable, for instance, due to the inaccuracy of the position provided by the GPS, or due to the fact that the received signal strength at the reader may be different depending on the mobile data carrier, and also, depending on the battery of the mobile data carrier.
  • the system may determine that the mobile device is positioned within the pre-established range when it is actually not within range, and vice versa.
  • This problem can become more severe in the case of several mobile devices being close to a same reader device, when it may occur that the reader device receives a signal strength from a first mobile device that is lower than the signal strength received from a second mobile device, when the first mobile device is actually closer to the reader device than the second mobile device.
  • the automatic function performed by the system may be applied to a mobile device which is, in fact, not the closest one to the reader device and, for instance, it is the one that should be given access.
  • some other solutions have proposed to include further parameters, such as an estimation of the direction of movement of the mobile device, based for instance in the output of an accelerometer of the mobile device, or by including additional beacons in the system) to more securely measure distance. But in exchange, determination of the actual distance in these systems is too complicated.
  • the present invention relates to a method for access control, to a reader device and to an access control system, in which the signal strength of a mobile device received by a reader device is corrected to provide a more accurate and reliable of the actual distance between that mobile device and the reader.
  • a first aspect of the present invention relates to a method comprising:
  • the reader device only performs a specific function after the received signal strength indicator has been corrected with the correction value, and it is thus more representative of the real distance the mobile device is from the reader.
  • the function performed by the reader device is starting an authenticating procedure with the first mobile device when the received first distance indicator is lower than a preestablished threshold. That is, the reader device only starts the authenticating procedure upon verifying that the corrected first distance indicator is below that preestablished threshold which is indicative that the mobile device is in close proximity of the reader device, close enough to start an authentication procedure. It should be noted that it is also possible that this verification is carried out in a negative manner without departing from the scope of the invention; that is, if the received first distance indicator is lower than a preestablished threshold then the reader device will not start any authenticating procedure with the first mobile device which has been determined to be at a distance greater than that of the threshold.
  • the preestablished threshold can be established, for instance, at the reader device; and this threshold can be defined as a value or as a range.
  • the threshold can be defined as a value or range above which users are considered to be too far from the reader, or a value or range below which users are considered close enough to the reader.
  • the threshold value or range can be pre-set in the reader or it can be configured into the reader by any existing configuration way (which is also used for other configuration data).
  • the function performed by the reader device is determining which of the first and the second mobile devices is closer to the reader device based on the first distance indicator and the second distance indicator.
  • the reader device only performs the specific function or action in respect with the mobile device that has been determined to be closest to the reader device upon comparing the first and the second distance indicators.
  • the method further comprises starting an authenticating procedure with the i-th mobile device when the distance indicator of the i-th mobile device closer to the reader device is greater than or lower than a preestablished threshold.
  • the method of the present invention is applicable in a scenario where there are more than two mobiles device.
  • the first correction value, the second correction value, the third correction value and so forth in the present disclosure they may be generically referred to as "the i-th correction value” or simply to "the correction value”.
  • the first mobile device, the second mobile device, etc. which can also be referred to as “the i-th mobile device” or simply “the mobile device”. And also with their respective received signal strengths indicators and distance indicators.
  • the correction value can be made dependent on the mobile device make and/or model and/or type. This way, the correction value accounts for the differences between the signal strengths existing among different manufacturers and models of mobile devices.
  • the correction value can also be dependent on other factors such as hardware or firmware versions, the operating system of the mobile device; or upon other parameters such as temperature of the mobile device
  • the i-th correction value of the i-th mobile device can be made available to the mobile device.
  • the i-th correction value can be stored in a server -remote or local-, and the method comprises retrieving or receiving the correction value from the server. This way it can be assured that the reader receives from each mobile device the most updated value of the correction value and this most updated value is applied by the reader device.
  • correction values of the different mobile devices are stored in a remote server, for instance, in a database, these correction values can be easily and readily updated with any new model of mobile device that is launched on the market.
  • the step of sending by the i-th mobile device its i-th correction value to the reader can be done upon request of the reader. It can also be done at the mobile device's own motion. So, the i-th correction value can be stored in the respective i-th mobile device and that the method comprises automatically sending the i-th correction value to the reader device by the mobile device (at its own motion or initiative), usually once a communication has been established between the reader device and the i-th mobile device. This way, each mobile device can promptly provide its correction value to the reader device, thereby providing a faster way of enabling the reader to carry out the function.
  • the reader requests the correction value. This way, the reader device has a control of the whole process and only requests correction value(s) to the mobile devices which have been previously determined to be within certain proximity of the reader.
  • the i-th correction value is inputted in the i-th mobile device upon request, and the method comprises sending the i-th correction value to the reader device.
  • the user may be prompted to input a correction value within a certain range, which range depends on how the correction value is applied to the received signal strength. This may prove useful if no correction value has been previously assigned or registered to that mobile device. For instance, if the correction value is applied by multiplication, the user may be able to input 1 as correction value so as to indicate that no correction value is to be applied. Or if the correction value is applied by addition, then a 0 value can be inputted.
  • the first and second correction values can be both stored in the first and second mobile devices, respectively. But it is also possible that the first correction value is stored in a server, while the second correction value is stored in the second mobile device or inputted into the second mobile device upon request.
  • the received communication signal at the reader device can be a Bluetooth signal, preferably a Bluetooth Low Energy signal. It is also possible that the received communication signal follows another short-range communication protocol the signal strength of which is measurable at the reader device.
  • a second aspect of the invention relates to a reader device, the reader device comprising:
  • executing the executable instructions causes the one or more processors to start an authenticating procedure with the at least first mobile device when the received distance indicator is lower than a preestablished threshold. Alternatively, if the received distance indicator is greater than a preestablished threshold, no authenticating procedure with the at least first mobile device will be started.
  • executing the executable instructions at the reader device further causes the one or more processors to start an authenticating procedure with the i-th mobile device when the distance indicator of the i-th mobile device closer to the reader device is lower than a preestablished threshold.
  • the invention relates to a computer program product comprising computer-executable instructions which, when executed by a processor of a reader device, causes the reader device to carry out the method defined in the first aspect and its embodiments.
  • the invention also relates to an access control system which comprises a reader device as defined in the foregoing.
  • Figure 1 shows a first mobile device M1 arranged nearby premises P.
  • An access control system restricts the access to premises P.
  • the state of the lock L is changed such that the door D is unlocked thereby allowing access to the premises P.
  • the access control system comprises a reader device R which receives a signal, for example a Bluetooth Low Energy BLE signal, from the first mobile device M1 through a first wireless communication link L1.
  • the BLE signal is received at the reader device R with a particular signal strength, and the reader determines a first signal strength indicator RSSI1 of the signal received from the mobile device M1.
  • the first mobile device M1 sends a first correction value cv1 of the first mobile device M1 to the reader R.
  • the first correction value cv1 is a correction value of the first signal strength indicator RSSI1 of the signal received by the reader device R.
  • the access control system defines a distance threshold DT and the reader is made aware of this distance threshold DT. Access to the premises P is checked to users carrying the first mobile device M1 when the distance D1 between the first mobile device M1 and the reader device R is lower than the distance threshold DT; that is, an authentication process between n the reader R and the mobile device M1 will be carried out once the distance check has been done, having used the correction value cv1.
  • the reader R performs a calculation f with the signal strength indicator RSSI1 and the correction value cv1 sent by the first mobile device M1.
  • the operation(s) of the calculation f may be predefined in a memory (not shown in the drawings), and can be, for instance, in the form of addition/subtraction and/or multiplication/division or other simple mathematical operations, to keep the operation of the reader R simple and fast.
  • the reader R comprises some sort of processing means PM for performing the calculation.
  • the first distance indicator DI1 is compared with an indicator of the distance threshold DT in order to estimate whether the distance D1 between the first mobile device M1 and the reader device R is lower than the distance threshold TD. If it is estimated that the distance D1 is lower than the threshold distance DT, and the door D is locked, the reader device R sends a signal for unlocking the door D if the mobile device M1 is authenticated by the reader R. If it is estimated that the distance D1 is higher than the distance threshold DT, the reader device R does not carry out any specific function or action, since that mobile device M1 is deemed to be too far. This way, access to the premises P is allowed first, depending on the actual distance D1 between the first mobile device M1 and the reader device R and then, depending on the specific authentication process defined between the mobile device and the reader.
  • Figures 2 shows the access control system of Figure 1 , in this case two mobile devices are near the door.
  • the reader device R may receive signals from the first mobile device M1, in the manner explained in reference to figure 1 , and from a second mobile device M2.
  • the reader device R receives a signal (for instance, a BLE signal) from the second mobile device M2 through a second wireless communication link L2.
  • the signal is received at the reader device R having a particular signal strength, and the reader determines a second signal strength indicator RSSI2 of the signal received from the second mobile device M2.
  • the second mobile device M2 sends a second correction value cv2 of the second mobile device M2.
  • the second correction value cv2 is a correction value of the second signal strength indicator RSSI2.
  • the reader R performs a calculation f2 with the signal strength indicator RSSI2 and the correction value cv2 of the signal sent by the second mobile device M2.
  • the reader R determines a respective received signal strength indicator RSSli for each of the signals received from the two mobile devices.
  • the i-th correction value cvi sent to the reader R is used to determine the i-th distance indicator Dli.
  • the i-th mobile device Mi is determined to be farthest from the reader. The reader will also determine that this i-th mobile device Mi is farther than the distance threshold DT and thus, the function performed by the reader relating to authenticating the mobile device will not be carried out for that i-th mobile device Mi.
  • the method performed by the reader R of Figures 1-3 is shown as a flow diagram in Figure 4 .
  • the reader device R receives a BLE signal from the first mobile device M1 and, also the reader R receives the BLE signal from another mobile device Mi (step S21).
  • the reader R determines respective signal strength indicators RSSI1 and RSSli of the received signals from the respective mobile devices M1, Mi (steps S12 & S22).
  • Each mobile device M1, Mi sends their respective correction values cv1, cvi to the reader R (S13 & S23), where they are received (steps S14 & S24).
  • the respective correction values cv1, cvi are applied to the respective signal strength indicators RSSI1 and RSSli at the reader R to obtain a respective distance indicator DI1, Dli of the respective first and i-th mobile devices M1, Mi (steps S15 & S25).
  • the distance threshold is a value that has been previously defined, as a distance within which it is considered that the mobile device is sufficiently close to the reader R so as to believe that a user carrying such mobile device wants to enter the premises P.
  • the distance threshold in this example is set as a top value below which the distance between mobile device and reader is considered to be sufficient to start an authentication procedure.
  • the first mobile device M1 and/or the i-th mobile device Mi are left out (steps S17 & S27) of any function to be done by the reader R if they are determined to be farther away from the reader R than the distance threshold DT.
  • step S8 the distance indicators DI1, Dli are compared to find out the mobile device that has the smallest distance indicator DI, so as to establish which is the mobile device that is closest to the reader.
  • the reader R carries out or performs an action with the mobile device that is associated with the smallest distance indicator DI.
  • This action can be, for example, to check the credentials of the mobile device (or its user) to unlock the door D, if it the mobile device is authenticated and determined to be an authorized user to access that premises P.
  • Figure 5 shows a possible way of feeding correction values to a server S including a database which stores correction values cv.
  • a user U can input a correction value cvx into the server S by means of a terminal T.
  • the correction value cvx can be linked to an identifier IDx associated to a mobile device. These two values are stored in the database in the form of a tuple.
  • other users can upload their correction values cva, cvb, cvc, etc. by means of corresponding mobile devices Ma, Mb, Mc, etc. upon establishing respective communication links La, Lb, Lc, etc. with the server S, be it remote or local.
  • the user U works as a "bulk uploader" and sends to the server Sthe correction values cvx of several mobile devices, which are identified by the corresponding identifier IDx.
  • This identifier IDx can refer to a single mobile device model, or to a mobile device make.
  • FIG. 5 The right-hand side of Figure 5 shows how the correction values cv stored in the server S can be subsequently distributed to mobile devices.
  • a mobile device M1, M2, ..., Mi establishes a link L1, L2,... Li with the server s.
  • the mobile device For retrieving the correction value cv from the server S, the mobile device sends an identifier ID1, ID2, ... IDi of the mobile device Mi to the server S.
  • the server S then sends the corresponding correction value cv linked to that identifier IDi to the respective mobile devices.
  • Figure 6 shows another possible way of providing a mobile device with a correction value.
  • a user Ui of a mobile device Mi directly inputs the correction value cvi into the mobile device.
  • This manual inputting of the correction value cvi can be done at any moment, and also once the user is in front of a door, upon request of the reader R.
  • the correction value can be determined using the following procedure:
  • a mobile device is set at a distance of 50 cm of a reader R.
  • a reference value of the distance indicator is defined to be 50.
  • the RSSI for that mobile device is measured to be -40 dBm.
  • the RSSI measured is, for instance, -30 dBm.
  • the RSSI measured is, for instance, -60 dBm.
  • the server S can be updated with this new correction value either by a bulk uploader, or by any individual user U.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
EP21207733.3A 2021-11-11 2021-11-11 Procédé de contrôle d'accès, dispositif de lecture et système de contrôle d'accès Withdrawn EP4181094A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP21207733.3A EP4181094A1 (fr) 2021-11-11 2021-11-11 Procédé de contrôle d'accès, dispositif de lecture et système de contrôle d'accès

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP21207733.3A EP4181094A1 (fr) 2021-11-11 2021-11-11 Procédé de contrôle d'accès, dispositif de lecture et système de contrôle d'accès

Publications (1)

Publication Number Publication Date
EP4181094A1 true EP4181094A1 (fr) 2023-05-17

Family

ID=78598923

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21207733.3A Withdrawn EP4181094A1 (fr) 2021-11-11 2021-11-11 Procédé de contrôle d'accès, dispositif de lecture et système de contrôle d'accès

Country Status (1)

Country Link
EP (1) EP4181094A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014028893A2 (fr) 2012-08-16 2014-02-20 Schlage Lock Company Llc Système de lecteur sans fil
US20170046889A1 (en) * 2015-08-14 2017-02-16 Skidata Ag Method and system for access control
US20210188212A1 (en) * 2019-12-23 2021-06-24 U-Shin Deutschland Zugangssysteme Gmbh Method for Calibrating a Position Detection of a Portable Key Element and Access Control System
US20210221331A1 (en) * 2020-01-20 2021-07-22 Skidata Ag Access control method for persons and vehicles and system for carrying out the method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014028893A2 (fr) 2012-08-16 2014-02-20 Schlage Lock Company Llc Système de lecteur sans fil
US20170046889A1 (en) * 2015-08-14 2017-02-16 Skidata Ag Method and system for access control
US20210188212A1 (en) * 2019-12-23 2021-06-24 U-Shin Deutschland Zugangssysteme Gmbh Method for Calibrating a Position Detection of a Portable Key Element and Access Control System
US20210221331A1 (en) * 2020-01-20 2021-07-22 Skidata Ag Access control method for persons and vehicles and system for carrying out the method

Similar Documents

Publication Publication Date Title
US20220109561A1 (en) Smart lock unlocking method and related device
US10867459B2 (en) Wireless reader system
US9701280B2 (en) Revocation of mobile device communication control privileges
KR101601075B1 (ko) 패시브 차량 접속 시스템
US10893054B2 (en) Proximity detection system
US10139481B2 (en) Radio communication system and distance measuring method
US9855918B1 (en) Proximity confirming passive access system for vehicle
KR102565199B1 (ko) 출입 관리 시스템 및 이를 이용한 출입 관리 방법
CN109586915A (zh) 汽车无钥匙控制认证方法、用户终端、车载装置及服务器
CN108632745A (zh) 安全设备
CN111508107B (zh) 智能门锁控制方法、装置、计算机设备及存储介质
CN106603664B (zh) 车辆钥匙系统
CN104821031A (zh) 蓝牙手机智能锁控系统动态认证方法
CN104410601A (zh) 访问控制方法、系统及可穿戴设备
EP3130727A1 (fr) Dispositif de commande de verrouillage, système de commande de verrouillage, et procédé de commande de verrouillage
US20210203658A1 (en) Communication device and system
US20200216077A1 (en) Systems and methods for vehicle systems customization for one or more users of the vehicle
JP2023118733A (ja) 不正通信防止システム及び不正通信防止方法
US11678184B2 (en) Communication apparatus and communication method
EP4181094A1 (fr) Procédé de contrôle d'accès, dispositif de lecture et système de contrôle d'accès
US20190279154A1 (en) Server device and delivery system
CN109068301B (zh) 一种智能家居设备绑定的方法及装置
US11812259B2 (en) Authentication system and authentication method
KR102602767B1 (ko) 사용자 접근방향 추적 기반 차량 원격 제어 장치 및 방법
KR20180020382A (ko) 스마트 도어락 시스템

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20231118