FR2985349A1 - Installation for managing e.g. physical infrastructures of marina, in boating environment, has near field communication tags, readers and mobile phones arranged with communication unit, so that one of phones reads/writes data - Google Patents

Installation for managing e.g. physical infrastructures of marina, in boating environment, has near field communication tags, readers and mobile phones arranged with communication unit, so that one of phones reads/writes data Download PDF

Info

Publication number
FR2985349A1
FR2985349A1 FR1200013A FR1200013A FR2985349A1 FR 2985349 A1 FR2985349 A1 FR 2985349A1 FR 1200013 A FR1200013 A FR 1200013A FR 1200013 A FR1200013 A FR 1200013A FR 2985349 A1 FR2985349 A1 FR 2985349A1
Authority
FR
France
Prior art keywords
nfc
port
installation
access
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
FR1200013A
Other languages
French (fr)
Other versions
FR2985349B1 (en
Inventor
Denis Paul Arcostanzo
Jean Dervaux
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
IMMOBILIERE ET FINANCIERE de l ARMEMENT SIFA SOC
Original Assignee
IMMOBILIERE ET FINANCIERE de l ARMEMENT SIFA SOC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IMMOBILIERE ET FINANCIERE de l ARMEMENT SIFA SOC filed Critical IMMOBILIERE ET FINANCIERE de l ARMEMENT SIFA SOC
Priority to FR1200013A priority Critical patent/FR2985349B1/en
Publication of FR2985349A1 publication Critical patent/FR2985349A1/en
Application granted granted Critical
Publication of FR2985349B1 publication Critical patent/FR2985349B1/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading, distribution or shipping; Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/28Logistics, e.g. warehousing, loading, distribution or shipping
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards

Abstract

The invention relates to a facility (1) for managing a port, comprising a set of RFID tags (9) integrated into the port structures and a set of RFID readers (10) capable of giving a physical or logical access to certain infrastructures. from the port to port users having access rights, this installation further comprising a port computer server (3) connected on the one hand to access control RFID readers (10) and on the other hand to a network cell phone. The installation (1) is characterized in that it furthermore comprises a set of mobile communication terminals (7) able to communicate with said cellular telephone network, and in that the RFID tags (9), the RFID readers (10) and the mobile communication terminals (7) are provided with near field communication means, so that a mobile communication terminal (7) approached at a short distance from an RFID tag (9) or a RFID reader (10) can read or write data without physical contact between RFID tags (9) or RFID readers (10), and terminals (7) mobile communication.

Description

The invention relates to a device and a method for managing the infrastructures and services of a port, as well as a device and a method for managing the physical and logical access rights of a user. of port. By port, we mean both marinas and dry ports. By extension, the invention can easily be adapted from outside the boating world to other environments in which users must have access to resources scattered over an area of activity. However, in order to simplify the disclosure, the invention will be described in a boating environment. STATE OF THE ART: Several port space management systems are already known. Thus, the document FR 2 886 438 (GUZMAN) describes a communication network system for the real-time management of boats on the water bodies of marinas. The system uses long-range RFID tags to automatically collect data stored in the tags. The system aims at an intelligent detection of the presence, absence and authorization or not of the presence of a boat at the dock, thanks to the association of an ultrasonic sensor placed at the edge of the dock, coupled with a tag placed in height on the boat. 25 But this device allows a simple detection of the presence of a boat, and does not allow interaction with the boater himself in relation to its use of the infrastructure of the port is also known from the document FR 2 915 609 ( SEATIZENPRO), a facility for the identification and management of moving parts, which is applied to the management of boats and boaters in a port. According to this system, each boat is provided with a portable data carrier equipped with a transponder, this portable data medium being for example in the form of a contactless smart card, which contains identification data of the boat. In addition, the port is provided with a network of a set of transponder management units, integrated into the electrical infrastructure of the port, for example in the power terminals of the port. Portable media management units transmit medium range radio frequency interrogation signals ranging from 50 meters to a few kilometers, and the detection of a portable data medium by a management unit transmits the data carrier information to a central database accessible to the Harbor Master's Office, where they are associated with more complete information about the boater, in order to offer services to the boater, such as the management of the boat's fluids, or access to the showers. But the data media management units are connected to each other and to the data network of the port in a wired way, which implies high installation and maintenance costs. Another system, similar to the previous one, is described in the document FR 2 953 626 (MARCHADIER), with the difference that it does not require complex wired installation from the captaincy to the boats, since the data transfer between the boats and the captaincy is performed by a Zigbee type network, compliant with the IEEE 802.15.4 standard. More specifically, on-board modules communicate via Zigbee wireless network with coordinator modules located on the pontoons and capable of handling 8 boats. The coordinator modules are connected by wire connection to detector modules. The detection by the sensor modules of the arrival or departure of a boat is relayed by the corresponding coordinator module, first to a router, then to a supervisor, by successive hops of wireless communications of a range less than 100 meters. The embedded modules may include a GSM / GPRS type telephone communication module to enable the sending of an SMS (Short Message Service) when leaving a boat. These known systems have several disadvantages. Thus, the installation of a tag or a transponder aboard a boat requires the authorization of the owner of the boat, and it is certain that a larger or smaller proportion of the target groups will always refuse to install the boat. such a device on board their boat. As it stands, no port regulations can require the boater to set up such a system on their boat, which prevents the port from managing all the boats that have access to it. In addition, when the installation of a transponder is authorized by the owner of the boat, it faces a series of technical problems difficult to overcome. A first technical problem is the difficulty of reliable installation of a transponder in a hostile environment such as that of a boat. Indeed when it is attached to the outside of the boat, the transponder is subject to weather conditions and weather, and vandalism always possible, which requires special protections that increase the cost. In addition, the transponder must be integrable on different boat structures (aluminum, polyester, wood, steel, pneumatic, with or without cabin ...). Its structure and positioning are very delicate. On the other hand in this configuration the transceiver emits consumes electrical energy and its life is limited which penalizes the use of the system over time. The same goes for the port infrastructure, which requires that the coordinator modules and routers located on the pontoons are not neutralizable and resist vandalism attempts. A second technical problem is the difficulty of communicating transponders by radio waves in a port environment, where the metal masses are numerous and create interference and breaks in radio communication between the transponders and the communications infrastructure of the harbor master's office. For example, if the ZigBee technology (868 mHz, or 902 mHz or 2.4 GHz) proves to be a very good choice for applications with low power, high autonomy or low data transfer rate, one quickly observes its limits in case of greater range or transfer speed. ZigBee's short range, such as WiFi (2.4 or 5 GHz), is not suitable for certain geographical configurations (the presence of many boat masts in the port generates a lot of interference, the obligation to encrypt the information to avoid piracy ...) and climate (fog, temperature variations, humidity ...).
In addition, the port management systems known in the state of the art are based on communication architectures between the boats and the dockside devices which are very specific, in particular from one port to another, and which do not allow not to take advantage of the use of a widespread and today universal communication architecture, that is the mobile network. OBJECT OF THE INVENTION The object of the invention is therefore to overcome the disadvantages of known port management systems. In particular, the main purpose of the invention is to propose an installation and a method of managing ports which makes it possible to avoid the installation of transponders on board the boats, so that all the geolocation of the boats in the port is done. from the wharves and pontoons. Another object of the invention is to propose an installation that is easy to install, has a reduced cost, and is scalable to allow the addition of new, more advanced services for the users of the port, whether they are port managers, or boaters. Another object of the invention is to propose an installation capable of ensuring reliable radio communications between the users and the computer tools of the harbor master's office. SUMMARY OF THE INVENTION: In order to solve all the problems posed and to achieve the intended aims, the invention makes use of both mobile communication technologies and near-field communication networks, particularly those using the so-called NFC (Near Field Communication) communication standard. In principle, the invention proposes to integrate in the physical infrastructure ports, such as wharves, pontoons, car parks, lifting areas or boat maintenance, etc ...., and depending on the intended applications or RFID electronic tags operating according to the NFC standard, and that will be called by convenience RFID tags or RFID readers. The invention provides that tags and RFID readers operate according to the so-called near field communication (NFC) communication standard, so we will have NFC tags and NFC readers. NFC tags will preferably be embedded in or near physical resources to be controlled or pointed by port agents, for example during supervisory patrol rounds, or during scoring of the status or presence of resources or boats in the port or made available to the user. The NFC readers will preferably be integrated with physical resources of the port whose access is controlled by means of access control, such as for example the access by the users or the agents of the port to facilities such as the car parks of the port. port, the captaincy, the lifting or maintenance areas of the boats, without this list being exhaustive. Both the NFC tags and the NFC readers are designed to be able to communicate by NFC with mobile terminals carried by the users, these terminals also having an NFC communication function, in addition to their function of communication via the cellular telephone network. The communication terminals of the users therefore have both an NFC mode communication capability with NFC tags or NFC readers distributed in the port infrastructures, and a communication capability according to a wireless telephony communication protocol, for example. example according to the GSM standard (called 3G or 4G) or GPRS, to communicate over greater distances with a cellular communication interface coupled to the computer server of the captaincy. In practice, these user communication terminals will mainly consist of NFC mobile phones or digital tablets equipped with the dual mode of NFC and GSM communication. To simplify the presentation, they will be referred to as NFC telephones, without limiting the scope of the invention.
Thus, when the NFC phone will approach a small distance (a few centimeters) from an NFC tag of the installation, it will behave like an NFC reader, and the tag will be powered by the NFC field of the NFC phone and will issue its identifier which will be captured by the NFC phone. If the NFC phone is part of the port installation, it will recognize the NFC Tag ID and automatically launch a pointing application, as will be described in more detail below. Similarly, when the NFC phone approaches an NFC reader, the NFC phone will behave like a smart card with an identifier and a number of access rights. The NFC reader will then read the NFC phone ID and access rights stored on board. Then this identifier and these access rights will be compared by the NFC reader to the list of identifiers of authorized users, and their respective access rights. This list is either maintained locally in the NFC readers by the computer server of the port through a dedicated link between the server and the NFC players, or updated from time to time by reprogramming the NFC reader with the help of an NFC phone as will be described in more detail later. In case of correspondence between the access rights presented by the NFC phone and those stored in the NFC reader, the latter will operate an access command to the physical resource that it controls, which will result for example by the opening a parking barrier, access to a boat maintenance area or access to resources such as water and electricity from the port. The port's computer server hosts several software packages, namely a port management package, an internet communication software (web service application) that communicates with an internet platform of the cellular operator, and a software application intended to be loaded. by the user in his NFC phone. More generally, the subject of the invention is a port management installation comprising a set of RFID tags integrated into the port structures and a set of RFID readers capable of giving a physical or logical access to certain port infrastructures. to port users having access rights, this installation also comprising a port computer server connected on the one hand to access control RFID readers and on the other hand to a cellular telephone network, characterized in that it comprises a set of mobile communication terminals able to communicate with said cellular telephone network, and in that the RFID tags, the RFID readers and the mobile communication terminals are provided with means of near-field communication, so that a mobile communication terminal approached at a short distance from an RFID tag or an RFID reader can read or write data to it, without physical contact between RFID tags or RFID readers, and mobile communication terminals. In order to be able to identify with respect to the harbor master's server, each tag, each tag reader and each mobile communication terminal has an identifier of its own, and each mobile communication terminal includes software capable of detecting the input. a tag of the installation in its NFC communication field. Similarly, each NFC reader includes software capable of detecting the entry of an NFC mobile phone of the installation into its NFC communication field. Advantageously, the detection by a mobile communication terminal of a tag of the installation causes the launching and the display by said communication terminal of an appropriate pointing software application module for managing the port. These application modules can be of any kind according to the needs of the port. These may include time attendance applications, or geo-location of boats or harbor resources. The detection by an NFC reader of an NFC mobile phone of the installation causes the NFC reader to launch an application software for authorization of access to a resource of the port. According to an alternative embodiment, the mobile communication terminals comprise several application software modules dedicated to particular resources of the port, and each tag or tag reader includes data related to a particular resource of the port. The tags are integrated in particular port resources that lend themselves to pointing applications, such as rounding applications or geolocation of boats. The tag readers are integrated into port resources that lend themselves to physical or logical access control applications, such as, for example, the water and power supply terminals on the port docks, the dock terminals, and the port terminals. access to parking, showers, toilets, machines for the distribution of goods or services, self-service computers. In general, the choice to equip a particular infrastructure element of the port with a tag or a tag reader will be based on the application to which the infrastructure element is associated. More precisely, each time it will simply be for the user to validate a data item (such as for example to validate the location of a boat at a given place of the port), it will be sufficient to equip this element with infrastructure with an NFC tag with identification and location data of this infrastructure element in the port. In this case, the fact for the user to approach his mobile phone tag will launch in the phone the software application associated with the management of this infrastructure item. Conversely, whenever it will be for the user to obtain physical or logical access to a port resource (such as for example the start of the electric meter of his boat seat), he It will be sufficient to equip this element of infrastructure with an NFC reader comprising both identification and location data of this infrastructure element in the port (as for a simple tag), and a list of authorizations of access by users. In this case, the fact that the user approaches his mobile phone, functioning as a smart card provided with access rights, the tag reader, will release physical or logical access to the infrastructure element or to the resource equipped with the NFC reader. The invention also relates to a port management method using a facility as above, said port comprising a set of physical resources to point, characterized in that it comprises steps consisting of to: equipping said physical resources with NFC tags; equipping port agents with NFC mobile phones provided with a pointing software application; for a port agent, approaching his NFC phone with an NFC tag, which will launch said pointing software application on his NFC mobile phone, enter the pointing data according to the instructions of the pointing application, and then send the data input to the port computer server (3) using the NFC mobile phone (7) via the cellular telecommunication network. According to a variant of the method, the port comprises a set of physical or logical resources provided with access control means for authorizing or blocking access by a user of the port, and is characterized in that it comprises steps consisting in : providing said physical or logical resources with NFC readers, the NFC players being provided with lists of previously registered users of the port, and their access rights; equipping the users of the port with NFC mobile telephones equipped with an access control software application and rights of access to said physical or logical resources; for a port user, approaching his NFC phone of an NFC reader to launch said access control software application on his NFC mobile telephone and transmit using said NFC mobile phone said access rights to said NFC reader; for said NFC reader, verifying said rights, and in case of coincidence of the access rights transmitted with the previously registered access rights, order the opening of the access to said physical or logical resource.
Advantageously, said physical or logical resources equipped with NFC readers are constituted for example by the port car park, the shower room, the sanitary room, the harbor master's office, the boat lifting areas, the washing or washing areas. maintenance of boats, or computers reserved for port users.
The invention will be better understood with reference to its detailed description and to the figures, in which: FIG. 1 is a block diagram of the architecture of the port management installation according to the invention; FIGS. 2A to 2D are flowcharts of the generic operating steps of the various elements of the installation of FIG. 1; FIG. 3 is a flowchart of the operating steps of the installation elements of FIG. 1, in the example of a geolocation application of the boats in the port; FIG. 4 is a flowchart of the operating steps of the elements of the installation of FIG. 1, in the example of an access control application giving access to a physical or logical resource of the port; FIG. 5 is a flow chart of the method for updating the user database of a tag reader connected to the captain's server; FIG. 6 is a flowchart of the method for updating the user database of a tag reader that is not connected to the captain's server. Referring to Figure 1 in which is shown schematically the main components of the installation 1 and the communications between them.
A port computer server 3 is installed in a known manner in the harbor master 2. It is connected to a communication interface 4 which communicates with a server (not shown) of a mobile operator, either by means of a conventional internet connection or by means of a relay antenna 5 and a link cordless phone.
The other elements of the installation 1 are distributed in the port. For example, a berth capable of receiving a boat 11 is shown. This berth is equipped with a port terminal 8 placed on the dock or on a pontoon near the boat. These port terminals 8 are generally compliant with the NFC 15-100 standard, and connected to the drinking water network and the power supply network in order to bring water and electricity to the pontoons near the boats. In a known manner, a port terminal 8 is provided for 4 boats and therefore comprises 4 electrical outlets and 4 electrovalves connected to the drinking water network. The invention first of all provides these port terminals 8 with NFC tags 9 and NFC readers 10. The tags NFC 9 and NFC readers 10 are arranged, for example, inside the port terminals 8 so as to be protected from bad weather and vandalism, while keeping a communication capacity according to the NFC standard with an NFC mobile phone 7 which would be close enough to a terminal thus equipped, or at a distance of a few centimeters, to be able to communicate in contactless mode with the tag NFC 9 and / or the reader NFC 10.
Of course, these port terminals 8 exist in several configurations and materials (plastic material, wood, aluminum, composite glass cement (called "CCV"), stainless steel etc ....), and the skilled person will easily adapt the NFC tag 9 and / or the NFC reader 10 in each type of port terminal 8 so as to ensure good communication with an external NFC 7 communication terminal.
The number of NFC tags associated with a port infrastructure element will depend on the application associated with the tag and implemented on the NFC phones. For example, for an application of geo location or pointing boats in the port, we can geo locate 4 boats using a single tag NFC 9 placed in a port terminal 8, and an application suitable software installed in the NFC phone 7 and to validate with the port server 3 the presence or absence of some of the 4 boats at the ports corresponding to a given port terminal 8. The NFC tags 9 and NFC readers 10 comprise a memory and an NFC communication interface. The memory is programmed with data, these data being distributed in a known manner in a series of fields which depend on the concrete application. For example, in the context of a pointing application of the presence of boats next to a pontoon equipped with an NFC tag 9, this tag will comprise at least one memory field containing a tag identification number, and an identification number 25 of the port management application to which it is linked, for example a pointing application of the presence of boats. Thus the identifier of the tag, which will also be stored in the port server 3 in correspondence with a specific physical location on the port, will identify the corresponding pontoon in the port management package 30 installed on the port server 3. The NFC readers 10 comprise, in addition to the memory and the NFC interface, control logic, for example in the form of a microprocessor and an application program, making it possible to read stored access rights information. in the NFC 7 phones, in order to block or to free access to a physical or logical resource of the port according to the identifier and the access rights presented by the NFC phone.
A typical example will be constituted by an NFC reader 10 placed in a port terminal 8 and connected so as to be able to control the water distribution circuit and / or electricity of said terminal. The architecture of the installation 1 according to the invention further provides a set of mobile communication terminals 7, including NFC mobile phones 7, capable of communicating on a short distance (a few centimeters) with NFC tags 9 and the NFC readers 10, and to communicate at medium or long distance (beyond a few tens of meters) with the communication interface 4 of the computer server 3 of the captaincy. For this purpose, the NFC 7 telephone is either provided with a sticker element capable of adding the NFC communication functionality to its existing features, or it is a mobile phone provided with the NFC communication functionality in its equipment. original and integrated into the structure of the phone during its manufacture. But they can also be mobile terminals having another form factor, for example electronic tablets, to the extent that they have this dual communication capability in NFC mode and in cellular mode, and a display screen and one or more embedded application software for interacting with the other components of the installation. In order to simplify the disclosure, it will be considered in the following that the mobile communication terminals 7 are GSM telephones equipped with NFC communication means, and will be designated by the simplified expression "NFC telephone", without this having to limit the scope of the invention. The operation of the NFC mobile phone 7 will be differentiated according to the port infrastructure element that the user will approach, and depending on the profile of the holder, including: port agent, port administrator, professional intervening port, or even a simple user boater.
If the NFC 7 phone is approached in the field of a simple tag NFC 9, it will detect the tag and read its identifier then open an application corresponding to the identifier of the tag. If the NFC 7 phone is approached in the field of an NFC reader 10, it will behave like a contactless smart card and will present its ID and access rights and various parameters, and the NFC reader 10 will behave in contactless smart card reader and will release or not access to the port infrastructure element thus equipped, according to the identifier and access rights presented by the NFC phone 7.
Each NFC 7 telephone in installation 1 will include, in addition to its system software and its software dedicated to mobile telephony, one or more specific application packages related to the management of a port. These packages can be of any kind. They can be installed a priori in NFC phones, or more likely downloaded by port users from an application download platform, as soon as their registration as users of the port is validated with the port server 3. These packages may consist of several software modules some of which will be free for the user and others may be marketed by the port operator as a service. Insofar as these application packages are not part of the invention, they will not be described in detail. From the point of view of the port server 3, the identifiers of the NFC tags 9, the NFC readers 10 and the NFC telephones 7 can be divided into classes of identifiers to facilitate their management by the port management software package executed by the port server 3 .
The port server 3 is connected, either by a dedicated wire link 12 or by a radio link, to the NFC readers 10 of the installation, in order to be able to update the information stored therein, in particular the identification and rights of authorized users of the port. At initialization of the device, each NFC tag 9, each NFC reader 10 and each NFC phone 7 will be encoded by the port according to classes of applications.
Example: class 1 will correspond to the rounder application, class 2 will correspond to peer-to-peer (P2P) information lookup. Consequently, if an NFC 7 telephone programmed as a boating phone is approached by an NFC tag 9 programmed for the rounder application, nothing will happen, since these applications are disjoint and do not concern the same audience. For a given NFC phone application to open, there must be a match between the NFC tag class that the NFC phone wants to read, and the NFC phone class (which will, for example, be encoded in the ID of the phone). .
The set of classes of the various stakeholders (NFC tags, NFC players and NFC phones) is kept up to date in the server, and it is the server that validates the permissions and correspondence between classes, using a simple database of data well known in the state of the art. The same goes for the NFC 10 player. It has an identifier of its own and is associated with a specific application. When he reads the ID of an approaching NFC phone, he agrees to give him access to the physical or logical resource that he manages, depending on the rights, the possible blacklists (blacklisted users). ), etc. presented by the NFC phone. Thus, by way of example, an NFC phone 7 could theoretically be authorized by its class to access the resource managed by an NFC reader, but will ultimately be banned because its identifier corresponds to that of a reported telephone. Fly. A stolen reported phone will be blacklisted and denied access by the server, which informs the NFC readers of the installation for all port applications, real-time for NFC players permanently connected to the server. , either offline after updating the NFC reader by a port agent. 2A to 2D schematizing the overall operation of the installation 1 according to the invention, and the operation of each of its main components, in the context of a generic port management application. With reference to FIG. 2A (operation of an NFC tag 9), it is assumed that the port management application is already loaded in the NFC phone 7, after the user of the NFC phone has been registered with the port administration. and receipt of its identifiers and access rights, which are also recorded as data and parameters in the server management software of the server 3. An NFC tag 9 of the facility 1 will be integrated into a port infrastructure element, for example in a port terminal 8. The presence of the NFC tag 9 will be materialized by an adequate marking on the infrastructure element thus equipped, so that the user provided with his NFC 7 phone can see the presence of a linked NFC tag 9 to a port service. The tag NFC 9 is passive, it will not be powered (at 13, Figure 2A) as no NFC phone is within range. As soon as an NFC 7 telephone is approached sufficiently by the NFC tag 7 by a user, the NFC tag is fed (at 14) and transmits (at 15) its identifier using its NFC communication stage. With reference to FIG. 2B, the basic operation of the port server 3 in connection with the invention is schematically described. The port server 3 performs, among the other tasks that are typically devolved to it, a software routine (23) consisting of monitoring the reception of data from an NFC telephone 7 or an NFC reader 10 connected to the server. In the case of a call coming from an NFC telephone, the software package of the server 3 will take the incoming communication and decode the incoming message and then execute (24) the required action according to the incoming message. For example, the server 3 will log (25) in a log the data transmitted by the NFC telephone (for example a round report transmitted by a rondier from its NFC phone), or execute a request contained in the incoming message, such as for example, sending the user of the NFC phone a code to access a self-service computer in the port. In the case of a request from an NFC reader 10 connected to the server, the server will respond to the request, for example by commanding the NFC reader to open access to the resource of the port that houses said NFC reader. It may be to order the opening of a parking barrier of the port, or to start the electricity meter of a port terminal, or other.
The operation of an NFC telephone 7 according to the invention is shown schematically in FIG. 2C. The NFC telephone interacts either with the port server 3, via its GSM communication interface, or via an NFC tag 9 or an NFC reader 10, via its NFC communication interface or with the user of the NFC telephone, in particular by means of the Usual user interfaces are the keyboard and the screen. In its interaction with the port server 3, the NFC phone is waiting (16) for a communication initiated by the server. Upon receipt (17) of data or parameters provided by the port management application of the server, the phone processes (18) and exchange (19) with the server via the GSM channel. The treatments and exchanges in question depend on the precise application, and the type of telephone user: port agent, professional intervener, user boater. For its interaction with an NFC tag 9, a user's NFC 7 telephone will have a NFC tag detection software routine (16a, FIG. 2C). In case of detection (17a) of an NFC tag 9, the telephone NFC will record (18a) the identifier of the tag and process it (19a). It may be to decode the identifier, to check (20) if it is a tag referring to information stored elsewhere, or if it is a tag linked to an application before be executed directly by the NFC phone. If the tag NFC 9 refers to data or information stored on the port server 3, the NFC phone will proceed (21) to download via the GSM network data from the port server 3 and their display (22) for the 'user. This feature makes it possible to make available in a very flexible way for the port user, scalable information (program of events to come in the port, animations, etc.) which are made available to them by the port server from tags NFCs located at various points in the harbor or on paper or other media. If the tag NFC 9 is linked to a port management application, the user's NFC 7 telephone will verify that it has the corresponding application loaded in its application memory, according to the identifier transmitted by the user. NFC tag. In this case, it will open automatically (26). A menu will then appear on the screen of the NFC phone, allowing the user to enter (27) data and transmit (28) via the GSM channel to computer server 3 of the harbor office. In the case where the software application corresponding to the identification data of the NFC tag 9 is not yet stored on board the user's NFC 7 telephone, a message may be displayed on the screen of the NFC telephone and propose the user to download the required application. In the event of validation by the user, this downloading will be done for example via the Internet from the website of the operator of management of the port, hosted by the port server 3, or by a server of telecommunications operator connected to the server port.
The port application software whose operation is described above is loaded into the user's NFC phone when he is registered as a boater at the port, or when he is hired if he is a port agent, as example a roundier charged with the security of the port. When loading the application, it can be decided by the port manager to load all available application modules, then only to activate those that correspond to the profile of the user of the phone, or to load only one or more modules. applications corresponding to this profile. Thus, for example, the NFC phone will be loaded with a port agent in charge of tracking the boats, a geolocation software module making it possible to read the geo-location data of the NFC tags located near the boats, and Interact with the Harbor Master's server software to send geolocation data read from NFC tags. According to another example of use of the invention, a rounder will be provided with an NFC telephone in which an application module embodying the steps of the roundabout will be loaded, each step being materialized by an NFC tag, and allowing the rounder to take the identifier of each tag of the roundabout, then to send for example by SMS using his NFC phone, a comment for each step of his roundabout: OK, no OK, incident, description d incident, photo, etc.
According to another example of use of the invention, a boater will be provided with an NFC 7 telephone in which he will have loaded an application software module specific to boaters, and allowing its identification with respect to the server of the harbor master and giving him several rights levels based on the rights received when registering with the port, or on rights purchased or obtained later. It may be for example purchase units of water, electricity for managing the consumption of the boat. But the application module of the NFC phone will be able to manage a large number of other access rights, as and when the infrastructure of the port evolves, 10 such as the physical access of the boater to the port, the port parking , showers, toilets, the harbor master's office, self-service computers, etc. The application module of the NFC telephone may also include features for managing loyalty points, for example the allocation of points if it frees up its place of carriage before the scheduled time, or discounts on services from 15 a certain amount of activity or transactions between the port and the boater. Other speakers on the port can still be equipped with NFC phones provided with other specific applications that are part of the port management method according to the invention. For example, a professional handling a crane or a boat washing system will be provided with an NFC telephone for interacting with NFC readers to allow access to these areas. and the management of activities within these areas, while other users of the port and whose NFC phone does not have this application will not have access to these areas. Of course, the port authority staff will also be provided with NFC telephones with specific applications, with access rights possibly prioritized according to the hierarchy of staff of the port authority. The operation of an NFC reader 10 is now described in connection with FIG. 2D. An NFC reader 10 installed in the port to control access to a resource of the port may interact with either the port server 3 (in the case where it is permanently connected by a link 12) or with the NFC 7 telephone. 'an user. To deal with the interaction with the port server 3, the NFC reader 10 has a hardware structure and a software routine for monitoring (16c) the receipt of a command or data from the connected server 3. In case of reception (17c) of such a command, the reader reads (18c) and milking (19c). It may be for example a command to update the list of users authorized to access the resource, and their access rights.
Similarly, to process interaction with a user's NFC 7 telephone, the NFC reader 10 executes a software routine (16d) monitoring the input of an NFC telephone 7 of the installation into the NFC communication field. of the reader. In case of detection (17d) of an NFC phone 7, the NFC reader 10 decodes the identifier and processes (18d) the access request to the resource presented by the NFC phone acting as a smart card. It follows an action of the NFC reader 10, which can be either the denial of access if the identifier or the access rights presented do not correspond to identifiers and access rights stored in the NFC reader, ie authorization to access the port resource otherwise. It should be noted that in the cases (FIG. 6) where the NFC reader 10 is a reader not connected to the port server 3, it will have in memory the information relating to the authorized users, to authorize the accesses locally. We will now describe, as a concrete example and in connection with Figure 3, the use of an NFC phone 7 of the facility dedicated to the rounder. It is assumed that harbor infrastructure elements located on the walkway are provided with NFC tags 9 provided with an identifier and that these tags are listed in the "rondier" application which runs on the server 3 of the harbor master's office. . It is also assumed that a rounder is provided with an NFC telephone 7 in which a specific application of rounder has been previously loaded, in particular for the taking into account of incidents during the walkway.
At each checkpoint on the walkway then runs the process shown schematically in Figure 3. The rounder approaches his NFC 7 phone NFC tag 9 corresponding. As a result, the NFC telephone supplies (30) the RFID stage of the NFC tag, which communicates (31) its identifier to the NFC telephone of the rounder. As a result, upon receipt (32) of the NFC tag identifier, the "round" application opens (33) on the rounder's NFC phone. This application is for example configured to offer the rounder the display of a menu of checkboxes, such as: o Nothing to report o Damage material O Presence of unauthorized persons 0 Risk of damage o Comments The NFC phone application can be performed so that the choice of an option in the menu leads to one or more submenus. Thus, the selection of the field "comments" may for example cause the opening of a menu allowing the recording by the rondier of a voice message describing an incident, or taking a photo of the roundabout. This action will be followed by a proposal by the NFC phone software to send the information entered by the rounder to the server 3 of the captaincy, this sending being done by the mobile network.
Upon receipt of the information by the server, the application "rounder" thereof will record the information received in a round log, or perform another action as provided by the application. For example, the following information will be recorded at the captain's server: o Name of the agent (rounder) O Location of the NFC Tag O Date O Time O Incident description (SAR, Damage to property, Presence of unauthorized persons, Risk of damage, Comments,) o Comments (reading the voice message, displaying photos, videos, ..) It is easy to understand that other port management applications can be considered with the same installation.
For example, in order to use the installation 1 to geo locate the boats in the port, it will be necessary to install at the level of the captain's server and in the NFC telephones agents in charge of this geolocation, a dedicated geolocation application allowing to identify the port terminals equipped with NFC tags, then to point out the presence or absence of boats in the vicinity of these terminals and to transmit this information to the server via the cellular telephone network. We will now describe, in connection with Figure 4, another use of the installation 1 according to the invention for an access control application to the physical or logical resources of the port. For this purpose, the installation 1 uses NFC readers 10 arranged in certain port infrastructure elements, these NFC readers being arranged to identify a user's NFC telephone 7 and to verify its identifier and access rights. to a resource of the port, and according to the access rights, to control the access or the refusal of access to said resource. One can think of as a concrete example, the authorization of access to a restricted access area of the port, such as the parking port. It is initially assumed that the NFC reader 10 controlling access to the parking is permanently connected to the server 3 of the harbor master, for example by a buried wire link 12. The operation is then the following. Step 40: A port user approaches his NFC 7 phone from the parking lot NFC 10 at a distance compatible with NFC type communication. Step 41: The NFC reader queries the NFC phone and reads its ID and settings. Step 42: The NFC reader 10 processes the read data and if the identifier is valid the NFC reader 10 controls the opening of the parking access barrier or the port resource. 2 9 8534 9 22 Step 43: If there is a problem with the ID or the access rights presented by the NFC phone, an information message is sent by the NFC reader 10 to the NFC 7 telephone which displays it (for example insufficient balance of the wallet associated with the parking application, no rights, forbidden list) and which asks the user if he wishes to update his data and his access rights. If so, the NFC phone updates its rights to the server by cellular means, then represents its access rights to the NFC reader 10. Step 44: Follow exchanges between the user via his NFC phone and the server of the captaincy to update its access rights to the car park. Step 45: After the update is successful, in case of validation, the NFC reader controls the opening of the barrier, releasing the access of the user to the zone of the port. It should be noted that in the case of a new unknown user of the port, it must register first with the server 3 of the harbor master, which will give him the right to load the software applications he has need for his activities in the 15 port. Referring to Figure 5 which describes the steps necessary for updating the data of an NFC reader 10 connected to the server 3 of the harbor master's office by a permanent link. Step 50: The server 3 sends a reprogramming request to the NFC reader 10 Step 51: The NFC reader 10 goes into programming mode Step 52: The NFC reader 10 confirms to the server 3 its passage in programming mode. Step 53: Server 3 transmits to the NFC reader 10 an updated list of users with authorized access. Step 54: The NFC reader 10 receives the update and stores the information in memory. Step 55: the NFC reader 10 returns to normal operating mode with the data concerning the users (identifiers, access rights, ...) updated. In the particular case where the NFC reader 10 controlling the access to a zone of the port is not connected to the server 3 of the harbor master's office by a dedicated link 12, either permanently or following an incident, it will not be possible to establish a communication between the server 3 and the NFC reader 10 to verify that a user has the right access. In this case, the invention provides another possibility to reconfigure the NFC reader 10 and update its parameters and lists of users with access rights. All that is required is to ask a port agent to use an NFC telephone 7 of the installation, according to the steps as shown schematically in FIG. 6. Step 60: the server 3 communicates to the NFC telephone 7 of a port agent in charge to update the NFC player not connected, via the cellular network, a request to download a data update for the unconnected NFC reader 10. Step 61: the agent using the NFC 7 telephone acknowledges receipt to the server 3 and validates the download request. Step 62: The server 3 transmits the data for the disconnected NFC reader to the agent's NFC 7 telephone. Step 63: The agent's NFC telephone records this data Step 64: The agent approaches his NFC telephone in the communication field NFC of the NFC reader not connected, which is to be reprogrammed. Step 65: The unconnected NFC reader detects the NFC phone, and goes into programming mode, and reports it to the NFC phone.
Step 66: The agent's NFC phone transmits the update data to the NFC reader via the NFC communication, which records them. Step 67: The agent's NFC reader sends an end-of-reprogram message to the NFC phone, and the NFC reader 10 returns to normal operation mode. At the end of this process, the unconnected NFC reader has the data or updated applications in memory. Advantages of the invention The invention as described meets the stated goals. It has a plurality of advantages over the port management systems known in the prior art.
Thus, an essential advantage is that it is not necessary to install transponders in the boats to point their presence. Only the port operator decides on the location of tags, without having to ask users for authorization, especially the owners of the boats.
NFC tags and drives are installed anywhere in the port where pointing or physical or logical access must be managed. The cost of a tag being minimal, it can be installed in the port terminals on the docks and pontoons, to geo locate boats. It can also be installed at various port security check points, which must be periodically checked by a rounder.
Many other locations are possible, and depend on the finesse of management desired by the port authority of a given port. Since NFC tags and NFC readers can operate without contact via NFC transmission, they can be integrated into the structural elements of the port and thus be protected from bad weather and vandalism. For the same reason, the invention frees the marina from the realization of any communication infrastructure wired or wireless network dedicated. Given that the communications between the NFC phones and the captain's server are carried out through a mobile operator, these communications are much more reliable than the Zigbee communications used in some known systems. The installation according to the invention is very flexible and can easily be extended by adding NFC tags or additional NFC tag readers followed by updates of the identification data and the server software and NFC phones. This possibility exists whether the terminals housing the tags or tag readers are connected or not, since a tag or an NFC reader can always be reprogrammed by a dedicated NFC terminal, or by a simple NFC phone with a programming application without adequate thread. The capture by port agents of information relating to the geolocation of the boats, or to the incidents detected during rounds, can be done in many ways, for example by entering information on the keyboard of the NFC telephone, or by recording of voice messages, or by taking photos, these different information is then sent by the cellular network to the server of the harbor office for recording in an appropriate log. This procedure also allows for a better follow-up of the activities of the port agents, according to the data entered and transmitted to the captain's server: number of place, date, time of checking, number of the agent or rondier, registration of the boat (seizure, or pre-entry confirmation). In order to simplify the input by the agents, it is possible to provide for the server to send a frame to the NFC phone of the agent, who in return will only have to proceed with a simple validation (yes / no) .
The payment part of the services is managed through the mobile operator or by a network of bank cards, in a known manner. This installation is the only one that is easy to replicate in multiple ports and allows the same user to have access to various ports with his only NFC phone.
The boater will be able to use, through his NFC phone or any equivalent system, the infrastructures of the port (control of access to buildings such as toilets, the captaincy, the Yacht club, ...), or to make the payment of its services ( health, launching, cleaning the boat, ...), or manage a loyalty program and recharge a wallet independently.
Finally, unlike existing systems, it is no longer necessary for the port manager to distribute and manage equipment for users (terminals or specific cards), since the user only needs his NFC phone and port management application software downloaded from the server. The NFC phone is standardized which makes it a decisive parameter in terms of inter-port interoperability. The only constraint for a port is the development of a port application and the implementation of simple, reliable and inexpensive equipment. This is the beginning of the networking of the ports and the development of a national and international harbor reservation system. The objective of mobility and fight against "suction boats" will thanks to the invention become reality.

Claims (11)

  1. REVENDICATIONS1. Port management installation (1), comprising a set of RFID tags (9) integrated into the port structures and a set of RFID readers (10) capable of giving physical or logical access to certain port infrastructures to users the port having access rights, this installation further comprising a port computer server (3) connected on the one hand to the access control RFID readers (10) and on the other hand to a cellular telephone network, characterized in that it further comprises a set of mobile communication terminals (7) able to communicate with said cellular telephone network, and in that the RFID tags (9), the RFID readers (10) and the terminals (7) ) are provided with near-field communication means, so that a mobile communication terminal (7) approached at a short distance from an RFID tag (9) or an RFID reader (10) can read from it or write data to it, without contact between RFID tags (9) or RFID readers (10), and mobile communication terminals (7).
  2. 2. Installation (1) according to claim 1, characterized in that said near-field communication means between firstly the RFID tags (9) or the RFID readers (10) and secondly the terminals (7). of mobile communication use the near-field communication protocol according to the so-called NFC communication standard, the RFID tags (9) being NFC tags, the RFID readers (10) being NFC readers, and the mobile communication terminals (7) being NFC terminals.
  3. 3. Installation (1) according to claim 2, characterized in that said NFC terminals (7) are NFC mobile phones, equipped on the one hand with a cellular telephone communication functionality to communicate with the port computer server (3) via a cellular telephone network, and on the other hand a near-field wireless communication functionality according to the NFC standard for communicating with NFC tags (9) and NFC readers (10). 2 9 8534 9 27
  4. 4. Installation (1) according to claim 3, characterized in that each NFC tag (9), each NFC reader (10) and each mobile phone NFC (7) has an identifier of its own, able to identify it with port computer server (3). 5
  5. 5. Installation (1) according to claim 4, characterized in that each NFC mobile phone (7) comprises software capable of detecting the entry of an NFC tag of the installation (1) in its NFC communication field.
  6. 6. Installation (1) according to claim 4, characterized in that each NFC reader (10) comprises software capable of detecting the input of an NFC mobile phone (7) in its NFC communication field.
  7. 7. Installation according to claim 5, characterized in that the detection by an NFC mobile phone (7) of an NFC tag (9) of the installation (1), causes the launch and display by said mobile phone NFC (7) an application software pointing a resource of the port. 15
  8. 8. Installation according to claim 6, characterized in that the detection by an NFC reader (10) of an NFC mobile phone (7) of the installation, causes the launch by said NFC reader (10) of an application software authorization to access a port resource.
  9. 9. Installation (1) according to any one of the preceding claims, characterized in that said NFC readers (10) are integrated in resources of the port, taken from among the following resources: terminals (8) water supply and in electricity placed on the quays of the port, the access points to the physical or logical facilities of the port, the parking of the port, the room of the showers, the room of the toilets, the captaincy, the areas of lifting of the boats, the areas washing or maintenance of boats, or computers reserved for port users.
  10. 10. A method of managing a port using an installation (1) according to any one of the preceding claims, said port comprising a set of physical resources to point, characterized in that it comprises steps consisting of to: - equipping said physical resources with NFC tags (9); - Equipping port agents with NFC mobile phones (7) provided with a pointing software application, for a port agent, approaching his NFC phone (7) with an NFC tag (9, so as to launch said application pointing software on its NFC mobile phone (7), enter the pointing data according to the instructions of the pointing application, send the data entered to the port computer server (3) using the mobile phone NFC (7) via the cellular telecommunication network.
  11. A method of managing a port using an installation (1) according to any one of the preceding claims, said port comprising a set of physical or logical resources provided with access control means for authorizing or blocking access by a user of the port, characterized in that it comprises the steps of: equipping said physical or logical resources of NFC readers (10), the NFC readers (10) being provided with lists of users of the port previously registered, and their access rights; equipping port users with NFC mobile phones (7) provided with an access control software application and rights of access to said physical or logical resources; for a port user, approaching his NFC phone (7) with an NFC reader (10) so as to launch said access control software application on his NFC mobile phone (7) and transmit using the mobile telephone NFC (7) said access rights to said NFC reader (10); for said NFC reader (10), verifying said access rights, and in case of coincidence of the access rights transmitted with the previously registered access rights, order the opening of the access to said physical or logical resource. 30
FR1200013A 2012-01-02 2012-01-02 Installation and method for managing ports Expired - Fee Related FR2985349B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
FR1200013A FR2985349B1 (en) 2012-01-02 2012-01-02 Installation and method for managing ports

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR1200013A FR2985349B1 (en) 2012-01-02 2012-01-02 Installation and method for managing ports

Publications (2)

Publication Number Publication Date
FR2985349A1 true FR2985349A1 (en) 2013-07-05
FR2985349B1 FR2985349B1 (en) 2016-11-04

Family

ID=46197331

Family Applications (1)

Application Number Title Priority Date Filing Date
FR1200013A Expired - Fee Related FR2985349B1 (en) 2012-01-02 2012-01-02 Installation and method for managing ports

Country Status (1)

Country Link
FR (1) FR2985349B1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2915609A1 (en) * 2007-04-26 2008-10-31 Seatizenpro Soc Par Actions Si Installation for the identification and management of mobile elements

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2915609A1 (en) * 2007-04-26 2008-10-31 Seatizenpro Soc Par Actions Si Installation for the identification and management of mobile elements

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CLAIRE SWEDBERG: "Finnish Parking Pilot Taps RFID Tags and NFC Phones", 7 September 2007 (2007-09-07), XP055033052, Retrieved from the Internet <URL:http://www.rfidjournal.com/article/view/3602/> [retrieved on 20120718] *

Also Published As

Publication number Publication date
FR2985349B1 (en) 2016-11-04

Similar Documents

Publication Publication Date Title
JP2020147447A (en) Improved system that transmits corrected delivery notice related to item subject to shipping to home delivery business master node, master node device, and improved method
US9947155B2 (en) Frictionless access system for public access point
US10490000B2 (en) Methods and systems for access control and awareness management
CN105405296B (en) Wagon control disengaging system and method based on Car license recognition
US20180049576A1 (en) Smart postal box in support of autonomous delivery nodes
US10296866B2 (en) Systems and methods to distribute and authenticate product delivery lockers
CN105185158B (en) A kind of wisdom shutdown system based on Internet of Things
CN103714713B (en) The parking stall order management system of intelligent parking lot
US9437063B2 (en) Methods and systems for multi-unit real estate management
CN104640181B (en) The power management of security system devices
US20180035180A1 (en) Methods of Communicating Identification Information and a Responsive Command Via Short-Range Communications, and Related Devices
US20190306716A1 (en) Short range wireless translation methods and systems for hands-free fare validation
US10055726B2 (en) Systems and methods for management of mobile banking resources
US9818151B2 (en) Remote vehicle rental systems and methods
US20210049722A1 (en) System and method for controlling drone delivery or pick up during a delivery or pick up phase of drone operation
US10225688B2 (en) Geospatial asset tracking systems, methods and apparatus for acquiring, manipulating and presenting telematic metadata
US10652735B2 (en) Systems and methods for programming, controlling and monitoring wireless networks
EP2875629B1 (en) Asset safety mobile notification system
CN103426328B (en) A kind of method, terminal device and parking management server for parking stall detection
Mainetti et al. A Smart Parking System based on IoT protocols and emerging enabling technologies
US9367975B2 (en) System for permitting secure access to a restricted area
US9430888B2 (en) Access control in location tracking system
EP3373570B1 (en) System and method for monitoring and control of wireless modules linked to assets
RU2460220C2 (en) Security module having secondary agent in coordination with host agent
CN101043400B (en) Access authentication system and method using smart communicator

Legal Events

Date Code Title Description
PLFP Fee payment

Year of fee payment: 5

PLFP Fee payment

Year of fee payment: 6

ST Notification of lapse

Effective date: 20180928