WO2000033260A1 - Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires, a partir d'un compteur dynamique - Google Patents
Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires, a partir d'un compteur dynamique Download PDFInfo
- Publication number
- WO2000033260A1 WO2000033260A1 PCT/FR1999/002957 FR9902957W WO0033260A1 WO 2000033260 A1 WO2000033260 A1 WO 2000033260A1 FR 9902957 W FR9902957 W FR 9902957W WO 0033260 A1 WO0033260 A1 WO 0033260A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- lock
- key
- electronic
- access
- electrical energy
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/215—Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
- G07C2009/00238—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00634—Power supply for the lock
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00777—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by induction
Definitions
- the present invention relates to a method and a system for controlling access, by an accessing resource or electronic key, to an accessed resource or electronic lock, this access being limited to certain time slots. It applies to controlling access to any resource, the use of which is desired to be controlled, and the access to which is to be limited to one or more specific time slots, also called predetermined periods of validity, whether the resource considered is a building, a computer system, or any other object, such as a mailbox or a bank safe.
- the invention applies more particularly to access control to electronic locks which are not self-sufficient in energy and / or which have only a limited potential for verifying a valid time range, in particular locks which do not have real time clock.
- the validity range can be either the actual period during which it is possible to access the electronic lock, or any other counting parameter making it possible to limit in time an attack by fraudulent use of the electronic key.
- the main advantage of a logical means of access to a resource compared to a physical means of access generally lies in the possibility of allowing access to the resource only within a relatively short time slot. predetermined. Under these conditions, if the electronic key is lost, stolen, assigned or duplicated, it will not allow its illegitimate holder to access the resource outside the predetermined time slot. However, this assumes that the electronic lock is able to verify that this time range is respected. This generally implies that the electronic lock has either a real time clock or a so-called "static" counter, that is to say the value of which is only updated each time an attempt is made. successful access of the electronic key to the electronic lock, the value of the static counter remaining fixed between two consecutive access attempts, successful or not.
- Document FR-A-2 722 596 describes an access control system limited to authorized and renewable time periods by means of a portable storage medium. This system, based on cryptographic mechanisms, makes it possible to limit the period of validity of access rights to a short duration, in order to avoid as far as possible an illegitimate use in the event of loss, theft, transfer or illegal duplication.
- the French patent application for filing number 98 00125 proposes a less restrictive solution, using a static counter.
- This second solution avoids the constraint of energy autonomy of the accessed resource, but has the disadvantage of offering, compared to the first solution, much less security. Indeed, a vulnerability window remains within, the validity range, between the last value stored in the static counter and the end of the validity range. A "hacker" who has an electronic key usable within the validity range could act in this window to attempt fraudulent access.
- the object of the present invention is to remedy the aforementioned drawbacks by allowing the accessed resource to check the range of validity without, however, the accessed resource having, nor a real-time clock, imposing strong constraints in terms of autonomy d energy, nor a static meter, offering only a relative level of security.
- the resource accessed comprises a so-called "dynamic" counter, supplied with the excess electrical energy supplied on each successful access attempt, so that its value changes like a real-time clock between two successful access attempts. , as long as the amount of electrical energy received has not been used up.
- the present invention provides a method of controlling access to at least one electronic key, provided with a real time clock delivering a current time value, to at least one electronic lock, inside a predetermined time slot, according to which:
- step (h) if the checks carried out in step (g) are satisfied, access is authorized, and the reference count value is updated, from the current hourly value transmitted;
- the invention provides security of intermediate degree between an accessed resource having a real time clock, generally safer but much more costly in resources, especially in electrical resources, and an accessed resource having a static counter, generally less secure.
- the lock will detect that the range of validity has expired and refuse to open.
- the present invention also provides an electronic access control system, within a predetermined time range, comprising at least one electronic lock and at least one electronic key, in which the key comprises a real time clock delivering a current hourly value, - a module for transmitting to the lock a predetermined time range, and a module for supplying the lock with a predetermined amount of electrical energy, and the lock comprises - a module memorization accessible in read and write, a counting module, this counting module being updated from the current hourly value on each access attempt, a module for comparing the current hourly value with the predetermined time range and with the value stored in the metering, and a module for storing a predetermined quantity of electrical energy, the storage module being connected to the metering module and supplying this metering module continuously with the stored electrical energy, so that the metering module behaves like a real-time clock until the stored electrical energy is used up.
- the key comprises a real time clock delivering a current hourly value, - a module for transmitting to the lock
- the storage module comprises at least one capacitor and one diode, the diode making it possible to charge the capacitor and to isolate it electrically so that when the key is removed from the lock, the capacitor provides only to the metering module the stored electrical energy.
- the present invention also proposes an electronic key comprising at least one source of electrical energy, a logical key calculation unit, a transmission-reception module for key access control signals for the implementation of a access control method between this electronic key and an electronic lock from lock access control signals generated by this electronic lock, this key being remarkable in that it further comprises: a module generating a power signal supplied by the aforementioned electrical energy source, and controlled by the aforementioned key calculation unit; and a key transfer module for transferring key and lock access control signals and a power signal, the key transfer module comprising at least one winding interconnected to the module generating a power signal and to the transmission - reception module.
- the present invention further provides an electronic lock comprising at least one logical unit for calculating a lock and a module for transmitting - receiving lock access control signals for implementing an access control method. between this electronic lock and an electronic key from key access control signals and a power signal generated by this electronic key, this lock being remarkable in that it further comprises:
- lock transfer module for the key and lock access control signals and the power signal, the lock transfer module comprising at least one winding interconnected with the transmission module - reception of control signals lock access; and a module for storing the electrical energy conveyed by the power signal, interconnected with the aforementioned winding.
- FIG. 1 is a flow diagram of the access control method of the present invention, in a particular embodiment
- FIG. 2 is a flow diagram of the access control method of the present invention, in another particular embodiment
- FIG. 3 reproduces FIG. 1a of the French patent application for filing number 98 10396
- FIG. 4 schematically represents the access control system of the present invention, in a particular embodiment
- FIG. 5 schematically represents the energy storage module included in the lock, in a particular embodiment.
- a first step 1001 of the method consists in initializing the electronic lock by a reference count value VC re f, which plays the role of an hourly value.
- VC re f a reference count value
- VC re f a reference count value
- the electronic key attempts to access the electronic lock.
- This situation can be expressed in various ways, depending on the form and nature of the supports containing the key and the lock.
- the access attempt is made by introducing the tubular part into a complementary tubular cavity of the lock, or into a complementary slot, respectively.
- a protocol for verifying the right of access of this key to this lock is then implemented successively in the key and in the lock.
- the current hourly value VH delivered by the real time clock of the key is stored in the key.
- a predetermined amount of electrical energy E is transmitted from the key to the lock.
- Storage steps 1006 of E and 1007, 1008 of verification then take place in the lock.
- the electrical energy E received from the key is stored in the lock.
- steps 1007 and 1008 If one of the verifications carried out in steps 1007 and 1008 gives rise to a negative response, the access of this key to this lock is prohibited.
- VC ref is updated by replacing it, for example, with the current hourly value VH. Then, at the end of the access attempt, successful or not, the value VC ref evolves in the same way as a real time clock, thanks to the power supplied by the quantity of electrical energy E received and stored in the lock, and this until E. is exhausted. Attempts to access the lock sufficiently frequently can thus allow it to have permanent autonomy in electrical energy.
- FIG. 2 Another embodiment of the method of the invention is described below with the aid of FIG. 2, which provides increased security compared to the previous embodiment.
- an accessed resource that is not self-sufficient in energy and / or that has only a limited potential for verifying an access right.
- right of access is meant the electronic signature of a range of validity.
- An electronic signature can be obtained using various cryptographic mechanisms, such as encryption mechanisms, or authentication. It can for example be obtained using a secret key signature algorithm or a public key signature algorithm.
- an "accessing resource”, or “electronic key” presents a right of access to a "accessed resource”, or “electronic lock”
- this protocol includes, in addition to checking the range of validity, checking the electronic signature of this range of validity.
- the validity range can be either the period proper during which it is possible to access the resource, or the period of validity of a signature key of the accessing resource allowing it to be authenticate vis-à-vis the accessed resource, or any other parameter making it possible to limit in time an attack by fraudulent use of the accessing resource.
- a first step 2001 consists, as in step 1001 in the previous embodiment, in initializing the electronic lock with a reference count value VC re f.
- the public key K P for verifying the signature is stored in the electronic lock .
- the electronic signature S can also be calculated using a secret key algorithm, of the DES (Data Encryption Standard) type for example.
- DES Data Encryption Standard
- the verification key which is stored in the lock in step 2001 is secret. Therefore, it will have to be stored in a memory physically protected, so that it cannot be read or modified by an unauthorized entity.
- one reads or establishes an electronic signature S (PH) of the predetermined time slot PH.
- This step takes place, either in addition to or in place of step 1002 of reading the time slot PH of the previous embodiment.
- This electronic signature S (PH) may have been calculated beforehand, for example by an external entity for calculating signatures, independent of the key.
- a validation entity transfers and stores the signature S (PH) in the key before this key is put into service.
- the key can itself establish the signature, if the private key necessary for this operation, as well as the cryptographic signature algorithm, has been stored in the electronic key, and if this key has the necessary computing resources.
- the current hourly value VH delivered by the real time clock of the key is stored in the key.
- the electronic signature S (PH) of the validity range and the current hourly value VH are transmitted to the lock. If, in step 2002, the time range PH was read in addition to the signature S (PH), we transmit also this time slot PH at the lock in step 2004.
- step 2005 a predetermined quantity of electrical energy E is transmitted, from the key to the lock.
- step 2007 consists, for the electronic lock, of applying the public key K P , previously stored in the lock, to the verification algorithm.
- the positive verification of the signature makes it possible to ensure the authenticity of the range of validity [VH1, VH2], said range being obtained either by re-establishing the message during the signature verification stage, or by simple reading if it was transmitted in clear with the signature.
- VH is after VH1 and before VH2, and that VH is after VC ref -
- the value VC ref changes in the same way as a real time clock, thanks to the supply supplied by the quantity of electrical energy E received and stored in the lock, until E.
- the system includes an electronic key 1 and an electronic lock 2.
- the electronic key 1 comprises a power supply module 11, of the battery or battery type for example.
- the module 11 supplies an internal real time clock 12 which delivers a current hourly value VH as defined above.
- the key 1 also includes a memory 13, in which the validity range PH is stored.
- the real-time clock 12 and the memory 13 are connected to a module 14 for communication of the key with the lock.
- the module 14 allows the key, during each access attempt, to transmit to a communication module 21 included in the lock 2 the time range PH stored in the memory 13, as well as the current time value VH delivered by the clock 12.
- the module 21 for communication of the lock with the key is connected to a memory 22 which can be read and written.
- the memory 22 comprises a counting module 23, in which is stored a reference count value VC re tr initialized before the commissioning of the electronic lock and update using the current hourly value VH transmitted by key 1, on each successful access attempt.
- the memory 22 is for example an electrically reprogrammable memory of the EPROM or EEPRO type.
- the module 23 for counting the lock 2 also receives electrical energy from the key 1, by means of a module 24 for supplying the lock with a predetermined quantity of electrical energy and a module 26 for storing a predetermined amount of electrical energy.
- the module 26, included in the lock 2 is connected, on the one hand, to the module 24, included in the key 1, and on the other hand, to the counting module 23 in the lock 2.
- the module 24 for supplying energy, included in key 1, can, by way of nonlimiting example, be produced in a form analogous to that of an assembly described in relation to FIG. 1a of the French patent application for filing number 98 10396 , shown in Figure 3 of this application.
- the electronic key 1 comprises at least one source of electrical energy 1 0 , this source consisting for example of a storage battery with which is associated a battery management module, this management module being able to present, in a manner known per se, more or less sophisticated functions for managing the energy contained in the storage battery.
- the storage battery management module will therefore not be described here in detail.
- the electronic key 1 also comprises an emission module - receiving 1 2 of key access control signals.
- This module 1 2 may comprise, advantageously, a transmission module control signals key access and a module for receiving the lock access control signals.
- the key access control signals designate the access control signals emitted by the key towards the lock and the lock access control signals designate the access control signals emitted by the lock towards the key.
- the electronic key 1 also comprises, as indicated above, a calculation unit, called the logical key calculation unit li.
- the logical key calculation unit l ⁇ makes it possible to control all of the operating operations of the electronic key 1.
- the electronic lock 2 also comprises, as indicated above, a calculation unit, called the logical lock calculation unit 2 ⁇ , and a transmission / reception module 2 2 of lock access control signals.
- a calculation unit called the logical lock calculation unit 2 ⁇
- a transmission / reception module 2 2 of lock access control signals Conventionally, the logic unit for calculating the lock 2 X also makes it possible to control all of the operating operations of the electronic lock 2.
- the transmission modules - reception of the access control signals for the key and the lock 1 2 and 2 2 allow the implementation of '' an access control protocol between the electronic key 1 and the electronic lock 2.
- the assembly shown in Figure 3 of this application further comprises, at the electronic key 1, a module 1 3 generator of a power signal.
- the power module 1 3 is supplied by the electrical energy source 1 0 .
- the electrical energy source 1 0 can be produced in the form of the energy supply module 11 shown in FIG. 4 of the present application.
- the power module 1 3 can be controlled by the logic unit for calculating key li.
- the electronic key 1 includes a first transfer circuit called the key transfer circuit 1, allowing in particular the transfer of the key and lock access control signals as well as the power signal generated by the power module 1 3 .
- the key transfer circuit 1 4 is connected, on the one hand, to the power module 1 3 and on the other hand, to the transmission - reception module of key access control signals 1 2 .
- the electronic lock 2 includes a second transfer circuit, called the lock transfer circuit 2 4 , allowing in particular the transfer of the key and lock access control signals and of the power signal mentioned previously. .
- the electronic lock 2 also includes a module 2s for storing and therefore recovering the electrical energy conveyed by the power signal.
- the module 2 5 can be produced in the form of the energy storage module 26 shown in FIG. 4. As shown in a nonlimiting manner in FIG. 3, the lock 2 can also be provided with a module 2 3 for recovering a clock signal, this clock signal being able to be recovered from the power signal.
- the functional modules constituting the electronic lock 2 that is to say, in the particular embodiment of FIG. 3, the transmission module - reception of the access control signals for lock 2 2 , the module for storing electrical energy 2 5 and, where appropriate, the clock recovery module 2 3 , are connected by means of a link to the logic unit for calculating lock 2 ⁇ .
- the lock transfer circuit 2 4 is connected, on the one hand, to the transmission - reception module 2 2 of the lock access control signals and, on the other hand, to the energy storage module 2 5 as well as, if necessary, to the clock recovery module 2 3 .
- FIG. 4 also shows that the energy storage module 26 included in the lock 2 is connected to the energy supply module 24 included in the key 1.
- the transfer circuit 1 4 of the key and the transfer circuit 2 of the lock can be constituted by the primary winding and the secondary winding of a transformer .
- the primary windings, denoted L x , and secondary, denoted L 2 are coupled from an electromagnetic point of view when the electronic key and the electronic lock are brought into contact, this bringing together being carried out for make an access attempt.
- the comparison module 25 tests if VH> VH1 and VH ⁇ VH2, and if VH> VC r ef.
- the power supply module 11 of the key 1 optionally supplies the lock 2 with the energy necessary for the verification operations carried out by the comparison module 25, as well as the energy necessary for the module updating operation 23 counting in case of access attempt, successful or not.
- the energy storage module 26 can be produced as shown in FIG. 5.
- the module 26 comprises a capacitor or a set of capacitors 28, connected ( s) by a first terminal to the counting module 23, and a diode 30, connected to the second terminal of the capacitor 28.
- the capacitor 28 can be of the button capacitor type. It is reloaded at each access attempt, when the key is inserted into the lock. Once charged, it retains a sufficient amount of energy to supply the metering module 23 for a period of the order of several tens of hours.
- the diode 30 allows, on the one hand, the charge of the capacitor, and on the other hand, to isolate the latter from the calculation unit mentioned at the beginning of this detailed description and included in the lock, when the key is removed from the lock. In this situation, the capacitor supplies only the metering module 23, which is a low energy consuming element, which gives the autonomy of operation of several tens of hours mentioned above.
- a data bus connects the counting module 23 to the calculation unit.
- This bus is preferably in a high impedance state when 1 calculation unit is no longer supplied, so as not to derive current from the counting module 23 towards the calculation unit.
- measurements carried out with a capacitor 28 of 100 mF, show a leakage current of 150 nA.
- the counting module 23 can be produced from a real time clock with a quartz at 32 kHz, which represents a good economic solution. The consumption of this set is evaluated at 200 nA. The total current supplied by the capacitor 28 then allows the module 23 for counting the lock 2 to have an autonomy close to a hundred hours, it being understood that this duration can be increased, in particular by modifying the capacity of the capacitor.
- the present invention finds an application particularly suitable for access, by mail attendants, to mailboxes, which are not energy independent.
- the security of the access control can be further strengthened by adding other data to the time slot information transmitted by the key to the lock. For example, you can add a serial number identifying the electronic key.
- the lock is provided with an additional counting module, associated with this serial number; the start of the next time slot is stored in the additional counting module during which a key bearing this serial number can access the lock.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP99973148A EP1135752A1 (fr) | 1998-12-03 | 1999-11-30 | Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires, a partir d'un compteur dynamique |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9815276A FR2786903B1 (fr) | 1998-12-03 | 1998-12-03 | Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires, a partir d'un compteur dynamique |
FR98/15276 | 1998-12-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000033260A1 true WO2000033260A1 (fr) | 2000-06-08 |
Family
ID=9533540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR1999/002957 WO2000033260A1 (fr) | 1998-12-03 | 1999-11-30 | Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires, a partir d'un compteur dynamique |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1135752A1 (fr) |
FR (1) | FR2786903B1 (fr) |
WO (1) | WO2000033260A1 (fr) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4031434A (en) * | 1975-12-29 | 1977-06-21 | The Eastern Company | Keyhole-less electronic lock |
EP0122244A2 (fr) * | 1983-04-08 | 1984-10-17 | Besam Security Aktiebolag | Sytème de serrure |
EP0419306A1 (fr) * | 1989-09-20 | 1991-03-27 | ROCKWELL BODY AND CHASSIS SYSTEMS - FRANCE, en abrégé: ROCKWELL BCS - FRANCE | Procédé et dispositif de génération et de validation d'un message numérique et application d'un tel dispositif |
EP0505084A1 (fr) * | 1991-03-19 | 1992-09-23 | Yale Security Products Limited | Serrure et combinaison serrure et clef |
WO1993021712A1 (fr) * | 1992-04-09 | 1993-10-28 | Medeco Security Locks, Inc. | Systeme de securite electronique |
FR2722596A1 (fr) | 1994-07-13 | 1996-01-19 | France Telecom | Systeme de controle d'acces limites a des places horaires autorisees et renouvables au moyen d'un support de memorisation portable |
-
1998
- 1998-12-03 FR FR9815276A patent/FR2786903B1/fr not_active Expired - Lifetime
-
1999
- 1999-11-30 WO PCT/FR1999/002957 patent/WO2000033260A1/fr not_active Application Discontinuation
- 1999-11-30 EP EP99973148A patent/EP1135752A1/fr not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4031434A (en) * | 1975-12-29 | 1977-06-21 | The Eastern Company | Keyhole-less electronic lock |
EP0122244A2 (fr) * | 1983-04-08 | 1984-10-17 | Besam Security Aktiebolag | Sytème de serrure |
EP0419306A1 (fr) * | 1989-09-20 | 1991-03-27 | ROCKWELL BODY AND CHASSIS SYSTEMS - FRANCE, en abrégé: ROCKWELL BCS - FRANCE | Procédé et dispositif de génération et de validation d'un message numérique et application d'un tel dispositif |
EP0505084A1 (fr) * | 1991-03-19 | 1992-09-23 | Yale Security Products Limited | Serrure et combinaison serrure et clef |
WO1993021712A1 (fr) * | 1992-04-09 | 1993-10-28 | Medeco Security Locks, Inc. | Systeme de securite electronique |
FR2722596A1 (fr) | 1994-07-13 | 1996-01-19 | France Telecom | Systeme de controle d'acces limites a des places horaires autorisees et renouvables au moyen d'un support de memorisation portable |
Also Published As
Publication number | Publication date |
---|---|
FR2786903A1 (fr) | 2000-06-09 |
EP1135752A1 (fr) | 2001-09-26 |
FR2786903B1 (fr) | 2002-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3568794B1 (fr) | Procédés et systèmes pour l'exécution de contrats intelligents dans des environnements sécurisés | |
EP0719438B1 (fr) | Systeme de controle d'acces limites a des plages horaires autorisees et renouvelables au moyen d'un support de memorisation portable | |
CH630480A5 (fr) | Ensemble de comptabilisation d'unites homogenes predeterminees. | |
FR2597142A1 (fr) | Systeme de serrure electronique cryptographique et procede de fonctionnement | |
EP1055203B1 (fr) | Protocole de controle d'acces entre une cle et une serrure electronique | |
EP0998731A1 (fr) | Procede et systeme de paiement par cheque electronique | |
EP1293856A1 (fr) | Circuit Intégré sécurisé comprenant des parties à caractère confidentiel, et procédé pour sa mise en action | |
FR2892252A1 (fr) | Procede et dispositif de creation d'une signature de groupe et procede et dispositif de verification d'une signature de groupe associes. | |
FR2678755A1 (fr) | Telecommande a securite optimisee. | |
WO2009050368A2 (fr) | Communication securisee entre une etiquette electronique et un lecteur | |
EP2274578B1 (fr) | Procédé et dispositif de délivrance d'une attestation numérique de domicile | |
WO2000009836A1 (fr) | Dispositif de controle d'acces entre une clef et une serrure electroniques | |
EP0815527B1 (fr) | Coupleur pour gerer une communication entre un support de donnees portable et un dispositif d'echange de donnees, et dispositif d'echange de donnees associe | |
WO2000033260A1 (fr) | Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires, a partir d'un compteur dynamique | |
EP1044433B1 (fr) | Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires | |
EP1149361A1 (fr) | Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires, les ressources accedante et accedee etant depourvues d'horloge temps reel | |
EP1579382B1 (fr) | Entite electronique securisee permettant une certification du temps | |
FR2847695A1 (fr) | Entite electronique securisee integrant la gestion de la duree de vie d'un objet | |
EP1378864A1 (fr) | Procédé de controle d'accès d'un objet portable personnalisé à un espace déterminé, et objet portable pour la mise en oeuvre du procédé | |
WO2004029873A1 (fr) | Entite electronique securisee avec gestion du temps | |
EP0965106A1 (fr) | Procede d'auto-controle d'une cle electronique dans un systeme de controle d'acces a une ressource et cle electronique mettant en oeuvre un tel procede | |
EP3095223A1 (fr) | Méthode de transmission de données chiffrées, méthode de réception, dispositifs et programmes d'ordinateur correspondants | |
EP4197849A1 (fr) | Borne de recharge de véhicule électrique à affichage déporté sécurisé | |
WO2021165625A1 (fr) | Procede de calcul d'une cle de session, procede de recuperation d'une telle cle de session | |
FR3087023A1 (fr) | Systeme d'acces securise a un vehicule au moyen d'un smartphone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1999973148 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09857038 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1999973148 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1999973148 Country of ref document: EP |