WO2007048749A1 - Procede de controle de verouillage de serrure, et serrure - Google Patents
Procede de controle de verouillage de serrure, et serrure Download PDFInfo
- Publication number
- WO2007048749A1 WO2007048749A1 PCT/EP2006/067589 EP2006067589W WO2007048749A1 WO 2007048749 A1 WO2007048749 A1 WO 2007048749A1 EP 2006067589 W EP2006067589 W EP 2006067589W WO 2007048749 A1 WO2007048749 A1 WO 2007048749A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- lock
- user
- question
- central
- response
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00658—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
- G07C9/00674—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
- G07C9/00698—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons actuated in function of displayed informations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00388—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7051—Using a powered device [e.g., motor]
- Y10T70/7062—Electrical type [e.g., solenoid]
- Y10T70/7068—Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]
Definitions
- the present invention relates to an electronic lock lock control method.
- the present invention also relates to an electronic lock useful for the implementation of this method.
- the present invention relates in particular to a lock providing the required level of security for ATMs (Automatic Teller Machines) or safes.
- the front access is secured by a card reader and a keypad allowing different users to identify themselves before taking a limited number of tickets.
- Access to the rear face of the dispenser is generally closed by means of a conventional key lock.
- the bank employees, the bottom conveyors responsible for filling the distributor and the technical repairers all share copies of the same key that allows access to vaults frequently containing tens of thousands of Euros in cash or in a container .
- the risk is important that one of these keys is lost or stolen and falls into the wrong hands.
- a user who has fraudulently acquired a key may attempt to call the central office by impersonating the authorized key holder in order to obtain a valid OTC code.
- the security offered is therefore insufficient.
- the electronic key reader comprises electrical, electronic and / or electromechanical elements that offer possibilities for manipulation and additional fraud.
- EP0546701 describes a lock unlocking verification method in which the security is provided by means of different PIN codes and encoded messages that the user must introduce into a terminal belonging to him. This terminal is then connected to the protected box to cause its unlocking.
- the terminal that is usually in the hands of the user is a target for hackers attempting to study it or to build a compatible terminal to access unauthorized vaults.
- EP0935041 discloses a device and a method of opening a lock, based on the use of an electronic box used in particular to identify the operator and inserted into the lock.
- the housing includes a screen for displaying a question calculated in cooperation by the lock and the housing. This question is transmitted by the operator by telephone to a control panel which calculates the response entered manually into the box.
- the lock is open in case of correct answer.
- a receipt is displayed which is transmitted to the control panel in the same mode.
- WO01 / 59725 discloses a method of user identification by means of a mobile phone, for example for the settlement of transactions at the point of sale.
- the method implements a calculated code in the mobile phone of the user and a similar code calculated from the same parameters. This document does not concern the opening of a lock.
- the security of the process is again based in part on a code calculated in a device, here a telephone, held by the user and which can therefore be manipulated.
- US5259029 discloses a challenge and response mechanism for authenticating the user of a computer program.
- the challenge is displayed on the computer, the user introduces it into a personal device that provides the answer that the user must enter on the keyboard.
- This document does not concern the locks of chest and does not appeal to a central to control the opening of several locks.
- US2003 / 23103 discloses a method of identifying a lock user by means of a smart card. The user must then provide a code that he can for example obtain from a central server by telephone. Again, security relies on a falsifiable object in the hands of a user.
- An object of the present invention is therefore to provide a method of controlling the lock opening in which the security can not be compromised by manipulating devices or keys distributed to users.
- an object of the present invention is therefore to provide a method and a lock which make it possible to avoid the disadvantages of the methods and locks of the prior art.
- an electronic lock lock control method comprising the following steps: a user identifies himself with the electronic lock, the electronic lock displays a question, preferably a single-use question, the user transmits the question to a central, the central calculates the answer to the question and transmits this answer to the user, the user enters the answer in the lock, the lock checks if the answer is correct and decides based on this response of unlocking the door.
- This method has the advantage of forcing the user to transmit a question posed by the lock of the dispenser to the central. This additional operation allows for scheduled tests for example to check in the central if the question asked is indeed valid.
- This method also has the advantage of basing the identification of the user not necessarily on a physical key, but for example by means of password, PIN, or biometric data, more difficult to steal.
- Security is not based on an object that the user takes with him, but only on the lock, difficult to access, and on a remote station.
- the user needs a device, for example a mobile phone, only to connect with the control panel.
- additional plausibility tests are carried out with this mobile phone, for example to check whether the SIM card belongs to an authorized user.
- a phone and a fake SIM card are not enough to open the lock.
- this method has the advantage of making it possible to distribute, replace or invalidate very easily passwords, to distance by simple software manipulations from a central.
- the secret code used to identify the user is verified by the central unit 1, and not by the lock. This avoids the transmission of authorized user lists to different locks.
- This method also has the advantage that all the data and all the codes necessary to unlock the lock can be introduced directly into the lock, without passing through an intermediate device offering an additional vulnerability to the attacks.
- the present invention also relates to an electronic lock comprising: data input means for the introduction of a personal identification code, and means for verifying said personal identification code, a module for generating and displaying a question in response to the introduction of an accepted personal identification code, a module for verifying whether an answer to said question entered on said keyboard is correct, and for causing the unlocking of said lock by case of correct answer.
- This lock is adapted to the method above; it also has the advantage of not necessarily requiring a key reader, vulnerable and expensive.
- the present invention also relates to a method for an electronic lock park management center, comprising the steps of: distributing personal codes to a plurality of users in order to enable them to identify themselves to at least some of said locks, determining access rights of each user to each lock, reception of a question transmitted by a user through a telecommunication network, verification of the plausibility of said question, calculation of a response to said question by means of a confidential algorithm, transmission of said response to said user.
- This method can be implemented fully automatically by a computer programmed for these different tasks, or in a manner assisted by a human operator, or a group of human operators, implementing a computer.
- Figure 1 illustrates in block diagram form a system implementing the method and the lock of the invention.
- FIG. 2 illustrates in the form of a flow diagram the exchanges of information during the process of the invention.
- FIG. 1 illustrates in the form of a block diagram a system comprising a central unit 1 to which different users 4 can connect using a mobile device 3 through a network 2.
- the system also comprises one or more locks 5 to protect devices not shown, for example cash dispensers, chests, rooms or other protected volumes.
- the central unit 1 may be constituted for example by a call center, animated by several human operators, or a server or server group executing a specific application.
- the plant is typically responsible for the decision to open a whole fleet of locks.
- the network 2 is for example a telecommunications network, for example a conventional telephone network, an Internet or Intranet type network, or preferably a mobile cellular network. Users can connect to Central 1 by establishing voice or data communication over network 2.
- the users connect to the central unit 1 via a mobile cellular network 2 and by sending data, for example SMS (Short Message System), e-mails or IP data packets through a network 2 of GSM, GPRS, HSCSD, EDGE or GPRS for example.
- the central station preferably automatically receives data via a modem or a suitable router, and can also respond to the user by sending his own data through the same channel, or a different channel.
- the data exchanged in one or both directions can be electronically signed and / or encrypted by the central unit 1 and / or by the mobile equipment 3, for example by using a smart card in the mobile equipment 3.
- the users 4 connect to the central unit 1 by means of a voice communication.
- the central unit 1 uses human operators to react to this voice call, and / or an IVR (Interactive Voice Response) voice recognition system to analyze the content of the user's requests and / or DTMF codes and to synthesize a voice response.
- IVR Interactive Voice Response
- the central unit 1 furthermore comprises a database of authorized users, which contains for each user at least one personal code - or personal code verification data - as well as authorizations, for example a list of locks that the user user is allowed to open.
- the record comprising each user may further indicate time windows during which access to one or more locks is authorized, a user profile, including for example its name, its coordinates, cryptographic keys for communication with each user, a history of system usage (number of successful trials, unsuccessful trials, dates, times, etc.), and other identification or authentication data, including for example a corresponding MSISDN caller number mobile equipment 3, biometric data, etc.
- Calculation means 1 1 in the central unit 1 make it possible to execute an application program for managing the various users and their rights in the data bank 10.
- the calculation means also make it possible to execute an algorithm making it possible to calculate the response to a question ("challenge") received from a user.
- This algorithm can for example consult a read-only correspondence table that indicates the answer to each expected question, or preferably calculate a mathematical function from each question.
- the function performed is preferably chosen so that knowledge of any number of answers to previous questions does not predict what will be the answer to the next question (pseudo function). random).
- the chosen algorithm, or the values allowing to parameterize it are preferably kept confidential.
- a different algorithm, or different values are preferably used for each lock 5, and / or even for each user 4.
- the central unit 1 may further comprise a lock database (not shown), comprising for each lock 5 a profile with information such as the geographical location, the type of protected device, cryptographic communication keys, etc.
- the mobile equipment 3 depends on the type of network used.
- this equipment is constituted by cellular mobile equipment, for example a cellular telephone or a personal assistant, a smartphone or a personal computer equipped with a connection card to a cellular network, a modem or a personal computer. a router. It is also possible to use a dedicated communication device for this purpose.
- the mobile equipment 3 may comprise geolocation means 30, for example a GPS-type satellite receiver making it possible to determine its position and possibly transmit it to the central station 1.
- Isolated worker protection equipment (ITP) 31 makes it possible to verify if the user 4 of the mobile equipment 3 is awake, for example by checking if it moves, if it is vertical, if it reacts to requests for answers, etc.
- the mobile equipment 3 may further comprise additional identification and / or authentication means 32, for example a smart card (SIM card for example), PIN code input and verification means, a sensor biometric, etc.
- the identification and / or user authentication 4 can be performed locally, that is to say in the mobile equipment or in a smart card inserted in the equipment, or remotely, that is, ie for example in the central 1 which then has means of verification of the data of the smart card, PIN codes and / or biometric data entered.
- the mobile equipment 3 can be for example portable or installed in a vehicle.
- a conventional mobile telephone as mobile equipment in the context of the invention; it is only necessary for the user to be able to connect by means of this equipment with a central unit 1 to send a question and receive a corresponding answer. It is even advantageous, to increase security, to establish communications between the different users and the central by different types of channels.
- the plant may for example use this additional information and agree with a conveyor, for example, that the question should be transmitted orally, even if the conveyor has equipment for data communication.
- the user 4 is for example a bank employee, a bottom conveyor, a technical repairer, or any natural person authorized by the central 1 to open the lock 5.
- the user 4 has the knowledge of a code secret personnel that has been transmitted to it by the central 1 and with which it can identify itself to one or more locks 5 of a park locks managed by the central 1.
- the user 4 is also preferably able to s' identify to his mobile equipment 3 by means of another secret code, for example the PIN code of the phone and / or the SIM card.
- identifying the user 4 to the lock 5 and / or to the mobile equipment 3 are conceivable within the scope of the invention; for example, the user could prove his identity by presenting a personal object, such as a key or a smart card, or by biometric identification using fingerprints, iris, retina, voice, face, etc.
- a personal object such as a key or a smart card
- biometric identification using fingerprints, iris, retina, voice, face, etc.
- different methods can be implemented to identify or authenticate the user 4 towards the mobile equipment 3 and the lock 5. It is also possible to accumulate several identification processes.
- the identification data entered in the mobile equipment 3 can be transmitted to the central 1 for verification.
- the lock 5 comprises an electromechanical element 52, for example a bolt, whose position is controlled by a logic device inside the lock 5 to act on a mechanical mechanism ("linkage") to lock or unlike to unlock access to the protected volume, for example inside a distributor.
- the lock is preferably intended to be used in combination with a device containing a volume to be protected, for example with a cash dispenser or a safe; it does not itself constitute such a safe, and has no protected volume, but has means not shown to associate it mechanically and / or electrically, so hardly removable with such a chest or such a dispenser.
- a numeric or alphanumeric keyboard 51 associated with the lock 5 allows the user to enter his personal code and the answer to the questions asked.
- Other data input elements for example a biometric sensor, a camera, a microphone, etc., may optionally be provided in the lock 5.
- the lock further comprises a screen 50 for displaying messages in text or matrix mode, including questions, invitations to reply, and status messages.
- the lock preferably further comprises one or more optional interfaces 53 which enable it to exchange data with the device it is to protect, for example a cash dispenser, and / or with the central unit 1 through any network, for example a telephone network or the Internet.
- the communication of data with the device to be protected in which the lock is mounted notably makes it possible to improve the security, thanks to the exchange of information making it possible to detect probable frauds using combinations of indices and thanks to the generation of log files taking into account data collected by both the lock and the protected device.
- This communication can also, if necessary, be used to control the lock 5 by means of the keyboard of the distributor, to display messages depending on the behavior of the lock 5 on the distributor screen, to echo alarms triggered by the lock via the distributor, or to trigger other actions performed by the distributor.
- the bidirectional communication preferably between the lock 5 and the central unit 10 makes it possible, for example, to remotely modify the list of authorized users to identify with each lock 5 (unless this check is made by the central), to modify the remote response verification algorithms, to consult the log files generated by the lock, and to remotely detect other events related to the use of the lock.
- This communication with the central unit 1 can also be carried out through the device protected by the lock, for example by using a modem or a router of this device.
- the data exchanged by the lock and the central unit 1 are electronically signed and encrypted, for example through a Virtual Private Network (VPN), so as to preserve their confidentiality and their very authenticity. to the distributor to be protected.
- VPN Virtual Private Network
- the lock 5 furthermore preferably comprises an electronic watch 54 which enables it to determine the date and time autonomously, and to calculate time intervals.
- Unrepresented calculation means for example a microcontroller, a microprocessor with a memory, an industrial microcomputer, an asic type circuit and / or an FPGA circuit, etc., make it possible to manage the dialogues with the user, and to control the electromechanical device causing locking or unlocking of the lock.
- the calculation means preferably furthermore comprise a module, for example a software module, for generating and displaying a question in response to the introduction of an accepted personal identification code, and a module, for example a software module, for checking if an answer to the question is correct, and to cause the unlocking of the lock in case of correct answer
- the calculation means are preferably protected against physical or software manipulations and may, for example, self-destruct, while keeping the lock closed, during fraudulent manipulations.
- the lock 5 may further comprise elements of wireless connection with the mobile equipment 3, for example a Bluetooth-type interface, for example to detect and check the presence of this equipment nearby; however, these means can be dispensed with if they introduce an additional vulnerability.
- the lock 5 is preferably electrically autonomous and powered with batteries or battery; it remains mechanically locked when the batteries are discharged. Charging or replacing the batteries can then be done without unlocking the lock.
- the lock is electrically powered by the device in which it is mounted, for example a cash dispenser.
- it is powered by means of a generator actuated by the user; the watch 54 uses in its own power source case to keep the time even when the rest of the system is no longer electrically powered.
- a user 4 wishing to unlock the lock 5 is physically in front of this lock and introduced in step 100 a personal code on the keyboard 51, for example a numeric or alphanumeric code, for example a 6-digit code.
- the calculation means in the lock verify the personal code introduced.
- the personal code is compared with a list of accepted codes ("white list") stored in the lock.
- white list a list of accepted codes
- the lock merely checks during step 101 whether the personal code entered is plausible, for example if the format of the code is admissible, if a eventual parity code is correct, or if the entered personal code does not belong to a list of rejected codes ("black list”) because nonexistent or belonging to refused users.
- black list list of rejected codes
- the lock detects during the step 101 that the entered personal code is invalid, it is rejected, and an error message can be displayed on the display 50 to inform the user and invite him to introduce a new one. code.
- "brute force" attacks that is by successively testing a large number of different codes, it is possible, for example, to introduce a delay between each attempt and / or to limit the number of possible unsuccessful attempts before locking the lock for a longer period, or until the introduction of an unlocking maneuver.
- the user identifies with the lock by proving the possession of an object, for example a key, an electronic key, a smart card, etc.
- the object presented may itself be protected by a code, especially in the case of a smart card.
- this solution has the disadvantage of requiring an organization to distribute and manage the objects to be presented.
- the user can also identify himself by means of biometric data acquired by means of a biometric sensor, for example by means of his fingerprints, the iris, the retina, the face, the voice, etc. .
- biometric data however have the disadvantage of not being able to be replaced with the ease of a personal code that can be transmitted at the last moment to the user; a user record is also required to acquire his reference biometric data.
- identification methods can further be combined. It is also possible to claim additional or different identification depending on the circumstances; for example, a biometric identification, or key, may be required when personal code identification has not worked after a predetermined number of tests, or when the sum available in the protected volume exceeds a certain amount, or where other circumstances impose increased security.
- Access rights may be time dependent; for example, it is possible to authorize an unlocking of the lock only during a limited time window corresponding to the time at which the user is expected. This time window can be coded, along with other information, in the control panel response described below.
- the lock 5 can also check if a particular manipulation has been made during the introduction of the personal code by the user 4 to signal that he is under duress, for example because an attacker is forcing him to introduce the code.
- the particular handling may involve for example the introduction of a different personal code, the pressure of a key or an additional member, a prolonged press on a key, or other identifiable manipulations unambiguously by the lock 5 but difficult to detect for an assailant observing the maneuver.
- the detection of a particular manipulation leads to a different behavior of the lock, as will be seen below.
- the lock 5 displays in step 102 a question on the display 50.
- the question can be displayed. depending on the time, the date, the identified user, the lock, other parameters collected by the lock, and / or any manipulation detection to signal a constraint. In addition, the choice of the question may depend on a random factor.
- Each question is preferably displayed once and is not reused, or at least not for the same user.
- the displayed question can be generated by a mathematical function, for example a pseudo-random function, and / or chosen in a table of predefined questions.
- the pseudo-random function depends at least partially on the value of an incremented counter each time the trunk is opened and / or each unlocking attempt; the counter can never be decremented, and the maximum value that can be counted is sufficient to ensure that the counter does not loop back. It would also be possible to use the time counted by the lock clock to initialize the pseudo-random function; However, a clock must be able to be set on time, and thus be able to be delayed, which could be used to "go back in time” in order to force the lock to generate again a question whose answer is already known.
- Successful IDs and unsuccessful ID attempts are preferably stored in a log file in the lock, along with the date and time of the event.
- This file can be accessed by a technician, for example by introducing a particular code on the keyboard 51, by connecting a computer to a connector on the front face of the lock, and / or remotely from the central unit 1 through a communication network.
- the user 4 reads the question displayed during the step 103, then introduces it during the step 104 on the keyboard of his mobile equipment 3.
- the question displayed on the display 50 is unpredictable, and It is possible to distinguish the possible questions from the non-lawful questions, it is thus ensured that the user 4 is indeed close to the lock 5 to open.
- the question introduced by the user is transmitted by the mobile equipment 3 to the central station, for example in the form of a short message, for example SMS, e-mail, data packets, DTMF code, or voice message spoken by the user.
- a dedicated application for example a Java (registered trademark) applet, can be executed by the mobile equipment 3 to facilitate the introduction of the question and its transmission to the central station 1.
- the question is simply introduced by the user. user and forwarded to a telephone number or to an e-mail address known to the user.
- Access to mobile equipment 3, or to the mobile equipment application, may be protected by a password, a pin code, or require other identification or authentication measures.
- user 4 may be protected by a password, a pin code, or require other identification or authentication measures.
- the message transmitted to the central unit 1 during the step 105 may include other information, including for example an identification of the mobile equipment 3 used (for example a number of calling MSISDN), user identification data (including his personal code, but also for example a password, a PIN code, biometric data, data extracted from a smart card in the mobile equipment , etc.), position information provided by the geolocation module 30, information provided by the PTI module 31, etc.
- the message can also be signed electronically by a smart card in the mobile equipment 3, to prove its authenticity and integrity, and / or encrypted to ensure its confidentiality.
- the central unit 1 receives the message transmitted by the user and verifies it. Verification involves, for example, checking whether the transmitted question is a lawful question, depending on the user who uses it, the lock in front of which he is, the time, etc. If the user's personal code has been transmitted with the question, or if it is implicitly contained in the question, the central 1 can also ensure that this user is actually authorized to access this lock at this time, for example according to a route plan previously established for a conveyor moving between several locks. Other checks may take into account the geographic location of the user, the data provided by the PTI device, any data provided directly by the lock, information checks signaling manipulation to indicate a constraint, and so on.
- step 106 If the checks carried out in step 106 make it possible to determine that the question is a legitimate question transmitted at the right moment by an authorized user, the rights of this user are preferably determined.
- a response to this question is computed during step 107, using an algorithm unknown to the users and executed by the calculation means 1 1.
- the response is preferably constituted by a numerical or alphanumerical sequence that does not allow a user to immediately determine if it contains implicit instructions for the lock.
- the question is not valid, or if it was transmitted by an unauthorized user, or when the user does not have the necessary access rights, or when other anomalies have been detected no answer is calculated.
- an error message informing the user is then transmitted to the mobile equipment 3 and displayed by the latter, for example to allow the user to correct a typing error during the introduction of the question.
- the central can provide a modified response resulting in modified behavior of the lock. The reaction of the plant and the response sent may also depend on the anomaly detected, the number of unsuccessful attempts, or other conditions.
- control unit detects, for example from the question received, that the user has made a particular manipulation to indicate it is under stress, it preferably calculates a modified response by the normal response, to cause a particular behavior of the lock.
- modified responses can be chosen automatically or by human operators depending on the circumstances, in order to trigger different reactions.
- Additional information may be coded in the response, for example to define the user's access rights to the lock, for example as a function of time.
- the answer to the question is then transmitted to the mobile equipment in step 108, then displayed and read by the user in step 109.
- the response may include, for example, a numeric or alphanumeric code and is introduced by the user 4 on the keyboard 51 of the lock 5 during the step 110.
- the calculation means in the lock 5 check if the response received is correct.
- this verification involves a comparison with a response calculated by the lock itself, by executing the same algorithm as that executed by the central unit 1.
- the verification of the received response is performed without recalculating it independently, for example by checking the response received by means of a verification key to distinguish the possible answer or answers to the question of invalid responses, depending on the question and / or other parameters.
- This variant has the advantage of not requiring copies of the algorithm in a multitude of locks scattered over a territory; it is also compatible with algorithms that can provide several valid answers to the same question.
- the calculation means 5 furthermore verify in step 11 1 whether the response received takes into account a manipulation detection by a user under constraint, or whether other parameters are coded in this response.
- the user indicates a state of constraint to the lock 5 during the introduction of the answer on the keyboard during the step 110, for example by introducing an additional digit, etc.
- This solution is however less secure because a usurper could introduce the answer himself, without performing any additional manipulation.
- the central is not informed of a manipulation.
- a state of stress is directly detected by the lock 5 from sensors or additional data, data transmitted by the distributor to which the lock is associated, or data directly transmitted by the central unit 1.
- the lock determines during step 111 that the answer entered is correct, and that it does not correspond to a state of stress, the lock is unlocked during step 112, until the next manual lock or for a limited time.
- the user can thus access the protected volume, or a part of this volume.
- This event is protocol in the log file, indicating the time and duration of the unlock.
- the counter used to initialize the pseudo-random function is irreversibly incremented.
- step 111 If the lock determines during step 111 that the answer entered is incorrect, the lock remains locked, and an error message may be displayed on the display 50. After a predetermined number of unsuccessful attempts, an alarm can be triggered locally or sent to Central 1 or to another predetermined address. In a variant, the tickets in the dispenser are automatically destroyed or marked with an indelible ink.
- the lock determines during step 111 that the answer entered is correct, but that it corresponds to a state of constraint, it performs one of the following actions depending on the answer: * locking the lock, or maintaining the lock, possibly even if a correct answer and subsequently introduced for a limited time,
- a receipt code is preferably displayed during an additional step not shown on the display 50.
- the user enters this code of receipt on his equipment mobile and transmits it to the central 1, in the same way as the question before, in order to indicate to the central the end of its mission.
- the required release code is preferably unique and unpredictable in advance, so as to ensure that the user has read it correctly as a result of the manipulation and has not deduced otherwise.
- the central office is however able to check whether the transmitted acknowledgment code is lawful.
- the release code generated by the lock or reintroduced by the user may contain indications indicating to the central particular events, for example to indicate whether the lock was opened, a new state of constraint, or any other event .
- the transmitted acknowledgment code can be signed, encrypted and accompanied by data such as date, time, user identification, mobile equipment, position information geographical, etc.
- the control unit can thus verify this data, or detect the absence of sending of a receipt message after a predetermined delay, to decide on an appropriate action, including the triggering of an alarm, the triggering of an intervention, and / or the locking of other locks near or on the intended course of the user even in case of correct maneuver.
- the receipt code generated is preferably, in the same way as the question or the answer, depending on the current user, the current lock and / or other parameters such as the date, the time, the detection of possible manipulations.
- an authorization to unlock a particular lock by a particular user can be changed by the central 1 in one of the following ways:
- a new personal code By communicating a new personal code to the user, for example by means of a telephone call, an SMS, an e-mail or another message sent to the mobile equipment 3, or transmitted orally to the user
- modifying the personal codes accepted by the locks 5 for example by sending new lists of accepted codes (white list, only in the variant where these lists are stored in the lock), new lists of refused codes (blacklist), new lists of suspicious codes, requiring additional checks (gray list), or by modifying the access rights associated with these codes.
- the code lists and the access rights may be transmitted by a telecommunication channel through a telecommunication interface in the lock, and / or by means of a telecommunication interface linked to the device protected by the lock, or introduced directly, through a physical data carrier, by a technician responsible for maintenance.
- the lock 5 may itself allow or refuse the unlocking as a function of parameters acquired directly or through the protected device, for example by means of sensors, cameras or microphones associated with the device. lock or device, obtained by analyzing the manipulations of the user on the keyboard 5, or according to an internal history of the manipulations of this user and / or the lock 5.
- the lock described above may be used to secure volumes other than ticket dispensers, for example weapon cabinets used in police stations or by the military, safes, or other volumes whose locking or unlocking by a local user must be authorized by a remote control panel.
- the lock of the invention can be programmed at any time, for example from the control panel and / or with the aid of a particular code introduced by a user nearby, to operate in a mode other than the interactive mode described above. For example, it would be possible to reprogram this lock to allow unlocking by some users, or even by all users, without establishing a connection with the central.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006800397857A CN101297327B (zh) | 2005-10-24 | 2006-10-19 | 控制锁的锁定的方法以及锁 |
AU2006307977A AU2006307977B2 (en) | 2005-10-24 | 2006-10-19 | Method for controlling the locking of a lock, and lock |
US12/104,967 US20090320538A1 (en) | 2005-10-24 | 2008-04-17 | Method for controlling the locking of a lock, and lock |
HK09103516A HK1125727A1 (en) | 2005-10-24 | 2009-04-16 | Method for controlling a lock locking state and a lock |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05109900.0 | 2005-10-24 | ||
EP05109900.0A EP1780680B1 (fr) | 2005-10-24 | 2005-10-24 | Procédé de contrôle de verrouillage de serrure, et serrure |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/104,967 Continuation US20090320538A1 (en) | 2005-10-24 | 2008-04-17 | Method for controlling the locking of a lock, and lock |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007048749A1 true WO2007048749A1 (fr) | 2007-05-03 |
Family
ID=35840136
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2006/067589 WO2007048749A1 (fr) | 2005-10-24 | 2006-10-19 | Procede de controle de verouillage de serrure, et serrure |
Country Status (9)
Country | Link |
---|---|
US (1) | US20090320538A1 (fr) |
EP (1) | EP1780680B1 (fr) |
CN (1) | CN101297327B (fr) |
AU (1) | AU2006307977B2 (fr) |
ES (1) | ES2664947T3 (fr) |
HK (1) | HK1125727A1 (fr) |
MY (1) | MY149673A (fr) |
WO (1) | WO2007048749A1 (fr) |
ZA (1) | ZA200803528B (fr) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103021045A (zh) * | 2011-09-25 | 2013-04-03 | 边高伟 | 移动终端用户验证智能门禁系统 |
CN103941971A (zh) * | 2013-01-17 | 2014-07-23 | 深圳富泰宏精密工业有限公司 | 屏幕解锁方法及系统 |
CN105069874A (zh) * | 2015-07-28 | 2015-11-18 | 北京航空航天大学 | 一种移动互联网声纹门禁系统及其实现方法 |
CN105225317A (zh) * | 2015-10-03 | 2016-01-06 | 上海大学 | 一种多路集中管理的网络门禁控制系统 |
CN106023373A (zh) * | 2016-05-23 | 2016-10-12 | 三峡大学 | 一种基于大数据与人脸识别的校园宿舍门禁系统 |
Families Citing this family (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5012247B2 (ja) * | 2007-06-21 | 2012-08-29 | ソニー株式会社 | 認証装置、入場管理装置、入退場管理装置、入場管理システム、入退場管理システム、認証処理方法およびプログラム |
WO2010000276A1 (fr) * | 2008-06-30 | 2010-01-07 | Telecom Italia S.P.A. | Procédé et système pour communiquer des demandes d'autorisation d'accès en fonction d'une identification personnelle d'utilisateur, et procédé et système pour déterminer des autorisations d'accès |
US9058474B2 (en) * | 2008-12-11 | 2015-06-16 | Northrop Grumman Systems Corporation | Biometric device, system, and method for individual access control |
US8797138B2 (en) * | 2009-01-13 | 2014-08-05 | Utc Fire & Security Americas Corporation, Inc. | One-time access for electronic locking devices |
US8542119B2 (en) * | 2009-01-13 | 2013-09-24 | Invue Security Products Inc. | Combination non-programmable and programmable key for security device |
DE102009010491A1 (de) | 2009-02-25 | 2010-09-23 | Rittal Gmbh & Co. Kg | Zugangssteuerungseinrichtung |
TR200903929A2 (tr) * | 2009-05-21 | 2010-12-21 | Gürel Hakan | Bir kimlik doğrulama sistemi |
US20110050419A1 (en) * | 2009-08-26 | 2011-03-03 | Kwanyuen Ng | Remote Intrusion Signaling Security System |
CN101866409B (zh) * | 2010-05-11 | 2015-04-01 | 中兴通讯股份有限公司 | 一种手持设备锁定、解锁方法和装置 |
US20110298584A1 (en) * | 2010-06-04 | 2011-12-08 | Kent Biggs | Securing a cash safe with a circuit |
EP2405650A1 (fr) * | 2010-07-09 | 2012-01-11 | Nagravision S.A. | Procédé de transfert sécurisé de messages |
KR20120058199A (ko) * | 2010-11-29 | 2012-06-07 | 한국전자통신연구원 | 위치정보를 이용한 사용자 인증방법 |
EP2646941A4 (fr) * | 2010-12-01 | 2017-04-19 | HID Global Corporation | Terminaux biométriques |
EP2689399B1 (fr) * | 2011-03-24 | 2016-11-16 | Recludo AB | Dispositif et procédé de commande d'autorisation biométrique autonome |
CN102324152A (zh) * | 2011-06-09 | 2012-01-18 | 闵浩 | 基于身份识别技术和移动通信技术的电子锁控制管理系统和方法 |
US8856893B2 (en) | 2011-06-09 | 2014-10-07 | Hao Min | System and method for an ATM electronic lock system |
CN102360477A (zh) * | 2011-06-09 | 2012-02-22 | 闵浩 | 基于指纹识别技术和移动通信技术的指纹密码锁控制管理系统和方法 |
WO2013034671A1 (fr) * | 2011-09-09 | 2013-03-14 | Param Technologies Corporation, S.L. | Appareil et procédé pour contrôler l'accès d'un visiteur à des locaux |
US20130090939A1 (en) * | 2011-10-11 | 2013-04-11 | Robert N. Robinson | Sytem and method for preventing healthcare fraud |
US20130090942A1 (en) * | 2011-10-11 | 2013-04-11 | Safe-Link, Llc | Sytem and method for preventing healthcare fraud |
CN102346945A (zh) * | 2011-10-28 | 2012-02-08 | 闵浩 | 基于双向加密认证技术和通信技术的电子锁控制管理系统和方法 |
CN102493722B (zh) * | 2011-12-05 | 2014-04-09 | 西安大唐电信有限公司 | 一种车辆运输电子锁应用系统及加解锁方法 |
CN104282068A (zh) * | 2012-03-15 | 2015-01-14 | 江苏省电力公司常州供电公司 | 变电所防误锁具的许可装置 |
WO2014028892A1 (fr) * | 2012-08-16 | 2014-02-20 | Schlage Lock Company Llc | Système et procédé de verrouillage électronique sans fil |
CN102855427B (zh) * | 2012-08-31 | 2016-03-02 | 小米科技有限责任公司 | 一种设备解锁方法、装置及用户设备 |
US20140279511A1 (en) * | 2013-03-14 | 2014-09-18 | Moneygram International, Inc. | Systems and Methods for Management of Local Devices |
KR101618541B1 (ko) | 2013-03-15 | 2016-05-04 | 스펙트럼 브랜즈, 인크. | 통합형 안테나, 터치 작동부 및 광통신 장치를 갖는 무선 잠금장치 |
WO2014147082A2 (fr) * | 2013-03-18 | 2014-09-25 | Serle Espig | Procédé de transfert de marchandise à transporter dans un récipient de transport pouvant être fermé, récipient de transport pouvant être fermé et système de transport |
CN103761966A (zh) * | 2013-12-25 | 2014-04-30 | 苏州市邦成电子科技有限公司 | 一种语音开锁系统 |
US9996999B2 (en) * | 2014-07-30 | 2018-06-12 | Master Lock Company Llc | Location tracking for locking device |
US9600949B2 (en) | 2014-07-30 | 2017-03-21 | Master Lock Company Llc | Wireless key management for authentication |
US9894066B2 (en) | 2014-07-30 | 2018-02-13 | Master Lock Company Llc | Wireless firmware updates |
US10008057B2 (en) | 2014-08-08 | 2018-06-26 | Live Nation Entertainment, Inc. | Short-range device communications for secured resource access |
US9489787B1 (en) | 2014-08-08 | 2016-11-08 | Live Nation Entertainment, Inc. | Short-range device communications for secured resource access |
KR102422372B1 (ko) * | 2014-08-29 | 2022-07-19 | 삼성전자 주식회사 | 생체 정보와 상황 정보를 이용한 인증 방법 및 장치 |
US20160116510A1 (en) | 2014-10-27 | 2016-04-28 | Master Lock Company | Predictive battery warnings for an electronic locking device |
CN104916022A (zh) * | 2015-06-16 | 2015-09-16 | 广州杰赛科技股份有限公司 | 一种智能锁控制方法、移动终端及智能锁系统 |
US9852562B2 (en) * | 2015-07-06 | 2017-12-26 | Acsys Ip Holding, Inc. | Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons |
CN105577805A (zh) * | 2015-12-29 | 2016-05-11 | 宁波艾谱实业有限公司 | 保险箱的远程控制方法及实现该方法的控制系统 |
US9984524B2 (en) | 2016-01-26 | 2018-05-29 | Acsys Ip Holding Inc | Systems and methods for remote access rights and verification |
WO2017165349A1 (fr) | 2016-03-22 | 2017-09-28 | Spectrum Brands, Inc. | Dispositif d'ouverture de porte de garage à authentification par capteur tactile |
US11881073B2 (en) | 2016-05-17 | 2024-01-23 | Peter Just | Access system and container for communal objects |
CN106056713B (zh) * | 2016-06-08 | 2019-02-15 | 珠海明居智能科技有限公司 | 一种密码锁的远程授权方法 |
CN105939193A (zh) * | 2016-06-22 | 2016-09-14 | 武汉市天晨翔云数据有限公司 | 控制智能锁的黑名单设置授权及加密方法 |
WO2018075605A1 (fr) | 2016-10-19 | 2018-04-26 | Best Access Solutions, Inc. | Noyau de verrou électromécanique |
CN106773757A (zh) * | 2016-12-13 | 2017-05-31 | 广东美的制冷设备有限公司 | 智能装置及家电设备 |
EP3361457B1 (fr) * | 2017-02-13 | 2023-07-12 | Diebold Nixdorf Systems GmbH | Dispositif d'entrée, distributeur de billets et procédé |
JP2018180624A (ja) * | 2017-04-04 | 2018-11-15 | グローリー株式会社 | 貨幣処理機、貨幣処理システムおよび貨幣処理方法 |
AU2018330295B2 (en) | 2017-09-08 | 2023-11-30 | Dormakaba Usa Inc. | Electro-mechanical lock core |
CN108182739A (zh) * | 2017-12-21 | 2018-06-19 | 广东汇泰龙科技有限公司 | 一种基于虹膜识别和蓝牙功能的云锁解锁方法、系统 |
US11450158B2 (en) | 2018-01-05 | 2022-09-20 | Spectrum Brands, Inc. | Touch isolated electronic lock |
US11466473B2 (en) | 2018-04-13 | 2022-10-11 | Dormakaba Usa Inc | Electro-mechanical lock core |
WO2019200257A1 (fr) | 2018-04-13 | 2019-10-17 | Dormakaba Usa Inc. | Partie centrale de verrou électromécanique |
CN109190366B (zh) * | 2018-09-14 | 2021-11-19 | 郑州云海信息技术有限公司 | 一种程序处理方法以及相关装置 |
US11639617B1 (en) | 2019-04-03 | 2023-05-02 | The Chamberlain Group Llc | Access control system and method |
US20200372743A1 (en) * | 2019-05-20 | 2020-11-26 | Popid, Inc. | Face based door entry |
GB2590357B (en) * | 2019-11-28 | 2022-12-21 | Paxton Access Ltd | Access control system and method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5259029A (en) * | 1990-05-16 | 1993-11-02 | Duncan Jr F Jeff | Decoding device for computer software protection |
US5367572A (en) * | 1984-11-30 | 1994-11-22 | Weiss Kenneth P | Method and apparatus for personal identification |
EP0935041A1 (fr) * | 1998-02-09 | 1999-08-11 | Christian Martineau | Dispositif et procédé de commande d'acces physique ou logique |
WO2001059725A1 (fr) * | 2000-02-08 | 2001-08-16 | Siemens Aktiengesellschaft | Procede de controle de l'identite d'un utilisateur |
EP1281588A2 (fr) * | 2001-08-01 | 2003-02-05 | Siemens Aktiengesellschaft | Procédé de transmission d'un code de verrouillage ou d'ouverture et unités associées |
US20030231103A1 (en) * | 2002-06-14 | 2003-12-18 | Fisher Scott R. | Electronic lock system and method for its use with card only mode |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB8813730D0 (en) * | 1988-06-10 | 1988-07-13 | Omni Services Ltd | Time defence system |
US5321242A (en) | 1991-12-09 | 1994-06-14 | Brinks, Incorporated | Apparatus and method for controlled access to a secured location |
US5774058A (en) * | 1995-07-20 | 1998-06-30 | Vindicator Corporation | Remote access system for a programmable electronic lock |
NO310087B1 (no) * | 1999-07-05 | 2001-05-14 | Jens Petter Hoeili | Fremgangsmåte og system for betalingstransaksjon |
-
2005
- 2005-10-24 EP EP05109900.0A patent/EP1780680B1/fr active Active
- 2005-10-24 ES ES05109900.0T patent/ES2664947T3/es active Active
-
2006
- 2006-10-19 ZA ZA200803528A patent/ZA200803528B/xx unknown
- 2006-10-19 CN CN2006800397857A patent/CN101297327B/zh not_active Expired - Fee Related
- 2006-10-19 AU AU2006307977A patent/AU2006307977B2/en active Active
- 2006-10-19 MY MYPI20081235A patent/MY149673A/en unknown
- 2006-10-19 WO PCT/EP2006/067589 patent/WO2007048749A1/fr active Application Filing
-
2008
- 2008-04-17 US US12/104,967 patent/US20090320538A1/en not_active Abandoned
-
2009
- 2009-04-16 HK HK09103516A patent/HK1125727A1/xx unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5367572A (en) * | 1984-11-30 | 1994-11-22 | Weiss Kenneth P | Method and apparatus for personal identification |
US5259029A (en) * | 1990-05-16 | 1993-11-02 | Duncan Jr F Jeff | Decoding device for computer software protection |
EP0935041A1 (fr) * | 1998-02-09 | 1999-08-11 | Christian Martineau | Dispositif et procédé de commande d'acces physique ou logique |
WO2001059725A1 (fr) * | 2000-02-08 | 2001-08-16 | Siemens Aktiengesellschaft | Procede de controle de l'identite d'un utilisateur |
EP1281588A2 (fr) * | 2001-08-01 | 2003-02-05 | Siemens Aktiengesellschaft | Procédé de transmission d'un code de verrouillage ou d'ouverture et unités associées |
US20030231103A1 (en) * | 2002-06-14 | 2003-12-18 | Fisher Scott R. | Electronic lock system and method for its use with card only mode |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103021045A (zh) * | 2011-09-25 | 2013-04-03 | 边高伟 | 移动终端用户验证智能门禁系统 |
CN103941971A (zh) * | 2013-01-17 | 2014-07-23 | 深圳富泰宏精密工业有限公司 | 屏幕解锁方法及系统 |
CN105069874A (zh) * | 2015-07-28 | 2015-11-18 | 北京航空航天大学 | 一种移动互联网声纹门禁系统及其实现方法 |
CN105225317A (zh) * | 2015-10-03 | 2016-01-06 | 上海大学 | 一种多路集中管理的网络门禁控制系统 |
CN106023373A (zh) * | 2016-05-23 | 2016-10-12 | 三峡大学 | 一种基于大数据与人脸识别的校园宿舍门禁系统 |
Also Published As
Publication number | Publication date |
---|---|
MY149673A (en) | 2013-09-30 |
ES2664947T3 (es) | 2018-04-24 |
ZA200803528B (en) | 2009-08-26 |
US20090320538A1 (en) | 2009-12-31 |
AU2006307977B2 (en) | 2012-03-01 |
EP1780680A1 (fr) | 2007-05-02 |
EP1780680B1 (fr) | 2018-01-17 |
CN101297327B (zh) | 2013-04-03 |
CN101297327A (zh) | 2008-10-29 |
HK1125727A1 (en) | 2009-08-14 |
AU2006307977A1 (en) | 2007-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1780680B1 (fr) | Procédé de contrôle de verrouillage de serrure, et serrure | |
ES2255111T3 (es) | Metodo y sistema para garantizar la seguridad de centros de gestion de llamadas telefonicas. | |
EP3420172B1 (fr) | Boitier sécurisé à contenu prédéterminé et gestion dynamique | |
EP0950303B1 (fr) | Procede et systeme pour securiser les prestations de service a distance des organismes financiers | |
EP1549011A1 (fr) | Procédé et système de communication entre un terminal et au moins un équipment communicant | |
CN102084369A (zh) | 用于监视对设备的未授权使用的系统 | |
FR2926938A1 (fr) | Procede d'authentification et de signature d'un utilisateur aupres d'un service applicatif, utilisant un telephone mobile comme second facteur en complement et independamment d'un premier facteur | |
EP1612991A1 (fr) | Procédé et système de vote électronique en réseau à haute sécurité | |
WO2013079848A1 (fr) | Protocole d'authentification mutuelle d' entitees ayant prealablement initie une transaction en ligne | |
EP3022867A1 (fr) | Procéde d'authentification forte | |
EP2987124B1 (fr) | Methode et systeme d'amelioration de la securite des transactions electroniques | |
EP1813052B1 (fr) | Procédé de sécurisation de transactions effectuées à distance sur un réseau de communication ouvert | |
FR2944400A1 (fr) | Procede d'authentification aupres d'un serveur par un utilisateur d'un appareil mobile | |
CN102986199A (zh) | 便携式通信终端、它的启动方法和网络通信系统 | |
EP3262553B1 (fr) | Procede de transaction sans support physique d'un identifiant de securite et sans jeton, securise par le decouplage structurel des identifiants personnels et de services | |
WO2007113669A1 (fr) | Securisation de transactions electroniques sur un reseau ouvert | |
FR2788154A1 (fr) | Supports et systemes d'echange de donnees securises notamment pour paiements et telepaiements | |
EP0935041A1 (fr) | Dispositif et procédé de commande d'acces physique ou logique | |
FR3081663A1 (fr) | Procede de gestion a distance de l'ouverture d'une serrure electronique dotee d'une interface utilisateur, terminal, serrure et programme d'ordinateur associes | |
WO2012022856A1 (fr) | Procédé d'authentification d' un utilisateur du réseau internet | |
FR3110748A1 (fr) | Programmation de badges d’accès à des locaux. | |
FR3116132A1 (fr) | Procede de d’authentification securise par le decouplage structurel des identifiants personnels et de services | |
JP2006209175A (ja) | 認証システム、プログラム、および認証システムにおける不正行為防止方法 | |
EP1669906A1 (fr) | Procédé de sécurisation pour appareil électronique | |
FR2790854A1 (fr) | Supports et systemes d'echange de donnees securises notamment pour paiement et telepaiements |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200680039785.7 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 3212/DELNP/2008 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006307977 Country of ref document: AU |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2006307977 Country of ref document: AU Date of ref document: 20061019 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2006307977 Country of ref document: AU |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06807414 Country of ref document: EP Kind code of ref document: A1 |