WO2009152628A1 - Procédé et système de contrôle d’accès - Google Patents

Procédé et système de contrôle d’accès Download PDF

Info

Publication number
WO2009152628A1
WO2009152628A1 PCT/CH2009/000202 CH2009000202W WO2009152628A1 WO 2009152628 A1 WO2009152628 A1 WO 2009152628A1 CH 2009000202 W CH2009000202 W CH 2009000202W WO 2009152628 A1 WO2009152628 A1 WO 2009152628A1
Authority
WO
WIPO (PCT)
Prior art keywords
access control
control medium
writing
access
reading device
Prior art date
Application number
PCT/CH2009/000202
Other languages
German (de)
English (en)
Inventor
Andreas HÄBERLI
Original Assignee
Kaba Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kaba Ag filed Critical Kaba Ag
Priority to EP09765310.9A priority Critical patent/EP2304693B1/fr
Publication of WO2009152628A1 publication Critical patent/WO2009152628A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00809Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission through the human body
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Definitions

  • the invention relates to the field as access control. It relates more particularly to an access control procedure and access control system based on an identification procedure (actually: authentication method).
  • Identification systems are used in different applications such as access control prepaid card systems, data acquisition systems, etc.
  • the wireless information transmissions for example via radio frequency signals, or microwaves (eg via GSM) are becoming increasingly important. Due to the comparatively large range, the potential problem of manipulation arises. Thus, for example, by means of a distance from a data exchange point (writing and / or reading device of a locking system of a prepaid card reader, etc.) a transmitter / receiver of a manipulator be set up by means of a so-called "man-in-the-middle" Attack or another vulnerability of the exchange protocol used exploiting exploitation is performed.
  • capacitive-resistive coupling also called 'capacitive coupling' or 'PAN coupling'
  • 'PAN coupling' capacitive-resistive coupling
  • a disadvantage of the capacitive-resistive coupling is the very low data transmission rate of the information transmission, which is generally achievable. This is because the communication device is generally set up to allow signal transmission through the human body. This prohibits high frequencies and high amplitudes.
  • a key is transmitted via the PAN coupling, which transmitted the in the subsequent communication via the RF channel
  • the invention is characterized essentially by the fact that for the access control in a first step, a wireless radio link (here are expressly meant in addition to radio frequencies communication via microwave frequencies or other frequencies of the electromagnetic spectrum) between the object to the access is sought, and an access control medium (mobile phone, other electronic device, smart card, etc.) is established.
  • an authentication procedure is initially performed, in which the access authorization of the access control medium is checked.
  • a temporary access code is sent from the object to the access control medium and sent back by this to the object, possibly in a modified form.
  • the capacitive-resistive coupling is used either for the return of the - optionally modified - access code to the object or possibly for the transmission of the access code to the access control medium; in the other direction the signal is sent via the wireless connection.
  • the object is a door with a mechatronic Locking device, which is in communication with a - optionally integrated in the locking device - writing and / or reading device, which in turn has means for communicating over the wireless connection and for receiving and / or transmitting capacitive-resistive signals.
  • the release of the object in this case corresponds to the mechatronic unlocking of the door.
  • the authentication method is any method of determining whether the access control medium is authorized to access the object. This can be done through a simple query of codes that must be present on the access control medium, over more complex, secure procedures. In particular, it is possible to carry out the authentication method in a manner known per se from the prior art or by means of a commercially available system whose protocol does not necessarily have to be known. In any case, the authentication method preferably provides a yes / no answer to the question whether the access control medium authorizes access in the present situation. Only if the answer is yes is a temporary access code generated and transmitted to the access control medium.
  • the access control medium constantly repeats the temporary access code or the data packet derived therefrom via the transmitter
  • a pair of electrodes present in the access control medium is supplied with a corresponding signal.
  • a receiver electrode e.g., a door handle, which is preferably as a receiver electrode or as part of the receiver electrode of the capacitive-resistive
  • the reception of the signal by the capacitive-resistive coupling receiver starts; wherein the signal path may pass through the user's body when carrying the access control medium in the pocket.
  • the data transmitted with the capacitive-resistive coupling may consist of a temporary access code (containing no access control medium-specific data) which may have been modified with a simple access control medium-specific operation. Adding an ID or other simple string is not excluded.
  • a security against manipulation consists on the one hand in the security of the selected wireless connection; available procedures often include one
  • the temporary access code is transmitted via the capacitive-resistive coupling-permanently-and then sent back via the existing wireless connection; it is easily possible for the recipient to verify that it comes from the same sender with which the successful authentication process was previously performed.
  • the method according to the invention brings practically no time delays which are recognizable to the user, since the back transmission of the optionally modified access code can take place immediately after its reception via the capacitive-resistive coupling, namely via the already established wireless connection.
  • Bluetooth Low Energy standard previously known under the name "Wibree.”
  • Wibree the Bluetooth Low Energy standard
  • the use of this comparatively short-range (approximately 10 m signal range) technology is advantageous in terms of safety because of the short range
  • they favor the "access control" application for the following reason: Doors in buildings are often not wired, and wiring would be very time consuming. Therefore, such stand-alone devices rely on battery power, which is undesirable for practical reasons when these batteries need to be replaced at high speeds, so the very energy-efficient Bluetooth Low Energy technology is actually the receiver for communications between and near sensors
  • the use of "normal” Bluetooth is likewise possible, with the disadvantage that the power consumption of such a system is higher.
  • the access control medium is preferably a portable device, for example a mobile telephone. In such is generally enough power available.
  • the access control medium assumes the role of "master" in Kiruninkation Bluetooth or Bluetooth Low Energy, ie the initialization of the connection is based on the access control medium.
  • maintenance data is transmitted from the writing and / or reading device (the door) to the access control medium, for example battery life data etc.
  • the non-wired write and / or Reading device via the access control medium trigger a warning signal or draw attention in another suitable manner to be remedied.
  • the procedure according to the invention is particularly suitable for applications in which the access control medium does not have to be actively handled by the user, for example, but can remain in his pocket.
  • the kapitizitiv-resistive coupling is then preferably primarily through the body of the user, which acts as a - bad - electrical conductor. Therefore, for the capacitive-resistive coupling, the ultra-wideband signal transmission using the frequency spreading method is therefore particularly preferred. This can cause the current amplitudes flowing through the body to be very small.
  • FIG. 1 is a sketch to illustrate the sequence in the inventive method
  • FIG. 2 shows an illustration of a mobile telephone as access control medium in a system according to the invention
  • FIG. and 3 shows a flow chart of an embodiment of a method according to the invention.
  • a user 1 can carry the access control medium 2, for example fastened in a pocket or on a belt. During the entire procedure, he does not have to take control of the access control medium.
  • the data exchange via the wireless connection already sets in while the user approaches the door.
  • the typical range for the preferably used here Bluetooth or Bluetooth low energy technology is about 10 meters.
  • the door handle 3.1 of the door is designed, for example, as a receiver electrode for the capacitive-resistive coupling.
  • the transmission of the data packet from the access control medium 2, for example through the body of the user 1 to the receiver electrode begins - in accordance with the method discussed in more detail below. If the data has been exchanged correctly and successfully, the door is released and the user can press the door handle. For him, the whole process is so, so whether the door would be constantly open.
  • the access control medium is designed as a mobile telephone 11.
  • the mobile phone has means for communicating via Bluetooth Low Energy technology.
  • it is provided with a transmitter (or possibly receiver, see below) for the capacitive-resistive coupling.
  • housing parts or a transparent display surface can be designed as corresponding electrodes 13, 14 or coated with them.
  • PCT / CH 2008/000057, PCT / CH 2008/000058 and PCT / CH 2008/000059 the contents of which are hereby incorporated by reference.
  • FIG. 3 shows a flow chart of an embodiment of a method according to the invention.
  • solid arrows between the boxes indicate signal transmissions over the wireless link (e.g., Bluetooth Low Energy)
  • the dotted arrow indicates capacitive-resistive data transmission.
  • the left column are states of the writing and / or reading device (the "door") listed in the middle column states of the access control medium (hereinafter it will be described as a mobile phone, the method would be carried out analogously on other access control media)
  • “Advertiser”, “Scanner”, “Initiator”, “Slave” and “Master” correspond to the terminology commonly used for Bluetooth Low Energy; the corresponding states will be briefly explained below.
  • RCID Rx and “JRCID Tx” stand for receiver respectively transmitter for the capacitive-resistive coupling;
  • Open refers to the state of the release of the object, eg. Unlocking the door.
  • the time axis runs in Fig. 3 from top to bottom.
  • the mobile phone may change from the scanner to the initiator role and ask the writer and / or reader for a wireless connection (step 32), then within about 2 seconds, for example, the secure one Bluetooth Low Energy connection is set up, whereby according to common terminology the mobile telephone functions as "master”, the writing and / or reading device as “slave” (step 33) the access authorization of the master has been checked (step 34).
  • the access control medium authorizes access, ie by means of a data exchange via a secure, for example encrypted connection - the data exchange can be based on the challenge-response method or another suitable method the access control medium required data and / or qualifications are available.
  • the procedure chosen during the authentication process will not be explained in detail here; It can be done according to the prior art or according to other suitable procedures.
  • This access code - or a quantity derived therefrom - is transmitted back to the writing and / or reading device repeatedly immediately and if necessary, the capacitive-resistive information transmission being used for this return (step 36).
  • the transmission of the access code or the derived size takes place, for example, until either a time limit (for example a value between 2 and 10 seconds) has been exceeded or the access code has been received by the writing and / or reading device.
  • the temporary access code from the writing and / or reading device capacitive resistive is transmitted to the mobile phone, and that this sends back the access code or the derived Great on the secure wireless connection, in which case the transmission of the access code by the writing and / or reading device can take place until either a time limit is reached or the returned access code or the derived variable is received via the secure connection.
  • the access code is, for example, a random number or random sequence or a variable composed or calculated from a random number / random sequence and further variables.
  • the method according to the invention can be implemented particularly simply if the temporary access code itself is sent back by the mobile telephone.
  • a possible derived large come of a unique number or The same, a time information, a further random variable, etc. added to the access code, sequences of the access code or a size obtained with a previously known operation on the possibly completed access code or sequences thereof.
  • test data for example test data, battery life data, status data etc.
  • the connection is terminated (here by the mobile telephone) (step 38), and the object is released, for example the door is unlocked (step 39).
  • the time is shown schematically, which is needed for the steps before or after first touching the door handle.
  • the particularly time-consuming process steps such as setting up the secure connection can already take place while the user approaches the door and, for example, between 1 and 5 s claim - in the example shown about 2 s.
  • long device detection times can be tolerated, which in turn makes long advertising intervals of the object or short active scanner times of the access medium possible. This reduces the power consumption both on the object and on the access medium, without affecting the comfort for the user.
  • the (return) transmission of the temporary access code and the release of the door are very fast processes that last at most a few tenths of a second, for example. Between 0.05 s and 0.5 s, in the example shown about 0.15 s. AlIe processes are thus characterized by a very low energy consumption and are therefore suitable to be run even with relatively small and / or long-lasting batteries, for example. Especially if the writing and / or reading device of the door as a non-wired, standalone 'device available is, whose battery then, for example, only every one to two years must be replaced.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L’invention se caractérise essentiellement en ce que, dans une première étape, en vue du contrôle d’accès, une liaison radio sans fil (ce qui sous-entend de façon explicite, outre la communication par radiofréquences, la communication au moyen de fréquences micro-ondes ou d’autres fréquences de spectre électromagnétique) est établie entre l’objet, auquel on cherche à accéder, et un moyen de contrôle d’accès (téléphone mobile, autre appareil électronique, carte à puce etc.). Au moyen de cette liaison sans fil, on effectue d’abord un procédé d’authentification dans lequel l’autorisation d’accès du moyen de contrôle d’accès est vérifiée. Un code d’accès provisoire est ensuite envoyé de l’objet au moyen de contrôle d’accès et renvoyé par celui-ci à l’objet, éventuellement sous une forme modifiée. Le couplage capacito-résistif est utilisé pour le renvoi du code d’accès – le cas échéant, modifié – à l’objet ou éventuellement pour l’envoi du code d’accès au moyen de contrôle d’accès. Le signal est envoyé au moyen de la liaison sans fil dans l’autre direction.
PCT/CH2009/000202 2008-06-18 2009-06-15 Procédé et système de contrôle d’accès WO2009152628A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP09765310.9A EP2304693B1 (fr) 2008-06-18 2009-06-15 Procédé et système de contrôle d' accès

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CH940/08 2008-06-18
CH9402008 2008-06-18

Publications (1)

Publication Number Publication Date
WO2009152628A1 true WO2009152628A1 (fr) 2009-12-23

Family

ID=40910732

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CH2009/000202 WO2009152628A1 (fr) 2008-06-18 2009-06-15 Procédé et système de contrôle d’accès

Country Status (2)

Country Link
EP (1) EP2304693B1 (fr)
WO (1) WO2009152628A1 (fr)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2400714A1 (fr) * 2010-06-24 2011-12-28 Broadcom Corporation Procédé et système pour filtrage de dispositif à plusieurs étages dans un dispositif à basse consommation Bluetooth
NL1038635C2 (en) * 2011-03-04 2012-09-05 Franken Soundproof communication booth access system.
EP2584541A1 (fr) * 2011-10-18 2013-04-24 EVVA Sicherheitstechnologie GmbH Procédé de contrôle d'accès
CN104183049A (zh) * 2014-09-02 2014-12-03 南京铁马信息技术有限公司 一种智能化的门禁定位系统及其定位方法
WO2015032979A1 (fr) * 2013-09-09 2015-03-12 Valeo Comfort And Driving Assistance Authentification d'un utilisateur muni d'un appareil mobile auprès d'un véhicule
WO2015066191A1 (fr) * 2013-10-29 2015-05-07 Cubic Corporation Perception de droits de transport a l'aide de balises sans fil
WO2018166942A1 (fr) * 2017-03-17 2018-09-20 Deutsche Telekom Ag Procédé de contrôle d'accès

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002031778A1 (fr) * 2000-10-13 2002-04-18 Nokia Corporation Systeme de verrouillage sans fil
DE10147936A1 (de) * 2001-09-28 2003-04-30 Siemens Ag Verfahren zur Zutrittskontrolle
DE10238134A1 (de) * 2002-08-15 2004-02-26 Ident Technology Ag Schaltungsanordnung für eine Fahrzeugtürverriegelung, sowie hiermit ausgestattetes Fahrzeug
WO2005034393A1 (fr) * 2003-10-06 2005-04-14 Valeo Securite Habitacle (Sas) Systeme d’acces mains-libres et de commandes de fonctions d’un vehicule automobile
WO2008098397A1 (fr) * 2007-02-14 2008-08-21 Kaba Ag Système et appareil portable pour l'émission de signaux d'identification

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE59915114D1 (de) * 1998-01-19 2010-02-04 Marquardt Gmbh Schliesssystem, insbesondere für ein kraftfahrzeug
TW200727609A (en) * 2005-09-27 2007-07-16 Kaba Ag A method and system for the transmission of identification signals

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002031778A1 (fr) * 2000-10-13 2002-04-18 Nokia Corporation Systeme de verrouillage sans fil
DE10147936A1 (de) * 2001-09-28 2003-04-30 Siemens Ag Verfahren zur Zutrittskontrolle
DE10238134A1 (de) * 2002-08-15 2004-02-26 Ident Technology Ag Schaltungsanordnung für eine Fahrzeugtürverriegelung, sowie hiermit ausgestattetes Fahrzeug
WO2005034393A1 (fr) * 2003-10-06 2005-04-14 Valeo Securite Habitacle (Sas) Systeme d’acces mains-libres et de commandes de fonctions d’un vehicule automobile
WO2008098397A1 (fr) * 2007-02-14 2008-08-21 Kaba Ag Système et appareil portable pour l'émission de signaux d'identification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"PERSONAL AREA NETWORKS (CONT.)", INTERNET CITATION, XP002999195, Retrieved from the Internet <URL:http://web.archive.org/web/20050301221244/http://www.wirelessdevnet.c om/channels/bluetooth/features/pans3.html> [retrieved on 20060713] *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2400714A1 (fr) * 2010-06-24 2011-12-28 Broadcom Corporation Procédé et système pour filtrage de dispositif à plusieurs étages dans un dispositif à basse consommation Bluetooth
US8554141B2 (en) 2010-06-24 2013-10-08 Broadcom Corporation Method and system for multi-stage device filtering in a bluetooth low energy device
US8849205B2 (en) 2010-06-24 2014-09-30 Broadcom Corporation Method and system for multi-stage device filtering in a bluetooth low energy device
NL1038635C2 (en) * 2011-03-04 2012-09-05 Franken Soundproof communication booth access system.
EP2584541A1 (fr) * 2011-10-18 2013-04-24 EVVA Sicherheitstechnologie GmbH Procédé de contrôle d'accès
AT512075A1 (de) * 2011-10-18 2013-05-15 Evva Sicherheitstechnologie Verfahren zur zutrittskontrolle
FR3010571A1 (fr) * 2013-09-09 2015-03-13 Valeo Securite Habitacle Authentification d'un utilisateur muni d'un appareil mobile aupres d'un vehicule
WO2015032979A1 (fr) * 2013-09-09 2015-03-12 Valeo Comfort And Driving Assistance Authentification d'un utilisateur muni d'un appareil mobile auprès d'un véhicule
US9870663B2 (en) 2013-09-09 2018-01-16 Valeo Comfort And Driving Assistance Authentication of a user provided with a mobile device by a vehicle
WO2015066191A1 (fr) * 2013-10-29 2015-05-07 Cubic Corporation Perception de droits de transport a l'aide de balises sans fil
US9317976B2 (en) 2013-10-29 2016-04-19 Cubic Corporation Fare collection using wireless beacons
AU2014342341B2 (en) * 2013-10-29 2019-07-25 Cubic Corporation Fare collection using wireless beacons
CN104183049A (zh) * 2014-09-02 2014-12-03 南京铁马信息技术有限公司 一种智能化的门禁定位系统及其定位方法
WO2018166942A1 (fr) * 2017-03-17 2018-09-20 Deutsche Telekom Ag Procédé de contrôle d'accès
KR20190128210A (ko) * 2017-03-17 2019-11-15 도이체 텔레콤 악티엔 게젤샤프트 액세스 제어를 위한 방법
KR102341274B1 (ko) 2017-03-17 2021-12-21 도이체 텔레콤 악티엔 게젤샤프트 액세스 제어를 위한 방법
US11348392B2 (en) 2017-03-17 2022-05-31 Deutsche Telekom Ag Method for access control

Also Published As

Publication number Publication date
EP2304693A1 (fr) 2011-04-06
EP2304693B1 (fr) 2016-08-31

Similar Documents

Publication Publication Date Title
EP2304693B1 (fr) Procédé et système de contrôle d&#39; accès
EP2238576B1 (fr) Procédé et dispositif de commande du contrôle d&#39;accès
DE102017210523B3 (de) Verfahren zum Betreiben einer passiven funkbasierten Schließvorrichtung und passive funkbasierte Schließvorrichtung
EP1069265A2 (fr) Dispositif d&#39;autorisation d&#39;entrée et dispositif d&#39;autorisation combinée d&#39;entrée et d&#39;utilisateur
DE102013224330A1 (de) Verfahren und System zum Erkennen von Annäherung eines Endgeräts an ein Fahrzeug, das auf der Information über eine Signalstärke basiert, die über einen Bluetooth-Sendekanal von geringer Energie (BLE) empfangen wird
WO2007033940A2 (fr) Procede d&#39;entree en communication entre des abonnes d&#39;un systeme de communication et abonnes
EP3580938B1 (fr) Procédé de détermination de la position relative d&#39;un dispositif ble par rapport à un véhicule
EP1041224A2 (fr) Dispositif et procédé de libération d&#39;un système de sécurité, en particulier d&#39;un système d&#39;accès pour véhicule automobile
DE102014001224A1 (de) Verfahren zur personenselektiven Zutrittskontrolle
EP3580942B1 (fr) Procédé de détection de l&#39;intensité du signal pour la détermination de la position d&#39;un dispositif ble mobile sur la base de l&#39;intensité du signal
EP3504688A1 (fr) Dispositif de fermeture à clé radio pour un véhicule automobile, véhicule automobile et procédé permettant de faire fonctionner le dispositif de fermeture
EP1317824A2 (fr) Procede et systeme de controle d&#39;acces
DE102015105001A1 (de) Vorrichtung zum Schließen und/oder Öffnen
EP3278311A1 (fr) Système de surveillance d&#39;un dispositif fonctionnant au moyen d&#39;une batterie
EP2584541B1 (fr) Procédé de contrôle d&#39;accès
DE102008007842B3 (de) Synchronisation der Kommunikation zwischen Identifikationsgeber und Fahrzeugstation einer Zugangsvorrichtung
EP2469481A1 (fr) Système de sécurisation et procédé de sécurisation
EP2859536B1 (fr) Procédé de preuve sécurisée par cryptographie de la présence d&#39;un jeton d&#39;identité dans la zone d&#39;un capteur d&#39;identité, ainsi que capteur d&#39;identité pour un tel procédé
EP2063380A2 (fr) Appareil de communication destiné à la transmission de données sans contact par l&#39;intermédiaire d&#39;un champ de proximité
EP1768316B1 (fr) Déblocage d&#39;une carte mobile
EP3444150B1 (fr) Sécurisation d&#39;une communication radio pour systèmes d&#39;accès au véhicule
EP3441948A1 (fr) Système de fermeture, verrou électronique pour un système de fermeture et procédé de fonctionnement d&#39;un système de fermeture
DE10233122A1 (de) Zugangssystem
EP3766268B1 (fr) Procédés et dispositifs pour émettre et identifier des indicatifs radio
EP1106450A2 (fr) Dispositif d&#39;activation et/ou de désactivation pour un dispositif de sécurité

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09765310

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2009765310

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2009765310

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE