WO2012078061A1 - Système et méthode d'exploitation de gestion d'accès biométrique sans fil - Google Patents

Système et méthode d'exploitation de gestion d'accès biométrique sans fil Download PDF

Info

Publication number
WO2012078061A1
WO2012078061A1 PCT/PT2010/000054 PT2010000054W WO2012078061A1 WO 2012078061 A1 WO2012078061 A1 WO 2012078061A1 PT 2010000054 W PT2010000054 W PT 2010000054W WO 2012078061 A1 WO2012078061 A1 WO 2012078061A1
Authority
WO
WIPO (PCT)
Prior art keywords
module
user
biometric
key
random code
Prior art date
Application number
PCT/PT2010/000054
Other languages
English (en)
Inventor
Rui Manuel Lopes Da Silva
Luís Carlos MARTINS FERREIRA
Amadeu Luís DA MOTA ALVES
Original Assignee
Yonos, Lda.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yonos, Lda. filed Critical Yonos, Lda.
Priority to EP10816396.5A priority Critical patent/EP2649590B1/fr
Priority to PCT/PT2010/000054 priority patent/WO2012078061A1/fr
Publication of WO2012078061A1 publication Critical patent/WO2012078061A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/12Comprising means for protecting or securing the privacy of biometric data, e.g. cancellable biometrics
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/61Signal comprising different frequencies, e.g. frequency hopping

Definitions

  • the present invention relates to access control systems and methods, more specifically to wireless remote access control and, in particular, fingerprint enabled wireless remote access control systems and methods .
  • the present invention describes a wireless biometric access control system host which comprises:
  • a preferred embodiment further comprises a communication module (390) for connection (391, 501) with an external computer ( 500 ) .
  • a preferred- embodiment further comprises -visual indicators (330) and/or a display (350) .
  • the present invention also describes a wireless biometric access control system remote control comprising:
  • biometric sensor (220); user channel id keys and/or keypad module (210) ; controller module (240) ; random number generator module; user group selector module (270); memory module, configured to store at least one user random code and a biometric key; comparator module, configured to compare user random codes; wireless module (250)., able to emit and receive a first and a second separated radio signals; encryption module, ' configured to encrypt a biometric key.
  • a preferred embodiment further comprises a key stuck module .
  • the present invention also describes an operation method of a wireless biometric access control system host comprising the steps:
  • biometric key or said user group id have not been previously registered in the database module, verifying if a suitable combination of user and administrator keys has been activated signalling a new registration operation; if verified, verifying through the comparator module if there is any previously stored biometric key in the database module for the identified user; if not verified, prompting for a new user id; verifying said user id is new in the database module; if verified, registering said user id, said random code and said user group id in the database module; storing the biometric key(s) for the identified user in the database module.
  • the present invention also describes an operation method of a wireless biometric access control system remote control comprising the steps:
  • a key module (210); generating a new random code in a random code module; repeating said generation of a new random code until it is verified that said random code is not present in a memory module for previously stored random codes; storing said random code in the memory module; emitting a first signal with a system id, a channel id, said random code, and a user group id; verifying if there is a previously and temporarily stored biometric key in the memory module; if not verified, resuming power to biometric scanner (220), scanning a biometric signature, interrupting power to the biometric scanner (220), and storing said biometric information as a biometric key; encrypt the biometric signature through an encryption module using said random code emitting a second signal with said random code and an encrypted biometric signature obtained using said stored biometric key and the random code.
  • a preferred embodiment further comprises the step that after a preset time without use, the previously stored biometric key data is permanently erased from the remote control .
  • the biometric sensor (220) is a fingerprint sensor.
  • the proposed invention refers to a wireless fingerprint recognition remote control 200 that .transmits the encrypted user " fingerprint data namely through two separated wireless radiofrequency signals 251/311 and 252/312. This secured process also means that fingerprint data is not permanently stored on the remote control 200 device and is only verified on the host controller.
  • the system is designed to provide a secure access 341 to the controlled device 400 allowed or halted by host controller 300 through the .fingerprint remote control 200 by the user .100 and its fingerprint 111.
  • the controlled device 400 can be, for example, door lock, alarm system, automatic . door/gates, .rolling shutters, barriers, swing or. slide gates, access control system,...
  • the user 100 selects the known host controller .300 by selecting one of four (or more) channels keys .210 through action indicated by arrow 110.
  • the controller module 240 collects this data together with a random code generated by the random number module and the user group selector module, typically done by a dipswitch, 270.
  • the random code is intended to be used to encrypt data to be sent later by the RF packet 252.
  • the packed data is sent to the host controller 300 through the wireless module 250 sending the first RF communication packet 251.
  • the subsystem 300 receives the RF packet data through the wireless module 310 and checks through comparator module in • the controller- 3-20 module.
  • configuration 380 (typically done by a dipswitch described as the system channel ID module) communication is established. Note that both the selector keys module 210 and the channel ID module 380 can optionally be used in combination with pairing modules.
  • the next step is to verify, by using the comparator module, if the random code was used before, by checking against the previous list saved on the memory module. If the first received packet sent through 251 matches with the whole host controller 300 data or configuration modules, then an acknowledge (ACK) feedback packet is sent by the communication 311 through the wireless module 310 and the system proceeds with the second process. If not, a Not acknowledge (NAK) feedback packet is sent and the remote control 200 restarts its process from the beginning, i.e. the first process.
  • ACK acknowledge
  • NAK Not acknowledge
  • the second process is . triggered by acknowledge message 311 received from the module 310, the user 100 is then asked by lighting green led 230 to pass his fingerprint 111 over the fingerprint sensox module 220 . At this stage the finger print sensor module 220 is activated. If the biometric signature is received the system processes the biometric data through the controller/memory module 240 and temporarily saves the biometric data in the memory module, which is useful for the user in case he needs to access consecutive multiple points, as he only has to scan his fingerprint once (After a preset timeout the biometric data is permanently erased from the memory module) .
  • the biometric signature is encrypted by ⁇ using the encryption module and the random code which was previously generated and stored by the .respective .random code and memory modules. This information is packed and sent through the- RF signal 252 by the wireless -module 250 to the . RF module 310. Once received by the host controller 300, ' this encrypted biometric signal is acknowledged by signal. 312 and decrypted in the decryption module by using the previously saved random code. The biometric signature is checked in the comparator module, against the biometric user list stored on the database memory module , present- on the sub-system 320. If the user 100 was already registered on the host controller 300 the system sends an enable signal 341 to the controlled device 400 through output control 340. Otherwise the system keeps on the current disabled status signal access.
  • the remote control .200 is in stand-by mode waiting to be triggered by keys 210. Once triggered, a key scan is performed by the key scan module to determine which key was pressed.
  • the Key Stuck module present in "the remote control module 200, monitors for stuck keys in the key module 210 (A Stuck Key occurs when some object is accidentally placed on the remote control, pressing down keys unknowingly) .
  • the administrator 600 For registering, deleting and resetting the host controller 300, the administrator 600 has full access by enabling 61.1 the administrator key 360 typically done by a key switch. This key enables the functions of registering a user by pressing the register key 371 or deleting a registered user in the database module by pressing the delete key 372. Additionally, to perform those functions the user or administrator also has access to the human interface devices such as the keypad 374 and the, namely dot matrix LCD, display 350. An optional software hosted by PC 500 can also be used to have access to these functions.
  • the bidirectional communication 391 and 501 between the. host controller 300 and Personal Computer 500 is done through, namely, the serial communication module 390.
  • Both subsystem 200 and 300 have the respective reset buttons 260 and 373. " Just pressing them will optionally restart the system in case of crash. Combining reset key 260 with any of four keys 210, optionally deletes all the saved random codes on the system on the remote contxol 200 while the reset key 373 in combination with delete key 372 on the host controller 200 optionally erases all the user data present on the system. Host controller leds -330 serve to signal operations or system status to the user and/or administrator..
  • the fingerprint sensor 220 could be replaced by any appropriate means for identifying a person, namely biometric, namely iris scanner, hand dimension scanner, face feature scanner, etc.
  • the invention presents, namely, the following advantages:
  • the system can be used to access consecutive areas in a preset short time with just one finger print scan temporarily stored in the memory module;
  • the system can be used for multiple applications, typically door lock, alarm system, automatic door/gate.s, rolling shutters, barriers, swing or slide gates, access control system; -
  • the information scanned on the remote is encrypted in the encryption module when transmitted, by using the generated .random code as the encryption key;
  • the remote stores temporarily the biometric data, reduces the number of times the finger print sensor module is activated. These will result in less frequent recharge of batteries or even allow the use of normal ones;
  • the user group module concept will contribute to significantly speed up the verification access process for large groups of users.
  • Main purpose user carries just one remote control 200 device to access any programmed host receiver 300 system.
  • the complete access system information is separated in two communication parts: first information is transmitted over a carrier frequency through communication 251/311 of namely 433MHz (for US region power must or can be reduced) and the second is sent in carrier frequency through communication 252/312 of namely 868MHz or 915MHz (.for US region) as shown in figure 15.
  • the first info is the basic system information and identification while the second is the fingerprint user.
  • the whole system can operate by using just one carrier frequency togethex with the frequency hopping technology; in " this case there is no second transceiver installed.
  • the user biometric signature 111 is the key, the biometric signature is .registered and verified on the host controller 300 thus, you can use any remote control 200 or even if you lose the remote control you can just obtain another one .
  • the biometric signature is temporary stored on the remote control memory module for easy access on multiple .access area, after this short period of time is permanently deleted from the memory module.
  • Random code transmissions up to 2n for each registered user are generated and are not repeated for that user. Note that all the random codes are stored and generated on the remote control 200 ' s random module and stored on the host control 300 database module in order not to repeat the same code. Expandable memory according to the customer ' s requirements. Initially the system is ⁇ designed for home users (medium/small family) but for buildings could ask for extra memory capacity. For this situation the system optionally allows. memory expandable sockets..
  • the user database module is optionally divided by group users 700, 710 and 720 and user data 70.1, 702 and 703 for example for each user group 711, 712, 713, 721, 722, 723.
  • the first task is usually looking by the user group by using the comparator module and then the user data which contains the biometric fingerprint and the latest 2 n used random codes.
  • the Figure 16 explains the database user storage structure.
  • One given user 100 can .register more than one biometric signature 810, 820 and 830. This is done by the user 100 (with the administrator authorization) through inputting the User identification key 800 (User ' ID) in the register process. Further it is possible " to generate or reset the random codes for any user.
  • Figure 17 details the mechanism.
  • the system performs the communication using a set of device and user properties.
  • the overall string communication is, in a preferred embodiment, composed by:
  • the Random code [encrypted User Biometric Signature] transmitted . over -the second signalEac separated transmission frequency signal optionally combines the frequency hopping technology. To have a relationship/connection between the two substrings, the Random code is optionally used as the connection between them.
  • Each valid transmitted packet, within a random code, should usually be ' validated by an ⁇ ACK message from the host receiver, shown as follow:
  • Fig. 9 Host controller system architecture
  • Fig. 10 Host control flow chart: scan, process and decoding signal and access.
  • Fig. 11 Host- control flow chart: registry process.
  • Fig. 13 - Host control flow chart optionally erase user registry and/or removing user process.
  • the figure 3 shows the block diagram for a preferred embodiment for the present remote control system invention.
  • the system comprises the following items:: 4 Keys Key fob (1100) : to select the channel or system to communicate;
  • Reset Button (1400) internal button used to erase all the random codes used on ⁇ the remote control device and/or restart the controller;
  • Internal/external memory (1020) ⁇ to store all the data necessary to deal by the microcontroller and according with system specifications.
  • User Group (1300) used for identify the user group identification on the host database.
  • the dashed boxes means that those components can be integrated in the same module, i.e. if the microcontroller has enough memory to store the 2 n random generated code the microcontroller 1010 and memory 1020 is on the same IC 1000, integrated circuit 1000, module 1000, etc... otherwise they are separated. This applies also to the wireless modules (1600).
  • the system also provides the appropriate connections (1710 1720, .1730, 1740) .
  • the figure 4 shows the system architecture.
  • microcontroller microcontroller .
  • D is for DIP package SI and S2 is for SMD version, for more details refer to the product datasheet.
  • ** "GEN” is a generic component reference for any easily available part, of common and direct knowledge in the area.
  • the system optionally performs a battery level monitoring (3000, 3100, 3200) in order to advise the user to replace by fresh units.
  • a battery level monitoring (3000, 3100, 3200) in order to advise the user to replace by fresh units. The operation is done as explained on flow chart from Fig. 5.
  • Reset button (3300) is intended to be used to restart all the system (3500) in case of crash or hang.
  • Another function of this key in combination with any of the 4 key fobs (3400) is to optionally allow the administrator deleting all random codes (3410) stored on the memory.
  • the flow chart from Fig. 6 explains the operation.
  • the flux diagram from Fig. 7 shows the remote control functionality (4000-4720) .
  • the process ⁇ remains on a keyscan mode (4000) and waits for any pressed button (4100) and starts by generating and storing a non repetitive random code (4120, 4200 and 4210) and starting to transmit the first part of the information (4220).
  • the system is looking for a biometric signature stored on the temporary memory (4300) and if available in the memory, encrypts the stored biometric signature together with the previous generated random code (4310) and saves it on the memory (4320) . Finally, it ' transmits the random code and the previous encrypted data (4330) and gives feedback to the user by optionally blinking twice the green LED (4340) .
  • biometric signature is not on the memory (4300) then the system wakes up (4400) and informs the user (4410) and enables the biometric sensor scan mode (4420). If the biometric signature is received successfully (4500) then the remote stores it temporarily on the memory (4510) and permanently deletes it from memory if an optionally timeout is set (4600 and 4610). Also a timeout is set for biometric signature scan process (4700, 4710 and 4720) to avoid unwanted operations.
  • system should optionally enable stand-by mode (4350) in the finger print circuitry and/or other non relevant .hardware in order to save battery life.
  • Biometric Signature corresponds to biometric key or, simply, BioKey
  • Random Code corresponds Ran# .
  • the figure 8 shows the block diagram for host receiver/control.
  • the system comprises the following items: Administrator Key (5100) ⁇ : to .register new or erase existing users, allow communication with a computer by using software for administration purposes.
  • Register (5110) and delete (5120) user buttons allow administrator add or remove users without using computer software.
  • Reset button (5130) just pressing this button performs a system refresh this is the soft reset operation .
  • system administrator can erase all registered users doing a hard reset operation by pressing this button simultaneously with delete button, administrator key must optionally be enabled to perform this operation.
  • Channel ⁇ ID (5140) to identify the host receiver.
  • Red/Green Led Status (5500): info feedback remote control status for the user/administrator;
  • RS232 port (5820): communication between computer ' ' software and the receiver.
  • Microcontroller to process all the input data from the receiver, software manager and status buttons;
  • Internal/external memory to store all the data necessary to deal by the microcontroller and according with system specifications.
  • Output Control digital output to grant/deny access to the controlled device/unit.
  • the controlled device/unit is a device that controls, for example, a door lock, alarm system or automatic door/gates, rolling shutters, barriers, swing and slide gates.
  • Dot Matrix LCD Liquid crystal display is used to show display information to the user.
  • Input Keypad (5150)-: Keyboard used to input information or control system functions.
  • Appropriate communications 5600, 5700, 5800, 5900 are provided .
  • the dashed boxes means that those components can be integrated in the same module, i.e. if the microcontroller 5010 and memory 5020 can be on the same element 5000, be it an integrated circuit, module, etc... otherwise they are separated. This applies also to the wireless modules 5200.
  • Input device used to control
  • Communications between microcontroller and the other elements typically can be done either by SPI (6810) or 8 bit parallel (6820, 6830, 6840).
  • FIG 10,11,12,13,14 shows the host receiver/control functionality .
  • Fig 10, A000 is the beginning of the main process (7000- 7091)A001 is the start of the scan RF process.
  • A200 is the Random code cleaning.
  • ⁇ 100 is the user registry process (7100-7145)
  • Fig 12,A300 is the erase user data process (7200-7241 ) and Fig 13, ⁇ 310 ⁇ (7300-7322) continues this process;
  • Main process starts with check if admin key (7000) is not enabled.
  • System starts to scan for an RF-signal (7001) and decodes it (7010). If valid string format (7010), system id (70.20) and channel ID (7030) match, system stores new random code, user group ID and feeds back to user (7031). If no matching found, system returns to the beginning.
  • system registers random code for this user (7081) enabling access (7082)and feeds back to user (7083).
  • User registry process starts with the registry counter reset (7100), if admin key (7.110), register key (7120) are enabled and if it is first registration (7130), system prompts user (7131) for new user ID and waits for input (713.2) .
  • System searches for user ID in database ( 7133) and if not found (7140) it registers the random code and ew user ID(7142), registers the user group . ID
  • system proceeds with adding a biokey user (7144).
  • Erase user data process starts if erase key is enabled (7200).
  • the system resets the delete counter (7201), prompts for the user ID to be deleted (7202) and waits for user input (7203) .
  • System searches for user ID (7204) and if found (7210) feeds back to the user (7211) prompting for deletion of user random code numbers (7.212). If neither register key (7220) nor delete key (7230) are pressed, system waits for input at (7212).. By pressing register key (7220) as "yes” system removes all random codes for selected user and feeds back to the user (7221). By pressing delete key (7230) as "no” system continues to (A310) .
  • systems feeds back- to the user (7213) and checks number of attempts ⁇ (7240) . If number is less than three , counter is incremented (7242) and returns to prompt (7202). If maximum number of attempts reached, system feeds back to user (7241) and goes to (A200) .
  • Continuation of Erase user data process starts with prompt to user to delete user ID (7300) . If neither .register key (7310) nor delete key (7320) are pressed, system waits for input at (7300) . " By pressing register key (7310) as “yes” system removes all user data (7311, 7312, 7313) for selected user and feeds back to the user (7314,7315) . By pressing delete key ( ' 7320) as “no” system feeds back to the user (7321, 7322) and goes to (A200)..
  • Fig 14 is the optional hard reset operation (9000-9220). If the admin key (9000), delete button (9.100) and reset button (9200) are simultaneously activated, all registered users are deleted (9210) and the system is reset (9220) . Note from “the flow chart of figure 14
  • SP.I Serial Peripheral Interface Bus or SPI Bus is a synchronous serial data link standard that operates in- full duplex mode.
  • RS232 Recommended Standard 232 is a standard .for serial binary single-ended data and control signals connecting between a DTE (Data Terminal Equipment) and a DCE (Data Circuit-terminating Equipment) .
  • DTE Data Terminal Equipment
  • DCE Data Circuit-terminating Equipment
  • Low Voltage Detect is an electronic device used to generate an electrical signal when the reading voltage falls below .a preset reference voltage. Sometimes is combined with Power-on reset (POR) and then it is called POR-LVD .
  • POR Power-on reset
  • Output Control, output digital signal or electrical signal is used to enable or grant access to the controlled device.
  • ISM, industrial, scientific and medical radio bands were originally reserved internationally for the use of RF electromagnetic fields for industrial, scientific and medical purposes other than communications.
  • communications equipment must accept any interference generated by ISM equipment
  • Short Range Devices are radio devices that offer a low risk of interference with other radio services, usually because their transmitted power, and hence their range, is low.
  • the definition 'Short Range Device' may be applied to many different types of wireless equipment, including various forms of:
  • Access control including door and gate openers
  • CCTV Closed-circuit television
  • Radio frequency identification RFID
  • Short range devices often benefit from a relaxed regulatory .regime compared . with other radio communications equipment.
  • a user is licence free to operate such equipment, some specific cases may require an individual licence.
  • R&TTE Radio and Telecommunications Terminal Equipment

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Selective Calling Equipment (AREA)
  • Collating Specific Patterns (AREA)

Abstract

L'invention concerne une commande à distance à reconnaissance d'empreintes digitales sans fil (200) qui transmet les données chiffrées d'empreintes digitales de l'utilisateur (100) via deux signaux radiofréquence sans fil séparés (251/311 et 252/312). Ce processus sécurisé signifie également que les données d'empreintes digitales ne sont pas stockées à demeure sur le dispositif de commande à distance (200) et qu'elles sont uniquement validées au niveau du contrôleur hôte (300). Le système est conçu pour fournir une activation d'accès sécurisée (341) au dispositif commandé (400) par un contrôleur hôte (300) par l'intermédiaire de la commande à distance d'empreintes digitales (200) par l'utilisateur (100) et les empreintes digitales respectives (111). Le dispositif commandé (400) peut être, par exemple, un verrou de porte, un système d'alarme ou des systèmes automatiques de portes/portails, stores roulants, barrières, portails articulés ou coulissants ou tout autre système de commande d'accès. Le système comprend aussi des moyens d'interaction utilisateur (110), une connexion (391, 501) PC (500) et des fonctionnalités (611) administratives (600).
PCT/PT2010/000054 2010-12-06 2010-12-06 Système et méthode d'exploitation de gestion d'accès biométrique sans fil WO2012078061A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP10816396.5A EP2649590B1 (fr) 2010-12-06 2010-12-06 Système et méthode d'exploitation de gestion d'accès biométrique sans fil
PCT/PT2010/000054 WO2012078061A1 (fr) 2010-12-06 2010-12-06 Système et méthode d'exploitation de gestion d'accès biométrique sans fil

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/PT2010/000054 WO2012078061A1 (fr) 2010-12-06 2010-12-06 Système et méthode d'exploitation de gestion d'accès biométrique sans fil

Publications (1)

Publication Number Publication Date
WO2012078061A1 true WO2012078061A1 (fr) 2012-06-14

Family

ID=44227948

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/PT2010/000054 WO2012078061A1 (fr) 2010-12-06 2010-12-06 Système et méthode d'exploitation de gestion d'accès biométrique sans fil

Country Status (2)

Country Link
EP (1) EP2649590B1 (fr)
WO (1) WO2012078061A1 (fr)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318655A (zh) * 2014-11-03 2015-01-28 无锡港湾网络科技有限公司 一种智能小区监控方法
US8990922B2 (en) * 2013-05-01 2015-03-24 Cheng Uei Precision Industry Co., Ltd. Access control system and control method thereof
CN106447877A (zh) * 2016-11-29 2017-02-22 北京小米移动软件有限公司 智能设备的开启方法、装置及服务器
US9582127B2 (en) 2014-04-04 2017-02-28 Synaptics Incorporated Large feature biometrics using capacitive touchscreens
CN107680227A (zh) * 2017-10-20 2018-02-09 莲花丝路科技有限公司 一种智能锁低功耗远程控制系统的使用方法及系统
WO2018054128A1 (fr) * 2016-09-23 2018-03-29 若一思 图斯布雷⋅史蒂芬⋅ Verrou à empreinte digitale, appareil de traitement d'empreinte digitale et système de verrou à empreinte digitale
CN108230493A (zh) * 2017-12-19 2018-06-29 资密科技有限公司 智能锁系统的控制方法及智能锁系统
CN110690965A (zh) * 2019-10-10 2020-01-14 山东浪潮人工智能研究院有限公司 一种无线通信安全系统
CN110853198A (zh) * 2019-11-28 2020-02-28 北京市商汤科技开发有限公司 目标识别装置、数据处理方法、电子设备和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998012670A1 (fr) * 1996-09-18 1998-03-26 Dew Engineering And Development Limited Systeme biometrique d'identification garantissant la securite des acces
WO2005054977A2 (fr) * 2003-12-02 2005-06-16 Multimedia Glory Sdn. Bhd. Procede et systeme pour identifier et verifier par procede electronique un individu qui se soumet a l'identification et a la verification
WO2007011311A2 (fr) * 2005-07-18 2007-01-25 Kristalbond Technologies (Singapore) Pte Ltd. Systeme de repondeur biometrique
EP1760667A2 (fr) * 2005-08-24 2007-03-07 Agilent Technologies, Inc. Dispositif d'identification biométrique

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998012670A1 (fr) * 1996-09-18 1998-03-26 Dew Engineering And Development Limited Systeme biometrique d'identification garantissant la securite des acces
WO2005054977A2 (fr) * 2003-12-02 2005-06-16 Multimedia Glory Sdn. Bhd. Procede et systeme pour identifier et verifier par procede electronique un individu qui se soumet a l'identification et a la verification
WO2007011311A2 (fr) * 2005-07-18 2007-01-25 Kristalbond Technologies (Singapore) Pte Ltd. Systeme de repondeur biometrique
EP1760667A2 (fr) * 2005-08-24 2007-03-07 Agilent Technologies, Inc. Dispositif d'identification biométrique

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8990922B2 (en) * 2013-05-01 2015-03-24 Cheng Uei Precision Industry Co., Ltd. Access control system and control method thereof
US9582127B2 (en) 2014-04-04 2017-02-28 Synaptics Incorporated Large feature biometrics using capacitive touchscreens
CN104318655A (zh) * 2014-11-03 2015-01-28 无锡港湾网络科技有限公司 一种智能小区监控方法
WO2018054128A1 (fr) * 2016-09-23 2018-03-29 若一思 图斯布雷⋅史蒂芬⋅ Verrou à empreinte digitale, appareil de traitement d'empreinte digitale et système de verrou à empreinte digitale
CN106447877A (zh) * 2016-11-29 2017-02-22 北京小米移动软件有限公司 智能设备的开启方法、装置及服务器
CN107680227A (zh) * 2017-10-20 2018-02-09 莲花丝路科技有限公司 一种智能锁低功耗远程控制系统的使用方法及系统
CN108230493A (zh) * 2017-12-19 2018-06-29 资密科技有限公司 智能锁系统的控制方法及智能锁系统
CN110690965A (zh) * 2019-10-10 2020-01-14 山东浪潮人工智能研究院有限公司 一种无线通信安全系统
CN110690965B (zh) * 2019-10-10 2022-09-13 山东浪潮科学研究院有限公司 一种无线通信安全系统
CN110853198A (zh) * 2019-11-28 2020-02-28 北京市商汤科技开发有限公司 目标识别装置、数据处理方法、电子设备和存储介质

Also Published As

Publication number Publication date
EP2649590A1 (fr) 2013-10-16
EP2649590B1 (fr) 2015-12-02

Similar Documents

Publication Publication Date Title
EP2649590B1 (fr) Système et méthode d'exploitation de gestion d'accès biométrique sans fil
CN101872542B (zh) 用于发送射频控制信号的发射机和方法
JP4848360B2 (ja) ワイヤレス認証方法及びワイヤレス認証システム
US8093988B2 (en) Entry control system and entry control method
US20180007041A1 (en) Event driven second factor credential authentication
CA2527836C (fr) Systeme de securite en-circuit et procedes de commande d'acces a et d'utilisation de donnees sensibles
US20130272714A1 (en) State Control System and State Control Method
EP1760985A2 (fr) Authentification de dispositif utilsant un protocole unidirectionnel
US20080229400A1 (en) Remote Entry System
WO2019203306A1 (fr) Système de partage
CN106652106A (zh) 门锁的控制方法、装置及终端
KR20100056688A (ko) 휴대 단말기에서 인체 통신에 기반하여 도어락을 해제하기 위한 장치 및 방법
KR101506549B1 (ko) 역탐지 방지 무선인식 보안출입 방법 및 이를 이용한 보안출입 시스템
US10026299B2 (en) Mobile supported disarming
JP2019090229A (ja) バレットキー及びバレットキー制御方法
CN104063323A (zh) 移动终端及其控制设备的方法及系统
CN111989723A (zh) 共享系统
WO2008145199A1 (fr) Procédé pour la duplication de clefs à code électronique
US10687214B2 (en) Secure key fob
JP4254386B2 (ja) 携帯端末及び遠隔制御装置
WO2019202929A1 (fr) Système de partage
US20050122210A1 (en) Dual technology door entry person authentication
JP2009151557A (ja) 盗用防止装置
EP1449175A2 (fr) Emploi d'un generateur de nombres aleatoires comme preuve temporelle
CA2864362C (fr) Systeme integrant une carte de proximite multifacteur authentifiee activement

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10816396

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2010816396

Country of ref document: EP