WO2018052326A1 - A device for the translation of tags transmitted in the ble protocol into rfid tags, and the ble and rfid key generation method - Google Patents
A device for the translation of tags transmitted in the ble protocol into rfid tags, and the ble and rfid key generation method Download PDFInfo
- Publication number
- WO2018052326A1 WO2018052326A1 PCT/PL2017/050045 PL2017050045W WO2018052326A1 WO 2018052326 A1 WO2018052326 A1 WO 2018052326A1 PL 2017050045 W PL2017050045 W PL 2017050045W WO 2018052326 A1 WO2018052326 A1 WO 2018052326A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ble
- rfid
- key
- user
- party
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 12
- 238000013519 translation Methods 0.000 title claims abstract description 8
- 230000006698 induction Effects 0.000 claims abstract description 4
- 230000006870 function Effects 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 5
- 238000013475 authorization Methods 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/18—Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
-
- H04B5/77—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Definitions
- the subject of the invention is a device for the translation of tags transmitted in the BLE protocol into RFID tags, and the BLE and RFID key generation method by a trusted third party, with primary application in electronic access control.
- the most commonly employed system is the passive RFID tag system, by which the user receives a card with an individual tag, which is interrogated by RFID readers, after which, in the event of pairing the tag from the card with a tag recorded in the access control system, authentication commences.
- Older systems are based on the Hitag and Unique standards, while newer ones are based on the Mifare and HID standards.
- BLE protocols Use of the BLE protocols in access control systems is also known - they require the building of a completely new access control system with readers and locks operating using BLE technology.
- the goal of the invention is to design a solution based on the RFID and BLE technology, which could find common application especially in office buildings, industrial facilities, shops, warehouses, government offices, banks, health care facilities, hotels, sports and cultural facilities, transport and public transport, parking lots or common rooms in residential buildings.
- the passive RFID tag system is the most commonly employed one, which constitutes a barrier for the development of systems based on BLE protocols, as they raise the need for expensive infrastructure replacements.
- a selective adapter i.e. a device communicating in the BLE protocol with a user's mobile device and performing its authentication in the device's BLE module, is known from the description of invention no. US 9087246 B l .
- the BLE module engages a switch that closes the RFID module circuit.
- the closed RFID circuit is read by the reader.
- the RFID module has a single RFID tag programmed into it, which means that regardless of who is the user that performed the authentication, the access control system registers the event as an entry of the same person.
- the RFID tag assigned to a given device is permanent, which necessitates the implementation of additional security measures, which would make it possible to delete the tag during potentially dangerous situations.
- Each single selective adapter must have its own RFID tag that has to be submitted to the access control system database, which makes the work of the administrator harder, especially if the RFID tags in the databases are assigned to users, and not to access control readers.
- the disclosed solution finds application in the adaptation of existing access control systems that make use of RFID technology in the following standards: Q5, EM4102, UNIQUE, Hitagl/2/S, FDX-B, Indala, HID Prox, Verichip, FlexPass, Awid (for 125 kHz frequency) and IS014443A - NFC, Mifare Classic 1K/4K, Mifare Ultralight, IS015693 - HID iClass (for 13.56 MHz frequency); into solutions that eliminate the necessity for issuing and possessing physical RFID cards, while at the same time retaining the access control system functionality as it is.
- the device is applied to an existing RFID card reader and inductively powered, and its operation does not disrupt the possibility to use physical cards.
- the device interrogated by the reader submits the RFID tags assigned individually to the end user.
- the nature of the invention is a device for the translation of tags transmitted in the BLE protocol into RFID tags via known devices using BLE technology, particularly telephones, tablets, computers, smartwatches, glasses and devices that are part of the Internet of Things, which are characterized by having an antenna based on the BLE standard (1), a processor with a BLE radio system (2), "connected tag”-type EEPROM memory, a card protocol emulation system or a dedicated ASIC system (3), an RFID reading induction loop (4), at least one LED signal diode (5), connected with each other in such a way that the device performs interrogation in the BLE protocol in search of BLE devices, and after pairing receives a signal, which is the BLE key; the device decrypts the received key in order to extract the RFID key, and then, using the key, emulates a passive RFID tag, which communicates with the RFID reader of the access control system. Should a given RFID key be paired with an authorized key in the access control system database, authentication commences. Afterwards, the key is
- the device makes it possible to store keys for multiple access control systems at the same time in one application.
- the use of a trusted third party secures the keys and their exchange via user authorization based on a chosen login and password, and also based on a mobile device MAC number.
- the translator can emulate a different card each time, according to the RFID tag assigned to a given device.
- the systems disclosed thus far are able to emulate only one card with a tag assigned to a device, not to a user, as according to the functioning principle of the switch.
- the device (6) communicates with an exchange platform, in the form of a service in the cloud, acting as a trusted third party (7), a mobile device of the end user (8), an RFID card reader (9) and the access control system (10).
- the EEPROM memory (3) in the device is used to temporarily record the RFID tag. After recording the tag, the EEPROM memory (3) along with the RFID antenna (4) emulate the RFID card, which is then read by the reader (9). After the reading and an appropriate event have concluded, i.e. pairing and authentication or authentication denial, according to the protocol recorded in the translator software (6), the RFID tag is deleted from the EEPROM memory (3).
- the nature of the invention is also a method to generate BLE and RFID keys via trusted third party.
- the end user receives a private BLE key with an encrypted RFID tag assigned to it.
- the translator after authentication in the BLE module, decrypts the RFID tag and uses it for authentication.
- the RFID tag is recorded in the EEPROM memory and then immediately deleted after the event. Immediate deletion of the tags prevents their theft.
- User authentication takes place in the access control system, thanks to which the system records and reports events with the participation of a specific user. Installing the translator does not require assigning a specific RFID tag to it by the administrator.
- the solution makes it possible to retain full functionality of the existing access control systems - each event is assigned to a specific user and reported in the existing system. At the same time, it supplies further advanced possibilities concerning access control.
- the method ensures a high security level through the construction of the private key exchange platform.
- the system in which each administrator and each user has his/her own panel, is a trusted third party.
- the trusted third party supplies the translators, registers them, assigns own MAC numbers, secures and stores the data in a secure container of a service provided in the cloud with administrator access authorization, generates BLE and RFID keys, supplies keys to selected mobile devices, verifies and renews the validity of keys and performs reporting.
- the BLE and RFID key generation method via trusted third party is characterized in that the user generates an RFID key using the MAC address of a mobile device (8) and transmits it via trusted third party (7) to the administrator, who generates the BLE key via translator (6) and encrypts the RFID key with it, and then sends the BLE key back to the user via trusted third party (7).
- the device for the translation of tags transmitted in the BLE protocol into RFID tags, and the BLE and RFID key generation method via third party make unauthorized access harder on a level unavailable to existing solutions in RFID technology by applying an advanced and secure authentication method via trusted third party, which performs a secure confidential data transaction between the administrator and the user, using passwords deleted immediately after their use.
- the device and the method according to the invention eliminate the barriers that concern the selective adapter.
- fig. 1 presents the block diagram of the device for the translation of tags transmitted in the BLE protocol into RFID tags
- fig. 2 presents the block diagram of the device's practical utilization system in terms of access control.
- the device is equipped with an antenna based on the BLE standard (1 ), a processor with a BLE radio system (2), EEPROM “connected tag” memory (3), an RFID antenna/induction loop (4) and LED signal diodes (5).
- the device (6) communicates/cooperates with the exchange platform, in the form of a service in the cloud, acting as a trusted third party (7), the end user's mobile device (8), the RFID card reader (9) and the access control system (10).
- the device is different from example I in that it has a dedicated ASIC system (3) instead of the EEPROM "connected tag" memory.
- the device is different from example I in that it has a card protocol emulation system (3) instead of the EEPROM "connected tag" memory.
- Example TV The method for generating BLE and RFID keys via third party is based on the administrator registering a unique a number of a device (6) on his/her administrator' s profile (pa), established on the trusted third party (7), and then applying the device (6) to the reader (9), following the diode (5) signaling an effective power supply. Installing the device (6) does not disrupt the operation of the existing system and still makes it possible to use physical RFID cards. In the administrator's panel, the administrator grants the device (6) an appropriate position in the architecture encompassing access hierarchy, additional safeguards and events.
- the user downloads the application (a) of the trusted third party (6) to his/her own mobile device (8) and registers his/her own profile on the trusted third party (7), sharing the MAC address ( ⁇ ) of the mobile device (8).
- the trusted third party (7) generates a confidential user's profile (pu).
- the administrator sends an invitation (z) to the user's profile on the trusted third party (7), which notifies ( ⁇ ') the user through the application.
- the user By accepting the invitation, the user generates an RFID key based on the mobile device MAC address (6) or another number - k( ).
- the key contains a generated EPC code, in which a unique address of the data management organization functions, restricted to the trusted third party (7), as well as a unique serial number generated based on the MAC address.
- the user transmits the k(P) RFID key to the trusted third party (7), which relays it to the administrator, who then authorizes the received k( ) RFID key in the access control system CB (10).
- the trusted third party (7) Based on the k(P) RFID key and the a registered device address (6), the trusted third party (7) generates a k(aP) BLE communication key and transmits it to the user's application.
- the user moves within the range of the BLE directional antenna (1 ).
- the device (6) transmits a query, while the application from the mobile device (8) transmits a k(ap) BLE key to the device (6).
- the processor (2) decrypts the k(p) RFID key and records it in the EEPROM memory (3), which, in coordination with the RFID antenna (4), relays the k(P) signal to the reader (9).
- the k(p) key from the reader (9) is then relayed to the access control system (10), where it is paired with the k(P) key transmitted to the administrator by the trusted third party (7), followed by authentication and unlocking access to the door.
- the access control system (10) registers the event.
- the processor (2) deletes the RFID key record from the EEPROM/processor (3) and reports the event to the application on the mobile device (8), which in turn transmits the event information to the trusted third party (7), which may notify the user's profile or the administrator's profile about the event.
Abstract
The device for the translation of tags transmitted in the BLE protocol into RFID tags is equipped with an antenna based on the BLE standard (1), a processor with a BLE radio system (2), "connected tag"-type EEPROM memory, a card protocol emulation system or a dedicated ASIC system (3), an RFID antenna/induction loop (4) and LED signal diodes (5). The device uses the BLE system to connect with the end user's mobile device (8), the RFID card reader (9) and the access control system (10), and communicates with a trusted third party (7) through the user's mobile device (8). The BLE and RFID key generation method functions by having the user, using the mobile device MAC address (8), generate an RFID key and transmit it via trusted third party (7) to the administrator, who, using the translator (6), generates a BLE key and encrypts the RFID key with it, and then sends the BLE key back to the user through the trusted third party (7).
Description
A device for the translation of tags transmitted in the BLE protocol into RFID tags, and the BLE and RFID key generation method
The subject of the invention is a device for the translation of tags transmitted in the BLE protocol into RFID tags, and the BLE and RFID key generation method by a trusted third party, with primary application in electronic access control.
The following room access control systems are already known: the passive RFID tag system, the use of BLE (Bluetooth Low Energy) protocols and the use of biometric readers.
The most commonly employed system is the passive RFID tag system, by which the user receives a card with an individual tag, which is interrogated by RFID readers, after which, in the event of pairing the tag from the card with a tag recorded in the access control system, authentication commences. Older systems are based on the Hitag and Unique standards, while newer ones are based on the Mifare and HID standards.
Use of the BLE protocols in access control systems is also known - they require the building of a completely new access control system with readers and locks operating using BLE technology.
The goal of the invention is to design a solution based on the RFID and BLE technology, which could find common application especially in office buildings, industrial facilities, shops, warehouses, government offices, banks, health care facilities, hotels, sports and cultural facilities, transport and public transport, parking lots or common rooms in residential buildings.
Presently, the passive RFID tag system is the most commonly employed one, which constitutes a barrier for the development of systems based on BLE protocols, as they raise the need for expensive infrastructure replacements.
A selective adapter, i.e. a device communicating in the BLE protocol with a user's mobile device and performing its authentication in the device's BLE module, is known from the description of invention no. US 9087246 B l .
In the event of a successful verification, the BLE module engages a switch that closes the RFID module circuit. The closed RFID circuit is read by the reader. In this solution, the RFID module has a single RFID tag programmed into it, which means that regardless of who is the user that performed the authentication, the access control system registers the event as an entry of the same person. At the same time, the RFID tag assigned to a given device is permanent, which necessitates the implementation of additional security measures, which would make it possible to delete the tag during potentially dangerous situations. Each single selective adapter must have its own RFID tag that has to be submitted to the access control system database, which makes the work of the administrator harder, especially if the RFID tags in the databases are assigned to users, and not to access control readers.
The disclosed solution finds application in the adaptation of existing access control systems that make use of RFID technology in the following standards: Q5, EM4102, UNIQUE, Hitagl/2/S, FDX-B, Indala, HID Prox, Verichip, FlexPass, Awid (for 125 kHz frequency) and IS014443A - NFC, Mifare Classic 1K/4K, Mifare Ultralight, IS015693 - HID iClass (for 13.56 MHz frequency); into solutions that eliminate the necessity for issuing and possessing physical RFID cards, while at the same time retaining the access control system functionality as it is. The device is applied to an existing RFID card reader and inductively powered, and its operation does not disrupt the possibility to use physical cards. The device interrogated by the reader submits the RFID tags assigned individually to the end user.
The nature of the invention is a device for the translation of tags transmitted in the BLE protocol into RFID tags via known devices using BLE technology, particularly telephones, tablets, computers, smartwatches, glasses and devices that are part of the Internet of Things, which are characterized by having an antenna based on the BLE standard (1), a processor with a BLE radio system (2), "connected tag"-type EEPROM memory, a card protocol emulation system or a dedicated ASIC system (3), an RFID reading induction loop (4), at least one LED signal diode (5), connected with each other in such a way that the device performs interrogation in the BLE protocol in search of BLE devices, and after pairing receives a signal, which is the BLE key; the device decrypts the received key in order to extract the RFID key, and then, using the key, emulates a passive RFID tag, which communicates with the RFID reader of the access control system. Should a given RFID key be paired with an authorized key in the access
control system database, authentication commences. Afterwards, the key is electronically deleted from the memory.
The device makes it possible to store keys for multiple access control systems at the same time in one application. The use of a trusted third party secures the keys and their exchange via user authorization based on a chosen login and password, and also based on a mobile device MAC number.
The translator can emulate a different card each time, according to the RFID tag assigned to a given device. The systems disclosed thus far are able to emulate only one card with a tag assigned to a device, not to a user, as according to the functioning principle of the switch.
The device (6) communicates with an exchange platform, in the form of a service in the cloud, acting as a trusted third party (7), a mobile device of the end user (8), an RFID card reader (9) and the access control system (10). According to the invention, the EEPROM memory (3) in the device is used to temporarily record the RFID tag. After recording the tag, the EEPROM memory (3) along with the RFID antenna (4) emulate the RFID card, which is then read by the reader (9). After the reading and an appropriate event have concluded, i.e. pairing and authentication or authentication denial, according to the protocol recorded in the translator software (6), the RFID tag is deleted from the EEPROM memory (3).
The nature of the invention is also a method to generate BLE and RFID keys via trusted third party.
The end user receives a private BLE key with an encrypted RFID tag assigned to it. The translator, after authentication in the BLE module, decrypts the RFID tag and uses it for authentication. According to the protocol recorded in the firmware, the RFID tag is recorded in the EEPROM memory and then immediately deleted after the event. Immediate deletion of the tags prevents their theft. User authentication takes place in the access control system, thanks to which the system records and reports events with the participation of a specific user. Installing the translator does not require assigning a specific RFID tag to it by the administrator. The solution makes it possible to retain full functionality of the existing access control systems - each event is assigned to a specific user and reported in the existing system. At the same time, it supplies further advanced possibilities concerning access control. The method ensures a high security level through the construction of the private key exchange platform. The system, in which each administrator and each user has his/her own panel, is a trusted third party. The trusted third party supplies the translators, registers them, assigns own MAC
numbers, secures and stores the data in a secure container of a service provided in the cloud with administrator access authorization, generates BLE and RFID keys, supplies keys to selected mobile devices, verifies and renews the validity of keys and performs reporting.
The BLE and RFID key generation method via trusted third party is characterized in that the user generates an RFID key using the MAC address of a mobile device (8) and transmits it via trusted third party (7) to the administrator, who generates the BLE key via translator (6) and encrypts the RFID key with it, and then sends the BLE key back to the user via trusted third party (7).
The device for the translation of tags transmitted in the BLE protocol into RFID tags, and the BLE and RFID key generation method via third party make unauthorized access harder on a level unavailable to existing solutions in RFID technology by applying an advanced and secure authentication method via trusted third party, which performs a secure confidential data transaction between the administrator and the user, using passwords deleted immediately after their use. The device and the method according to the invention eliminate the barriers that concern the selective adapter.
The subject of the invention is displayed on a picture, where fig. 1 presents the block diagram of the device for the translation of tags transmitted in the BLE protocol into RFID tags, and fig. 2 presents the block diagram of the device's practical utilization system in terms of access control.
Example I
The device is equipped with an antenna based on the BLE standard (1 ), a processor with a BLE radio system (2), EEPROM "connected tag" memory (3), an RFID antenna/induction loop (4) and LED signal diodes (5). The device (6) communicates/cooperates with the exchange platform, in the form of a service in the cloud, acting as a trusted third party (7), the end user's mobile device (8), the RFID card reader (9) and the access control system (10).
Example II
The device is different from example I in that it has a dedicated ASIC system (3) instead of the EEPROM "connected tag" memory.
Example III
The device is different from example I in that it has a card protocol emulation system (3) instead of the EEPROM "connected tag" memory.
Example TV
The method for generating BLE and RFID keys via third party is based on the administrator registering a unique a number of a device (6) on his/her administrator' s profile (pa), established on the trusted third party (7), and then applying the device (6) to the reader (9), following the diode (5) signaling an effective power supply. Installing the device (6) does not disrupt the operation of the existing system and still makes it possible to use physical RFID cards. In the administrator's panel, the administrator grants the device (6) an appropriate position in the architecture encompassing access hierarchy, additional safeguards and events. The user downloads the application (a) of the trusted third party (6) to his/her own mobile device (8) and registers his/her own profile on the trusted third party (7), sharing the MAC address (β) of the mobile device (8). The trusted third party (7) generates a confidential user's profile (pu). The administrator sends an invitation (z) to the user's profile on the trusted third party (7), which notifies (ζ') the user through the application. By accepting the invitation, the user generates an RFID key based on the mobile device MAC address (6) or another number - k( ). The key contains a generated EPC code, in which a unique address of the data management organization functions, restricted to the trusted third party (7), as well as a unique serial number generated based on the MAC address. The user transmits the k(P) RFID key to the trusted third party (7), which relays it to the administrator, who then authorizes the received k( ) RFID key in the access control system CB (10). Based on the k(P) RFID key and the a registered device address (6), the trusted third party (7) generates a k(aP) BLE communication key and transmits it to the user's application. The user moves within the range of the BLE directional antenna (1 ). The device (6) transmits a query, while the application from the mobile device (8) transmits a k(ap) BLE key to the device (6). The processor (2) decrypts the k(p) RFID key and records it in the EEPROM memory (3), which, in coordination with the RFID antenna (4), relays the k(P) signal to the reader (9). The k(p) key from the reader (9) is then relayed to the access control system (10), where it is paired with the k(P) key transmitted to the administrator by the trusted third party (7), followed by authentication and unlocking access to the door. The access control system (10) registers the event. The processor (2) deletes the RFID key record from the EEPROM/processor (3) and reports the event to the application on the mobile device (8), which in turn transmits the event information to the trusted third party (7), which may notify the user's profile or the administrator's profile about the event.
Claims
1. A device for the translation of tags transmitted in the BLE protocol into RFID tags, characterized in that it is equipped with an antenna based on the BLE standard (1), a processor with a BLE radio system (2), "connected tag"-type EEPROM memory, a card protocol emulation system or a dedicated ASIC system (3), an RFID antenna/induction loop (4) and LED signal diodes (5).
2. The device per claim no. 1 is characterized in that it communicates with a trusted third party (7) via the user's mobile device (8).
3. The device per claims 1-2 is characterized in that it uses the BLE system to connect with the end user's mobile device (8), the RFID card reader (9) and the access control system (10).
4. The BLE and RFID key generation method is characterized in that the user, using the mobile device MAC address (8), generates an RFID key and transmits it via trusted third party (7) to the administrator, who, using the translator (6), generates a BLE key and encrypts the RFID key with it, and then sends the BLE key back to the user through the trusted third party (7).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PL418731A PL242627B1 (en) | 2016-09-16 | 2016-09-16 | Device for translation of tags transmitted in the BLE protocol to the RFID tags and method for generation of BLE and RFID keys |
PLP.418731 | 2016-09-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018052326A1 true WO2018052326A1 (en) | 2018-03-22 |
Family
ID=61618888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/PL2017/050045 WO2018052326A1 (en) | 2016-09-16 | 2017-09-14 | A device for the translation of tags transmitted in the ble protocol into rfid tags, and the ble and rfid key generation method |
Country Status (2)
Country | Link |
---|---|
PL (1) | PL242627B1 (en) |
WO (1) | WO2018052326A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103326866A (en) * | 2013-06-29 | 2013-09-25 | 安科智慧城市技术(中国)有限公司 | Authentication method and system based on equipment MAC address |
US20160239001A1 (en) * | 2015-02-16 | 2016-08-18 | Polaris Tech Global Limited | Indoor automation and control method and system thereof using rfid-to-bluetooth selective adapter |
US20160241999A1 (en) * | 2015-02-16 | 2016-08-18 | Polaris Tech Global Limited | Cross-platform automated perimeter access control system and method adopting selective adapter |
-
2016
- 2016-09-16 PL PL418731A patent/PL242627B1/en unknown
-
2017
- 2017-09-14 WO PCT/PL2017/050045 patent/WO2018052326A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103326866A (en) * | 2013-06-29 | 2013-09-25 | 安科智慧城市技术(中国)有限公司 | Authentication method and system based on equipment MAC address |
US20160239001A1 (en) * | 2015-02-16 | 2016-08-18 | Polaris Tech Global Limited | Indoor automation and control method and system thereof using rfid-to-bluetooth selective adapter |
US20160241999A1 (en) * | 2015-02-16 | 2016-08-18 | Polaris Tech Global Limited | Cross-platform automated perimeter access control system and method adopting selective adapter |
Also Published As
Publication number | Publication date |
---|---|
PL418731A1 (en) | 2018-03-26 |
PL242627B1 (en) | 2023-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103971435B (en) | Method for unlocking, server, mobile terminal, electronic lock and unlocking system | |
US11570623B2 (en) | Secure communication platform | |
RU2702076C2 (en) | Authentication in distributed environment | |
US8730004B2 (en) | Method and system for permitting remote check-in and coordinating access control | |
US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
US20070176739A1 (en) | Multifunction keyless and cardless method and system of securely operating and managing housing facilities with electronic door locks | |
US11477649B2 (en) | Access control system with trusted third party | |
US20130257589A1 (en) | Access control using an electronic lock employing short range communication with mobile device | |
CN207264475U (en) | A kind of intelligent lock control system based on eID certifications | |
CN104135480A (en) | Entrance guard authorization system and entrance guard authorization method | |
JP2005139644A (en) | Key information distribution system | |
Dutta et al. | ES3B: enhanced security system for smart building using IoT | |
JP4390817B2 (en) | Authentication processing system, mobile communication terminal, and authentication processing method | |
CN105160736A (en) | Password unlocking system, hotel equipment, door lock terminal and method | |
US20190028470A1 (en) | Method For Verifying The Identity Of A Person | |
CN111161454A (en) | Intelligent lock safety networking and control method | |
US7997479B2 (en) | Reader with integrated encryption unit | |
WO2018052326A1 (en) | A device for the translation of tags transmitted in the ble protocol into rfid tags, and the ble and rfid key generation method | |
CN107070663B (en) | Mobile terminal-based field authentication method and field authentication system | |
KR20220170129A (en) | Server emulator for kiosk communication, server emulation system and method having same | |
US10645070B2 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
GB2600696A (en) | Augmented access control system | |
CN108990043A (en) | A kind of remote unlocking method and its intelligent door lock based on core network communications | |
KR100657577B1 (en) | System and method for authorization using client information assembly | |
JP6725116B2 (en) | Multiple authentication method, multiple authentication system group, and multiple authentication program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17851164 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17851164 Country of ref document: EP Kind code of ref document: A1 |