WO2018052326A1 - A device for the translation of tags transmitted in the ble protocol into rfid tags, and the ble and rfid key generation method - Google Patents

A device for the translation of tags transmitted in the ble protocol into rfid tags, and the ble and rfid key generation method Download PDF

Info

Publication number
WO2018052326A1
WO2018052326A1 PCT/PL2017/050045 PL2017050045W WO2018052326A1 WO 2018052326 A1 WO2018052326 A1 WO 2018052326A1 PL 2017050045 W PL2017050045 W PL 2017050045W WO 2018052326 A1 WO2018052326 A1 WO 2018052326A1
Authority
WO
WIPO (PCT)
Prior art keywords
ble
rfid
key
user
party
Prior art date
Application number
PCT/PL2017/050045
Other languages
French (fr)
Inventor
Krzysztof ALBRYCHIEWICZ
Original Assignee
Brand At Heart Krzysztof Albrychiewicz
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Brand At Heart Krzysztof Albrychiewicz filed Critical Brand At Heart Krzysztof Albrychiewicz
Publication of WO2018052326A1 publication Critical patent/WO2018052326A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • H04B5/77
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Definitions

  • the subject of the invention is a device for the translation of tags transmitted in the BLE protocol into RFID tags, and the BLE and RFID key generation method by a trusted third party, with primary application in electronic access control.
  • the most commonly employed system is the passive RFID tag system, by which the user receives a card with an individual tag, which is interrogated by RFID readers, after which, in the event of pairing the tag from the card with a tag recorded in the access control system, authentication commences.
  • Older systems are based on the Hitag and Unique standards, while newer ones are based on the Mifare and HID standards.
  • BLE protocols Use of the BLE protocols in access control systems is also known - they require the building of a completely new access control system with readers and locks operating using BLE technology.
  • the goal of the invention is to design a solution based on the RFID and BLE technology, which could find common application especially in office buildings, industrial facilities, shops, warehouses, government offices, banks, health care facilities, hotels, sports and cultural facilities, transport and public transport, parking lots or common rooms in residential buildings.
  • the passive RFID tag system is the most commonly employed one, which constitutes a barrier for the development of systems based on BLE protocols, as they raise the need for expensive infrastructure replacements.
  • a selective adapter i.e. a device communicating in the BLE protocol with a user's mobile device and performing its authentication in the device's BLE module, is known from the description of invention no. US 9087246 B l .
  • the BLE module engages a switch that closes the RFID module circuit.
  • the closed RFID circuit is read by the reader.
  • the RFID module has a single RFID tag programmed into it, which means that regardless of who is the user that performed the authentication, the access control system registers the event as an entry of the same person.
  • the RFID tag assigned to a given device is permanent, which necessitates the implementation of additional security measures, which would make it possible to delete the tag during potentially dangerous situations.
  • Each single selective adapter must have its own RFID tag that has to be submitted to the access control system database, which makes the work of the administrator harder, especially if the RFID tags in the databases are assigned to users, and not to access control readers.
  • the disclosed solution finds application in the adaptation of existing access control systems that make use of RFID technology in the following standards: Q5, EM4102, UNIQUE, Hitagl/2/S, FDX-B, Indala, HID Prox, Verichip, FlexPass, Awid (for 125 kHz frequency) and IS014443A - NFC, Mifare Classic 1K/4K, Mifare Ultralight, IS015693 - HID iClass (for 13.56 MHz frequency); into solutions that eliminate the necessity for issuing and possessing physical RFID cards, while at the same time retaining the access control system functionality as it is.
  • the device is applied to an existing RFID card reader and inductively powered, and its operation does not disrupt the possibility to use physical cards.
  • the device interrogated by the reader submits the RFID tags assigned individually to the end user.
  • the nature of the invention is a device for the translation of tags transmitted in the BLE protocol into RFID tags via known devices using BLE technology, particularly telephones, tablets, computers, smartwatches, glasses and devices that are part of the Internet of Things, which are characterized by having an antenna based on the BLE standard (1), a processor with a BLE radio system (2), "connected tag”-type EEPROM memory, a card protocol emulation system or a dedicated ASIC system (3), an RFID reading induction loop (4), at least one LED signal diode (5), connected with each other in such a way that the device performs interrogation in the BLE protocol in search of BLE devices, and after pairing receives a signal, which is the BLE key; the device decrypts the received key in order to extract the RFID key, and then, using the key, emulates a passive RFID tag, which communicates with the RFID reader of the access control system. Should a given RFID key be paired with an authorized key in the access control system database, authentication commences. Afterwards, the key is
  • the device makes it possible to store keys for multiple access control systems at the same time in one application.
  • the use of a trusted third party secures the keys and their exchange via user authorization based on a chosen login and password, and also based on a mobile device MAC number.
  • the translator can emulate a different card each time, according to the RFID tag assigned to a given device.
  • the systems disclosed thus far are able to emulate only one card with a tag assigned to a device, not to a user, as according to the functioning principle of the switch.
  • the device (6) communicates with an exchange platform, in the form of a service in the cloud, acting as a trusted third party (7), a mobile device of the end user (8), an RFID card reader (9) and the access control system (10).
  • the EEPROM memory (3) in the device is used to temporarily record the RFID tag. After recording the tag, the EEPROM memory (3) along with the RFID antenna (4) emulate the RFID card, which is then read by the reader (9). After the reading and an appropriate event have concluded, i.e. pairing and authentication or authentication denial, according to the protocol recorded in the translator software (6), the RFID tag is deleted from the EEPROM memory (3).
  • the nature of the invention is also a method to generate BLE and RFID keys via trusted third party.
  • the end user receives a private BLE key with an encrypted RFID tag assigned to it.
  • the translator after authentication in the BLE module, decrypts the RFID tag and uses it for authentication.
  • the RFID tag is recorded in the EEPROM memory and then immediately deleted after the event. Immediate deletion of the tags prevents their theft.
  • User authentication takes place in the access control system, thanks to which the system records and reports events with the participation of a specific user. Installing the translator does not require assigning a specific RFID tag to it by the administrator.
  • the solution makes it possible to retain full functionality of the existing access control systems - each event is assigned to a specific user and reported in the existing system. At the same time, it supplies further advanced possibilities concerning access control.
  • the method ensures a high security level through the construction of the private key exchange platform.
  • the system in which each administrator and each user has his/her own panel, is a trusted third party.
  • the trusted third party supplies the translators, registers them, assigns own MAC numbers, secures and stores the data in a secure container of a service provided in the cloud with administrator access authorization, generates BLE and RFID keys, supplies keys to selected mobile devices, verifies and renews the validity of keys and performs reporting.
  • the BLE and RFID key generation method via trusted third party is characterized in that the user generates an RFID key using the MAC address of a mobile device (8) and transmits it via trusted third party (7) to the administrator, who generates the BLE key via translator (6) and encrypts the RFID key with it, and then sends the BLE key back to the user via trusted third party (7).
  • the device for the translation of tags transmitted in the BLE protocol into RFID tags, and the BLE and RFID key generation method via third party make unauthorized access harder on a level unavailable to existing solutions in RFID technology by applying an advanced and secure authentication method via trusted third party, which performs a secure confidential data transaction between the administrator and the user, using passwords deleted immediately after their use.
  • the device and the method according to the invention eliminate the barriers that concern the selective adapter.
  • fig. 1 presents the block diagram of the device for the translation of tags transmitted in the BLE protocol into RFID tags
  • fig. 2 presents the block diagram of the device's practical utilization system in terms of access control.
  • the device is equipped with an antenna based on the BLE standard (1 ), a processor with a BLE radio system (2), EEPROM “connected tag” memory (3), an RFID antenna/induction loop (4) and LED signal diodes (5).
  • the device (6) communicates/cooperates with the exchange platform, in the form of a service in the cloud, acting as a trusted third party (7), the end user's mobile device (8), the RFID card reader (9) and the access control system (10).
  • the device is different from example I in that it has a dedicated ASIC system (3) instead of the EEPROM "connected tag" memory.
  • the device is different from example I in that it has a card protocol emulation system (3) instead of the EEPROM "connected tag" memory.
  • Example TV The method for generating BLE and RFID keys via third party is based on the administrator registering a unique a number of a device (6) on his/her administrator' s profile (pa), established on the trusted third party (7), and then applying the device (6) to the reader (9), following the diode (5) signaling an effective power supply. Installing the device (6) does not disrupt the operation of the existing system and still makes it possible to use physical RFID cards. In the administrator's panel, the administrator grants the device (6) an appropriate position in the architecture encompassing access hierarchy, additional safeguards and events.
  • the user downloads the application (a) of the trusted third party (6) to his/her own mobile device (8) and registers his/her own profile on the trusted third party (7), sharing the MAC address ( ⁇ ) of the mobile device (8).
  • the trusted third party (7) generates a confidential user's profile (pu).
  • the administrator sends an invitation (z) to the user's profile on the trusted third party (7), which notifies ( ⁇ ') the user through the application.
  • the user By accepting the invitation, the user generates an RFID key based on the mobile device MAC address (6) or another number - k( ).
  • the key contains a generated EPC code, in which a unique address of the data management organization functions, restricted to the trusted third party (7), as well as a unique serial number generated based on the MAC address.
  • the user transmits the k(P) RFID key to the trusted third party (7), which relays it to the administrator, who then authorizes the received k( ) RFID key in the access control system CB (10).
  • the trusted third party (7) Based on the k(P) RFID key and the a registered device address (6), the trusted third party (7) generates a k(aP) BLE communication key and transmits it to the user's application.
  • the user moves within the range of the BLE directional antenna (1 ).
  • the device (6) transmits a query, while the application from the mobile device (8) transmits a k(ap) BLE key to the device (6).
  • the processor (2) decrypts the k(p) RFID key and records it in the EEPROM memory (3), which, in coordination with the RFID antenna (4), relays the k(P) signal to the reader (9).
  • the k(p) key from the reader (9) is then relayed to the access control system (10), where it is paired with the k(P) key transmitted to the administrator by the trusted third party (7), followed by authentication and unlocking access to the door.
  • the access control system (10) registers the event.
  • the processor (2) deletes the RFID key record from the EEPROM/processor (3) and reports the event to the application on the mobile device (8), which in turn transmits the event information to the trusted third party (7), which may notify the user's profile or the administrator's profile about the event.

Abstract

The device for the translation of tags transmitted in the BLE protocol into RFID tags is equipped with an antenna based on the BLE standard (1), a processor with a BLE radio system (2), "connected tag"-type EEPROM memory, a card protocol emulation system or a dedicated ASIC system (3), an RFID antenna/induction loop (4) and LED signal diodes (5). The device uses the BLE system to connect with the end user's mobile device (8), the RFID card reader (9) and the access control system (10), and communicates with a trusted third party (7) through the user's mobile device (8). The BLE and RFID key generation method functions by having the user, using the mobile device MAC address (8), generate an RFID key and transmit it via trusted third party (7) to the administrator, who, using the translator (6), generates a BLE key and encrypts the RFID key with it, and then sends the BLE key back to the user through the trusted third party (7).

Description

A device for the translation of tags transmitted in the BLE protocol into RFID tags, and the BLE and RFID key generation method
The subject of the invention is a device for the translation of tags transmitted in the BLE protocol into RFID tags, and the BLE and RFID key generation method by a trusted third party, with primary application in electronic access control.
The following room access control systems are already known: the passive RFID tag system, the use of BLE (Bluetooth Low Energy) protocols and the use of biometric readers.
The most commonly employed system is the passive RFID tag system, by which the user receives a card with an individual tag, which is interrogated by RFID readers, after which, in the event of pairing the tag from the card with a tag recorded in the access control system, authentication commences. Older systems are based on the Hitag and Unique standards, while newer ones are based on the Mifare and HID standards.
Use of the BLE protocols in access control systems is also known - they require the building of a completely new access control system with readers and locks operating using BLE technology.
The goal of the invention is to design a solution based on the RFID and BLE technology, which could find common application especially in office buildings, industrial facilities, shops, warehouses, government offices, banks, health care facilities, hotels, sports and cultural facilities, transport and public transport, parking lots or common rooms in residential buildings.
Presently, the passive RFID tag system is the most commonly employed one, which constitutes a barrier for the development of systems based on BLE protocols, as they raise the need for expensive infrastructure replacements.
A selective adapter, i.e. a device communicating in the BLE protocol with a user's mobile device and performing its authentication in the device's BLE module, is known from the description of invention no. US 9087246 B l . In the event of a successful verification, the BLE module engages a switch that closes the RFID module circuit. The closed RFID circuit is read by the reader. In this solution, the RFID module has a single RFID tag programmed into it, which means that regardless of who is the user that performed the authentication, the access control system registers the event as an entry of the same person. At the same time, the RFID tag assigned to a given device is permanent, which necessitates the implementation of additional security measures, which would make it possible to delete the tag during potentially dangerous situations. Each single selective adapter must have its own RFID tag that has to be submitted to the access control system database, which makes the work of the administrator harder, especially if the RFID tags in the databases are assigned to users, and not to access control readers.
The disclosed solution finds application in the adaptation of existing access control systems that make use of RFID technology in the following standards: Q5, EM4102, UNIQUE, Hitagl/2/S, FDX-B, Indala, HID Prox, Verichip, FlexPass, Awid (for 125 kHz frequency) and IS014443A - NFC, Mifare Classic 1K/4K, Mifare Ultralight, IS015693 - HID iClass (for 13.56 MHz frequency); into solutions that eliminate the necessity for issuing and possessing physical RFID cards, while at the same time retaining the access control system functionality as it is. The device is applied to an existing RFID card reader and inductively powered, and its operation does not disrupt the possibility to use physical cards. The device interrogated by the reader submits the RFID tags assigned individually to the end user.
The nature of the invention is a device for the translation of tags transmitted in the BLE protocol into RFID tags via known devices using BLE technology, particularly telephones, tablets, computers, smartwatches, glasses and devices that are part of the Internet of Things, which are characterized by having an antenna based on the BLE standard (1), a processor with a BLE radio system (2), "connected tag"-type EEPROM memory, a card protocol emulation system or a dedicated ASIC system (3), an RFID reading induction loop (4), at least one LED signal diode (5), connected with each other in such a way that the device performs interrogation in the BLE protocol in search of BLE devices, and after pairing receives a signal, which is the BLE key; the device decrypts the received key in order to extract the RFID key, and then, using the key, emulates a passive RFID tag, which communicates with the RFID reader of the access control system. Should a given RFID key be paired with an authorized key in the access control system database, authentication commences. Afterwards, the key is electronically deleted from the memory.
The device makes it possible to store keys for multiple access control systems at the same time in one application. The use of a trusted third party secures the keys and their exchange via user authorization based on a chosen login and password, and also based on a mobile device MAC number.
The translator can emulate a different card each time, according to the RFID tag assigned to a given device. The systems disclosed thus far are able to emulate only one card with a tag assigned to a device, not to a user, as according to the functioning principle of the switch.
The device (6) communicates with an exchange platform, in the form of a service in the cloud, acting as a trusted third party (7), a mobile device of the end user (8), an RFID card reader (9) and the access control system (10). According to the invention, the EEPROM memory (3) in the device is used to temporarily record the RFID tag. After recording the tag, the EEPROM memory (3) along with the RFID antenna (4) emulate the RFID card, which is then read by the reader (9). After the reading and an appropriate event have concluded, i.e. pairing and authentication or authentication denial, according to the protocol recorded in the translator software (6), the RFID tag is deleted from the EEPROM memory (3).
The nature of the invention is also a method to generate BLE and RFID keys via trusted third party.
The end user receives a private BLE key with an encrypted RFID tag assigned to it. The translator, after authentication in the BLE module, decrypts the RFID tag and uses it for authentication. According to the protocol recorded in the firmware, the RFID tag is recorded in the EEPROM memory and then immediately deleted after the event. Immediate deletion of the tags prevents their theft. User authentication takes place in the access control system, thanks to which the system records and reports events with the participation of a specific user. Installing the translator does not require assigning a specific RFID tag to it by the administrator. The solution makes it possible to retain full functionality of the existing access control systems - each event is assigned to a specific user and reported in the existing system. At the same time, it supplies further advanced possibilities concerning access control. The method ensures a high security level through the construction of the private key exchange platform. The system, in which each administrator and each user has his/her own panel, is a trusted third party. The trusted third party supplies the translators, registers them, assigns own MAC numbers, secures and stores the data in a secure container of a service provided in the cloud with administrator access authorization, generates BLE and RFID keys, supplies keys to selected mobile devices, verifies and renews the validity of keys and performs reporting.
The BLE and RFID key generation method via trusted third party is characterized in that the user generates an RFID key using the MAC address of a mobile device (8) and transmits it via trusted third party (7) to the administrator, who generates the BLE key via translator (6) and encrypts the RFID key with it, and then sends the BLE key back to the user via trusted third party (7).
The device for the translation of tags transmitted in the BLE protocol into RFID tags, and the BLE and RFID key generation method via third party make unauthorized access harder on a level unavailable to existing solutions in RFID technology by applying an advanced and secure authentication method via trusted third party, which performs a secure confidential data transaction between the administrator and the user, using passwords deleted immediately after their use. The device and the method according to the invention eliminate the barriers that concern the selective adapter.
The subject of the invention is displayed on a picture, where fig. 1 presents the block diagram of the device for the translation of tags transmitted in the BLE protocol into RFID tags, and fig. 2 presents the block diagram of the device's practical utilization system in terms of access control.
Example I
The device is equipped with an antenna based on the BLE standard (1 ), a processor with a BLE radio system (2), EEPROM "connected tag" memory (3), an RFID antenna/induction loop (4) and LED signal diodes (5). The device (6) communicates/cooperates with the exchange platform, in the form of a service in the cloud, acting as a trusted third party (7), the end user's mobile device (8), the RFID card reader (9) and the access control system (10).
Example II
The device is different from example I in that it has a dedicated ASIC system (3) instead of the EEPROM "connected tag" memory.
Example III
The device is different from example I in that it has a card protocol emulation system (3) instead of the EEPROM "connected tag" memory.
Example TV The method for generating BLE and RFID keys via third party is based on the administrator registering a unique a number of a device (6) on his/her administrator' s profile (pa), established on the trusted third party (7), and then applying the device (6) to the reader (9), following the diode (5) signaling an effective power supply. Installing the device (6) does not disrupt the operation of the existing system and still makes it possible to use physical RFID cards. In the administrator's panel, the administrator grants the device (6) an appropriate position in the architecture encompassing access hierarchy, additional safeguards and events. The user downloads the application (a) of the trusted third party (6) to his/her own mobile device (8) and registers his/her own profile on the trusted third party (7), sharing the MAC address (β) of the mobile device (8). The trusted third party (7) generates a confidential user's profile (pu). The administrator sends an invitation (z) to the user's profile on the trusted third party (7), which notifies (ζ') the user through the application. By accepting the invitation, the user generates an RFID key based on the mobile device MAC address (6) or another number - k( ). The key contains a generated EPC code, in which a unique address of the data management organization functions, restricted to the trusted third party (7), as well as a unique serial number generated based on the MAC address. The user transmits the k(P) RFID key to the trusted third party (7), which relays it to the administrator, who then authorizes the received k( ) RFID key in the access control system CB (10). Based on the k(P) RFID key and the a registered device address (6), the trusted third party (7) generates a k(aP) BLE communication key and transmits it to the user's application. The user moves within the range of the BLE directional antenna (1 ). The device (6) transmits a query, while the application from the mobile device (8) transmits a k(ap) BLE key to the device (6). The processor (2) decrypts the k(p) RFID key and records it in the EEPROM memory (3), which, in coordination with the RFID antenna (4), relays the k(P) signal to the reader (9). The k(p) key from the reader (9) is then relayed to the access control system (10), where it is paired with the k(P) key transmitted to the administrator by the trusted third party (7), followed by authentication and unlocking access to the door. The access control system (10) registers the event. The processor (2) deletes the RFID key record from the EEPROM/processor (3) and reports the event to the application on the mobile device (8), which in turn transmits the event information to the trusted third party (7), which may notify the user's profile or the administrator's profile about the event.

Claims

Patent claims
1. A device for the translation of tags transmitted in the BLE protocol into RFID tags, characterized in that it is equipped with an antenna based on the BLE standard (1), a processor with a BLE radio system (2), "connected tag"-type EEPROM memory, a card protocol emulation system or a dedicated ASIC system (3), an RFID antenna/induction loop (4) and LED signal diodes (5).
2. The device per claim no. 1 is characterized in that it communicates with a trusted third party (7) via the user's mobile device (8).
3. The device per claims 1-2 is characterized in that it uses the BLE system to connect with the end user's mobile device (8), the RFID card reader (9) and the access control system (10).
4. The BLE and RFID key generation method is characterized in that the user, using the mobile device MAC address (8), generates an RFID key and transmits it via trusted third party (7) to the administrator, who, using the translator (6), generates a BLE key and encrypts the RFID key with it, and then sends the BLE key back to the user through the trusted third party (7).
PCT/PL2017/050045 2016-09-16 2017-09-14 A device for the translation of tags transmitted in the ble protocol into rfid tags, and the ble and rfid key generation method WO2018052326A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
PL418731A PL242627B1 (en) 2016-09-16 2016-09-16 Device for translation of tags transmitted in the BLE protocol to the RFID tags and method for generation of BLE and RFID keys
PLP.418731 2016-09-16

Publications (1)

Publication Number Publication Date
WO2018052326A1 true WO2018052326A1 (en) 2018-03-22

Family

ID=61618888

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/PL2017/050045 WO2018052326A1 (en) 2016-09-16 2017-09-14 A device for the translation of tags transmitted in the ble protocol into rfid tags, and the ble and rfid key generation method

Country Status (2)

Country Link
PL (1) PL242627B1 (en)
WO (1) WO2018052326A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326866A (en) * 2013-06-29 2013-09-25 安科智慧城市技术(中国)有限公司 Authentication method and system based on equipment MAC address
US20160239001A1 (en) * 2015-02-16 2016-08-18 Polaris Tech Global Limited Indoor automation and control method and system thereof using rfid-to-bluetooth selective adapter
US20160241999A1 (en) * 2015-02-16 2016-08-18 Polaris Tech Global Limited Cross-platform automated perimeter access control system and method adopting selective adapter

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326866A (en) * 2013-06-29 2013-09-25 安科智慧城市技术(中国)有限公司 Authentication method and system based on equipment MAC address
US20160239001A1 (en) * 2015-02-16 2016-08-18 Polaris Tech Global Limited Indoor automation and control method and system thereof using rfid-to-bluetooth selective adapter
US20160241999A1 (en) * 2015-02-16 2016-08-18 Polaris Tech Global Limited Cross-platform automated perimeter access control system and method adopting selective adapter

Also Published As

Publication number Publication date
PL418731A1 (en) 2018-03-26
PL242627B1 (en) 2023-03-27

Similar Documents

Publication Publication Date Title
CN103971435B (en) Method for unlocking, server, mobile terminal, electronic lock and unlocking system
US11570623B2 (en) Secure communication platform
RU2702076C2 (en) Authentication in distributed environment
US8730004B2 (en) Method and system for permitting remote check-in and coordinating access control
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US20070176739A1 (en) Multifunction keyless and cardless method and system of securely operating and managing housing facilities with electronic door locks
US11477649B2 (en) Access control system with trusted third party
US20130257589A1 (en) Access control using an electronic lock employing short range communication with mobile device
CN207264475U (en) A kind of intelligent lock control system based on eID certifications
CN104135480A (en) Entrance guard authorization system and entrance guard authorization method
JP2005139644A (en) Key information distribution system
Dutta et al. ES3B: enhanced security system for smart building using IoT
JP4390817B2 (en) Authentication processing system, mobile communication terminal, and authentication processing method
CN105160736A (en) Password unlocking system, hotel equipment, door lock terminal and method
US20190028470A1 (en) Method For Verifying The Identity Of A Person
CN111161454A (en) Intelligent lock safety networking and control method
US7997479B2 (en) Reader with integrated encryption unit
WO2018052326A1 (en) A device for the translation of tags transmitted in the ble protocol into rfid tags, and the ble and rfid key generation method
CN107070663B (en) Mobile terminal-based field authentication method and field authentication system
KR20220170129A (en) Server emulator for kiosk communication, server emulation system and method having same
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
GB2600696A (en) Augmented access control system
CN108990043A (en) A kind of remote unlocking method and its intelligent door lock based on core network communications
KR100657577B1 (en) System and method for authorization using client information assembly
JP6725116B2 (en) Multiple authentication method, multiple authentication system group, and multiple authentication program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17851164

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17851164

Country of ref document: EP

Kind code of ref document: A1