WO2019069257A1 - A method to identify and/or authenticate the user of a mobile equipment in a specific area - Google Patents

A method to identify and/or authenticate the user of a mobile equipment in a specific area Download PDF

Info

Publication number
WO2019069257A1
WO2019069257A1 PCT/IB2018/057696 IB2018057696W WO2019069257A1 WO 2019069257 A1 WO2019069257 A1 WO 2019069257A1 IB 2018057696 W IB2018057696 W IB 2018057696W WO 2019069257 A1 WO2019069257 A1 WO 2019069257A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile equipment
wireless signal
receivers
user
signals
Prior art date
Application number
PCT/IB2018/057696
Other languages
French (fr)
Inventor
David Corrêa
Gérald HUGUENIN
Original Assignee
Acube Technology Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Acube Technology Sa filed Critical Acube Technology Sa
Publication of WO2019069257A1 publication Critical patent/WO2019069257A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • G07B15/02Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points taking into account a variable factor such as distance or time, e.g. for passenger transport, parking systems or car rental systems
    • G07B15/04Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points taking into account a variable factor such as distance or time, e.g. for passenger transport, parking systems or car rental systems comprising devices to free a barrier, turnstile, or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/10Movable barriers with registering means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel

Definitions

  • the present invention concerns a method to identify and/or authenticate the user of a mobile equipment in a specific area. This method could be used to authorize the user to access a restricted area, such as a parking lot or another restricted area for example.
  • Access control systems using a smartphone are also known.
  • An advantage is that many users have their smartphone constantly with them, and don't forget them.
  • most systems use an application that needs to run in the background, using memory space and draining the battery even when no access is required.
  • a beacon sends a first wireless signal to the mobile equipment, in order to launch an application in said mobile equipment;
  • a second wireless signal is sent by the mobile equipment and received by a plurality of receivers
  • the location of said mobile equipment is determined, based on differences in signals received by said receivers;
  • an authorization access is generated that depends on said location.
  • a first wireless signal is sent by the beacon in order to wake up the application when the user is in the vicinity. Therefore, the user does not need to run the application permanently, thus preserving its battery.
  • the application will be launched automatically when the first signal is received from the beacon, or by the user.
  • the mobile equipment could be a mobile phone, a smart watch, or a similar electronic wearable/portable equipment.
  • the specific area is a limited area, for example a few square meters.
  • the authorization access may be a signal or a command.
  • the authorization access can trigger the opening of a gate or door.
  • the first signal may be sent according to the Bluetooth Low Energy protocol (BLE).
  • the mobile equipment may use the iOS, the Android or any other operating system for smartphones or similar user equipments.
  • the first signal may be sent by an iBeacon.
  • the mobile equipment may use the "Core Location APIs" in iOS to be notified when it has moved into a region covered by an iBeacon.
  • the gateway receives and verifies a device identity sent by the mobile equipment.
  • the authorization access depends on the location and on the verification of the device identity.
  • the device identity may be sent to a payment terminal. The user may be charged for said access.
  • the authorization may depend on a verification that the payment was made.
  • the application is launched only when the first signal from the beacon is received by the mobile equipment, or manually by the user, and if the device identity is accepted by the mobile equipment.
  • the application is launched when the first signal from the beacon is received by the mobile equipment, or manually by the user.
  • the application then verifies the device identity claimed by the device, and grants access if this identity is accepted.
  • the device identity can be an identity generated for this method. Alternatively, it can be the smartphone's phone number, the IMEI code, or any identifier that could reliably be defined as unique.
  • the determination of the location of the device is used in order to prevent the risk of authorization triggered by third party users in the vicinity, for example users in front of another gate.
  • the determination of the location of the device may be based on a Time Difference of Arrival method, and on a determination of differences in arrival time of the signal sent by the device to the different receivers.
  • This time difference may be determined by comparing the amplitude of a signal available in at least two receivers at a given time.
  • this time difference may be determined by subtracting the two signals received in two receivers at a given time; the difference of amplitude is used for determining the time difference of arrival.
  • this time difference is determined by downsampling analog signals received by different receivers at a given time, converting the downsampled signals into digital downsampled signals, and determining the time difference between digital downsampled signals from different receivers.
  • the invention is further related to a computer program product embedded in tangible form and containing computer program code for causing a device to perform the above described method steps.
  • the invention is further related to a mobile equipment
  • the invention is further related to a system for identifying and/or authenticating the user of a mobile equipment in a specific area
  • a beacon arranged for sending a first wireless signal to the mobile equipment, in order to launch an application in said mobile equipment
  • Fig. 1 is a schematic view of one system according to the invention.
  • Fig. 2 illustrates various regions covered by a beacon, and a mobile equipment within the access zone.
  • Fig. 3 illustrates a BLE signal transmitted over a channel with an infinite bandwidth and received by a receiver.
  • Fig. 4 illustrates the BLE signals transmitted over a channel with an infinite bandwidth and received by two receivers at a different distance from the sender.
  • Fig. 5 illustrates a BLE signal transmitted over a channel with a limited bandwidth and received by a receiver.
  • Fig. 6 illustrates the BLE signals transmitted over a channel with a limited bandwidth and received by two receivers at a different distance from the sender.
  • Fig. 7 illustrates a signal corresponding to the difference between signals received by two receivers at a different distance from the sender.
  • Fig. 8 illustrates a first embodiment of a proximity positioning system.
  • Fig. 9 illustrates a second embodiment of a proximity positioning system.
  • Fig. 10 illustrates a radiofrequency downconverter
  • Figure 1 is a schematic view of a system according to the invention. All or some components of this system, except the server 200 and possibly the payment terminal 202, are located near an access to a restricted area, for example at the entrance gate of a parking lot, or next to a door of a building.
  • the system comprises following components:
  • a mobile equipment 201 such as a smartphone, a smart watch, or another type of wearable electronic equipment, is used by a user of the system who wants to be identified and/or authenticated in a specific area, for example at the entrance or a restricted area, such as a parking lot, a building, etc.
  • the mobile equipment 201 includes a microprocessor and can execute applications over an operating system, such as iOS, Android,
  • the application can communicate with a gateway 205, with a Time Difference of Arrival based system 203, and with a server 200, as further described.
  • the mobile application has been installed on the user's mobile equipment, preferably by the user, to run on top of the operating system. It is also possible to extend an existing application with a software SDK as an add-on to the existing application.
  • the user receives a login from the application owner and/or is asked to create one. He shares this login with the server. Various rights are granted with this login, including rights to access one or a plurality of restricted areas. Additional rights for additional restricted areas/gates may be granted after installation, for example as codes that the user can enter into the application, or into the server 200.
  • the access rights attributed to each user are stored in a database 2000 in or accessible by the server 200.
  • Each access right can be identified with an UID emitter (unique identifier).
  • the list of all UID emitters to which the user has access is also stored in the user's mobile equipment. Along with useful data (settings, access zone distances, etc.).
  • the database 2000 also stores the identity of the mobile equipment, the list of where each BLE Emitter is installed and gateways 205, etc.
  • the server 200 is administered through an admin console 207 than can access the server over a link 108 in order to receive and write data (authorization management, statistics, etc.).
  • an admin console 207 can access the server over a link 108 in order to receive and write data (authorization management, statistics, etc.).
  • the client Through a webpage, intranet page or a dedicated software or application, the client can access an admin console to read/write data on the server.
  • the mobile equipment 201 can detect signals sent by a beacon 208, for example over a BLE (Bluetooth Low Energy) interface. It can also emit signals, such as BLE or WIFI signals, that can be used for the beacon 208.
  • BLE Bluetooth Low Energy
  • WIFI Wireless Fidelity
  • the equipment can further communicate with a payment terminal 202, for example over a BLE, nfc, Wi-Fi or cellular link 102, and transmit payment information.
  • a payment terminal 202 for example over a BLE, nfc, Wi-Fi or cellular link 102, and transmit payment information.
  • the restricted area may be protected by a gate or a door 206.
  • This door or gate is opened if the user is authorized.
  • the beacon 208 can be battery or wire powered. Depending on the needs, one or more beacons might be installed. In an embodiment, a plurality of beacons 208 is used to define a larger or a non-circular area 300 from which the beacon signal can be received.
  • the beacon 208 emits a first wireless signal continuously, such as a BLE signal (arrow 107 on Fig. 1), which can be detected by the mobile equipment 201 when this mobile equipment is within a specific area, i.e., a detectable signal area 300 around the beacon (Fig. 2).
  • the specific area 300 may include the authorized access zone 301, from which an access to the restricted area can be validly requested.
  • the two area do not necessarily fully overlap; whether or not the user is in the access zone 301 from which access to the restricted area 302 is authorized is determined by the proximity positioning system 203, and is independent of the position of the beacon 208.
  • the beacon signal 107 includes the unique identifier UID of the beacon 208, so that the mobile equipment 201 can determine from which beacon a received signal is being emitted. If this signal is received and if the UID is included in a list of UIDs registered within the mobile equipment 200, the mobile equipment 200 launches an application (if not already running) that starts the whole process of authentication, localisation and payment on an optional basis. Otherwise, if the UID is not registered within the mobile equipment 201, the application is not launched. [0044] Each beacon UID is also registered on the server 200. The purpose (entrance gate, automatic door, exit gate, etc.) and the place of each beacon is also saved on the server.
  • a payment terminal 202 may also be part of the system, such as for example a terminal near the gate that can deliver paper or electronic tickets for accessing a restricted area 302, such as a parking lot.
  • the payment terminal 202 can communicate with the user mobile equipment 201 over a link 102, and with a remote server 200 over a link 101 , such as a TCP/IP link. Using the information sent by the mobile equipment 201 to the payment terminal 202, the terminal will then ask the server 200 for information about the user and how much will the user be charged.
  • the mobile application can also include a payment gateway.
  • the payment terminal is not necessary but the user must have an internet connection 103 in order to connect directly to the server 200 and proceed to the payment.
  • the connection 103 between the mobile equipment 201 and the server 200 is also used at least once, to exchange user credentials and the list of the UID beacons to which the mobile equipment should react, as previously described.
  • the server 200 takes decisions and executes actions such as:
  • the application in the mobile equipment might download from the server a connexion certificate when a connexion is established.
  • This certificate is encrypted with the public key of the gateway and can only be decrypted by the gateway; it includes a validity limit that might be defined by the console 207, as well as the identity of the mobile equipment. Access to the gateway is only possible during the validity period, and is blocked if the user does not renew the certificate before expiration.
  • a gateway 205 consists of an electronic device preferably mounted near the gate/door 206. It is connected to the door or gate 206 over a link 106, and controls its opening once the user has been authorized. [0051] The gateway 205 is also connected to the server 200 over a link 105, such as a TCP/IP link (WLAN and/or Internet), a LoRa link, etc.
  • a link 105 such as a TCP/IP link (WLAN and/or Internet), a LoRa link, etc.
  • the server 200 can be partially or totally integrated to the gateway 205.
  • the mobile equipment 201 can send its credentials, including a device identity, to the gateway 205 over a link 104, such as a BLE, nfc or Wi- Fi link.
  • the gateway 205 verifies with the server 200 if the user is
  • a proximity positioning system 203 is used to determine the mobile equipment 201 is in the specific area 301 from which an access can be validly requested.
  • the area 300 covered by the beacon 208 includes a portion 301 from which an access is possible, and an area 302 from which the access is not possible.
  • Those areas 301, 302 can be defined at the time of installation of the system. This can be used as an additional security and to make sure that only a user in front of the gate/door 206 can request its opening, and not a user in front of another door in the vicinity.
  • the proximity positioning system 203 can include a plurality of receivers (such as directional antennas) 204, preferably 3 to 5 receivers at a distance between 1 to 10 meters apart.
  • a signal 109 such as a BLE, nfc or Wi-Fi signal, is emitted by the application that is launched when the user enters the area 300. This signal is received at different times by the different receivers 204.
  • the receivers decode the received signals, for example using a GFSK demodulator). If the sending frequency is changed in case of frequency hopping, the receivers follow the change.
  • the proximity positioning system determines those differences in reception time between receivers, and thus to determine the position of the mobile equipment by triangulation and/or trilateration.
  • the proximity positioning system 203 is based on Time Difference of Arrival . It could comprise an embedded computer, such as a Raspberry PC, an industrial PC, etc.
  • each receiver 204 includes an antenna 2042, a transceiver 2040 and a low- pass filter 2041.
  • the signals at the output of the low-pass filter in the different receivers 204 are sent over a wired link to a central electronic unit 2030, where they are subtracted from each other with differential amplifiers 2032, and converted into digital signals by the analog-to-digital converter 2031.
  • a microcontroller 2033 receives the digital signals output by the converter 2031 , and determines from those signals the position of the mobile equipment, and/or if this mobile equipment is in the authorized access zone 301 from which an access authorization can be validly
  • the microprocessor 2033 or a system in each receiver 204, preferably also determine if the signals received by the antennas is the signal sent by a single mobile equipment, and eliminates other signals that may be received in the same frequency channel. Signal processing
  • All receivers 204 are preferably synchronised with a clock signal sent by the central electronic 2030 over a dedicated link (not shown).
  • connection 1 10 between the receivers 204 and the other components of the proximity positioning system 203 is preferably wired; length differences between the various wires can be determined and/or compensated during a calibration phase.
  • the two communication channels (104 and 109+1 10) can be compared to verify if the signal used for the Time Difference of Arrival based proximity positioning system to locate the mobile equipment is the right one.
  • the second signal sent by the mobile equipment may for example be in an ISM frequency band (2,4 GHz for example).
  • Figure 3 shows the corresponding signal received by one receiver 204 at a first distance between 1 meter and 10 meters from the mobile equipment.
  • a second receiver 204 mounted at a different distance in the same range from 1 to 100 meters from the mobile equipment 201 receives the same signal 109, but time shifted.
  • Figure 4 illustrates the time shift between those two signals.
  • the time shift t is equal to d/c where d corresponds to the difference of distance to the sender, while c corresponds to the speed of light in the air. In the example, this time difference t will be between 3,3 and 33ns.
  • Trigonometric formulas can then be used to determine the position of the device, and to check whether this device is within an authorized 3D region.
  • FIG. 6 shows the time shift (3.3 ns in this example) between the signals 109A and 109B received by two receivers 204 at a different distance from the emitting device. As one can see, this time-shift also results in a difference in the amplitude of the two signals at any given time.
  • This method does not require a high sampling frequency, and is adapted to a low power, low cost time-difference measuring system.
  • a second embodiment of a possible proximity positioning system is illustrated on Figure 9. In this embodiment, the following method is used for determining the Time Difference of Arrival): 1. The signal fo 109 received by the antennas 2042 from emitter 201 is multiplied by a reference signal fvco in order to realize a frequency downconversion. The same reference signal fvco is applied to all the signals received by all the receiving antennas 2042. 2. The result of this downconversion is that the time shift between the downconverted received signals is multiplied by a coefficient that depends on the ration of the frequency change fo/ ( fo - fvco) .
  • the determination of the time shift can be made directly with the embedded computer, by subtracting signals delivered by an analog to digital ADC converter 20341.
  • the time shift is in this case equal to d/c, multiplied by: fo/(fo-fvco) where fo is the frequency of the emitter and f vco is the reference frequency.
  • This second embodiment of the proximity positioning system can be used as an alternative to the first embodiment of Figure 8, or as a complement in addition to the first embodiment.
  • the first embodiment is more precise, but the second embodiment allows a determination of greater distances. Both embodiments could be combined in one system in order to determine even greater distances with a great precision.
  • the system further preferably comprises following components on each path between an antenna 2042 and the ADC 20341 :
  • a first amplifying and filtering module 2042 • A first amplifying and filtering module 2042;
  • the radiofrequency downconverter 2043 multiplies the signal delivered by the first amplifying and filtering module 2042 with a signal fvco delivered by a reference VCO module 20342 shared by all the
  • downconverters 2043 A schematic example of a downconverter 2043 is illustrated on Figure 10.
  • the different receivers 204 are preferably wire connected to the circuit 2030 or 2034 that computes the differences in Time Difference of Arrival based system, in order to make sure that signals received by the receivers are sampled at the same time.
  • the compensation for transmission time through the wires and/or for differences in bandwidth is determined during a calibration phase, and applied in the analogue circuit, or to the digital result.
  • the mobile equipment must have the Bluetooth turned on.
  • the mobile equipment can use an intelligent software to prevent battery draining:
  • the mobile equipment crosses the "detectable signal area" 300, it is able to detect the BLE signal sent by the beacon.
  • the mobile equipment reads the UID; if it is registered, the mobile launches a
  • the access zone 301 from which access is authorized is defined.
  • the Time Difference of Arrival based system keeps tracking and calculating the distance between the mobile equipment and each receiver 204.
  • the mobile application will:
  • the electronic gateway 205 will receive the data and will send them to the server 200 who will handle the data.
  • the server 200 checks if the credentials and mobile UID are in fact registered on the database. The server also checks if the user is authorized to interact with the electronic gateway 205 and/or to access the access zone 301 associated with this gateway. [0081] If a problem occurs (no authorization, credentials not found, etc.), the server will reply negatively to the gateway 205, or directly to the mobile equipment 201 .
  • a software in the server 200 will execute the necessary actions regarding the purpose and usage of the system. For example: at the entrance gate 206 of a parking lot, the software will assign a specific time counter to the user account, and start counting the time. At the exit gate of a parking lot, the software will stop the time counter, read it, calculate the fees and proceed to the payment using the third-party payment service.
  • the electronic gateway 205 will then execute actions according to its purpose (for example on a private garage door, an open signal will be transmitted to the door system).
  • the electronic gateway 205 will send the result to the mobile equipment 201 (ok/not ok).
  • the mobile application can at this stage and depending on the purpose of the whole system, display a notification and/or execute some actions. For example: display a notification saying "Welcome” or display the amount of fees and ask for the user confirmation to proceed to the payment. A password or biometric authentication may additionally be requested.
  • the payment (if any) can be done directly through the mobile application or using an external payment terminal 202.
  • an existing payment solution can be used (NFC or another technology) or the terminal can also contain a BLE emitter and the purpose of the Access zone will be the payment through the mobile application.
  • a user has his smartphone 201 as mobile equipment in his pocket and wants to go shopping.
  • the gate When he stops his car in front of the entrance gate, the gate will automatically open in less than 5 seconds, without the user's intervention. He just has to have his mobile phone in his pocket. He is able to drive into the parking lot.
  • a user has his smartphone 201 in his bag, on the passenger seat of his car. He is returning from work and arrives in front of his garage door 206 or entrance gate. Instead of turning down the car window and entering a Digi code, or instead of pressing a button on a remote control, he stays in the car and the door will automatically open.
  • the system and method could also be used for entering/exiting a controlled access door; entering/exiting a transportation in order to get a ticket, pay for it, etc.; entering a building, or a restricted part of a building; open and start a car; as a ski pass; for desk authentication at the workplace; to access a waste collection container; to start a mach process/program on the machine; etc.

Abstract

A method to identify and/or authenticate the user of a mobile equipment (201) in a restricted area, comprising the steps where:a beacon (208) sends a first wireless signal (107) to the mobile equipment (201); the mobile equipment (201) detects a unique identifier in said first wireless signal; in response to said first wireless signal, the mobile equipment (201) launches an application;the mobile equipment (201) simultaneously sends a second wireless signal (109) to a plurality of receivers (204); a gateway (205) determines the location of said mobile equipment (201), based on differences in signals received by said receivers; an authorization access is granted that depends on said location.

Description

A method to identify and/or authenticate the user of a mobile equipment in a specific area
Field of the invention
[0001] The present invention concerns a method to identify and/or authenticate the user of a mobile equipment in a specific area. This method could be used to authorize the user to access a restricted area, such as a parking lot or another restricted area for example.
Description of related art
[0001] Many access control systems are based on a proof of ownership of an object. For example:
- In an apartment, you need a key;
- In a parking lot, you need a paper ticket;
- In a building, you need a badge;
- For a private garage door, you need a remote control;
- In a ski access gate, you need a card/pass.
[0002] These objects are often lost or forgotten. They are costly. They might be forged. They need to be managed, ordered, sent, etc.
[0003] Access control systems using a smartphone are also known. An advantage is that many users have their smartphone constantly with them, and don't forget them. However, most systems use an application that needs to run in the background, using memory space and draining the battery even when no access is required.
[0004] Most access control systems require an action from the user in order to request access, to send his credentials and/or to confirm his presence. He might for instance be required to press a button, hold a ticket or a badge close to a reader, manipulate his remote control or his smartphone, etc., [0005] These operations are inconvenient, especially when both hands are already in use, such as for driving. Moreover, in some countries or regions, turning down a car window and putting an arm outside of a vehicle could be dangerous. Brief summary of the invention
[0006] There is a need in the prior art for an access control system based on a smartphone or a similar mobile equipment that does not need any user intervention to request an access, and does not rely on a constantly running application. [0007] According to the invention, these aims are achieved by means of a method used in the infrastructure of a system to identify and/or
authenticate the user of a mobile equipment in a specific area, comprising the following steps:
a beacon sends a first wireless signal to the mobile equipment, in order to launch an application in said mobile equipment;
a second wireless signal is sent by the mobile equipment and received by a plurality of receivers;
the location of said mobile equipment is determined, based on differences in signals received by said receivers;
an authorization access is generated that depends on said location.
[0008] In this method, a first wireless signal is sent by the beacon in order to wake up the application when the user is in the vicinity. Therefore, the user does not need to run the application permanently, thus preserving its battery. The application will be launched automatically when the first signal is received from the beacon, or by the user.
[0009] The mobile equipment could be a mobile phone, a smart watch, or a similar electronic wearable/portable equipment. [0010] The specific area is a limited area, for example a few square meters.
[0011] The authorization access may be a signal or a command. The authorization access can trigger the opening of a gate or door. [0012] The first signal may be sent according to the Bluetooth Low Energy protocol (BLE).
[0013] The mobile equipment may use the iOS, the Android or any other operating system for smartphones or similar user equipments.
[0014] The first signal may be sent by an iBeacon. The mobile equipment may use the "Core Location APIs" in iOS to be notified when it has moved into a region covered by an iBeacon.
[0015] Using this method, a user can leave his phone or mobile equipment in his pocket even with the app not running, and obtain an authorization of access without any manipulation. [0016] An application is said to be "not running" when the application is not visible in the list of open applications.
[0017] In one embodiment, the gateway receives and verifies a device identity sent by the mobile equipment. The authorization access depends on the location and on the verification of the device identity. [0018] The device identity may be sent to a payment terminal. The user may be charged for said access. The authorization may depend on a verification that the payment was made.
[0019] In one embodiment, the application is launched only when the first signal from the beacon is received by the mobile equipment, or manually by the user, and if the device identity is accepted by the mobile equipment. [0020] In another embodiment, the application is launched when the first signal from the beacon is received by the mobile equipment, or manually by the user. The application then verifies the device identity claimed by the device, and grants access if this identity is accepted. [0021] The device identity can be an identity generated for this method. Alternatively, it can be the smartphone's phone number, the IMEI code, or any identifier that could reliably be defined as unique.
[0022] The determination of the location of the device is used in order to prevent the risk of authorization triggered by third party users in the vicinity, for example users in front of another gate.
[0023] The determination of the location of the device may be based on a Time Difference of Arrival method, and on a determination of differences in arrival time of the signal sent by the device to the different receivers.
[0024] This time difference may be determined by comparing the amplitude of a signal available in at least two receivers at a given time.
[0025] In particular, this time difference may be determined by subtracting the two signals received in two receivers at a given time; the difference of amplitude is used for determining the time difference of arrival. [0026] In another embodiment, this time difference is determined by downsampling analog signals received by different receivers at a given time, converting the downsampled signals into digital downsampled signals, and determining the time difference between digital downsampled signals from different receivers. [0027] The invention is further related to a computer program product embedded in tangible form and containing computer program code for causing a device to perform the above described method steps. [0028] The invention is further related to a mobile equipment
comprising software modules sored in a memory and arranged for causing said mobile equipment to:
receive a first wireless signal sent by a beacon;
verify a unique identifier in said first wireless signal;
in response to said first wireless signal, launching an application; sending a second wireless signal simultaneously to a plurality of receivers, in order to locate said mobile equipment.
[0029] The invention is further related to a system for identifying and/or authenticating the user of a mobile equipment in a specific area,
comprising:
a beacon arranged for sending a first wireless signal to the mobile equipment, in order to launch an application in said mobile equipment;
a plurality of receivers for receiving a second wireless signal sent by the mobile equipment;
a module for determining the location of said mobile equipment based on differences in signals received by said receivers;
a module for verifying an identity sent by said mobile equipment. Brief Description of the Drawings
[0030] The invention will be better understood with the aid of the description of an embodiment given by way of example and illustrated by the figures, in which:
Fig. 1 is a schematic view of one system according to the invention.
Fig. 2 illustrates various regions covered by a beacon, and a mobile equipment within the access zone.
Fig. 3 illustrates a BLE signal transmitted over a channel with an infinite bandwidth and received by a receiver. Fig. 4 illustrates the BLE signals transmitted over a channel with an infinite bandwidth and received by two receivers at a different distance from the sender.
Fig. 5 illustrates a BLE signal transmitted over a channel with a limited bandwidth and received by a receiver.
Fig. 6 illustrates the BLE signals transmitted over a channel with a limited bandwidth and received by two receivers at a different distance from the sender.
Fig. 7 illustrates a signal corresponding to the difference between signals received by two receivers at a different distance from the sender.
Fig. 8 illustrates a first embodiment of a proximity positioning system.
Fig. 9 illustrates a second embodiment of a proximity positioning system.
Fig. 10 illustrates a radiofrequency downconverter.
Detailed Description of possible embodiments of the Invention
[0031] Figure 1 is a schematic view of a system according to the invention. All or some components of this system, except the server 200 and possibly the payment terminal 202, are located near an access to a restricted area, for example at the entrance gate of a parking lot, or next to a door of a building.
[0032] The system comprises following components:
[0033] A mobile equipment 201 , such as a smartphone, a smart watch, or another type of wearable electronic equipment, is used by a user of the system who wants to be identified and/or authenticated in a specific area, for example at the entrance or a restricted area, such as a parking lot, a building, etc.
[0034] The mobile equipment 201 includes a microprocessor and can execute applications over an operating system, such as iOS, Android,
Windows, etc. One dedicated application is used for requesting access. The application can communicate with a gateway 205, with a Time Difference of Arrival based system 203, and with a server 200, as further described. The mobile application has been installed on the user's mobile equipment, preferably by the user, to run on top of the operating system. It is also possible to extend an existing application with a software SDK as an add-on to the existing application.
[0035] The user receives a login from the application owner and/or is asked to create one. He shares this login with the server. Various rights are granted with this login, including rights to access one or a plurality of restricted areas. Additional rights for additional restricted areas/gates may be granted after installation, for example as codes that the user can enter into the application, or into the server 200.
[0036] The access rights attributed to each user are stored in a database 2000 in or accessible by the server 200. Each access right can be identified with an UID emitter (unique identifier). The list of all UID emitters to which the user has access is also stored in the user's mobile equipment. Along with useful data (settings, access zone distances, etc.).
[0037] The database 2000 also stores the identity of the mobile equipment, the list of where each BLE Emitter is installed and gateways 205, etc.
[0038] The server 200 is administered through an admin console 207 than can access the server over a link 108 in order to receive and write data (authorization management, statistics, etc.). Through a webpage, intranet page or a dedicated software or application, the client can access an admin console to read/write data on the server.
[0039] The mobile equipment 201 can detect signals sent by a beacon 208, for example over a BLE (Bluetooth Low Energy) interface. It can also emit signals, such as BLE or WIFI signals, that can be used for the
localization of the equipment. In a preferred embodiment, it can further communicate with a payment terminal 202, for example over a BLE, nfc, Wi-Fi or cellular link 102, and transmit payment information.
[0040] The restricted area may be protected by a gate or a door 206. This could be a parking gate, private garage door, a building door, or any kind of gate or equipment which needs an authentication to be accessed. This door or gate is opened if the user is authorized.
[0041] The beacon 208 can be battery or wire powered. Depending on the needs, one or more beacons might be installed. In an embodiment, a plurality of beacons 208 is used to define a larger or a non-circular area 300 from which the beacon signal can be received.
[0042] The beacon 208 emits a first wireless signal continuously, such as a BLE signal (arrow 107 on Fig. 1), which can be detected by the mobile equipment 201 when this mobile equipment is within a specific area, i.e., a detectable signal area 300 around the beacon (Fig. 2). The specific area 300 may include the authorized access zone 301, from which an access to the restricted area can be validly requested. However, as illustrated on Figure 2, the two area do not necessarily fully overlap; whether or not the user is in the access zone 301 from which access to the restricted area 302 is authorized is determined by the proximity positioning system 203, and is independent of the position of the beacon 208.
[0043] The beacon signal 107 includes the unique identifier UID of the beacon 208, so that the mobile equipment 201 can determine from which beacon a received signal is being emitted. If this signal is received and if the UID is included in a list of UIDs registered within the mobile equipment 200, the mobile equipment 200 launches an application (if not already running) that starts the whole process of authentication, localisation and payment on an optional basis. Otherwise, if the UID is not registered within the mobile equipment 201, the application is not launched. [0044] Each beacon UID is also registered on the server 200. The purpose (entrance gate, automatic door, exit gate, etc.) and the place of each beacon is also saved on the server.
[0045] A payment terminal 202 may also be part of the system, such as for example a terminal near the gate that can deliver paper or electronic tickets for accessing a restricted area 302, such as a parking lot. The payment terminal 202 can communicate with the user mobile equipment 201 over a link 102, and with a remote server 200 over a link 101 , such as a TCP/IP link. Using the information sent by the mobile equipment 201 to the payment terminal 202, the terminal will then ask the server 200 for information about the user and how much will the user be charged.
[0046] In another embodiment, the mobile application can also include a payment gateway. In that case, the payment terminal is not necessary but the user must have an internet connection 103 in order to connect directly to the server 200 and proceed to the payment. [0047] The connection 103 between the mobile equipment 201 and the server 200 is also used at least once, to exchange user credentials and the list of the UID beacons to which the mobile equipment should react, as previously described.
[0048] When the gateway is remotely connected to the server by wire, or wirelessly, the server 200 takes decisions and executes actions such as:
• Check if the user is allowed to enter the restricted area 302;
• Start a time counter 209 when a user enters a parking lot and when the user exits, stop the time counter. Calculate the parking fees.
• Communicate with a third-party service to charge a credit card or debit the user account.
[0049] Alternatively, if the gateway is not always online, the application in the mobile equipment might download from the server a connexion certificate when a connexion is established. This certificate is encrypted with the public key of the gateway and can only be decrypted by the gateway; it includes a validity limit that might be defined by the console 207, as well as the identity of the mobile equipment. Access to the gateway is only possible during the validity period, and is blocked if the user does not renew the certificate before expiration.
[0050] A gateway 205 consists of an electronic device preferably mounted near the gate/door 206. It is connected to the door or gate 206 over a link 106, and controls its opening once the user has been authorized. [0051] The gateway 205 is also connected to the server 200 over a link 105, such as a TCP/IP link (WLAN and/or Internet), a LoRa link, etc.
Alternatively, the server 200 can be partially or totally integrated to the gateway 205.
[0052] The mobile equipment 201 can send its credentials, including a device identity, to the gateway 205 over a link 104, such as a BLE, nfc or Wi- Fi link. The gateway 205 verifies with the server 200 if the user is
authorized to access the area (link 105), and communicates this reply to the mobile equipment.
[0053] A proximity positioning system 203 is used to determine the mobile equipment 201 is in the specific area 301 from which an access can be validly requested. As illustrated in Figure 2, the area 300 covered by the beacon 208 includes a portion 301 from which an access is possible, and an area 302 from which the access is not possible. Those areas 301, 302 can be defined at the time of installation of the system. This can be used as an additional security and to make sure that only a user in front of the gate/door 206 can request its opening, and not a user in front of another door in the vicinity.
[0054] The proximity positioning system 203 can include a plurality of receivers (such as directional antennas) 204, preferably 3 to 5 receivers at a distance between 1 to 10 meters apart. A signal 109, such as a BLE, nfc or Wi-Fi signal, is emitted by the application that is launched when the user enters the area 300. This signal is received at different times by the different receivers 204. The receivers decode the received signals, for example using a GFSK demodulator). If the sending frequency is changed in case of frequency hopping, the receivers follow the change.
[0055] The proximity positioning system determines those differences in reception time between receivers, and thus to determine the position of the mobile equipment by triangulation and/or trilateration. The proximity positioning system 203 is based on Time Difference of Arrival . It could comprise an embedded computer, such as a Raspberry PC, an industrial PC, etc.
[0056] Conventional methods for measuring Time Differences of Arrival rely on sampling signals received by different receivers 204, and processing in the digital domain in the Time Difference of Arrival based system. Since the distances and the arrival time differences are short, such an approach would require an extremely high sampling frequency (more than 1 GHz), and therefore an expensive and power-consuming A/D sampler.
[0057] In order to solve this problem, according to a first embodiment the method uses a proximity positioning system as illustrated on Figure 8. Each receiver 204 includes an antenna 2042, a transceiver 2040 and a low- pass filter 2041. The signals at the output of the low-pass filter in the different receivers 204 are sent over a wired link to a central electronic unit 2030, where they are subtracted from each other with differential amplifiers 2032, and converted into digital signals by the analog-to-digital converter 2031. A microcontroller 2033 receives the digital signals output by the converter 2031 , and determines from those signals the position of the mobile equipment, and/or if this mobile equipment is in the authorized access zone 301 from which an access authorization can be validly
requested. [0058] The microprocessor 2033, or a system in each receiver 204, preferably also determine if the signals received by the antennas is the signal sent by a single mobile equipment, and eliminates other signals that may be received in the same frequency channel. Signal processing
softwares may be used for this purpose. [0059] All receivers 204 are preferably synchronised with a clock signal sent by the central electronic 2030 over a dedicated link (not shown).
[0060] The connection 1 10 between the receivers 204 and the other components of the proximity positioning system 203 is preferably wired; length differences between the various wires can be determined and/or compensated during a calibration phase.
[0061] The two communication channels (104 and 109+1 10) can be compared to verify if the signal used for the Time Difference of Arrival based proximity positioning system to locate the mobile equipment is the right one. [0062] The second signal sent by the mobile equipment, as a source, may for example be in an ISM frequency band (2,4 GHz for example). Figure 3 shows the corresponding signal received by one receiver 204 at a first distance between 1 meter and 10 meters from the mobile equipment.
[0063] A second receiver 204 mounted at a different distance in the same range from 1 to 100 meters from the mobile equipment 201 receives the same signal 109, but time shifted. Figure 4 illustrates the time shift between those two signals. The time shift t is equal to d/c where d corresponds to the difference of distance to the sender, while c corresponds to the speed of light in the air. In the example, this time difference t will be between 3,3 and 33ns.
[0064] In practice, it is recommended to use at least three receivers 204. Trigonometric formulas can then be used to determine the position of the device, and to check whether this device is within an authorized 3D region.
[0065] The signal sent by the mobile equipment 201 is transmitted through a channel with a limited bandwidth. Therefore, the received signals is low-pass filtered, as shown on Figures 5 and on the detail of Figure 6. [0066] Figure 6 shows the time shift (3.3 ns in this example) between the signals 109A and 109B received by two receivers 204 at a different distance from the emitting device. As one can see, this time-shift also results in a difference in the amplitude of the two signals at any given time.
[0067] Therefore, by subtracting the two signals 109A and 109B, one obtains a signal with an amplitude that depends on the phase shift and on the difference in distance between the two receivers 204 and the emitting mobile equipment 201 . This subtraction could be performed in the analogue domain, using a subtracting circuit, or in the digital domain, by sampling the signals received at two different receivers 204 at the exact same time, and computing the difference. The subtraction circuit can be part of the Time Difference of Arrival based system, for example in the gateway 205.
[0068] This method does not require a high sampling frequency, and is adapted to a low power, low cost time-difference measuring system. [0069] A second embodiment of a possible proximity positioning system is illustrated on Figure 9. In this embodiment, the following method is used for determining the Time Difference of Arrival): 1. The signal fo 109 received by the antennas 2042 from emitter 201 is multiplied by a reference signal fvco in order to realize a frequency downconversion. The same reference signal fvco is applied to all the signals received by all the receiving antennas 2042. 2. The result of this downconversion is that the time shift between the downconverted received signals is multiplied by a coefficient that depends on the ration of the frequency change fo/ ( fo - fvco) .
3. Since the time shift becomes more important (for example close to 1 μ5/ητΐθΐθΓ), the determination of the time shift can be made directly with the embedded computer, by subtracting signals delivered by an analog to digital ADC converter 20341.
[0070] The time shift is in this case equal to d/c, multiplied by: fo/(fo-fvco) where fo is the frequency of the emitter and fvco is the reference frequency.
[0071] This second embodiment of the proximity positioning system can be used as an alternative to the first embodiment of Figure 8, or as a complement in addition to the first embodiment. The first embodiment is more precise, but the second embodiment allows a determination of greater distances. Both embodiments could be combined in one system in order to determine even greater distances with a great precision. [0072] In the example of Fig. 9, the system further preferably comprises following components on each path between an antenna 2042 and the ADC 20341 :
• A first amplifying and filtering module 2042;
• A radiofrequency downconverter 2043; · A low-pass filter 2041 ;
• A second amplifying and filtering module 2044. [0073] The radiofrequency downconverter 2043 multiplies the signal delivered by the first amplifying and filtering module 2042 with a signal fvco delivered by a reference VCO module 20342 shared by all the
downconverters 2043. A schematic example of a downconverter 2043 is illustrated on Figure 10.
[0074] The different receivers 204 are preferably wire connected to the circuit 2030 or 2034 that computes the differences in Time Difference of Arrival based system, in order to make sure that signals received by the receivers are sampled at the same time. The compensation for transmission time through the wires and/or for differences in bandwidth is determined during a calibration phase, and applied in the analogue circuit, or to the digital result.
[0075] In order to enter into the restricted area 302, the user must have his mobile equipment (for example his mobile phone) with him, no matter where (in a pocket, in a bag, on the passenger seat, etc.). The following conditions must be met:
• The mobile equipment must have the Bluetooth turned on.
• The application must have been installed in the mobile
equipment, and the required data such as the list of all necessary UID emitters must have been downloaded
• The mobile equipment must not be shut down but the screen can be turned off, and the mobile equipment application doesn't need to be running even in background.
[0076] The mobile equipment can use an intelligent software to prevent battery draining:
Geofencing: if outside of this zone, the BLE scan will never occur • Accelerometer: if the mobile equipment doesn't move, the scan for beacon signals will never occur.
[0077] When the mobile equipment crosses the "detectable signal area" 300, it is able to detect the BLE signal sent by the beacon. The mobile equipment reads the UID; if it is registered, the mobile launches a
dedicated application if not started yet and starts the process of sending a signal to receivers 204, in order to determine its location.
[0078] On the mobile application, and/or in the server 200, the access zone 301 from which access is authorized is defined. The Time Difference of Arrival based system keeps tracking and calculating the distance between the mobile equipment and each receiver 204. When the mobile equipment is within the access zone 300, the mobile application will:
• Display a notification on a screen of the mobile equipment 201 , or vocally, saying that the user is entering the access zone (the type of notification depends on the purpose of the whole system)
• With encrypted communication: user credentials, mobile UID and a request (open gate request for example) are sent to the electronic gateway 205 using BLE. More data can be sent in order to use the Time Difference of Arrival location method. In that case, the mobile data will be used to determine the mobile equipment location by the Time Difference of Arrival system 203.
[0079] The electronic gateway 205 will receive the data and will send them to the server 200 who will handle the data.
[0080] The server 200 checks if the credentials and mobile UID are in fact registered on the database. The server also checks if the user is authorized to interact with the electronic gateway 205 and/or to access the access zone 301 associated with this gateway. [0081] If a problem occurs (no authorization, credentials not found, etc.), the server will reply negatively to the gateway 205, or directly to the mobile equipment 201 .
[0082] If everything is ok, a software in the server 200 will execute the necessary actions regarding the purpose and usage of the system. For example: at the entrance gate 206 of a parking lot, the software will assign a specific time counter to the user account, and start counting the time. At the exit gate of a parking lot, the software will stop the time counter, read it, calculate the fees and proceed to the payment using the third-party payment service.
[0083] When the server has finished its actions, a positive reply will be transmitted to the electronic gateway 205.
[0084] The electronic gateway 205 will then execute actions according to its purpose (for example on a private garage door, an open signal will be transmitted to the door system).
[0085] Finally, the electronic gateway 205 will send the result to the mobile equipment 201 (ok/not ok).
[0086] The mobile application can at this stage and depending on the purpose of the whole system, display a notification and/or execute some actions. For example: display a notification saying "Welcome" or display the amount of fees and ask for the user confirmation to proceed to the payment. A password or biometric authentication may additionally be requested.
[0087] The payment (if any) can be done directly through the mobile application or using an external payment terminal 202.
[0088] If an external payment terminal is used, an existing payment solution can be used (NFC or another technology) or the terminal can also contain a BLE emitter and the purpose of the Access zone will be the payment through the mobile application.
[0089] Example of a user entering and exiting a parking lot:
[0090] A user has his smartphone 201 as mobile equipment in his pocket and wants to go shopping.
[0091] He takes his car, and approaches the parking lot and reaches the entrance gate 206.
[0092] When he stops his car in front of the entrance gate, the gate will automatically open in less than 5 seconds, without the user's intervention. He just has to have his mobile phone in his pocket. He is able to drive into the parking lot.
[0093] After shopping, he returns to his car with his smartphone 201 somewhere with him. He approaches the exit gate. When he stops the car in front of the gate and in less than 5 seconds, the payment is made and the gate opens automatically, without user intervention. He is able to exit the parking lot.
[0094] Example of user entering a private garage door:
[0095] A user has his smartphone 201 in his bag, on the passenger seat of his car. He is returning from work and arrives in front of his garage door 206 or entrance gate. Instead of turning down the car window and entering a Digi code, or instead of pressing a button on a remote control, he stays in the car and the door will automatically open.
[0096] The system and method could also be used for entering/exiting a controlled access door; entering/exiting a transportation in order to get a ticket, pay for it, etc.; entering a building, or a restricted part of a building; open and start a car; as a ski pass; for desk authentication at the workplace; to access a waste collection container; to start a mach process/program on the machine; etc.

Claims

Claims
1. A method to identify and/or authenticate the user of a mobile equipment (201) in a specific area, comprising the steps where:
a beacon (208) sends a first wireless signal (107) to the mobile equipment (201);
the mobile equipment (201) detects a unique identifier in said first wireless signal;
in response to said first wireless signal, the mobile equipment (201) launches an application;
the mobile equipment (201) simultaneously sends a second wireless signal (109) to a plurality of receivers (204);
a gateway (205) determines the location of said mobile equipment (201), based on differences in signals received by said receivers;
a device identity sent by said mobile equipment (201) is verified.
2. The method of claim 1 , further comprising:
granting an authorization access that depends on said location.
3. The method of claim 2, wherein:
the authorization access depends on said location and on said verification of the device identity.
4. The method of one of the claims 1 to 3, further comprising a step of sending said device identity to a server (200) and/or to a payment terminal (202), and charging said user for said access.
5. The method of one of the claims 1 to 4, wherein:
said application is only launched if said device identity is registered in said mobile equipment (201).
6. The method of one of the claims 1 to 5, wherein said location is determined based on Time Differences of Arrival.
7. The method of claim 6, wherein said time difference of arrival is determined using a difference of amplitude of signals available in at least two receivers at a given time.
8. The method of one of the claims 6 or 7, comprising a step of downsampling analog signals from at least two receivers at a given time, converting the downsampled signals into digital signals, and determining a time difference between digital downsampled signals.
9. The method of one of the claims 1 to 6, further comprising a step of administering authorization access rights from a console (207).
10. A method used in a mobile equipment (201) to identify and/or authenticate the user of a mobile equipment in a specific area, comprising the steps of:
receiving a first wireless signal (107) sent by a beacon (208); verifying in said mobile equipment (201) a unique identifier in said first wireless signal;
in response to said first wireless signal, launching an
application in said mobile equipment (201);
sending a second wireless signal (109) simultaneously to a plurality of receivers (204), in order to locate said mobile equipment.
1 1. A method used in the infrastructure of a system to identify and/or authenticate the user of a mobile equipment (201) in a specific area, comprising following steps:
a beacon (208) sends a first wireless signal (107) to the mobile equipment (201), in order to launch an application in said mobile
equipment;
a second wireless signal (109) is sent by the mobile equipment and received by a plurality of receivers (204);
determining the location of said mobile equipment based on differences in signals received by said receivers (204);
verifying an identity sent by said mobile equipment.
12. The method of claim 9, further comprising:
generating an authorization access that depends on said location.
13. The method of claim 9, further comprising a step of sending said identity to a payment terminal (202) and/or to a server (200), and charging said user for said access.
14. The method of one of the claims 9 to 1 1 , wherein a Time Difference of Arrival method is used to determine said location.
15. The method of claim 14, wherein said Time Difference of Arrival uses a difference of amplitude of signals available in at least two receivers (204) at a given instant after sending of said second wireless signal.
16. The method of one of the claims 14 or 15, comprising a step of downsampling analog signals from at least two receivers at a given time, converting the downsampled signals into digital signals, and determining a time difference between digital downsampled signals.
17. A computer program product embedded in tangible form and containing computer program code for causing a device to perform the method steps of any one of the preceding claims when said program code is executed.
18. A mobile equipment (201) comprising software modules arranged for causing said mobile equipment to:
receive a first wireless signal (107) sent by a beacon (208); verify a unique identifier in said first wireless signal;
in response to said first wireless signal, launching an
application;
sending a second wireless signal (109) simultaneously to a plurality of receivers (204), in order to locate said mobile equipment.
19. A system for identifying and/or authenticating the user of a mobile equipment (201) in a specific area, comprising:
a beacon (208) arranged for sending a first wireless signal (107) to the mobile equipment (201), in order to launch an application in said mobile equipment;
a plurality of receivers (204) for receiving a second wireless signal (109) sent by the mobile equipment;
a module for determining the location of said mobile equipment based on differences in signals received by said receivers (204);
a module for verifying an identity sent by said mobile equipment.
PCT/IB2018/057696 2017-10-04 2018-10-03 A method to identify and/or authenticate the user of a mobile equipment in a specific area WO2019069257A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CH01216/17 2017-10-04
CH12162017 2017-10-04

Publications (1)

Publication Number Publication Date
WO2019069257A1 true WO2019069257A1 (en) 2019-04-11

Family

ID=63965714

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2018/057696 WO2019069257A1 (en) 2017-10-04 2018-10-03 A method to identify and/or authenticate the user of a mobile equipment in a specific area

Country Status (1)

Country Link
WO (1) WO2019069257A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3852072A1 (en) * 2020-01-20 2021-07-21 Skidata Ag Access control method for persons and vehicles and system for carrying out the method
WO2022007149A1 (en) * 2020-07-08 2022-01-13 黄杰 Method and system for smart bluetooth operation switching based on beacon broadcast
EP3952361A4 (en) * 2019-04-16 2022-03-30 Huawei Technologies Co., Ltd. Bluetooth scanning method and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130028246A1 (en) * 2011-07-29 2013-01-31 Broadcom Corporation Wlan-based positioning system
US20160055692A1 (en) * 2014-08-19 2016-02-25 Sensormatic Electronics, LLC Method and system for access control proximity location
US20160140846A1 (en) * 2014-09-25 2016-05-19 Christopher Scott Outwater System and Method for Parking Management Based on Location Tracking
WO2016112300A1 (en) * 2015-01-09 2016-07-14 Commscope Technologies Llc System and method for location of mobile devices in confined environments
WO2016123662A1 (en) * 2015-02-02 2016-08-11 Tma Capital Australia Pty Ltd System, method and computer program for an access control system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130028246A1 (en) * 2011-07-29 2013-01-31 Broadcom Corporation Wlan-based positioning system
US20160055692A1 (en) * 2014-08-19 2016-02-25 Sensormatic Electronics, LLC Method and system for access control proximity location
US20160140846A1 (en) * 2014-09-25 2016-05-19 Christopher Scott Outwater System and Method for Parking Management Based on Location Tracking
WO2016112300A1 (en) * 2015-01-09 2016-07-14 Commscope Technologies Llc System and method for location of mobile devices in confined environments
WO2016123662A1 (en) * 2015-02-02 2016-08-11 Tma Capital Australia Pty Ltd System, method and computer program for an access control system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3952361A4 (en) * 2019-04-16 2022-03-30 Huawei Technologies Co., Ltd. Bluetooth scanning method and electronic device
EP4161112A1 (en) * 2019-04-16 2023-04-05 Huawei Technologies Co., Ltd. Bluetooth scanning method and electronic device
US11849376B2 (en) 2019-04-16 2023-12-19 Huawei Technologies Co., Ltd. Bluetooth scanning method and electronic device
EP3852072A1 (en) * 2020-01-20 2021-07-21 Skidata Ag Access control method for persons and vehicles and system for carrying out the method
US11433854B2 (en) 2020-01-20 2022-09-06 Skidata Ag Access control method for persons and vehicles and system for carrying out the method
WO2022007149A1 (en) * 2020-07-08 2022-01-13 黄杰 Method and system for smart bluetooth operation switching based on beacon broadcast
US11877331B2 (en) 2020-07-08 2024-01-16 Shenzhen Shengrun Technology Co., Ltd Method and system for smart bluetooth operation switching based on beacon broadcast

Similar Documents

Publication Publication Date Title
US10074222B2 (en) Secure short-distance-based communication and validation system for zone-based validation
US11509475B2 (en) Method and apparatus for obtaining multiple user credentials
EP2991041B1 (en) Secure short-distance-based communication and access control system
US10009745B2 (en) Validation in secure short-distance-based communication and enforcement system according to visual objects
US9514589B2 (en) Secure short-distance-based communication and access control system
US9922294B2 (en) Secure short-distance-based communication and enforcement system
CN112116735A (en) Intelligent lock unlocking method and related equipment
US20120169461A1 (en) Electronic physical access control with remote authentication
CA3041111A1 (en) Hands-free fare gate operation
US20200062215A1 (en) Method for authorizing access to a motor vehicle for use by a third party, and system
CA2957914A1 (en) Automated facility access and payment processing systems and methods
CN106603664B (en) Vehicle key system
US11462095B2 (en) Facility control methods and apparatus
WO2019069257A1 (en) A method to identify and/or authenticate the user of a mobile equipment in a specific area
KR102545867B1 (en) Method and device for data transfer between mobile device and reader device
US20220180679A1 (en) Vehicle control system
KR20150137947A (en) Door Lock System For Vehicle
US11285917B1 (en) Vehicle control system
KR102437111B1 (en) Systems, methods and computer programs for monitoring systems
CN112602299B (en) Universal personal identification signal
CN114666791B (en) Method and system for access control using short range wireless communication
US20230219526A1 (en) Vehicle control system
GB2596113A (en) A keyless entry system for a motor vehicle
WO2023168512A1 (en) Multiuser authenticating system and method for keyless entry and starting a vehicle
AU2011352985A1 (en) Electronic physical access control with remote authentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18793006

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18793006

Country of ref document: EP

Kind code of ref document: A1