EP0935041A1 - Apparatus and method for physical or logical access control - Google Patents

Apparatus and method for physical or logical access control Download PDF

Info

Publication number
EP0935041A1
EP0935041A1 EP99400303A EP99400303A EP0935041A1 EP 0935041 A1 EP0935041 A1 EP 0935041A1 EP 99400303 A EP99400303 A EP 99400303A EP 99400303 A EP99400303 A EP 99400303A EP 0935041 A1 EP0935041 A1 EP 0935041A1
Authority
EP
European Patent Office
Prior art keywords
code
physical
access
lock
locking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99400303A
Other languages
German (de)
French (fr)
Inventor
Christian Martineau
Eric Marichal
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP0935041A1 publication Critical patent/EP0935041A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/14With a sequence of inputs of different identification information

Definitions

  • the present invention relates to a device and a method for physical or logical access control allowing in particular to activate electromechanical locking and unlocking elements for example a lock.
  • the user is a person only one who tries to identify himself to gain access and this without control of a higher authority responsible for overseeing the operation.
  • Patent application No. 2728613 shows an example of a lock requiring no external sources of energy and whose opening is conditioned by the recognition of an access code.
  • the system is associated with a non-volatile memory carrying a code identification of the lock to be protected which can be read by the circuit electronic and compared with its preset code.
  • the object of the present invention is to overcome the drawbacks of the art by proposing for the first purpose a device particularly simple and inexpensive and with a higher level of security than systems electronics fitted with transmitters.
  • control device physical or logical access is characterized in that it comprises means physical or logical locking control that develop a first random code carrying identifiers and the status of these means of control, the device also comprising means intended to receive the first random code to develop a second random code transmitted to the control means to authorize physical or logical access, the transmissions of random codes being carried out without physical links.
  • the locking control means include a first electronic circuit mounted in an integral shoe a lock and a second electronic circuit mounted in a housing shaped to connect the two circuits when the housing is inserted in the shoe, each electronic circuit comprising storage means intended to store respectively the identifier of the case and the shoe as well as the state of means locking physical access, one of the circuits includes a program prerecorded which elaborates the first code as soon as the two circuits are connected.
  • the means receiving the first code primary include a computer system including a program of decryption allowing to extract the identifiers and the states carried by the first code, and allowing the development of the second random code after verification of the validity of the data extracted from the first code by through the consultation of a database included in the computer system.
  • one of the electronic circuits comprises a program comprising an authentication module to control the consistency of the second code with the encryption method of the primary code (21), and authorize access, if the two codes are consistent with the encryption method.
  • the receiving shoe ensures the transfer of data and energy between the dialog box and the lock.
  • a second object of the invention consists in proposing a method of physical or logical access control.
  • the method comprises step of elaboration a discharge by the access locking control means after the step activation when access is again locked by means of access lock command, this quitus then being transmitted without physical link to the command center.
  • the device according to the invention comprises, for example, a door locked by a lock (3) actuable by a mechanism electromechanical of the type of those of the prior art.
  • the mechanism of locking of the lock is connected to a first electronic circuit, by example, contained in a shoe (2) integral with the door.
  • This first circuit electronics includes a microprocessor which performs a prerecorded program capable of carrying out a diagnostic of the mechanism.
  • the first circuit can collect data on the state of the lock (3) and / or on the state of external elements such as contained objects in the trunk closed by the lock (3).
  • the status of the lock is recorded on the storage means associated with the microprocessor.
  • condition of the lock it should be understood, for example, opening or closing, alarm triggered.
  • This diagnosis is, for example, carried out via a connection between a plurality of sensors and the microprocessor of the first circuit electronic. Each sensor emits signals representative of the state of the lock (3).
  • the storage means store a series of alphanumeric characters, hereinafter called lock identifier, to uniquely identify the first electronic circuit and therefore the lock (3).
  • the device also includes a second electronic circuit autonomous from the first electronic circuit and, for example, content in a housing (1).
  • the second electronic circuit also includes a microprocessor and storage means.
  • the means of memorization are in particular intended to store a series of characters constituting a unique identification of the second electronic circuit and therefore of the case.
  • the second electronic circuit is also connected to means display (11) of the display type and an alphanumeric keyboard (12) mounted in the housing (1).
  • the housing (1) is shaped so that it can be inserted into the door shoe (2), so that the two electronic circuits located respectively in the housing (1) and in the shoe (2) can be connected to establish a connection with or without contact between the two microprocessors.
  • the two electronic circuits also include reading means of stored data. By contactless connection, it is necessary to understand a communication using magnetic, or capacitive, or optical, or radio.
  • the insertion of the housing (1) in the shoe (2) of the lock causes in first, reading by the first and second electronic circuits the identifier of the second and first electronic circuit and the reading of the state of the lock by the reading means of the first and second circuits electronic.
  • the second and the first circuit electronics elaborates, by means of a module (20) for encryption of a prerecorded program operating according to the flow diagram of FIG. 2A, a code (21) called primary from the identifiers (22, 23) of the housing and the lock and the condition (24) of the lock.
  • This code (21) is by definition generated from randomly. Once calculated, this primary code (21) is displayed on the display means (11) of the housing (1) via the microprocessor of the housing (1).
  • the primary code (21) is, for example, composed of eight alphanumeric characters, composed of numbers and letters from which are excluded those likely to present an ambiguity, that is to say 32 possible values for a character.
  • the primary code (21) defined can take 32 8 possible values, each value of which characterizes the lock (3) box (1) torque resulting from the connection between the two electronic circuits, in a given state.
  • this primary code (21) is not sufficient to unlock the lock (3). Unlocking the lock (3) is only possible with obtaining a second code (25), said opening code which, in association with the primary code (21), allows the opening of the lock (3).
  • This code is actually a complementary code to the primary and coherent code with the encryption method used to develop the primary code.
  • the center (5) of remote monitoring is equipped with a computer system (50) comprising a database in which all lock identifiers are stored (3) and boxes (1) managed by the monitoring center (5) as well as a description of each lock (3) and case (). This description includes including the location of the lock, the type of lock, the name of the case owner, the type of case.
  • the computer system (50) also includes a program executing the decryption function, inverse of the encryption performed by the first or second electronic circuit.
  • the operator of the center (5) remote monitoring remains in control of its decision whether or not to issue the code opening (25).
  • the state of the lock (3) reveals, for example, the triggering of an alarm, or if the identification number of the box (1) does not does not correspond to the identifier number expected to open the lock (3) identified, the operator does not provide the opening code (25), and therefore it is not possible to unlock the lock by this route.
  • the central station operator validates the code (21) primary.
  • This validation causes the development, by a program of computer system (50) of the remote monitoring center (5), of a code opening (25) according to the method shown in Figure 2A.
  • This code is also generated from the identification numbers (22, 23) of the housing and the lock and the condition of the lock (24) and using an encryption key (30) complementary to the encryption key used to develop the primary code (21).
  • This code, calculated by the program is a unique and random code calculated each use of the housing (1) and the lock (3) and this for the purpose of absolute security against replay.
  • the primary code encryption module (20) and the encryption key (30) opening code include for example a hazard generator introducing random information according to the encryption law used.
  • the center operator (5) of remote monitoring transmits to the operator, by the same phonic communication (4), this opening code.
  • This code is entered on the keyboard of the dialog box then memorized by the second or the first electric circuit.
  • the second and the first electronic circuit develops a code, through a prerecorded program operating according to the same method as the program of the monitoring center (5) calculating the opening code. Then, the second and the first electronic circuit performs a control of consistency between the opening code (25) entered and the primary code (21) in depending on the encryption method of the primary code.
  • the second electronic circuit transmits a signal to the first circuit electronic to activate the locking mechanism of the lock immediately or after a delay.
  • Information about the opening after delay is in this case encrypted in the code opening hours.
  • the operator locks the lock (3) by closing the door and can place again, the housing (1) in the shoe (2).
  • the reinsertion of the housing (1) in the shoe (2), after closing the door, causes the development of a new code, called the end of operation code, by the first and second electronic circuit, and following the same method as for the development of the primary code.
  • the operator transmits this end of operation code by the same communication channels (4), to the remote monitoring center (5). AT from this code, the program of the computer system (50) of the center generates a discharge.
  • This discharge is, for example, used to validate an authorization to reuse of the housing (1).
  • the electronic circuit of the housing (1) triggers a neutralization of the housing (1).
  • the housing (1) could be operational for another intervention on another lock (3).
  • the shoe (2) of the lock (3) can be installed in places not connected to the wired electric and telephone network.
  • the energy necessary for the two electronic circuits to carry out the different operations is provided by a battery mounted either in the case (1) either in the shoe (2) of the lock (3).
  • the device according to the invention can easily be adapted to other existing locking systems, electromechanical and mechanical and logic.
  • the above description relates to the use of the device for authorize physical access to a sensitive site or premises. It is possible to adapt the device according to the invention for securing the logical access, for example, to computer data or to authorize the use of computer equipment such as a computer.
  • the principle of the invention remains identical, that is to say, it involves a remote monitoring center which, from a primary code calculated by the computer system and supplied by the user, returns an additional code to authorize access to data or else authorize the use of the computer.
  • the material elements are modified. Indeed, it is no longer necessary to use two electronic circuits separate, nor to provide a physical link between these two circuits.
  • the set of functions performed by the two circuits is in this new use provided by a program, or the computer system on which are stored the data to which the user wishes to access, i.e. the computer the user wants to use.
  • the identifiers used are, for example, the serial number of the computer and the serial number of the program.
  • this program develops the primary code then, after input and validation by the user of the opening or access code returned by the center of remote monitoring, develops its own opening code and compares it with the one entered to authorize access to data or to authorize use from a computer.
  • the program also includes a clock for trigger the access validation procedure at a specific frequency or use.
  • the program asks the user to enter an access code which will be provided by the central monitoring station exchange of a primary code and after verification of the access authorization. So, in this case, the access control is only held by the center that chooses whether or not to provide the opening code.
  • the owner informs the center of remote monitoring of this flight. So when the central station receives an access authorization request for a computer whose number identification number corresponds to the identification number of the stolen computer, the monitoring station will not provide the access code, making it unusable computer.
  • the program according to the principle of the invention is stored in a memory area of the computer inaccessible to the user.

Abstract

There are access members (1-3) for physical or logical locking by determining a first random code that includes the code elements and the state of the command mechanism. The device also includes a central unit (5,50) to which the first code is transmitted in order to release a second random code, which is then transmitted back to the access means to allow the unlocking process. An Independent claim is made for a process for unlocking a physical or logical lock. The first stage is determination of a first random code from the lock (3) by insertion of a housing (1) with a keypad and display into an interface (2) in the lock, by which a first code is determined. This is transmitted to a central command unit (5,50) and a second corresponding encryption or opening code is transmitted back to allow the lock to be opened.

Description

La présente invention concerne un dispositif et un procédé de commande d'accès physique ou logique permettant notamment d'actionner des éléments électromécaniques de verrouillage et de déverrouillage par exemple d'une serrure.The present invention relates to a device and a method for physical or logical access control allowing in particular to activate electromechanical locking and unlocking elements for example a lock.

Il existe actuellement sur le marché de nombreux modèles de serrures électriques autonomes, tels que :

  • serrure électrique autonome à code, dont l'ouverture est conditionnée par la reconnaissance d'un code d'accès.
  • serrure électrique autonome dont l'ouverture est conditionnée par la lecture d'un badge d'identification avec ou sans contact.
  • serrure électrique autonome utilisant un mélange des deux techniques précédentes.
There are currently many models of autonomous electric locks on the market, such as:
  • autonomous electric code lock, the opening of which is conditioned by the recognition of an access code.
  • autonomous electric lock, the opening of which is conditioned by the reading of an identification badge with or without contact.
  • autonomous electric lock using a mixture of the two previous techniques.

Dans tous les cas précédemment cités, l'utilisateur est une personne seule qui tente de s'identifier pour obtenir l'accès et ce sans contrôle d'une autorité supérieure chargée de superviser l'opération.In all the cases mentioned above, the user is a person only one who tries to identify himself to gain access and this without control of a higher authority responsible for overseeing the operation.

La demande de brevet N° 2728613 montre un exemple de serrure ne nécessitant pas de sources extérieures d'énergie et dont l'ouverture est conditionnée par la reconnaissance d'un code d'accès. Dans une version améliorée, le système s'associe d'une mémoire non volatile portant un code d'identification de la serrure à protéger qui peut être lu par le circuit électronique et comparé avec son code préétabli.Patent application No. 2728613 shows an example of a lock requiring no external sources of energy and whose opening is conditioned by the recognition of an access code. In a version improved, the system is associated with a non-volatile memory carrying a code identification of the lock to be protected which can be read by the circuit electronic and compared with its preset code.

Aussi dans la demande WO 96/03563 le déposant a élaboré une serrure électronique mettant en correspondance les codes d'identification de la clef électronique et de la serrure et permettant l'ouverture de la porte.Also in application WO 96/03563 the applicant has drawn up a electronic lock matching the identification codes of the electronic key and lock and allowing the door to open.

L'une comme l'autre des serrures précitées présente un défaut majeur en cas de perte de clef puisque nécessitant un remplacement des éléments du dispositif et surtout leur reprogrammation.Both of the above locks have a major defect in case of loss of key since requiring replacement of the elements of the device and especially their reprogramming.

De plus, ces systèmes présentent l'inconvénient majeur de ne pouvoir authentifier l'exploitant, notamment en cas de vol de la clef électronique. In addition, these systems have the major drawback of not being able to authenticate the operator, in particular in the event of theft of the electronic key.

Seul l'apport d'un troisième élément de contrôle permet de générer l'authentification de l'exploitant.Only the contribution of a third control element can generate operator authentication.

La présente invention a pour objet de pallier les inconvénients de l'art antérieur en proposant dans un premier but un dispositif particulièrement simple et peu onéreux et d'un niveau de sécurité supérieur aux systèmes électroniques équipés de transmetteurs.The object of the present invention is to overcome the drawbacks of the art by proposing for the first purpose a device particularly simple and inexpensive and with a higher level of security than systems electronics fitted with transmitters.

Ce premier but est atteint par le fait que le dispositif de commande d'accès physique ou logique est caractérisé en ce qu'il comprend des moyens de commande de verrouillage physique ou logique qui élaborent un premier code aléatoire porteur des identifiants et de l'état de ces moyens de commande, le dispositif comprenant également des moyens destinés à recevoir le premier code aléatoire pour élaborer un deuxième code aléatoire transmis aux moyens de commande pour autoriser l'accès physique ou logique, les transmissions des codes aléatoires étant réalisées sans liaisons physiques.This first object is achieved by the fact that the control device physical or logical access is characterized in that it comprises means physical or logical locking control that develop a first random code carrying identifiers and the status of these means of control, the device also comprising means intended to receive the first random code to develop a second random code transmitted to the control means to authorize physical or logical access, the transmissions of random codes being carried out without physical links.

Selon une autre particularité, les moyens de commande de verrouillage comprennent un premier circuit électronique monté dans un sabot solidaire d'une serrure et un deuxième circuit électronique monté dans un boítier conformé pour relier les deux circuits lorsque le boítier est inséré dans le sabot, chaque circuit électronique comportant des moyens de mémorisation destinés à stocker respectivement l'identifiant du boítier et du sabot ainsi que l'état de moyens verrouillant l'accès physique, un des circuits comprend un programme préenregistré qui élabore le premier code dès que les deux circuits sont connectés.According to another particular feature, the locking control means include a first electronic circuit mounted in an integral shoe a lock and a second electronic circuit mounted in a housing shaped to connect the two circuits when the housing is inserted in the shoe, each electronic circuit comprising storage means intended to store respectively the identifier of the case and the shoe as well as the state of means locking physical access, one of the circuits includes a program prerecorded which elaborates the first code as soon as the two circuits are connected.

Selon une autre particularité, les moyens recevant le premier code primaire comprennent un système informatique comprenant un programme de décryptage permettant d'extraire les identifiants et les états portés par le premier code, et permettant d'élaborer le deuxième code aléatoire après vérification de la validité des données extraites du premier code par l'intermédiaire de la consultation d'une base de données comprise dans le système informatique. According to another particular feature, the means receiving the first code primary include a computer system including a program of decryption allowing to extract the identifiers and the states carried by the first code, and allowing the development of the second random code after verification of the validity of the data extracted from the first code by through the consultation of a database included in the computer system.

Selon une autre particularité, un des circuits électroniques comprend un programme comportant un module d'authentification pour contrôler la cohérence du deuxième code avec la méthode de cryptage du code primaire (21), et autoriser l'accès, si les deux codes sont cohérents vis-à-vis de la méthode de cryptage.According to another particularity, one of the electronic circuits comprises a program comprising an authentication module to control the consistency of the second code with the encryption method of the primary code (21), and authorize access, if the two codes are consistent with the encryption method.

Selon une autre particularité, le sabot de réception assure le transfert des données et de l'énergie entre le boítier de dialogue et la serrure.According to another particular feature, the receiving shoe ensures the transfer of data and energy between the dialog box and the lock.

Un deuxième but de l'invention consiste à proposer un procédé de commande d'accès physique ou logique.A second object of the invention consists in proposing a method of physical or logical access control.

Ce deuxième but est atteint par le fait que le procédé de commande d'accès physique ou logique est caractérisé en ce qu'il comprend :

  • une étape d'élaboration, par des moyens de commande de verrouillage d'accès, d'un premier code aléatoire porteur des identifiants et de l'état des moyens de commande de verrouillage d'accès,
  • une étape de transmission sans liaison physique du premier code primaire vers un centre de commande,
  • une étape d'extraction puis d'authentification des identifiants et des états des moyens de commande de verrouillage d'accès, par le centre de commande,
  • une étape d'élaboration d'un deuxième code aléatoire, par le centre de commande,
  • une étape de transmission sans liaison physique du deuxième code aléatoire vers les moyens de commande de verrouillage d'accès,
  • une étape de vérification de contrôle de l'authenticité du deuxième code aléatoire reçu par les moyens de commande de verrouillage d'accès.
  • une étape d'activation des moyens de commande de verrouillage pour autoriser l'accès.
This second object is achieved by the fact that the physical or logical access control method is characterized in that it comprises:
  • a step of developing, by means of access locking control means, a first random code carrying identifiers and the state of the access locking control means,
  • a step of transmission without physical link of the first primary code to a command center,
  • a step of extracting then authenticating the identifiers and the states of the access locking control means, by the command center,
  • a step of developing a second random code, by the command center,
  • a step of transmission without physical link of the second random code to the access locking control means,
  • a step of verifying the authenticity of the second random code received by the access locking control means.
  • a step of activating the locking control means to authorize access.

Selon une autre particularité, le procédé comprend étape d'élaboration d'un quitus par les moyens de commande de verrouillage d'accès après l'étape d'activation lorsque l'accès est de nouveau verrouillé par les moyens de commande de verrouillage d'accès, ce quitus étant ensuite transmis sans liaison physique au centre de commande.According to another particularity, the method comprises step of elaboration a discharge by the access locking control means after the step activation when access is again locked by means of access lock command, this quitus then being transmitted without physical link to the command center.

D'autres particularités et avantages de la présente invention apparaítront plus clairement à la lecture de la description ci-après faite en référence aux dessins annexés dans lesquels :

  • la figure 1 représente un schéma de principe du dispositif selon l'invention pour un verrouillage d'accès physique,
  • les figures 2A et 2B représentent les méthodes d'élaboration des codes aléatoires.
Other features and advantages of the present invention will appear more clearly on reading the description below made with reference to the appended drawings in which:
  • FIG. 1 represents a block diagram of the device according to the invention for locking physical access,
  • FIGS. 2A and 2B represent the methods for developing random codes.

Le dispositif selon l'invention va à présent être décrit en référence aux figures 1 et 2A et 2B. Le dispositif selon l'invention comprend, par exemple, une porte verrouillée par une serrure (3) actionnable par un mécanisme électromécanique du type de ceux de l'art antérieur. Le mécanisme de verrouillage de la serrure est relié à un premier circuit électronique, par exemple, contenu dans un sabot (2) solidaire de la porte. Ce premier circuit électronique comprend notamment un microprocesseur qui exécute un programme préenregistré capable de réaliser un diagnostic du mécanisme. En d'autres termes, le premier circuit peut collecter des données sur l'état de la serrure (3) et/ou sur l'état d'éléments externes tels que des objets contenus dans le coffre fermé par la serrure (3). L'état de la serrure est enregistré sur les moyens de mémorisation associés au microprocesseur. Par état de la serrure, il faut comprendre, par exemple, ouverture ou fermeture, alarme déclenchée. Ce diagnostic est, par exemple, réalisé par l'intermédiaire d'une connexion entre une pluralité de capteurs et le microprocesseur du premier circuit électronique. Chaque capteur émet des signaux représentatifs de l'état de la serrure (3). De même, les moyens de mémorisation stockent une série de caractères alphanumériques, appelée par la suite identifiant de la serrure, permettant d'identifier de façon unique le premier circuit électronique et donc la serrure (3).The device according to the invention will now be described with reference to Figures 1 and 2A and 2B. The device according to the invention comprises, for example, a door locked by a lock (3) actuable by a mechanism electromechanical of the type of those of the prior art. The mechanism of locking of the lock is connected to a first electronic circuit, by example, contained in a shoe (2) integral with the door. This first circuit electronics includes a microprocessor which performs a prerecorded program capable of carrying out a diagnostic of the mechanism. In other words the first circuit can collect data on the state of the lock (3) and / or on the state of external elements such as contained objects in the trunk closed by the lock (3). The status of the lock is recorded on the storage means associated with the microprocessor. By condition of the lock, it should be understood, for example, opening or closing, alarm triggered. This diagnosis is, for example, carried out via a connection between a plurality of sensors and the microprocessor of the first circuit electronic. Each sensor emits signals representative of the state of the lock (3). Likewise, the storage means store a series of alphanumeric characters, hereinafter called lock identifier, to uniquely identify the first electronic circuit and therefore the lock (3).

Le dispositif comprend également un deuxième circuit électronique autonome par rapport au premier circuit électronique et, par exemple, contenu dans un boítier (1). Le deuxième circuit électronique comprend également un microprocesseur et des moyens de mémorisation. Les moyens de mémorisation sont notamment destinés à stocker une série de caractères constituant une identification unique du deuxième circuit électronique et donc du boítier. Le deuxième circuit électronique est également relié à des moyens d'affichage (11) de type afficheur et à un clavier (12) alphanumérique monté dans le boítier (1). Le boítier (1) est conformé pour pouvoir être inséré dans le sabot (2) de la porte, de sorte que les deux circuits électroniques situés respectivement dans le boítier (1) et dans le sabot (2) puissent être connectés pour établir une liaison avec ou sans contact entre les deux microprocesseurs. Les deux circuits électroniques comprennent également des moyens de lecture de données mémorisées. Par liaison sans contact, il faut comprendre une communication utilisant des transmissions magnétiques, ou capacitives, ou optique, ou encore radio.The device also includes a second electronic circuit autonomous from the first electronic circuit and, for example, content in a housing (1). The second electronic circuit also includes a microprocessor and storage means. The means of memorization are in particular intended to store a series of characters constituting a unique identification of the second electronic circuit and therefore of the case. The second electronic circuit is also connected to means display (11) of the display type and an alphanumeric keyboard (12) mounted in the housing (1). The housing (1) is shaped so that it can be inserted into the door shoe (2), so that the two electronic circuits located respectively in the housing (1) and in the shoe (2) can be connected to establish a connection with or without contact between the two microprocessors. The two electronic circuits also include reading means of stored data. By contactless connection, it is necessary to understand a communication using magnetic, or capacitive, or optical, or radio.

L'insertion du boítier (1) dans le sabot (2) de la serrure provoque dans un premier temps, la lecture par le premier et le deuxième circuit électronique de l'identifiant du deuxième et premier circuit électronique et la lecture de l'état de la serrure par les moyens de lecture du premier et deuxième circuit électronique. Dans un deuxième temps, le deuxième et le premier circuit électronique élabore, par l'intermédiaire d'un module (20) de cryptage d'un programme préenregistré fonctionnant suivant le logigramme de la figure 2A, un code (21) dit primaire à partir des identifiants (22, 23) du boítier et de la serrure et de l'état (24) de la serrure. Ce code (21) est par définition généré de façon aléatoire. Une fois calculé, ce code primaire (21) est affiché sur les moyens d'affichage (11) du boítier (1) par l'intermédiaire du microprocesseur du boítier (1 ).The insertion of the housing (1) in the shoe (2) of the lock causes in first, reading by the first and second electronic circuits the identifier of the second and first electronic circuit and the reading of the state of the lock by the reading means of the first and second circuits electronic. Secondly, the second and the first circuit electronics elaborates, by means of a module (20) for encryption of a prerecorded program operating according to the flow diagram of FIG. 2A, a code (21) called primary from the identifiers (22, 23) of the housing and the lock and the condition (24) of the lock. This code (21) is by definition generated from randomly. Once calculated, this primary code (21) is displayed on the display means (11) of the housing (1) via the microprocessor of the housing (1).

Le code primaire (21) est, par exemple, composé de huit caractères alphanumériques, composés de chiffres et de lettres dont sont exclues celles risquant de présenter une ambiguïté, soit 32 valeurs possibles pour un caractère. Le code primaire (21) défini peut prendre 328 valeurs possibles, dont chaque valeur caractérise le couple serrure (3) boítier (1) issu de la connexion entre les deux circuits électroniques, dans un état donné.The primary code (21) is, for example, composed of eight alphanumeric characters, composed of numbers and letters from which are excluded those likely to present an ambiguity, that is to say 32 possible values for a character. The primary code (21) defined can take 32 8 possible values, each value of which characterizes the lock (3) box (1) torque resulting from the connection between the two electronic circuits, in a given state.

Comme, de plus, il est impératif de diversifier au maximum les valeurs du code primaire (21), afin de se protéger contre le rejeu, celui-ci contient un élément diversifiant évolutif et aléatoire correspondant à une clef d'encryptage. Par rejeu, il faut comprend l'utilisation frauduleuse d'un code utilisé antérieurement.As, moreover, it is imperative to diversify the values as much as possible of the primary code (21), in order to protect against replay, it contains a evolving and random diversifying element corresponding to an encryption key. By replay, you must understand the fraudulent use of a code used previously.

Cependant, ce code primaire (21) n'est pas suffisant pour déverrouiller la serrure (3). Le déverrouillage de la serrure (3) n'est possible qu'avec l'obtention d'un deuxième code (25), dit code d'ouverture qui, en association avec le code (21) primaire, permet l'ouverture de la serrure (3). Ce code d'ouverture est en fait un code complémentaire du code primaire et cohérent avec le méthode de cryptage utilisé pour élaborer le code primaire.However, this primary code (21) is not sufficient to unlock the lock (3). Unlocking the lock (3) is only possible with obtaining a second code (25), said opening code which, in association with the primary code (21), allows the opening of the lock (3). This code is actually a complementary code to the primary and coherent code with the encryption method used to develop the primary code.

Pour obtenir ce code d'ouverture (25), l'exploitant, c'est-à-dire l'utilisateur du boítier (1), doit tout d'abord appeler par voie de communication phonique (4), par exemple à l'aide d'un téléphone ou d'un émetteur récepteur, un centre (5) de commande ou de télésurveillance. Le centre (5) de télésurveillance est équipé d'un système (50) informatique comportant une base de données dans laquelle sont stockés tous les identifiants des serrures (3) et des boítiers (1) gérés par le centre (5) de télésurveillance ainsi, qu'une description de chaque serrure (3) et boítier (). Cette description comprend notamment la situation géographique de la serrure, le type de serrure, le nom du propriétaire du boítier, le type de boítier. Le système (50) informatique comprend également un programme exécutant la fonction de décryptage, inverse du cryptage réalisé par le premier ou deuxième circuit électronique. Lors de son appel au centre (5) de télésurveillance, l'exploitant procède, par exemple, à son authentification, puis fournit à un opérateur du centre (5) de télésurveillance le code primaire (21) affiché sur le boítier (1).To obtain this opening code (25), the operator, i.e. the user of the box (1), must first call by communication phonic (4), for example using a telephone or a transceiver, a command or remote monitoring center (5). The center (5) of remote monitoring is equipped with a computer system (50) comprising a database in which all lock identifiers are stored (3) and boxes (1) managed by the monitoring center (5) as well as a description of each lock (3) and case (). This description includes including the location of the lock, the type of lock, the name of the case owner, the type of case. The computer system (50) also includes a program executing the decryption function, inverse of the encryption performed by the first or second electronic circuit. When calling the central station (5), the operator proceeds, by example, upon authentication, and then provides an operator at the center (5) with remote monitoring the primary code (21) displayed on the housing (1).

L'opérateur du centre (5) de télésurveillance saisit le code primaire sur le système (50) informatique qui réalise alors le décryptage de ce code pour obtenir les numéros d'identifiant de boítier (1) et de la serrure (3) et l'état de la serrure, puis à partir de la base de données obtient les informations suivantes :

  • le numéro et le lieu de situation de la serrure (3) ;
  • le numéro du boítier (1) ;
  • le nom de l'exploitant ;
The operator of the remote monitoring center (5) enters the primary code on the computer system (50) which then performs the decryption of this code to obtain the housing identifier numbers (1) and the lock (3) and l status of the lock, then from the database gets the following information:
  • the number and location of the lock (3);
  • the case number (1);
  • the name of the operator;

De même, grâce à l'état de la serrure (3), l'opérateur du centre de surveillance connaít également :

  • l'état physique de la serrure (verrouillée ou déverrouillée, alarme agression),
  • l'état d'éléments externes, c'est-à-dire, par exemple, si le contenu du coffre verrouillé par la serrure est présent.
Similarly, thanks to the state of the lock (3), the operator of the monitoring center also knows:
  • the physical state of the lock (locked or unlocked, assault alarm),
  • the state of external elements, that is to say, for example, if the contents of the trunk locked by the lock are present.

Disposant de ces informations, l'opérateur du centre (5) de télésurveillance reste maítre de sa décision de délivrer ou non le code d'ouverture (25). Ainsi, si l'état de la serrure (3) révèle, par exemple, le déclenchement d'une alarme, ou si le numéro d'identification du boítier (1) ne correspond pas au numéro d'identifiant attendu pour ouvrir la serrure (3) identifiée, l'opérateur ne fournit pas le code d'ouverture (25), et par conséquent le déverrouillage de la serrure est impossible par cette voie.Having this information, the operator of the center (5) remote monitoring remains in control of its decision whether or not to issue the code opening (25). Thus, if the state of the lock (3) reveals, for example, the triggering of an alarm, or if the identification number of the box (1) does not does not correspond to the identifier number expected to open the lock (3) identified, the operator does not provide the opening code (25), and therefore it is not possible to unlock the lock by this route.

Après vérification auprès de l'exploitant et si la situation sous contrôle est correcte, l'opérateur du centre de télésurveillance valide le code (21) primaire. Cette validation provoque l'élaboration, par un programme du système (50) informatique du centre (5) de télésurveillance, d'un code d'ouverture (25) selon la méthode représentée figure 2A. Ce code est également généré à partir des numéros d'identification (22, 23) du boítier et de la serrure et de l'état de la serrure (24) et en utilisant une clé d'encryptage (30) complémentaire de la clé d'encryptage utilisée pour élaborer le code primaire (21). Ce code, calculé par le programme est un code unique et aléatoire calculé à chaque utilisation du boítier (1) et de la serrure (3) et ceci dans un but de sécurité absolue contre le rejeu. After checking with the operator and if the situation under control is correct, the central station operator validates the code (21) primary. This validation causes the development, by a program of computer system (50) of the remote monitoring center (5), of a code opening (25) according to the method shown in Figure 2A. This code is also generated from the identification numbers (22, 23) of the housing and the lock and the condition of the lock (24) and using an encryption key (30) complementary to the encryption key used to develop the primary code (21). This code, calculated by the program is a unique and random code calculated each use of the housing (1) and the lock (3) and this for the purpose of absolute security against replay.

Le module (20) de cryptage du code primaire et la clé (30) d'encryptage du code d'ouverture comprennent par exemple un générateur d'aléa introduisant une information aléatoire suivant la loi de cryptage utilisée.The primary code encryption module (20) and the encryption key (30) opening code include for example a hazard generator introducing random information according to the encryption law used.

Dès que le code d'ouverture (25) est calculé, l'opérateur du centre (5) de télésurveillance transmet à l'exploitant, par les mêmes voies de communication phonique (4), ce code d'ouverture. Ce code est saisi sur le clavier du boítier de dialogue puis mémorisé par le deuxième ou le premier circuit électronique. Lorsque la saisie du code d'ouverture est validée, le deuxième et le premier circuit électronique élabore un code, par l'intermédiaire d'un programme préenregistrée fonctionnant suivant la même méthode que le programme du centre (5) de télésurveillance calculant le code d'ouverture. Ensuite, le deuxième et le premier circuit électronique réalise un contrôle de cohérence entre le code d'ouverture (25) saisi et le code primaire (21) en fonction de la méthode de cryptage du code primaire. Si le code d'ouverture est cohérent avec le code primaire, c'est-à-dire, si le code d'ouverture est complémentaire du code primaire selon la méthode de cryptage du code primaire, le deuxième circuit électronique transmet un signal au premier circuit électronique pour actionner le mécanisme de verrouillage de la serrure immédiatement ou après une temporisation. L'information concernant l'ouverture après temporisation est dans ce cas cryptée dans le code d'ouverture.As soon as the opening code (25) is calculated, the center operator (5) of remote monitoring transmits to the operator, by the same phonic communication (4), this opening code. This code is entered on the keyboard of the dialog box then memorized by the second or the first electric circuit. When the entry of the opening code is validated, the second and the first electronic circuit develops a code, through a prerecorded program operating according to the same method as the program of the monitoring center (5) calculating the opening code. Then, the second and the first electronic circuit performs a control of consistency between the opening code (25) entered and the primary code (21) in depending on the encryption method of the primary code. If the opening code is consistent with the primary code, that is, if the opening code is complementary to the primary code according to the code encryption method primary, the second electronic circuit transmits a signal to the first circuit electronic to activate the locking mechanism of the lock immediately or after a delay. Information about the opening after delay is in this case encrypted in the code opening hours.

Après l'intervention sur le site, l'exploitant verrouille la serrure (3) en fermant la porte et peut placer à nouveau, le boítier (1) dans le sabot (2). La réinsertion du boítier (1) dans le sabot (2), après fermeture de la porte, provoque l'élaboration d'un nouveau code, dit code de fin d'opération, par le premier et deuxième circuit électronique, et suivant la même méthode que pour l'élaboration du code primaire. L'exploitant transmet ce code de fin d'opération par les mêmes voies de communication (4), au centre (5) de télésurveillance. A partir de ce code, le programme du système (50) informatique du centre génère un quitus. After the intervention on site, the operator locks the lock (3) by closing the door and can place again, the housing (1) in the shoe (2). The reinsertion of the housing (1) in the shoe (2), after closing the door, causes the development of a new code, called the end of operation code, by the first and second electronic circuit, and following the same method as for the development of the primary code. The operator transmits this end of operation code by the same communication channels (4), to the remote monitoring center (5). AT from this code, the program of the computer system (50) of the center generates a discharge.

Ce quitus permet à l'opérateur du centre de télésurveillance de s'assurer de l'état de la serrure (3) et de la bonne fin des opérations, puisque comme pour le code primaire, le code de fin d'opération comprend, sous forme cryptée, l'état de la serrure.This discharge allows the operator of the monitoring center to check the condition of the lock (3) and that the operations are completed, since as for the primary code, the end of operation code includes, in the form encrypted, the state of the lock.

Ce quitus est, par exemple, utilisé pour valider une autorisation de réutilisation du boítier (1). Ainsi, si le boítier (1) n'est pas réinséré en fin d'opération dans le sabot (2) dans lequel il a été introduit au début de l'opération, le circuit électronique du boítier (1) déclenche une procédure de neutralisation du boítier (1). Par contre, si le quitus est obtenu, le boítier (1) pourra être opérationnel pour une autre intervention sur une autre serrure (3).This discharge is, for example, used to validate an authorization to reuse of the housing (1). Thus, if the housing (1) is not reinserted at the end of operation in the shoe (2) into which it was introduced at the start of the operation, the electronic circuit of the housing (1) triggers a neutralization of the housing (1). By cons, if the discharge is obtained, the housing (1) could be operational for another intervention on another lock (3).

Le sabot (2) de la serrure (3) peut être installé dans des endroits non raccordés au réseau électrique et téléphonique filaire. Dans ce cas l'énergie électrique nécessaire aux deux circuits électroniques pour réaliser les différentes opérations est fournie par une batterie montée soit dans le boítier (1) soit dans le sabot (2) de la serrure (3).The shoe (2) of the lock (3) can be installed in places not connected to the wired electric and telephone network. In this case the energy necessary for the two electronic circuits to carry out the different operations is provided by a battery mounted either in the case (1) either in the shoe (2) of the lock (3).

Le dispositif selon l'invention peut s'adapter aisément à d'autres systèmes de verrouillage existants, électromécaniques et mécaniques et logique.The device according to the invention can easily be adapted to other existing locking systems, electromechanical and mechanical and logic.

On conçoit que selon l'invention, la préservation de la confidentialité des codes d'accès ne soit plus nécessaire, puisque les codes échangés sont à usage unique et instantané. Ainsi, le rejeu d'un code, c'est-à-dire sa réutilisation frauduleuse, est quasiment impossible. De plus, il n'existe aucune liaison physique entre la serrure et le centre de télésurveillance, ce qui empêche toute interception de codes ou d'informations relatives au mode de calcul des codes aléatoires.It is understood that according to the invention, the preservation of confidentiality access codes are no longer necessary, since the codes exchanged are single use and instant. Thus, the replay of a code, i.e. its fraudulent re-use is almost impossible. In addition, there is no physical link between the lock and the central station, which prevents any interception of codes or information relating to the calculation of random codes.

La description ci-dessus concerne l'utilisation du dispositif pour autoriser l'accès physique à un site ou local sensible. Il est possible d'adapter le dispositif selon l'invention pour sécuriser l'accès logique, par exemple, à des données informatiques ou pour autoriser l'utilisation de matériels informatiques tels qu'un ordinateur. Dans ce cas, le principe de l'invention reste identique, c'est-à-dire qu'il fait intervenir un centre de télésurveillance qui, à partir d'un code primaire calculé par le système informatique et fourni par l'utilisateur, retourne un code complémentaire pour autoriser l'accès à des données ou bien autoriser l'utilisation de l'ordinateur. Par contre, les éléments matériels sont modifiés. En effet, il n'est plus nécessaire d'utiliser deux circuits électroniques distincts, ni de prévoir une liaison physique entre ces deux circuits. En effet, l'ensemble des fonctions réalisées par les deux circuits est dans cette nouvelle utilisation assurée par un programme, soit du système informatique sur lequel sont stockées les données auxquelles l'utilisateur souhaite accéder, soit de l'ordinateur que l'utilisateur souhaite utiliser. De même, les identifiants utilisés sont, par exemple, le numéro de série de l'ordinateur et le numéro de série du programme. Ainsi, ce programme élabore le code primaire puis, après saisie et validation par l'utilisateur du code d'ouverture ou d'accès retourné par le centre de télésurveillance, élabore son propre code d'ouverture et le compare avec celui saisi pour autoriser l'accès à des données ou pour autoriser l'utilisation d'un ordinateur. Le programme comprend également une horloge pour déclencher selon une périodicité déterminée la procédure de validation d'accès ou d'utilisation. Ainsi, périodiquement, le programme demande à l'utilisateur de saisir un code d'accès qui lui sera fourni par le centre de télésurveillance en échange d'un code primaire et après vérification de l'autorisation d'accès. Ainsi, dans ce cas de figure, le contrôle d'accès est uniquement détenu par le centre de télésurveillance qui choisit ou non de fournir le code d'ouverture.The above description relates to the use of the device for authorize physical access to a sensitive site or premises. It is possible to adapt the device according to the invention for securing the logical access, for example, to computer data or to authorize the use of computer equipment such as a computer. In this case, the principle of the invention remains identical, that is to say, it involves a remote monitoring center which, from a primary code calculated by the computer system and supplied by the user, returns an additional code to authorize access to data or else authorize the use of the computer. However, the material elements are modified. Indeed, it is no longer necessary to use two electronic circuits separate, nor to provide a physical link between these two circuits. Indeed, the set of functions performed by the two circuits is in this new use provided by a program, or the computer system on which are stored the data to which the user wishes to access, i.e. the computer the user wants to use. Likewise, the identifiers used are, for example, the serial number of the computer and the serial number of the program. Thus, this program develops the primary code then, after input and validation by the user of the opening or access code returned by the center of remote monitoring, develops its own opening code and compares it with the one entered to authorize access to data or to authorize use from a computer. The program also includes a clock for trigger the access validation procedure at a specific frequency or use. So, periodically, the program asks the user to enter an access code which will be provided by the central monitoring station exchange of a primary code and after verification of the access authorization. So, in this case, the access control is only held by the center that chooses whether or not to provide the opening code.

Dans le cas où, par exemple, un ordinateur, par exemple, portable, équipé du dispositif selon l'invention est volé, le propriétaire avertit le centre de télésurveillance de ce vol. Ainsi, lorsque le centre de télésurveillance recevra une demande d'autorisation d'accès pour un ordinateur dont le numéro d'identification correspond au numéro d'identification de l'ordinateur volé, le centre de télésurveillance ne fournira pas le code d'accès, rendant alors l'ordinateur inutilisable.In the case where, for example, a computer, for example, laptop, equipped with the device according to the invention is stolen, the owner informs the center of remote monitoring of this flight. So when the central station receives an access authorization request for a computer whose number identification number corresponds to the identification number of the stolen computer, the monitoring station will not provide the access code, making it unusable computer.

Afin de renforcer l'efficacité de ce système pour l'application à la protection d'un ordinateur, le programme conforme au principe de l'invention est stocké dans une zone mémoire de l'ordinateur inaccessible par l'utilisateur. In order to enhance the effectiveness of this system for application to the protection of a computer, the program according to the principle of the invention is stored in a memory area of the computer inaccessible to the user.

Il est clair que d'autres modifications à la portée de l'homme du métier entrent dans le cadre de l'invention.It is clear that other modifications within the reach of those skilled in the art are within the scope of the invention.

Claims (8)

Dispositif de commande d'accès physique ou logique caractérisé en ce qu'il comprend des moyens (1, 2, 3) de commande de verrouillage physique ou logique qui élaborent un premier code aléatoire porteur des identifiants et de l'état de ces moyens de commande, le dispositif comprenant également des moyens (5, 50) destinés à recevoir le premier code aléatoire pour élaborer un deuxième code aléatoire transmis aux moyens (1, 2, 3) de commande de verrouillage pour autoriser l'accès physique ou logique, les transmissions des codes aléatoires étant réalisées sans liaisons physiques.Physical or logical access control device characterized by what it includes means (1, 2, 3) for controlling physical locking or logic that develop a first random code carrying identifiers and the state of these control means, the device also comprising means (5, 50) for receiving the first random code to generate a second random code transmitted to the means (1, 2, 3) for controlling locking to allow physical or logical access, transmissions of random codes being performed without physical links. Dispositif de commande d'accès physique ou logique selon la revendication 1, caractérisé en ce que les moyens (1, 2, 3) de commande de verrouillage comprennent un premier circuits électroniques monté dans un sabot (2) solidaire d'une serrure (3) et un deuxième circuit électronique monté dans un boítier (1) conformé pour relier les deux circuits lorsqu'il est inséré dans le sabot (2), chaque circuit électronique comportant des moyens de mémorisation destinés à stocker respectivement l'identifiant du boítier (1) et du sabot (2) ainsi que l'état de moyens (3) verrouillant l'accès physique, un des circuits comprend un programme préenregistré qui élabore le premier code dès que les deux circuits sont connectés.Physical or logical access control device depending on the claim 1, characterized in that the means (1, 2, 3) for controlling locking include a first electronic circuit mounted in a shoe (2) integral with a lock (3) and a second mounted electronic circuit in a case (1) shaped to connect the two circuits when it is inserted in the shoe (2), each electronic circuit comprising means for memorization intended to store respectively the identifier of the case (1) and the shoe (2) as well as the state of means (3) locking the physical access, one of the circuits includes a prerecorded program which develops the first code as soon as that the two circuits are connected. Dispositif de commande d'accès physique ou logique selon la revendication 1 ou 2, caractérisé en ce que les moyens (5, 50) recevant le premier code primaire comprennent un système (50) informatique comprenant un programme de décryptage permettant d'extraire les identifiants et les états portés par le premier code aléatoire, et permettant d'élaborer le deuxième code aléatoire après vérification de la validité des données extraites du premier code par l'intermédiaire de la consultation d'une base de données comprise dans le système (50) informatique.Physical or logical access control device depending on the claim 1 or 2, characterized in that the means (5, 50) receiving the first primary code includes a computer system (50) comprising a decryption program allowing to extract the identifiers and the states carried by the first random code, and used to develop the second code random after checking the validity of the data extracted from the first code through the consultation of a database included in the computer system (50). Dispositif de commande d'accès physique ou logique selon la revendication 2 ou 3, caractérisé en ce qu'un des circuits électroniques comprend un programme comportant un module d'authentification pour contrôler la cohérence du deuxième code avec la méthode de cryptage du code primaire (21), et autoriser l'accès, si les deux codes sont cohérents vis-à-vis de la méthode de cryptage.Physical or logical access control device depending on the claim 2 or 3, characterized in that one of the electronic circuits includes a program with an authentication module for check the consistency of the second code with the encryption method of the primary code (21), and authorize access, if the two codes are consistent vis-à-vis of the encryption method. Dispositif de commande d'accès physique ou logique selon la revendication 2 à 4, caractérisé en ce que le sabot (2) de réception assure le transfert des données et de l'énergie entre le boítier (1) de dialogue et la serrure (3).Physical or logical access control device depending on the claim 2 to 4, characterized in that the receiving shoe (2) ensures the transfer of data and energy between the dialog box (1) and the lock (3). Dispositif de commande d'accès physique ou logique selon la revendication 2 à 4, caractérisé en ce que le boítier (1) de dialogue assure le transfert des données et de l'énergie entre le sabot (2) de réception et la serrure (3).Physical or logical access control device depending on the claim 2 to 4, characterized in that the dialog box (1) ensures the transfer of data and energy between the receiving shoe (2) and the lock (3). Procédé de commande d'accès physique ou logique caractérisé en ce qu'il comprend : une étape d'élaboration, par des moyens (1, 2, 3) de commande de verrouillage d'accès, d'un premier code aléatoire porteur des identifiants et de l'état des moyens (1, 2, 3) de commande de verrouillage d'accès, une étape de transmission sans liaison physique du premier code primaire vers un (5) centre de commande, une étape d'extraction puis d'authentification des identifiants et des états des moyens (1, 2, 3) de commande de verrouillage d'accès, par le centre (5) de commande, une étape d'élaboration d'un deuxième code aléatoire, par le centre (5) de commande, une étape de transmission sans liaison physique du deuxième code aléatoire vers les moyens (1, 2, 3) de commande de verrouillage d'accès, une étape de vérification de contrôle de l'authenticité du deuxième code aléatoire reçu par les moyens (1, 2, 3) de commande de verrouillage d'accès, une étape d'activation des moyens (1, 2, 3) de commande de verrouillage pour autoriser l'accès. A physical or logical access control method characterized in that it comprises: a step of developing, by means (1, 2, 3) for controlling access locking, a first random code carrying identifiers and the state of the means (1, 2, 3) for controlling access lock, a step of transmission without physical link of the first primary code to one (5) command center, a step of extraction and then authentication of the identifiers and of the states of the access locking control means (1, 2, 3), by the control center (5), a step of developing a second random code, by the command center (5), a step of transmitting without a physical link the second random code to the means (1, 2, 3) for controlling access locking, a step of verifying the authenticity of the second random code received by the means (1, 2, 3) for controlling access locking, a step of activating the locking control means (1, 2, 3) to authorize access. Procédé de commande d'accès physique ou logique selon la revendication 7 caractérisé en ce qu'il comprend une étape d'élaboration d'un quitus par les moyens (1, 2, 3) de commande de verrouillage d'accès après l'étape d'activation lorsque l'accès est de nouveau verrouillé par les moyens (1, 2, 3) de commande de verrouillage d'accès, ce quitus étant ensuite transmis au centre (5) de commande.Physical or logical access control method depending on the claim 7 characterized in that it comprises a step of developing a exit by means (1, 2, 3) of access locking control after the activation step when the access is again locked by the means (1, 2, 3) access lock control, this discharge being then transmitted to the command center (5).
EP99400303A 1998-02-09 1999-02-09 Apparatus and method for physical or logical access control Withdrawn EP0935041A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR9801493 1998-02-09
FR9801493A FR2774718B1 (en) 1998-02-09 1998-02-09 ELECTRONIC DEVICE FOR OPENING AND CLOSING CONTROLS BY EXCHANGE OF RANDOM CODES CARRYING IDENTIFIERS AND STATES

Publications (1)

Publication Number Publication Date
EP0935041A1 true EP0935041A1 (en) 1999-08-11

Family

ID=9522742

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99400303A Withdrawn EP0935041A1 (en) 1998-02-09 1999-02-09 Apparatus and method for physical or logical access control

Country Status (2)

Country Link
EP (1) EP0935041A1 (en)
FR (1) FR2774718B1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003014858A2 (en) * 2001-08-09 2003-02-20 Scott Edward James Garratt Method to activate a vending machine
US7042334B2 (en) 2003-01-31 2006-05-09 General Electric Company Methods for managing access to physical assets
US7123127B2 (en) 2003-01-31 2006-10-17 General Electric Company System for managing physical assets
EP1780680A1 (en) * 2005-10-24 2007-05-02 Kaba AG Procedure for control of interlock and lock
CN102346945A (en) * 2011-10-28 2012-02-08 闵浩 Control system and method of electronic lock based on bidirectional encryption authentication technique and communication technique
US9670694B2 (en) 2007-04-12 2017-06-06 Utc Fire & Security Americas Corporation, Inc. Restricted range lockbox, access device and methods
CN110866757A (en) * 2019-11-19 2020-03-06 神州数码融信软件有限公司 Overdraft prevention method and device for electronic account

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2102996A (en) * 1981-07-01 1983-02-09 Securitas Int Ab Security system
EP0128991A1 (en) * 1983-06-16 1984-12-27 Société LOCAGEST Portable encoding device connected to a code receiver to electronically lock or unlock a mechanism
WO1993014571A1 (en) * 1992-01-09 1993-07-22 Supra Products, Inc. Secure entry system with radio communication
EP0566385A1 (en) * 1992-04-16 1993-10-20 Abloy Security Ltd. Oy Electromechanical lock arrangement
WO1996003563A1 (en) 1994-07-26 1996-02-08 Medeco Security Locks, Inc. Electronic combination lock security system
FR2728613A1 (en) 1994-12-23 1996-06-28 Clapier Bernard Autonomous code operated electronic door lock
DE19528203C1 (en) * 1995-08-01 1996-10-24 Christian Hogl Locking system for useful object used by user for determined time
WO1997031306A1 (en) * 1996-02-23 1997-08-28 Nokia Mobile Phones Ltd. Method for obtaining at least one item of user authentication data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06146674A (en) * 1992-11-10 1994-05-27 Zexel Corp Data input device of ic key lock system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2102996A (en) * 1981-07-01 1983-02-09 Securitas Int Ab Security system
EP0128991A1 (en) * 1983-06-16 1984-12-27 Société LOCAGEST Portable encoding device connected to a code receiver to electronically lock or unlock a mechanism
WO1993014571A1 (en) * 1992-01-09 1993-07-22 Supra Products, Inc. Secure entry system with radio communication
EP0566385A1 (en) * 1992-04-16 1993-10-20 Abloy Security Ltd. Oy Electromechanical lock arrangement
WO1996003563A1 (en) 1994-07-26 1996-02-08 Medeco Security Locks, Inc. Electronic combination lock security system
FR2728613A1 (en) 1994-12-23 1996-06-28 Clapier Bernard Autonomous code operated electronic door lock
DE19528203C1 (en) * 1995-08-01 1996-10-24 Christian Hogl Locking system for useful object used by user for determined time
WO1997031306A1 (en) * 1996-02-23 1997-08-28 Nokia Mobile Phones Ltd. Method for obtaining at least one item of user authentication data

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003014858A2 (en) * 2001-08-09 2003-02-20 Scott Edward James Garratt Method to activate a vending machine
WO2003014858A3 (en) * 2001-08-09 2003-12-11 Scott Edward James Garratt Method to activate a vending machine
US6850816B2 (en) 2001-08-09 2005-02-01 Scott Edward James Garratt Method to activate a vending machine
US7042334B2 (en) 2003-01-31 2006-05-09 General Electric Company Methods for managing access to physical assets
US7123127B2 (en) 2003-01-31 2006-10-17 General Electric Company System for managing physical assets
WO2007048749A1 (en) * 2005-10-24 2007-05-03 Kaba Ag Method for controlling a lock locking state and a lock
EP1780680A1 (en) * 2005-10-24 2007-05-02 Kaba AG Procedure for control of interlock and lock
AU2006307977B2 (en) * 2005-10-24 2012-03-01 Dormakaba Schweiz Ag Method for controlling the locking of a lock, and lock
CN101297327B (en) * 2005-10-24 2013-04-03 卡巴股份公司 Procedure for control of interlock and lock
US9670694B2 (en) 2007-04-12 2017-06-06 Utc Fire & Security Americas Corporation, Inc. Restricted range lockbox, access device and methods
CN102346945A (en) * 2011-10-28 2012-02-08 闵浩 Control system and method of electronic lock based on bidirectional encryption authentication technique and communication technique
CN110866757A (en) * 2019-11-19 2020-03-06 神州数码融信软件有限公司 Overdraft prevention method and device for electronic account
CN110866757B (en) * 2019-11-19 2024-02-13 神州数码融信软件有限公司 Overdraft prevention method and device for electronic account

Also Published As

Publication number Publication date
FR2774718A1 (en) 1999-08-13
FR2774718B1 (en) 2000-04-14

Similar Documents

Publication Publication Date Title
EP1780680B1 (en) Procedure for control of interlock and lock
EP0295985B1 (en) Identification system for individuals
EP0028965B1 (en) System for the identification of persons requesting access to certain areas
CN109790727A (en) Hanging locking device, system and its operating method including hanging locking device
JP4996175B2 (en) Entrance management system and entrance management method
US7495543B2 (en) Vending machines with field-programmable electronic locks
EP0719438A1 (en) Access control system for restricting access to authorised hours and renewing it using a portable storage medium
US20060196929A1 (en) Multiple use secure transaction card
JP2007515576A (en) Universal key security method and system
EP0531241A1 (en) Electronic access control system
EP3794538A1 (en) Autonomous enrolment system and method for holder of biometric device
FR2979726A1 (en) Electronic lock for safe utilized for selling e.g. goods, has keyboard actuated by operator, and smart card connected to reader by utilizing modem that is in communication with central server
EP3420172A1 (en) Secure housing with predetermined contents and dynamic management
CA2676236C (en) Portable authentication device
EP0935041A1 (en) Apparatus and method for physical or logical access control
EP1815256A1 (en) Electronic speedograph unit for motor vehicle
FR2667554A1 (en) Identification and anti-theft method for motor vehicles
FR2586124A1 (en) DEVICE FOR LOCKING MACHINE WITH POSTAGE
EP0856624B1 (en) Safety device for motor vehicle and learning method therefor
WO2002046941A1 (en) Portable information apparatus, personal authentication system, and method for erasing authentication data
EP1857966B1 (en) Portable device with an ID tag that might be interrogated by an external reader
JP2020045751A (en) Unlocking system for electronic lock unit of electrical device
EP0147276A1 (en) Coded control devices
TWM523746U (en) Cabinet management system
JP2007217903A (en) Key, unlocking device, key device, program for key, and program for unlocking device

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): DE FR GB

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

17P Request for examination filed

Effective date: 20000105

AKX Designation fees paid

Free format text: DE FR GB

17Q First examination report despatched

Effective date: 20030226

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20030709