![]() SECURE ACCESS CONTROL METHOD WITH READER AND MOBILE TERMINAL, IN PARTICULAR THE TELEPHONE TERMINAL T
专利摘要:
Secure access control method using: - a reader (1) in connection with a remote processing unit; a mobile terminal (2) carried by a user; wherein the reader repeatedly transmits an announcement signal including security parameters defining an access condition; and the terminal: - receives the announcement signal and determines a reception power, - evaluates the power and recognizes the reader as being close, - is notified of an access action and translates it by an access title, - checks if this title corresponds to an access condition; and if this title corresponds to an access condition, then the terminal establishes a radiofrequency connection with the near reader, with the effect of inhibiting the transmission of the announcement signal, and finally the process goes into a phase of authentication. 公开号:FR3037178A1 申请号:FR1555216 申请日:2015-06-08 公开日:2016-12-09 发明作者:Vincent Dupart;Jerome Silve;Sylvain Poitrat 申请人:Systemes Et Tech Identification (stid); IPC主号:
专利说明:
[0001] The present invention relates to a secure access control method. In the field of access control, it is known to employ secure access control readers comprising an active radio identification chip to enable contactless and short-range access control according to RFID technology. , usually by means of badges equipped with a passive radio-identification chip. It is also known to employ, in place of such badges, mobile terminals of the type telephone terminal (or smartphone) implementing a secure radiocommunication with the secure access control reader according to a long distance wireless communication protocol BLUETOOTH® type. However, the long range of such radio communication between the telephone terminal and the access control reader presents a major drawback when several access control readers are within the range of the telephone terminal, with the risk of conflict. raising security breaches. The object of the present invention is to solve this drawback by proposing a secure access control method adapted for secure radiocommunications according to long-distance wireless communication protocols, while guaranteeing a high level of security with several control readers. secure access likely to be within the scope range of a mobile terminal. For this purpose, it proposes a secure access control method using: at least one secure access control reader comprising a box receiving internally radiocommunication means associated with a microcontroller in connection with a remote processing unit; and at least one mobile radiocommunication terminal, in particular of the telephone terminal type, carried by a user; this access control method comprising an authentication phase at the end of which the microcontroller of an access control reader transmits authenticated identification data specific to the mobile terminal to the remote processing unit . [0002] According to the invention, the access control method is remarkable in that, prior to the authentication phase, the method implements the following steps: a) the or each access control reader repeatedly transmits a an announcement signal comprising security parameters defining at least one access condition to a communication with the corresponding access control reader; b) the mobile terminal receives, in a given range field, the or each announcement signal and determines a power reception of the or each announcement signal; c) the mobile terminal evaluates the or each receive power in order to establish a so-called distance parameter reflecting the distance between the mobile terminal and the or each reader, and recognizes a reader as being a close reader according to this evaluation; D) the mobile terminal is notified of an access action initiated by the user on the mobile terminal or on the near reader and translates said access action by an access ticket to said near reader, in particular according to the distance parameter associated with said near reader, said access ticket being representative of said access action; E) the mobile terminal checks whether the access title corresponds to an access condition defined by the security parameters contained in the announcement signal of said near reader; f) if the access ticket corresponds to an access condition, and if any other access conditions are fulfilled, then the mobile terminal 25 establishes a radio frequency connection with the near reader, said radio frequency connection having the effect of inhibiting the transmission of the announcement signal by said near reader, and finally the process goes into the authentication phase. Thus, the mobile terminal establishes a radio frequency connection (or radio-connection or radiocommunication) with a reader depending on its distance, and only if the access conditions are met to avoid unwanted or unwanted communications. In a particular use, during step b), the mobile terminal receives at least two announcement signals from at least two separate readers; and in step c), the mobile terminal compares the receive power of each reader and determines the near-end reader as the one with the highest receive power. Thus, when several access control readers are within the range of the mobile terminal, the latter can establish a radio-connection with the nearest reader. According to one possibility, during step e), the mobile terminal compares the power in reception of the announcement signal of the near reader with a predefined threshold and, during step f), the mobile terminal establishes a radiofrequency connection with the near reader if said reception power is greater than said threshold. Thus, a new condition is imposed on the basis of this power reception, the threshold being set to translate a proximity of the mobile terminal vis-à-vis the reader. According to one characteristic, during step d), an access action 15 corresponds to an approach, with or without contact, of the user, in particular of a user's hand, in the vicinity of a user's system. presence detection integrated in the near reader, and the detection of said approach by said presence detection system causes the transmission by said near reader of a new announcement signal comprising the security parameters and a detection index. signaling the detection of said approach, and the mobile terminal receives the new advertisement signal with said detection index and translates this detection index into an access ticket representative of said approach. Thus, the radio-connection between the mobile terminal and the near reader is established only after detection of the approach of the user near the reader, unless other conditions of access are imposed by the reader. . If the reader does not impose additional access conditions, the user can cross the secure access only by approaching the reader (including approaching his hand), without the need to manipulate his mobile terminal that can remain at inside a garment or a bag worn by the user and who will necessarily be close to the reader to exchange with him. In a particular embodiment, the presence detection system corresponds to a capacitive sensor integrated in the near reader, thus offering a capacitive detection, with or without contact, of the approach of the user's body to the reader. [0003] According to another characteristic, during step d), an access action corresponds to a pressure on a touch screen, particularly in a specific manner, maintained or according to a predefined trajectory, or on a button of the mobile terminal, and the mobile terminal translates this pressure into an access ticket representative of said pressure. Thus, the radio-connection between the mobile terminal and the near reader is established after pressing the screen or the button of the mobile terminal, unless other conditions of access are imposed by the reader. The pressure on the touch screen may correspond to the pressure on a dedicated virtual button and symbolized by an icon on the touch screen, this virtual button may for example be present on a screen saver, a home screen or a screen. screen of a page opened by a computer application. According to a possibility of the invention, during step d), an access action corresponds to a predefined motion of movement or displacement of the mobile terminal detected by a motion detector, particularly of the accelerometer type, integrated into the mobile terminal, and the mobile terminal translates this detection by the accelerometer into an access ticket representative of said predefined movement. Thus, the radio-connection between the mobile terminal and the near reader is established only after the detection of the motion predefined by the motion detector. This detection can take place when the mobile terminal is in standby mode or not, or only after launching a dedicated computer program, including a computer application on a mobile phone. The motion detector thus detects a movement of the mobile terminal and the mobile terminal recognizes that this movement corresponds to the predefined movement to establish the radio connection with the reader. In a particular embodiment, the predefined motion corresponds to an impact motion composed of a succession of at least two consecutive shots carried on the mobile terminal. In this way, the user merely typing on the mobile terminal, for example through the fabric of a garment bag or a bag, to initiate the radio-connection between the mobile terminal and the reader and thus to cross secure access. [0004] According to another possibility of the invention, during step d), an access action corresponds to an unlocking action of the mobile terminal 3037178 5 in order to make it leave its standby mode, and the mobile terminal translates this unlocking in an access title representative of said unlocking. In this case, the mobile terminal establishes a radio connection with the near reader if the mobile terminal is unlocked, and not in standby, unless other access conditions are imposed by the reader. According to another possibility of the invention, during step d), an access action corresponds to the activation of an access computer program stored in the mobile terminal, in particular accessible in the form of an application for mobile phone, and the mobile terminal translates this activation 10 into an access title representative of said activation of the computer program. Thus, the radio-connection between the mobile terminal and the near reader is established after the activation of the computer program, unless other access conditions are imposed by the reader. [0005] Advantageously and advantageously, before the authentication phase, a complementary identification step based on an identification action of the user of the mobile terminal can be provided, said identification action consisting of a predefined action on the mobile terminal for generating an identification signal which is received and analyzed by the microcontroller to allow the transition to the authentication phase. Thus, in addition to the cryptographic authentication of the identification data by the reader, the method takes advantage of the mobile terminal to ensure a complementary identification by exploiting the computing possibilities offered by the mobile terminal. [0006] Advantageously, the complementary identification step is managed by the computer program previously activated on the mobile terminal. According to another characteristic of the invention, the identification action corresponds to an entry of a code on a keypad of the mobile terminal, or to a biometric check on a biometric device integrated in the mobile terminal, or to a recognition faciale using an image taken by a camera integrated in the mobile terminal, or a voice recognition exploiting a sound recording by a microphone integrated in the mobile terminal. According to one possibility, the transmission of the announcement signal by each access control reader and the radio connection between the mobile terminal and the access control reader concerned are established according to a wireless communication protocol. long distance of the BLUETOOTH®, WIFI®, WIBREE®, WIMAX®, LORA®, ZIGBEE® or similar type. According to another possibility, each access control reader also comprises at least one additional access control system chosen from the list comprising: an active radio identification chip in order to allow a complementary access control according to the RFID technology; - a biometric control device to allow a complementary access control by biometrics; 10 - an image pickup device to allow a complementary access control by facial recognition; - a keyboard to allow a complementary access control by entering a code. Thus, several possibilities are offered for secure access with such a reader, either with a mobile terminal as described above, or with a complementary access control system which will require the use of an RFID badge (active or passive badge). for the active radio identification chip, or to know a code with the keyboard (in the form of a touch screen or in the form of a keypad), or to carry out a biometric check (fingerprint, retina, iris,. ..), or to take an image for facial recognition. Other features and advantages of the present invention will appear on reading the detailed description below, of an example of non-limiting implementation, with reference to the appended figures in which FIGS. 1 to 5 illustrate different situations. and steps during the implementation of an access control method according to the invention. With reference to FIG. 1, the method according to the invention is implemented with at least two secure access control readers 1 and at least one mobile radio terminal 2 carried by a user U. [0007] The method can also be implemented with a single reader 1. Each reader 1 comprises a housing receiving internally radiocommunication means according to a long-distance wireless communication protocol of the BLUETOOTH®, WIFI®, WIBREE®, WIMAX® type, LORA®, ZIGBEE® or the like, associated with a linked microcontroller (wireless or wired) with a remote processing unit (not shown). [0008] The mobile terminal 2 is a telephone terminal, of the smartphone type, but could also be a digital tablet, a personal digital assistant or a smart key tag or keychain equipped with a battery and a card or microchip. [0009] This mobile terminal 2 integrates radiocommunication means according to a long-distance wireless communication protocol of the BLUETOOTH®, WIFI®, WIBREE®, WIMAX®, ZIGBEE® or similar type, in order to communicate with the readers 1, as well as control electronics. [0010] The mobile terminal 2 also integrates a touch screen and a motion detector, such as for example an accelerometer and in particular a three-dimensional accelerometer. With reference to FIG. 1, in a step a), each reader 1 repeatedly transmits, in particular periodically, an advertisement signal SA comprising, in its frame, status parameters and security parameters. The status parameters reflect the status or state of the reader 1 and indicate, in initial operation, a free or available status. The security parameters define at least one access condition to a communication with the reader 1. [0011] With reference to FIG. 1, in a step b), when a user U, carrying a mobile terminal 2, is in the range of at least two readers 1, the mobile terminal 2 receives the signals SA announcement of the different readers 1. In this case, the mobile terminal 2 determines a power reception of each announcement signal SA. [0012] Then, in a step c), the mobile terminal 2 compares these powers in reception and determines the next reader 1 as being the one with the corresponding reception power is the highest. In the example of FIG. 1, the reader 1 near is the one on the left. The mobile terminal 2 also compares these reception powers with a predetermined power threshold. Then, in a step d), the mobile terminal 2 is notified of an access action initiated by the user U on the mobile terminal 2 or on the near reader 1, and translates this access action by a title access representative of said access action. [0013] With reference to FIG. 2, a possible access action corresponds to an approach, with or without contact, of the hand of the user U in the vicinity of a presence detection system (in particular of the capacitive sensor type ) integrated in the reader 1 near. This detection of the approach or the presence of the hand by the presence detection system causes the transmission by the reader 1 near 5 of a new announcement signal comprising, in its frame, the status parameters. and the security settings, where the security settings are unchanged and the status settings indicate a "presence detection" status following detection of the approach of the hand. In other words, the new announcement signal includes a detection index (in the 10 status parameters) which signal the detection of the approach of the hand. Thus, the mobile terminal 2 is notified of this hand approaching action by receiving the new announcement signal with this detection index, and the mobile terminal 2 translates this detection index into an access ticket representative of said approach of the hand. It should be noted that, in this case, the user U can keep his mobile terminal 2 in his hand, in his pocket or in a bag, unless other access conditions require acting on the terminal. 2. With reference to FIG. 3, a possible access action corresponds to a pressure, with one or more fingers, on the touch screen of the mobile terminal 2 (alternatively, this pressure can be exerted on a button of the mobile terminal 2). This pressure can be done on a virtual button present on the idle screen of the mobile terminal 2, or visible only after opening / activating a computer program (for example a computer application on a smartphone). This pressure can also be performed in a dedicated interface (especially within a dedicated application) and according to a predefined path, in order to define a predefined symbol. The mobile terminal then translates this pressure into an access ticket representative of said pressure. [0014] Also with reference to FIG. 3, a possible access action corresponds to the activation of an access computer program stored in the mobile terminal 2, in particular in the form of a smartphone application. Conventionally, this activation is performed by clicking on the touch screen on a dedicated icon. The mobile terminal translates this activation into an access title representative of said activation of the computer program. [0015] Also with reference to FIG. 3, a possible access action corresponds to an unlocking action of the mobile terminal 2 in order to change it from a standby mode to an activated or awake mode; this unlocking action operates conventionally by pressing a button or on the touch screen. The mobile terminal 2 translates this unlocking into an access ticket representative of said unlocking. With reference to FIG. 4, a possible access action corresponds to a predefined impact movement MI of the mobile terminal 2 detected by the motion detector (not shown) integrated in the mobile terminal 2, ie a movement in which the mobile terminal 2 undergoes at least one impact or shock, preferably of small amplitude to avoid damaging the mobile terminal 2. Regarding the type of impact movement MI, it may for example be a movement during the user U applies a succession of at least two consecutive hits carried on the mobile terminal 2. As shown in Figure 4, the mobile terminal 2 can remain in a pocket of clothing (or in a bag) during this movement MI impact. This impact movement can be detected while the mobile terminal 2 is in standby mode. The mobile terminal 2 translates this detection of an impact or a succession of impacts by the motion detector into an access ticket representative of said predefined impact movement. With reference to FIG. 5, a possible access action corresponds to a predefined motion movement MD of the mobile terminal 2 detected by the motion detector (not shown) integrated in the mobile terminal 2. [0016] Concerning the type of movement movement MD, it may for example be a movement during which the user U takes the mobile terminal 2 in hand and makes it follow a predefined trajectory in the space, for example in making it follow a given shape trajectory as illustrated schematically and by way of example in FIG. 5 with a substantially circular trajectory 30. This movement MD movement can be detected while the mobile terminal 2 is in sleep mode, or after opening a dedicated computer program. The mobile terminal 2 translates this detection by the motion detector into an access title representative of said predefined MD movement. [0017] Then, during a step e), the mobile terminal 2 verifies the access condition or conditions defined by the security parameters contained in the announcement signal SA of the near reader 1 are satisfied, in other words, checks whether the or each access title corresponds to an access condition. [0018] In the case of the example of FIG. 2, during step e), the mobile terminal 2 checks whether said access ticket representing the approach of the hand corresponds to an access condition and additionally, it compares the power on reception of the new announcement signal with a predefined power threshold. [0019] Thus, a new condition results in this power comparison so that, in step f), the mobile terminal 2 establishes a radio connection with the near reader 1 if this receiving power is greater than said power threshold. , this threshold being calculated to reflect the proximity of the mobile terminal 2 vis-à-vis the reader 1. [0020] Then, in a step f), if the conditions of access are fulfilled, then the mobile terminal 2 establishes a radio connection with the reader 1 close, this radio-connection having the effect of inhibiting the emission of the announcement signal SA by said reader 1, in other words this radio-connection causes the cessation of the transmission of the announcement signal SA by the reader 1 near. At the end, the process goes into an authentication phase. By ceasing to send the announcement signal SA, no other mobile terminal 2 can enter into radio-connection with the reader 1 near, and this reader 1 thus becomes invisible for any other mobile terminals 2 present in the environment. [0021] During the authentication phase, the mobile terminal 2 transmits its identification data and the microcontroller of the near reader 1 authenticates its identification data and then transmits its authenticated identification data to the authentication unit. remote processing. This authentication phase may be of the simple or mutual authentication type. For example, during a simple authentication, the mobile terminal 2 and the reader 1 near enter secure radio-connection and successively: the reader 1 communicates to the mobile terminal 2 its own identifier (such as for example a number series) ; The mobile terminal 2 calculates a signature from this identifier of the reader 1 and also from the identification data of the mobile terminal 2 - the mobile terminal 2 transmits to the reader 1 its identification data as well as this signature ; the microcontroller of the reader 1 verifies with the signature the authenticity of the identification data, before transmitting these to the remote processing unit. The microcontroller of the reader 1 can authenticate the identification data with the public key of a public / private key pair, this public key being stored in a memory, preferably a secure memory, associated with the microcontroller. The processing unit will then retrieve these identification data for the purpose of processing and deciding on one or more actions, such as, for example, unlocking an access, launching an alert, operating a home automation system, and historian of transit information. etc. In addition, it can be provided that, prior to the authentication phase, the method implements a complementary identification step based on an identification action of the user U of the mobile terminal 2, this action of identification consisting of a predefined action on the mobile terminal 2 to generate an identification signal which is received and analyzed by the microcontroller to allow the transmission of the authenticated identification data specific to the mobile terminal to the remote processing unit. [0022] In other words, although the access conditions are fulfilled, it can be expected to ask the user U to perform an identification action to obtain access, this identification action being performed on the mobile terminal 2 This identification action may be performed on an interface of a dedicated computer program of the mobile terminal 2, and may consist of code entry, biometric control, facial recognition or voice recognition. The reader 1 can also integrate at least one complementary access control system (not shown) chosen from the list comprising: an active radio identification chip to allow a complementary access control according to the RFID technology; - a biometric control device to allow a complementary access control by biometry, including control of fingerprint, retina or iris; an image pickup device, such as a digital camera, to allow a complementary access control by facial recognition. - a keyboard to allow a complementary access control by entering a code. Thus, and as illustrated in FIG. 6, a person PE who does not hold a mobile terminal 2 adapted to implement the method 10 described above, can obtain access by means of such a complementary control system. access. In the example of FIG. 6, the person PE holds a badge 3 equipped with a passive RFID chip which communicates with an active radio identification chip integrated in the reader 1, in order to obtain access. 15
权利要求:
Claims (15) [0001] REVENDICATIONS1. Secure access control method using: - at least one secure access control reader (1) comprising a housing receiving internally radiocommunication means associated with a microcontroller in connection with a remote processing unit; and at least one mobile terminal (2) for radiocommunication, in particular of the telephone terminal type, carried by a user (U); said access control method comprising an authentication phase after which the microcontroller of an access control reader (1) transmits authenticated identification data specific to said mobile terminal (2) to the remote processing unit; said access control method being characterized in that, prior to the authentication phase, the method implements the following steps: a) the or each access control reader (1) repeatedly transmits an announcement signal (SA) comprising security parameters defining at least one access condition to a communication with the corresponding access control reader (1); b) the mobile terminal (2) receives, in a given range field, the or each announcement signal (SA) and determines a power reception of the or each announcement signal (SA); c) the mobile terminal (2) evaluates the or each reception power in order to establish a so-called distance parameter representing the distance between the mobile terminal (2) and the or each reader (1), and recognizes a reader (1 ) as a close reader (1) based on this evaluation; d) the mobile terminal (2) is notified of an access action initiated by the user (U) on the mobile terminal (2) or on the reader (1) close and translated said access action by a access title to said reader (1) close, in particular according to the distance parameter associated with said reader (1) close, said access ticket being representative of said access action; e) the mobile terminal (2) verifies whether the access title corresponds to an access condition defined by the security parameters contained in the announcement signal (SA) of said near reader (1); f) if the access ticket corresponds to an access condition, and if any other access conditions are fulfilled, then the mobile terminal (2) establishes a radio frequency connection with the near reader (1), said radiofrequency connection having the effect of inhibiting the transmission of the announcement signal by said reader (1), and finally the process goes into the authentication phase. 5 [0002] 2. The method of claim 1, wherein: in step b), the mobile terminal (2) receives at least two announcement signals (SA) from at least two separate readers (1); and - in step c), the mobile terminal (2) compares the reception powers of each reader (1) and determines the near reader (1) as being the one with the highest reception power. [0003] 3. Method according to any one of the preceding claims, wherein, in step e), the mobile terminal (2) compares the power in reception of the announcement signal (SA) of the reader (1) close with a threshold 15 and, in step f), the mobile terminal (2) establishes a radiofrequency connection with the reader (1) close if said power reception is greater than said threshold. [0004] 4. Method according to any one of the preceding claims, in which, during step d), an access action corresponds to an approach, with or without contact, of the user (U), in particular of a hand of the user (U), close to a presence detection system integrated with the reader (1) close, and the detection of said approach by said presence detection system causes the transmission, by said reader ( 1), a new announcement signal (SA) comprising the security parameters and a detection index signaling the detection of said approach, and the mobile terminal (2) receives the new announcement signal (SA). with said detection index and translates this detection index into an access ticket representative of said approach. 30 [0005] 5. The method of claim 4, wherein the presence detection system corresponds to a capacitive sensor integrated in the reader (1) near. [0006] 6. Method according to any one of the preceding claims, in which, during step d), an access action corresponds to a pressure on a touch screen, in particular in an ad hoc manner, maintained 3037178 or along a trajectory predefined, or on a button of the mobile terminal (2), and the mobile terminal (2) translates this pressure into an access ticket representative of said pressure. 5 [0007] 7. Method according to any one of the preceding claims, wherein, in step d), an access action corresponds to a predefined movement of movement or movement of the mobile terminal (2) detected by an integrated accelerometer. at the mobile terminal (2), and the mobile terminal (2) translates this detection by the accelerometer into an access ticket 10 representative of said predefined movement. [0008] 8. The method of claim 7, wherein the predefined movement corresponds to an impact movement composed of a succession of at least two consecutive hits carried on the mobile terminal (2). 15 [0009] 9. Method according to any one of the preceding claims, wherein, in step d), an access action corresponds to an unlocking action of the mobile terminal (2) to make it leave its standby mode, and the mobile terminal (2) translates this unlocking into an access title 20 representative of said unlocking. [0010] The method as claimed in any one of the preceding claims, wherein, in step d), an access action corresponds to the activation of an access computer program stored in the mobile terminal (2), 25 especially accessible in the form of a mobile phone application, and the mobile terminal (2) translates this activation into an access title representative of said activation of the computer program. [0011] 11. A method according to any one of the preceding claims, wherein, before the authentication phase, there is provided a complementary identification step based on a user identification action (U) of the mobile terminal (2). ), said identification action consisting of a predefined action on the mobile terminal (2) for generating an identification signal which is received and analyzed by the microcontroller to allow the transmission of the authenticated identification data specific to the mobile terminal ( 2) to the remote processing unit. 3037178 16 [0012] 12. The method of claims 10 and 11, wherein the complementary identification step is managed by the computer program previously activated on the mobile terminal (2). 5 [0013] Method according to claim 11 or 12, wherein the identification action corresponds to a code input on a keyboard of the mobile terminal (2), or to a biometric control on a biometric device integrated in the mobile terminal ( 2), or facial recognition using an image taken by a camera integrated in the mobile terminal (2), or a voice recognition exploiting a sound recording by a microphone integrated in the mobile terminal (2). [0014] 14. A method according to any one of the preceding claims, wherein the transmission of the announcement signal (SA) by each access control reader (1) and the radio communication between the mobile terminal (2) and the reader. (1) of the access control concerned are established according to a long-distance wireless communication protocol of the BLUETOOTH®, WIFI®, WIBREE®, WIMAX®, LORA®, ZIGBEE® or similar type. 20 [0015] A method according to any one of the preceding claims, wherein each access control reader (1) also comprises at least one access control complementary system selected from the list comprising: - a radio identification chip active in order to allow a complementary access control according to the RFID technology; - a biometric control device to allow a complementary access control by biometrics; an image pickup device to allow a complementary access control by facial recognition; - a keyboard to allow a complementary access control by entering a code.
类似技术:
公开号 | 公开日 | 专利标题 EP3373254B1|2021-12-15|Method for secure access control with reader and mobile handset, in particular such as a telephone handset US20180314536A1|2018-11-01|Method and apparatus for invoking function in application EP3130169B1|2020-01-01|Bio leash for user authentication EP2517141B1|2020-06-24|Multiple application chip card having biometric validation EP2031548A1|2009-03-04|Behavioural method and device intended for preventing the use of a contactless portable device without its owner's knowledge KR20170049515A|2017-05-10|Automatic authorization for access to electronic device US10691920B2|2020-06-23|Information image display method and apparatus EP3482331B1|2022-03-16|Obscuring data when gathering behavioral data WO2011067543A1|2011-06-09|Activation and indication of an rf field on a device including a chip FR3010571A1|2015-03-13|AUTHENTICATION OF A USER WITH A MOBILE DEVICE TO A VEHICLE US11100208B2|2021-08-24|Electronic device and method for controlling the same EP3428780B1|2020-01-29|Method for enabling biometric recognition pattern and related products Vongsingthong et al.2015|A survey on smartphone authentication Tornai et al.2019|Gesture-based user identity verification as an open set problem for smartphones KR20190128536A|2019-11-18|Electronic device and method for controlling the same EP3557474B1|2020-12-23|Method for controlling secure access with short-range and medium- or long-range operating modes KR20210132755A|2021-11-05|Electronic device and its control method EP3690685A1|2020-08-05|Method for authenticating a user and associated device EP3900228A1|2021-10-27|Method and device for recognising a user WO2015197963A1|2015-12-30|Identification system EP3024197A1|2016-05-25|Method for collecting biometric data FR3111721A1|2021-12-24|User authentication method on client equipment FR3029307A1|2016-06-03|ELECTRONIC DEVICE, SYSTEM COMPRISING SUCH A DEVICE, METHOD FOR CONTROLLING SUCH A DEVICE AND METHOD FOR DISPLAYING MANAGEMENT BY A SYSTEM COMPRISING SUCH A DEVICE FR2967801A1|2012-05-25|Biometric access control system for authorizing access to e.g. computer usage, has terminal with antenna positioned such that card's antenna communicates with terminal's antenna to capture biometric data of finger, when card is held in hand
同族专利:
公开号 | 公开日 US10008063B2|2018-06-26| WO2016198780A1|2016-12-15| US10102701B2|2018-10-16| US20180102008A1|2018-04-12| US20180247477A1|2018-08-30| EP3373254B1|2021-12-15| EP3304503A1|2018-04-11| FR3037178B1|2017-06-09| EP3373254A1|2018-09-12|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US20130136046A1|2011-11-30|2013-05-30|Secureall Corporation|Establishment of wireless communications| US20130281021A1|2012-04-20|2013-10-24|Nokia Corporation|Method and apparatus for switching access points based on touch selection| WO2015023737A1|2013-08-15|2015-02-19|Unikey Technologies, Inc.|Wireless access control system and related methods|EP3627459A1|2018-09-20|2020-03-25|Sewosy|Access control method and access control device suitable for implementing said method|WO2011159921A1|2010-06-16|2011-12-22|Delphian Systems, LLC|Wireless device enabled locking system| US20140077929A1|2012-03-08|2014-03-20|Unikey Technologies, Inc.|Wireless access control system and related methods| WO2014197158A2|2013-06-07|2014-12-11|Velo Labs, Inc.|Wireless ultra-low power portable lock| US20150228137A1|2014-02-07|2015-08-13|Chongqing Terminus Science And Technology Co. Ltd.|Wireless access control to a locking device| US9514296B2|2014-09-08|2016-12-06|Qualcomm Incorporated|Automatic authorization for access to electronic device| US9520008B2|2014-09-26|2016-12-13|Tyco Safety Products Canada Ltd.|Auto enrollment for configuring access control systems|EP3070900A1|2015-03-16|2016-09-21|Thomson Licensing|Method and system of access of a mobile terminal to information in an area| WO2017139220A1|2016-02-11|2017-08-17|Carrier Corporation|Soft badge-in system| GB2558590A|2017-01-09|2018-07-18|Jaguar Land Rover Ltd|Vehicle entry system| FR3080209B1|2018-04-17|2020-04-24|Systemes Et Technologies Identification |SECURE ACCESS CONTROL METHOD WITH SHORT-RANGE AND MEDIUM OR LONG-RANGE OPERATING MODES| CN110400396A|2018-04-25|2019-11-01|开利公司|The seamless system and method entered with intention assessment are carried out using mobile phone| CN109300212A|2018-09-29|2019-02-01|镇江微芯光子科技有限公司|A kind of automatic door locks| CN110443931B|2019-09-05|2021-06-01|郑州大学第一附属医院|Hospital access control system and control method| USD934092S1|2019-10-30|2021-10-26|Carrier Corporation|Wireless wall reader|
法律状态:
2016-05-26| PLFP| Fee payment|Year of fee payment: 2 | 2016-12-09| PLSC| Publication of the preliminary search report|Effective date: 20161209 | 2017-05-02| PLFP| Fee payment|Year of fee payment: 3 | 2018-05-04| PLFP| Fee payment|Year of fee payment: 4 | 2020-05-14| PLFP| Fee payment|Year of fee payment: 6 | 2021-05-12| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FR1555216A|FR3037178B1|2015-06-08|2015-06-08|SECURE ACCESS CONTROL METHOD WITH READER AND MOBILE TERMINAL, IN PARTICULAR THE TELEPHONE TERMINAL TYPE|FR1555216A| FR3037178B1|2015-06-08|2015-06-08|SECURE ACCESS CONTROL METHOD WITH READER AND MOBILE TERMINAL, IN PARTICULAR THE TELEPHONE TERMINAL TYPE| EP16732693.3A| EP3304503A1|2015-06-08|2016-06-07|Secure access control method with reader and mobile terminal, in particular such as a telephone terminal| EP18168506.6A| EP3373254B1|2015-06-08|2016-06-07|Method for secure access control with reader and mobile handset, in particular such as a telephone handset| PCT/FR2016/051358| WO2016198780A1|2015-06-08|2016-06-07|Secure access control method with reader and mobile terminal, in particular such as a telephone terminal| US15/835,733| US10008063B2|2015-06-08|2017-12-08|Secure access control method with reader and mobile terminal, in particular such as a telephone terminal| US15/964,036| US10102701B2|2015-06-08|2018-04-26|Secure access control method with reader and mobile terminal, in particular such as a telephone terminal| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|