WO2012001614A1 - Authentication device of a subject making a house call - Google Patents

Authentication device of a subject making a house call Download PDF

Info

Publication number
WO2012001614A1
WO2012001614A1 PCT/IB2011/052820 IB2011052820W WO2012001614A1 WO 2012001614 A1 WO2012001614 A1 WO 2012001614A1 IB 2011052820 W IB2011052820 W IB 2011052820W WO 2012001614 A1 WO2012001614 A1 WO 2012001614A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
authentication
fixed terminal
terminal
signal
Prior art date
Application number
PCT/IB2011/052820
Other languages
French (fr)
Inventor
Marco Ghio
Original Assignee
Marco Ghio
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Marco Ghio filed Critical Marco Ghio
Priority to EP11745828.1A priority Critical patent/EP2622781B1/en
Priority to ES11745828T priority patent/ES2571110T3/en
Publication of WO2012001614A1 publication Critical patent/WO2012001614A1/en

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E06DOORS, WINDOWS, SHUTTERS, OR ROLLER BLINDS IN GENERAL; LADDERS
    • E06BFIXED OR MOVABLE CLOSURES FOR OPENINGS IN BUILDINGS, VEHICLES, FENCES OR LIKE ENCLOSURES IN GENERAL, e.g. DOORS, WINDOWS, BLINDS, GATES
    • E06B7/00Special arrangements or measures in connection with doors or windows
    • E06B7/28Other arrangements on doors or windows, e.g. door-plates, windows adapted to carry plants, hooks for window cleaners
    • E06B7/30Peep-holes; Devices for speaking through; Doors having windows
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00634Power supply for the lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Definitions

  • the present invention relates to an authentication device for a subject paying a house call or visit, of the type pointed out in the preamble of the first claim.
  • the invention relates to a device that, in case of a visit to an office or a dwelling, is able to carry out preventive verification and control of the visitor's identity and therefore enables the resident to grant the visitor access to the office/house in full security.
  • house calls are necessary for carrying out services of public interest such as for instance notification of deeds, delivery of registered letters, meter reading for the different user bases, interventions for extraordinary maintenance.
  • house calls are often made by suitable staff that, for commercial purposes, perform a "door-to-door" activity for selling goods or offering services and promoting activities.
  • the resident is often obliged to open the door to unknown visitors whose identity he/she is therefore unable to ascertain, unless he/she bases himself/herself on that which is declared or shown by the visitor.
  • This lack of knowledge concerning a visitor is frequently utilised as an expedient by delinquents that, giving wrong personal particulars, succeed in illegally getting into the resident's houses.
  • arrangement of a particular fixed terminal is provided which is placed at the front door and is equipped with a database containing the visitors' data and with an identification system made up of keyboard and microphone.
  • the visitor types in his/her identification code on the keyboard, speaks on the microphone and the device opens the door and allows access only if the visitor's voice is substantially coincident with that stored in the database in correspondence with the previously inputted code.
  • the fixed terminal when the visitor comes to the front door, the fixed terminal sends an encrypted signal to the mobile terminal that, based thereon, creates a second signal which, in turn, is sent to the fixed signal that will verify whether it is correct and will grant access to the visitor.
  • a first important fault resides in the complexity of known authentication apparatus.
  • this fault can be found in the fixed terminals placed at the front door which, being provided with a complex identification system, are both very complicated in manufacture and very expensive.
  • the fixed terminal is particularly bulky and therefore of difficult installation.
  • This problem is further increased by the presence of powering means consisting of a battery and/or electric cables electrically feeding the fixed terminal by connecting it to the mains.
  • a further problem consists in the high installation cost of known authentication apparatus because, due to the bulkiness of same and the required connections for operation, they are not suitable for the front door presently in use and therefore replacement of these doors is required.
  • the technical task underlying the present invention is to conceive an authentication device of a subject paying a house call capable of substantially obviating the mentioned drawbacks.
  • Another important aim of the invention consists in obtaining an authentication device of easy installation.
  • a further aim of the invention is to make available an authentication device that is adapted for the presently used front doors, i.e. without being obliged to replace them.
  • Fig. 1 as a whole shows an authentication device of a subject paying a house call in accordance with the invention
  • Fig. 2 shows a component of the authentication device disposed at an entrance
  • Fig. 3 highlights, through a block diagram, an authentication process utilising the authentication device.
  • the authentication device of a subject making a house call in accordance with the invention is generally identified by reference numeral 1.
  • Device 1 It is adapted to be used for verifying the identity of a subject making a house call in a building, flat or office.
  • Device 1 can therefore be positioned at an entrance 10 such as a door or gate or other similar element and is adapted to prevent access to the house without the resident's consent.
  • the authentication device 1 fundamentally comprises a fixed terminal 20 adapted to be connected in the vicinity of an entrance 10 and a mobile terminal 30 adapted to be carried by the coming subject and to be brought into connection with the fixed terminal 20.
  • the mobile terminal 30, shown in Fig. 1 consists of an electronic device comprising a storage component 31 adapted to store information such as alphanumeric codes for example, a battery 32, preferably of the rechargeable type, or other powering systems adapted to enable energy supply to at least said storage component 31.
  • the mobile terminal 30 therefore may selectively consist of a mobile phone, a USB (Universal Serial Bus) key suitably provided with a battery 32 or other similar device.
  • the mobile terminal 30 is a USB key comprising a battery 32.
  • the mobile terminal 30 can be further provided with a recognition apparatus 33 adapted to enable use of the mobile terminal 30 exclusively by authorised subjects and a time meter 34 adapted to measure elapsing of time and to enable the mobile terminal 30 to know, date and time, instant by instant, i.e. the elapsed time from creation of the first signal.
  • a recognition apparatus 33 adapted to enable use of the mobile terminal 30 exclusively by authorised subjects
  • a time meter 34 adapted to measure elapsing of time and to enable the mobile terminal 30 to know, date and time, instant by instant, i.e. the elapsed time from creation of the first signal.
  • the time meter 34 can consist of a clock/watch or other similar device adapted to enable the mobile terminal 30 to know date and time, at each instant. Alternatively, it may consist of a decreasing counter, a timer for example that, as better clarified in the following, enables the residual lifetime of the data stored in the mobile terminal 30 to be quantified.
  • the recognition apparatus 33 can consist, if it is a mobile phone, of a keypad adapted to enable introduction of a PIN (Personal Identification Number) or, if it is a USB key, of a fingerprint reader or other similar apparatus adapted to identify the subject using the mobile terminal 30.
  • a PIN Personal Identification Number
  • the mobile terminal 30 and fixed terminal 20 comprise first connecting means 35 and 21 respectively, that is adapted to carry out connection.
  • Said first means 35 and 21 is suitable to make a connection capable of allowing at least passage of current between the two terminals 20 and 30 so as to enable the mobile terminal 30 to supply the fixed terminal 20 with the activation energy, i.e. the energy adapted to enable the fixed terminal 20 to be activated and carry out the authentication process described below.
  • the first connecting means 35 and 21 creates a data passage connection between the mobile terminal 30 and fixed terminal 20 so as to enable the mobile terminal 30 to provide the fixed terminal 20 with data necessary for authentication of the coming subject.
  • the first connecting means 35 and 21 therefore may consist of USB (Universal Serial Bus) connectors or other similar means adapted to allow both passage of current and passage of data between terminals 20 and 30.
  • USB Universal Serial Bus
  • device 1 can have a further connecting means such as a cable having two USB connectors at the ends so as to be connected to the first means 35 and 21 , and therefore being operatively interposed between terminals 20 and 30.
  • a further connecting means such as a cable having two USB connectors at the ends so as to be connected to the first means 35 and 21 , and therefore being operatively interposed between terminals 20 and 30.
  • the fixed terminal 20 is fastened in the vicinity of entrance 10, for example to a wall portion close to said entrance, and preferably terminal 20 is secured to the entrance itself. More preferably, the fixed terminal 20 is housed in the through hole 10a present in the entrance 10 that is usually employed as a peephole.
  • the fixed terminal 20 In order to enable the fixed terminal 20 to be housed in the through hole 10a, the fixed terminal 20, as shown in Fig. 1 , comprises an outer block 22, facing the outside of the house and an inner block 23 facing the inside of the house, which blocks have a portion of smaller section adapted to be inserted in the through hole 20a, and a portion of bigger section adapted to abut against the entrance 10.
  • the fixed terminal 20 has tightening means 24 adapted to mutually fasten blocks 22 and 23 at the through hole 10a bringing them into abutment with the entrance 10 on opposite sides relative to said entrance.
  • the tightening means 24 consists of screws, threaded couplings, friction fits or other similar elements adapted to mutually fasten blocks 22 and 23 varying their distance and therefore the length of the fixed terminal 20 so as to make the sizes of the fixed terminal 20 suit the thickness of said entrance 10.
  • the tightening means 24 is positioned in such a manner that said means is operable for assembling or disassembling the two blocks 22 and 23 exclusively from the inside of their housing seat. Therefore said means 24, if screws for example, have their head at the inner block 23, as shown in Fig. 2.
  • the outer block is adapted to be connected to the mobile terminal 30 and therefore has said connecting means 21 such arranged that it can be brought into connection for data and power passage with the mobile terminal 30.
  • the inner block 23 is adapted to perform the authentication process and therefore it comprises a card 23a adapted to process the information of the mobile terminal 30 so as to perform authentication of the coming subject, and signalling members 23b adapted to signal the presence of the coming subject and the occurred authentication to the resident.
  • the signalling members 23b is adapted to carry out signalling of the presence of an authenticated coming subject through emission of a suitable acoustic and/or visual signal. Therefore they can comprise a loud-speaker adapted to reproduce a message or a sound and/or LEDs or other similar means adapted to emit a light signal.
  • the card 23a and therefore the inner block 23 are brought into connection for data and power passage with the outer block 22 and therefore the mobile terminal 30.
  • the fixed terminal 20 comprises second connecting means 25 adapted to carry out such a connection between the two blocks 22 and 23.
  • the second connecting means 25 consists of sliding/revolving contacts or other similar means adapted to carry out an electric connection between two components, i.e. blocks 22 and 23, irrespective of their mutual position.
  • the second connecting means 25 consists of sliding contacts and, more particularly linear sliding contacts adapted to connect the two blocks 22 and 23, irrespective of the sizes of the fixed terminal 20.
  • the second connecting means 25 therefore consists of plates that, when the two blocks 22 and 23 are joined, comes mutually into contact and consequently carry out connection between the two blocks 22 and 23.
  • the second connecting means 25 is preferably made of gold or other material that does not oxidise when in contact with air.
  • blocks 22 and 23 are provided with inner recesses that, when tightening is carried out, comes into mutual alignment so as to define an inner hole 20a substantially coaxial with the through hole 10a, through which the resident can visually identify the coming subject.
  • the fixed terminal 20 can comprise at least one lens 20b disposed in register with the inner hole 20a and adapted to improve the quality and width of the field of vision through said through hole.
  • lens 20b consists of a wide-angle lens capable of widening the field of vision of the resident and is fastened to the outer block 22.
  • the authentication device 1 is finally associable with a central server 40 comprising a database including the identification codes of all houses/offices, provided with a fixed terminal 20, the identification codes of the subjects/companies provided with a fixed terminal 20, and the history of all visits paid.
  • a central server 40 comprising a database including the identification codes of all houses/offices, provided with a fixed terminal 20, the identification codes of the subjects/companies provided with a fixed terminal 20, and the history of all visits paid.
  • the identification codes of the coming subjects are present, i.e. the codes enabling the mobile terminal 30 to identify the coming subject through the recognition apparatus 33.
  • the central server 40 can consist of a computer or other similar device adapted to be connected to the mobile terminal 30 through the connecting means 35, for example.
  • this connection can be a Bluetooth connection or other wireless connection typical of a mobile phone.
  • the invention comprises a new authentication process 100 for identifying a subject making a house call.
  • the fixed terminal 20 receiving the missing data in a plain form through the mobile terminal 30, is able to calculate an authentication signal of its own in an autonomous manner. If this signal is fully coincident with the signal stored by the central server 40 on the mobile terminal 30, the fixed terminal certifies the identity of the coming subject asking for entry.
  • process 100 is based on an asymmetric scheme cryptography, i.e. a cryptography in which the key used for encrypting the information differs from the key used for decrypting the information.
  • the mobile terminal 30 only carries out a function of making server 40 and fixed terminal 20 communicate with each other but it does not implement any information decrypting procedure.
  • the authentication process 100 contemplates an association step 110 in which the coming subject is associated with a first authentication signal; a connection step 120 in which the two terminals are mutually connected; an authentication step 130 in which the identity of the coming subject is ascertained; and a signalling step 140 in which the presence of the coming subject is signalled.
  • the coming subject before coming to the house connects the mobile terminal 30 to the central apparatus 40 to which, in order to obtain the first authentication signal, communicates the house he/she wishes to visit, the date and time of the visit and, more specifically, the date and time band in which the visit is foreseen.
  • the central apparatus 40 retrieves the identification codes corresponding to the residence that is wished to be visited and to the mobile terminal 30 connected thereto and processes the first authentication signal.
  • this first authentication signal substantially consists of an alphanumeric code suitably processed by apparatus 40 as a function of the theoretical visit date and time, identification code of the residence, identification code of the coming subject.
  • the central apparatus 40 After the first authentication signal has been obtained, the central apparatus 40 combines some information in plain form to this first signal, which information as better described hereinafter will help in providing part of the information to the fixed terminal 20 in such a manner as to enable it to calculate the second authentication signal in an autonomous manner.
  • the central server 40 stores on the storage component 31 , the first authentication signal, theoretical date and time of the visit, comprising the validity time of the first signal, that together with the identification code of the mobile terminal 30 already present on the storage element 31 , constitute the data required for authentication.
  • the coming subject can ask for several first authentication signals in order to program a series of visits to different residents and therefore different fixed terminals 20, to be made at different dates and times.
  • the central apparatus 40 creates different first authentication signals using, for each first signal, the identifier associated with the given fixed terminal 20 of the residence to which access is wished using that particular first identification code.
  • the recognition apparatus 33 activates the mobile terminal 30 that is therefore ready to be brought into connection with the fixed terminal 20 through the first connecting means 21 and 35.
  • This connection enables current and data passage between the mobile terminal 30 and fixed terminal 20.
  • the fixed terminal 20 receives the energy necessary for its activation and the energy necessary for performing authentication of the coming subject from battery 32.
  • the fixed terminal 20, through the previously made connection receives the energy necessary to its activation, retrieves the data for authentication from the mobile terminal 30 and starts processing these data.
  • the fixed terminal 20 identifies among all data saved on the storage component 31 , the data corresponding to the unique first signal that can be coded through the unique identifier belonging to the same fixed terminal.
  • the second authentication signal After retrieval of the first authentication signal, of the identification code of the fixed terminal 20 as well as of the theoretical date and time of the visit, it calculates the second authentication signal in an autonomous manner, based both on the aforesaid data, and on data the terminal itself possesses. In particular, it processes a second authentication signal, based on its identification code suitably stored on the fixed terminal 20 when installed, on the identification code of the mobile terminal 30 and on the theoretical date and time of the visit.
  • the fixed terminal 20 compares the first authentication signal obtained by the central server 40, with the second authentication signal obtained by the fixed terminal 20. At this point, if the two signals differ, the authentication gives a negative result and therefore the coming subject is not allowed to enter the residence. On the contrary, if the two signals are coincident, the authentication gives a positive result and therefore the coming subject is allowed to enter the residence.
  • the result of the comparison between the two signals is preferably stored on both terminals 20 and 30 and, in addition, the first authentication signal and the different data connected thereto are preferably deleted.
  • the authentication process 100 contemplates the signalling step 140.
  • the fixed terminal 20 by utilising the signalling members 23b, announces the presence of the coming subject to the resident who, through the second through hole 20a, can carry out a further visual control on the coming subject or, alternatively, directly grant access to the subject through the entrance 10.
  • the authentication process 100 terminates with a closing step 150 in which the coming subject connects the mobile terminal 30 to the central server 40 and updates the history of the visits he/she has made storing the outcomes of said visits on server 40.
  • the authentication process 100 may comprise one or more verification steps that can take place at any moment after the association step 110 and before the closing step 150.
  • the mobile terminal 30 analyses the validity of the first authentication signal comparing theoretical date and time of the visit, corresponding to the first signals stored thereon, with the examination time, i.e. the time that when the verification step is carried out, has elapsed from creation and storage of the first signal, which time is measured through the time meter 34.
  • the mobile terminal 30 obtains the examination time from the time meter 34, i.e. the elapsed time from storage of the first signal on the mobile terminal 30, and compares said examination time with the validity time included in the theoretical date and time of the visit, i.e. the theoretical duration associated with the first signal from server 40. If the validity time of a first signal is lower than the examination time, the mobile terminal 30 deletes the first authentication signal and the data connected thereto.
  • the invention enables important advantages to be achieved.
  • a first advantage is represented by the high security degree ensured by the authentication device 1 and the authentication process 100. This security resides in the high complexity and therefore decrypting difficulty of the different authentication signals making it almost impossible to tamper with device 1 or process 100.
  • card 23a i.e. the component carrying out analysis of the signals
  • a further advantage is ensured by the fact that the first authentication signals, due to accomplishment of the verification procedure, have a time limit and therefore can be exclusively used during a given time gap.
  • a further advantage resides in that device 1 and process 100 do not grant access to the residence but merely prove the truth and reliability of the coming subject while the choice of opening or not is left to the resident.
  • Another important advantage is represented by the presence of a history of all visits enabling identification, at any moment, of the person who has made the visit to a given residence at a given time.
  • Another achieved goal is represented by the low cost of terminals 20 and 30.
  • the calculation complexity has been advantageously gathered on the central server 40 and therefore the fixed terminal 20 and mobile terminal 30 only need cheap and simple electronic components.

Abstract

It is provided an authentication device (1) of a subject making a house call comprising a fixed terminal (20) adapted to be fastened in the vicinity of an entrance (10) of the house; a mobile terminal (30) including identification data of the coming subject and adapted to be carried by the coming subject in the vicinity of the entrance (10); the fixed terminal (20) being adapted to be brought into connection with the mobile terminal (30), so as to receive the activation energy from the mobile terminal (30) and therefore identify it.

Description

AUTHENTICATION DEVICE OF A SUBJECT MAKING A HOUSE CALL
The present invention relates to an authentication device for a subject paying a house call or visit, of the type pointed out in the preamble of the first claim.
In particular, the invention relates to a device that, in case of a visit to an office or a dwelling, is able to carry out preventive verification and control of the visitor's identity and therefore enables the resident to grant the visitor access to the office/house in full security.
It is known that house calls are necessary for carrying out services of public interest such as for instance notification of deeds, delivery of registered letters, meter reading for the different user bases, interventions for extraordinary maintenance. In addition, house calls are often made by suitable staff that, for commercial purposes, perform a "door-to-door" activity for selling goods or offering services and promoting activities.
For the above reasons, the resident is often obliged to open the door to unknown visitors whose identity he/she is therefore unable to ascertain, unless he/she bases himself/herself on that which is declared or shown by the visitor. This lack of knowledge concerning a visitor is frequently utilised as an expedient by delinquents that, giving wrong personal particulars, succeed in illegally getting into the resident's houses.
Very often the victims of these tricks are "weak" persons such as persons living alone, old people, disabled people or all those categories having low self-defence and reaction capacity, easily prone to persuasion on the basis if a simple declaration by the visitor. In particular, for easily verifying the visitor's identity, they are often brought to instinctively open the door on ringing of the bell thus determining elimination of the only efficient protection for their defence.
In order to solve this problem many front doors have been provided with a peephole, i.e. a through hole adapted to enable the resident to see the visitor and therefore carry out a first evaluation of same.
This solution however is weakly reliable because it can be easily overcome by the delinquent who may wear a uniform or show previously prepared visiting cards or a badge.
In order to solve this problem, the institutions have made available specific freephone numbers against fraud that are directly coordinated by the police and enable control of the identity by a telephone call to these numbers.
Unfortunately, this operation is often neglected by the resident who, due to inattention, lack of information, laziness, confidence, opens the door and enables access to the house without any certification.
Therefore, taking into account the importance of a correct identification of the visitor, many apparatus have been developed that utilising videocameras, microphones or other similar means allow opening of the door by the resident only after the visitor has been recognised.
A first example is described in patent US2003086186A1 in which a videocamera is used for catching the visitor and a display enabling the resident to obtain a convenient and quick image of the visitor.
Another device is described in patent WO2007012831A1.
In this document, arrangement of a particular fixed terminal is provided which is placed at the front door and is equipped with a database containing the visitors' data and with an identification system made up of keyboard and microphone. According to the provided authentication process, the visitor types in his/her identification code on the keyboard, speaks on the microphone and the device opens the door and allows access only if the visitor's voice is substantially coincident with that stored in the database in correspondence with the previously inputted code.
In other authentication apparatus, in addition to use of the aforesaid fixed terminal, adoption of a mobile terminal is provided, for example a mobile phone, in possession of the visitor.
A first example of these authentication apparatus is described in patent US2007085662A1 disclosing a fixed terminal, i.e. the terminal placed at the door, comprising a videocamera, a database and a screen.
According to the authentication procedure described in this patent, when the visitor comes close to the front door, he/she must send, through the mobile terminal, a code to the fixed terminal that retrieves in the database, a first image corresponding to the code it has received, records a second image of the visitor through the videocamera and then shows the two images to the resident who decides on opening the door or not.
Further examples of these authentication apparatus are disclosed in patent US2005060555A1 and in document "Personal Servers as Digital Keys" by Allan Beaufour.
In this case, when the visitor comes to the front door, the fixed terminal sends an encrypted signal to the mobile terminal that, based thereon, creates a second signal which, in turn, is sent to the fixed signal that will verify whether it is correct and will grant access to the visitor.
The above described known art has some important drawbacks. A first important fault resides in the complexity of known authentication apparatus. In particular, this fault can be found in the fixed terminals placed at the front door which, being provided with a complex identification system, are both very complicated in manufacture and very expensive.
Another problem is represented by the fact that fixed devices, due to their complexity, are of difficult assembly at the front door.
In particular, due to the above described identification means, the fixed terminal is particularly bulky and therefore of difficult installation. This problem is further increased by the presence of powering means consisting of a battery and/or electric cables electrically feeding the fixed terminal by connecting it to the mains.
A further problem consists in the high installation cost of known authentication apparatus because, due to the bulkiness of same and the required connections for operation, they are not suitable for the front door presently in use and therefore replacement of these doors is required.
Another important problem resulting from the complexity of the authentication device is represented by the poor reliability of same and the reduced lifetime. Under this situation, the technical task underlying the present invention is to conceive an authentication device of a subject paying a house call capable of substantially obviating the mentioned drawbacks.
Within the scope of this technical task, it is an important aim of the invention to provide an authentication device of simple manufacture and reduced costs. Another important aim of the invention consists in obtaining an authentication device of easy installation.
A further aim of the invention is to make available an authentication device that is adapted for the presently used front doors, i.e. without being obliged to replace them.
Also an important result of the invention is the achievement of an authentication device characterised by high reliability that practically does not require servicing.
The technical task mentioned and the aims specified are achieved by an authentication device of a subject paying a house call as claimed in the appended Claim 1.
Preferred embodiments are highlighted in the sub-claims.
The features and advantages of the invention are hereinafter clarified by the detailed description of a preferred embodiment of the invention, with reference to the accompanying drawings, in which:
Fig. 1 as a whole shows an authentication device of a subject paying a house call in accordance with the invention;
Fig. 2 shows a component of the authentication device disposed at an entrance; and
Fig. 3 highlights, through a block diagram, an authentication process utilising the authentication device.
With reference to the drawings, the authentication device of a subject making a house call in accordance with the invention is generally identified by reference numeral 1.
It is adapted to be used for verifying the identity of a subject making a house call in a building, flat or office. Device 1 can therefore be positioned at an entrance 10 such as a door or gate or other similar element and is adapted to prevent access to the house without the resident's consent. The authentication device 1 fundamentally comprises a fixed terminal 20 adapted to be connected in the vicinity of an entrance 10 and a mobile terminal 30 adapted to be carried by the coming subject and to be brought into connection with the fixed terminal 20.
The mobile terminal 30, shown in Fig. 1 , consists of an electronic device comprising a storage component 31 adapted to store information such as alphanumeric codes for example, a battery 32, preferably of the rechargeable type, or other powering systems adapted to enable energy supply to at least said storage component 31. The mobile terminal 30 therefore may selectively consist of a mobile phone, a USB (Universal Serial Bus) key suitably provided with a battery 32 or other similar device. Preferably, the mobile terminal 30 is a USB key comprising a battery 32.
The mobile terminal 30 can be further provided with a recognition apparatus 33 adapted to enable use of the mobile terminal 30 exclusively by authorised subjects and a time meter 34 adapted to measure elapsing of time and to enable the mobile terminal 30 to know, date and time, instant by instant, i.e. the elapsed time from creation of the first signal.
The time meter 34 can consist of a clock/watch or other similar device adapted to enable the mobile terminal 30 to know date and time, at each instant. Alternatively, it may consist of a decreasing counter, a timer for example that, as better clarified in the following, enables the residual lifetime of the data stored in the mobile terminal 30 to be quantified.
The recognition apparatus 33 can consist, if it is a mobile phone, of a keypad adapted to enable introduction of a PIN (Personal Identification Number) or, if it is a USB key, of a fingerprint reader or other similar apparatus adapted to identify the subject using the mobile terminal 30.
In order to enable the coming subject to mutually connect the two terminals 20 and 30, as hereinafter clearly described, the mobile terminal 30 and fixed terminal 20 comprise first connecting means 35 and 21 respectively, that is adapted to carry out connection.
Said first means 35 and 21 is suitable to make a connection capable of allowing at least passage of current between the two terminals 20 and 30 so as to enable the mobile terminal 30 to supply the fixed terminal 20 with the activation energy, i.e. the energy adapted to enable the fixed terminal 20 to be activated and carry out the authentication process described below.
In addition, the first connecting means 35 and 21 creates a data passage connection between the mobile terminal 30 and fixed terminal 20 so as to enable the mobile terminal 30 to provide the fixed terminal 20 with data necessary for authentication of the coming subject.
The first connecting means 35 and 21 therefore may consist of USB (Universal Serial Bus) connectors or other similar means adapted to allow both passage of current and passage of data between terminals 20 and 30.
In particular, in some cases, to facilitate connection between the two terminals 20 and 30, device 1 can have a further connecting means such as a cable having two USB connectors at the ends so as to be connected to the first means 35 and 21 , and therefore being operatively interposed between terminals 20 and 30.
The fixed terminal 20 is fastened in the vicinity of entrance 10, for example to a wall portion close to said entrance, and preferably terminal 20 is secured to the entrance itself. More preferably, the fixed terminal 20 is housed in the through hole 10a present in the entrance 10 that is usually employed as a peephole.
In order to enable the fixed terminal 20 to be housed in the through hole 10a, the fixed terminal 20, as shown in Fig. 1 , comprises an outer block 22, facing the outside of the house and an inner block 23 facing the inside of the house, which blocks have a portion of smaller section adapted to be inserted in the through hole 20a, and a portion of bigger section adapted to abut against the entrance 10.
In addition, the fixed terminal 20 has tightening means 24 adapted to mutually fasten blocks 22 and 23 at the through hole 10a bringing them into abutment with the entrance 10 on opposite sides relative to said entrance. In particular, the tightening means 24 consists of screws, threaded couplings, friction fits or other similar elements adapted to mutually fasten blocks 22 and 23 varying their distance and therefore the length of the fixed terminal 20 so as to make the sizes of the fixed terminal 20 suit the thickness of said entrance 10.
Preferably, the tightening means 24 is positioned in such a manner that said means is operable for assembling or disassembling the two blocks 22 and 23 exclusively from the inside of their housing seat. Therefore said means 24, if screws for example, have their head at the inner block 23, as shown in Fig. 2. The outer block is adapted to be connected to the mobile terminal 30 and therefore has said connecting means 21 such arranged that it can be brought into connection for data and power passage with the mobile terminal 30.
The inner block 23 is adapted to perform the authentication process and therefore it comprises a card 23a adapted to process the information of the mobile terminal 30 so as to perform authentication of the coming subject, and signalling members 23b adapted to signal the presence of the coming subject and the occurred authentication to the resident.
The signalling members 23b is adapted to carry out signalling of the presence of an authenticated coming subject through emission of a suitable acoustic and/or visual signal. Therefore they can comprise a loud-speaker adapted to reproduce a message or a sound and/or LEDs or other similar means adapted to emit a light signal.
To enable the card 23a to have the necessary power and data for carrying out authentication of the coming subject, the card 23a and therefore the inner block 23 are brought into connection for data and power passage with the outer block 22 and therefore the mobile terminal 30.
To this aim the fixed terminal 20 comprises second connecting means 25 adapted to carry out such a connection between the two blocks 22 and 23. Preferably, the second connecting means 25 consists of sliding/revolving contacts or other similar means adapted to carry out an electric connection between two components, i.e. blocks 22 and 23, irrespective of their mutual position.
In particular, the second connecting means 25 consists of sliding contacts and, more particularly linear sliding contacts adapted to connect the two blocks 22 and 23, irrespective of the sizes of the fixed terminal 20. The second connecting means 25 therefore consists of plates that, when the two blocks 22 and 23 are joined, comes mutually into contact and consequently carry out connection between the two blocks 22 and 23.
The second connecting means 25 is preferably made of gold or other material that does not oxidise when in contact with air. Finally, in order to enable the resident to see the coming subject before opening the door, blocks 22 and 23 are provided with inner recesses that, when tightening is carried out, comes into mutual alignment so as to define an inner hole 20a substantially coaxial with the through hole 10a, through which the resident can visually identify the coming subject.
In particular, the fixed terminal 20 can comprise at least one lens 20b disposed in register with the inner hole 20a and adapted to improve the quality and width of the field of vision through said through hole. Preferably, lens 20b consists of a wide-angle lens capable of widening the field of vision of the resident and is fastened to the outer block 22.
The authentication device 1 is finally associable with a central server 40 comprising a database including the identification codes of all houses/offices, provided with a fixed terminal 20, the identification codes of the subjects/companies provided with a fixed terminal 20, and the history of all visits paid. In the database of the central server 40 also the identification codes of the coming subjects are present, i.e. the codes enabling the mobile terminal 30 to identify the coming subject through the recognition apparatus 33.
It is adapted to generate the first authentication signal and therefore supply the mobile terminal 30 with the necessary data for authentication. Therefore the central server 40 can consist of a computer or other similar device adapted to be connected to the mobile terminal 30 through the connecting means 35, for example.
Alternatively, if terminal 30 is a mobile phone, this connection can be a Bluetooth connection or other wireless connection typical of a mobile phone. The invention comprises a new authentication process 100 for identifying a subject making a house call.
In this process, provision is made for a hashing calculation in combination with a shared secret consisting of the calculation algorithm and of elements that are fully known by the central server 40, while they are only partly known by the fixed terminal 20. In detail, as hereinafter better described, the fixed terminal 20, receiving the missing data in a plain form through the mobile terminal 30, is able to calculate an authentication signal of its own in an autonomous manner. If this signal is fully coincident with the signal stored by the central server 40 on the mobile terminal 30, the fixed terminal certifies the identity of the coming subject asking for entry.
Alternatively, process 100 is based on an asymmetric scheme cryptography, i.e. a cryptography in which the key used for encrypting the information differs from the key used for decrypting the information.
It should be pointed out that in both the aforesaid cases the mobile terminal 30 only carries out a function of making server 40 and fixed terminal 20 communicate with each other but it does not implement any information decrypting procedure.
The authentication process 100, diagrammatically shown in Fig. 3, contemplates an association step 110 in which the coming subject is associated with a first authentication signal; a connection step 120 in which the two terminals are mutually connected; an authentication step 130 in which the identity of the coming subject is ascertained; and a signalling step 140 in which the presence of the coming subject is signalled.
In the association step 110 the coming subject before coming to the house, connects the mobile terminal 30 to the central apparatus 40 to which, in order to obtain the first authentication signal, communicates the house he/she wishes to visit, the date and time of the visit and, more specifically, the date and time band in which the visit is foreseen.
The central apparatus 40 retrieves the identification codes corresponding to the residence that is wished to be visited and to the mobile terminal 30 connected thereto and processes the first authentication signal. In particular, this first authentication signal substantially consists of an alphanumeric code suitably processed by apparatus 40 as a function of the theoretical visit date and time, identification code of the residence, identification code of the coming subject.
After the first authentication signal has been obtained, the central apparatus 40 combines some information in plain form to this first signal, which information as better described hereinafter will help in providing part of the information to the fixed terminal 20 in such a manner as to enable it to calculate the second authentication signal in an autonomous manner.
The central server 40 stores on the storage component 31 , the first authentication signal, theoretical date and time of the visit, comprising the validity time of the first signal, that together with the identification code of the mobile terminal 30 already present on the storage element 31 , constitute the data required for authentication.
In addition, during the association step 110, the coming subject can ask for several first authentication signals in order to program a series of visits to different residents and therefore different fixed terminals 20, to be made at different dates and times. In particular, in this case the central apparatus 40 creates different first authentication signals using, for each first signal, the identifier associated with the given fixed terminal 20 of the residence to which access is wished using that particular first identification code.
At this point the association step 110 is terminated and the connection step 120 begins.
Once the coming subject has reached the entrance 10 he/she, through the recognition apparatus 33, activates the mobile terminal 30 that is therefore ready to be brought into connection with the fixed terminal 20 through the first connecting means 21 and 35.
This connection enables current and data passage between the mobile terminal 30 and fixed terminal 20. In particular, due to this connection, the fixed terminal 20 receives the energy necessary for its activation and the energy necessary for performing authentication of the coming subject from battery 32. The fixed terminal 20, through the previously made connection, receives the energy necessary to its activation, retrieves the data for authentication from the mobile terminal 30 and starts processing these data. In particular, the fixed terminal 20 identifies among all data saved on the storage component 31 , the data corresponding to the unique first signal that can be coded through the unique identifier belonging to the same fixed terminal.
After retrieval of the first authentication signal, of the identification code of the fixed terminal 20 as well as of the theoretical date and time of the visit, it calculates the second authentication signal in an autonomous manner, based both on the aforesaid data, and on data the terminal itself possesses. In particular, it processes a second authentication signal, based on its identification code suitably stored on the fixed terminal 20 when installed, on the identification code of the mobile terminal 30 and on the theoretical date and time of the visit.
At this point, the fixed terminal 20 compares the first authentication signal obtained by the central server 40, with the second authentication signal obtained by the fixed terminal 20. At this point, if the two signals differ, the authentication gives a negative result and therefore the coming subject is not allowed to enter the residence. On the contrary, if the two signals are coincident, the authentication gives a positive result and therefore the coming subject is allowed to enter the residence.
In particular, the result of the comparison between the two signals is preferably stored on both terminals 20 and 30 and, in addition, the first authentication signal and the different data connected thereto are preferably deleted.
Should the comparison result be positive, the authentication process 100 contemplates the signalling step 140.
In this step 140, the fixed terminal 20, by utilising the signalling members 23b, announces the presence of the coming subject to the resident who, through the second through hole 20a, can carry out a further visual control on the coming subject or, alternatively, directly grant access to the subject through the entrance 10.
Once all visits have been completed, the authentication process 100 terminates with a closing step 150 in which the coming subject connects the mobile terminal 30 to the central server 40 and updates the history of the visits he/she has made storing the outcomes of said visits on server 40. In addition, the authentication process 100 may comprise one or more verification steps that can take place at any moment after the association step 110 and before the closing step 150.
In detail, in the verification step one of terminals 20 or 30, preferably the mobile terminal 30, analyses the validity of the first authentication signal comparing theoretical date and time of the visit, corresponding to the first signals stored thereon, with the examination time, i.e. the time that when the verification step is carried out, has elapsed from creation and storage of the first signal, which time is measured through the time meter 34. In particular, in this step the mobile terminal 30 obtains the examination time from the time meter 34, i.e. the elapsed time from storage of the first signal on the mobile terminal 30, and compares said examination time with the validity time included in the theoretical date and time of the visit, i.e. the theoretical duration associated with the first signal from server 40. If the validity time of a first signal is lower than the examination time, the mobile terminal 30 deletes the first authentication signal and the data connected thereto.
The invention enables important advantages to be achieved.
A first advantage is represented by the high security degree ensured by the authentication device 1 and the authentication process 100. This security resides in the high complexity and therefore decrypting difficulty of the different authentication signals making it almost impossible to tamper with device 1 or process 100.
This impossibility of the data being tampered with is ensured by use of very complicated cryptographic algorithms making it very difficult to identify the residence corresponding to a first authentication signal and therefore to use said first signal in a fraudulent manner.
The high security of device 1 is also ensured by the fact that card 23a, i.e. the component carrying out analysis of the signals, is housed in the inner block 23 and therefore can be hardly tampered with.
A further advantage is ensured by the fact that the first authentication signals, due to accomplishment of the verification procedure, have a time limit and therefore can be exclusively used during a given time gap.
In conclusion, due to the limited time duration of the first authentication signals and the difficulty in associating a given residence to one of said first signals, use of device 1 is impossible for an unauthorised person. This impossibility is further ensured by the recognition apparatus 33 according to which use of the fixed terminal 30 is made possible to the authorised coming subject alone. Another advantage is represented by the fact that, unlike presently known authentication devices, device 1 can be easily incorporated into the doors presently in use without modifications being required. This advantage is given by the possibility of arranging the fixed terminal inside a housing normally present in a door or an entrance, i.e. the through hole 10a.
In addition, since powering of the fixed terminal 20 is given by the mobile terminal 30 alone, the presence of batteries, cables or other similar elements is avoided, which elements would increase the sizes of the fixed terminal 20 and make installation of same much more complicated.
A further advantage resides in that device 1 and process 100 do not grant access to the residence but merely prove the truth and reliability of the coming subject while the choice of opening or not is left to the resident.
Another important advantage is represented by the presence of a history of all visits enabling identification, at any moment, of the person who has made the visit to a given residence at a given time.
Another achieved goal is represented by the low cost of terminals 20 and 30. In fact, the calculation complexity has been advantageously gathered on the central server 40 and therefore the fixed terminal 20 and mobile terminal 30 only need cheap and simple electronic components.
Also to be noted is the absence of operations by the resident who, in fact, must merely wait for a visual/acoustic signal emitted by the signalling members 23b.
An important goal is finally represented by the full absence of maintenance for the fixed terminal 20 because the routine maintenance for loading the authentication signals and recharging the powering battery is concentrated in the user base of the mobile terminal 30.

Claims

1. An authentication device (1) of a subject making a house call comprising a fixed terminal (20) adapted to be fastened in the vicinity of an entrance (10) of said house; a mobile terminal (30) adapted to be carried by said subject making a house call in the vicinity of said entrance (10), said fixed terminal (20) being adapted to be brought into connection with said mobile terminal (30) identifying said mobile terminal (30), characterised in that said connection between said mobile terminal (20) and fixed terminal (30) is adapted to enable said mobile terminal (30) to supply said fixed terminal (20) with activation energy.
2. An authentication device (1) as claimed in claim 1 , wherein said connection between said mobile terminal (20) and fixed terminal (30) is adapted to enable passage of data between said fixed terminal (30) and mobile terminal (20).
3. An authentication device (1) as claimed in one or more of the preceding claims, wherein said fixed terminal (30) and mobile terminal (20) comprise first connecting means (35, 21) adapted to carry out said connection, and wherein said first connecting means (35, 21 ) consists of USB connectors.
4. An authentication device (1) as claimed in one or more of the preceding claims, wherein said mobile terminal (30) comprises a time meter (34) adapted to enable said mobile terminal (30) to measure the elapsed time.
5. An authentication device (1) as claimed in one or more of the preceding claims, wherein said mobile terminal (30) comprises a battery (32) adapted to store energy and to enable said mobile terminal (30) to power said fixed terminal (20).
6. An authentication device (1 ) as claimed in one or more of the preceding claims, wherein said entrance (10) comprises a through hole (10a) adapted to enable a resident to see said coming subject without moving said entrance (10); and wherein said fixed terminal (20) is adapted to be housed in said through hole (10a).
7. An authentication device (1) as claimed in the preceding claim, wherein said fixed terminal (20) comprises an outer block (22) and an inner block (23) adapted to be tightened together at said through hole (10a) so as to abut against said entrance (10) on opposite sides relative to said entrance (10).
8. An authentication device (1 ) as claimed in the preceding claim, wherein said fixed terminal (20) comprises second connecting means (25) adapted to bring said outer block (22) into connection for data and current passage with said inner block (23).
9. An authentication device (1 ) as claimed in one or more of the preceding claims, wherein said fixed terminal (20) comprises signalling members (23b) adapted to signal the presence of said coming subject to said resident.
10. An authentication process (100) of a subject making a house call, comprising a fixed terminal (20) fastened in the vicinity of an entrance (10) and a mobile terminal (30) adapted to be carried by said subject making a house call in the vicinity of said entrance (10), said authentication process comprising a connection step (120) in which said mobile terminal (30) is connected to said fixed terminal (20), characterised in that when said mobile terminal (30) is connected to said fixed terminal (20), said mobile terminal (30) supplies said fixed terminal (20) with energy causing activation of said fixed terminal (20).
11. An authentication process (100) as claimed in the preceding claim, wherein in said identification step (130) said mobile terminal (20), based on at least said authentication data, creates a second authentication signal, and wherein it compares said second authentication signal with said first authentication signal.
12. An authentication process (100) as claimed in the preceding claim, comprising an association step (110) in which said mobile terminal (30) is connected to a central apparatus (40) and wherein said central apparatus (40) creates a first authentication signal and supplies said mobile terminal with said authentication data including said first authentication signal; and a signalling step (140) in which, if said second authentication signal is coincident with said first authentication signal, said fixed terminal gives notice of the presence of said subject to the resident.
13. An authentication process (100) as claimed in one or more of claims 10-12, wherein associated with said first signal is a validity time; said authentication process (100) comprising at least one verification step in which said mobile terminal (30) compares said validity time with the examination time and wherein if the examination time is higher than said validity time, said first opening signal is deleted from said mobile terminal (30).
PCT/IB2011/052820 2010-07-01 2011-06-27 Authentication device of a subject making a house call WO2012001614A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP11745828.1A EP2622781B1 (en) 2010-07-01 2011-06-27 Authentication device of a subject making a house call
ES11745828T ES2571110T3 (en) 2010-07-01 2011-06-27 Authentication device of a subject making a home visit

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ITGE2010A000072 2010-07-01
ITGE2010A000072A IT1400682B1 (en) 2010-07-01 2010-07-01 INTEGRATED SYSTEM FOR AUTOMATED TESTING AND PREVENTIVE ASSESSMENT OF THE IDENTITY DECLARED BY SUBJECTS ON A HOME VISIT BY MEANS OF A VALIDATION AND CONNECTION PROCEDURE TO A REMOTE OPERATING CENTER.

Publications (1)

Publication Number Publication Date
WO2012001614A1 true WO2012001614A1 (en) 2012-01-05

Family

ID=43416324

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2011/052820 WO2012001614A1 (en) 2010-07-01 2011-06-27 Authentication device of a subject making a house call

Country Status (4)

Country Link
EP (1) EP2622781B1 (en)
ES (1) ES2571110T3 (en)
IT (1) IT1400682B1 (en)
WO (1) WO2012001614A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102817543A (en) * 2012-07-30 2012-12-12 广东镖臣防盗设备有限公司 Anti-theft lock peephole

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT202100019844A1 (en) 2021-07-26 2023-01-26 Digitarc Srl Receiving system for parcels, envelopes or similar

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030086186A1 (en) 2001-10-30 2003-05-08 Khosrow Bahrayni-Moghaddam Door mirror viewer
US6663420B1 (en) * 2002-11-15 2003-12-16 Hon Hai Precision Ind. Co., Ltd. Adapter for exchanging data and transmitting power between PC and portable device
US20050060555A1 (en) 2003-09-12 2005-03-17 Raghunath Mandayam Thondanur Portable electronic door opener device and method for secure door opening
US20060014564A1 (en) * 2004-07-14 2006-01-19 Shao-Tsu Kung External illumination device for a mobile phone
WO2007012831A1 (en) 2005-07-29 2007-02-01 British Telecommunications Public Limited Company Authentication apparatus
US20070085662A1 (en) 2005-10-14 2007-04-19 Sanyo Electric Co., Ltd. Visitor reception system with improved security by limiting visitors authorized to enter, outdoor unit and communication terminal included in the same
US20100159953A1 (en) * 2008-12-19 2010-06-24 International Business Machines Corporation Method and System to Locate an Object

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030086186A1 (en) 2001-10-30 2003-05-08 Khosrow Bahrayni-Moghaddam Door mirror viewer
US6663420B1 (en) * 2002-11-15 2003-12-16 Hon Hai Precision Ind. Co., Ltd. Adapter for exchanging data and transmitting power between PC and portable device
US20050060555A1 (en) 2003-09-12 2005-03-17 Raghunath Mandayam Thondanur Portable electronic door opener device and method for secure door opening
US20060014564A1 (en) * 2004-07-14 2006-01-19 Shao-Tsu Kung External illumination device for a mobile phone
WO2007012831A1 (en) 2005-07-29 2007-02-01 British Telecommunications Public Limited Company Authentication apparatus
US20070085662A1 (en) 2005-10-14 2007-04-19 Sanyo Electric Co., Ltd. Visitor reception system with improved security by limiting visitors authorized to enter, outdoor unit and communication terminal included in the same
US20100159953A1 (en) * 2008-12-19 2010-06-24 International Business Machines Corporation Method and System to Locate an Object

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BEAUFOUR A ET AL: "Personal servers as digital keys", PERVASIVE COMPUTING AND COMMUNICATIONS, 2004. PROCEEDINGS OF THE SECON D IEEE ANNUAL CONFERENCE ON MAR. 14-17, 2004, PISCATAWAY, NJ,IEEE, US, 14 March 2004 (2004-03-14), pages 319 - 328, XP010689694, ISBN: 978-0-7695-2090-2, DOI: DOI:10.1109/PERCOM.2004.1276869 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102817543A (en) * 2012-07-30 2012-12-12 广东镖臣防盗设备有限公司 Anti-theft lock peephole

Also Published As

Publication number Publication date
EP2622781A1 (en) 2013-08-07
ES2571110T3 (en) 2016-05-24
EP2622781B1 (en) 2016-03-23
IT1400682B1 (en) 2013-06-28
ITGE20100072A1 (en) 2012-01-02

Similar Documents

Publication Publication Date Title
US10671821B2 (en) Systems and methods for RFID-based access management of electronic devices
RU2576586C2 (en) Authentication method
US8261979B2 (en) System and methods for venue controlled buy-back and reselling of access privileges and tickets to closed group events
ES2255111T3 (en) METHOD AND SYSTEM TO GUARANTEE THE SECURITY OF TELEPHONE CALL MANAGEMENT CENTERS.
US20060107067A1 (en) Identification card with bio-sensor and user authentication method
CN102084369A (en) System for monitoring the unauthorized use of a device
US20130090939A1 (en) Sytem and method for preventing healthcare fraud
US20130076482A1 (en) Secure access system employing biometric identification
JP2000200315A (en) Body mounted equipment and certification system
JP2002511968A (en) Method, system and apparatus for identifying a person
CN102084371A (en) System for mitigating the unauthorized use of a device
JPH02501170A (en) identification device
US20170084150A1 (en) Person of interest location confirmation system
CN102084372A (en) System for monitoring the unauthorized use of a device
CN102084370A (en) System for mitigating the unauthorized use of a device
US20150002261A1 (en) Method and system for certifying the presence of an operator
KR20120103827A (en) System and method for controlling door lock
CN107578502A (en) A kind of cell caller management method and device
CN108877021A (en) A kind of access control management method of unmanned venue
RU2596587C2 (en) Mobile communication device
JP6013848B2 (en) Facility management system and facility management method
KR20140021874A (en) System for entrance management using smart code and method of the same
EP2622781B1 (en) Authentication device of a subject making a house call
US20110202440A1 (en) Identification Module and Pointing Method Using Such a Module
US20210040772A1 (en) Digital door lock, door lock control server, and door lock system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11745828

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2011745828

Country of ref document: EP