EP2620919B1 - Système de verrouillage - Google Patents
Système de verrouillage Download PDFInfo
- Publication number
- EP2620919B1 EP2620919B1 EP12152711.3A EP12152711A EP2620919B1 EP 2620919 B1 EP2620919 B1 EP 2620919B1 EP 12152711 A EP12152711 A EP 12152711A EP 2620919 B1 EP2620919 B1 EP 2620919B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- key
- mobile phone
- data set
- key data
- mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Definitions
- the present invention generally relates to an access control system and a method for using said system.
- the present invention relates to locking system and a corresponding method for controlling and customizing access of a mobile key to a lock.
- the invention provides an easy, convenient and still safe system and method which allows an administrator to control and customize a mobile phone which comprises an NFC (Near Field Communication) device, as a mobile key for one a plurality of locks of a locking system.
- NFC Near Field Communication
- the method and system according to the present invention is not limited on access control systems for locks but can be used for any kind of access control systems.
- Locking systems with a plurality of electronic locks and a plurality of electronic keys are known in the art.
- transponders (active or passive) or RFID cards can be used as portable electronic keys (in the following also called credentials), which provide a plurality of advantages over pure mechanical locking systems with mechanical keys and mechanical locks.
- the electronic keys and/or the electronic locks may be programmed individually, which allows to provide very flexible locking plans. For instance, each hotel guest or employee has its own electronic key, which can be individually programmed for unlocking a particular lock or a plurality of locks during a specific period of time.
- the electronic key e.g., the RFID card
- a card reader/writer of an administrator is required.
- a locking system management e.g. a central computer with appropriate software which allows the administrator to program the electronic key(s) and/or the individual lock(s) individually.
- a drawback of such known locking systems is, however, that the electronic key has to be connected physically to the card reader of the administrator for programming or re-programming.
- the electronic locks have to be connected to the locking system management to allow individual programming of the locks.
- Such an connection between the locking system management and the electronic locks typically requires complex wiring or sophisticated wireless networks.
- Document US 2010/306549 A1 describes a system and a method for managing access to RFID locking units using mobile devices equipped with NFC modules.
- the mobile devices can function as keys to control the locking units by emulating RFID cards.
- the present invention further relates to a corresponding method for administrating the locking system according to the present invention.
- a locking system comprises at least one electronic lock, preferably a plurality of electronic locks and at least one portable electronic key, preferably a plurality of electronic keys.
- the system further comprises a locking system management (also called Locking-System-Management; LSM in the following) which allows controlling and administrating access of individual or groups of electronic keys to individual or groups of electronic locks.
- LSM Locking-System-Management
- a locking system according to the present invention a may be based on a digital locking and access control system (see e.g. System 3060 from SimonsVoss) which is an electronic version of a mechanical locking system which provides all the functions of a classical access control system.
- Electronic transponders electronic keys
- Electronic keys may be used instead of mechanical keys, along with electronic locks, such as digital locking cylinders. Radio communication between the electronic locks and the electronic keys takes the place of a key turning in a lock.
- Data is preferably transferred from the transponder to the locking cylinders or SmartRelays inductively at a frequency range of 25 kHz. The typical reading distance up to 40 cm for the locking cylinder and up to 120 cm for the SmartRelays may be provided.
- SmartRelays electronic switches can be activated depending on the transponder authorisation.
- the locking cylinders can be directly networked, e.g., on the basis of a 868 MHz frequency network.
- MIFARE ® Classic and MIFARE ® DESFire RFID cards may be used as electronic keys.
- LSM Locking-System-Management
- Access management and building automation are preferably managed by the Locking-System-Management-Software, which preferably works centrally from a single location. This basis system provides the advantage to organize one or even a plurality of locking systems and subsystems anywhere in the world.
- the locking system according to the present invention is preferably a further advancement of the above discussed locking system.
- the present invention provides the further advantage that access management of electronic locks, which are not connected via a network to the LSM, can still be flexibly and individually managed by using mobile phones (also labeled cell phones throughout the present application) as electronic keys, wherein said mobile phones are connectable to the LSM via the cellular network (mobile network; mobile communication network) of the mobile network operators (mobile phone providers).
- mobile phones with NFC (Near Field Communication) devices are used as mobile electronic keys.
- Transponders in particular passive transponders, are well known in the art to be used in electronic access control devices.
- RFID Radio Frequency IDentification
- An RFID tag is typically a small object that can be attached to or incorporated into a product.
- RFID tags contain silicon chips to enable them to receive and respond to queries from an RFID reader/writer.
- the power supply to the transponder and the data exchange between the transponder and a reader is achieved without the use of galvanic contacts, using instead magnetic or electromagnetic fields.
- An RFID system is always made up of two components, the transponder/RFID tag and the reader.
- NFC Near Field Communication
- NFC communication is enabled by bringing two NFC-compatible devices within a few centimeters of one another. This "context of proximity" is basis for many new NFC-based applications, e.g.: contactless transactions such as payment, transit ticketing, simple and fast data transfers including electronic business cards and access to online digital content or access control to locking systems.
- NFC is a standards-based technology that enables simple and safe two-way interactions between electronic devices, allowing consumers to perform contactless transactions, access digital content, and connect electronic devices with a single touch.
- NFC is not an RFID system, but a wireless data interface between devices, similar to infrared or Bluetooth.
- Bluetooth wireless technology was designed to replace cables between cell phones, laptops, and other computing and communication devices within a 10-meter range.
- NFC provides several features with are of interest in relation to RFID systems. For instance, data transmission between two NFC interfaces uses high-frequency magnetic alternating fields in the frequency range of 13.56 MHz.
- NFC is compatible with existing RFID standards and makes it possible both to read transponders and to emulate transponders, i.e., to behave like transponders.
- an NFC interface has a 13.56 MHz transmitter and a 13.56 MHz receiver that are alternately connected to an antenna.
- NFC devices are active devices and are unique in that they can change their mode of operation to be in (i) reader/writer mode, (ii) peer-to-peer mode, or (iii) card emulation mode.
- the different operating modes are based on the ISO/IEC 18092 NFC IP-1 and ISO/IEC 14443 contactless smart card standards.
- an NFC tag is typically a passive device (for example, integrated in a smart poster) that stores data that can be read by an NFC-enabled device.
- NFC card and “NFC tag” will be used synonymously.
- a "NFC card” and “NFC tag” are technically the same, however, contactless cards used in ticketing and payment often include additional technology to store secure data.
- the NFC device In reader/writer mode, the NFC device is capable of reading NFC tag types, such as in the scenario of reading an NFC Smart Poster tag.
- P2P Peer-to-Peer
- two NFC devices can exchange data. For example, a user can share Bluetooth or WiFi link set up parameters or a user can exchange data such as virtual business cards or digital photos.
- the NFC device appears to an external reader much the same as a traditional contactless smart card (RFID card).
- RFID card contactless smart card
- This mode is secure and supported by a contactless communication API.
- a secure element on the device communicates and transacts with an external reader over RFID hardware.
- the internal security element interacts with an external reader.
- the application is notified when the external reader has been detected, and, if needed, the application communicates with the secure element, using the contactless communication API connection interface.
- Preferred embodiments of the present invention may be characterized as follows.
- the present invention relates to a locking system for managing access of an electronic key to an electronic lock according to claim 1.
- the system comprises at least one electronic lock which may be unlocked by means of a transponder, preferably by means of an active and/or passive transponder.
- the electronic lock is adapted to be unlocked by an RFID card, e.g., a MIFARE ® Classic and/or a MIFARE ® DESFire RFID card.
- the invention is further characterized by providing at least one mobile phone with a NFC device.
- the NFC device may be integrated in the mobile phone or provided as an additional external device, e.g., as a NFC card or NFC sticker with is attached to the mobile phone.
- the external NFC device may work as a Near Field Communication (NFC)/Radio Frequency Identification (RFID) Reader.
- the NFC device preferably comprises an embedded smart-chip.
- the mobile phone is further adapted to install a mobile key application such that the mobile phone can be used as electronic key for the electronic lock.
- a locking system management (LSM) is provided for managing the access of the mobile phone (preferably also for managing additional active and/or passive transponder and/or RFID cards) to the electronic lock by means of individual key data sets.
- each electronic key comprises its own individual key data set.
- An OTA key server is further provided for storing and distrusting encrypted key data sets, wherein said locking system management (LSM) is adapted to encrypt the key data set in a secure environment of the LSM and to push said encrypted key data set to the OTA (over the air) key server.
- the secure environment of the LSM may be provided by firewalls which filter the data traffic to and from the LSM.
- the OTA server can not download key data sets and preferably also no other data from the LSM.
- the key data sets and preferably also any kind of data is actively pushed (sent) from the LSM to the OTA key server.
- the LSM controls actively which data may be transmitted to the OTA key server.
- the mobile phone is adapted to download, by means of the installed mobile key application, the appropriate/dedicated encrypted key data set from the OTA key server via the cellular mobile network and to decrypt the downloaded (encrypted) key data set and to store said decrypted key data set in a secure element of the NFC device.
- the mobile phone may additionally or alternatively be possible to push the encrypted key data set from the OTA key server to the mobile phone.
- the NFC device is further adapted to switch in a card emulation mode and to transmit the key data set during said card emulation mode to the electronic lock for unlocking.
- the NFC device behaves in the card emulation mode like an RFID card, e.g., a MIFARE ® Classic and MIFARE ® DESFire RFID card, such that there is no reconfiguration necessary for already installed locks.
- the electronic locks which are adapted to be unlocked by a RFID card (MIFARE ® Classic and MIFARE ® DESFire RFID card), may be unlocked with the above described adapted mobile phone.
- the encryption on the locking system management and the corresponding decryption on the mobile phone and/or NFC device is preferably achieved by an initial setup of the locking system management and the mobile phone.
- the LSM and the mobile phone negotiate at least one secret key, e.g., a secret key for symmetric encryption and/or at least a pair of keys for asymmetric encryption.
- Such an initial negotiation is preferably done in a secure environment, e.g., by connecting the mobile phone and/or the NFC device to the LSM via cable or a local read/write device.
- a universal mobile key application may be used for all mobile phones. However, it may be necessary to adapt this mobile key application to the operating system of the mobile phone.
- the individuality of the electronic key is preferably based on the individual key data set, not on the basis of the basis application. Accordingly, the mobile key application may be distributed via classical data storage medium or may be provided on a server which allows a user to download the application.
- the mobile key application is provided in an app store, wherein the mobile phone is preferably adapted to download the mobile key application from the app store.
- the locking system management is preferably adapted to manage key data sets for active transponders and/or passive transponder and mobile phones.
- a locking system management may be used for managing a plurality of electronic locks and electronic cylinders.
- an advantage of the present invention is based on a flexible locking system management, which can manage a plurality of different electronic keys. For instance, only a subset of electronic keys - which are managed in the locking system management - are defined as electronic keys on the basis of mobile phones. To keep the mobile phones up to date, it may be preferably to automatically updated key data sets on the OTA server whenever the administrator chooses to change access authorizations of any of these electronic keys (based on the mobile phone).
- the present invention also relates to a corresponding method for managing access of an electronic key to an electronic lock according to claim 5.
- Figure 1 shows a traditional locking system with centrally stored mechanical keys.
- a nursing service or a company providing field maintenance stores a plurality of mechanical keys for several locations 1002 in a central key depot 1101.
- An employee of the nursing service or field maintenance company is leaving his/her home office 1001.
- the employee firstly travels to the central office 1100 (see path "A"), gets the mechanical key from the central key depot 1101 for the lock at location 1002 and travels to location 1002 (see path "B").
- the employee travels back to the central office 1100 (see path "B") for depositing the key at the central key depot 1101.
- Depositing the keys at the central key depot 1101 ensured that misusage of the key can be avoided or that other employees may use the key at another day.
- the employee travels back to her home office 1001 (see path "A").
- FIG. 2 shows a locking system in accordance with the present invention.
- the electronic keys may be provided as active and/or passive transponders.
- some electronic keys may be stored at a key depot 1101.
- the electronic keys may be programmed individually at the central office by means of a central Locking-System-Management (LSM), which may be realized as software running on a computer.
- LSM central Locking-System-Management
- the administrator may program the individual electronic keys. For instance, an electronic key may be programmed to unlock a particular lock every Monday between 8 am and 6 pm. This provides the advantage that an employee may keep the electronic key, such that a detour via the central office may be avoided.
- the employee has to go to the central office since programming is typically achieved by connecting the electronic key to a card reader directly connected to the LSM.
- the lock at the location 102 has to be reprogrammed. This may be achieved either by integrating the lock in a network, such that the lock may be programmed by the LSM. However, if the lock is not accessible via a network from the LSM, a portable device, e.g., a laptop or a handheld, may be used to program the lock locally at location 102.
- a mobile phone 1 may be individually programmed for unlocking particular electronic locks for a limited time, thus making sure that employees will have to upload their changing access authorizations on a regular basis. For instance, by means of the key distribution service 200, a mobile phone may be programmed every Monday via the cellular network, to get access to specified locks at location 102. In case the employee should not get access to location 102, programming via the cellular mobile network is abandoned.
- FIG. 3 shows a preferred embodiment of the locking system according to the present invention in more detail.
- the locking system management preferably comprises at least one computer which allows individual management of all electronic keys, preferably including active transponder, passive transponder and/or mobile phones used as electronic keys according to the present invention.
- the locking system management preferably also allows that some or all of the locks which form part of the locking system may be programmed individually. For instance, some of the locks may be connected to the LSM via a network. Some of the locks may not be connected to the LSM via a network. Programming such locks, however, may be achieved by means of a portable computer (laptop, handheld, smartphone, etc.), e.g., by programming the locks locally using the portable computer.
- mobile phones are preferably not re-programmed via a local reader/writer, but preferably via the cellular mobile network.
- a user downloads appropriate software on the mobile phone 1.
- this particular software which enables a mobile phone to work within the locking system according to the present invention, may be transferred locally from the LSM or an other computer authorized by the LSM.
- This software also called “App”, “app” (acronym for "Application") or "mobile key application” may be provided by an “app store”.
- the app store according to the present invention is a digital application distribution platform, particularly for mobile phones.
- the app store allows users to browse and download applications that were developed for the mobile phone.
- the application (app) can be downloaded directly to a target device (the mobile phone), or downloaded onto a computer and afterwards transferred to the mobile phone.
- a user may download the mobile key application (app) from an app store as illustrated in step 01 of Fig. 3 .
- the mobile phone as used as electronic key comprises an NFC device, e.g., an NFC chip.
- the NFC device further comprises a secure element.
- the secure element may be embedded within the mobile phone in a secure chip, in the SIM card and/or in an external device, attached to the mobile phone.
- the key data set which represents or comprises data needed for unlocking a particular lock, is preferably stored within said secure element.
- the key data set is generated individually for each mobile phone 1. Accordingly, it is preferred that each mobile phone stores a unique key data set in the secure element. Since the secure element of an NFC device is adapted to store sensible data securely, a save mobile key is provided.
- said key data set is preferably transferred from the Locking System Management 201 via an OTA (Over The Air) key server 202, to the mobile phone 1 as follows.
- the key data set with the individual access codes is generated at the LSM 201. Since the LSM 201 may bee seen as the "heart" of the system, remote access to the LSM from outside should be avoided.
- the key data set is encrypted (cryptographically secured) at the LSM by means of a secure key.
- the encrypted key data set is pushed from the LSM 201 to the OTA key server 202 (see step/arrow 02 in Fig. 3 ).
- the LSM 201 and the OTA key server 201 are connected via TCP/IP, further preferred via the Internet.
- the key data set is pushed only in the direction from the LSM to the OTA. In other words, it is preferably not possible to download the key data set from the LSM. Still in other words, pushing the key data set represents a one way direction of sensible data which ensures that manipulation of the LSM from outside is impossible.
- the LSM 201 may be designed such that the administrator actively controls, e.g., by pressing a button, when a new key data set is pushed to the OTA key server.
- the LSM 201 may additionally or alternatively designed that any amendment of access control relating to a corresponding mobile phone may result in an automatic push of the corresponding amended key data set to the OTA key server. Further preferred, amended key data set(s) may be regularly or according to an underlying timing plan pushed to the OTA key server. It is, however, preferred that only encrypted key data sets are pushed and subsequently stored on the OTA key server.
- the OTA key server 201 is preferably provided as a trusted service manager (TSM). Such trusted service managers are typically very save. However, remote access to such OTA server can not be totally avoided such that attacker may hack in worst case the OTA key server and download the stored key data sets. However, since only encrypted key data sets are stored, even hacking the OTA server does not provide a safety problem for the locking system according to the present invention.
- TSM trusted service manager
- the user may then download the encrypted key data set from the OTA key server 201 by means of the mobile key application (the app) already installed on his/her mobile phone 1 (see step 03 in Fig. 3 ).
- the mobile phone network may be used for controlling/managing mobile phones as electronic keys.
- This provides further advantages over the traditional locking systems which typically suggest connecting the locks via a network for controlling/managing the locks of the locking system with the LSM.
- the system of the present invention provides further flexibility, especially for locks with are not (logically) connected to the LSM. For instance, a lock may be provided as "hermit lock" anywhere. Access to said lock may still be individually and flexibly managed due to the connection of the LSM to the mobile phone 1 via the cellular network.
- the mobile key application on the mobile phone 1 is adapted to decrypt (decipher) the encrypted key data set on the mobile phone in a secure manner.
- the LSM 201 and the mobile key application on the mobile phone 1 both know the preferably individual secure key for encrypting and/or decrypting the key data set.
- the mobile phone may be physically coupled to the LSM to generate an encrypting and/or decrypting key which is only known by the LSM and the mobile key application on the mobile phone.
- the encryption/decryption on the LSM/mobile phone may be based on a symmetric key or on the basis of asymmetric keys.
- This design ensures that solely the mobile key application knowing the secure key may decrypt the encrypted key which is distributed via the OTA key server. After decrypting the key data set, the key data set is stored in the secure element of the NFC device. Thus, since the secure element of the NFC device is safe against manipulation from outside, security of the locking system according to the present invention is guaranteed.
- a user may then use the NFC device with the stored key data set for unlocking the door 2 (see step/arrow 04 in Fig. 3 ).
- the NFC device switches into card emulation mode such that NFC device behaves like a typical RFID device.
- the NFC device behaves like a well known MIFARE ® card which transmits data for unlocking the electronic lock 2 on the basis of the key data set stored in the secure element on the mobile phone 1.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Claims (8)
- Système de verrouillage pour gérer l'accès d'une clé électronique à un verrou électronique, le système comprenant :au moins un verrou électronique (2) qui peut être déverrouillé à l'aide d'une carte RFID ;au moins un téléphone mobile (1) et un dispositif CCP, dans lequel ledit téléphone mobile (1) est adapté pour installer une application clé mobile de sorte que le téléphone mobile peut être utilisé en tant que clé électronique pour le verrou électronique (2), dans lequel l'application clé mobile est prévue au niveau d'un magasin d'applications, dans lequel le téléphone mobile est adapté pour télécharger l'application clé mobile depuis le magasin d'applications ;une gestion de système de verrouillage (201) pour gérer l'accès du téléphone mobile (1) au verrou électronique (2) au moyen d'un ensemble de données clés ;un serveur clé OTA (202) pour stocker les ensembles de données clés cryptées, dans lequel ladite gestion de système de verrouillage (201) est adaptée pour crypter l'ensemble de données clés et pour pousser ledit ensemble de données cryptées vers le serveur clé OTA (202) ;dans lequel ledit téléphone mobile (1) est adapté pour télécharger au moyen de l'application clé mobile installée l'ensemble de données clés cryptées approprié depuis le serveur clé OTA (202) via le réseau mobile cellulaire et pour décrypter l'ensemble de données clés téléchargé et pour stocker ledit ensemble de données clés décryptées dans un élément sécurisé du dispositif CCP,dans lequel ledit dispositif CCP est en outre adapté pour commuter en mode émulation de carte et pour transmettre l'ensemble de données clés pendant ledit mode émulation de carte au verrou électronique pour déverrouillage.
- Système selon la revendication 1, dans lequel le dispositif CCP estintégré dans le téléphone mobile (1), de préférence i) directement incorporé, ii) dans une carte SIM ou iii) dans une carte mémoire micro à l'intérieur du téléphone mobile (1) ; oufixé en tant que dispositif externe au téléphone mobile (1), dans lequel ledit téléphone mobile est connecté via une connexion filaire ou par Bluetooth audit dispositif CCP.
- Système selon la revendication 1 ou 2, dans lequel
l'ensemble de données clés est exclusivement transmis via une communication de pousser de la gestion de système de verrouillage vers le serveur clé OTA (202). - Système selon l'une quelconque des revendications précédentes, dans lequel la gestion de système de verrouillage (201) et le téléphone mobile (1) pourvu de l'application clé mobile installée sont adaptés pour être initialisés en négociant une clé secrète pour un cryptage symétrique et/ou une paire de clés pour un cryptage asymétrique, laquelle est utilisée au niveau de la gestion de système de verrouillage (201) pour un cryptage de l'ensemble de données clés et utilisée par l'application clé mobile pour décrypter l'ensemble de données clés téléchargé.
- Procédé de gestion d'accès d'une clé électronique à un verrou électronique, de préférence sur le système de verrouillage selon les revendications précédentes, le procédé comprenant les étapes suivantes :fourniture d'au moins un verrou électronique (2) qui peut être déverrouillé au moyen d'une carte RFID ;fourniture d'au moins un téléphone mobile (1) et d'un dispositif CCP, téléchargement et installation d'une application clé mobile depuis un magasin d'applications sur ledit téléphone mobile (1) de sorte que le téléphone mobile peut être utilisé en tant que clé électronique pour le verrou électronique (2) ;fourniture d'une gestion de système de verrouillage (201) pour gérer l'accès du téléphone mobile (1) au verrou électronique (2) au moyen d'un ensemble de données clés ;cryptage de l'ensemble de données clés sur ladite gestion de système de verrouillage (201) et pousser dudit ensemble de données clés cryptées vers un serveur clé OTA (201) ;stockage des ensembles de données clés cryptées au niveau du serveur clé OTA (201),téléchargement au moyen de l'application clé mobile installée de l'ensemble de données clés cryptées approprié depuis le serveur clé OTA (201) via le réseau mobile cellulaire, décryptage de l'ensemble de données clés téléchargé et stockage dudit ensemble de données clés décryptées dans un élément sécurisé du dispositif CCP, etcommutation dudit dispositif CCP en mode émulation de carte et transmission de l'ensemble de données clés cryptées pendant ledit mode émulation de carte au verrou électronique pour déverrouillage.
- Procédé selon la revendication 5, dans lequel le dispositif CCP est prévua) de manière intégrée dans le téléphone mobile (1), de préférence i) directement incorporé, ii) dans une carte SIM ou iii) dans une carte mémoire micro à l'intérieur du téléphone mobile (1) ; oub) fixé en tant que dispositif externe au téléphone mobile (1), dans lequel ledit téléphone mobile est connecté via une connexion filaire ou par Bluetooth audit dispositif CCP.
- Procédé selon la revendication 5 ou 6, dans lequel
l'ensemble de données clés est transmis exclusivement via une communication de pousser de la gestion de système de verrouillage vers le serveur clé OTA (202). - Procédé selon l'une quelconque des revendications précédentes du procédé, dans lequel la gestion de système de verrouillage (201) et le téléphone mobile (1) pourvu de l'application clé mobile installée sont initialisés en négociant une clé secrète pour un cryptage symétrique et/ou une paire de clés pour un cryptage asymétrique, laquelle est utilisée au niveau de la gestion de système de verrouillage (201) pour un cryptage de l'ensemble de donnés clés et utilisée par l'application clé mobile pour décrypter l'ensemble de données clés téléchargé.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP12152711.3A EP2620919B1 (fr) | 2012-01-26 | 2012-01-26 | Système de verrouillage |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP12152711.3A EP2620919B1 (fr) | 2012-01-26 | 2012-01-26 | Système de verrouillage |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP2620919A1 EP2620919A1 (fr) | 2013-07-31 |
| EP2620919B1 true EP2620919B1 (fr) | 2022-01-05 |
Family
ID=45524439
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP12152711.3A Active EP2620919B1 (fr) | 2012-01-26 | 2012-01-26 | Système de verrouillage |
Country Status (1)
| Country | Link |
|---|---|
| EP (1) | EP2620919B1 (fr) |
Families Citing this family (47)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140145823A1 (en) * | 2012-11-27 | 2014-05-29 | Assa Abloy Ab | Access control system |
| WO2015042502A1 (fr) * | 2013-09-20 | 2015-03-26 | Sargent & Greenleaf, Inc. | Système et procédé permettant d'initialiser et de commander des verrous |
| JP2015068086A (ja) * | 2013-09-30 | 2015-04-13 | 美和ロック株式会社 | ロックシステム |
| CN103489245A (zh) * | 2013-10-18 | 2014-01-01 | 苏州新大诚科技发展股份有限公司 | 一种无源智能锁系统 |
| CN103578169B (zh) * | 2013-11-19 | 2016-08-31 | 南京品佳科技开发有限公司 | 智能信息化无源电子锁具 |
| EP2958085A1 (fr) * | 2014-06-17 | 2015-12-23 | Burg-Wächter Kg | Procédé de fonctionnement d'un système d'accès électronique |
| DE102014009827A1 (de) * | 2014-07-02 | 2016-01-07 | Iblue Ag | System zum Entriegeln und Verriegeln eines Schließmechanismus |
| CN104157060B (zh) * | 2014-08-15 | 2017-04-05 | 曹敏煊 | 一种门禁数据的传输和管理方法 |
| CN104851158A (zh) * | 2014-11-28 | 2015-08-19 | 讯美电子科技有限公司 | 一种门禁开门控制系统 |
| WO2016089832A1 (fr) * | 2014-12-02 | 2016-06-09 | Carrier Corporation | Système de commande d'accès avec des données de carte virtuelle |
| CA2968580A1 (fr) * | 2014-12-02 | 2016-06-09 | Carrier Corporation | Systeme de controle d'acces a transfert de service d'accreditation mobile automatique |
| ES2931988T3 (es) * | 2014-12-02 | 2023-01-05 | Carrier Corp | Programación remota para sistema de control de acceso con tarjeta de datos virtual |
| CA2968521A1 (fr) | 2014-12-02 | 2016-06-09 | Carrier Corporation | Capture d'intention d'utilisateur lors d'une interaction avec une pluralite de commandes d'acces |
| US20160212615A1 (en) * | 2015-01-16 | 2016-07-21 | Sony Corporation | Bcc enabled key management system |
| EP3062295B1 (fr) | 2015-02-25 | 2021-11-10 | Assa Abloy Ab | Systèmes et procédés de mise à jour d'un dispositif mobile |
| EP3073283B1 (fr) | 2015-03-23 | 2019-04-24 | Assa Abloy AB | Procédé et dispositif pour déterminer si un dispositif de verrouillage portable est situé à l'intérieur ou à l'extérieur d'une barrière |
| US10431026B2 (en) | 2015-05-01 | 2019-10-01 | Assa Abloy Ab | Using wearable to determine ingress or egress |
| CN106600755B (zh) * | 2015-10-16 | 2019-01-08 | 巍世科技有限公司 | 一种光波加解密的万用钥匙系统及其操作方法 |
| JP6633401B2 (ja) * | 2016-01-29 | 2020-01-22 | シャーロック株式会社 | 電子錠システム |
| WO2017175020A1 (fr) | 2016-04-06 | 2017-10-12 | Otis Elevator Company | Gestion de visiteur mobile |
| WO2017180563A1 (fr) * | 2016-04-11 | 2017-10-19 | Carrier Corporation | Capture d'intention d'utilisateur lors d'une interaction avec plusieurs commandes d'accès |
| WO2017180388A1 (fr) | 2016-04-11 | 2017-10-19 | Carrier Corporation | Capture d'intention comportementale d'utilisateur lors d'une interaction avec plusieurs commandes d'accès |
| US11164411B2 (en) | 2016-04-11 | 2021-11-02 | Carrier Corporation | Capturing personal user intent when interacting with multiple access controls |
| WO2017180454A1 (fr) * | 2016-04-11 | 2017-10-19 | Carrier Corporation | Capture d'intention de communication d'utilisateur lors d'une interaction avec des contrôles d'accès multiples |
| CN105915344B (zh) * | 2016-04-15 | 2019-03-22 | 重庆金瓯科技发展有限责任公司 | 一种用于房屋租赁的电子钥匙共享服务系统 |
| EP3452994B1 (fr) * | 2016-05-03 | 2022-07-06 | Johnson Controls Technology Company | Panneau virtuel pour un système de contrôle d'accès |
| US10477398B2 (en) | 2016-09-16 | 2019-11-12 | Samsung Electronics Co., Ltd. | Method of providing secure access to hotel IoT services through mobile devices |
| EP3300033B1 (fr) | 2016-09-23 | 2020-12-16 | SimonsVoss Technologies GmbH | Système de contrôle d'accès, dispositif utilisateur portable et procédé de contrôle d'accès |
| CN110114541B (zh) | 2016-10-19 | 2021-08-13 | 多玛凯拔美国股份有限公司 | 电子机械锁芯 |
| CN107978033A (zh) * | 2016-10-24 | 2018-05-01 | 深圳市物联锁科技有限公司 | 一种智能锁交互方法 |
| US11238681B2 (en) | 2017-01-09 | 2022-02-01 | Carrier Corporation | Access control system with local mobile key distribution |
| WO2018225019A1 (fr) * | 2017-06-08 | 2018-12-13 | Karanvir Singh | Dispositif d'étanchéité électromécanique |
| CN107481361A (zh) * | 2017-08-01 | 2017-12-15 | 安恒世通(北京)网络科技有限公司 | 一种电子锁管理方法 |
| EP3679207B1 (fr) | 2017-09-08 | 2022-08-03 | Dormakaba USA Inc. | Partie centrale de verrou électromécanique |
| AT520583A1 (de) * | 2017-10-17 | 2019-05-15 | Makivic Michael | Verfahren zum Verwalten- und Organisieren von Türschließ-System in Objekten |
| EP3540656A1 (fr) * | 2018-03-12 | 2019-09-18 | Assa Abloy AB | Activation de la distribution d'une touche mobile |
| CN110276859B (zh) | 2018-03-15 | 2022-01-28 | 北京骑胜科技有限公司 | 锁具控制方法和系统 |
| CA3097041C (fr) | 2018-04-13 | 2022-10-25 | Dormakaba Usa Inc. | Partie centrale de verrou electromecanique |
| US11466473B2 (en) | 2018-04-13 | 2022-10-11 | Dormakaba Usa Inc | Electro-mechanical lock core |
| CN108648313A (zh) * | 2018-05-11 | 2018-10-12 | 广东汇泰龙科技有限公司 | 一种基于智能云锁的用户标签互动方法及系统 |
| CN111768517A (zh) * | 2019-03-14 | 2020-10-13 | 菜鸟智能物流控股有限公司 | 物流对象管理装置的门锁控制系统、方法和装置以及电子设备 |
| CN111179479A (zh) * | 2019-12-31 | 2020-05-19 | 北京三快在线科技有限公司 | Nfc模拟门禁卡控制方法、装置、电子设备 |
| CN111815815B (zh) * | 2020-06-22 | 2022-06-24 | 合肥智辉空间科技有限责任公司 | 一种电子锁安全系统 |
| CN111976650A (zh) * | 2020-07-29 | 2020-11-24 | 上海果通通信科技股份有限公司 | 一种非接触式汽车钥匙实现方法及装置 |
| CN112002041A (zh) * | 2020-09-02 | 2020-11-27 | 赵辛 | 一种智能会议门禁系统 |
| EP4272191A4 (fr) * | 2020-12-30 | 2024-09-18 | Nanjing Easthouse Electrical Co., Ltd. | Systèmes de verrouillage électronique sécurisé et procédés d'utilisation associés |
| SE2150275A1 (en) * | 2021-03-10 | 2022-09-11 | Nordic Frameworks Ab | Arrangement for managing, and communicating, an electronic key, and a system comprising the arrangement |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2009147548A2 (fr) * | 2008-05-27 | 2009-12-10 | Nxp B.V. | Procédé de stockage d'applications nfc dans un dispositif de mémoire sécurisée |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2007529797A (ja) * | 2004-03-19 | 2007-10-25 | フンベル ローガー | 認証機能および支払い機能を備えた、無線自転車キー、自動車、家屋、rfidタグのための携帯電話におけるオールインワンキーまたは制御ソフトウェアカード |
| SE529849C2 (sv) * | 2006-04-28 | 2007-12-11 | Sics Swedish Inst Of Comp Scie | Accesstyrsystem och förfarande för att driva systemet |
| AT506344B1 (de) * | 2008-01-30 | 2015-06-15 | Evva Sicherheitstechnologie | Verfahren und vorrichtung zur steuerung der zutrittskontrolle |
| US8689013B2 (en) * | 2008-10-21 | 2014-04-01 | G. Wouter Habraken | Dual-interface key management |
-
2012
- 2012-01-26 EP EP12152711.3A patent/EP2620919B1/fr active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2009147548A2 (fr) * | 2008-05-27 | 2009-12-10 | Nxp B.V. | Procédé de stockage d'applications nfc dans un dispositif de mémoire sécurisée |
Non-Patent Citations (2)
| Title |
|---|
| CLAIRE SWEDBERG: "MicroSD Card Brings NFC to Phones for Credit Card Companies, Banks | RFID JOURNAL", RFID JOURNAL, 25 November 2009 (2009-11-25), XP055686830, Retrieved from the Internet <URL:https://www.rfidjournal.com/microsd-card-brings-nfc-to-phones-for-credit-card-companies-banks> [retrieved on 20200417] * |
| RAY WALTERS: "NFC-enabled SIM cards to become a worldwide standard | ExtremeTech", 18 November 2011 (2011-11-18), XP055686297, Retrieved from the Internet <URL:https://web.archive.org/web/20111118120340/https://www.extremetech.com/mobile/105683-nfc-enabled-sim-cards-to-become-a-worldwide-standard> [retrieved on 20200416] * |
Also Published As
| Publication number | Publication date |
|---|---|
| EP2620919A1 (fr) | 2013-07-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2620919B1 (fr) | Système de verrouillage | |
| AU2016277638B2 (en) | Credential management system | |
| EP2804153B1 (fr) | Verrou électronique, système de verrouillage et procédé de fonctionnement d'un verrou électronique | |
| CA2926206C (fr) | Systeme et procede d'authentification poste a poste de communication en champ proche (nfc) et transfert de donnees securise | |
| US10762732B2 (en) | Cryptographic key management via a computer server | |
| US8635462B2 (en) | Method and device for managing access control | |
| US9197313B2 (en) | Remote control with near field communications capability | |
| EP3192059B1 (fr) | Notification d'une première entrée | |
| EP2992663B1 (fr) | Procédé pour fourniture mobile de justificatifs d'identité nfc | |
| CN106447838B (zh) | 密码修改方法及系统、锁具配对方法及系统 | |
| CN101771754A (zh) | 一种移动终端及其近场通信的方法 | |
| CN104216661A (zh) | 用于无线数据交换的具有收发器的移动电子设备 | |
| CN102567697B (zh) | 阅读器、rfid标签及其读取方法 | |
| CN103118016A (zh) | 一种物联网可信标识确证系统及方法 | |
| US10728728B2 (en) | Method and a device for managing contactless applications | |
| JP2008504788A (ja) | 装置に登録されている多数のデータセットの1つの選択方法及び対応装置 | |
| US12300048B2 (en) | In-field encoding of access credentials | |
| EP4220481A1 (fr) | Procédé et appareil de sélection d'une action de lecteur sans fil en tant que résultat des données de sortie reçues à partir d'un dispositif d'identification sans fil | |
| CN119422351A (zh) | 用于在物联网设备和远程计算机系统之间通信的方法和设备 | |
| KR20190092023A (ko) | 사물인터넷을 이용한 가상키 인증방법 | |
| EP2819446A1 (fr) | Procédé pour approvisionner un appareil M2M avec une donnée secrète |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| AX | Request for extension of the european patent |
Extension state: BA ME |
|
| RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SIMONSVOSS TECHNOLOGIES GMBH |
|
| 17P | Request for examination filed |
Effective date: 20140131 |
|
| RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
| 17Q | First examination report despatched |
Effective date: 20170906 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602012077470 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: G07C0009000000 Ipc: G07C0009270000 |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
| RIC1 | Information provided on ipc code assigned before grant |
Ipc: G07C 9/27 20200101AFI20210701BHEP |
|
| INTG | Intention to grant announced |
Effective date: 20210719 |
|
| GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
| GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
| AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
| REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1461256 Country of ref document: AT Kind code of ref document: T Effective date: 20220115 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602012077470 Country of ref document: DE |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
| REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG9D |
|
| REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20220105 |
|
| REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 1461256 Country of ref document: AT Kind code of ref document: T Effective date: 20220105 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220505 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220405 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220405 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220406 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220505 |
|
| REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20220131 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602012077470 Country of ref document: DE |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220126 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 |
|
| PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220131 Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 |
|
| 26N | No opposition filed |
Effective date: 20221006 |
|
| GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20220405 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220131 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220131 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220126 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220405 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220305 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20120126 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220105 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20250131 Year of fee payment: 14 |