WO2000038119A1 - Method and device for identifying persons - Google Patents
Method and device for identifying persons Download PDFInfo
- Publication number
- WO2000038119A1 WO2000038119A1 PCT/DE1999/002291 DE9902291W WO0038119A1 WO 2000038119 A1 WO2000038119 A1 WO 2000038119A1 DE 9902291 W DE9902291 W DE 9902291W WO 0038119 A1 WO0038119 A1 WO 0038119A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile phone
- identification
- local
- interface
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00785—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by light
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00793—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the invention relates to a method and a device for local person identification, i.e. a method with which people can identify and authenticate themselves in a local identification system, for example in order to obtain access authorization to a building or security-relevant sections of a building, to carry out identification against devices such as computers etc. or to defuse the theft protection of a motor vehicle.
- an Israeli security company has developed a security product that automatically logs computer users in and out of a computer when they approach or move away from the computer.
- the system uses a so-called smart card, which is equipped with an infrared transmitter, so that the user can be identified by means of an infrared receiver attached to the terminal via a data exchange via the infrared interface.
- identification can be carried out over a distance of several meters.
- an identification device from Dallas Semiconductors is known, in which a processor with a ROM and a 1024-bit public key cryptography system is accommodated in a ring, similar to a signet ring. Communication with the devices to which the ring bearer has to identify is via a receptor.
- a disadvantage of the various known identification methods is that either the identification is carried out manually, for example using a secret number etc., or that an additional piece of hardware has to be carried along for identification, which causes additional costs.
- the invention is therefore based on the object of providing a method and a device for identifying people in a local security system which can be used simply and universally.
- SIM Subscriber Identity Module
- the method according to the invention is not limited to GSM radio networks; in principle, the considerations can be transferred to other mobile radio / data / communication networks, such as wireless LAN, two-way pagers and third-generation mobile radio systems, as long as the networks do not or Allow only very difficult to falsify identification of the end device, which can almost always be assumed due to the necessity for switching calls and recording charges.
- mobile radio / data / communication networks such as wireless LAN, two-way pagers and third-generation mobile radio systems
- the present invention relates to a method for local person identification using a mobile phone in a local security system, wherein an interface of the mobile phone is used for contactless identification information to the local security system.
- the identification code of the mobile telephone is preferably used to identify the user in relation to the local security system, however, identification data which deviate from or can be used can also be used.
- the radio interface and / or the infrared interface for contactless transmission can be used to transmit the identification data.
- the mobile phone can automatically exchange the identification information when approaching a corresponding receiving terminal. It is also possible for the local security system to have a dialog with the user via the mobile phone, it being possible to use the mobile phone as a terminal.
- the pin number of the mobile phone can be used as an additional security mechanism.
- the security system preferably builds a pico cell into which the mobile phone dials in while exchanging the identification data.
- the method according to the invention can be used, for example, in a company / building communication network, the security system operating as a picocell.
- the invention further relates to a mobile phone in which the above functions are implemented. Preferred embodiments of the invention are described below using examples.
- the basic idea of the invention is to be seen in the fact that the mobile telephone already has the basic functions of identification, so that these basic functions can be used for identification with a local security system, for example an electric door opener, without contact and automatically.
- a local security system for example an electric door opener
- the existing radio interface of a mobile phone can be used to transmit the identification data. This can be done similarly to the call data, as long as it is transmitted in digital form. Since the identification information is already on the SIM card, only its transmission needs to be stimulated. In the simplest case, this can be done at the push of a button on the mobile phone.
- the mobile phone then sends out a radio signal that contains the identification data. This is received and checked by the receiver of the local system; if necessary, access authorization to the local security system is permitted, for example by opening the door. Since the transmission can take place due to the short distance with very low transmission power and possibly on a different frequency, the GSM telephone operation in the area is not disturbed.
- a complete fictitious call can be set up between the local system and the mobile phone at the push of a button, from which the identification data is taken and which is then dismantled again.
- the identification process can be carried out without pressing a button, ie manual fully automatic.
- the "base station”, ie the local system must send out a permanent signal which is recognized and answered by the mobile phone.
- a so-called Pico radio network cell is thus set up in the immediate vicinity of the local system, for example the door to be opened.
- the process then resembles the identification part when the mobile phone registers with a base station of the GSM radio network.
- the identification function can be integrated into it.
- the locations of the building to be secured for example the doors, have a DECT base station for normal call handling. If this base station receives a strong signal, which is synonymous with a nearby signal, for example to set up a fictitious call on a specific phone number, the base station opens the next door and at the same time ends the call with the mobile phone. The user does not need to do anything more than dial this number, for example with a station key, when approaching the door. An extension on the handset is not necessary.
- the interface has two major differences compared to the radio interface, on the one hand it is easier to use, absolutely local and does not interfere with existing radio networks, on the other hand it cannot penetrate clothing or bags. Therefore, when using the infrared interface for local person identification, the mobile phone must be held with its interface in the direction of the local system. It is therefore difficult to implement a fully automatic variant without user action when using the infrared interface, but the infrared interface has the advantage that interference with the telephone system is excluded.
- the mobile phone Since the mobile phone has a keyboard, a display and a bidirectional interface anyway, these can be used for further functions.
- a dialog with the access system to increase security is possible here, such as an additional password entry, configuration setting or the transmission of short messages. aim in both directions.
- Such non-mobile phone applications on mobile phones are possible with the aid of the SIM application toolkit.
- the method according to the invention described here can be extended to any cellular communication network, based on the radio interface, as long as the terminals (telephones, pagers etc.) are handy and the radio cells can be made small enough. It is thus possible to implement the central locking and immobilizer of a motor vehicle using a cell phone.
- the car that builds a pico cell can only be opened and started if the owner's cell phone is in the immediate vicinity or in the vehicle, provided the user has the cell phone as a one-off for the car / pico cell "Legally" entered or synchronized so that the phone is known.
- the pico cell could then switch off so that the cell phone can be used for normal GSM communication.
- the function can also be carried out via the infrared interface of the mobile telephone, so that the use in terms of central locking and immobilizer would be similar to the remote controls which are customary in higher classes today.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Beschreibungdescription
Verfahren und Vorrichtung zur lokalen PersonenidentifikationMethod and device for local person identification
Die Erfindung betrifft ein Verfahren und eine Vorrichtung zur lokalen Personenidentifikation, d.h. ein Verfahren, mit dem sich Personen bei einem lokalen Identifikationssystem identifizieren und authentisieren können, beispielsweise um eine Zugangsberechtigung zu einem Gebäude oder sicherheitsrelevan- ten Abschnitten eines Gebäudes zu erhalten, eine Identifikation gegenüber Vorrichtungen wie Computern etc. durchzuführen oder die Diebstahlssicherung eines Kfz zu entschärfen.The invention relates to a method and a device for local person identification, i.e. a method with which people can identify and authenticate themselves in a local identification system, for example in order to obtain access authorization to a building or security-relevant sections of a building, to carry out identification against devices such as computers etc. or to defuse the theft protection of a motor vehicle.
Derartige Verfahren bzw. Vorrichtungen sind bekannt. So hat eine israelische Sicherheitsfirma ein Sicherheitsprodukt entwickelt, das automatisch Computeranwender bei einem Computer an- bzw. abmeldet, wenn sie sich dem Computer nähern oder sich von ihm entfernen. Das System verwendet eine sogenannte Smartcard, die mit einem Infrarotsender ausgerüstet ist, so daß mittels einem am Terminal angebrachten Infrarotempfänger eine Identifikation des Benutzers über einen Datenaustausch vermittels der Infrarotschnittstelle vorgenommen werden kann. Eine Identifikation kann bei diesem Verfahren über eine Entfernung von mehreren Metern durchgeführt werden.Such methods and devices are known. For example, an Israeli security company has developed a security product that automatically logs computer users in and out of a computer when they approach or move away from the computer. The system uses a so-called smart card, which is equipped with an infrared transmitter, so that the user can be identified by means of an infrared receiver attached to the terminal via a data exchange via the infrared interface. With this method, identification can be carried out over a distance of several meters.
Ferner ist eine Identifikationsvorrichtung der Firma Dallas Semiconductors bekannt, bei der in einem Ring, ähnlich einem Siegelring, ein Prozessor mit einem ROM und einem 1024 Bit- Public-Key-Kryptographiesystem untergebracht ist. Über einen Rezeptor erfolgt die Kommunikation mit den Geräten, gegenüber denen sich der Träger des Ringes zu identifizieren hat.Furthermore, an identification device from Dallas Semiconductors is known, in which a processor with a ROM and a 1024-bit public key cryptography system is accommodated in a ring, similar to a signet ring. Communication with the devices to which the ring bearer has to identify is via a receptor.
•Nachteilig bei den diversen bekannten Identifikationsverfahren ist, daß entweder die Identifizierung manuell, beispiels- weise über eine Geheimnummer etc. vorgenommen wird, oder daß zur Identifizierung ein zusätzliches Stück Hardware mitgeführt werden muß, was zusätzliche Kosten verursacht. Der Erfindung liegt daher die Aufgabe zugrunde, ein Verfahren und eine Vorrichtung zur Identifizierung von Personen bei einem lokalen Sicherungssystem zu schaffen, das einfach und universell einsetzbar ist.• A disadvantage of the various known identification methods is that either the identification is carried out manually, for example using a secret number etc., or that an additional piece of hardware has to be carried along for identification, which causes additional costs. The invention is therefore based on the object of providing a method and a device for identifying people in a local security system which can be used simply and universally.
Die Aufgabe wird durch die Merkmale des Verfahrens nach Anspruch 1 und der Vorrichtung nach Anspruch 11 gelöst. Bevorzugte Ausgestaltungen der Erfindung sind Gegenstand der Un- teransprüche.The object is achieved by the features of the method according to claim 1 and the device according to claim 11. Preferred embodiments of the invention are the subject of the subclaims.
GSM-Mobiltelefone, sogenannte "Handies", sind heute weit verbreitet. Kennzeichnend für die Entwicklung dieser Geräte ist die immer stärkere Miniaturisierung, die es erlaubt, das Te- lefon problemlos immer mit sich zu führen, sowie ein aus der Miniaturisierung resultierender ständig steigender Umfang an Funktionen, beispielsweise die Infrarotschnittstelle, die immer stärkere Verbreitung findet, und das SIM-Application- Toolkit, das es erlaubt, "telefoniefremde" Softwareanwendun- gen auf dem Mobiltelefon zu implementieren. Da sich der Benutzer/das Gerät gegenüber dem Netzbetreiber als berechtigt ausweisen muß, verfügt das GSM-Mobiltelefon über Vorrichtungen, die eine Identifikation und Authentisierung erlauben. Im Falle des GSM-Netzes sind diese Daten verschlüsselt auf der SIM-Karte gespeichert (SIM = Subscriber Identity Module) , ohne die das Telefon nicht funktioniert. Das erfindungsgemäße Verfahren ist allerdings nicht auf GSM-Funknetze beschränkt, grundsätzlich sind die Überlegungen auf andere Mobilfunk- /Daten-/Kommunikationsnetze, wie beispielsweise Wireless LAN, Two-Way-Pager und Mobilfunksysteme der dritten Generation, übertragbar, solange die Netze eine nicht bzw. nur sehr schwer fälschbare Identifikation des Endgerätes erlauben, was aufgrund der Notwendigkeit bei der Gesprächsvermittlung und Gebührenerfassung fast immer vorausgesetzt werden kann.GSM cell phones, so-called "cell phones", are widely used today. Characteristic of the development of these devices is the ever increasing miniaturization, which allows the phone to be carried around with ease without any problems, as well as an ever increasing range of functions resulting from the miniaturization, for example the infrared interface, which is becoming increasingly widespread, and the SIM application toolkit, which allows “non-telephony” software applications to be implemented on the mobile phone. Since the user / device must identify himself as authorized to the network operator, the GSM mobile phone has devices that allow identification and authentication. In the case of the GSM network, this data is encrypted and stored on the SIM card (SIM = Subscriber Identity Module), without which the phone will not work. However, the method according to the invention is not limited to GSM radio networks; in principle, the considerations can be transferred to other mobile radio / data / communication networks, such as wireless LAN, two-way pagers and third-generation mobile radio systems, as long as the networks do not or Allow only very difficult to falsify identification of the end device, which can almost always be assumed due to the necessity for switching calls and recording charges.
Die vorliegende Erfindung betrifft ein Verfahren zur lokalen Personenidentifikation mittels einem Mobiltelefon bei einem lokalen Sicherungssystem, wobei eine Schnittstelle des Mobiltelefons zur berührungslosen Identifikationsinformationen an das lokale Sicherungssystem verwendet wird.The present invention relates to a method for local person identification using a mobile phone in a local security system, wherein an interface of the mobile phone is used for contactless identification information to the local security system.
Vorzugsweise wird der Identifikationscode des Mobiltelefons zur Identifizierung des Benutzers gegenüber dem lokalen Sicherungssystem verwendet, allerdings können auch davon abweichende oder zusätzliche Identifikationsdaten verwendet werden. Zur Übertragung der Identifikationsdaten kann die Funk- schnittsteile und/oder die Infrarotschnittstelle zur berührungslosen Übertragung verwendet werden.The identification code of the mobile telephone is preferably used to identify the user in relation to the local security system, however, identification data which deviate from or can be used can also be used. The radio interface and / or the infrared interface for contactless transmission can be used to transmit the identification data.
Das Mobiltelefon kann die Identifikationsinformation bei Annäherung an ein entsprechendes Empfangsterminal automatisch austauschen. Es ist auch möglich, daß das lokale Sicherungssystem mit dem Benutzer über das Mobiltelefon einen Dialog durchführt, wobei es möglich ist das Mobiltelefon als Terminal zu verwenden.The mobile phone can automatically exchange the identification information when approaching a corresponding receiving terminal. It is also possible for the local security system to have a dialog with the user via the mobile phone, it being possible to use the mobile phone as a terminal.
Ferner kann als zusätzlicher Sicherungsmechanismus die Pinnummer des Mobiltelefons benutzt werden.Furthermore, the pin number of the mobile phone can be used as an additional security mechanism.
Vorzugsweise baut das Sicherungssystem eine Pico-Zelle auf, in die sich das Mobiltelefon unter Austausch der Identifika- tionsdaten einwählt.The security system preferably builds a pico cell into which the mobile phone dials in while exchanging the identification data.
Das erfindungsgemäße Verfahren kann beispielsweise in einem Unternehmens-/Gebäudekoιrιmunikationsnetz verwendet werden, wobei das Sicherungssystem als Picozelle arbeitet.The method according to the invention can be used, for example, in a company / building communication network, the security system operating as a picocell.
Ferner kann das erfindungsgemäße Verfahren zur Sicherung eines Kraftfahrzeugs verwendet werden.Furthermore, the method according to the invention for securing a motor vehicle can be used.
Ferner betrifft die Erfindung ein Mobiltelefon, in dem die obigen Funktionen implementiert sind. Bevorzugte Ausführungsformen der Erfindung werden nachfolgend anhand von Beispielen beschrieben.The invention further relates to a mobile phone in which the above functions are implemented. Preferred embodiments of the invention are described below using examples.
Der Grundgedanke der Erfindung ist darin zu sehen, daß das Mobiltelefon bereits über die Grundfunktionen einer Identifizierung verfügt, so daß diese Grundfunktionen zur Identifikation gegenüber einem lokalen Sicherungssystem, beispielsweise einem elektrischen Türöffner, berührungslos und automatisch verwendet werden können.The basic idea of the invention is to be seen in the fact that the mobile telephone already has the basic functions of identification, so that these basic functions can be used for identification with a local security system, for example an electric door opener, without contact and automatically.
Die verschiedenen Möglichkeiten dazu lassen sich nach der benutzten Schnittstelle gliedern:The various options for this can be divided according to the interface used:
Benutzung der Funkschnittstelle:Using the radio interface:
Die bereits vorhandene Funkschnittstelle eines Mobiltelefons kann zur Übertragung der Identifizierungsdaten verwendet werden. Dies kann durchaus ähnlich den Gesprächsdaten erfolgen, solange diese in digitaler Form übertragen werden. Da die Identifizierungsinformation schon auf der SIM-Karte vorliegt, muß nur deren Übertragung angeregt werden. Dies kann im einfachsten Falle per Knopfdruck am Mobiltelefon erfolgen. Das Mobiltelefon sendet dann ein Funksignal aus, das die Identifikationsdaten enthält. Dieses wird vom Empfänger des lokalen Systems empfangen und geprüft, gegebenenfalls wird die Zugangsberechtigung zu dem lokalen Sicherungssystem, beispielsweise durch die Öffnung der Tür, gestattet. Da das Senden aufgrund der kurzen Distanz mit sehr geringer Sendeleistung und eventuell auf einer anderen Frequenz erfolgen kann, wird der GSM-Telefonbetrieb in der Umgebung nicht gestört.The existing radio interface of a mobile phone can be used to transmit the identification data. This can be done similarly to the call data, as long as it is transmitted in digital form. Since the identification information is already on the SIM card, only its transmission needs to be stimulated. In the simplest case, this can be done at the push of a button on the mobile phone. The mobile phone then sends out a radio signal that contains the identification data. This is received and checked by the receiver of the local system; if necessary, access authorization to the local security system is permitted, for example by opening the door. Since the transmission can take place due to the short distance with very low transmission power and possibly on a different frequency, the GSM telephone operation in the area is not disturbed.
Alternativ dazu kann per Knopfdruck ein komplettes fiktives Gespräch zwischen dem lokalen System und dem Mobiltelefon aufgebaut werden, dem die Identifikationsdaten entnommen wer- den und das danach wieder abgebaut wird. Ein derartiger Vorgang ist konform mit dem GSM-Protokoll möglich. Ferner kann der Identifikationsvorgang ohne Knopfdruck, d.h. manuelle Tä- tigkeit, komplett automatisch erfolgen. Dazu muß die "Basisstation", d.h. das lokale System, ein permanentes Signal aussenden, welches vom Mobiltelefon erkannt und beantwortet wird. In der direkten Umgebung des lokalen Systems, beispielsweise der zu öffnenden Tür, wird somit eine sogenannte Pico-Funknetzzelle aufgebaut.Alternatively, a complete fictitious call can be set up between the local system and the mobile phone at the push of a button, from which the identification data is taken and which is then dismantled again. Such a process is possible in accordance with the GSM protocol. Furthermore, the identification process can be carried out without pressing a button, ie manual fully automatic. For this purpose, the "base station", ie the local system, must send out a permanent signal which is recognized and answered by the mobile phone. A so-called Pico radio network cell is thus set up in the immediate vicinity of the local system, for example the door to be opened.
Im Prinzip ähnelt der Vorgang dann dem Identifikationsteil bei der Anmeldung des Mobiltelefons an einer Basisstation des GSM-Funknetzes.In principle, the process then resembles the identification part when the mobile phone registers with a base station of the GSM radio network.
Im heutigen GSM-Netz wäre dies mit Einschränkungen beispielsweise dadurch zu realisieren, daß man als "bevorzugtes Netz" das des lokalen Systems in das Mobiltelefon programmiert oder daß diese Pico-Zelle lokal einfach das stärkste Signal liefert. Das Mobiltelefon wird dann, sobald es in den Bereich einer solchen Basisstation kommt, sich dort einbuchen und damit inhärent identifizieren. Außerhalb dieses Bereichs der Pico-Funknetzzelle würde das Mobiltelefon sich ganz normal in das Kommunikationsnetz einbuchen, welches als Mobilfunknetz gerade vorhanden ist.In today's GSM network, this would be possible with restrictions, for example, by programming that of the local system into the mobile phone as the "preferred network" or by simply providing the strongest signal locally. As soon as it comes into the area of such a base station, the mobile phone will then log in there and thus inherently identify it. Outside of this area of the pico radio network cell, the mobile phone would log into the communication network, which is currently available as a mobile network, as normal.
Integration in ein Unternehmens-/Gebäudekommunikationsnetz:Integration in a company / building communication network:
Verfügt ein Gebäude oder Unternehmen über ein lokales Mobilfunknetz, beispielsweise nach dem heute üblichen DECT-Stan- dard, so kann die Identifikationsfunktion darin integriert werden.If a building or company has a local cell phone network, for example according to the DECT standard that is common today, the identification function can be integrated into it.
Die zu sichernden Lokalitäten des Gebäudes, beispielsweise die Türen, verfügen über eine DECT-Basisstation zur normalen Gesprächsabwicklung. Empfängt diese Basisstation ein starkes Signal, was gleichbedeutend ist mit einem nahen Signal, beispielsweise zum Aufbau eines fiktiven Gespräches an einer be- stimmten Rufnummer, so öffnet die Basisstation die nächstgelegene Tür und beendet gleichzeitig das Gespräch mit dem Mobiltelefon wieder. Der Benutzer braucht also nichts weiter zu tun, als bei Annäherung an die Tür diese Rufnummer, beispielsweise mit einer Stationstaste, zu wählen. Eine Erweiterung am Mobilteil ist nicht notwendig.The locations of the building to be secured, for example the doors, have a DECT base station for normal call handling. If this base station receives a strong signal, which is synonymous with a nearby signal, for example to set up a fictitious call on a specific phone number, the base station opens the next door and at the same time ends the call with the mobile phone. The user does not need to do anything more than dial this number, for example with a station key, when approaching the door. An extension on the handset is not necessary.
Derselbe Vorgang könnte auch automatisch im Sinne eines An- melde-/Einbuchvorgangs bei der Pico-Zelle erfolgen, wie sie oben beschrieben wurde.The same process could also take place automatically in the sense of a registration / log-in process with the Pico cell, as described above.
Benutzung der Infrarotschnittstelle:Using the infrared interface:
Immer mehr Mobiltelefone verfügen inzwischen über eine Infrarotschnittstelle zur Datenübertragung, die üblicherweise zur Datenübertragung an einen Laptop verwendet wird. DieseMore and more mobile phones now have an infrared interface for data transmission, which is usually used for data transmission to a laptop. This
Schnittstelle hat gegenüber der Funkschnittstelle zwei gravierende Unterschiede, sie ist nämlich einerseits einfacher zu handhaben, absolut lokal und interferiert nicht mit bestehenden Funknetzen, andererseits kann sie keine Kleidung oder Taschen durchdringen. Daher muß bei der Verwendung der Infrarotschnittstelle zur lokalen Personenidentifikation das Mobiltelefon mit seiner Schnittstelle in Richtung des lokalen Systems gehalten werden. Daher ist bei der Verwendung der Infrarotschnittstelle eine vollautomatische Variante ohne Be- nutzeraktion schwer realisierbar, allerdings hat die Infrarotschnittstelle den Vorteil, daß eine Interferenz mit dem Telefonsystem ausgeschlossen ist.The interface has two major differences compared to the radio interface, on the one hand it is easier to use, absolutely local and does not interfere with existing radio networks, on the other hand it cannot penetrate clothing or bags. Therefore, when using the infrared interface for local person identification, the mobile phone must be held with its interface in the direction of the local system. It is therefore difficult to implement a fully automatic variant without user action when using the infrared interface, but the infrared interface has the advantage that interference with the telephone system is excluded.
Benutzung des Mobiltelefons als Terminal:Using the mobile phone as a terminal:
Da das Mobiltelefon sowieso über eine Tastatur, über eine Anzeige und eine bidirektionale Schnittstelle verfügt, können diese für weitergehende Funktionen verwendet werden.Since the mobile phone has a keyboard, a display and a bidirectional interface anyway, these can be used for further functions.
Möglich ist hier ein Dialog mit dem Zugangssystem zur Erhöhung der Sicherheit, wie eine zusätzliche Paßworteingabe, Konfigurationseinstellung oder die Übertragung kurzer Nach- richten in beiden Richtungen. Derartige mobiltelefonfremde Applikationen auf Mobiltelefonen sind mit Hilfe des SIM-Ap- plikations-Toolkits möglich.A dialog with the access system to increase security is possible here, such as an additional password entry, configuration setting or the transmission of short messages. aim in both directions. Such non-mobile phone applications on mobile phones are possible with the aid of the SIM application toolkit.
Zusammenfassend kann festgestellt werden, daß das hier beschriebene erfindungsgemäße Verfahren - bezogen auf die Funkschnittstelle - auf jedes zellulare Kommunikationsnetz erweiterbar ist, solange die Terminals (Telefone, Pager etc.) handlich sind und die Funkzellen klein genug gestaltet werden können. So ist es möglich, die Zentralverriegelung und die Wegfahrsperre eines Kfzs mittels eines Mobiltelefons zu realisieren. Das Auto, das eine Pico-Zelle aufbaut, ließe sich nur öffnen und starten, wenn sich das Mobiltelefon des Besitzers in unmittelbarer Nähe oder im Fahrzeug befindet, voraus- gesetzt, der Benutzer hat das Mobiltelefon einmalig bei dem Kfz/der Pico-Zelle als "rechtmäßig" eingetragen bzw. synchronisiert, damit das Telefon bekannt ist. Danach könnte sich die Pico-Zelle abschalten, so daß das Mobiltelefon zur üblichen GSM-Kommunikation verwendet werden kann.In summary, it can be stated that the method according to the invention described here can be extended to any cellular communication network, based on the radio interface, as long as the terminals (telephones, pagers etc.) are handy and the radio cells can be made small enough. It is thus possible to implement the central locking and immobilizer of a motor vehicle using a cell phone. The car that builds a pico cell can only be opened and started if the owner's cell phone is in the immediate vicinity or in the vehicle, provided the user has the cell phone as a one-off for the car / pico cell "Legally" entered or synchronized so that the phone is known. The pico cell could then switch off so that the cell phone can be used for normal GSM communication.
Alternativ dazu kann die Funktion auch über die Infrarotschnittstelle des Mobiltelefons ausgeführt werden, so daß die Benutzung hinsichtlich Zentralverriegelung und Wegfahrsperre ähnlich der heute in gehobenen Klassen üblichen Fernsteuerun- gen wäre.As an alternative to this, the function can also be carried out via the infrared interface of the mobile telephone, so that the use in terms of central locking and immobilizer would be similar to the remote controls which are customary in higher classes today.
Neben der Identifikation gegenüber technischen Systemen ist in einer Weiterentwicklung auch die Identifikation gegenüber anderen Benutzern möglich. Besitzen zwei einander unbekannte Personen Geräte, wie die oben beschriebenen Mobiltelefone, die nach dem gleichen Standard arbeiten, so können die Geräte über das oben beschriebene Verfahren elektronisch "Visitenkarten" austauschen. Da der Benutzer eines Mobiltelefons eine deutlich zuverlässige Identifikation durch die SIM- Karte besitzt, kann man sich auf den Wahrheitsgehalt der ausgetauschten Visitenkarten ziemlich verlassen. In addition to identification with technical systems, further development also enables identification with other users. If two people who are unknown to one another have devices, such as the mobile telephones described above, which operate according to the same standard, the devices can electronically exchange "business cards" using the process described above. Since the user of a cell phone has a clearly reliable identification through the SIM card, one can rely on the truthfulness of the exchanged business cards.
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19859146 | 1998-12-21 | ||
| DE19859146.2 | 1998-12-21 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2000038119A1 true WO2000038119A1 (en) | 2000-06-29 |
Family
ID=7892043
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/DE1999/002291 Ceased WO2000038119A1 (en) | 1998-12-21 | 1999-07-26 | Method and device for identifying persons |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2000038119A1 (en) |
Cited By (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE10026429A1 (en) * | 2000-05-29 | 2001-12-13 | Dorma Gmbh & Co Kg | Access control system for access to buildings and controlled areas or elevators |
| EP1191486A1 (en) | 2000-09-21 | 2002-03-27 | Robert Bosch Gmbh | Information carrier |
| DE10062671A1 (en) * | 2000-12-15 | 2002-06-20 | Bsh Bosch Siemens Hausgeraete | Device and method for entering information into a control unit |
| WO2003015313A1 (en) | 2001-08-07 | 2003-02-20 | Omron Corporation | Cellular telephone, control system for controlling device mounted on vehicle, cellular telephone control method, control method for controlling device mounted on vehicle, cellular telephone control program, control program for controlling device mounted on vehicle, and recording medium co |
| WO2002101608A3 (en) * | 2001-06-13 | 2003-03-20 | Stefan J M Kraemer | Method and device for receiving data |
| EP1424861A1 (en) * | 2002-11-26 | 2004-06-02 | Siemens Aktiengesellschaft | Method and apparatus to identify a user through a mobile device |
| WO2005017840A1 (en) * | 2003-08-08 | 2005-02-24 | Giesecke & Devrient Gmbh | Method and device for contactlessly controlling the locking state of an electronic lock |
| WO2005114594A1 (en) * | 2004-05-13 | 2005-12-01 | Honeywell International Inc. | Authenticating wireless phone system |
| WO2006020880A1 (en) * | 2004-08-13 | 2006-02-23 | Honeywell International Inc. | Authenticating wireless phone system |
| US7136632B1 (en) | 1999-09-17 | 2006-11-14 | Nokia Corporation | Control system comprising means for setting up a short distance second data transmission connection to a wireless communication device in order to send an identification message |
| EP1998292A3 (en) * | 2007-06-01 | 2009-07-29 | Honeywell International Inc. | Mobile Based Identification in Security and Asset Management Systems |
| EP2337311A1 (en) * | 2009-12-21 | 2011-06-22 | Deutsche Telekom AG | Method and device for integrating mobile radio technologies in keys and key-like objects |
| DE10157405B4 (en) * | 2001-05-21 | 2014-02-20 | Mitsubishi Denki K.K. | Individual adaptive system and information distribution device |
| US9367976B2 (en) | 2014-08-29 | 2016-06-14 | Twin Harbor Labs, LLC | Methods, software, and systems for providing policy-based access |
| US9847007B2 (en) | 2014-08-29 | 2017-12-19 | Twin Harbor Labs Llc | Method and apparatus for providing policy-based access using an accelerometer |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1993014571A1 (en) * | 1992-01-09 | 1993-07-22 | Supra Products, Inc. | Secure entry system with radio communication |
| WO1994001963A1 (en) * | 1992-07-08 | 1994-01-20 | Joseph Rozgonyi | Cellular telephone access control and identification system |
| DE19618535A1 (en) * | 1996-05-08 | 1997-07-24 | Siemens Ag | Driver information system for motor vehicles with information and communications devices |
| CA2195487A1 (en) * | 1996-02-20 | 1997-08-21 | Michael Buhrmann | Location-dependent cellular service profile |
| WO1998006210A1 (en) * | 1996-07-31 | 1998-02-12 | Amadeus Lopatta | Mobile telephone with additonal functions |
| WO1998033343A1 (en) * | 1997-01-27 | 1998-07-30 | Telecom Finland Oy | Subscriber identity module mobile station and method for performing a smart card function |
-
1999
- 1999-07-26 WO PCT/DE1999/002291 patent/WO2000038119A1/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1993014571A1 (en) * | 1992-01-09 | 1993-07-22 | Supra Products, Inc. | Secure entry system with radio communication |
| WO1994001963A1 (en) * | 1992-07-08 | 1994-01-20 | Joseph Rozgonyi | Cellular telephone access control and identification system |
| CA2195487A1 (en) * | 1996-02-20 | 1997-08-21 | Michael Buhrmann | Location-dependent cellular service profile |
| DE19618535A1 (en) * | 1996-05-08 | 1997-07-24 | Siemens Ag | Driver information system for motor vehicles with information and communications devices |
| WO1998006210A1 (en) * | 1996-07-31 | 1998-02-12 | Amadeus Lopatta | Mobile telephone with additonal functions |
| WO1998033343A1 (en) * | 1997-01-27 | 1998-07-30 | Telecom Finland Oy | Subscriber identity module mobile station and method for performing a smart card function |
Cited By (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7283812B2 (en) | 1999-09-17 | 2007-10-16 | Nokia Corporation | Control system for setting up a short distance second data transmitting connection to a wireless communication device in order to send an identification message |
| US7136632B1 (en) | 1999-09-17 | 2006-11-14 | Nokia Corporation | Control system comprising means for setting up a short distance second data transmission connection to a wireless communication device in order to send an identification message |
| DE10026429A1 (en) * | 2000-05-29 | 2001-12-13 | Dorma Gmbh & Co Kg | Access control system for access to buildings and controlled areas or elevators |
| EP1191486A1 (en) | 2000-09-21 | 2002-03-27 | Robert Bosch Gmbh | Information carrier |
| DE10062671A1 (en) * | 2000-12-15 | 2002-06-20 | Bsh Bosch Siemens Hausgeraete | Device and method for entering information into a control unit |
| DE10157405B4 (en) * | 2001-05-21 | 2014-02-20 | Mitsubishi Denki K.K. | Individual adaptive system and information distribution device |
| WO2002101608A3 (en) * | 2001-06-13 | 2003-03-20 | Stefan J M Kraemer | Method and device for receiving data |
| EP1420525A4 (en) * | 2001-08-07 | 2004-10-20 | Omron Tateisi Electronics Co | Cellular telephone; control system for controlling device mounted on vehicle; cellular telephone control method; control method for controlling device mounted on vehicle; cellular telephone control program; control program for controlling device mounted on vehicle |
| US7228122B2 (en) | 2001-08-07 | 2007-06-05 | Omron Corporation | Cellular phone unit, control system of vehicle-mounted device, control method of cellular phone unit, control method of vehicle-mounted device, control program of cellular phone unit, control prgram of vehicle-mounted device, and recording medium recording the program |
| WO2003015313A1 (en) | 2001-08-07 | 2003-02-20 | Omron Corporation | Cellular telephone, control system for controlling device mounted on vehicle, cellular telephone control method, control method for controlling device mounted on vehicle, cellular telephone control program, control program for controlling device mounted on vehicle, and recording medium co |
| EP1424861A1 (en) * | 2002-11-26 | 2004-06-02 | Siemens Aktiengesellschaft | Method and apparatus to identify a user through a mobile device |
| DE10336567A1 (en) * | 2003-08-08 | 2005-03-10 | Giesecke & Devrient Gmbh | Method and device for contactless control of the closing state of an electronic lock |
| WO2005017840A1 (en) * | 2003-08-08 | 2005-02-24 | Giesecke & Devrient Gmbh | Method and device for contactlessly controlling the locking state of an electronic lock |
| WO2005114594A1 (en) * | 2004-05-13 | 2005-12-01 | Honeywell International Inc. | Authenticating wireless phone system |
| WO2006020880A1 (en) * | 2004-08-13 | 2006-02-23 | Honeywell International Inc. | Authenticating wireless phone system |
| US8078146B2 (en) | 2007-06-01 | 2011-12-13 | Honeywell International Inc. | Systems and methods for security and asset management |
| EP1998292A3 (en) * | 2007-06-01 | 2009-07-29 | Honeywell International Inc. | Mobile Based Identification in Security and Asset Management Systems |
| EP2337311A1 (en) * | 2009-12-21 | 2011-06-22 | Deutsche Telekom AG | Method and device for integrating mobile radio technologies in keys and key-like objects |
| US9367976B2 (en) | 2014-08-29 | 2016-06-14 | Twin Harbor Labs, LLC | Methods, software, and systems for providing policy-based access |
| US9847007B2 (en) | 2014-08-29 | 2017-12-19 | Twin Harbor Labs Llc | Method and apparatus for providing policy-based access using an accelerometer |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE69526554T2 (en) | Cellular telephone as an authenticated accounting control device | |
| WO2000038119A1 (en) | Method and device for identifying persons | |
| DE19748054A1 (en) | Method for operating a cell phone and cell phone | |
| DE69934911T2 (en) | MOBILE PHONE AUTO PC LOGON | |
| DE69903467T2 (en) | PROXIMITY DETECTION FOR A RADIO COMMUNICATION SYSTEM BY MOBILE STATIONS | |
| DE69601349T2 (en) | Verification of the personal identification number of a mobile subscriber | |
| DE102009040477A1 (en) | Authentication in the mobile network by authentication cell | |
| DE4301039A1 (en) | Microprocessor based access control system for use with road vehicles | |
| CN101719291A (en) | Method and system for realizing door control by using domestic information terminal equipment | |
| CN202916892U (en) | Intelligent lock system | |
| US7031665B1 (en) | Method and device for utilization of mobile radio telephones for surveillance and/or control purposes | |
| US7283812B2 (en) | Control system for setting up a short distance second data transmitting connection to a wireless communication device in order to send an identification message | |
| CN110232754A (en) | A kind of blue-tooth intelligence unlocking system and method | |
| EP1634473A2 (en) | Mobile radio arrangement for a motor vehicle | |
| EP1565801B1 (en) | Method for authenticating and charging a subscriber of a radio network | |
| CN113034739A (en) | Electronic key system based on 4G Cat1 technology | |
| DE19838129C2 (en) | Electronic locking system | |
| DE112005001435T5 (en) | For a user transparent registration process for a secure communication P | |
| EP1169843B1 (en) | Method and device for utilization of mobile radio telephones for surveillance and/or control purposes | |
| CN204719834U (en) | A kind of intelligent access control system | |
| CN111038444A (en) | Communication method of PEPS system | |
| EP1137240A2 (en) | Radiotelephone | |
| DE19613519A1 (en) | Telephone system for cordless phones | |
| EP1351536B1 (en) | Method and system for registration in a wireless local network | |
| CN106204833A (en) | A kind of intelligent electromagnetic locking device based on wireless-transmission network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN US |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| 122 | Ep: pct application non-entry in european phase |