EP0172765A1 - Access-control method and system involving the sensing of the texture of a surface - Google Patents

Access-control method and system involving the sensing of the texture of a surface Download PDF

Info

Publication number
EP0172765A1
EP0172765A1 EP85401498A EP85401498A EP0172765A1 EP 0172765 A1 EP0172765 A1 EP 0172765A1 EP 85401498 A EP85401498 A EP 85401498A EP 85401498 A EP85401498 A EP 85401498A EP 0172765 A1 EP0172765 A1 EP 0172765A1
Authority
EP
European Patent Office
Prior art keywords
support
reader
support object
texture
arm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP85401498A
Other languages
German (de)
French (fr)
Other versions
EP0172765B1 (en
Inventor
Bertrand Causse D'agraives
Janny Mathieu
Patrick Jamar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
European Atomic Energy Community Euratom
ASSOCIATION POUR LA PROMOTION de la TECHNOLOGIE PROMOTECH
Promotech Corp
Original Assignee
European Atomic Energy Community Euratom
ASSOCIATION POUR LA PROMOTION de la TECHNOLOGIE PROMOTECH
Promotech Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by European Atomic Energy Community Euratom, ASSOCIATION POUR LA PROMOTION de la TECHNOLOGIE PROMOTECH, Promotech Corp filed Critical European Atomic Energy Community Euratom
Priority to AT85401498T priority Critical patent/ATE47458T1/en
Publication of EP0172765A1 publication Critical patent/EP0172765A1/en
Application granted granted Critical
Publication of EP0172765B1 publication Critical patent/EP0172765B1/en
Expired legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/086Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by passive credit-cards adapted therefor, e.g. constructive particularities to avoid counterfeiting, e.g. by inclusion of a physical or chemical security-layer

Definitions

  • the subject of the present invention is an access control system, that is to say a system making it possible to trigger an action equivalent to an authorization after checking the identity of an object introduced into this system.
  • the system of the invention constitutes a "key-lock” assembly provided that these terms are given a broad meaning:
  • the word "key” must be understood as designating a support object provided with an identity and
  • the object object of the invention does not necessarily take the traditional form of a key. It can be in any form, including a card.
  • the function of "the control unit” it is not necessarily limited to action on the bolt of a door, but may correspond to an authorization to access any system, IT, telematics, banking, etc ...
  • the very principle of locksmithing is to give an portable object (the key) an identity (a profile for example) and to make an organ (the lock) capable of recognizing this identity and triggering an action.
  • the key is a reproducible object, for obvious reasons which are due to the fact that several people will have to pos Sede the same key (members of the same family, the same society, etc ).
  • the lock being linked to a particular shape given to a key, it can only cooperate with one type of key.
  • the object of the invention is to remedy this drawback.
  • This goal is achieved by the use of a key which, by nature, is not reproducible.
  • This characteristic is obtained by choosing, as information capable of defining the identity of a key, no longer an artificially manufactured information (such as a toothing or a magnetic or optical property of a strip), but a natural information which is the texture of the surface of a room.
  • This information is so complex that it cannot be reproduced.
  • this information is unique, because two objects, even identical in the macroscopic sense, are actually different if we go down to their surface texture. It goes without saying that nothing prevents adding an artificial texture to the natural texture (scratches, streaks, marks, etc.).
  • the present invention takes up this idea by applying it to the field of access control systems.
  • the choice of surface texture as a means of identification requires modification of the procedure. loading authorized information in such a way that it is impossible to counterfeit it.
  • the lock of the invention which is provided, like electronic locks, with different memory locations is such that these locations can only receive the setpoint information by reading the keys authorized to open the lock. In other words, we no longer write in The memory of The lock information that we wrote on a medium.
  • the procedure is the opposite: keys are first manufactured with any texture and the locks are then conditioned, a posteriori, according to said keys.
  • the quantity used for the identification of the key is a continuous analog quantity and not a digital value. It will therefore be possible to proceed analogically for the comparison operation between the setpoint quantity and the quantity read. But of course, it will often be better to convert the analog signal to digital and then proceed with digital processing.
  • Another originality of the lock of the invention is that the means responsible for reading the information contained in the support which is presented to it is a texture reader and no longer a magnetic reader.
  • each support object present The shape of a key with a head capable of being entered manually and a body having at least one flat part from which the surface portion is taken, the texture of which is read.
  • the body of the key is metallic and preferably of alloy, which gives the texture a particular complexity.
  • each support object has the shape of a map, part of the surface of which is used for reading a texture.
  • This card can be made of flexible plastic.
  • the key can have a cylindrical shape with a reading either rotatable along the circumference, or rectilinear according to a generatrix.
  • the key may have a tubular appearance, the reading taking place outside or inside the tube.
  • the key can consist of a usual object such as a pen.
  • the reader comprises a block for receiving the support object, a transducer capable of translating the relief of the key into an electrical signal (for example a piezoelectric tip), this transducer being arranged on an arm and a means of movement. relative of the arm and of the support object Along a portion of the surface thereof.
  • the arm is connected to a displacement means which is set in motion when the support is immobilized in the receiving block.
  • This means of movement of the arm can be a clockwork movement connected to an arming arm, one end of which is moved by the introduction of the support object into the receiving block.
  • this means of moving the arm can also be an electric motor.
  • the reading tip is stationary and the reading of the texture of the support object is carried out during the introduction of the latter into the reception block.
  • the reading can be carried out during the withdrawal of the key from the reception block.
  • the comparison circuit preferably consists of a correlator followed by a threshold circuit.
  • a correlator is particularly useful here because the measurement signal is of analog character and that it is sampled at a large number of points, for example 512 or 1024 or more.
  • the comparison between the signal read and the reference signal can therefore call upon the technique of correlation, whereas in the prior art of electronic locks, words of a few bytes are compared bit by bit. Other more or less complex digital processing methods can be used.
  • the device shown in FIGS. 1, 2 and 3 comprises a block 10 for receiving a key 12 with a trapezoidal section, a stop 14, a first arm 16 displaced by the end of the key and movable about an axis 18 , this arm being articulated on a second arm 20 LequeL cooperates with a toothed wheel 22 arming a spiral spring 24.
  • the arm 16 is in position 16 ′, the arm 18 in position 18 'and the wheel 22 escapes.
  • the spring 24 then controls the movement of a third arm 25 articulated on a fourth arm 26, pivoting about an axis 28 and the end of which carries a sensor 30 provided with a read tip 32.
  • the reassembly of the system corresponds at the angular displacement marked 31 in FIG. 2 and the Reading phase at the displacement marked 33.
  • the latter corresponds to a reading range 34 located on the upper face of the key, and in the form of an arc of a circle. But we can provide a system where the Reading range would be rectilinear.
  • the sensor 30 delivers an analog electrical signal which is applied to an electronic circuit 40. This circuit includes all or part of the processing means, which are illustrated in FIGS. 4 to 6.
  • FIG. 4 first of all, there is shown the general diagram of an installation implementing the invention.
  • a Reading block 50 connected to a microprocessor 52 by a link bus 54.
  • the block 50 is connected to an autorelay 56, which is connected to a relay 58 which is the control relay of the member 60, which is either an electric strike or a lock.
  • the assembly is connected to a general power supply 62.
  • the block 50 can also be connected to an alarm circuit 64, and to an interface 66 allowing possible connection with another lock of the same type.
  • FIG. 5 Such a card is represented functionally in FIG. 5. It comprises a microprocessor 70 (for example of the 6800 or 6809 type), a clock 72, a random access memory 74 (of the RAM type) comprising several memory locations, an address decoder 75, an analog-digital converter 76 connected to the sensor 30 of the Reader.
  • the data circulates on a bus 80, the addresses on a bus 82 and the control orders (write-read in memory and sampling-conversion) on a bus 84.
  • the microprocessor 70 is connected to an input-output circuit 90 which is connected by a connection 91 to the electric strike to be controlled (through relays - see Figure 4) by Connection 92 to a switch and by Connection 93 to other locks or various bodies.
  • the operation of this system is as follows.
  • the analog signal delivered by the sensor 30 is sampled and each sample is converted in digital by the converter 76.
  • the microprocessor 70 receives all of the digital signals read and has access to the various reference signals stored in 74. Using these two data, it performs a correlation and compares the result obtained to a degree correlation set in advance.
  • this diagram can give rise to various embodiments depending on the applications.
  • a version with autonomous power supply and a quiescent of the microprocessor can be provided.
  • the overall time for opening a lock after inserting a key is less than 3 s. for 10 keys and less than 9 s. for a number greater than ten keys.
  • the card which has just been described is suitable for communicating with any computer peripheral: im primante, keyboard, video screen, mass memory, etc ...

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Lock And Its Accessories (AREA)
  • Testing Of Coins (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Vehicle Body Suspensions (AREA)
  • Control Of Position, Course, Altitude, Or Attitude Of Moving Bodies (AREA)

Abstract

Surface texture reading access checking system. The identification information attached to each support object serving as a key is constituted by the texture of a surface portion of said object. A reader reads this information and communicates it to the processing means, which carry out a comparison between the signal read and recorded signals. Application to the production of locks or access checking means for data processing, telematic, banking and similar systems.

Description

La présente invention a pour objet un système de contrôle d'accès, c'est-à-dire un système permettant de déclencher une action équivalente à une autorisation après contrôle de l'identité d'un objet introduit dans ce système.The subject of the present invention is an access control system, that is to say a system making it possible to trigger an action equivalent to an authorization after checking the identity of an object introduced into this system.

D'une certaine manière, Le système de l'invention constitue un ensemble "clé-serrure" à condition de donner à ces termes un sens large : Le mot "clé" doit être entendu comme désignant un objet-support muni d'une identité et Le mot "serrure", un organe capable de reconnaître cette identité et de commander une action. Mais L'objet-support de L'invention ne prend pas nécessairement La forme traditionnelle d'une clé. Il peut se présenter sous une forme quelconque, notamment de carte. Quant à La fonction de "l'organe de commande", elle n'est pas nécessairement Limitée à l'action sur Le pêne d'une porte, mais peut correspondre à une autorisation d'accès à un système quelconque, informatique, télématique, bancaire, etc...In a certain way, The system of the invention constitutes a "key-lock" assembly provided that these terms are given a broad meaning: The word "key" must be understood as designating a support object provided with an identity and The word "lock", an organ capable of recognizing this identity and ordering an action. But the object object of the invention does not necessarily take the traditional form of a key. It can be in any form, including a card. As for the function of "the control unit", it is not necessarily limited to action on the bolt of a door, but may correspond to an authorization to access any system, IT, telematics, banking, etc ...

Quoi qu'il en soit, pour présenter l'originalité et les caractéristiques essentielles de l'invention, on s'appuiera sur La variante du système qui prend la forme d'un ensemble "clé-serrure" traditionnel, sans que cet exempte n'ait de caractère Limitatif.Anyway, to present the originality and the essential characteristics of the invention, we will rely on The variant of the system which takes the form of a traditional "key-lock" assembly, without this exemption n 'Limiting.

Le principe même de la serrurerie est de conférer à un objet portatif (la clé) une identité (un profil par exemple) et de réaliser un organe (la serrure) capable de reconnaître cette identité et de déclencher une action. Selon ce principe connu, la clé est un objet reproductible, pour des raisons évidentes qui tiennent à ce que plusieurs personnes devront posséder la même clé (les membres d'une même famille, d'une même société, etc...). Quant à la serrure, étant liée à une forme particulière donnée à une clé, elle ne peut coopérer qu'avec un seul type de clé.The very principle of locksmithing is to give an portable object (the key) an identity (a profile for example) and to make an organ (the lock) capable of recognizing this identity and triggering an action. According to this known principle, the key is a reproducible object, for obvious reasons which are due to the fact that several people will have to pos Sede the same key (members of the same family, the same society, etc ...). As for the lock, being linked to a particular shape given to a key, it can only cooperate with one type of key.

Récemment sont apparus des systèmes plus sophistiqués qu'on peut désigner par Le terme générique de "serrures électroniques". Dans ces systèmes, L'identité est traduite en un code écrit sur une piste magnétique ou optique, cette piste étant fixée sur une carte genre "carte de crédit". Mais La philosophie du système reste La même : chaque cLé (en L'occurrence chaque carte) est reproductible. Cependant, comme dans ces systèmes perfectionnés, l'information d'identité est de nature numérique et non plus mécanique, il est possible d'enregistrer plusieurs identités différentes dans une mémoire électronique. PLusieurs clés différentes sont alors capables d'ouvrir une même serrure. Ces clés peuvent être attribuées à différentes personnes habilitées. Mais elles peuvent aussi être utilisées par des services de maintenance ou de sécurité.Recently, more sophisticated systems have appeared which can be designated by the generic term of "electronic locks". In these systems, the identity is translated into a code written on a magnetic or optical track, this track being fixed on a card like "credit card". But the philosophy of the system remains the same: each key (in this case each card) is reproducible. However, as in these advanced systems, identity information is digital in nature and no longer mechanical, it is possible to store several different identities in an electronic memory. Several different keys are then able to open the same lock. These keys can be assigned to different authorized persons. But they can also be used by maintenance or security services.

Dans de tels systèmes, on écrit, dans une mémoire vive, plusieurs mots numériques qui servent en quelque sorte de référence ou de consigne et on écrit ces mêmes mots sur plusieurs cartes. Lorsque L'une de ces cartes est introduite dans un Lecteur de carte, Le code écrit sur La carte est détecté et Le signal numérique qui en résulte est comparé aux divers mots de consigne écrits dans La mémoire. Un comparateur détermine s'il y a coïncidence ou non entre Le mot lu. et l'un des mots mémorisés. Dans l'affirmative, un signal est émis pour La commande d'une action quelconque, par exemple L'ouverture d'une gâche.In such systems, several digital words are written into a random access memory which serve as a sort of reference or instruction and these same words are written on several cards. When one of these cards is inserted into a Card reader, the code written on the card is detected and the resulting digital signal is compared with the various reference words written in the memory. A comparator determines whether there is a coincidence or not between the word read. and one of the memorized words. If so, a signal is issued for the command of any action, for example the opening of a door release.

Un tel système est décrit par exemple dans Les documents de brevets français FR-A-2 107 529, FR-A-2 325 992, FR-A-2 457 524 et FR-A-2 533 340.Such a system is described for example in French patent documents FR-A-2 107 529, FR-A-2 325 992, FR-A-2 457 524 and FR-A-2 533 340.

Bien que satisfaisants à certains égards, ces systèmes présentent un inconvénient majeur Lié à l'absence de confidentialité du code porté par la carte. Il est en effet facile, pour un fraudeur un tant soit peut averti, de lire Le code inscrit sur une carte dérobée et de réécrire ce code sur une carte vierge. En d'autres termes, La duplication frauduleuse du support est un risque réel.Although satisfactory in certain respects, these systems have a major drawback linked to the lack of confidentiality of the code carried by the card. It is indeed easy, for a fraudster as much as can be warned, to read the code written on a stolen card and to rewrite this code on a blank card. In other words, fraudulent duplication of the medium is a real risk.

Le but de L'invention est de remédier à cet inconvénient. Ce but est atteint par l'utilisation d'une clé qui, par nature, n'est pas reproductible. Cette caractéristique est obtenue en choisissant, comme information capable de définir L'identité d'une clé, non plus une information fabriquée artificiellement (comme une denture ou une propriété magnétique ou optique d'une bande), mais une information naturelle qui est La texture de La surface d'une pièce. Cette information est d'une complexité telle qu'elle n'est pas reproductible. En outre, cette information est unique, car deux objets, même identiques au sens macroscopique, sont en réalité différents si l'on descend au niveau de leur texture de surface. Il va de soi que rien n'empêche d'ajouter à La texture naturelLe une texture artificielle (rayures, stries, marques, etc...).The object of the invention is to remedy this drawback. This goal is achieved by the use of a key which, by nature, is not reproducible. This characteristic is obtained by choosing, as information capable of defining the identity of a key, no longer an artificially manufactured information (such as a toothing or a magnetic or optical property of a strip), but a natural information which is the texture of the surface of a room. This information is so complex that it cannot be reproduced. In addition, this information is unique, because two objects, even identical in the macroscopic sense, are actually different if we go down to their surface texture. It goes without saying that nothing prevents adding an artificial texture to the natural texture (scratches, streaks, marks, etc.).

L'idée d'utiliser La texture d'une surface, comme moyen d'identification de certains objets, n'est pas nouvelle. L'articLe de B.C. D'Agraives et al. intitulé "Surface Topography, a remarkable method for the identification of seals or structure in general", publié dans "Proceedings of the 3rd Esarda Symposium on Safeguards and Nuclear Material Management", Karlsruhe, F.R. Germany", 6-8 May 1981, décrit déjà Les propriétés et L'intérêt des textures des surfaces. Cet enseignement est par ailleurs repris dans La demande de brevet britannique n° 2 097 979 publiée le 10 Novembre 1982, au nom de "European Atomic Energy Community (EURATOM)" et intitulée "UtiLization of surface textures as a random marking or unique identity".The idea of using the texture of a surface as a means of identifying certain objects is not new. The article by BC D'Agraives et al. entitled "Surface Topography, a remarkable method for the identification of seals or structure in general", published in "Proceedings of the 3rd Esarda Symposium on Safeguards and Nuclear Material Management", Karlsruhe, FR Germany ", 6-8 May 1981, already described The properties and interest of surface textures. This teaching is also taken up in La de British patent application no. 2,097,979 published on November 10, 1982, in the name of "European Atomic Energy Community (EURATOM)" and entitled "UtiLization of surface textures as a random marking or unique identity".

La présente invention reprend cette idée en L'appLiquant au domaine des systèmes de contrôle d'accès.The present invention takes up this idea by applying it to the field of access control systems.

Le choix de La texture de surface comme source d'information pour Le marquage d'une cLé va à L'encontre de tous les principes connus rappelés plus haut puisque, par nature, cette information n'est pas reproductible. Dès lors, La serrure ne peut plus, comme par Le passé, être conçue pour reconnaître une information définie à l'avance, puisqu'une texture est une grandeur quasiment aléatoire et, à ce titre, imprévisible. On ne peut donc plus charger La mémoire de La serrure avec une information prévue à L'avance comme pour Les systèmes antérieurs. Il faut rappeler, à ce sujet, que dans Les serrures électroniques classiques, et comme décrit en particulier dans Le document FR-A-2 325 992 cité plus haut, Le chargement s'effectue à L'aide d'une carte spéciale qui comprend des informations de programmation de La serrure. Ces informations consistent en des Listes de codes devant être admis et des Listes de codes devant être refusés. Cette carte de programmation est introduite dans Le lecteur, qui L'identifie comme telle, et elle est conçue pour modifier La Liste des codes mémorisés.The choice of surface texture as a source of information for marking a key goes against all the known principles mentioned above since, by nature, this information is not reproducible. Consequently, The lock can no longer, as in the past, be designed to recognize information defined in advance, since a texture is an almost random size and, as such, unpredictable. It is therefore no longer possible to load the memory of the lock with information provided in advance as for the previous systems. It should be remembered, in this regard, that in conventional electronic locks, and as described in particular in the document FR-A-2 325 992 cited above, the loading is carried out using a special card which includes Programming information for The lock. This information consists of Code Lists which must be admitted and Code Lists which must be refused. This programming card is introduced into the reader, which identifies it as such, and it is designed to modify the list of memorized codes.

Ce système connu présente encore un risque de fraude, car il est possible de falsifier une carte de programmation en Lui conférant des codes contrefaits. Dès lors La serrure pourrait être commandée par des cartes portant ces codes contrefaits.This known system still presents a risk of fraud, since it is possible to falsify a programming card by conferring counterfeit codes on it. From then on, the lock could be ordered by cards bearing these counterfeit codes.

Le choix de La texture de surface comme moyen d'identification oblige à modifier La procédure de chargement des informations autorisées, de manière telle qu'il est impossible de contrefaire celles-ci. A cette fin, La serrure de L'invention, qui est munie, comme les serrures électroniques, de différents emplacements mémoire est telle que ces emplacements ne peuvent recevoir l'information de consigne que par lecture des clés habilitées à ouvrir La serrure. Autrement dit, on n'écrit plus dans La mémoire de La serrure une information qu'on a écrit sur un support. Selon l'invention on procède de manière inverse : des clés sont d'abord fabriquées avec une texture quelconque et les serrures sont ensuite conditionnées, a posteriori, en fonction desdites clés.The choice of surface texture as a means of identification requires modification of the procedure. loading authorized information in such a way that it is impossible to counterfeit it. To this end, the lock of the invention, which is provided, like electronic locks, with different memory locations is such that these locations can only receive the setpoint information by reading the keys authorized to open the lock. In other words, we no longer write in The memory of The lock information that we wrote on a medium. According to the invention, the procedure is the opposite: keys are first manufactured with any texture and the locks are then conditioned, a posteriori, according to said keys.

On observera accessoirement que, dans l'invention, La grandeur servant à l'identification de La clé est une grandeur analogique continue et non une valeur numérique. On pourra donc éventuellement procéder en analogique pour l'opération de comparaison entre La grandeur de consigne et la grandeur Lue. Mais naturellement, il sera souvent préférable de convertir le signal analogique en numérique et de procéder ensuite par traitement numérique.It will be observed incidentally that, in the invention, the quantity used for the identification of the key is a continuous analog quantity and not a digital value. It will therefore be possible to proceed analogically for the comparison operation between the setpoint quantity and the quantity read. But of course, it will often be better to convert the analog signal to digital and then proceed with digital processing.

Une autre originalité de la serrure de l'invention est que le moyen chargé de lire l'inforamtion contenue dans Le support qui Lui est présenté est un lecteur de texture et non plus un Lecteur magnétique.Another originality of the lock of the invention is that the means responsible for reading the information contained in the support which is presented to it is a texture reader and no longer a magnetic reader.

Il faut observer que ces avantages du système de l'invention ne sont pas acquis au détriment des possibilités des systèmes électroniques classiques qui sont entièrement conservées : validation temporaire d'une clé, gestion centralisée d'un ensemble de serrures, comptabilisation du nombre d'interventions d'une clé particulière, etc...It should be noted that these advantages of the system of the invention are not acquired at the expense of the possibilities of conventional electronic systems which are entirely preserved: temporary validation of a key, centralized management of a set of locks, accounting for the number of interventions of a particular key, etc ...

De façon très générale, la présente invention peut donc se définir comme suit. Il s'agit d'un système de contrôle d'accès permettant de déclencher une action après contrôle de l'identité d'un objet-support introduit dans ce système et portant une information d'identification, ce système comprenant de manié- re connue :

  • - un lecteur apte à recevoir un tel objet-support et à lire l'information propre à cet objet-support,
  • - un organe de mémorisation comprenant plusieurs emplacements mémoire chargés par des informations de consigne correspondant à un ensemble d'objets-support habilités,
  • - un moyen de comparaison entre, d'une part, le signal délivré par Le Lecteur Lorsqu'un objet-support quelconque est introduit dans Le poste et, d'autre part, chacune des informations mémorisées dans Les emplacements mémoire, ce moyen de comparaison déterminant Le degré de coincidence entre L'information correspondant à l'objet-support introduit dans Le Lecteur et l'une des informations contenues dans Les emplacements mémoire de l'organe de mémorisation, et
  • - un circuit relié au circuit de comparaison et délivrant, Lorsque Le degré de coincidence est suffisant, un signal qui constitue un signal de déclenchement d'une action,
    ce système étant caractérisé par le fait que l'information d'identification attachée à chaque objet-support est constituée par la texture d'une portion de surface de cet objet-support, le lecteur étant alors un lecteur de texture de surface, le chargement d'une information de consigne s'effectuant par introduction d'un objet-support habilité dans Le Lecteur, Lecture de cet objet-support et mémorisation du signal Lu dans un des emplacements en question.
Very generally, the present invention can therefore be defined as follows. It is a access control system making it possible to trigger an action after checking the identity of a support object introduced into this system and carrying identification information, this system comprising in known manner:
  • - a reader capable of receiving such a support object and of reading the information specific to this support object,
  • a storage unit comprising several memory locations loaded with setpoint information corresponding to a set of authorized support objects,
  • a means of comparison between, on the one hand, the signal delivered by the reader when any support object is introduced into the station and, on the other hand, each of the information stored in the memory locations, this means of comparison determining the degree of coincidence between the information corresponding to the support object introduced in the reader and one of the information contained in the memory locations of the storage device, and
  • a circuit connected to the comparison circuit and delivering, when the degree of coincidence is sufficient, a signal which constitutes a signal for triggering an action,
    this system being characterized by the fact that the identification information attached to each support object is constituted by the texture of a surface portion of this support object, the reader then being a reader of surface texture, the loading setpoint information carried out by introducing a support object authorized in The Reader, Reading this support object and memorizing the signal Read in one of the locations in question.

SeLon un premier mode de réalisation, chaque objet-support présente La forme d'une clé avec une tête apte à être saisie manuellement et un corps présentant au moins une partie plane où est prise la portion de surface dont la texture est lue.According to a first embodiment, each support object present The shape of a key with a head capable of being entered manually and a body having at least one flat part from which the surface portion is taken, the texture of which is read.

Selon une variante avantageuse, Le corps de la clé est métallique et de préférence en alliage, ce qui confère à la texture une complexité particulière.According to an advantageous variant, the body of the key is metallic and preferably of alloy, which gives the texture a particular complexity.

Selon un autre mode de réalisation, chaque objet-support présente la forme d'une carte dont une partie de La surface est utilisée pour une lecture de texture. Cette carte peut être en matière plastique souple.According to another embodiment, each support object has the shape of a map, part of the surface of which is used for reading a texture. This card can be made of flexible plastic.

Selon encore un autre mode de réalisation, La clé peut présenter une forme cylindrique avec une lecture soit rotative le long de La circonférence, soit rectiligne selon une génératrice. La clé peut présenter un aspect tubulaire, La Lecture s'effectuant à L'extérieur ou à L'intérieur du tube.According to yet another embodiment, the key can have a cylindrical shape with a reading either rotatable along the circumference, or rectilinear according to a generatrix. The key may have a tubular appearance, the reading taking place outside or inside the tube.

Selon encore un autre mode de réalisation, La clé peut consister en un objet usuel comme un stylo.According to yet another embodiment, the key can consist of a usual object such as a pen.

Quant au lecteur, il comprend un bloc de réception de l'objet-support, un transducteur apte à traduire le relief de La clé en signal électrique (par exemple une pointe piézoélectrique), ce transducteur étant disposé sur un bras et un moyen de déplacement relatif du bras et de L'objet-support Le long d'une portion de surface de celui-ci. Dans une variante avantageuse, le bras est relié à un moyen de déplacement qui est mis en mouvement lorsque Le support est immobilisé dans le bloc de réception. Ce moyen de déplacement du bras peut être un mouvement d'horlogerie relié à un bras d'armement dont une extrémité est déplacée par l'introduction de L'objet support dans le bloc de réception. Mais ce moyen de déplacement du bras peut être également un moteur électrique.As for the reader, it comprises a block for receiving the support object, a transducer capable of translating the relief of the key into an electrical signal (for example a piezoelectric tip), this transducer being arranged on an arm and a means of movement. relative of the arm and of the support object Along a portion of the surface thereof. In an advantageous variant, the arm is connected to a displacement means which is set in motion when the support is immobilized in the receiving block. This means of movement of the arm can be a clockwork movement connected to an arming arm, one end of which is moved by the introduction of the support object into the receiving block. However, this means of moving the arm can also be an electric motor.

Selon un autre mode de réalisation, la pointe de lecture est immobile et La lecture de La texture de l'objet-support s'effectue pendant l'introduction de celui-ci dans Le bloc de réception.According to another embodiment, the reading tip is stationary and the reading of the texture of the support object is carried out during the introduction of the latter into the reception block.

Mais dans un autre mode de réalisation, La Lecture peut s'effectuer pendant le retrait de La clé du bloc de réception.But in another embodiment, the reading can be carried out during the withdrawal of the key from the reception block.

En ce qui concerne Le circuit de comparaison, il est constitué de préférence par un corrélateur suivi d'un circuit à seuil. L'utilisation d'un corrélateur est ici particulièrement utile du fait que le signal de mesure est de caractère analogique et qu'il est échantillonné en un grand nombre de points, par exemple 512 ou 1024 ou plus. La comparaison entre Le signal lu et le signal de consigne peut donc faire appel à La technique de la corrélation, alors que dans l'art antérieur des serrures électroniques, on compare bit à bit des mots de quelques octets. D'autres méthodes de traitement numériques plus ou moins complexes peuvent être utilisées.As regards the comparison circuit, it preferably consists of a correlator followed by a threshold circuit. The use of a correlator is particularly useful here because the measurement signal is of analog character and that it is sampled at a large number of points, for example 512 or 1024 or more. The comparison between the signal read and the reference signal can therefore call upon the technique of correlation, whereas in the prior art of electronic locks, words of a few bytes are compared bit by bit. Other more or less complex digital processing methods can be used.

De toute façon Les caractéristiques de l'invention apparaîtront mieux après la description qui suit, d'un exemple de réalisation donné à titre explicatif et nullement limitatif. Cette description se réfère à des dessins annexés sur lesquels :

  • - La figure 1 est un schéma du bloc de lecture de la clé,
  • - La figure 2 montre un détail du mécanisme d'armement du système d'horloge,
  • - La figure 3 est une coupe schématique au niveau de La pointe de lecture,
  • - La figure 4 est un schéma synoptique d'une installation conforme à L'invention,
  • - La figure 5 est un schéma d'une carte électronique,
  • - la figure 6 est un organigramme simplifié illustrant le programme de base mis en oeuvre.
In any case, the characteristics of the invention will appear better after the description which follows, of an exemplary embodiment given by way of explanation and in no way limiting. This description refers to attached drawings in which:
  • - Figure 1 is a diagram of the key reading block,
  • - Figure 2 shows a detail of the arming mechanism of the clock system,
  • FIG. 3 is a diagrammatic section at the level of the reading tip,
  • FIG. 4 is a block diagram of an installation in accordance with the invention,
  • FIG. 5 is a diagram of an electronic card,
  • - Figure 6 is a simplified flowchart illustrating the basic program implemented.

La description qui suit, et notamment celle qui se réfère aux figures 1 à 3, se place dans Le cas particulier d'un objet-support en forme de barreau métallique lu par une pointe piézoélectrique disposée à l'extrémité d'un bras animé par un mouvement d'horlogerie. Mais, comme indiqué plus haut, d'autres modes de réalisation sont possibles.The description which follows, and in particular that which refers to FIGS. 1 to 3, takes place in the particular case of a support object in the form of a metal bar read by a piezoelectric point arranged at the end of an arm driven by a watch movement. However, as indicated above, other embodiments are possible.

D'une façon générale, Le lecteur peut utiliser tous les capteurs de texture connus, LesqueLs ont fait l'objet de normes, notamment La norme française NF-E-05-050 de décembre 1970, intitulée "Etat de surface des produits - GénéraLités sur les appareils électroniques à capteur".In general, the reader can use all known texture sensors, LesqueLs have been the subject of standards, in particular French standard NF-E-05-050 of December 1970, entitled "Surface condition of products - General on electronic devices with sensors ".

Le dispositif représenté sur les figures 1, 2 et 3 comprend un bloc de réception 10 d'une clé 12 à section trapézoïdale, une butée 14, un premier bras 16 déplacé par l'extrémité de La clé et mobile autour d'un axe 18, ce bras étant articulé sur un second bras 20 LequeL coopère avec une roue dentée 22 armant un ressort spirale 24. Lorsque La clé 12 vient en butée sur 14 (voir figure 2), Le bras 16 est eh position 16', Le bras 18 en position 18' et La roue 22 échappe. Le ressort 24 commande alors le déplacement d'un troisième bras 25 articulé sur un quatrième bras 26, pivotant autour d'un axe 28 et dont l'extrémité porte un capteur 30 muni d'une pointe de lecture 32. Le remontage du système correspond au déplacement angulaire marqué 31 sur la figure 2 et La phase de Lecture au déplacement marqué 33. Cette dernière correspond à une plage de lecture 34 située sur la face supérieure de la clé, et en forme d'arc de cercle. Mais on peut prévoir un système ou la plage de Lecture serait rectiligne. Le capteur 30 délivre un signal électrique analogique qui est appliqué à un circuit électronique 40. Ce circuit comprend tout ou partie des moyens de traitement, lesquels sont illustrés sur Les figures 4 à 6.The device shown in FIGS. 1, 2 and 3 comprises a block 10 for receiving a key 12 with a trapezoidal section, a stop 14, a first arm 16 displaced by the end of the key and movable about an axis 18 , this arm being articulated on a second arm 20 LequeL cooperates with a toothed wheel 22 arming a spiral spring 24. When the key 12 comes into abutment on 14 (see FIG. 2), the arm 16 is in position 16 ′, the arm 18 in position 18 'and the wheel 22 escapes. The spring 24 then controls the movement of a third arm 25 articulated on a fourth arm 26, pivoting about an axis 28 and the end of which carries a sensor 30 provided with a read tip 32. The reassembly of the system corresponds at the angular displacement marked 31 in FIG. 2 and the Reading phase at the displacement marked 33. The latter corresponds to a reading range 34 located on the upper face of the key, and in the form of an arc of a circle. But we can provide a system where the Reading range would be rectilinear. The sensor 30 delivers an analog electrical signal which is applied to an electronic circuit 40. This circuit includes all or part of the processing means, which are illustrated in FIGS. 4 to 6.

Sur la figure 4, tout d'abord, est représenté le schéma général d'une installation mettant en oeuvre L'invention. On y trouve un bloc de Lecture 50 relié à un microprocesseur 52 par un bus de liaison 54. Le bloc 50 est relié à un autorelais 56, lequel est connecté à un relais 58 qui est le relais de commande de l'organe 60, qui est soit une gâche électrique soit un verrou. L'ensemble est relié à une alimentation générale 62. Le bloc 50 peut également être relié à un circuit d'alarme 64, et à une interface 66 permettant la liaison éventuelle avec une autre serrure du même type.In FIG. 4, first of all, there is shown the general diagram of an installation implementing the invention. There is a Reading block 50 connected to a microprocessor 52 by a link bus 54. The block 50 is connected to an autorelay 56, which is connected to a relay 58 which is the control relay of the member 60, which is either an electric strike or a lock. The assembly is connected to a general power supply 62. The block 50 can also be connected to an alarm circuit 64, and to an interface 66 allowing possible connection with another lock of the same type.

En pratique, l'essentiel des moyens de traitement est rassemblé sur une carte électronique, bien que, dans certaines applications, on puisse centraliser La totalité des traitements concernant une famille de serrures, dans un microcalculateur conçu à cet effet. Une telle carte est représentée fonctionnellement sur La figure 5. Elle comprend-un microprocesseur 70 (par exemple de type 6800 ou 6809), une horloge 72, une mémoire vive 74 (de type RAM) comprenant plusieurs emplacements mémoire, un décodeur d'adresse 75, un convertisseur analogique-numérique 76 relié au capteur 30 du Lecteur. Les données circulent sur un bus 80, Les adresses sur un bus 82 et les ordres de commande (écriture-lecture en mémoire et échantillonnage-conversion) sur un bus 84. Le microprocesseur 70 est relié à un circuit d'entrée-sortie 90 lequel est relié par une connexion 91 à La gâche électrique à commander (à travers des relais - cf figure 4) par La connexion 92 à un interrupteur et par La connexion 93 à d'autres serrures ou organes divers.In practice, most of the processing means are collected on an electronic card, although in certain applications, it is possible to centralize all the processing operations relating to a family of locks, in a microcomputer designed for this purpose. Such a card is represented functionally in FIG. 5. It comprises a microprocessor 70 (for example of the 6800 or 6809 type), a clock 72, a random access memory 74 (of the RAM type) comprising several memory locations, an address decoder 75, an analog-digital converter 76 connected to the sensor 30 of the Reader. The data circulates on a bus 80, the addresses on a bus 82 and the control orders (write-read in memory and sampling-conversion) on a bus 84. The microprocessor 70 is connected to an input-output circuit 90 which is connected by a connection 91 to the electric strike to be controlled (through relays - see Figure 4) by Connection 92 to a switch and by Connection 93 to other locks or various bodies.

Le fonctionnement de ce système est Le suivant. Le signal analogique délivré par Le capteur 30 est échantillonné et-chaque échantillon est converti en numérique par Le convertisseur 76. Le microprocesseur 70 reçoit La totalité des signaux numériques lus et a accès aux divers signaux de consigne mémorisés dans 74. A l'aide de ces deux données, il effectue une corrélation et compare Le résultat obtenu à un degré de corrélation fixé à l'avance.The operation of this system is as follows. The analog signal delivered by the sensor 30 is sampled and each sample is converted in digital by the converter 76. The microprocessor 70 receives all of the digital signals read and has access to the various reference signals stored in 74. Using these two data, it performs a correlation and compares the result obtained to a degree correlation set in advance.

Le microprocesseur 70 assure également d'autres fonctions :

  • - déclenchement d'un signal en cas d'effraction du boîtier ou d'organes de surveillance avec effacement de toutes Les mémoires, ce qui interdit La commande d'ouverture informatique et électrique,
  • - gestion du calendrier, des priorités, des interdictions,
  • - contrôle de présence.
The microprocessor 70 also performs other functions:
  • - triggering of a signal in the event of a breach of the box or of monitoring devices with erasure of all memories, which prohibits the computer and electrical opening command,
  • - management of the calendar, priorities, prohibitions,
  • - presence control.

Ces fonctions peuvent être remplies soit par des circuits électroniques câblés, soit par programme informatique.These functions can be performed either by wired electronic circuits or by computer program.

Naturellement, ce schéma peut donner Lieu à divers modes de réalisation selon les applications. IL peut être prévu une version avec alimentation autonome et une mise au repos du microprocesseur. On peut aussi disposer une partie de La mémoire vive dans un boîtier annexe situé à l'extérieur de la serrure ainsi qu'un microprocesseur supplémentaire faisant office de gestion centrale dans Le cas d'un nombre élevé de clefs ou de Lecteurs. La mémoire contenue dans chaque lecteur sert alors de tampon, en attente de disponibilité de L'unité centrale.Naturally, this diagram can give rise to various embodiments depending on the applications. A version with autonomous power supply and a quiescent of the microprocessor can be provided. One can also have part of the RAM in an annex box located outside the lock as well as an additional microprocessor acting as central management in the case of a high number of keys or readers. The memory contained in each reader then serves as a buffer, pending availability of the central unit.

Selon les mesures effectuées par les inventeurs, le temps global d'ouverture d'une serrure après introduction d'une clé est inférieur à 3 s. pour 10 clés et inférieur à 9 s. pour un nombre supérieur à une dizaine de clés.According to the measurements made by the inventors, the overall time for opening a lock after inserting a key is less than 3 s. for 10 keys and less than 9 s. for a number greater than ten keys.

La carte qui vient d'être décrite est apte à communiquer avec tout périphérique informatique : imprimante, clavier, écran vidéo, mémoire de masse, etc...The card which has just been described is suitable for communicating with any computer peripheral: im primante, keyboard, video screen, mass memory, etc ...

L'organigramme simplifié d'un programme de base pour La mise en oeuvre de ces moyens de traitement, est illustré sur La figure 6, où Les différentes opérations du programme ont La signification suivante :

  • 100 : Début du programme.
  • 101 : Introduction du programme et chargement des mémoires.
  • 102 : ContrôLe des circuits de surveillance et d'horloge.
  • 103 : Alarme.
  • 104 : Introduction de la clé.
  • 105 : Demande d'interruption.
  • 106 : Lecture de la clé.
  • 107 : Enregistrement et comparaison.
  • 108 : Traitement du résultat.
  • 109 : Décision d'ouverture.
  • 110 : Alarme
  • 111 : Retour au circuit de surveillance.
The simplified flowchart of a basic program for the implementation of these processing means is illustrated in FIG. 6, where the different operations of the program have the following meaning:
  • 100: Start of the program.
  • 101: Program introduction and memory loading.
  • 102: Control of the monitoring and clock circuits.
  • 103: Alarm.
  • 104: Key introduction.
  • 105: Request for interruption.
  • 106: Reading the key.
  • 107: Registration and comparison.
  • 108: Processing of the result.
  • 109: Opening decision.
  • 110: Alarm
  • 111: Return to the monitoring circuit.

Claims (13)

1. Système de contrôle d'accès permettant de déclencher une action après contrôle de l'identité d'un objet-support introduit dans ce système et portant une information d'identification, ce système comprenant de manière connue : - un Lecteur (30) apte à recevoir un tel objet-support (32) et à lire L'information propre à cet objet-support, - un organe de mémorisation (74) comprenant plusieurs emplacements mémoire chargés par des informations de consigne correspondant à un ensemble d'objets-support habiLités, - un moyen de comparaison (70) entre, d'une part, Le signal délivré par Le Lecteur (30) Lorsqu'un objet-support (12) quelconque est introduit dans Le système et, d'autre part, chacune des informations mémorisées dans Les emplacements mémoire (74), ce moyen de comparaison déterminant Le degré de coïncidence entre l'information correspondant à L'objet-support introduit dans Le Lecteur et l'une des informations contenues dans Les emplacements mémoire de L'organe de mémorisation, et - un circuit (70) relié au circuit de comparaison et délivrant, Lorsque le degré de coïncidence est suffisant un signal qui constitue un signal de déclenchement d'une action,
ce système étant caractérisé par Le fait que l'information d'identification attachée à chaque objet-support est constituée par La texture d'une portion de surface (34) de cet objet-support (12), Le Lecteur étant alors un lecteur de texture de surface (30, 32), Le chargement d'une information de consigne s'effectuant par introduction d'un objet-support habilité dans Le lecteur, Lecture de cet objet-support et mémorisation du signal lu dans un des emplacements en question (74).
1. Access control system making it possible to trigger an action after checking the identity of a support object introduced into this system and carrying identification information, this system comprising in known manner: - a Reader (30) capable of receiving such a support object (32) and of reading the information specific to this support object, a storage member (74) comprising several memory locations loaded with setpoint information corresponding to a set of enabled support objects, a means of comparison (70) between, on the one hand, the signal delivered by the reader (30) when any support object (12) is introduced into the system and, on the other hand, each of the stored information in the memory locations (74), this means of comparison determining the degree of coincidence between the information corresponding to the support object introduced in the reader and one of the information contained in the memory locations of the storage device, and a circuit (70) connected to the comparison circuit and delivering, when the degree of coincidence is sufficient, a signal which constitutes a signal for triggering an action,
this system being characterized by the fact that the identification information attached to each support object is constituted by the texture of a surface portion (34) of this support object (12), the reader then being a reader of surface texture (30, 32), Loading of setpoint information is done killing by introduction of an object-support authorized in the Reader, Reading of this object-support and memorization of the signal read in one of the places in question (74).
2. Système selon la revendication 1, caractérisé en ce que chaque objet-support présente La forme d'une clé (12) avec une tête apte à être saisie manuellement et un corps présentant au moins une partie plane où est prise La portion de surface (34) dont La texture est lue.2. System according to claim 1, characterized in that each support object has the form of a key (12) with a head capable of being grasped manually and a body having at least one flat part from which the surface portion is taken. (34) whose texture is read. 3. Système de commande selon la revendication 2, caractérisé par le fait que Le corps de La clé est métallique.3. Control system according to claim 2, characterized in that the body of the key is metallic. 4. Système de commande selon la revendication 3, caractérisé par le fait que le corps de la clé est en alliage.4. Control system according to claim 3, characterized in that the body of the key is made of alloy. 5. Système de commande selon la revendication 1, caractérisé par le fait que chaque objet-support présente La forme d'une carte dont une partie de La surface est utilisée pour une lecture de texture.5. Control system according to claim 1, characterized in that each support object has the form of a card, part of the surface of which is used for a texture reading. 6. Système selon La revendication 1, caractérisé par le fait que le Lecteur comprend un bloc de réception (10) de L'objet-support (12) une pointe piézoélectrique (32) disposée sur un bras (26), un moyen de déplacement relatif du bras et de L'objet-support Le long d'une portion de surface (34) de celui-ci.6. System according to claim 1, characterized in that the reader comprises a receiving block (10) of the support object (12) a piezoelectric tip (32) disposed on an arm (26), a displacement means relative of the arm and of the support object Along a surface portion (34) thereof. 7. Système selon la revendication 6, caractérisé par le fait que le bras (26) est relié à un moyen de déplacement (22, 24) qui est mis en mouvement lorsque le support est en butée (14) dans Le bloc de réception (10).7. System according to claim 6, characterized in that the arm (26) is connected to a displacement means (22, 24) which is set in motion when the support is in abutment (14) in the receiving block ( 10). 8. Système selon La revendication 7, caractérisé par Le fait que le moyen de déplacement du bras est un mouvement d'horlogerie (22, 24) relié à un bras d'armement (16, 8) dont une extrémité est déplacée par L'introduction de L'objet-support (12) dans le bloc de réception (10).8. System according to claim 7, characterized in that the means for moving the arm is a clockwork movement (22, 24) connected to an arm arming (16, 8) one end of which is moved by the introduction of the object-support (12) in the receiving block (10). 9. Système selon la revendication 7, caractérisé par le fait que le moyen de déplacement du bras est un moteur électrique.9. System according to claim 7, characterized in that the means for moving the arm is an electric motor. 10. Système selon La revendication 6, caractérisé par Le fait que La pointe piézoélectrique (32) est immobile et que la lecture de la texture de l'objet-support (12) s'effectue pendant l'introduction de celui-ci dans le bloc de réception (10).10. System according to claim 6, characterized in that the piezoelectric tip (32) is stationary and that the texture of the support object (12) is read during the introduction of the latter into the receiving block (10). 11. Système selon la revendication 1, caractérisé par le fait que le lecteur comprend un convertisseur analogique-numérique (76), le signal délivré par Le Lecteur étant alors numérique.11. System according to claim 1, characterized in that the reader comprises an analog-digital converter (76), the signal delivered by the reader then being digital. 12. Système selon La revendication 1, caractérisé par Le fait que le circuit de traitement comprend un microprocesseur (70).12. System according to claim 1, characterized in that the processing circuit comprises a microprocessor (70). 13. Système selon La revendication 12, caractérisé par Le fait que Le microprocesseur (70) effectue une corrélation entre Le signal lu et les signaux de consigne.13. System according to claim 12, characterized in that the microprocessor (70) performs a correlation between the signal read and the setpoint signals.
EP85401498A 1984-07-23 1985-07-19 Access-control method and system involving the sensing of the texture of a surface Expired EP0172765B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AT85401498T ATE47458T1 (en) 1984-07-23 1985-07-19 ACCESS CONTROL METHOD AND SYSTEM BASED ON THE FEATURE OF A SURFACE STRUCTURE.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR8411643A FR2567947B1 (en) 1984-07-23 1984-07-23 SURFACE TEXTURE READING ACCESS CONTROL SYSTEM
FR8411643 1984-07-23

Publications (2)

Publication Number Publication Date
EP0172765A1 true EP0172765A1 (en) 1986-02-26
EP0172765B1 EP0172765B1 (en) 1989-10-18

Family

ID=9306384

Family Applications (1)

Application Number Title Priority Date Filing Date
EP85401498A Expired EP0172765B1 (en) 1984-07-23 1985-07-19 Access-control method and system involving the sensing of the texture of a surface

Country Status (6)

Country Link
US (2) US4677435A (en)
EP (1) EP0172765B1 (en)
AT (1) ATE47458T1 (en)
CA (1) CA1235779A (en)
DE (1) DE3573819D1 (en)
FR (1) FR2567947B1 (en)

Families Citing this family (107)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8612467D0 (en) * 1986-05-22 1986-07-02 Unisafe Ltd Electronic locking devices
US5218528A (en) * 1990-11-06 1993-06-08 Advanced Technological Systems, Inc. Automated voting system
US5721788A (en) * 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
US6944298B1 (en) 1993-11-18 2005-09-13 Digimare Corporation Steganographic encoding and decoding of auxiliary codes in media signals
US6983051B1 (en) 1993-11-18 2006-01-03 Digimarc Corporation Methods for audio watermarking and decoding
US5768426A (en) * 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals
US6516079B1 (en) 2000-02-14 2003-02-04 Digimarc Corporation Digital watermark screening and detecting strategies
US5748763A (en) 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
US6449377B1 (en) * 1995-05-08 2002-09-10 Digimarc Corporation Methods and systems for watermark processing of line art images
US7044395B1 (en) 1993-11-18 2006-05-16 Digimarc Corporation Embedding and reading imperceptible codes on objects
US6345104B1 (en) * 1994-03-17 2002-02-05 Digimarc Corporation Digital watermarks and methods for security documents
US5822436A (en) * 1996-04-25 1998-10-13 Digimarc Corporation Photographic products and methods employing embedded information
US5636292C1 (en) * 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US5862260A (en) * 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
ES2236999T3 (en) * 1993-11-18 2005-07-16 Digimarc Corporation VIDEO WITH HIDDEN DIGITAL INFORMATION ON BAND.
USRE40919E1 (en) * 1993-11-18 2009-09-22 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
US5841886A (en) * 1993-11-18 1998-11-24 Digimarc Corporation Security system for photographic identification
US6408082B1 (en) 1996-04-25 2002-06-18 Digimarc Corporation Watermark detection using a fourier mellin transform
US5710834A (en) * 1995-05-08 1998-01-20 Digimarc Corporation Method and apparatus responsive to a code signal conveyed through a graphic image
US6614914B1 (en) 1995-05-08 2003-09-02 Digimarc Corporation Watermark embedder and reader
US5748783A (en) * 1995-05-08 1998-05-05 Digimarc Corporation Method and apparatus for robust information coding
US5832119C1 (en) * 1993-11-18 2002-03-05 Digimarc Corp Methods for controlling systems using control signals embedded in empirical data
US6580819B1 (en) 1993-11-18 2003-06-17 Digimarc Corporation Methods of producing security documents having digitally encoded data and documents employing same
US6424725B1 (en) 1996-05-16 2002-07-23 Digimarc Corporation Determining transformations of media signals with embedded code signals
US7171016B1 (en) 1993-11-18 2007-01-30 Digimarc Corporation Method for monitoring internet dissemination of image, video and/or audio files
US5841978A (en) 1993-11-18 1998-11-24 Digimarc Corporation Network linking method using steganographically embedded data objects
US6611607B1 (en) 1993-11-18 2003-08-26 Digimarc Corporation Integrating digital watermarks in multimedia content
US6122403A (en) 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US6968057B2 (en) * 1994-03-17 2005-11-22 Digimarc Corporation Emulsion products and imagery employing steganography
US7039214B2 (en) 1999-11-05 2006-05-02 Digimarc Corporation Embedding watermark components during separate printing stages
US6522770B1 (en) 1999-05-19 2003-02-18 Digimarc Corporation Management of documents and other objects using optical devices
US6869023B2 (en) 2002-02-12 2005-03-22 Digimarc Corporation Linking documents through digital watermarking
DE4422016C2 (en) * 1994-06-16 1996-08-01 Foerderung Angewandter Informa Procedure for the automatic verification of magnetic cards
EP0803846B1 (en) * 1994-10-19 2003-10-01 Hitachi, Ltd. Transaction-oriented electronic accommodation system
US6560349B1 (en) 1994-10-21 2003-05-06 Digimarc Corporation Audio monitoring using steganographic information
US7486799B2 (en) 1995-05-08 2009-02-03 Digimarc Corporation Methods for monitoring audio and images on the internet
US6721440B2 (en) 1995-05-08 2004-04-13 Digimarc Corporation Low visibility watermarks using an out-of-phase color
US6760463B2 (en) * 1995-05-08 2004-07-06 Digimarc Corporation Watermarking methods and media
US6728390B2 (en) 1995-05-08 2004-04-27 Digimarc Corporation Methods and systems using multiple watermarks
US6411725B1 (en) 1995-07-27 2002-06-25 Digimarc Corporation Watermark enabled video objects
US6965682B1 (en) 1999-05-19 2005-11-15 Digimarc Corp Data transmission by watermark proxy
US7006661B2 (en) * 1995-07-27 2006-02-28 Digimarc Corp Digital watermarking systems and methods
US6408331B1 (en) * 1995-07-27 2002-06-18 Digimarc Corporation Computer linking methods using encoded graphics
US6577746B1 (en) 1999-12-28 2003-06-10 Digimarc Corporation Watermark-based object linking and embedding
US6829368B2 (en) 2000-01-26 2004-12-07 Digimarc Corporation Establishing and interacting with on-line media collections using identifiers in media signals
US6788800B1 (en) 2000-07-25 2004-09-07 Digimarc Corporation Authenticating objects using embedded data
US6230971B1 (en) 1996-04-29 2001-05-15 Hitachi, Ltd. Transaction-oriented electronic accommodation system
US6381341B1 (en) 1996-05-16 2002-04-30 Digimarc Corporation Watermark encoding method exploiting biases inherent in original signal
US6850626B2 (en) 1998-01-20 2005-02-01 Digimarc Corporation Methods employing multiple watermarks
US7313253B2 (en) 1998-09-11 2007-12-25 Digimarc Corporation Methods and tangible objects employing machine readable data in photo-reactive materials
US7035428B1 (en) 1999-04-23 2006-04-25 The Escher Group, Ltd. Workpiece authentication based upon one or more workpiece images
US6584214B1 (en) 1999-04-23 2003-06-24 Massachusetts Institute Of Technology Identification and verification using complex, three-dimensional structural features
US7164413B2 (en) * 1999-05-19 2007-01-16 Digimarc Corporation Enhanced input peripheral
US6608919B1 (en) 1999-11-10 2003-08-19 Digimarc Corporation Method and apparatus for encoding paper with information
US6625297B1 (en) 2000-02-10 2003-09-23 Digimarc Corporation Self-orienting watermarks
US6804377B2 (en) 2000-04-19 2004-10-12 Digimarc Corporation Detecting information hidden out-of-phase in color channels
US7027614B2 (en) 2000-04-19 2006-04-11 Digimarc Corporation Hiding information to reduce or offset perceptible artifacts
PT1456810E (en) 2001-12-18 2011-07-25 L 1 Secure Credentialing Inc Multiple image security features for identification documents and methods of making same
US7793846B2 (en) 2001-12-24 2010-09-14 L-1 Secure Credentialing, Inc. Systems, compositions, and methods for full color laser engraving of ID documents
US7728048B2 (en) 2002-12-20 2010-06-01 L-1 Secure Credentialing, Inc. Increasing thermal conductivity of host polymer used with laser engraving methods and compositions
US7694887B2 (en) 2001-12-24 2010-04-13 L-1 Secure Credentialing, Inc. Optically variable personalized indicia for identification documents
AU2002364255A1 (en) 2001-12-24 2003-07-15 Digimarc Id Systems, Llc Covert variable information on id documents and methods of making same
US7824029B2 (en) 2002-05-10 2010-11-02 L-1 Secure Credentialing, Inc. Identification card printer-assembler for over the counter card issuing
US7045763B2 (en) * 2002-06-28 2006-05-16 Hewlett-Packard Development Company, L.P. Object-recognition lock
US7804982B2 (en) 2002-11-26 2010-09-28 L-1 Secure Credentialing, Inc. Systems and methods for managing and detecting fraud in image databases used with identification documents
US7712673B2 (en) 2002-12-18 2010-05-11 L-L Secure Credentialing, Inc. Identification document with three dimensional image of bearer
US7225991B2 (en) 2003-04-16 2007-06-05 Digimarc Corporation Three dimensional data storage
US7192208B2 (en) * 2003-09-02 2007-03-20 Futurelogic, Inc. Rewritable card printer
US7494414B2 (en) 2003-09-12 2009-02-24 Igt Gaming device having a card management system for the management of circulating data cards
US8057296B2 (en) 2003-09-12 2011-11-15 Igt Gaming device including a card processing assembly having vertically-stacked card holders operable with thermally-printable data cards and portable card changeover machines
US7744002B2 (en) 2004-03-11 2010-06-29 L-1 Secure Credentialing, Inc. Tamper evident adhesive and identification document including same
FR2870376B1 (en) * 2004-05-11 2006-09-22 Yann Boutant METHOD FOR RECOGNIZING FIBROUS MEDIA, AND APPLICATIONS OF SUCH A METHOD IN THE COMPUTER FIELD, IN PARTICULAR
US7667570B1 (en) 2004-05-19 2010-02-23 Lockheed Martin Corporation Nanostructured combination key-lock
WO2006064448A1 (en) * 2004-12-17 2006-06-22 Koninklijke Philips Electronics N.V. Optical identifier comprising randomly oriented partial faces
US7533062B2 (en) * 2005-05-27 2009-05-12 Pitney Bowes Inc. Method for creating self-authenticating documents
US8224018B2 (en) 2006-01-23 2012-07-17 Digimarc Corporation Sensing data from physical objects
JP5394071B2 (en) 2006-01-23 2014-01-22 ディジマーク コーポレイション Useful methods for physical goods
US8215553B2 (en) * 2006-11-15 2012-07-10 Digimarc Corporation Physical credentials and related methods
EP2637145B1 (en) 2007-04-24 2022-01-12 Sicpa Holding Sa Method of marking and identifying a document or item having circular polarizing particles
JP2010525343A (en) 2007-04-24 2010-07-22 シクパ・ホールディング・ソシエテ・アノニム Method for marking a document or item, method and apparatus for identifying a marked document or item, usage of circularly polarized particles
US8197334B2 (en) 2007-10-29 2012-06-12 Igt Circulating data card apparatus and management system
US8526743B1 (en) 2010-11-01 2013-09-03 Raf Technology, Inc. Defined data patterns for object handling
US9443298B2 (en) 2012-03-02 2016-09-13 Authentect, Inc. Digital fingerprinting object authentication and anti-counterfeiting system
US8774455B2 (en) 2011-03-02 2014-07-08 Raf Technology, Inc. Document fingerprinting
US9152862B2 (en) 2011-09-15 2015-10-06 Raf Technology, Inc. Object identification and inventory management
DE102011110478B4 (en) 2011-08-17 2018-07-26 Gottfried Wilhelm Leibniz Universität Hannover Method for recognizing a three-dimensional object, device and computer program therefor
US10037537B2 (en) 2016-02-19 2018-07-31 Alitheon, Inc. Personal history in track and trace system
EP3236401A1 (en) 2016-04-18 2017-10-25 Alitheon, Inc. Authentication-triggered processes
US10614302B2 (en) 2016-05-26 2020-04-07 Alitheon, Inc. Controlled authentication of physical objects
US10740767B2 (en) 2016-06-28 2020-08-11 Alitheon, Inc. Centralized databases storing digital fingerprints of objects for collaborative authentication
US10915612B2 (en) 2016-07-05 2021-02-09 Alitheon, Inc. Authenticated production
US10902540B2 (en) 2016-08-12 2021-01-26 Alitheon, Inc. Event-driven authentication of physical objects
US10839528B2 (en) 2016-08-19 2020-11-17 Alitheon, Inc. Authentication-based tracking
EP3435287A3 (en) 2017-07-25 2019-05-01 Alitheon, Inc. Model-based digital fingerprinting
US11087013B2 (en) 2018-01-22 2021-08-10 Alitheon, Inc. Secure digital fingerprint key object database
US10963670B2 (en) 2019-02-06 2021-03-30 Alitheon, Inc. Object change detection and measurement using digital fingerprints
EP3734506A1 (en) 2019-05-02 2020-11-04 Alitheon, Inc. Automated authentication region localization and capture
EP3736717A1 (en) 2019-05-10 2020-11-11 Alitheon, Inc. Loop chain digital fingerprint method and system
US11238146B2 (en) 2019-10-17 2022-02-01 Alitheon, Inc. Securing composite objects using digital fingerprints
EP3859603A1 (en) 2020-01-28 2021-08-04 Alitheon, Inc. Depth-based digital fingerprinting
EP3885984A1 (en) 2020-03-23 2021-09-29 Alitheon, Inc. Facial biometrics system and method of using digital fingerprints
US11341348B2 (en) 2020-03-23 2022-05-24 Alitheon, Inc. Hand biometrics system and method using digital fingerprints
EP3929806A3 (en) 2020-04-06 2022-03-09 Alitheon, Inc. Local encoding of intrinsic authentication data
US11663849B1 (en) 2020-04-23 2023-05-30 Alitheon, Inc. Transform pyramiding for fingerprint matching system and method
EP3916631A1 (en) 2020-05-28 2021-12-01 Alitheon, Inc. Irreversible digital fingerprints for preserving object security
US11700123B2 (en) 2020-06-17 2023-07-11 Alitheon, Inc. Asset-backed digital security tokens
CN114550382B (en) * 2022-01-26 2023-07-04 南京科融数据***股份有限公司 ATM cashbox management method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218674A (en) * 1975-09-09 1980-08-19 Dasy Inter S.A. Method and a system for verifying authenticity safe against forgery
GB2072390A (en) * 1980-03-24 1981-09-30 Winderlich Hans Georg Stockburger h method and device for identifying data supports

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3637990A (en) * 1969-10-31 1972-01-25 Jack E Bayha Credit card validator with transducer-readout
DE2144760A1 (en) * 1970-09-10 1972-03-16 Int Standard Electric Corp Magnetic card security system
US3984658A (en) * 1975-09-26 1976-10-05 Cannon John W Programmable card actuated lock
IT1101623B (en) * 1977-11-22 1985-10-07 Bsg Schalttechnik LOCK DEVICE TO AVOID UNAUTHORIZED ACCESS
FR2457524B1 (en) * 1979-05-23 1985-11-15 Chauvat & Sofranq Reunis CODED CARD DOOR FOR SELECTIVE DOOR OPENING
US4568936A (en) * 1980-06-23 1986-02-04 Light Signatures, Inc. Verification system for document substance and content
US4519228A (en) * 1981-04-01 1985-05-28 Trioving A/S Electronic recodeable lock
LU83333A1 (en) * 1981-05-04 1983-03-24 Euratom USE OF SURFACE TEXTURES AS A SINGLE IDENTITY MARK
FR2533340A1 (en) * 1982-09-17 1984-03-23 Chauvat & Sofranq Reunis Electronic lock with control by magnetic stripe card
US4721956A (en) * 1983-09-12 1988-01-26 Demster Stanley J Apparatus for converting key topography into electrical signals to effect key evaluation
FR2582129B1 (en) * 1985-02-21 1987-12-31 Despres Jean Albert METHOD FOR IDENTIFYING A VALUABLE OBJECT AND DEVICE FOR CARRYING OUT THIS METHOD

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218674A (en) * 1975-09-09 1980-08-19 Dasy Inter S.A. Method and a system for verifying authenticity safe against forgery
GB2072390A (en) * 1980-03-24 1981-09-30 Winderlich Hans Georg Stockburger h method and device for identifying data supports

Also Published As

Publication number Publication date
FR2567947B1 (en) 1986-12-26
USRE33553E (en) 1991-03-12
FR2567947A1 (en) 1986-01-24
ATE47458T1 (en) 1989-11-15
CA1235779A (en) 1988-04-26
US4677435A (en) 1987-06-30
EP0172765B1 (en) 1989-10-18
DE3573819D1 (en) 1989-11-23

Similar Documents

Publication Publication Date Title
EP0172765B1 (en) Access-control method and system involving the sensing of the texture of a surface
CA1164565A (en) Personalized portable object such as a credit card
EP0589755B1 (en) Game terminal
EP0389313B1 (en) Storage system comprising a set of adjacent lockers controlled by a micro-processor
EP0099762B1 (en) Coded remote control devices
CA2035161C (en) Transaction management method and device using microcircuit cards
FR2471632A1 (en) APPARATUS AND METHOD FOR ENCODING AND DECODING A CARD DELIVERED TO AN INDIVIDUAL BY AN ENTITY
LU87332A1 (en) TRAFFIC CONTROL SYSTEM FOR MOBILE COMPONENTS AND / OR MOVING PERSONS, THIS SYSTEM USING A FIXED STATION AND A PROGRAMMABLE COMPONENT CARRIED BY SUCH COMPONENTS AND / OR PERSONS
FR2624285A1 (en) CAR MANAGEMENT SYSTEM FOR PAID PARKING IN VEHICLES
FR2868459A1 (en) Panel/drawer locking device for showcase door, has electronic module to trigger time interval and to signal imminence of triggering of alarm device when finger`s presence is not detected so that user closes panel or reads electronic medium
EP0171323A1 (en) Operating and controlling system for a plurality of accesses equipped with coded locks
FR2642544A1 (en) Data processing system with a security program
FR2662285A1 (en) System for automatic and permanent provision of vehicles
WO1999035964A1 (en) Device for authenticating a person on the basis of his fingerprints
EP0536040B1 (en) Method for recording a new coded message, instead of a previous coded one recorded on a magnetic strip on a support document, by manual displacement of said document and system for carrying out this method
FR2473755A1 (en) Secure electronic data processing for card terminal transactions - using non-erasable memory data for identification and controlled access erasable memory for transaction recording
EP1012792B1 (en) Method and installation for producing a personalised user identification card which cannot be forged
FR2657793A1 (en) CENTRIFUGATION APPARATUS WITH REMOVABLE ROTOR AND MEANS OF IDENTIFYING ROTORS.
FR2766949A1 (en) SECURE MACHINE SYSTEM
FR2770316A1 (en) Secure contactless communication between terminal and card
NL9200439A (en) FRAUD RESISTANT DEVICE.
EP1214695A1 (en) Electronic card comprising in storage its bearer's identification
EP0391302B1 (en) System for the emptying, in a collector container, of a coin-receiving apparatus
FR2747813A1 (en) SECURE ACCESS CONTROL SYSTEM FOR AUTOMATIC INVALIDATION OF STOLEN OR LOST ELECTRONIC KEYS AND / OR TRANSFER OF AUTHORIZATION TO PRODUCE KEYS
FR2561703A1 (en) Access device with lock and coded key

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE GB IT LI LU NL SE

17P Request for examination filed

Effective date: 19860728

17Q First examination report despatched

Effective date: 19880426

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH DE GB IT LI LU NL SE

REF Corresponds to:

Ref document number: 47458

Country of ref document: AT

Date of ref document: 19891115

Kind code of ref document: T

REF Corresponds to:

Ref document number: 3573819

Country of ref document: DE

Date of ref document: 19891123

ITF It: translation for a ep patent filed

Owner name: JACOBACCI & PERANI S.P.A.

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed
ITTA It: last paid annual fee
EPTA Lu: last paid annual fee
EAL Se: european patent in force in sweden

Ref document number: 85401498.2

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 19990708

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 19990713

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: AT

Payment date: 19990714

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 19990715

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: LU

Payment date: 19990719

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 19990720

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 19990726

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 19990728

Year of fee payment: 15

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000719

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000719

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000719

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000720

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000731

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000731

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000731

BERE Be: lapsed

Owner name: ASSOCIATION POUR LA PROMOTION DE LA TECHNOLOGIE P

Effective date: 20000731

Owner name: COMMUNAUTE EUROPEENNE DE L'ENERGIE ATOMIQUE EURAT

Effective date: 20000731

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20010201

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20000719

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

EUG Se: european patent has lapsed

Ref document number: 85401498.2

NLV4 Nl: lapsed or anulled due to non-payment of the annual fee

Effective date: 20010201

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20010501