EP0443962B1 - Method and device for controlling and permitting access to a site or a service - Google Patents

Method and device for controlling and permitting access to a site or a service Download PDF

Info

Publication number
EP0443962B1
EP0443962B1 EP91420016A EP91420016A EP0443962B1 EP 0443962 B1 EP0443962 B1 EP 0443962B1 EP 91420016 A EP91420016 A EP 91420016A EP 91420016 A EP91420016 A EP 91420016A EP 0443962 B1 EP0443962 B1 EP 0443962B1
Authority
EP
European Patent Office
Prior art keywords
phase
code
identification code
access
cycle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP91420016A
Other languages
German (de)
French (fr)
Other versions
EP0443962A1 (en
Inventor
Pierre Delatour
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP0443962A1 publication Critical patent/EP0443962A1/en
Application granted granted Critical
Publication of EP0443962B1 publication Critical patent/EP0443962B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/0042Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/10Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property

Definitions

  • the present invention relates to a method for controlling and enabling access to a protected site or service. It also relates to the device intended to implement the method.
  • document EP-A-0 334 726 describes a system for storing adjacent lockers controlled by a microprocessor device.
  • a display device initially indicates to a user the type of operation, deposit or withdrawal of an object, which he can perform and a keypad allows the user to choose one of the two operations envisaged.
  • the user After having deposited an object in a free locker, presses the locker selection key and dials a personal secret code transmitted to the microprocessor device which controls the locking of the lock of the door of the chosen locker.
  • This secret code is memorized for the duration of the occupation of the chosen locker.
  • the user dials his personal code on the keypad. This last code is compared to the memorized code. If there is a coincidence between the two codes, the locker door lock is unlocked.
  • the object of the present invention is to provide a method according to claim 1, a corresponding device according to claim 3 and an instruction according to claim 8.
  • the access procedure is particularly simple and reliable, the three-phase process guarantees the inviolability of the system by an unauthorized user, while allowing access to the authorized one even if he has lost his identification card or forgot his PIN.
  • Figures 1, 1a, 1b, 1c, 1d are diagrams showing in plan five examples of identification media by card and bracelet.
  • Figure 2 shows an example of a protected site.
  • Figure 3 shows the front of the central unit of the device.
  • Figure 4 is a diagram showing the different assemblies constituting the central unit of the device.
  • FIG. 5 shows schematically and in the form of functional blocks all of the assemblies of the central unit.
  • FIG. 6 represents in the form of functional blocks, the circuits associated with the read head, which shape the electrical pulses transmitted by the latter.
  • Figure 7 shows the twelve-key matrix keyboard.
  • FIG. 8 represents in the form of functional blocks the microprocessor of the circuit with its address locking and its reset circuit.
  • FIG. 9 represents in the form of functional blocks the set of address decoding.
  • FIG. 10 represents in the form of a functional block the random access memory of the processing unit.
  • FIG. 11 shows the display block in the form of a functional block.
  • FIG. 12 represents the clock in the form of functional blocks.
  • FIG. 13 shows in the form of functional blocks an interface circuit serving as an input port.
  • FIG. 14 shows in the form of functional blocks an interface circuit serving as an output port.
  • Figure 15 shows the control sensors.
  • Figure 16 shows the power controls for the outputs.
  • FIGS 17 and 18 illustrate the flow of the access processes in the form of a flowchart.
  • Figure 17 shows the procedure for a first access
  • Figure 18 shows the procedure for a second access.
  • Figures 19 to 22 show how the location of the lockers is carried out.
  • Figure 19 is a diagram showing a top view of the rack of lockers.
  • Figure 20 shows in perspective a detail of the tape drive with the coding tape.
  • Figure 21 is a partial top view of the bin coding strip.
  • Figure 22 shows one of the tape drive's optocouplers.
  • Figure 23 is a diagram showing a top view of the protective belt which surrounds the locker carousel
  • Figure 24 is a diagram showing a top view of the automatic closing of the locker door
  • the device intended to implement said method will first be described. Note also that for better clarity of the diagrams, and as is customary, the power supplies of the various components have not been voluntarily represented, these power supplies being well known to those skilled in the art.
  • the whole of the central unit comprises a certain number of circuits and electronic units which are interconnected by the terminations and links AA, BB, CC, DD, EE, FF, GG, HH, II, JJ, KK , LL, MM, NN, OO, PP, QQ, XX, YY.
  • the protected access described will be a locker comprising lockers intended to receive skis. But it could be otherwise without departing from the scope of the invention.
  • the protected site could just as well be hotel rooms, or changing rooms or safes.
  • the user is therefore a skier who, in order to use the locker, must be authorized to do so and must, upon access, follow a determined process which will be described later.
  • FIG. 5 represents the entire electronic assembly, which is advantageously arranged on a printed circuit of the electronic card type. Note also that the power supply is not shown either, but is intended to be supplied with alternating current of 220 Volts 50 Hertz or 110 Volts 60 Hertz or possibly direct current of 24 Volts (or even 5 or 12 Volts).
  • the skier is carrying an identification card (1) comprising a first identification code (Co 1).
  • the coding of the information relating to the first identification is of the barcode type as shown in FIG. 1, 1c and 1d.
  • the support is a cardboard or plastic card purchased by the skier or given to him or sold by the resort when he purchases his pass.
  • This card includes, in the context of its use for reading information, an area in which there is a group of white or black bars (2), wide or narrow, determining in a known manner either the first identification code (Co 1) .
  • Each user is assigned an identification number which we will call the first identification code (Co 1).
  • This first code includes information relating to the site to which access is controlled, a number assigned to each card holder, and an identification concerning the validity of the card.
  • the card identification code is coded using 10 digits from 0 to 9 and the 16 digit positions indicate the following data:
  • the first 7 digits constitute a serial code assigned to each card holder, the following 6 corresponding to the validity date, the following 2 to the site number, and the last to the verification character.
  • the identification medium specific to each user is, for example, an independent card made of plasticized cardboard or of plastic material as shown in FIGS. 1, 1a, 1b. But it could be otherwise as shown in Figure 1c according to which the first identification code (Co 1) is carried by a specific element (3) stuck on the package (4) that the skier must buy to be able to use ski lifts or, as shown in Figure 1d, incorporated in a plastic strap (100) pool type.
  • the barcode to identify the user is a preferred solution because the coding of the cards is particularly easy and the reading quite reliable, but the first identification code (Co 1) can also be magnetic as shown in the figure. 1a.
  • the identification card (1) then comprising a magnetic strip (5), the information of which would be read by an appropriate reader.
  • the identification code can also be contained in an integrated circuit (6) as shown in FIG. 1b.
  • the protected site is for example a ski locker (7) which includes an access door (9), mobile lockers (8) provided with a door (91) which is closed automatically by the door (9) as shown in FIG. 24, a protective belt (90) placed around the set of lockers which prevents the opening of the locker doors (91) inside the deposit system as shown in FIG. 23 and on the front wall (10) accessible by the user, the front (11) of the central unit (12).
  • Said front panel (11) of the central unit comprising on the one hand a display screen (13) intended to ensure dialogue with the user and the code input unit (14) constituted by a matrix keyboard ( 15) and an optical card reader (16).
  • the display (13) constituting the information unit serves as an interface between the device and the user. This information is therefore done visually, but it could be otherwise, because it could just as easily be audible.
  • the barcode reader (16) is an optical reader compatible with virtually all barcode resolutions. It has a wide slot (17) which allows the possible use of thick cards. Its metal case (18) is hermetic so that it can be installed in a hostile environment. It is designed to operate in a wide temperature range such as from minus 40 degrees to plus 70 degrees, and has a single 5 Volt supply. Reading is done in an infrared spectrum.
  • the reader may consist of an optical detector of the HBCS 7100 type, marketed by the company HEWLETT-PACKARD, and emits infrared radiation illuminating the bar code (2) of the card (1) inserted and moved into the slot (17) by transverse sliding. The reader transforms the reflected light into successive electrical signals, representative of the code bars.
  • the implementation of infrared radiation makes it possible to read a bar code even masked in whole or in part, by a protective film of polyvinyl chloride.
  • the keyboard is waterproof and its internal organization is of the matrix type. It includes 12 keys (1, 2, 3, 4, 5, 6, 7, 8, 9, *, 0, &) allowing the user to enter a second identification code (19) called confidential code, as will be explained later.
  • the central unit (12) also comprises a processing unit (20) and a detection and control unit (21) as can be seen more particularly. in Figure 4.
  • the processing unit (20) comprises different units or circuits connected to each other. There is in particular a decoding assembly (22), a calculation unit (23), a random access memory (24), a clock (25), as well as a so-called “input and output port” unit (26) and an address decoding unit (27).
  • the optical reader (16) is intended to read the first identification code (Co1) carried by the identification card (1) when the user passes his card through the slot (17), and transmits this to the information processing unit (20). Said reader (16) sends on its output (A) in response to the scrolling before it of the bars of the code, a succession of pulses which are processed in the decoding assembly (22) which is shown more particularly in FIG. 6.
  • the successions of pulses are shaped by the shaping circuit (28) which includes three protection diodes (D29) limiting overvoltages, and a resistor (R30) with two trigger-inverters (T31) type 74 LS 14 for filtering pulses.
  • the circuit (28) is connected to a decoding circuit (32) which transmits a binary code to the microprocessor (IC33) by the links (B).
  • the decoding circuit comprises a first integrated circuit (IC34) of the HBCR2010 type with search for electrical signals announcing respectively the beginning and the end of the coded writing on the card with rejection of cards which do not contain these two signals. Two other integrated circuits are associated with this first circuit (IC34).
  • this decoding circuit (32) is associated with a signaling unit (37) allowing the user to know whether his card has been read.
  • This circuit (37) includes a visual signaling circuit (38) and an audible signaling circuit (39).
  • the visual signaling circuit comprises an amplifier (A40) connected in series with a light-emitting diode (D41) and a resistor (R42), while the sound signaling circuit comprises an amplifier (A43) connected in series with a sound transmitter (44 ).
  • the light-emitting diode (D41) emits a light of advantageously green color, and the audible signal confirms the validation of the operation.
  • a microprocessor (IC33) of said calculation unit performs and controls the various operations for processing the information thus received.
  • the microprocessor's execution program is contained in its read-only memory, programmed according to the desired functions. It contains all the instructions useful for the proper functioning of the electronic process. It is connected as we said previously to the decoding circuit by its B links and associated with an address locking circuit (IC46) called "latch", which first sends the address and then the data. he is connected on the one hand to the microprocessor by the link (I), and on the other hand to the RAM and to the clock by the links (K).
  • the microprocessor (IC33) is connected on the one hand to the RAM (24) by the links (H, J, E, F), and on the other hand to the address decoding unit (27) by the bonds (D, E, F).
  • a reset circuit (47) comprising a resistor (R48), a capacitor (C49) as well as a push button (50) for manual reset.
  • the keyboard (15) managed by the microprocessor (IC33) is connected to it directly by the links (C).
  • the address decoding unit (27) shown in Figures 5 and 9 includes three circuits.
  • a first circuit (51) connected to the microprocessor (IC33) by the links (D) and to the random access memory (24) by the link (L) comprises two integrated circuits (IC52) of the "74 LS 04" type, and two circuits "IC 74) type" 74 LS 08 ".
  • a second circuit (54) connected to the microprocessor (IC33) by the links (D, E, F) as well as to the random access memory (24) by the links (E, F) comprises an integrated circuit (IC55) of the " 74 HC 688 ".
  • a third circuit (56) comprises an integrated circuit (IC 57) of the "74 LS 154" type, connected to the display (13) by the link (O) and to the unit called “input and output port” (26) by the respective links (N, M) as well as to the clock (25) by the link (P).
  • the integrated circuit (IC 57) is connected to the clock (25) and to the address locking circuit (IC46) by the links (K).
  • the address decoding unit divides the addressable space of the microprocessor to read and write in the various peripherals, i.e. the RAM, the display, the clock, and the input and Release.
  • the random access memory (24) represented in FIGS. 5 and 10 comprises an integrated circuit (IC58) of the "MB 8464" type and is connected, as we have already indicated to the microprocessor (IC33) by the links (G, H , J, E, F), and by the links (G, K) to the address locking circuit (IC46). RAM temporarily stores information.
  • the display (13) consists of an integrated circuit (IC59) of the "LM 40255" type and is connected on the one hand to all of the circuits by its links (G) and to the integrated circuit (IC57) by the link (O). It is of the alphanumeric type made watertight by a nylon lens and informs the user of the various stages of the process in progress, and gives the necessary instructions.
  • the clock (25) shown in FIG. 12 comprises an integrated circuit (IC60) of the "CDP 1879" type connected to the microprocessor by the links (J, H, G), and to the integrated circuit (IC57) of the decoding by the link (P).
  • the clock is intended to transmit the date and time to the microprocessor when the latter needs it.
  • the so-called “input and output port” unit (26) comprises two circuits, a first circuit (260) and a second circuit (261).
  • the first circuit (260) comprises an integrated circuit (IC80) of the type 74 LS 573 connected to the microprocessor by the links G, and by the links H, J via an "OR” gate (P61) and a gate.
  • IC80 integrated circuit
  • P61 "OR" gate
  • NAND P62
  • P62 third circuit (56) of the address decoding unit (27) by the link N via the "OR” gate (P61).
  • the second circuit (261) comprises an integrated circuit (IC81) of the type 74 LS 573 connected to the microprocessor by the links G, and by the links H, J via two "OR" gates (P64, P65) and a inverter (I63), and to the third circuit (56) of the address decoding unit (27) by the link M via the two "OR” gates (P64, P65).
  • the integrated circuit (IC80) of the first circuit (260) is connected by the links Q to the various respective contacts of the capture and control unit (210), and the various links X of the integrated circuit (IC81) of the second circuit (261) are connected to the control and power circuits (211).
  • Each of the control and power circuits for the outputs includes three resistors (R66, R67, R68), a transistor (T69), an optocoupler (070), a diode (D71) and a relay (Re72) controlling a switch (In73 ).
  • the optocouplers are for example of the HCPL 2530 type from the company HEWLETT PACKARD, and the VMOS transistors are controlled in all or nothing voltage.
  • the various contacts of the capture unit (210) can advantageously be optocouplers as is explained below with reference to FIGS. 19 to 22.
  • a coding strip (84).
  • This strip which moves with the lockers can for example be a strip pierced according to a coding, which will be read by a reader (83) constituted by a block of several optocouplers (830) of the fork type comprising a transmitter (em) and a receiver (re).
  • Said reader (83) is mounted in a static position and controls the movement of the coded strip (84) by reading the codes representing the numbers of the lockers.
  • the coding is for example carried out by a succession of seven zones (a, b, c, d, e, f, g), which can be perforated or non-perforated.
  • the reading of the coding is transmitted to the microprocessor (IC33) via the circuit (IC80).
  • One of the coding methods consists in drilling the extreme zones (a and g) so that the first and the seventh optocouplers are assigned to the validation of the reading while the other five are used to identify the number of the bin.
  • the access process takes place in three phases, and is shown schematically in Figures 17 and 18.
  • FIG. 17 shows the method relating to a first access or to an input cycle (Ce). This is for example when the skier wants to use the locker for the first time or to store his skis.
  • FIG. 18 shows the method relating to a second access or to an exit cycle (Cs). This is for example when the skier wants to remove his skis from the locker.
  • Cs exit cycle
  • FIG. 17 when the skier wants to store his skis, in the first phase (a) of the process, he passes his card (1) into the slot of the reader (16).
  • the reading (La) of the first identification code (Co1) made by the reader is then decoded (Da), and the decoded information (Id) is checked (Va).
  • Verification consists in verifying several things: if the first identification code (Co1) corresponds to an authorized user, if the deposit in which he wants to put his skis is indeed a possible and authorized deposit, if the card is still valid at the time of use, and if the user performs an input cycle correctly.
  • the access process is stopped, and there is reset (ro), to return the device to its initial state (EO).
  • the first confidential code is accepted (Aa) and corresponds to an authorized code
  • the following phase (b) is possible and made operational.
  • the user dials a second identification code or confidential code (Co2). This code during the first access is chosen arbitrarily by the user, it is four digits and is personal to him. To do this, the user types this credit code (Co2) on the keyboard (15) by validating with the validation key (*).
  • the confidential code (Co2) composed and validated is then stored in memory (Mb), which allows the user to continue the access process.
  • the third phase (c) which consists, for the user, in once again passing his identification card (1) into the optical reader (16).
  • the reading (Lc) made by the reader is then decoded (Dc), and the decoded information (Id) is checked (Vc).
  • the verification consists in determining whether the first identification code (2) corresponds to the first identification code having been used in the first phase (a) of the process. If the code is refused (Rc) the process must stop, and there is a loop through a reset (ro) to return the device to its initial state (EO). If the identification code is accepted (Ac), depositing is then authorized. In our example, a locker (8) is then assigned according to the uses.
  • the number of this locker appears for example on the screen of the display (13), and simultaneously the assigned locker (8) is positioned opposite the door (9), which opens.
  • the skier then introduces his skis into the locker and closes the door by pressing a control push button.
  • the removal of the skis from the locker will be done with an identical process, which will be called exit process or process in opposition to the entry access process.
  • FIG. 18 in the first phase (a) of the process, he passes his card (1) into the slot of the reader (16).
  • the reading (La) made by the reader is first of all decoded (Da), and the decoded information (Id) is checked (Va2).
  • the verification consists in determining whether the first identification code (2) corresponds to an authorized user, and to a user who has put his skis in the locker. If the first confidential code is refused (Ra) the access process is stopped, and there is reset (ro) to return the device to its initial state (EO).
  • the first confidential code is accepted (Aa) and corresponds to an authorized code, the following phase (b) is possible and effective.
  • this second access phase (b) the user dials his confidential code (Co2).
  • This code must of course correspond to that which had been chosen by the user when he first accessed.
  • the user types this credit code (Co2) on the keyboard (15) by validating with the validation key (*).
  • the confidential code entered is then stored in memory (Mb) to be checked at the end of the exit process.
  • the next phase is then made mandatory to allow the completion of the control process.
  • This third phase which is phase (c) of the method consists for the user in once again passing his identification card (1) into the optical reader (16).
  • the reading (Lc) made by the reader is then decoded (Dc), and the decoded information (Id) is checked (Vc).
  • the verification consists in determining if the first identification code (Co1) corresponds to the first identification code having been used in the first phase (a) of the exit process, and if the confidential code (Co2) introduced in the phase (b) is identical to that introduced during phase (b) of entry. If one of the codes is refused (Rc) the process is stopped, and there is reset (ro) to return the device to its initial state (EO). If the identification code (Co1) and the confidential code (Co2) are accepted, access to the locker is then authorized. In our example, the affected bin (8) is positioned opposite the door (9), which opens. The skier can then remove his skis from the locker and close the door. If there is a refusal (Rc) in phase (c) note that the user can re-pass his card for a new exit process.
  • the display indicates to the user the necessary information.
  • This display is of the alphanumeric type of the type 2 lines of 40 letters is for example a display of "sharp" mark of reference LM 40 A 21.
  • each card allows access to only one set point at a time, and that if the central unit has recorded an input and an output, said card becomes valid again for another cycle. Note also that if the operation cycle is carried out incompletely, voluntarily or not, at the expiration of a determined time, the central unit will cancel all of the information entered. Likewise, the central unit will indicate which cycle phase the operator is in, in order to prevent possible partial and no-load manipulation of the system.
  • the barcode reader recognizing the validity date on the code, validity cards limited or not, could be issued.
  • a "pass" card with a specific procedure is used by the locker manager, to allow him to intervene directly in the operation of these. For example to initialize the system at the start of the season, with date and time setting, or to open one or more lockers, or to put it out of service.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Jib Cranes (AREA)
  • Information Transfer Between Computers (AREA)
  • Vehicle Body Suspensions (AREA)
  • Pinball Game Machines (AREA)
  • Semiconductor Integrated Circuits (AREA)

Abstract

Method intended to control and permit an authorised user access to a site or a protected service, characterised in that the site is protected by two identification codes and in that the access process comprises the following three successive phases, a- input of a first identification code permitting the following phase b- input of a second identification code chosen freely or otherwise by the user, permitting the following phase c- entry of the first identification code authorising access to the site or to the protected service, and in that the said access process comprises two cycles, a first so-called entry cycle or first access cycle characterised in that the entry cycle consists in phase "a" in reading and verifying if the first identification code is authorised, and in permitting phase "b" during which the second identification code is placed in memory in order to permit the following phase "c" which consists in linking the first identification code and verifying if it corresponds to that read in the first phase "a" and in authorising access to the site or to the protected service and a second so-called exit cycle or second access cycle characterised in that the exit cycle consists in phase "a" in reading and verifying if the first identification code is authorised, and if it corresponds to a first code which has already been read in an entry cycle and in permitting phase "b" during which the second identification code is placed in memory in order to permit the following phase "c" which consists in re-reading the first identification code and verifying if it corresponds to that read in the first phase "a" and in verifying if the second confidential code is indeed identical to that introduced during the corresponding phase of the first entry cycle, and in reauthorising access to the site or to the protected service. <IMAGE>

Description

La présente invention concerne un procédé destiné à contrôler et à permettre l'accès à un site ou à un service protégé. Elle concerne également le dispositif destiné à mettre en oeuvre le procédé.The present invention relates to a method for controlling and enabling access to a protected site or service. It also relates to the device intended to implement the method.

De nos jours il existe déja de nombreux sites ou services dont l'accès est protégé par une procédure d'accès déterminée, qui n'est possible que pour un utilisateur déterminé autorisé, qui doit posséder une carte d'identification, ou un code confidentiel pour que le dispositif détermine si l'utilisateur est autorisé ou non, et suivant le cas permettre ou non l'accès.Nowadays there are already many sites or services whose access is protected by a specific access procedure, which is only possible for a specific authorized user, who must have an identification card, or a confidential code. so that the device determines whether the user is authorized or not, and depending on the case allow access or not.

Notre vie courante nous donne beaucoup d'exemples de dispositifs de ce genre.Our daily life gives us many examples of devices of this kind.

Ainsi dans les distributeurs automatiques de billets de banque, le retrait d'argent n'est possible qu'aux détenteurs d'une carte bancaire, et après une procédure d'accès précise selon laquelle l'utilisateur devra composer son code confidentiel qu'il est seul à connaitre.Thus in automatic cash dispensers, the withdrawal of money is only possible for holders of a bank card, and after a precise access procedure according to which the user will have to enter his confidential code which he is the only one to know.

Dans les cabines téléphoniques publiques avant toute manipulation l'utilisateur doit introduire une carte qu'il a préalablement achetée, et qui lui permettra un certain nombre de communications. Toutefois, il n'existe ni de dispositifs, ni de procédés de contrôle d'accès gérant de façon sûre et inviolable, à la fois des entrées et des sorties, comme par exemple des consignes.In public telephone boxes before any manipulation, the user must introduce a card which he has previously purchased, and which will allow him a certain number of communications. However, there are neither devices nor access control methods managing in a secure and inviolable manner, both inputs and outputs, such as instructions.

Ainsi le document EP-A-O 334 726 décrit un système de rangement de casiers adjacents commandés par un dispositif à microprocesseur. Un dispositif d'affichage indique initialement à un utilisateur le type d'opération, dépôt ou retrait d'un objet, qu'il peut effectuer et un clavier à touches permet à l'utilisateur de choisir l'une des deux opérations envisagées. Lorsqu'une opération de dépôt est demandée, l'utilisateur, après avoir déposé un objet dans un casier libre, actionne la touche de sélection du casier et compose un code secret personnel transmis au dispositif à microprocesseur qui commande le verrouillage de la serrure de la porte du casier choisi. Ce code secret est mémorisé pendant toute la durée d'occupation du casier choisi. Lors de l'opération de retrait de l'objet, l'utilisateur compose son code personnel sur le clavier à touches. Ce denier code est comparé au code mémorisé. S'il y a coïncidence entre les deux codes, la serrure de la porte du casier est dévérouillée.Thus, document EP-A-0 334 726 describes a system for storing adjacent lockers controlled by a microprocessor device. A display device initially indicates to a user the type of operation, deposit or withdrawal of an object, which he can perform and a keypad allows the user to choose one of the two operations envisaged. When a deposit operation is requested, the user, after having deposited an object in a free locker, presses the locker selection key and dials a personal secret code transmitted to the microprocessor device which controls the locking of the lock of the door of the chosen locker. This secret code is memorized for the duration of the occupation of the chosen locker. During the object removal operation, the user dials his personal code on the keypad. This last code is compared to the memorized code. If there is a coincidence between the two codes, the locker door lock is unlocked.

La présente invention a pour objet de proposer un procédé selon la revendication 1, un dispositif correspondant selon la revendication 3 et une consigne selon la revendication 8.The object of the present invention is to provide a method according to claim 1, a corresponding device according to claim 3 and an instruction according to claim 8.

Des caractéristiques complémentaires sont indiquées dans les revendications dépendantes.Additional features are indicated in the dependent claims.

La procédure d'accès est particulièrement simple et fiable, le processus en trois phases garanti l'inviolabilité du système par un utilisateur non autorisé, tout en permettant l'accès à celui autorisé même si celui-ci a perdu sa carte d'identification ou oublié son code confidentiel.The access procedure is particularly simple and reliable, the three-phase process guarantees the inviolability of the system by an unauthorized user, while allowing access to the authorized one even if he has lost his identification card or forgot his PIN.

En effet en cas de perte de sa carte l'utilisateur devra justifier de sa bonne foi en donnant son code confidentiel précédemment choisi et introduit par lui ainsi que le numéro du casier lui ayant été affecté, le gérant ou le responsable de l'accès procédant alors au déverrouillage. Si une personne trouve la carte perdue, n'ayant pas connaissance du code confidentiel elle ne pourra pas pour autant accéder au site protégé.Indeed in case of loss of his card the user will have to justify his good faith by giving his confidential code previously chosen and introduced by him as well as the number of the locker having been assigned to him, the manager or the access manager proceeding then when unlocking. If a person finds the lost card, not having knowledge of the confidential code, he will not be able to access the protected site.

Notons aussi que si un utilisateur passe sa carte d'identification dans le lecteur et s'en va, un tiers non autorisé, ne pourra pas avoir par erreur accès au site.Note also that if a user passes his identification card in the reader and leaves, an unauthorized third party may not have access to the site by mistake.

D'autres caractéristiques, et avantages de l'invention se dégageront de la description qui va suivre en regard des dessins annexés, qui ne sont donnés qu'à titre d'exemples non limitatifs.Other characteristics and advantages of the invention will emerge from the description which follows with reference to the appended drawings, which are given only by way of nonlimiting examples.

Les figures 1, 1a, 1b, 1c, 1d, sont des schémas représentant en plan cinq exemples de supports d'identification par carte et bracelet.Figures 1, 1a, 1b, 1c, 1d, are diagrams showing in plan five examples of identification media by card and bracelet.

La figure 2 représente un exemple de site protégé.Figure 2 shows an example of a protected site.

La figure 3 représente la façade de l'unité centrale du dispositif.Figure 3 shows the front of the central unit of the device.

La figure 4 est un schéma montrant les différents ensembles constituant l'unité centrale du dispositif.Figure 4 is a diagram showing the different assemblies constituting the central unit of the device.

La figure 5 représente de façon schématique et sous forme de blocs fonctionnels l'ensemble des montages de l'unité centrale.FIG. 5 shows schematically and in the form of functional blocks all of the assemblies of the central unit.

La figure 6 représente sous forme de blocs fonctionnels, les circuits associés à la tête de lecture, qui mettent en forme les impulsions électriques transmises par celle-ci.FIG. 6 represents in the form of functional blocks, the circuits associated with the read head, which shape the electrical pulses transmitted by the latter.

La figure 7 représente le clavier matriciel à douze touches.Figure 7 shows the twelve-key matrix keyboard.

La figure 8 représente sous forme de blocs fonctionnels le microprocesseur du circuit avec son verrouillage d'adresses et son circuit de remise à zéro.FIG. 8 represents in the form of functional blocks the microprocessor of the circuit with its address locking and its reset circuit.

La figure 9 représente sous forme de blocs fonctionnels l'ensemble de décodage d'adresses.FIG. 9 represents in the form of functional blocks the set of address decoding.

La figure 10 représente sous forme de bloc fonctionnel la mémoire vive de l'unité de traitement.FIG. 10 represents in the form of a functional block the random access memory of the processing unit.

La figure 11 représente sous forme de bloc fonctionnel le bloc d'affichage.FIG. 11 shows the display block in the form of a functional block.

La figure 12 représente sous forme de blocs fonctionnels l'horloge.FIG. 12 represents the clock in the form of functional blocks.

La figure 13 représente sous forme de blocs fonctionnels un circuit d'interface servant de port d'entrée.FIG. 13 shows in the form of functional blocks an interface circuit serving as an input port.

La figure 14 représente sous forme de blocs fonctionnels un circuit d'interface servant de port de sortie.FIG. 14 shows in the form of functional blocks an interface circuit serving as an output port.

La figure 15 représente les capteurs de contrôle.Figure 15 shows the control sensors.

La figure 16 représente les commandes de puissance pour les sorties.Figure 16 shows the power controls for the outputs.

Les figures 17 et 18 illustrent sous forme d'organigramme le déroulement des processus d'accès.Figures 17 and 18 illustrate the flow of the access processes in the form of a flowchart.

La figure 17 montre la procédure pour un premier accèsFigure 17 shows the procedure for a first access

La figure 18 montre la procédure pour un deuxième accès.Figure 18 shows the procedure for a second access.

Les figures 19 à 22 représentent comment est réalisé le repérage des casiers.Figures 19 to 22 show how the location of the lockers is carried out.

La figure 19 est un schéma représentant en vue de dessus le carroussel des casiers.Figure 19 is a diagram showing a top view of the rack of lockers.

La figure 20 montre en perspective un détail du lecteur de bande avec la bande de codage.Figure 20 shows in perspective a detail of the tape drive with the coding tape.

La figure 21 est une vue de dessus partielle de la bande de codage des casiers.Figure 21 is a partial top view of the bin coding strip.

La figure 22 montre l'un des optocoupleurs du lecteur de bande.Figure 22 shows one of the tape drive's optocouplers.

La figure 23 est un schéma représentant en vue de dessus la ceinture de protection qui entoure le carroussel de casiersFigure 23 is a diagram showing a top view of the protective belt which surrounds the locker carousel

La figure 24 est un schéma représentant en vue de dessus la fermeture automatique de la porte du casierFigure 24 is a diagram showing a top view of the automatic closing of the locker door

Avant de décrire le procédé selon l'invention et le processus d'accès, il sera tout d'abord décrit le dispositif destiné à mettre en oeuvre ledit procédé. Notons aussi que pour une meilleure clarté des schémas, et comme il est d'usage, les alimentations des différents composants n'ont pas été volontairement représentées, ces alimentations étant bien connues de l'homme du métier. L'ensemble de l'unité centrale comporte un certain nombre de circuits et d'unités électroniques qui sont connectées entre elles par les terminaisons et liaisons A-A, B-B, CC, D-D, E-E, F-F, G-G, H-H, I-I, J-J, K-K, L-L, M-M, N-N, O-O, P-P, Q-Q, X-X, Y-Y.Before describing the method according to the invention and the access process, the device intended to implement said method will first be described. Note also that for better clarity of the diagrams, and as is customary, the power supplies of the various components have not been voluntarily represented, these power supplies being well known to those skilled in the art. The whole of the central unit comprises a certain number of circuits and electronic units which are interconnected by the terminations and links AA, BB, CC, DD, EE, FF, GG, HH, II, JJ, KK , LL, MM, NN, OO, PP, QQ, XX, YY.

A titre d'exemple, l'accès protégé décrit sera une consigne comprenant des casiers destinés à recevoir des skis. Mais il pourrait en être autrement sans pour autant sortir du cadre de l'invention. Le site protégé pourrait tout aussi bien être des chambres d'hôtels, ou des vestiaires ou des coffres-forts.For example, the protected access described will be a locker comprising lockers intended to receive skis. But it could be otherwise without departing from the scope of the invention. The protected site could just as well be hotel rooms, or changing rooms or safes.

Dans notre exemple l'utilisateur est donc un skieur qui pour utiliser la consigne devra être autorisé à le faire et devra lors de l'accès suivre un processus déterminé qui sera décrit plus loin.In our example, the user is therefore a skier who, in order to use the locker, must be authorized to do so and must, upon access, follow a determined process which will be described later.

La figure 5 représente l'ensemble du montage électronique, qui est avantageusement disposé sur un circuit imprimé du type carte électronique. Notons aussi que le boitier d'alimentation n'est pas non plus représenté, mais est destiné à être alimenté en courant alternatif de 220 Volts 50 Hertz ou de 110 Volts 60 Hertz ou éventuellement en courant continu de 24 Volts (voire même 5 ou 12 Volts).FIG. 5 represents the entire electronic assembly, which is advantageously arranged on a printed circuit of the electronic card type. Note also that the power supply is not shown either, but is intended to be supplied with alternating current of 220 Volts 50 Hertz or 110 Volts 60 Hertz or possibly direct current of 24 Volts (or even 5 or 12 Volts).

L'utilisateur, et donc dans l'exemple décrit, le skieur est porteur d'une carte d'identification (1) comprenant un premier code d'identification (Co 1). De façon préférée le codage des informations relatives à la première identification est du type code barres comme cela est représenté à la figure 1, 1c et 1d. Le support est une carte en carton ou en matière plastique achetée par le skieur ou qui lui est donnée ou vendue par la station quand celui-ci achète son forfait. Cette carte comporte dans le cadre de son utilisation pour une lecture d'information une zone dans laquelle figure un groupe de barres blanches ou noires (2), larges ou étroites déterminant de façon connue en soit le premier code d'identification (Co 1). A chaque utilisateur est attribué un numéro d'identification que nous appelerons premier code d'identification (Co 1). Ce premier code comporte des informations relatives au site dont l'accès est contrôlé, à un numéro attribué à chaque porteur de carte, et une identification concernant la validité de la carte. Ainsi le code d'identification de la carte est codé à l'aide de 10 chiffres de 0 à 9 et les 16 positions de chiffres indiquent les données suivantes :The user, and therefore in the example described, the skier is carrying an identification card (1) comprising a first identification code (Co 1). Preferably, the coding of the information relating to the first identification is of the barcode type as shown in FIG. 1, 1c and 1d. The support is a cardboard or plastic card purchased by the skier or given to him or sold by the resort when he purchases his pass. This card includes, in the context of its use for reading information, an area in which there is a group of white or black bars (2), wide or narrow, determining in a known manner either the first identification code (Co 1) . Each user is assigned an identification number which we will call the first identification code (Co 1). This first code includes information relating to the site to which access is controlled, a number assigned to each card holder, and an identification concerning the validity of the card. Thus the card identification code is coded using 10 digits from 0 to 9 and the 16 digit positions indicate the following data:

Une combinaison quelconque d'un certain nombre de chiffres correspondant au site dont l'accès est contrôlé par le lecteur, à un code série, attribué à chaque porteur de carte, chaque utilisateur ayant ainsi son numéro d'identification, et une combinaison quelconque d'un certain nombre de chiffres contenant les informations relatives à la validité de la carte, et au caractère de vérification de lecture de la carte. Par exemple, les 7 premiers chiffres constituent un code série attribué à chaque porteur de carte, les 6 suivants correspondant à la date de validité, les 2 suivants au numéro du site, et le dernier au caractère de vérification.Any combination of a certain number of digits corresponding to the site to which access is controlled by the reader, to a serial code assigned to each card holder, each user thus having their identification number, and any combination of 'a certain number of digits containing the information relating to the validity of the card, and to the character of verification of reading of the card. For example, the first 7 digits constitute a serial code assigned to each card holder, the following 6 corresponding to the validity date, the following 2 to the site number, and the last to the verification character.

Le support d'identification propre à chaque utilisateur est par exemple une carte indépendante en carton plastifié ou en matière plastique comme cela est représenté aux figures 1, 1a, 1b. Mais il pourrait en être autrement comme cela est représenté à la figure 1c selon laquelle le premier code d'identification (Co 1) est porté par un élément spécifique (3) collé sur le forfait (4) que le skieur doit acheter pour pouvoir utiliser les remontées mécaniques ou encore, comme le représente la figure 1d, incorporé dans un bracelet plastique (100) type piscines.The identification medium specific to each user is, for example, an independent card made of plasticized cardboard or of plastic material as shown in FIGS. 1, 1a, 1b. But it could be otherwise as shown in Figure 1c according to which the first identification code (Co 1) is carried by a specific element (3) stuck on the package (4) that the skier must buy to be able to use ski lifts or, as shown in Figure 1d, incorporated in a plastic strap (100) pool type.

Le code barres pour identifier l'utilisateur est une solution préférée car le codage des cartes est particulièrement aisé et la lecture tout à fait fiable, mais le premier code d'identification (Co 1) peut aussi être magnétique comme cela est représenté à la figure 1a. La carte d'identification (1) comprenant alors une piste magnétique (5) dont les informations seraient lues par un lecteur approprié. Le code d'identification peut aussi être contenu dans un circuit intégré (6) comme cela est représenté à la figure 1b.The barcode to identify the user is a preferred solution because the coding of the cards is particularly easy and the reading quite reliable, but the first identification code (Co 1) can also be magnetic as shown in the figure. 1a. The identification card (1) then comprising a magnetic strip (5), the information of which would be read by an appropriate reader. The identification code can also be contained in an integrated circuit (6) as shown in FIG. 1b.

Comme nous l'avons dit précédemment le site protégé est par exemple une consigne pour skis (7) qui comprend une porte d'accès (9), des casiers mobiles (8) munis d'une porte (91) qui est refermée automatiquement par la porte (9) comme montré figure 24 , une ceinture de protection (90) placée autour de l'ensemble des casiers qui empêche l'ouverture des portes de casiers (91) à l'intérieur du système consigne comme le montre la figure 23 et sur la paroi frontale (10) accessible par l'utilisateur la façade (11) de l'unité centrale (12). Ladite façade (11) de l'unité centrale comprenant d'une part un écran d'affichage (13) destiné à assurer le dialogue avec l'utilisateur et l'unité d'introduction des codes (14) constitué par un clavier matriciel (15) et un lecteur optique de carte (16). L'afficheur (13) constituant l'unité d'information sert d'interface entre le dispositif et l'utilisateur. Cette information se fait donc visuellement, mais il pourrait en être autrement, car elle pourrait tout aussi bien être sonore.As we said earlier, the protected site is for example a ski locker (7) which includes an access door (9), mobile lockers (8) provided with a door (91) which is closed automatically by the door (9) as shown in FIG. 24, a protective belt (90) placed around the set of lockers which prevents the opening of the locker doors (91) inside the deposit system as shown in FIG. 23 and on the front wall (10) accessible by the user, the front (11) of the central unit (12). Said front panel (11) of the central unit comprising on the one hand a display screen (13) intended to ensure dialogue with the user and the code input unit (14) constituted by a matrix keyboard ( 15) and an optical card reader (16). The display (13) constituting the information unit serves as an interface between the device and the user. This information is therefore done visually, but it could be otherwise, because it could just as easily be audible.

Le lecteur (16) de code barres est un lecteur optique compatible avec pratiquement toutes les résolutions de code barres. Il possède une large fente (17) qui permet l'emploi éventuel de cartes épaisses. Son boitier métallique (18) est hermétique pour pouvoir être installé dans un environnement hostile. Il est prévu pour fonctionner dans une gamme de températures étendue comme par exemple de moins 40 degrés à plus 70 degrés, et possède une alimentation unique de 5 Volts. La lecture se fait dans un spectre infrarouge. Le lecteur peut être constitué par un détecteur optique du type HBCS 7100, commercialisé par la société HEWLETT-PACKARD, et émet un rayonnement infrarouge illuminant le code barres (2) de la carte (1) introduite et déplacée dans la fente (17) par glissement transversal. Le lecteur transforme la lumière réfléchie en signaux électriques successifs, représentatifs des barres du code. La mise en oeuvre des rayonnements infrarouges permet de lire un code barres même masqué en totalité ou en partie, par une pellicule de protection en polychlorure de vinyle.The barcode reader (16) is an optical reader compatible with virtually all barcode resolutions. It has a wide slot (17) which allows the possible use of thick cards. Its metal case (18) is hermetic so that it can be installed in a hostile environment. It is designed to operate in a wide temperature range such as from minus 40 degrees to plus 70 degrees, and has a single 5 Volt supply. Reading is done in an infrared spectrum. The reader may consist of an optical detector of the HBCS 7100 type, marketed by the company HEWLETT-PACKARD, and emits infrared radiation illuminating the bar code (2) of the card (1) inserted and moved into the slot (17) by transverse sliding. The reader transforms the reflected light into successive electrical signals, representative of the code bars. The implementation of infrared radiation makes it possible to read a bar code even masked in whole or in part, by a protective film of polyvinyl chloride.

Le clavier (15) est étanche et son organisation interne est du type matriciel. Il comprend 12 touches (1, 2, 3, 4, 5, 6, 7, 8, 9, *, 0, &) permettant à l'utilisateur d'introduire un deuxième code d'identification (19) appelé code confidentiel, comme cela sera expliqué par la suite.The keyboard (15) is waterproof and its internal organization is of the matrix type. It includes 12 keys (1, 2, 3, 4, 5, 6, 7, 8, 9, *, 0, &) allowing the user to enter a second identification code (19) called confidential code, as will be explained later.

L'unité centrale (12) comprend par ailleurs une unité de traitement (20) et une unité de détection et de commande (21) comme on peut le voir plus particulièrement à la figure 4. L'unité de traitement (20) comprend différentes unités ou circuits connectés les uns aux autres. Il y a notamment un ensemble de décodage (22), une unité de calcul (23), une mémoire vive (24), une horloge (25), ainsi qu'une unité dite "port d'entrée et sortie" (26) et une unité de décodage d'adresses (27).The central unit (12) also comprises a processing unit (20) and a detection and control unit (21) as can be seen more particularly. in Figure 4. The processing unit (20) comprises different units or circuits connected to each other. There is in particular a decoding assembly (22), a calculation unit (23), a random access memory (24), a clock (25), as well as a so-called "input and output port" unit (26) and an address decoding unit (27).

Le lecteur optique (16) est destiné à lire le premier code d'identification (Co1) porté par la carte d'identification (1) quand l'utilisateur passe sa carte dans la fente (17), et transmet celui-ci à l'unité de traitement des informations (20). Ledit lecteur (16) envoie sur sa sortie (A) en réponse au défilement devant lui des barres du code, une succession d'impulsions qui sont traitées dans l'ensemble de décodage (22) qui est représenté plus particulièrement à la figure 6. Tout d'abord les successions d'impulsions sont mises en forme par le circuit de mise en forme (28) qui comprend trois diodes de protection (D29) limitant les surtensions, et une résistance (R30) avec deux trigger-inverseurs (T31) du type 74 LS 14 pour filtrer les impulsions. Le circuit (28) est relié à un circuit de décodage (32) qui transmet un code binaire au microprocesseur (IC33) par les liaisons (B). Le circuit de décodage comprend un premier circuit intégré (IC34) du type HBCR2010 avec recherche de signaux électriques annonçant respectivement le commencement et la fin de l'inscription codée sur la carte avec rejet des cartes qui ne comportent pas ces deux signaux. A ce premier circuit (IC34) sont associés deux autres circuits intégrés. Un second circuit (IC35) du type 74 LS 573 destiné au multiplexage du bus d'adresse et des données du premier circuit (IC34), et un troisième circuit (IC36) servant de mémoire tampon de 8 bits x 8 kilooctects du type MB 8464. Avantageusement à ce circuit de décodage (32), il est associé une unité de signalisation (37) permettant à l'utilisateur de savoir si sa carte a bien été lue. Ce circuit (37) comprend un circuit de signalisation visuelle (38) et un circuit de signalisation sonore (39). Le circuit de signalisation visuelle comprend un amplificateur (A40) monté en série avec une diode électroluminescente (D41) et une résistance (R42), tandis que le circuit de signalisation sonore comprend un amplificateur (A43) monté en série avec un émetteur sonore (44). La diode électroluminiscente (D41) émet une lumière de couleur avantageusement verte, et le signal sonore confirme la validation de l'opération.The optical reader (16) is intended to read the first identification code (Co1) carried by the identification card (1) when the user passes his card through the slot (17), and transmits this to the information processing unit (20). Said reader (16) sends on its output (A) in response to the scrolling before it of the bars of the code, a succession of pulses which are processed in the decoding assembly (22) which is shown more particularly in FIG. 6. First of all, the successions of pulses are shaped by the shaping circuit (28) which includes three protection diodes (D29) limiting overvoltages, and a resistor (R30) with two trigger-inverters (T31) type 74 LS 14 for filtering pulses. The circuit (28) is connected to a decoding circuit (32) which transmits a binary code to the microprocessor (IC33) by the links (B). The decoding circuit comprises a first integrated circuit (IC34) of the HBCR2010 type with search for electrical signals announcing respectively the beginning and the end of the coded writing on the card with rejection of cards which do not contain these two signals. Two other integrated circuits are associated with this first circuit (IC34). A second circuit (IC35) of the type 74 LS 573 intended for the multiplexing of the address bus and the data of the first circuit (IC34), and a third circuit (IC36) serving as buffer memory of 8 bits x 8 kilooctects of the type MB 8464 Advantageously, this decoding circuit (32) is associated with a signaling unit (37) allowing the user to know whether his card has been read. This circuit (37) includes a visual signaling circuit (38) and an audible signaling circuit (39). The visual signaling circuit comprises an amplifier (A40) connected in series with a light-emitting diode (D41) and a resistor (R42), while the sound signaling circuit comprises an amplifier (A43) connected in series with a sound transmitter (44 ). The light-emitting diode (D41) emits a light of advantageously green color, and the audible signal confirms the validation of the operation.

La lecture du premier code d'identification ayant été faite et les informations ayant été décodées, celles-ci sont transmises à une unité de calcul (23). Un microprocesseur (IC33) de ladite unité de calcul, effectue et contrôle les différentes opérations de traitement des informations ainsi reçues. Le programme d'exécution du microprocesseur est contenu dans sa mémoire morte, programmée suivant les fonctions désirées. Il contient toutes les instructions utiles au bon fonctionnement du procédé électronique. Il est relié comme nous l'avons dit précédemment au circuit de décodage par ses liaisons B et associé à un circuit de verrouillage d'adresses (IC46) dit "latch", qui envoie d'abord l'adresse puis les données. Il est relié d'une part au microprocesseur par la liaison (I), et d'autre part à la mémoire vive et à l'horloge par les liaisons (K). Le microprocesseur (IC33) est relié d'une part à la mémoire vive (24) par les liaisons (H, J, E, F), et d'autre part à l'unité de décodage d'adresses (27) par les liaisons (D, E, F). D'autre part il lui est associé un circuit de remise à zéro (47) comprenant une résistance (R48), un condensateur (C49) ainsi qu'un bouton poussoir (50) pour une remise à zéro manuelle. Par ailleurs le clavier (15) géré par le microprocesseur (IC33) lui est connecté directement par les liaisons (C).The reading of the first identification code having been made and the information having been decoded, these are transmitted to a calculation unit (23). A microprocessor (IC33) of said calculation unit performs and controls the various operations for processing the information thus received. The microprocessor's execution program is contained in its read-only memory, programmed according to the desired functions. It contains all the instructions useful for the proper functioning of the electronic process. It is connected as we said previously to the decoding circuit by its B links and associated with an address locking circuit (IC46) called "latch", which first sends the address and then the data. he is connected on the one hand to the microprocessor by the link (I), and on the other hand to the RAM and to the clock by the links (K). The microprocessor (IC33) is connected on the one hand to the RAM (24) by the links (H, J, E, F), and on the other hand to the address decoding unit (27) by the bonds (D, E, F). On the other hand, there is associated with it a reset circuit (47) comprising a resistor (R48), a capacitor (C49) as well as a push button (50) for manual reset. Furthermore, the keyboard (15) managed by the microprocessor (IC33) is connected to it directly by the links (C).

L'unité de décodage d'adresses (27) représentée aux figures 5 et 9, comprend trois circuits. Un premier circuit (51) relié au microprocesseur (IC33) par les liaisons (D) et à la mémoire vive (24) par la liaison (L) comprend deux circuits intégrés (IC52) du type "74 LS 04", et deux circuits intégrés (IC53) du type "74 LS 08". Un deuxième circuit (54) relié au microprocesseur (IC33) par les liaisons (D, E, F) ainsi qu'à la mémoire vive (24) par les liaisons (E, F) comprend un circuit intégré (IC55) du type "74 HC 688". Un troisième circuit (56) comprend un circuit intégré (IC 57) du type "74 LS 154", relié à l'afficheur (13) par la liaison (O) et à l'unité dite "port d'entrée et sortie" (26) par les liaisons respectives (N, M) ainsi qu'à l'horloge (25) par la liaison (P). D'autre part le circuit intégré (IC 57) est relié à l'horloge (25) et au circuit de verrouillage d'adresse (IC46) par les liaisons (K). L'unité de décodage d'adresse divise l'espace adressable du microprocesseur pour lire et écrire dans les différents périphériques, c'est-à-dire la mémoire vive, l'afficheur, l'horloge, et les ports d'entrée et de sortie.The address decoding unit (27) shown in Figures 5 and 9 includes three circuits. A first circuit (51) connected to the microprocessor (IC33) by the links (D) and to the random access memory (24) by the link (L) comprises two integrated circuits (IC52) of the "74 LS 04" type, and two circuits "IC 74) type" 74 LS 08 ". A second circuit (54) connected to the microprocessor (IC33) by the links (D, E, F) as well as to the random access memory (24) by the links (E, F) comprises an integrated circuit (IC55) of the " 74 HC 688 ". A third circuit (56) comprises an integrated circuit (IC 57) of the "74 LS 154" type, connected to the display (13) by the link (O) and to the unit called "input and output port" (26) by the respective links (N, M) as well as to the clock (25) by the link (P). On the other hand, the integrated circuit (IC 57) is connected to the clock (25) and to the address locking circuit (IC46) by the links (K). The address decoding unit divides the addressable space of the microprocessor to read and write in the various peripherals, i.e. the RAM, the display, the clock, and the input and Release.

La mémoire vive (24) représentée à la figure 5 et 10 comprend un circuit intégré (IC58) du type "MB 8464" et est reliée, comme nous l'avons déjà signalé précédemment au microprocesseur (IC33) par les liaisons (G, H, J, E, F), et par les liaisons (G, K) au circuit (IC46) de verrouillage d'adresses. La mémoire vive stocke temporairement les informations.The random access memory (24) represented in FIGS. 5 and 10 comprises an integrated circuit (IC58) of the "MB 8464" type and is connected, as we have already indicated to the microprocessor (IC33) by the links (G, H , J, E, F), and by the links (G, K) to the address locking circuit (IC46). RAM temporarily stores information.

L'afficheur (13) est constitué par un circuit intégré (IC59) du type "LM 40255" et est relié d'une part à l'ensemble des circuits par ses liaisons (G) et au circuit intégré (IC57) par la liaison (O). Il est du type alphanumérique rendu étanche par une lentille en nylon et informe l'utilisateur des différentes étapes du processus en cours, et donne les instructions nécessaires.The display (13) consists of an integrated circuit (IC59) of the "LM 40255" type and is connected on the one hand to all of the circuits by its links (G) and to the integrated circuit (IC57) by the link (O). It is of the alphanumeric type made watertight by a nylon lens and informs the user of the various stages of the process in progress, and gives the necessary instructions.

L'horloge (25) représentée à la figure 12 comprend un circuit intégré (IC60) du type "CDP 1879" relié au microprocesseur par les liaisons (J, H, G), et au circuit intégré (IC57) de l'unité de décodage par la liaison (P). L'horloge est destinée à transmettre au microprocesseur la date et l'heure lorsque celui-ci en a besoin.The clock (25) shown in FIG. 12 comprises an integrated circuit (IC60) of the "CDP 1879" type connected to the microprocessor by the links (J, H, G), and to the integrated circuit (IC57) of the decoding by the link (P). The clock is intended to transmit the date and time to the microprocessor when the latter needs it.

L'unité dite "port d'entrée et sortie" (26) comprend deux circuits, un premier circuit (260) et un deuxième circuit (261). Le premier circuit (260) comprend un circuit intégré (IC80) du type 74 LS 573 relié au microprocesseur par les liaisons G, et par les liaisons H, J par l'intermédiaire d'une porte "OU" (P61) et une porte "NON ET" (P62) et au troisième circuit (56) de l'unité de décodage d'adresse (27) par la liaison N par l'intermédiaire de la porte "OU" (P61). Le deuxième circuit (261) comprend un circuit intégré (IC81) du type 74 LS 573 relié au microprocesseur par les liaisons G, et par les liaisons H, J par l'intermédiaire de deux portes "OU" (P64, P65) et un inverseur (I63), et au troisième circuit (56) de l'unité de décodage d'adresse (27) par la liaison M par l'intermédiaire des deux portes "OU" (P64, P65). Par ailleurs le circuit intégré (IC80) du premier circuit (260) est relié par les liaisons Q aux différents contacts respectifs de l'unité de captage et de contrôle (210), et les différentes liaisons X du circuit intégré (IC81) du deuxième circuit (261) sont reliées aux circuits de commande et de puissance (211). Chacun des circuits de commande et de puissance pour les sorties comprend trois résistances (R66, R67, R68), un transistor (T69), un optocoupleur (070), une diode (D71) et un relai (Re72) commandant un interrupteur (In73). Les optocoupleurs sont par exemple du type HCPL 2530 de la société HEWLETT PACKARD, et les transistors VMOS se commandent en tension tout ou rien. Les différents contacts de l'unité de captage (210) peuvent être avantageusement des optocoupleurs comme cela est expliqué ci après en regard des figures 19 à 22. Pour commander le déplacement et l'arrêt des casiers (8) lors des entrées et des sorties, il est nécessaire d'identifier les casiers, aussi, on associe au carroussel (85) supportant les casiers (8) une bande de codage (84). Cette bande qui se déplace avec les casiers peut être par exemple une bande percée suivant un codage, qui sera lu par un lecteur (83) constitué par un bloc de plusieurs optocoupleurs (830) du type fourche comprenant un émetteur (em) et un récepteur (re). Ledit lecteur (83) est monté en position statique et contrôle le défilement de la bande codée (84) en lisant les codes représentant les numéros des casiers. Le codage est par exemple réalisé par une succession de sept zones (a, b, c, d, e, f, g), pouvant être trouées ou non trouées. La lecture du codage est transmise au microprocesseur (IC33) par l'intermédiaire du circuit (IC80). Une des méthodes de codage consiste à trouer les zones extrèmes (a et g) pour que le premier et le septième optocoupleurs soient affectés à la validation de la lecture tandis que les cinq autres sont utilisés pour identifier le numéro du casier.The so-called "input and output port" unit (26) comprises two circuits, a first circuit (260) and a second circuit (261). The first circuit (260) comprises an integrated circuit (IC80) of the type 74 LS 573 connected to the microprocessor by the links G, and by the links H, J via an "OR" gate (P61) and a gate. "NAND" (P62) and to the third circuit (56) of the address decoding unit (27) by the link N via the "OR" gate (P61). The second circuit (261) comprises an integrated circuit (IC81) of the type 74 LS 573 connected to the microprocessor by the links G, and by the links H, J via two "OR" gates (P64, P65) and a inverter (I63), and to the third circuit (56) of the address decoding unit (27) by the link M via the two "OR" gates (P64, P65). Furthermore, the integrated circuit (IC80) of the first circuit (260) is connected by the links Q to the various respective contacts of the capture and control unit (210), and the various links X of the integrated circuit (IC81) of the second circuit (261) are connected to the control and power circuits (211). Each of the control and power circuits for the outputs includes three resistors (R66, R67, R68), a transistor (T69), an optocoupler (070), a diode (D71) and a relay (Re72) controlling a switch (In73 ). The optocouplers are for example of the HCPL 2530 type from the company HEWLETT PACKARD, and the VMOS transistors are controlled in all or nothing voltage. The various contacts of the capture unit (210) can advantageously be optocouplers as is explained below with reference to FIGS. 19 to 22. To control the movement and the stopping of the lockers (8) during inputs and outputs , it is necessary to identify the lockers, also, we associate with the carousel (85) supporting the lockers (8) a coding strip (84). This strip which moves with the lockers can for example be a strip pierced according to a coding, which will be read by a reader (83) constituted by a block of several optocouplers (830) of the fork type comprising a transmitter (em) and a receiver (re). Said reader (83) is mounted in a static position and controls the movement of the coded strip (84) by reading the codes representing the numbers of the lockers. The coding is for example carried out by a succession of seven zones (a, b, c, d, e, f, g), which can be perforated or non-perforated. The reading of the coding is transmitted to the microprocessor (IC33) via the circuit (IC80). One of the coding methods consists in drilling the extreme zones (a and g) so that the first and the seventh optocouplers are assigned to the validation of the reading while the other five are used to identify the number of the bin.

Nous allons maintenant décrire le procédé selon l'invention. Ainsi, et comme nous l'avons déjà dit l'utilisateur, donc ici, dans notre exemple le skieur pour être autorisé à utiliser la consigne doit posséder une carte d'identification (1) qu'il a achetée ou qu'il a obtenue lors de l'achat de son forfait.We will now describe the process according to the invention. Thus, and as we have already said the user, so here, in our example the skier to be authorized to use the locker must have an identification card (1) which he bought or obtained when purchasing his package.

Le procédé d'accès se fait en trois phases, et est représenté schématiquement par les figures 17 et 18.The access process takes place in three phases, and is shown schematically in Figures 17 and 18.

La figure 17 montre le procédé relatif à un premier accès ou à un cycle d'entrée (Ce). C'est par exemple quand le skieur veut utiliser la consigne pour la première fois ou pour ranger ses skis.FIG. 17 shows the method relating to a first access or to an input cycle (Ce). This is for example when the skier wants to use the locker for the first time or to store his skis.

La figure 18 montre le procédé relatif à un deuxième accès ou à un cycle de sortie (Cs). C'est par exemple quand le skieur veut retirer ses skis de la consigne.FIG. 18 shows the method relating to a second access or to an exit cycle (Cs). This is for example when the skier wants to remove his skis from the locker.

Ainsi, figure 17, quand le skieur veut ranger ses skis, dans la première phase (a) du procédé, il passe sa carte (1) dans la fente du lecteur (16). La lecture (La) du premier code d'identification (Co1) faite par le lecteur est ensuite décodée (Da), et les informations décodées (Id) sont vérifiées (Va). La vérification consiste à vérifier plusieurs choses: si le premier code d'identification (Co1) correpond bien à un utilisateur autorisé, si la consigne dans laquelle celui-ci veut mettre ses skis est bien une consigne possible et autorisée, si la carte est encore valide au moment de son utilisation, et si l'utilisateur procède bien à un cycle d'entrée. Si le premier code confidentiel est refusé (Ra) le processus d'accès est arrêté, et il y a remise à zéro (ro), pour replacer le dispositif dans son état initial (EO). Par contre si le premier code confidentiel est accepté (Aa) et correspond bien à un code autorisé, la phase (b) suivante est possible et rendue opérationnelle. Selon cette deuxième phase d'accès (b) l'utilisateur compose un deuxième code d'identification ou code confidentiel (Co2). Ce code lors du premier accès est choisi arbitrairement par l'utilisateur, il est à quatre chiffres et lui est personnel. Pour ce faire l'utilisateur tape cedit code (Co2) sur le clavier (15) en validant avec la touche de validation (*). Le code confidentiel (Co2) composé et validé est alors mis en mémoire (Mb), ce qui permet à l'utilisateur la poursuite du processus d'accès. Il peut donc passer à la phase suivante du procédé c'est-à-dire la troisième phase (c) qui consiste pour l'utilisateur à repasser une nouvelle fois sa carte d'identification (1) dans le lecteur optique (16). La lecture (Lc) faite par le lecteur est alors décodée (Dc), et les informations décodées (Id) sont vérifiées (Vc). La vérification consiste à déterminer si le premier code d'identification (2) correspond bien au premier code d'identification ayant été utilisé dans la première phase (a) du procédé. Si le code est refusé (Rc) le processus doit s'arrêter, et il y a bouclage par une remise à zéro (ro) pour remettre le dispositif dans son état initial (EO). Si le code d'identification est accepté (Ac), la mise en consigne est alors autorisée. Dans notre exemple un casier (8) est alors affecté en fonction des utilisations. Le numéro de ce casier apparait par exemple sur l'écran de l'afficheur (13), et simultanément le casier affecté (8) se positionne en regard de la porte (9), qui s'ouvre. Le skieur introduit alors ses skis dans le casier et referme la porte en appuyant sur un bouton poussoir de commande. A son retour, le retrait des skis de la consigne se fera avec un processus identique, que l'on appelera procédé ou processus de sortie en opposition au procédé d'accès d'entrée.Thus, FIG. 17, when the skier wants to store his skis, in the first phase (a) of the process, he passes his card (1) into the slot of the reader (16). The reading (La) of the first identification code (Co1) made by the reader is then decoded (Da), and the decoded information (Id) is checked (Va). Verification consists in verifying several things: if the first identification code (Co1) corresponds to an authorized user, if the deposit in which he wants to put his skis is indeed a possible and authorized deposit, if the card is still valid at the time of use, and if the user performs an input cycle correctly. If the first confidential code is refused (Ra) the access process is stopped, and there is reset (ro), to return the device to its initial state (EO). On the other hand, if the first confidential code is accepted (Aa) and corresponds to an authorized code, the following phase (b) is possible and made operational. According to this second access phase (b) the user dials a second identification code or confidential code (Co2). This code during the first access is chosen arbitrarily by the user, it is four digits and is personal to him. To do this, the user types this credit code (Co2) on the keyboard (15) by validating with the validation key (*). The confidential code (Co2) composed and validated is then stored in memory (Mb), which allows the user to continue the access process. He can therefore proceed to the next phase of the process, that is to say the third phase (c) which consists, for the user, in once again passing his identification card (1) into the optical reader (16). The reading (Lc) made by the reader is then decoded (Dc), and the decoded information (Id) is checked (Vc). The verification consists in determining whether the first identification code (2) corresponds to the first identification code having been used in the first phase (a) of the process. If the code is refused (Rc) the process must stop, and there is a loop through a reset (ro) to return the device to its initial state (EO). If the identification code is accepted (Ac), depositing is then authorized. In our example, a locker (8) is then assigned according to the uses. The number of this locker appears for example on the screen of the display (13), and simultaneously the assigned locker (8) is positioned opposite the door (9), which opens. The skier then introduces his skis into the locker and closes the door by pressing a control push button. On his return, the removal of the skis from the locker will be done with an identical process, which will be called exit process or process in opposition to the entry access process.

Ainsi, quand, le skieur veut récupérer ses skis, figure 18, dans la première phase (a) du procédé, il passe sa carte (1) dans la fente du lecteur (16). La lecture (La) faite par le lecteur est tout d'abord décodée (Da), et les informations décodées (Id) sont vérifiées (Va2). La vérification consiste à déterminer si le premier code d'identification (2) correspond bien à un utilisateur autorisé, et à un utilisateur ayant mis ses skis dans la consigne. Si le premier code confidentiel est refusé (Ra) le processus d'accès est arrêté, et il y a remise à zéro (ro) pour replacer le dispositif dans son état initial (EO). Par contre si le premier code confidentiel est accepté (Aa) et correspond bien à un code autorisé, la phase (b) suivante est possible et opérante. Selon cette deuxième phase d'accès (b), l'utilisateur compose son code confidentiel (Co2). Ce code doit bien entendu correspondre à celui qui avait été choisi par l'utilisateur lors de son premier accès. Pour ce faire l'utilisateur tape cedit code (Co2) sur le clavier (15) en validant avec la touche de validation (*). Le code confidentiel tapé, est alors mis en mémoire (Mb) pour être vérifié en fin de processus de sortie. La phase suivante est alors rendue obligatoire pour permettre le bouclage du processus de contrôle. Cette troisième phase qui est la phase (c) du procédé consiste pour l'utilisateur à repasser une nouvelle fois sa carte d'identification (1) dans le lecteur optique (16). La lecture (Lc) faite par le lecteur est alors décodée (Dc), et les informations décodées (Id) sont vérifiées (Vc). La vérification consiste à déterminer si le premier code d'identification (Co1) correspond bien au premier code d'identification ayant été utilisé dans la première phase (a) du processus de sortie, et si le code confidentiel (Co2) introduit dans la phase (b) est bien identique à celui introduit lors de la phase (b) d'entrée. Si l'un des codes est refusé (Rc) le processus est arrêté, et il y a remise à zéro (ro) pour replacer le dispositif dans son état initial (EO). Si le code d'identification (Co1) et le code confidentiel (Co2) sont acceptés, l'accès à la consigne est alors autorisé. Dans notre exemple le casier (8) affecté se positionne en regard de la porte (9), qui s'ouvre. Le skieur peut alors retirer ses skis du casier et referme la porte. S'il y a refus (Rc) dans la phase (c) notons que l'utilisateur peut repasser sa carte pour un nouveau processus de sortie.Thus, when the skier wants to recover his skis, FIG. 18, in the first phase (a) of the process, he passes his card (1) into the slot of the reader (16). The reading (La) made by the reader is first of all decoded (Da), and the decoded information (Id) is checked (Va2). The verification consists in determining whether the first identification code (2) corresponds to an authorized user, and to a user who has put his skis in the locker. If the first confidential code is refused (Ra) the access process is stopped, and there is reset (ro) to return the device to its initial state (EO). On the other hand, if the first confidential code is accepted (Aa) and corresponds to an authorized code, the following phase (b) is possible and effective. According to this second access phase (b), the user dials his confidential code (Co2). This code must of course correspond to that which had been chosen by the user when he first accessed. To do this, the user types this credit code (Co2) on the keyboard (15) by validating with the validation key (*). The confidential code entered is then stored in memory (Mb) to be checked at the end of the exit process. The next phase is then made mandatory to allow the completion of the control process. This third phase which is phase (c) of the method consists for the user in once again passing his identification card (1) into the optical reader (16). The reading (Lc) made by the reader is then decoded (Dc), and the decoded information (Id) is checked (Vc). The verification consists in determining if the first identification code (Co1) corresponds to the first identification code having been used in the first phase (a) of the exit process, and if the confidential code (Co2) introduced in the phase (b) is identical to that introduced during phase (b) of entry. If one of the codes is refused (Rc) the process is stopped, and there is reset (ro) to return the device to its initial state (EO). If the identification code (Co1) and the confidential code (Co2) are accepted, access to the locker is then authorized. In our example, the affected bin (8) is positioned opposite the door (9), which opens. The skier can then remove his skis from the locker and close the door. If there is a refusal (Rc) in phase (c) note that the user can re-pass his card for a new exit process.

A chaque phase du processus, l'afficheur indique à l'utilisateur les informations nécessaires. Cet afficheur est du type alphanumérique du type 2 lignes de 40 lettres est par exemple un afficheur de marque "sharp" de référence LM 40 A 21.At each phase of the process, the display indicates to the user the necessary information. This display is of the alphanumeric type of the type 2 lines of 40 letters is for example a display of "sharp" mark of reference LM 40 A 21.

Notons que chaque carte ne permet d'accéder qu'à une seule consigne à la fois, et que si l'unité centrale a enregistré une entrée et une sortie, ladite carte redevient valide pour un autre cycle. Notons aussi que si le cycle de l'opération est réalisé incomplètement, volontairement ou non, à l'expiration d'un temps déterminé, l'unité centrale annulera l'ensemble des informations introduites. De même, l'unité centrale indiquera dans quelle phase de cycle se trouve l'opérateur, ceci afin de prévenir l'éventuelle manipulation partielle et à vide du système.Note that each card allows access to only one set point at a time, and that if the central unit has recorded an input and an output, said card becomes valid again for another cycle. Note also that if the operation cycle is carried out incompletely, voluntarily or not, at the expiration of a determined time, the central unit will cancel all of the information entered. Likewise, the central unit will indicate which cycle phase the operator is in, in order to prevent possible partial and no-load manipulation of the system.

Le lecteur code barres reconnaissant la date de validité portée sur le code, des cartes de validité limitée ou non, pourraient être délivrées. Une carte "pass" avec procédure particulière est utilisée par le responsable des consignes, pour lui permettre d'intervenir directement sur le fonctionnement de celles-ci. Par exemple pour initialiser le système en début de saison, avec mise à la date et à l'heure, ou pour ouvrir un ou plusieurs casiers, ou encore pour le mettre hors service.The barcode reader recognizing the validity date on the code, validity cards limited or not, could be issued. A "pass" card with a specific procedure is used by the locker manager, to allow him to intervene directly in the operation of these. For example to initialize the system at the start of the season, with date and time setting, or to open one or more lockers, or to put it out of service.

Bien entendu, l'invention n'est pas limitée aux modes de réalisation décrits et représentés à titre d'exemples.Of course, the invention is not limited to the embodiments described and shown by way of examples.

Claims (11)

  1. Procedure designed to control and enable, by means of a device comprising one central unit (12), consisting of one code input unit (14) and one processing unit (20), an authorized user's access to a site or protected service, a procedure by which the site is protected by two interdependent identification codes (Co1, Co2). The access process of this procedure includes the following three successive phases:
    a - entering an initial identification code (Co1) into the input unit, enabling the next phase.
    b - entering a second identification code (Co2) into the code input unit, whether or not selected freely by the user, enabling the following phase.
    c - entering the first identification code (Co1) into the code input unit, authorizing access to the site or protected service, and in which the said access process includes two cycles,
    a first cycle (Ce) called the input cycle or first access cycle, which consists of phase "a", reading and checking whether the first identification code (Co1) is authorized, and enabling phase "b", during which the second identification code (Co2) is stored in memory to enable the next phase "c", which consists of re-reading the first identification code (Co1) and checking whether it corresponds to that read in the first phase "a" and then authorizing access to the site or the protected service, and a second cycle (Cs) called output cycle or second access cycle, which consists of phase "a", reading and checking whether the first identification code (Co1) is authorized and whether this code corresponds to a first code (Co1) which has already been read in an input cycle (Ce), and of enabling phase "b" during which the second identification code (Co2) is stored in memory to enable the next phase "c", which consists in re-reading the first identification code (Co1) and checking that it corresponds to the code read in the first phase "a" and in checking that the second confidential code (Co2) is in fact identical to the code input during the corresponding phase of the first input cycle (Ce), and in re-authorizing access to the site or protected service.
  2. Procedure in compliance with claim 1 with regard to the functional features: input of the first identification code (Co1) consists in having acknowledged an identification support, i.e. a card (4) or a bracelet (100) or other supports including an identification element which may be of the bar-code type (2) and/or magnetic track (5), and/or integrated circuit (6), by a reader (16). The input of the second code (Co2) consists in typing a confidential code on a keyboard (15).
  3. Device for implementing the procedure in compliance with claim 1, including a central unit, which comprises a code input unit and a processing unit and the necessary means, during the access process which includes three phases:
    a - input a first identification code (Co1) enabling the next phase,
    b - input a second identification code (Co2), chosen freely or not by the user, enabling the next phase,
    c - input the first identification code (Co1), authorizing access to the site or protected service,
    means for, during the first cycle of the access process which includes two cycles, the first cycle (Ce), called the input cycle or first access cycle, in phase "a", reading and checking that the first identification code (Co1) is authorized and enabling phase "b", in order to, during phase "b", store in memory the second identification code to enable the next phase "c" to enable, during phase "c", re-reading of the first identification code (Co1) and checking that this code corresponds to that read in the first phase "a" and authorizing access to the site or protected service, and the means for, during the second cycle of the access procedure, this second cycle being called the output cycle or the second access cycle, during phase "a", reading and checking that the first identification code (Co1) has already been read in an input cycle (Ce) and enabling phase "b", for, during phase "b", storing in memory the second identification code to enable the next phase "c", for during phase "c", re-reading the first identification code (Co1) and checking that it corresponds to the code read during the first phase "a" and checking that the second confidential code (Co2) is in fact identical to the code input during the corresponding phase of the first input cycle (Ce), and in re-authorizing access to the site or protected service.
  4. Device in compliance with claim 3: the first identification code (Co1) is shown on an identification support, i.e. a card (4) or a bracelet (100).
  5. Device in compliance with claim 3 or 4: the first identification code (Co1) is of the bar-code type (2) and/or a magnetic type (5) and/or of an integrated circuit type (6).
  6. Device in compliance with any of claims 3 to 5: the code input unit includes a reader (16) and a keyboard (15).
  7. Device in compliance with any of claims 3 to 6: it enables access to a locker.
  8. A locker fitted with a device in compliance with any of claims 3 to 7: it includes moveable lockers (8) with a carousel (85) designed to be located opposite an entrance door (9).
  9. Locker in compliance with claim 8: it includes the identification means of lockers (8), comprising a coding band which can be moved with the lockers (84). For each locker, this band consists of a succession of zones (a, b, c, d, e, f, g) with or without holes to make up the code. The said reader comprises a series of fork type optocouplers (830).
  10. Locker in compliance with claim 8 or 9: closing the outside door (9), giving access to the locker and located in the front panel, automatically causes locking of the locker (8) door (91).
  11. Locker in compliance with any one of claims 8 to 10: a protection belt (90) is fitted around all the lockers (8) so that the doors (91) of these lockers (8) are maintained shut when the lockers are moved and in order to avoid their opening within the locker system.
EP91420016A 1990-01-24 1991-01-22 Method and device for controlling and permitting access to a site or a service Expired - Lifetime EP0443962B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR9001095A FR2657446B1 (en) 1990-01-24 1990-01-24 METHOD AND DEVICE FOR CONTROLLING AND ALLOWING ACCESS TO A SITE OR A SERVICE.
FR9001095 1990-01-24

Publications (2)

Publication Number Publication Date
EP0443962A1 EP0443962A1 (en) 1991-08-28
EP0443962B1 true EP0443962B1 (en) 1997-04-23

Family

ID=9393248

Family Applications (1)

Application Number Title Priority Date Filing Date
EP91420016A Expired - Lifetime EP0443962B1 (en) 1990-01-24 1991-01-22 Method and device for controlling and permitting access to a site or a service

Country Status (4)

Country Link
EP (1) EP0443962B1 (en)
AT (1) ATE152269T1 (en)
DE (1) DE69125742T2 (en)
FR (1) FR2657446B1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2732140B3 (en) * 1995-03-21 1997-06-20 Serpi Societe D Etude Et Rech AUTOMATIC LOCKOUT DEVICE
FR2763154B1 (en) * 1996-05-17 2000-02-11 Gerard Noel Marie Joseph MULTIPLE ACCESS SETPOINT MANAGEMENT METHOD
FR2784774B1 (en) * 1998-10-14 2000-12-08 Yves Santi AUTOMATIC LOCKOUT DEVICE AND ASSOCIATED ACCESS PROCEDURE
DE10015732A1 (en) * 2000-03-29 2001-10-11 Skidata Ag Access and cost charging system uses information on a smart card transmitted by tele communications link
FR2807191B1 (en) * 2000-04-03 2003-07-25 Jean Gatellier DEPOSIT SYSTEM FOR DEPOSITING AND COLLECTING AN OBJECT

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0334726A1 (en) * 1988-03-21 1989-09-27 Mors Storing system with adjacent lockers controlled by a microprocessor device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS4812379B1 (en) * 1968-12-16 1973-04-20
US3691350A (en) * 1970-07-21 1972-09-12 Roger J Kuhns System for verifying authorized use of a credit card or the like
US3875375A (en) * 1973-06-18 1975-04-01 Frederick D Toye Reader device for coded identification card
WO1983000578A1 (en) * 1981-08-05 1983-02-17 Ohlsson, Barth, Douglas A locker
FR2544107A1 (en) * 1983-04-08 1984-10-12 Armand Daniel CONSOLE FOR THE RESERVATION OF RENTAL EQUIPMENT OR FACILITIES
US4578567A (en) * 1983-08-25 1986-03-25 Ncr Corporation Method and apparatus for gaining access to a system having controlled access thereto
FR2568032B1 (en) * 1984-07-20 1989-05-19 Lewiner Jacques CODE LOCKING DEVICE, ESPECIALLY A KEYBOARD
FR2605432B1 (en) * 1986-10-17 1989-06-09 Arnaud Olivier ANTITHEFT SECURITY DEVICE WITH AUTOMATIC LOCKING FOR CYCLES PARKING ON THE PUBLIC ROAD

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0334726A1 (en) * 1988-03-21 1989-09-27 Mors Storing system with adjacent lockers controlled by a microprocessor device

Also Published As

Publication number Publication date
FR2657446A1 (en) 1991-07-26
ATE152269T1 (en) 1997-05-15
DE69125742T2 (en) 1997-12-18
FR2657446B1 (en) 1992-04-24
DE69125742D1 (en) 1997-05-28
EP0443962A1 (en) 1991-08-28

Similar Documents

Publication Publication Date Title
CA1060583A (en) Data memory for an independent portable device_
EP0389313B1 (en) Storage system comprising a set of adjacent lockers controlled by a micro-processor
FR2586447A1 (en) MULTI-ACCESS SECURITY DEVICE
EP0334726B1 (en) Storing system with adjacent lockers controlled by a microprocessor device
EP0044039B1 (en) Individualized portable object of the credit card type
EP0359667B1 (en) Method for the remote ordering of products or various selected articles from a catalogue and for making them available at a vending place, and system for carrying out this method
EP0540095A1 (en) Microcircuit for an IC-card with protected programmable memory
CH641869A5 (en) ELECTRONIC SECURITY DEVICE WITH MODIFIABLE CODE COMBINATION AND USE OF SUCH A DEVICE.
FR2661021A1 (en) ADJACENT STORAGE SYSTEM USED IN PARTICULAR IN STATIONS OR AIRPORTS.
CA1204833A (en) Electronic identification means
EP0443962B1 (en) Method and device for controlling and permitting access to a site or a service
FR2622993A1 (en) METHOD AND APPARATUS FOR PERFORMING PERSONAL IDENTIFICATION USING INTEGRATED CIRCUIT BOARD AND PORTABLE MEMORY CARRIER FOR USE
EP0020247B1 (en) Device for the authorized opening of a door by means of a coded card
EP0037566B1 (en) System to identify a person, for instance in connexion with the control of an apparatus
FR2473755A1 (en) Secure electronic data processing for card terminal transactions - using non-erasable memory data for identification and controlled access erasable memory for transaction recording
EP0065182A2 (en) Electronic identification system
EP0065181B1 (en) System for electronic identification
EP0377535A1 (en) Locker and method for temporarily remitting an object between two persons
FR2738436A1 (en) Access control system using electronic key
FR2805561A1 (en) Electronic mechanism controlling the unlocking of safekeeping housing uses single use combination, compares input codes with memorized codes if match is found access is allowed
FR2615983A1 (en) Method and device for reading identification cards bearing information coded by a bar code, especially for access control and site management systems
BE1006668A5 (en) Method for managing procedures can opening closing the bodies of which protect lock respectively access environments subject to pay a sum of money.
BE1011094A7 (en) Programmable control system and process for process control
FR2715748A1 (en) Secure automatic payment system for self-service retailing
FR2612661A1 (en) Multiprocessor device for interconnection between computers, programmable logic controllers and peripheral terminals

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE ES FR GB IT LI

17P Request for examination filed

Effective date: 19920207

17Q First examination report despatched

Effective date: 19940202

GRAG Despatch of communication of intention to grant

Free format text: ORIGINAL CODE: EPIDOS AGRA

GRAH Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOS IGRA

GRAH Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOS IGRA

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH DE ES FR GB IT LI

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED.

Effective date: 19970423

Ref country code: ES

Free format text: THE PATENT HAS BEEN ANNULLED BY A DECISION OF A NATIONAL AUTHORITY

Effective date: 19970423

Ref country code: AT

Effective date: 19970423

REF Corresponds to:

Ref document number: 152269

Country of ref document: AT

Date of ref document: 19970515

Kind code of ref document: T

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REF Corresponds to:

Ref document number: 69125742

Country of ref document: DE

Date of ref document: 19970528

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)

Effective date: 19970929

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed
REG Reference to a national code

Ref country code: FR

Ref legal event code: RL

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 19990112

Year of fee payment: 9

REG Reference to a national code

Ref country code: FR

Ref legal event code: RN

REG Reference to a national code

Ref country code: FR

Ref legal event code: FC

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20000113

Year of fee payment: 10

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000131

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20010131

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20010131

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20010209

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 20010214

Year of fee payment: 11

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: GB

Ref legal event code: IF02

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20020121

Year of fee payment: 12

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20020122

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20020131

BERE Be: lapsed

Owner name: DELATOUR PIERRE

Effective date: 20020131

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20020122

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20030930

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST