EP3420172B1 - Secure housing with predetermined contents and dynamic management - Google Patents

Secure housing with predetermined contents and dynamic management Download PDF

Info

Publication number
EP3420172B1
EP3420172B1 EP17714845.9A EP17714845A EP3420172B1 EP 3420172 B1 EP3420172 B1 EP 3420172B1 EP 17714845 A EP17714845 A EP 17714845A EP 3420172 B1 EP3420172 B1 EP 3420172B1
Authority
EP
European Patent Office
Prior art keywords
user
housing
identifier
authenticator
door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP17714845.9A
Other languages
German (de)
French (fr)
Other versions
EP3420172A1 (en
Inventor
Stanislas SOUFFLET
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mopeasy
Original Assignee
Mopeasy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mopeasy filed Critical Mopeasy
Publication of EP3420172A1 publication Critical patent/EP3420172A1/en
Application granted granted Critical
Publication of EP3420172B1 publication Critical patent/EP3420172B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/10Safes or strong-rooms for valuables with alarm, signal or indicator
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • E05B19/0005Key safes
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/02Movement of the bolt by electromagnetic means; Adaptation of locks, latches, or parts thereof, for movement of the bolt by electromagnetic means
    • E05B47/026Movement of the bolt by electromagnetic means; Adaptation of locks, latches, or parts thereof, for movement of the bolt by electromagnetic means the bolt moving rectilinearly
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/02Details
    • E05G1/026Closures
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/02Details
    • E05G1/04Closure fasteners
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0067Monitoring
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0094Mechanical aspects of remotely controlled locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • E05B47/0002Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with electromagnets
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05YINDEXING SCHEME ASSOCIATED WITH SUBCLASSES E05D AND E05F, RELATING TO CONSTRUCTION ELEMENTS, ELECTRIC CONTROL, POWER SUPPLY, POWER SIGNAL OR TRANSMISSION, USER INTERFACES, MOUNTING OR COUPLING, DETAILS, ACCESSORIES, AUXILIARY OPERATIONS NOT OTHERWISE PROVIDED FOR, APPLICATION THEREOF
    • E05Y2900/00Application of doors, windows, wings or fittings thereof
    • E05Y2900/20Application of doors, windows, wings or fittings thereof for furniture, e.g. cabinets
    • E05Y2900/21Application of doors, windows, wings or fittings thereof for furniture, e.g. cabinets for safety cabinets

Definitions

  • the present invention relates to a kit comprising a secure box with predetermined content and dynamic management as well as a label that can be positioned on an object. It relates to the field of safes and secure boxes.
  • Another solution for vehicle sharing used in particular in sharing for the general public, is to structurally modify the vehicle to support this type of function.
  • the car is opened by a badge reader and not by a "classic" key supplied by the car manufacturer.
  • the vehicle key is then in fact in a key box inside the vehicle, in the glove box. This transformation of the vehicle brings this solution closer to closed vehicle fleet management systems and has the same cost disadvantage.
  • a second problem to be solved is to correctly associate the vehicle (s) with the content (s) of the key box since, very often, different vehicles will be parked successively in the same parking space and will share therefore the key box.
  • US2002 / 014961 A1 describes a secure box for key sharing.
  • the present invention aims to remedy all or part of these drawbacks.
  • the present invention relates to a kit according to claim 1.
  • the box made available to different users can only be locked if it is empty or contains a predetermined object.
  • the box is empty, for a user to unlock the box, place an object in it and lock the box, thanks to an authenticator of the user and an identifier of the object, the user must cumulatively be authenticated. and that the object is identified.
  • an alert signal perceptible by the user is triggered at the level of the box.
  • the box triggers an alert if the object placed in the box, for example the key and / or documents, does not correspond to the object associated with the expected vehicle.
  • the candidate user authentication means to determine whether the candidate user corresponds to the user authenticator having to deposit the object comprise a reading means, outside the box, of a identifier carried by the object, and determination whether the read identifier corresponds to the received object identifier.
  • the user who has to deposit the object is authenticated by the object itself, by reading an electronic label, which simplifies the procedure. and makes it possible to check, even before opening the door of the box, that the object to be deposited is indeed in the hands of the user and may therefore be in the box after locking the door.
  • a second authenticator being defined for a second user, the box does not unlock until authentication is carried out by means of this other authenticator.
  • the controller is suitable for, after unlocking, if the object identification device indicates that the identified object remains in the housing beyond a predetermined time, triggering an alert perceptible by the object. user at box level.
  • the box checks, after unlocking, the absence of identification of the object.
  • a user-perceptible alert signal is triggered at the level of the housing.
  • the means for receiving an identifier of an object is suitable for communicating with an identification server and for receiving an identifier of the object from the server.
  • the identifiers of the objects can be managed centrally and each box can easily be made the recipient of an object to be deposited.
  • the identification device performs the identification of the predetermined object by recognizing the identification code, the identification code being reproduced on the object.
  • the user associates a code medium with the object, for example by pasting the label on an administrative document. This facilitates the implementation of the service, by the user.
  • the object identification device is an electronic tag reader adapted to read an electronic tag associated with the object and keeping the identification code.
  • the controller is adapted to transmit the alert to a user of the box by light and / or sound means.
  • the controller is adapted to transmit the alert to an alert reception server.
  • the alerts can be stored and time-stamped, which ensures traceability of the stages of the service.
  • the box that is the subject of the present invention comprises a transceiver suitable for communicating with an authentication server and for receiving from the server at least one user authenticator.
  • a server can manage user credentials centrally and each unit can easily be made accessible to each user of the service.
  • the box that is the subject of the present invention comprises a transceiver suitable for transmitting a user authenticator read on the object by the authentication means to an authentication server and receiving from the authentication server correspondence information of the read authenticator with a user authenticator.
  • the authentication is performed by the server, in a more secure manner than authentication performed by the box.
  • the authentication means comprise a keyboard and the authentication means are suitable for authenticating the user by entering an authenticator on the keyboard and comparing with an authenticator calculated in the absence of connection with a server.
  • the user can receive a code on a communicating portable terminal, for example a mobile telephone, and enter it. It therefore does not need a physical key.
  • At least one user authenticator is for single use.
  • At least one authenticator is for limited time use.
  • the door is movable in vertical sliding between the closed position and the open position so that gravity maintains the door in the closed position in the absence of another force
  • the locking device has a notch in the door and a pin integral with the housing, the pin being held in the notch by a spring when the door is closed.
  • the locking device further comprises means for translational movement of the pin adapted to cause it to come out of the notch and thus unlock the door on the order of the controller.
  • the housing that is the subject of the present invention comprises a single maintenance opening lock and no visible fixing clip.
  • the housing is thus protected against physical attack, the latter generally being carried out on a fastening clip.
  • the present invention relates to a method according to claim 10.
  • the candidate user authentication step to determine whether the candidate user corresponds to the stored user authenticator to deposit the object comprises a reading step, outside the box, d an identifier carried by the object, and determining whether the identifier read corresponds to the object identifier received.
  • the method that is the subject of the present invention further comprises, after unlocking, if the step of identifying the object indicates that the identified object remains in the housing beyond a predetermined time. , a step of triggering an alert perceptible by the user at the level of the box.
  • the present invention relates to a use of a box that is the subject of the present invention for car sharing, a first user inserting at least one vehicle key into the box and a second user recovering the key in the box.
  • an “object” is called a set of one or more pre-identifiable objects individually or collectively, and having to be deposited or withdrawn all at the same time during an opening / closing operation of the case.
  • a vehicle key and administrative documents jointly constitute an object.
  • An object to be deposited and then removed from a box is associated with an identifier.
  • each part of the set can be physically associated with a part of the identifier of the object.
  • a vehicle key may carry an electronic tag bearing a first code and the administrative documents may bear a second electronic tag bearing a second code, the first and second codes jointly forming the identifier of the object comprising the key and administrative documents.
  • this is the sharing of vehicles in a general public environment, also called “car sharing”.
  • vehicle owner users make this vehicle available at a specific location and for a specific period of time via a web site (“web”).
  • web web site
  • Temporary third-party users that is to say other than the owner or his close acquaintances, make requests for the rental and use of the vehicle, always via the web site.
  • a box preferably associated with a parking space, intended to receive the key and the administrative documents (gray card, insurance certificate) of the vehicle located nearby, will be described.
  • a housing 1 comprises an interior volume 3 closed by a door 5.
  • the door 5 is movable between a closed position, in which the door 5 closes the interior volume 3, and an open position, which allows access to the interior volume 3 .
  • the door 5 comprises a locking device 7 adapted to lock the door in the closed position.
  • the locking device 7 is, for example, a lock, a latch or an electric strike, or any other device known to those skilled in the art for securely closing a door.
  • the box 1 further comprises a controller 9 of the locking device 7.
  • the controller 9 is connected to an object identification device 11.
  • the controller 9 is an electronic computing unit which controls the electrical maneuvering means of the device. locking device 9.
  • the object identification device 11 is for example an electronic tag reader, or RFID tags (standing for “Radio Frequency Identification” for radio-frequency identification) or NFC (standing for “near field communication”). “For near-field communication), or barcode, in one or two dimensions, or QR code (“ QR-code ”is a registered trademark).
  • the object to be identified typically the vehicle key as well as the administrative documents of the vehicle, are associated with one or more labels keeping an identification code, or identifier, so that the identification device 11 is able to read the information. 'identifier, or identifiers, of the key and documents.
  • the controller 9 is connected to a warning device 13 such as a flashing light or a sound signal generator. Thus, if the controller 9 determines that the identifier read does not correspond to an expected identifier, the controller 9 can trigger an alert on the alert device 13. This alert signals to the temporary user that, for example, he has forgot to put the documents in the box or the wrong key.
  • a warning device 13 such as a flashing light or a sound signal generator.
  • the box 1 comprises a transmitter / receiver 15 connected to the controller 9 so as to allow the controller 9 to establish data communication with an identification server 21.
  • This identification server 21 is, for example, linked to the sharing management web server. Depending on the vehicle expected in the parking space, the identification server 21 is able to indicate to the controller 9 each identification code corresponding to the expected vehicle and therefore each key identification code and / or document to be find in the housing 1.
  • the controller 9 is able to indicate to the identification server 21 either that each expected object is indeed in the box 1, or that there is a problem / an alert because no expected object is present, or only that part of the expected assembly is present, or that an object, for example a key and / or a document does not correspond to the expected vehicle is present in the interior volume 3.
  • the box 1 further comprises authentication means 17 of a temporary user, connected to the controller 9.
  • These authentication means 17 are, for example, a digital code by which the temporary user enters a secret code associated with the temporary user.
  • These authentication means 17 are, preferably, a transmitter / receiver for an electronic tag, or a transmitter / receiver implementing the Bluetooth protocol (registered trademark) allowing a data link with a communicating portable terminal (for example a mobile telephone). of the temporary user, this terminal operating a dedicated application making it possible to transmit an authenticator to the box 1.
  • the controller 9 only transmits an unlocking order to the locking device 7 after authentication of the temporary user.
  • the controller 9 is connected to a second transmitter / receiver 19 to communicate with an authentication server 23.
  • the controller 9 can thus receive from the authentication server 23 the authenticator of the temporary user to practice locally. the authentication procedure.
  • the authentication device 17 is put in direct relation with the authentication server 23 which performs the authentication procedure and sends the controller 9 a piece of authentication information, whether successful or not.
  • the temporary user has a unique authenticator, that is to say that no other user has the same authenticator, which cannot be reused and has a limited period of use.
  • This authenticator is managed, for example generated randomly, and associated with a temporary user, by the authentication server 23 as part of the authentication procedure.
  • this authenticator is calculated by a mathematical function applied to a time stamp and to an identifier of box 1.
  • the temporary user receives the authenticator, preferably by means of a mobile telephone network, for example in the form of a short text message type (“SMS” for short message system) or of a message received by the dedicated application installed on their communicating portable terminal.
  • SMS short text message type
  • the operating mode of the key box is then as follows.
  • the owner of the rental vehicle registered his vehicle and in return received an RFID tag to stick on the vehicle key.
  • Box 1 is in the locked closed state with no key identifier.
  • step 31 the owner user identifies himself as the person who will deposit a key.
  • step 33 the box 1 accepts the identification and opens the door.
  • step 35 the owner user puts the key in the box.
  • step 37 the identification device 11 reads the identifier of the key which is sent back to the server 21.
  • step 39 the door of the housing 1 is closed and locked.
  • the procedure for hiring a vehicle includes the following steps.
  • the housing 1 is in the closed state locked with an object in the interior volume 3, typically a key, identified.
  • step 41 the temporary user authenticates himself, for example by entering a unique code which has been provided to him by the sharing web server.
  • step 43 the unit 1 having validated that it is the expected temporary user unlocks the door. If it is not the expected temporary user, box 1 remains locked and an alert is triggered locally as on the authentication server (step not shown).
  • step 45 the temporary user takes the key.
  • the box 1 notes the key being taken because the identification device 11 no longer receives an identification signal. Box 1 goes into “empty” status and sends the information to the identification server. The system then considers that the temporary user has taken charge of the vehicle and that the rental has started.
  • step 47 after a temporary user action or a delay, the door closes and locks.
  • the procedure for terminating the rental and handing over the key comprises the following steps, figure 4 .
  • Box 1 is in the closed, locked and empty state.
  • step 51 the temporary user authenticates himself, for example by entering a unique code which has been provided to him by the sharing web server.
  • step 53 the unit 1 having validated that it is the expected temporary user unlocks the door. If it is not the expected temporary user, box 1 remains locked and an alert is triggered locally as on the authentication server (step not shown).
  • step 55 the temporary user places the key in the box 1.
  • step 57 the unit 1 verifies that the key placed is indeed the expected key.
  • step 59 the case closes and locks.
  • the system considers that the vehicle has been returned and the rental ends. A notification is sent to the temporary user and to the owner user to inform them of the end of the customer journey.
  • step 60 the unit 1 triggers a local alert and informs the identification server.
  • the local alert can allow the temporary user to realize that he has made an error, for example, by using the wrong key, or by forgetting to put it in the box 1.
  • the box 1 being open, the user temporary can correct its error by setting the expected key and the procedure continues at step 59.
  • the alert triggers corrective procedures at the system level such as the call of the temporary user and / or the owner user by an operator, etc.
  • the housing 1 comprises a base plate 61 composed of a circular part 63 extended by a substantially rectangular part 65.
  • the base plate 61 has holes 67 making it possible to firmly fix the housing 1 on a support such as a wall.
  • the bottom plate 61 also includes attachment supports 69 for fixing a protective shell.
  • a reinforced container 71 corresponding to the interior volume of the case is firmly fixed on the base plate 61.
  • This container 71 is closed by a door 73.
  • the door 73 slides in a vertical translational movement along two slides 75, 77.
  • the door 73 has an embossing 79 allowing a user to put a finger therein to lift it in the direction of the arrow 81.
  • the assembly is therefore mounted so that the arrow points to the vertical axis upwards.
  • the door 73 has on its top side a notch 83 in which a pin 85 is positioned.
  • the pin 85 is mounted on a support 87 secured to the bottom plate 61, and therefore to the container 71.
  • the pin 85 is shown in the locked position, that is to say that the pin 85 prevents the door from rising and therefore giving access to the container 71.
  • the figure 6 shows a close-up view of pin 85 in the locked position.
  • the pin 85 is mounted on the support 87 so as to be able to perform a translational movement perpendicular to the plane of the door 61 between the locked position and an unlocked position allowing the free sliding of the door 61, as shown in the figure. figure 7 .
  • This translational movement of the pin is controlled by an electromagnet 89.
  • the rest position of the pin corresponds to the locked position.
  • the circular part 63 contains the electronic control part and the protective shells have the appropriate openings to obviously allow direct access to the door but also to position a user interface in the form of a small alphanumeric screen and / or a keyboard digicode type.
  • the protective shells are arranged, when they are in position, so as not to allow any screws or disassembly means to appear without degradation of the equipment.
  • the circular part of the shell snaps onto the attachment supports 69 by a rotational movement then once this circular part has been positioned.
  • the parallelepipedal part of the hull slips and attaches to the attachment supports 69 of the rectangular part 65 of the support so that, being in position this part parallelepiped any rotation of the circular part of the shell and therefore any unlocking.
  • the shells are such that no screws or fasteners are visible and the arrangement of their faces prevents degradation or attempted break-in. They are locked in position by a unique lock, the key of which is only held by the maintenance technicians.
  • the two servers and the transceivers can be combined into a single server and a single transceiver.
  • a vehicle sharing system 90 This system only implements a single server, which hosts a web site and manages object identifiers and user credentials.
  • the system 90 comprises a securely closed housing 91 having an interior volume 93 and a door 95 movable between a closed position and an open position (shown, in figure 8 , in open position), the housing 91 comprising an electrically controlled locking device 97 adapted to lock the door in the closed position.
  • the box 91 also comprises a means 98 for accessing an identifier of an object associated with a time slot for depositing this object.
  • this access means 98 communicates with a server 92, over a mobile telephone network or a network of connected objects, for example Sigfox (registered trademark) or Lora (registered trademark).
  • the box 91 comprises a device or reader 101 for identifying an object present in the interior volume 93 of the box 91.
  • an identifier for example an electronic label or a printed code
  • the identification reader 101 reads this object identifier and provides this identifier to a controller 99 of the locking device 97.
  • the controller 99 is adapted to transmit a locking command to the locking device 97 after the reader object identification 101 has provided an object identifier which corresponds to the identifier received by the box 91 from the server 92 for the current time.
  • the controller 99 is, moreover, adapted to trigger an alert and to inhibit the locking of the door when the object identification reader 101 provides an object identifier which does not correspond to the object identifier received by. the box 91 from the server 92 for the current time.
  • the box 91 also comprises means 100 for authenticating a user, connected to the controller 99, to determine whether the user corresponds to the authenticator. memorized by the storage means 94.
  • the authentication means 100 can be a code lock (“digicode”, see figure 1 , reference 17), or, as in figure 8 , an electronic tag or code reader displayed on a communicating portable terminal screen 96 or communicated at a short distance by such a terminal 96.
  • the user is then authenticated by what he knows, that is to say a code, or by what it possesses, that is to say a code carrier (an electronic tag or a communicating portable terminal having received a user authenticator.
  • the authentication of the user is made by a biometric measurement, for example a recognition of fingerprint, shape of hand, voice or face.
  • the authentication means 100 are suitable for comparing the authenticator obtained from the user with the authenticator accessed by the access means 94.
  • the controller 99 is suitable for, when the door 95 is closed and the object identification device 101 indicates that the interior volume 93 of the housing 91 does not contain any identified object, transmitting an unlock command to the locking device 97 only after authentication of the user by the authentication means 100.
  • the box 91 made available to different users can only be locked if it is empty or contains a predetermined object.
  • an authenticator of the user and an identifier of the object are associated with a first time slot and, only during this first time slot and cumulatively, the user is authenticated and the object is identified.
  • an alert signal perceptible by the user is triggered at the level of the box 91.
  • another authenticator is associated with a second time slot after the first time slot, the door 95 of the box 91 not being unlocked until authentication, by means of this other authenticator during this second time slot. time slots.
  • the housing 91 checks, after unlocking followed by a predetermined period, for example ten seconds, the absence of identification of the object. In the event that the user is authenticated but the identified object remains in the box beyond this predetermined time, an alert signal perceptible by the user is triggered at the level of the box 91.
  • Each successful identification, successful authentication and alert is transmitted to the server 92, where it is time-stamped and stored, for traceability.
  • the alert is transmitted to a user of the box 91 by light and / or sound means 103 and / or by means of the communicating mobile terminal 96.
  • each authenticator is for single use and / or for limited use in time, through the time slot with which the authenticator is associated.
  • the user authentication means 100 are means for authenticating the object that the user must place in the box 91 during the current time slot, while the object is outside the box 91, by reading and recognizing the identifier carried by the object, this identifier being identical to the object identifier received by the box 91 from the server 92, for the current time slot.
  • the housing preferably uses an identifier reader independent of the object identification device 101 located inside. of the interior volume 93 of the housing 91.
  • two readers of different identifiers are used and the identifier reading by an identifier reader makes it possible to know the position of the object, at the 'inside or outside the housing 91.
  • the user authentication is thus performed by recognition of the user or by the presence of the object carrying the received identifier.
  • the authentication and / or identification functions are deported in the server 92, the box 91 then serving as an authenticator and / or peripheral identifier reader for the server 92, which transmits the instructions to the box 91. locking and unlocking and emission of warning signals.
  • a subscriber to the service implemented by the web site hosted by the server 92 can leave his self-service car key in any empty safe which is not yet waiting for an object, the server 92 recognizing this key and assigning it to any requester, who can request it later.
  • the status of the box 91 is visible outside the box 91, for example by means of diodes of different colors.
  • the server sends the user credentials and the object identifiers to the box.
  • the authentication and / or the identification are carried out by the server and / or each authenticator is calculated in a deterministic manner by the box.
  • a candidate user having to deposit an object presents himself in front of the box and provides a user authenticator.
  • the controller of the box verifies that the authenticator of the user candidate for access to the interior volume of the box corresponds to the user authenticator having to deposit an object received from the server, for the current time slot. If not, the enclosure door remains locked.
  • the controller unlocks the door of the box and reads the identifier of the object deposited in its interior volume. If, after a predetermined time, for example ten seconds, no object identifier is read or if an object identifier read does not correspond to the object identifier received from the server for the current time slot , the controller triggers an alert perceptible by the user at the level of the box, during a step 117.
  • the controller locks the door of the box.
  • the box made available to different users can only be locked if it is empty or contains a predetermined object.
  • the enclosure is empty, for a user to unlock the enclosure door, place an object in it, and trigger the enclosure door lock, only when during the time slot allocated to this object depot and cumulatively, the user is authenticated and the object is identified.
  • an alert signal perceptible by the user is triggered at the level of the box.
  • a user candidate having to remove the object presents himself in front of the box and provides a user authenticator.
  • the controller of the box verifies that the authenticator of the user candidate for access to the interior volume of the box corresponds to the user authenticator having to deposit an object received from the server, for the current time slot. If not, the enclosure door remains locked.
  • the controller unlocks the door of the box and reads the identifier of the object deposited in its interior volume. If, after a predetermined period, for example ten seconds, an object identifier is read, identical or different from the identifier of the object present in the box during step 119, the controller triggers an alert perceptible by the user at the level of the box, during a step 122.
  • the controller locks access to the interior volume of the enclosure either when no object identifier is read, or when an object identifier is read for a predetermined period of time, for example one minute, after the triggering of the alert, during a step 123.
  • the housing door is not unlocked until the authentication of the user to remove the object.
  • the box checks, after unlocking followed by a predetermined time, for example ten seconds, the absence of identification of the object. In the event that the user is authenticated but the identified object remains in the box beyond this predetermined time, an alert signal perceptible by the user is triggered at the level of the box.
  • Each successful identification, successful authentication and alert is transmitted to the server, where it is time-stamped and stored, for traceability.
  • the alert is transmitted to a user of the box by light and / or sound means and / or by means of the communicating mobile terminal.
  • each authenticator is for single use and / or for limited use in time, through the time slot with which the authenticator is associated.
  • User authentication is thus performed by recognition of the user or by the presence of the object bearing the identifier received near the box.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Lock And Its Accessories (AREA)
  • Closures For Containers (AREA)

Description

La présente invention concerne un kit comprenant un boîtier sécurisé à contenu prédéterminé et gestion dynamique ainsi qu'une étiquette positionnable sur un objet. Elle se rapporte au domaine des coffres forts et boîtiers sécurisés.The present invention relates to a kit comprising a secure box with predetermined content and dynamic management as well as a label that can be positioned on an object. It relates to the field of safes and secure boxes.

Etat de la techniqueState of the art

Il est connu de l'homme du métier des boîtiers sécurisés permettant de partager un objet, tel qu'une clé d'accès à un lieu (appartement, maison, partie de maison, garage, dépendance, etc.) ou à un véhicule, entre plusieurs personnes. Le mode le plus simple est un boîtier fermé à clé dont la clé est copiée en autant d'exemplaires que d'utilisateurs et qui contient la clé d'accès à un lieu ou à un véhicule. La clé d'ouverture du boîtier peut être remplacée par divers systèmes d'accès tels que, par exemple, un digicode, une empreinte biométrique, etc.It is known to those skilled in the art of secure boxes making it possible to share an object, such as an access key to a place (apartment, house, part of a house, garage, outbuilding, etc.) or to a vehicle, between several people. The simplest mode is a locked box whose key is copied in as many copies as there are users and which contains the access key to a place or a vehicle. The key to open the housing can be replaced by various access systems such as, for example, a digital code, a biometric fingerprint, etc.

Dans le cadre plus particulier du partage de véhicule, la solution la plus classique, mais réservée à des flottes fermées de véhicules, est la boîte à clés contenant une multitude de clés correspondant aux véhicules stationnés dans un garage. Ces solutions sont donc limitées aux situations où les véhicules sont toujours stationnés dans un garage. Elles sont donc onéreuses puisqu'elles impliquent un gardiennage.In the more specific context of vehicle sharing, the most classic solution, but reserved for closed fleets of vehicles, is the key box containing a multitude of keys corresponding to vehicles parked in a garage. These solutions are therefore limited to situations where the vehicles are always parked in a garage. They are therefore expensive since they involve guarding.

Une autre solution pour le partage de véhicule, utilisée en particulier dans les partages pour le grand public, est de modifier structurellement le véhicule pour supporter ce type de fonction. L'ouverture de la voiture est faite par un lecteur de badge et non par une clé « classique » fournie par le fabricant de l'automobile. La clé du véhicule est alors en fait dans une boîte à clés à l'intérieur du véhicule, dans la boîte à gants. Cette transformation du véhicule rapproche cette solution des systèmes fermés de gestion de parcs de véhicules et présentent le même inconvénient de coût.Another solution for vehicle sharing, used in particular in sharing for the general public, is to structurally modify the vehicle to support this type of function. The car is opened by a badge reader and not by a "classic" key supplied by the car manufacturer. The vehicle key is then in fact in a key box inside the vehicle, in the glove box. This transformation of the vehicle brings this solution closer to closed vehicle fleet management systems and has the same cost disadvantage.

Par ailleurs, se pose le problème d'authentifier la personne qui se présente comme étant bien l'utilisateur temporaire prévu pour le véhicule.Furthermore, there is the problem of authenticating the person who presents himself as being the temporary user intended for the vehicle.

Un second problème à résoudre est d'associer correctement le(s) véhicule(s) avec le(s) contenu(s) de la boîte à clé puisque, très souvent, des véhicules différents stationneront successivement sur la même place de stationnement et partageront donc la boîte à clé. US2002/014961 A1 décrit un boîtier sécurisé pour partage de clés.A second problem to be solved is to correctly associate the vehicle (s) with the content (s) of the key box since, very often, different vehicles will be parked successively in the same parking space and will share therefore the key box. US2002 / 014961 A1 describes a secure box for key sharing.

Brève description de l'inventionBrief description of the invention

La présente invention vise à remédier à tout ou partie de ces inconvénients.The present invention aims to remedy all or part of these drawbacks.

A cet effet, selon un premier aspect, la présente invention vise un kit selon la revendication 1. To this end, according to a first aspect, the present invention relates to a kit according to claim 1.

Ainsi, contrairement à ce qui était connu dans l'art antérieur, le boîtier mis à disposition de différents utilisateurs ne peut être verrouillé que s'il est vide ou contient un objet prédéterminé. Lorsque le boîtier est vide, pour qu'un utilisateur déverrouille le boîtier, y place un objet et verrouille le boîtier, grâce à un authentifiant de l'utilisateur et un identifiant de l'objet, il faut cumulativement, que l'utilisateur soit authentifié et que l'objet soit identifié. Au cas où l'utilisateur est authentifié mais que l'objet n'est pas identifié, un signal d'alerte perceptible par l'utilisateur est déclenché au niveau du boîtier.Thus, contrary to what was known in the prior art, the box made available to different users can only be locked if it is empty or contains a predetermined object. When the box is empty, for a user to unlock the box, place an object in it and lock the box, thanks to an authenticator of the user and an identifier of the object, the user must cumulatively be authenticated. and that the object is identified. In the event that the user is authenticated but the object is not identified, an alert signal perceptible by the user is triggered at the level of the box.

Dans le cas de l'auto-partage, le boîtier déclenche une alerte si l'objet mis dans le boîtier, par exemple la clé et/ou des documents, ne correspond pas à l'objet associé au véhicule attendu.In the case of car-sharing, the box triggers an alert if the object placed in the box, for example the key and / or documents, does not correspond to the object associated with the expected vehicle.

Les moyens d'authentification de l'utilisateur candidat pour déterminer si l'utilisateur candidat correspond à l'authentifiant d'utilisateur devant réaliser le dépôt de l'objet, comportent un moyen de lecture, à l'extérieur du boîtier, d'un identifiant porté par l'objet, et détermination si l'identifiant lu correspond à l'identifiant d'objet reçu.The candidate user authentication means to determine whether the candidate user corresponds to the user authenticator having to deposit the object, comprise a reading means, outside the box, of a identifier carried by the object, and determination whether the read identifier corresponds to the received object identifier.

Grâce à ces dispositions, on authentifie l'utilisateur devant déposer l'objet par l'objet lui-même, par lecture d'une étiquette électronique, ce qui simplifie la procédure et permet de vérifier, avant même d'ouvrir la porte du boîtier, que l'objet à déposer est bien entre les mains de l'utilisateur et pourra donc se trouver dans le boîtier après le verrouillage de la porte.Thanks to these provisions, the user who has to deposit the object is authenticated by the object itself, by reading an electronic label, which simplifies the procedure. and makes it possible to check, even before opening the door of the box, that the object to be deposited is indeed in the hands of the user and may therefore be in the box after locking the door.

Dans des modes de réalisation, le boîtier objet de la présente invention comporte, de plus :

  • un moyen d'accès à un authentifiant d'un utilisateur devant retirer l'objet,
  • des moyens d'authentification d'un utilisateur candidat pour, après verrouillage de la porte en présence de l'objet dans le boîtier, déterminer si l'utilisateur candidat correspond à l'authentifiant d'utilisateur devant retirer l'objet,
  • le contrôleur du dispositif de verrouillage étant adapté, de plus, pour, lorsque la porte est fermée et que le dispositif d'identification d'objet a indiqué que le boîtier contient un objet identifié, ne transmettre une commande de déverrouillage au dispositif de verrouillage qu'après authentification de l'utilisateur devant retirer l'objet.
In some embodiments, the case that is the subject of the present invention further comprises:
  • a means of access to an authenticator of a user who has to withdraw the object,
  • means for authenticating a candidate user for, after locking the door in the presence of the object in the box, determining whether the candidate user corresponds to the user authenticator to remove the object,
  • the controller of the locking device being adapted, moreover, for, when the door is closed and the object identification device has indicated that the box contains an identified object, only transmitting an unlock command to the locking device 'after authentication of the user to remove the object.

Ainsi, un deuxième authentifiant étant défini pour un deuxième utilisateur, le boîtier ne se déverrouille pas jusqu'à l'authentification par le biais de cet autre authentifiant.Thus, a second authenticator being defined for a second user, the box does not unlock until authentication is carried out by means of this other authenticator.

Dans des modes de réalisation, le contrôleur est adapté pour, après déverrouillage, si le dispositif d'identification de l'objet indique que l'objet identifié reste dans le boîtier au-delà d'une durée prédéterminée, déclencher une alerte perceptible par l'utilisateur au niveau du boîtier.In some embodiments, the controller is suitable for, after unlocking, if the object identification device indicates that the identified object remains in the housing beyond a predetermined time, triggering an alert perceptible by the object. user at box level.

Ainsi, le boîtier vérifie, après déverrouillage, l'absence d'identification de l'objet. Au cas où l'utilisateur est authentifié mais que l'objet identifié reste dans le boîtier au-delà d'une durée prédéterminée, un signal d'alerte perceptible par l'utilisateur est déclenché au niveau du boîtier.Thus, the box checks, after unlocking, the absence of identification of the object. In the event that the user is authenticated but the identified object remains in the housing beyond a predetermined time, a user-perceptible alert signal is triggered at the level of the housing.

Dans des modes de réalisation, le moyen de réception d'un identifiant d'un objet est adapté pour communiquer avec un serveur d'identification et pour recevoir du serveur un identifiant de l'objet.In some embodiments, the means for receiving an identifier of an object is suitable for communicating with an identification server and for receiving an identifier of the object from the server.

Grâce à ces dispositions, les identifiants des objets peuvent être gérés de manière centralisée et chaque boîtier peut aisément être rendu destinataire d'un objet à déposer.Thanks to these arrangements, the identifiers of the objects can be managed centrally and each box can easily be made the recipient of an object to be deposited.

Dans des modes de réalisation, le dispositif d'identification effectue l'identification de l'objet prédéterminé par reconnaissance du code d'identification, le code d'identification étant reproduit sur l'objet.In some embodiments, the identification device performs the identification of the predetermined object by recognizing the identification code, the identification code being reproduced on the object.

Grâce à ces dispositions, l'utilisateur associe un support de code à l'objet, par exemple par collage de l' étiquette sur un document administratif. Ce qui facilite la mise en œuvre du service, par l'utilisateur.Thanks to these arrangements, the user associates a code medium with the object, for example by pasting the label on an administrative document. This facilitates the implementation of the service, by the user.

Dans des modes de réalisation, le dispositif d'identification d'objet est un lecteur d'étiquette électronique adapté pour lire une étiquette électronique associée à l'objet et conservant le code d'identification.In some embodiments, the object identification device is an electronic tag reader adapted to read an electronic tag associated with the object and keeping the identification code.

Grâce à ces dispositions, quelle que soit la configuration géométrique de l'objet, à l'endroit, à l'envers ou dans une pochette, l'objet peut être identifié facilement et rapidement. De plus, la falsification d'une étiquette électronique est plus complexe que celle d'une étiquette imprimée. On peut donc sécuriser le service en mettant en œuvre des étiquettes électroniques.Thanks to these arrangements, whatever the geometric configuration of the object, right side up, upside down or in a pocket, the object can be identified easily and quickly. In addition, forgery of an electronic label is more complex than that of a printed label. We can therefore secure the service by implementing electronic labels.

Dans des modes de réalisation, le contrôleur est adapté pour transmettre l'alerte à un utilisateur du boîtier par des moyens lumineux et/ou sonores.In some embodiments, the controller is adapted to transmit the alert to a user of the box by light and / or sound means.

Grâce à ces dispositions, l'utilisateur est immédiatement averti d'une erreur de sa part.Thanks to these provisions, the user is immediately warned of an error on his part.

Dans des modes de réalisation, le contrôleur est adapté pour transmettre l'alerte à un serveur de réception d'alertes.In some embodiments, the controller is adapted to transmit the alert to an alert reception server.

Grâce à ces dispositions, les alertes peuvent être mémorisées et horodatées, ce qui assure une traçabilité des étapes du service.Thanks to these provisions, the alerts can be stored and time-stamped, which ensures traceability of the stages of the service.

Dans des modes de réalisation, le boîtier objet de la présente invention comporte un émetteur-récepteur adapté pour communiquer avec un serveur d'authentification et pour recevoir du serveur au moins un authentifiant d'utilisateur.In some embodiments, the box that is the subject of the present invention comprises a transceiver suitable for communicating with an authentication server and for receiving from the server at least one user authenticator.

Grâce à ces dispositions, un serveur peut gérer les authentifiants d'utilisateurs de manière centralisée et chaque boîtier peut aisément être rendu accessible à chaque utilisateur du service.Thanks to these arrangements, a server can manage user credentials centrally and each unit can easily be made accessible to each user of the service.

Dans des modes de réalisation, le boîtier objet de la présente invention comporte un émetteur-récepteur adapté pour transmettre un authentifiant d'utilisateur lu sur l'objet par les moyens d'authentification à un serveur d'authentification et recevoir du serveur d'authentification une information de correspondance de l'authentifiant lu avec un authentifiant d'utilisateur.In some embodiments, the box that is the subject of the present invention comprises a transceiver suitable for transmitting a user authenticator read on the object by the authentication means to an authentication server and receiving from the authentication server correspondence information of the read authenticator with a user authenticator.

Grâce à ces dispositions, l'authentification est réalisée par le serveur, de manière plus sécurisée qu'une authentification réalisée par le boîtier.Thanks to these arrangements, the authentication is performed by the server, in a more secure manner than authentication performed by the box.

Dans des modes de réalisation, les moyens d'authentification comportent un clavier et les moyens d'authentification sont adaptés pour authentifier l'utilisateur par saisie d'un authentifiant sur le clavier et comparaison avec un authentifiant calculé en l'absence de connexion avec un serveur.In some embodiments, the authentication means comprise a keyboard and the authentication means are suitable for authenticating the user by entering an authenticator on the keyboard and comparing with an authenticator calculated in the absence of connection with a server.

Grâce à ces dispositions, l'utilisateur peut recevoir un code sur un terminal portable communicant, par exemple un téléphone mobile, et le saisir. Il n'a donc pas besoin d'une clé physique.Thanks to these arrangements, the user can receive a code on a communicating portable terminal, for example a mobile telephone, and enter it. It therefore does not need a physical key.

Dans des modes de réalisation, au moins un authentifiant d'utilisateur est à usage unique.In embodiments, at least one user authenticator is for single use.

Grâce à ces dispositions, le risque de capture et de réutilisation d'un authentifiant par un tiers non autorisé est réduit.Thanks to these provisions, the risk of capture and reuse of an authenticator by an unauthorized third party is reduced.

Dans des modes de réalisation, au moins un authentifiant est à usage limité dans le temps.In some embodiments, at least one authenticator is for limited time use.

Grâce à ces dispositions, le risque de capture et de réutilisation d'un authentifiant par un tiers non autorisé est réduit.Thanks to these provisions, the risk of capture and reuse of an authenticator by an unauthorized third party is reduced.

Dans des modes de réalisation, la porte est mobile en coulissement vertical entre la position fermée et la position ouverte de sorte que la gravité maintient la porte en position fermée en l'absence d'une autre force, et en ce que le dispositif de verrouillage comporte une encoche dans la porte et une goupille solidaire du boîtier, la goupille étant maintenue dans l'encoche par un ressort lorsque la porte est fermée.In embodiments, the door is movable in vertical sliding between the closed position and the open position so that gravity maintains the door in the closed position in the absence of another force, and in that the locking device has a notch in the door and a pin integral with the housing, the pin being held in the notch by a spring when the door is closed.

Grâce à ces dispositions, même en cas de panne électrique, l'objet déposé par l'utilisateur est protégé par la porte du boîtier.Thanks to these arrangements, even in the event of an electrical failure, the object deposited by the user is protected by the door of the housing.

Dans des modes de réalisation, le dispositif de verrouillage comporte de plus des moyens de déplacement en translation de la goupille adaptés pour la faire sortir de l'encoche et ainsi déverrouiller la porte sur ordre du contrôleur.In some embodiments, the locking device further comprises means for translational movement of the pin adapted to cause it to come out of the notch and thus unlock the door on the order of the controller.

Dans des modes de réalisation, le boîtier objet de la présente invention comporte une serrure unique d'ouverture de maintenance et aucune attache de fixation apparente.In some embodiments, the housing that is the subject of the present invention comprises a single maintenance opening lock and no visible fixing clip.

Le boîtier est ainsi protégé contre une agression physique, celle-ci étant généralement effectuée sur une attache de fixation.The housing is thus protected against physical attack, the latter generally being carried out on a fastening clip.

Selon un deuxième aspect, la présente invention vise un procédé selon la revendication 10. According to a second aspect, the present invention relates to a method according to claim 10.

L'étape d'authentification de l'utilisateur candidat pour déterminer si l'utilisateur candidat correspond à l'authentifiant mémorisé d'utilisateur devant réaliser le dépôt de l'objet, comporte une étape de lecture, à l'extérieur du boîtier, d'un identifiant porté par l'objet, et de détermination si l'identifiant lu correspond à l'identifiant d'objet reçu.The candidate user authentication step to determine whether the candidate user corresponds to the stored user authenticator to deposit the object, comprises a reading step, outside the box, d an identifier carried by the object, and determining whether the identifier read corresponds to the object identifier received.

Dans des modes de réalisation, le procédé objet de la présente invention comporte, de plus :

  • une étape d'accès à un authentifiant d'un utilisateur devant retirer l'objet,
  • une étape d'authentification d'un utilisateur candidat pour, après verrouillage de la porte en présence de l'objet dans le boîtier, déterminer si l'utilisateur candidat correspond à l'authentifiant mémorisé d'utilisateur devant retirer l'objet, et
  • lorsque la porte est fermée et que le dispositif d'identification d'objet a indiqué que le boîtier contient un objet identifié, ne transmettre une commande de déverrouillage au dispositif de verrouillage qu'après authentification de l'utilisateur devant retirer l'objet.
In some embodiments, the method that is the subject of the present invention further comprises:
  • a step of accessing an authenticator of a user who has to remove the object,
  • a step of authenticating a candidate user for, after locking the door in the presence of the object in the box, determining whether the candidate user corresponds to the stored user authenticator to remove the object, and
  • when the door is closed and the object identification device has indicated that the box contains an identified object, only transmit an unlock command to the locking device after authentication of the user who has to remove the object.

Dans des modes de réalisation, le procédé objet de la présente invention comporte, de plus, après déverrouillage, si l'étape d'identification de l'objet indique que l'objet identifié reste dans le boîtier au-delà d'une durée prédéterminée, une étape de déclenchement d'une alerte perceptible par l'utilisateur au niveau du boîtier.In some embodiments, the method that is the subject of the present invention further comprises, after unlocking, if the step of identifying the object indicates that the identified object remains in the housing beyond a predetermined time. , a step of triggering an alert perceptible by the user at the level of the box.

Selon un troisième aspect, la présente invention vise une utilisation d'un boîtier objet de la présente invention pour un autopartage, un premier utilisateur insérant dans le boîtier au moins une clé de véhicule et un deuxième utilisateur récupérant la clé dans le boîtier.According to a third aspect, the present invention relates to a use of a box that is the subject of the present invention for car sharing, a first user inserting at least one vehicle key into the box and a second user recovering the key in the box.

Les avantages, buts et caractéristiques particulières de ce procédé et de cette utilisation étant similaires à ceux du kit objet de la présente invention, ils ne sont pas rappelés ici.The advantages, aims and particular characteristics of this method and of this use being similar to those of the kit which is the subject of the present invention, they are not recalled here.

Brève description des figuresBrief description of the figures

L'invention sera mieux comprise à la lecture de la description qui suit, faite uniquement à titre d'exemple, et en référence aux figures jointes en annexe dans lesquelles :

  • La figure 1 représente un premier mode de réalisation d'un boîtier sécurisé selon l'invention avec son environnement de communication ;
  • La figure 2 représente un ordinogramme d'un procédé d'enregistrement de clé ;
  • La figure 3 représente un ordinogramme d'un procédé de prise de location ;
  • La figure 4 représente un ordinogramme d'un procédé de fin de location et de remise de clé ;
  • La figure 5 représente un mode de réalisation particulier du boîtier sécurisé ;
  • Les figures 6 et 7 représentent deux vues de détail du verrouillage de la porte du mode de réalisation illustré en figure 5,
  • La figure 8 représente, sous forme de schéma fonctionnel, un mode de réalisation particulier du boîtier objet de la présente invention, en communication avec un terminal portable communiquant et avec un serveur de réservation et
  • La figure 9 représente, sous forme d'un logigramme, des étapes d'un mode de réalisation particulier du procédé objet de la présente invention.
The invention will be better understood on reading the following description, given purely by way of example, and with reference to the appended figures in which:
  • The figure 1 shows a first embodiment of a secure box according to the invention with its communication environment;
  • The figure 2 represents a flowchart of a key registration process;
  • The figure 3 represents a flowchart of a rental process;
  • The figure 4 represents a flowchart of an end of rental and key delivery process;
  • The figure 5 shows a particular embodiment of the secure box;
  • The figures 6 and 7 show two detail views of the door lock of the embodiment illustrated in figure 5 ,
  • The figure 8 represents, in the form of a functional diagram, a particular embodiment of the box object of the present invention, in communication with a portable terminal communicating and with a reservation server and
  • The figure 9 represents, in the form of a flowchart, the steps of a particular embodiment of the method which is the subject of the present invention.

Description de modes de réalisationDescription of embodiments

Dans toute la description, on appelle un « objet » un ensemble d'un ou plusieurs objets pré-identifiables individuellement ou collectivement, et devant être déposés ou retirés tous en même temps lors d'une opération d'ouverture/ fermeture du boîtier. Ainsi, une clé d'un véhicule et les documents administratifs (attestation de propriété et attestation d'assurance, par exemple) constituent, conjointement un objet. Un objet à déposer puis à retirer d'un boîtier est associé à un identifiant. On note que chaque partie de l'ensemble peut être physiquement associé à une partie de l'identifiant de l'objet. Par exemple, une clé de véhicule peut porter une étiquette électronique portant un premier code et les documents administratifs peuvent porter une deuxième étiquette électronique portant un deuxième code, le premier et le deuxième codes formant conjointement l'identifiant de l'objet comportant la clé et les documents administratifs.Throughout the description, an “object” is called a set of one or more pre-identifiable objects individually or collectively, and having to be deposited or withdrawn all at the same time during an opening / closing operation of the case. Thus, a vehicle key and administrative documents (certificate of ownership and certificate of insurance, for example) jointly constitute an object. An object to be deposited and then removed from a box is associated with an identifier. It is noted that each part of the set can be physically associated with a part of the identifier of the object. For example, a vehicle key may carry an electronic tag bearing a first code and the administrative documents may bear a second electronic tag bearing a second code, the first and second codes jointly forming the identifier of the object comprising the key and administrative documents.

Afin de concrétiser les modes de réalisation décrits dans un contexte, celui-ci est le partage de véhicules dans un environnement grand public, aussi appelé « auto-partage ». Par exemple, des utilisateurs propriétaires de véhicule mettent à disposition ce véhicule en un lieu déterminé et pour une durée déterminée via un site de la toile (« web »). Des tiers utilisateurs temporaires, c'est-à-dire autres que le propriétaire ou ses connaissances proches, font des demandes de location et d'utilisation du véhicule, toujours via le site de la toile.In order to give concrete form to the embodiments described in a context, this is the sharing of vehicles in a general public environment, also called “car sharing”. For example, vehicle owner users make this vehicle available at a specific location and for a specific period of time via a web site (“web”). Temporary third-party users, that is to say other than the owner or his close acquaintances, make requests for the rental and use of the vehicle, always via the web site.

Le site de la toile a ainsi plusieurs fonctions :

  • Gérer le parc disponible de véhicules ;
  • Associer un utilisateur temporaire à un véhicule en fonction de divers paramètres dont le lieu, le temps et le coût sont les principaux ;
  • Gérer la location du véhicule en donnant accès au véhicule, vérifiant que le véhicule est rendu selon les modalités prévues ; et
  • S'assurer des divers paiements associés.
The web site thus has several functions:
  • Manage the available fleet of vehicles;
  • Associate a temporary user with a vehicle according to various parameters of which the place, the time and the cost are the main ones;
  • Manage the rental of the vehicle by giving access to the vehicle, checking that the vehicle is returned according to the terms provided; and
  • Ensure the various associated payments.

Dans ce contexte, un boîtier, préférentiellement associé à une place de stationnement, destiné à recevoir la clé et les documents administratifs (carte grise, attestation d'assurance) du véhicule situé à proximité, va être décrit.In this context, a box, preferably associated with a parking space, intended to receive the key and the administrative documents (gray card, insurance certificate) of the vehicle located nearby, will be described.

En référence à la figure 1, un boîtier 1 comporte un volume intérieur 3 fermé par une porte 5. La porte 5 est mobile entre une position fermée, dans laquelle le porte 5 clos le volume intérieur 3, et une position ouverte, qui permet l'accès au volume intérieur 3.With reference to the figure 1 , a housing 1 comprises an interior volume 3 closed by a door 5. The door 5 is movable between a closed position, in which the door 5 closes the interior volume 3, and an open position, which allows access to the interior volume 3 .

La porte 5 comporte un dispositif de verrouillage 7 adapté pour verrouiller la porte en position fermée. Le dispositif de verrouillage 7 est, par exemple, un verrou, un loquet ou une gâche électrique, ou tout autre dispositif connu de l'homme du métier pour fermer de façon sécurisée une porte.The door 5 comprises a locking device 7 adapted to lock the door in the closed position. The locking device 7 is, for example, a lock, a latch or an electric strike, or any other device known to those skilled in the art for securely closing a door.

Le boîtier 1 comporte de plus un contrôleur 9 du dispositif de verrouillage 7. Le contrôleur 9 est connecté à un dispositif d'identification d'objet 11. Typiquement, le contrôleur 9 est une unité de calcul électronique qui commande des moyens électriques de manœuvre du dispositif de verrouillage 9.The box 1 further comprises a controller 9 of the locking device 7. The controller 9 is connected to an object identification device 11. Typically, the controller 9 is an electronic computing unit which controls the electrical maneuvering means of the device. locking device 9.

Le dispositif d'identification d'objet 11 est par exemple un lecteur d'étiquettes électroniques, ou étiquettes RFID (de l'anglais « Radio Frequency Identification » pour identification par radio-fréquence) ou NFC (de l'anglais « near field communication » pour communication en champ proche), ou de code à barres, en une ou deux dimensions, ou de code QR (« QR-code » est une marque déposée).The object identification device 11 is for example an electronic tag reader, or RFID tags (standing for “Radio Frequency Identification” for radio-frequency identification) or NFC (standing for “near field communication”). “For near-field communication), or barcode, in one or two dimensions, or QR code (“ QR-code ”is a registered trademark).

L'objet à identifier, typiquement la clé du véhicule ainsi que les documents administratifs du véhicule, sont associés à une ou plusieurs étiquettes conservant un code d'identification, ou identifiant, de sorte que le dispositif d'identification 11 est capable de lire l'identifiant, ou les identifiants, de la clé et des documents.The object to be identified, typically the vehicle key as well as the administrative documents of the vehicle, are associated with one or more labels keeping an identification code, or identifier, so that the identification device 11 is able to read the information. 'identifier, or identifiers, of the key and documents.

Le contrôleur 9 est relié à un dispositif d'alerte 13 tel qu'une lampe clignotante ou un générateur de signal sonore. Ainsi, si le contrôleur 9 détermine que l'identifiant lu ne correspond pas à un identifiant attendu, le contrôleur 9 peut déclencher une alerte sur le dispositif d'alerte 13. Cette alerte signale à l'utilisateur temporaire que, par exemple, il a oublié de mettre les documents dans le boîtier ou qu'il s'est trompé de clé.The controller 9 is connected to a warning device 13 such as a flashing light or a sound signal generator. Thus, if the controller 9 determines that the identifier read does not correspond to an expected identifier, the controller 9 can trigger an alert on the alert device 13. This alert signals to the temporary user that, for example, he has forgot to put the documents in the box or the wrong key.

De façon préférentielle, le boîtier 1 comporte un émetteur/récepteur 15 connecté au contrôleur 9 de façon à permettre au contrôleur 9 d'établir une communication de données avec un serveur d'identification 21.Preferably, the box 1 comprises a transmitter / receiver 15 connected to the controller 9 so as to allow the controller 9 to establish data communication with an identification server 21.

Ce serveur d'identification 21 est, par exemple, relié au serveur web de gestion du partage. En fonction du véhicule attendu sur la place de stationnement, le serveur d'identification 21 est capable d'indiquer au contrôleur 9 chaque code d'identification correspondant au véhicule attendu et donc chaque code d'identification de clé et/ou de document devant se trouver dans le boîtier 1.This identification server 21 is, for example, linked to the sharing management web server. Depending on the vehicle expected in the parking space, the identification server 21 is able to indicate to the controller 9 each identification code corresponding to the expected vehicle and therefore each key identification code and / or document to be find in the housing 1.

Réciproquement, le contrôleur 9 est capable d'indiquer au serveur d'identification 21 soit que chaque objet attendu est bien dans le boîtier 1, soit qu'il y a un problème / une alerte car aucun objet attendu n'est présent, ou seulement qu'une partie de l'ensemble attendu est présent, ou qu'un objet, par exemple une clé et/ou un document ne correspond pas au véhicule attendu est présent dans le volume intérieur 3.Conversely, the controller 9 is able to indicate to the identification server 21 either that each expected object is indeed in the box 1, or that there is a problem / an alert because no expected object is present, or only that part of the expected assembly is present, or that an object, for example a key and / or a document does not correspond to the expected vehicle is present in the interior volume 3.

Le boîtier 1 comporte de plus des moyens d'authentification 17 d'un utilisateur temporaire, connectés au contrôleur 9. Ces moyens d'authentification 17 sont, par exemple, un digicode par lequel l'utilisateur temporaire saisit un code secret associé à l'utilisateur temporaire. Ces moyens d'authentification 17 sont, préférentiellement, un émetteur/récepteur pour étiquette électronique, ou un émetteur/récepteur mettant en œuvre le protocole Bluetooth (marque déposée) permettant une liaison de données avec un terminal portable communicant (par exemple un téléphone mobile) de l'utilisateur temporaire, ce terminal faisant fonctionner une application dédiée permettant de transmettre un authentifiant au boîtier 1.The box 1 further comprises authentication means 17 of a temporary user, connected to the controller 9. These authentication means 17 are, for example, a digital code by which the temporary user enters a secret code associated with the temporary user. These authentication means 17 are, preferably, a transmitter / receiver for an electronic tag, or a transmitter / receiver implementing the Bluetooth protocol (registered trademark) allowing a data link with a communicating portable terminal (for example a mobile telephone). of the temporary user, this terminal operating a dedicated application making it possible to transmit an authenticator to the box 1.

Ainsi, le contrôleur 9 ne transmet un ordre de déverrouillage au dispositif de verrouillage 7 qu'après authentification de l'utilisateur temporaire.Thus, the controller 9 only transmits an unlocking order to the locking device 7 after authentication of the temporary user.

De façon préférentielle, le contrôleur 9 est connecté à un deuxième émetteur/récepteur 19 pour communiquer avec un serveur d'authentification 23. Le contrôleur 9 peut ainsi recevoir du serveur d'authentification 23 l'authentifiant de l'utilisateur temporaire pour pratiquer en local la procédure d'authentification. En variante, le dispositif d'authentification 17 est mis en relation directe avec le serveur d'authentification 23 qui pratique la procédure d'authentification et envoie au contrôleur 9 une information d'authentification réussie, ou non.Preferably, the controller 9 is connected to a second transmitter / receiver 19 to communicate with an authentication server 23. The controller 9 can thus receive from the authentication server 23 the authenticator of the temporary user to practice locally. the authentication procedure. As a variant, the authentication device 17 is put in direct relation with the authentication server 23 which performs the authentication procedure and sends the controller 9 a piece of authentication information, whether successful or not.

De façon préférentielle, l'utilisateur temporaire a un authentifiant unique, c'est-à-dire qu'aucun autre utilisateur n'a le même authentifiant, non réutilisable et à durée d'utilisation limitée. Cet authentifiant est géré, par exemple généré aléatoirement, et associé à un utilisateur temporaire, par le serveur d'authentification 23 dans le cadre de la procédure d'authentification.Preferably, the temporary user has a unique authenticator, that is to say that no other user has the same authenticator, which cannot be reused and has a limited period of use. This authenticator is managed, for example generated randomly, and associated with a temporary user, by the authentication server 23 as part of the authentication procedure.

Autrement dit, non seulement la procédure d'authentification sert à s'assurer que l'utilisateur temporaire est bien celui qu'il prétend être mais en plus qu'il est bien la personne qui doit utiliser ce véhicule à un certain moment.In other words, not only does the authentication procedure serve to ensure that the temporary user is indeed who he claims to be, but also that he is indeed the person who must use this vehicle at a certain time.

Il est à noter que, dans une variante dans laquelle le boîtier 1 n'a pas de connexion, ou n'a qu'une connexion limitée, au serveur d'authentification 23, il existe des procédures cryptographiques de génération et de contrôle d'authentifiant à usage unique et à durée de vie limitée sans que le boîtier 1 ait besoin de faire appel à un serveur mais en recalculant l'authentifiant attendu. Par exemple, cet authentifiant est calculé par une fonction mathématique appliquée à un horodatage et à un identifiant du boîtier 1.It should be noted that, in a variant in which the box 1 has no connection, or only has a limited connection, to the authentication server 23, there are cryptographic procedures for the generation and control of single-use authenticator with a limited lifespan without the unit 1 needing to call on a server but by recalculating the expected authenticator. For example, this authenticator is calculated by a mathematical function applied to a time stamp and to an identifier of box 1.

L'utilisateur temporaire reçoit l'authentifiant, préférentiellement par le biais d'un réseau de téléphonie mobile, par exemple sous la forme d'un message court de type texto (« SMS » pour short message system) ou d'un message reçu par l'application dédiée installée sur son terminal portable communicant.The temporary user receives the authenticator, preferably by means of a mobile telephone network, for example in the form of a short text message type (“SMS” for short message system) or of a message received by the dedicated application installed on their communicating portable terminal.

Le mode de fonctionnement du boîtier à clé est alors le suivant.The operating mode of the key box is then as follows.

En remarque préliminaire, et pour ne pas alourdir inutilement le texte, seule la gestion d'une clé sera décrite. L'homme du métier généralisera sans difficulté à la gestion d'une clé associée à d'autres objets ou documents.As a preliminary remark, and in order not to overburden the text unnecessarily, only the management of a key will be described. Those skilled in the art will easily generalize to the management of a key associated with other objects or documents.

Pour commencer, la procédure d'enregistrement de clé est décrite en relation avec la figure 2.To begin with, the key registration procedure is described in relation to the figure 2 .

Dans une étape préliminaire, par exemple en utilisant le site web de partage, le propriétaire du véhicule à louer a enregistré son véhicule et a reçu en retour une étiquette RFID à coller sur la clé du véhicule.In a preliminary step, for example by using the sharing website, the owner of the rental vehicle registered his vehicle and in return received an RFID tag to stick on the vehicle key.

Le boîtier 1 est à l'état fermé verrouillé sans identifiant de clé.Box 1 is in the locked closed state with no key identifier.

A l'étape 31, l'utilisateur propriétaire s'identifie comme la personne qui va déposer une clé.In step 31, the owner user identifies himself as the person who will deposit a key.

A l'étape 33, le boîtier 1 accepte l'identification et ouvre la porte.In step 33, the box 1 accepts the identification and opens the door.

A l'étape 35, l'utilisateur propriétaire met la clé dans le boîtier.In step 35, the owner user puts the key in the box.

A l'étape 37, le dispositif d'identification 11 lit l'identifiant de la clé qui est remonté au serveur 21.In step 37, the identification device 11 reads the identifier of the key which is sent back to the server 21.

A l'étape 39, la porte du boîtier 1 est fermée et verrouillée.In step 39, the door of the housing 1 is closed and locked.

A partir de ce moment, le système considère que le véhicule dont la clé est dans le boîtier 1 est stationné sur la place associée au boîtier 1 et est prêt à être partagé.From this moment, the system considers that the vehicle whose key is in box 1 is parked on the place associated with box 1 and is ready to be shared.

En référence à la figure 3, la procédure de prise en location d'un véhicule comporte les étapes suivantes.With reference to the figure 3 , the procedure for hiring a vehicle includes the following steps.

Le boîtier 1 est à l'état fermé verrouillé avec un objet dans le volume intérieur 3, typiquement une clé, identifié.The housing 1 is in the closed state locked with an object in the interior volume 3, typically a key, identified.

A l'étape 41, l'utilisateur temporaire s'authentifie, par exemple en entrant un code unique qui lui a été fourni par le serveur web de partage.In step 41, the temporary user authenticates himself, for example by entering a unique code which has been provided to him by the sharing web server.

A l'étape 43, le boîtier 1 ayant validé que c'est l'utilisateur temporaire attendu déverrouille la porte. Si ce n'est pas l'utilisateur temporaire attendu, le boîtier 1 reste verrouillé et une alerte est déclenchée en local comme sur le serveur d'authentification (étape non représentée).In step 43, the unit 1 having validated that it is the expected temporary user unlocks the door. If it is not the expected temporary user, box 1 remains locked and an alert is triggered locally as on the authentication server (step not shown).

A l'étape 45, l'utilisateur temporaire prend la clé. Le boîtier 1 constate la prise de clé car le dispositif 11 d'identification ne reçoit plus de signal d'identification. Le boîtier 1 se met en statut « vide » et envoie l'information au serveur d'identification. Le système considère alors que l'utilisateur temporaire a pris en charge le véhicule et que la location commence.In step 45, the temporary user takes the key. The box 1 notes the key being taken because the identification device 11 no longer receives an identification signal. Box 1 goes into “empty” status and sends the information to the identification server. The system then considers that the temporary user has taken charge of the vehicle and that the rental has started.

A l'étape 47, après une action de l'utilisateur temporaire ou une temporisation, la porte se ferme et se verrouille.In step 47, after a temporary user action or a delay, the door closes and locks.

La procédure de fin de location et de remise de la clé comporte les étapes suivantes, figure 4.The procedure for terminating the rental and handing over the key comprises the following steps, figure 4 .

Le boîtier 1 est à l'état fermé verrouillé et vide.Box 1 is in the closed, locked and empty state.

A l'étape 51, l'utilisateur temporaire s'authentifie, par exemple en entrant un code unique qui lui a été fourni par le serveur web de partage.In step 51, the temporary user authenticates himself, for example by entering a unique code which has been provided to him by the sharing web server.

A l'étape 53, le boîtier 1 ayant validé que c'est l'utilisateur temporaire attendu déverrouille la porte. Si ce n'est pas l'utilisateur temporaire attendu, le boîtier 1 reste verrouillé et une alerte est déclenchée en local comme sur le serveur d'authentification (étape non représentée).In step 53, the unit 1 having validated that it is the expected temporary user unlocks the door. If it is not the expected temporary user, box 1 remains locked and an alert is triggered locally as on the authentication server (step not shown).

A l'étape 55, l'utilisateur temporaire pose la clé dans le boîtier 1.In step 55, the temporary user places the key in the box 1.

A l'étape 57, le boîtier 1 vérifie que la clé posée est bien la clé attendue.In step 57, the unit 1 verifies that the key placed is indeed the expected key.

Si c'est la bonne clé, étape 59, le boîtier se referme et se verrouille. Le système considère que le véhicule a été rendu et la location se termine. Une notification est envoyée à l'utilisateur temporaire et à l'utilisateur propriétaire pour les informer de la fin du parcours client.If it is the correct key, step 59, the case closes and locks. The system considers that the vehicle has been returned and the rental ends. A notification is sent to the temporary user and to the owner user to inform them of the end of the customer journey.

Si ce n'est pas la bonne clé, étape 60, le boîtier 1 déclenche une alerte locale et informe le serveur d'identification. L'alerte locale peut permettre à l'utilisateur temporaire de réaliser qu'il a commis une erreur, par exemple, en se trompant de clé, ou en oubliant de la poser dans le boîtier 1. Le boîtier 1 étant ouvert, l'utilisateur temporaire peut corriger son erreur en mettant la clé attendue et la procédure continue à l'étape 59.If this is not the correct key, step 60, the unit 1 triggers a local alert and informs the identification server. The local alert can allow the temporary user to realize that he has made an error, for example, by using the wrong key, or by forgetting to put it in the box 1. The box 1 being open, the user temporary can correct its error by setting the expected key and the procedure continues at step 59.

Si l'erreur n'est pas corrigée au bout d'un temps prédéterminé, l'alerte déclenche des procédures correctives au niveau du système telles que l'appel de l'utilisateur temporaire et/ou de l'utilisateur propriétaire par un opérateur, etc.If the error is not corrected after a predetermined time, the alert triggers corrective procedures at the system level such as the call of the temporary user and / or the owner user by an operator, etc.

Ainsi, on constate avantageusement que par cette identification de clé, il y a une connaissance exacte et permanente du parc de véhicules disponibles alors que, sans l'identification de clé, de nombreux dysfonctionnements sont possibles tels que l'oubli de remettre la clé dans le boîtier 1 avec la conséquence que l'utilisateur temporaire suivant ne peut pas utiliser le véhicule tant que le système n'a pas, a minima, rappelé l'utilisateur temporaire précédent pour qu'il ramène la clé à sa place.Thus, it is advantageously noted that by this key identification, there is an exact and permanent knowledge of the fleet of vehicles available whereas, without the key identification, many malfunctions are possible such as forgetting to put the key back in. box 1 with the consequence that the next temporary user cannot use the vehicle until the system has, at a minimum, called the previous temporary user back to return the key to its place.

Nous allons maintenant décrire un mode de réalisation mécanique du boîtier 1 à clé particulièrement avantageux dans le contexte de partage de véhicule. On comprendra aisément que les fonctionnalités ci-dessus peuvent être mises en œuvre avec des boîtiers ayant des structures mécaniques différentes.We will now describe a mechanical embodiment of the key box 1 which is particularly advantageous in the context of vehicle sharing. It will easily be understood that the above functionalities can be implemented with housings having different mechanical structures.

En référence à la figure 5, le boîtier 1 comporte une plaque de fond 61 composée d'une partie circulaire 63 prolongée d'une partie sensiblement rectangulaire 65.With reference to the figure 5 , the housing 1 comprises a base plate 61 composed of a circular part 63 extended by a substantially rectangular part 65.

La plaque de fond 61 comporte des perçages 67 permettant de fixer solidement le boîtier 1 sur un support tel qu'un mur.The base plate 61 has holes 67 making it possible to firmly fix the housing 1 on a support such as a wall.

La plaque de fond 61 comporte également des supports d'attache 69 permettant de fixer une coque de protection.The bottom plate 61 also includes attachment supports 69 for fixing a protective shell.

Dans sa partie rectangulaire 65, un contenant renforcé 71 correspondant au volume intérieur du boîtier est fixé solidement sur la plaque de fond 61.In its rectangular part 65, a reinforced container 71 corresponding to the interior volume of the case is firmly fixed on the base plate 61.

Ce contenant 71 est fermé par une porte 73. La porte 73 coulisse selon un mouvement vertical de translation le long de deux glissières 75, 77.This container 71 is closed by a door 73. The door 73 slides in a vertical translational movement along two slides 75, 77.

La porte 73 comporte un embossage 79 permettant à un utilisateur d'y mettre un doigt pour la soulever selon le sens de la flèche 81.The door 73 has an embossing 79 allowing a user to put a finger therein to lift it in the direction of the arrow 81.

L'ensemble est donc monté de sorte que la flèche désigne l'axe vertical vers le haut.The assembly is therefore mounted so that the arrow points to the vertical axis upwards.

La porte 73 comporte sur son côté haut une encoche 83 dans laquelle vient se positionner une goupille 85.The door 73 has on its top side a notch 83 in which a pin 85 is positioned.

La goupille 85 est montée sur un support 87 solidaire de la plaque de fond 61, et donc du contenant 71.The pin 85 is mounted on a support 87 secured to the bottom plate 61, and therefore to the container 71.

Sur la figure, la goupille 85 est montrée en position de verrouillage, c'est-à-dire que la goupille 85 empêche la porte de remonter et donc de donner accès au contenant 71.In the figure, the pin 85 is shown in the locked position, that is to say that the pin 85 prevents the door from rising and therefore giving access to the container 71.

La figure 6 montre une vue en gros de la goupille 85 en position de verrouillage.The figure 6 shows a close-up view of pin 85 in the locked position.

La goupille 85 est montée sur le support 87 de façon à pouvoir effectuer un mouvement de translation perpendiculaire au plan de la porte 61 entre la position verrouillée et une position déverrouillée permettant le libre coulissement de la porte 61, telle que la montre la figure 7. Ce mouvement de translation de la goupille est piloté par un électroaimant 89.The pin 85 is mounted on the support 87 so as to be able to perform a translational movement perpendicular to the plane of the door 61 between the locked position and an unlocked position allowing the free sliding of the door 61, as shown in the figure. figure 7 . This translational movement of the pin is controlled by an electromagnet 89.

Par sécurité, la position de repos de la goupille correspond à la position verrouillée.For safety, the rest position of the pin corresponds to the locked position.

La partie circulaire 63 contient la partie électronique de commande et les coques de protection ont les ouvertures adéquates pour permettre évidemment un accès direct à la porte mais aussi pour positionner une interface utilisateur sous forme d'un petit écran alphanumérique et/ou d'un clavier de type digicode.The circular part 63 contains the electronic control part and the protective shells have the appropriate openings to obviously allow direct access to the door but also to position a user interface in the form of a small alphanumeric screen and / or a keyboard digicode type.

Les coques de protection sont agencées, lorsqu'elles sont en position, de sorte à ne laisser apparaitre aucune vis ou moyen de démontage sans dégradation du matériel. Ainsi, la partie circulaire de la coque vient s'encliqueter sur les supports d'attache 69 par un mouvement de rotation puis une fois cette partie circulaire positionnée. La partie parallélépipédique de la coque vient se glisser et s'attacher sur les supports d'attache 69 de la partie rectangulaire 65 du support de sorte qu'étant en position cette partie parallélépipédique toute rotation de la partie circulaire de la coque et donc tout déverrouillage.The protective shells are arranged, when they are in position, so as not to allow any screws or disassembly means to appear without degradation of the equipment. Thus, the circular part of the shell snaps onto the attachment supports 69 by a rotational movement then once this circular part has been positioned. The parallelepipedal part of the hull slips and attaches to the attachment supports 69 of the rectangular part 65 of the support so that, being in position this part parallelepiped any rotation of the circular part of the shell and therefore any unlocking.

Ainsi les coques sont telles qu'aucune vis ou attache de fixation n'est apparente et l'agencement de leurs faces empêchent une dégradation ou des tentatives d'effraction. Elles sont verrouillées en position par une serrure unique dont la clé n'est détenue que par les techniciens de maintenance.Thus the shells are such that no screws or fasteners are visible and the arrangement of their faces prevents degradation or attempted break-in. They are locked in position by a unique lock, the key of which is only held by the maintenance technicians.

L'invention a été illustrée et décrite en détail dans les dessins et la description précédente. Celle-ci doit être considérée comme illustrative et donnée à titre d'exemple et non comme limitant l'invention à cette seule description. De nombreuses variantes de réalisation sont possibles dans le cadre défini par les revendications.The invention has been illustrated and described in detail in the drawings and the foregoing description. This should be considered as illustrative and given by way of example and not as limiting the invention to this description alone. Numerous variant embodiments are possible within the framework defined by the claims.

Par exemple, les deux serveurs et les émetteurs/récepteurs peuvent être confondus en un seul serveur et un seul émetteur/récepteur.For example, the two servers and the transceivers can be combined into a single server and a single transceiver.

Dans les revendications, le mot « comportant » n'exclue pas d'autres éléments et l'article indéfini « un/une » n'exclut pas une pluralité.In the claims, the word "comprising" does not exclude other elements and the indefinite article "a / a" does not exclude a plurality.

On observe, en figure 8, un système 90 de partage de véhicules. Ce système ne met en œuvre qu'un seul serveur, qui héberge un site de la toile et gère des identifiants d'objets et des authentifiants d'utilisateurs. Le système 90 comporte un boîtier 91 à fermeture sécurisée comportant un volume intérieur 93 et une porte 95 mobile entre une position fermée et une position ouverte (représentée, en figure 8, en position ouverte), le boîtier 91 comportant un dispositif de verrouillage 97 à commande électrique adapté pour verrouiller la porte en position fermée.We observe, in figure 8 , a vehicle sharing system 90. This system only implements a single server, which hosts a web site and manages object identifiers and user credentials. The system 90 comprises a securely closed housing 91 having an interior volume 93 and a door 95 movable between a closed position and an open position (shown, in figure 8 , in open position), the housing 91 comprising an electrically controlled locking device 97 adapted to lock the door in the closed position.

Le boîtier 91 comporte, de plus, un moyen 98 d'accès à un identifiant d'un objet associé à une plage horaire de dépôt de cet objet. Préférentiellement, ce moyen 98 d'accès communique avec un serveur 92, sur un réseau de téléphonie mobile ou un réseau d'objets connectés, par exemple Sigfox (marque déposée) ou Lora (Marque déposée).The box 91 also comprises a means 98 for accessing an identifier of an object associated with a time slot for depositing this object. Preferably, this access means 98 communicates with a server 92, over a mobile telephone network or a network of connected objects, for example Sigfox (registered trademark) or Lora (registered trademark).

Le moyen 98 d'accès peut être, préférentiellement :

  • une mémoire interne au boîtier 91, mémoire qui conserve chaque identifiant d'objet et chaque plage horaire de dépôt de l'objet ainsi identifié, de la part du serveur 92, pour que le contrôleur 99 vérifie qu'un identifiant d'objet lu sur un objet est celui autorisé pour la plage horaire courante ou
  • un accès au serveur 92, auquel le contrôleur 99 adresse chaque identifiant d'objet lu sur un objet, le serveur 92 effectuant alors la vérification que ledit identifiant est celui autorisé pour la plage horaire courante.
The access means 98 can be, preferably:
  • a memory internal to the box 91, which memory stores each object identifier and each time slot for depositing the object thus identified, on the part of the server 92, so that the controller 99 verifies that an object identifier read on an object is the one authorized for the current time slot or
  • access to the server 92, to which the controller 99 addresses each object identifier read from an object, the server 92 then verifying that said identifier is the one authorized for the current time slot.

Le serveur internet 92 héberge un site de la toile (web) sur lequel :

  • un utilisateur souhaitant mettre son véhicule à disposition d'un tiers peut sélectionner un lieu, par exemple une place de stationnement, où il laissera son véhicule disponible à une heure de son choix, le serveur adressant un identifiant d'un objet, clés et/ou des papiers administratifs du véhicule, au boîtier associé au lieu sélectionné et une plage horaire au cours de laquelle cet objet doit être déposé dans ce boîtier et
  • un utilisateur souhaitant utiliser un véhicule ainsi mis à disposition choisit le lieu et/ou le véhicule, le serveur adressant à cet utilisateur la confirmation du lieu et du véhicule et adressant à cet utilisateur et au boîtier associé au lieu et au véhicule un authentifiant permettant à l'utilisateur tiers de s'authentifier auprès du boîtier pour accéder à l'objet et une plage horaire au cours de laquelle cet authentifiant peut être utilisé.
The internet server 92 hosts a web site on which:
  • a user wishing to make his vehicle available to a third party can select a place, for example a parking space, where he will leave his vehicle available at a time of his choice, the server sending an identifier of an object, keys and / Where the administrative papers of the vehicle, to the box associated with the selected location and a time slot during which this object must be deposited in this box and
  • a user wishing to use a vehicle thus made available chooses the place and / or the vehicle, the server sending to this user the confirmation of the place and the vehicle and sending to this user and to the box associated with the place and the vehicle an authenticator allowing the third-party user to authenticate with the box to access the object and a time slot during which this authenticator can be used.

Le boîtier 91 comporte un dispositif ou lecteur d'identification 101 d'un objet présent dans le volume intérieur 93 du boîtier 91. Lorsqu'un objet muni d'un identifiant, par exemple une étiquette électronique ou un code imprimé, est positionné dans le volume intérieur 93, le lecteur d'identification 101 lit cet identifiant d'objet et fournit cet identifiant à un contrôleur 99 du dispositif de verrouillage 97. Le contrôleur 99 est adapté à transmettre une commande de verrouillage au dispositif de verrouillage 97 après que le lecteur d'identification d'objet 101 ait fourni un identifiant d'objet qui corresponde à l'identifiant reçu par le boîtier 91 de la part du serveur 92 pour l'heure courante. Le contrôleur 99 est, de plus, adapté à déclencher une alerte et à inhiber le verrouillage de la porte quand le lecteur d'identification d'objet 101 fournit un identifiant d'objet qui ne correspond pas à l'identifiant d'objet reçu par le boîtier 91 de la part du serveur 92 pour l'heure courante.The box 91 comprises a device or reader 101 for identifying an object present in the interior volume 93 of the box 91. When an object provided with an identifier, for example an electronic label or a printed code, is positioned in the interior volume 93, the identification reader 101 reads this object identifier and provides this identifier to a controller 99 of the locking device 97. The controller 99 is adapted to transmit a locking command to the locking device 97 after the reader object identification 101 has provided an object identifier which corresponds to the identifier received by the box 91 from the server 92 for the current time. The controller 99 is, moreover, adapted to trigger an alert and to inhibit the locking of the door when the object identification reader 101 provides an object identifier which does not correspond to the object identifier received by. the box 91 from the server 92 for the current time.

Le boîtier 91 comporte, de plus, un moyen 94 d'accès à au moins un authentifiant d'un utilisateur et à une plage horaire d'utilisation de cet authentifiant. Le moyen 94 d'accès peut être, préférentiellement :

  • une mémoire interne au boîtier 91, mémoire qui conserve des authentifiants d'utilisateurs et des plages horaires d'utilisation de la part du serveur 92, pour que le contrôleur 99 vérifie qu'un authentifiant d'utilisateur reçu d'un utilisateur est celui autorisé pour la plage horaire courante,
  • un accès au serveur 92, auquel le contrôleur 99 adresse chaque authentifiant d'utilisateur reçu d'un utilisateur, le serveur 92 effectuant alors la vérification que ledit authentifiant est celui autorisé pour la plage horaire courante ou
  • un générateur déterministe d'authentifiants d'utilisateur, un générateur identique étant mis en œuvre par le serveur 92, qui adresse cet authentifiant à l'utilisateur en vue de son authentification. Préférentiellement, ce générateur déterministe utilise une page horaire courante et un identifiant unique de boîtier pour générer les authentifiants d'utilisateur, le contrôleur 99 vérifiant qu'un authentifiant d'utilisateur reçu de la part d'un utilisateur est l'authentifiant autorisé pour la plage horaire courante.
The box 91 furthermore comprises a means 94 of access to at least one authenticator of a user and to a time slot of use of this authenticator. The means 94 of access can be, preferably:
  • a memory internal to the box 91, a memory which stores user credentials and time slots of use on the part of the server 92, so that the controller 99 verifies that a user authenticator received from a user is the authorized one for the current time slot,
  • access to the server 92, to which the controller 99 addresses each user authenticator received from a user, the server 92 then verifying that said authenticator is the one authorized for the current time slot or
  • a deterministic generator of user credentials, an identical generator being implemented by the server 92, which sends this authenticator to the user with a view to his authentication. Preferably, this deterministic generator uses a current time page and a unique unit identifier to generate the user credentials, the controller 99 verifying that a user authenticator received from a user is the authenticator authorized for the user. current time slot.

Le boîtier 91 comporte aussi des moyens d'authentification 100 d'un utilisateur, connectés au contrôleur 99, pour déterminer si l'utilisateur correspond à l'authentifiant mémorisé par le moyen de mémorisation 94. Les moyens d'authentification 100 peuvent être une serrure à code (« digicode », voir figure 1, référence 17), ou, comme en figure 8, un lecteur d'étiquette électronique ou de code affiché sur un écran de terminal portable communicant 96 ou communiqué à faible distance par un tel terminal 96. L'utilisateur est alors authentifié par ce qu'il connaît, c'est-à-dire un code, ou par ce qu'il possède, c'est-à-dire un support de code (une étiquette électronique ou un terminal portable communicant ayant reçu un authentifiant d'utilisateur. En variante (non représentée), l'authentification de l'utilisateur se fait par une mesure biométrique, par exemple une reconnaissance d'empreinte digitale, de forme de main, de la voix ou du visage.The box 91 also comprises means 100 for authenticating a user, connected to the controller 99, to determine whether the user corresponds to the authenticator. memorized by the storage means 94. The authentication means 100 can be a code lock (“digicode”, see figure 1 , reference 17), or, as in figure 8 , an electronic tag or code reader displayed on a communicating portable terminal screen 96 or communicated at a short distance by such a terminal 96. The user is then authenticated by what he knows, that is to say a code, or by what it possesses, that is to say a code carrier (an electronic tag or a communicating portable terminal having received a user authenticator. As a variant (not shown), the authentication of the user is made by a biometric measurement, for example a recognition of fingerprint, shape of hand, voice or face.

Les moyens d'authentification 100 sont adaptés pour comparer l'authentifiant obtenu de l'utilisateur avec l'authentifiant auquel accède le moyen d'accès 94.The authentication means 100 are suitable for comparing the authenticator obtained from the user with the authenticator accessed by the access means 94.

Le contrôleur 99 est adapté pour, lorsque la porte 95 est fermée et que le dispositif d'identification d'objet 101 indique que le volume intérieur 93 du boîtier 91 ne contient aucun objet identifié, ne transmettre un ordre de déverrouillage au dispositif de verrouillage 97 qu'après authentification de l'utilisateur par les moyens d'authentification 100.The controller 99 is suitable for, when the door 95 is closed and the object identification device 101 indicates that the interior volume 93 of the housing 91 does not contain any identified object, transmitting an unlock command to the locking device 97 only after authentication of the user by the authentication means 100.

Ainsi, contrairement à ce qui était connu dans l'art antérieur, le boîtier 91 mis à disposition de différents utilisateurs ne peut être verrouillé que s'il est vide ou contient un objet prédéterminé. Lorsque le boîtier 91 est vide, pour qu'un utilisateur déverrouille la porte 95 du boîtier 91, y place un objet et déclenche le verrouillage de la porte 95 du boîtier 91, un authentifiant de l'utilisateur et un identifiant de l'objet sont associés à une première plage horaire et, uniquement au cours de cette première plage horaire et cumulativement, l'utilisateur est authentifié et l'objet est identifié. Au cas où l'utilisateur est authentifié mais que l'objet n'est pas identifié, un signal d'alerte perceptible par l'utilisateur est déclenché au niveau du boîtier 91.Thus, contrary to what was known in the prior art, the box 91 made available to different users can only be locked if it is empty or contains a predetermined object. When the housing 91 is empty, for a user to unlock the door 95 of the housing 91, place an object therein and trigger the locking of the door 95 of the housing 91, an authenticator of the user and an identifier of the object are associated with a first time slot and, only during this first time slot and cumulatively, the user is authenticated and the object is identified. In the event that the user is authenticated but the object is not identified, an alert signal perceptible by the user is triggered at the level of the box 91.

De plus, un autre authentifiant est associé à une deuxième plage horaire postérieure à la première plage horaire, la porte 95 du boîtier 91 n'étant pas déverrouillée jusqu'à l'authentification, par le biais de cet autre authentifiant au cours de cette deuxième plage horaire. De plus, le boîtier 91 vérifie, après déverrouillage suivi d'une durée prédéterminée, par exemple de dix secondes, l'absence d'identification de l'objet. Au cas où l'utilisateur est authentifié mais que l'objet identifié reste dans le boîtier au-delà de cette durée prédéterminée, un signal d'alerte perceptible par l'utilisateur est déclenché au niveau du boîtier 91.In addition, another authenticator is associated with a second time slot after the first time slot, the door 95 of the box 91 not being unlocked until authentication, by means of this other authenticator during this second time slot. time slots. In addition, the housing 91 checks, after unlocking followed by a predetermined period, for example ten seconds, the absence of identification of the object. In the event that the user is authenticated but the identified object remains in the box beyond this predetermined time, an alert signal perceptible by the user is triggered at the level of the box 91.

Chaque identification réussie, authentification réussie et alerte est transmise au serveur 92, où elle est horodatée et mémorisée, pour la traçabilité. Préférentiellement, l'alerte est transmise à un utilisateur du boîtier 91 par des moyens lumineux et/ou sonores 103 et/ou par le biais du terminal mobile communicant 96.Each successful identification, successful authentication and alert is transmitted to the server 92, where it is time-stamped and stored, for traceability. Preferably, the alert is transmitted to a user of the box 91 by light and / or sound means 103 and / or by means of the communicating mobile terminal 96.

Préférentiellement, chaque authentifiant est à usage unique et/ou à usage limité dans le temps, par le biais de la plage horaire à laquelle l'authentifiant est associé.Preferably, each authenticator is for single use and / or for limited use in time, through the time slot with which the authenticator is associated.

Les moyens d'authentification 100 de l'utilisateur sont des moyens d'authentification de l'objet que l'utilisateur doit déposer dans le boîtier 91 pendant la plage horaire courante, pendant que l'objet est à l'extérieur du boîtier 91, par lecture et reconnaissance de l'identifiant porté par l'objet, cet identifiant étant identique à l'identifiant d'objet reçu par le boîtier 91 de la part du serveur 92, pour la plage horaire courante. Dans ces modes de réalisation, où l'identification de l'objet est réalisée à l'extérieur du boîtier 91, le boîtier utilise, préférentiellement, un lecteur d'identifiant indépendant du dispositif d'identification d'objet 101 situé à l'intérieur du volume intérieur 93 du boîtier 91. Ainsi, selon la position de l'objet, on utilise deux lecteurs d'identifiants différents et la lecture d'identifiant par un lecteur d'identifiant permet de connaître la position de l'objet, à l'intérieur ou à l'extérieur du boîtier 91.The user authentication means 100 are means for authenticating the object that the user must place in the box 91 during the current time slot, while the object is outside the box 91, by reading and recognizing the identifier carried by the object, this identifier being identical to the object identifier received by the box 91 from the server 92, for the current time slot. In these embodiments, where the identification of the object is performed outside the housing 91, the housing preferably uses an identifier reader independent of the object identification device 101 located inside. of the interior volume 93 of the housing 91. Thus, depending on the position of the object, two readers of different identifiers are used and the identifier reading by an identifier reader makes it possible to know the position of the object, at the 'inside or outside the housing 91.

On note que l'authentification d'utilisateur est ainsi effectuée par reconnaissance de l'utilisateur ou par la présence de l'objet portant l'identifiant reçu.It is noted that the user authentication is thus performed by recognition of the user or by the presence of the object carrying the received identifier.

En variante, les fonctions d'authentification et/ou d'identification sont déportées dans le serveur 92, le boîtier 91 servant alors de lecteur d'authentifiant et/ou d'identifiant périphérique pour le serveur 92, qui transmet au boîtier 91 les instructions de verrouillage et de déverrouillage et d'émission de signaux d'alerte.As a variant, the authentication and / or identification functions are deported in the server 92, the box 91 then serving as an authenticator and / or peripheral identifier reader for the server 92, which transmits the instructions to the box 91. locking and unlocking and emission of warning signals.

En variante, un abonné au service mis en œuvre par le site de la toile hébergé par le serveur 92 peut laisser sa clé de voiture en libre-service dans tout coffre vide qui n'attend pas encore un objet, le serveur 92 reconnaissant cette clé et l'attribuant à tout demandeur, qui peut la demander plus tard.As a variant, a subscriber to the service implemented by the web site hosted by the server 92 can leave his self-service car key in any empty safe which is not yet waiting for an object, the server 92 recognizing this key and assigning it to any requester, who can request it later.

Dans ce cas, le boîtier sécurisé possède trois statuts :

  • vide sans attente d'une personne (pour dépôt en libre-service),
  • vide mais « réservé » à un dépôt de clé attendue et
  • contenant une clé.
In this case, the secure box has three statuses:
  • empty without waiting for a person (for self-service deposit),
  • empty but "reserved" for an expected key deposit and
  • containing a key.

Préférentiellement, le statut du boîtier 91 est visible à l'extérieur du boîtier 91, par exemple par le biais de diodes de différentes couleurs.Preferably, the status of the box 91 is visible outside the box 91, for example by means of diodes of different colors.

Dans le mode de réalisation particulier du procédé objet de la présente invention illustré en figure 9, le serveur adresse au boîtier les authentifiants des utilisateurs et les identifiants des objets. Comme indiqué ci-dessus, en variante, l'authentification et/ou l'identification sont réalisés par le serveur et/ou chaque authentifiant est calculé de manière déterministe par le boîtier.In the particular embodiment of the method which is the subject of the present invention, illustrated in figure 9 , the server sends the user credentials and the object identifiers to the box. As indicated above, as a variant, the authentication and / or the identification are carried out by the server and / or each authenticator is calculated in a deterministic manner by the box.

Dans ce mode de réalisation, au cours d'une étape 110, par l'intermédiaire d'un serveur internet hébergeant un site de la toile (web), un premier utilisateur (aussi appelé, dans la description « utilisateur devant effectuer le dépôt d'un objet ») souhaitant mettre son véhicule à disposition d'un tiers sélectionne un lieu, par exemple une place de stationnement, où il laissera son véhicule disponible à une heure de son choix. Au cours d'une étape 111, le serveur adresse à l'utilisateur devant déposer un objet un authentifiant à utiliser lors de l'accès au boîtier. Au cours de la même étape 111, le serveur adresse au boîtier associé au lieu sélectionné :

  • un authentifiant de l'utilisateur devant déposer l'objet,
  • un identifiant d'un objet, clés et/ou des papiers administratifs du véhicule, et
  • une plage horaire de dépôt de l'objet au cours de laquelle cet objet doit être déposé dans ce boîtier.
In this embodiment, during a step 110, via an internet server hosting a site of the web (web), a first user (also called, in the description, "user having to make the deposit of 'an object') wishing to put his vehicle available to a third party selects a place, for example a parking space, where he will leave his vehicle available at a time of his choice. During a step 111, the server sends the user who has to deposit an object an authenticator to be used when accessing the box. During the same step 111, the server addresses to the box associated with the selected location:
  • an authenticator of the user who must deposit the object,
  • an identifier of an object, keys and / or administrative papers of the vehicle, and
  • a time slot for depositing the object during which this object must be deposited in this box.

Au cours d'une étape 112, un deuxième utilisateur (aussi appelé, dans la description, « utilisateur devant retirer l'objet ») souhaitant utiliser un véhicule ainsi mis à disposition choisit, préférentiellement sur le même site de la toile, le lieu et/ou le véhicule. Au cours d'une étape 113, le serveur adresse à cet utilisateur la confirmation du lieu et du véhicule réservé et adresse à cet utilisateur et au boîtier associé au lieu et au véhicule :

  • un authentifiant permettant à l'utilisateur tiers de s'authentifier auprès du boîtier pour accéder à l'objet et
  • une plage horaire de retrait de l'objet, postérieure à la plage horaire de dépôt de l'objet, au cours de laquelle cet authentifiant peut être utilisé.
During a step 112, a second user (also called, in the description, “user having to remove the object”) wishing to use a vehicle thus made available chooses, preferably on the same site of the web, the place and / or the vehicle. During a step 113, the server sends this user confirmation of the place and the vehicle reserved and sends to this user and to the unit associated with the place and the vehicle:
  • an authenticator allowing the third-party user to authenticate himself with the box to access the object and
  • a time slot for collecting the object, after the time slot for depositing the object, during which this authenticator can be used.

Au cours d'une étape 114, le boîtier étant vide et la porte du boîtier étant verrouillée, un candidat utilisateur devant déposer un objet se présente devant le boîtier et fournit un authentifiant d'utilisateur.During a step 114, the box being empty and the door of the box being locked, a candidate user having to deposit an object presents himself in front of the box and provides a user authenticator.

Au cours d'une étape 115, le contrôleur du boîtier vérifie que l'authentifiant de l'utilisateur candidat à l'accès au volume intérieur du boîtier correspond à l'authentifiant d'utilisateur devant déposer un objet reçu de la part du serveur, pour la plage horaire courante. Si non, la porte du boîtier reste verrouillée.During a step 115, the controller of the box verifies that the authenticator of the user candidate for access to the interior volume of the box corresponds to the user authenticator having to deposit an object received from the server, for the current time slot. If not, the enclosure door remains locked.

Si oui, au cours d'une étape 116, le contrôleur déverrouille la porte du boîtier et lit l'identifiant de l'objet déposé dans son volume intérieur. Si, après une durée prédéterminée, par exemple dix secondes, aucun identifiant d'objet n'est lu ou si un identifiant d'objet lu ne correspond pas à l'identifiant d'objet reçu de la part du serveur pour la plage horaire courant, le contrôleur déclenche une alerte perceptible par l'utilisateur au niveau du boîtier, au cours d'une étape 117.If so, during a step 116, the controller unlocks the door of the box and reads the identifier of the object deposited in its interior volume. If, after a predetermined time, for example ten seconds, no object identifier is read or if an object identifier read does not correspond to the object identifier received from the server for the current time slot , the controller triggers an alert perceptible by the user at the level of the box, during a step 117.

Si le seul l'identifiant d'objet lu correspond à l'identifiant d'objet reçu de la part du serveur, au cours d'une étape 118, le contrôleur verrouille la porte du boîtier.If the only object identifier read corresponds to the object identifier received from the server, during a step 118, the controller locks the door of the box.

Ainsi, contrairement à ce qui était connu dans l'art antérieur, le boîtier mis à disposition de différents utilisateurs ne peut être verrouillé que s'il est vide ou contient un objet prédéterminé. Lorsque le boîtier est vide, pour qu'un utilisateur déverrouille la porte du boîtier, y place un objet et déclenche le verrouillage de la porte du boîtier, uniquement au cours de la plage horaire attribuée à ce dépôt d'objet et cumulativement, l'utilisateur est authentifié et l'objet est identifié. Au cas où l'utilisateur est authentifié mais que l'objet n'est pas identifié, un signal d'alerte perceptible par l'utilisateur est déclenché au niveau du boîtier.Thus, contrary to what was known in the prior art, the box made available to different users can only be locked if it is empty or contains a predetermined object. When the enclosure is empty, for a user to unlock the enclosure door, place an object in it, and trigger the enclosure door lock, only when during the time slot allocated to this object depot and cumulatively, the user is authenticated and the object is identified. In the event that the user is authenticated but the object is not identified, an alert signal perceptible by the user is triggered at the level of the box.

Au cours d'une étape 119, le boîtier contenant un objet et la porte du boîtier étant verrouillée, un candidat utilisateur devant retirer l'objet se présente devant le boîtier et fournit un authentifiant d'utilisateur.During a step 119, the box containing an object and the door of the box being locked, a user candidate having to remove the object presents himself in front of the box and provides a user authenticator.

Au cours d'une étape 120, le contrôleur du boîtier vérifie que l'authentifiant de l'utilisateur candidat à l'accès au volume intérieur du boîtier correspond à l'authentifiant d'utilisateur devant déposer un objet reçu de la part du serveur, pour la plage horaire courante. Si non, la porte du boîtier reste verrouillée.During a step 120, the controller of the box verifies that the authenticator of the user candidate for access to the interior volume of the box corresponds to the user authenticator having to deposit an object received from the server, for the current time slot. If not, the enclosure door remains locked.

Si oui, au cours d'une étape 121, le contrôleur déverrouille la porte du boîtier et lit l'identifiant de l'objet déposé dans son volume intérieur. Si, après une durée prédéterminée, par exemple dix secondes, un identifiant d'objet est lu, identique ou différent de l'identifiant de l'objet présent dans le boîtier au cours de l'étape 119, le contrôleur déclenche une alerte perceptible par l'utilisateur au niveau du boîtier, au cours d'une étape 122.If so, during a step 121, the controller unlocks the door of the box and reads the identifier of the object deposited in its interior volume. If, after a predetermined period, for example ten seconds, an object identifier is read, identical or different from the identifier of the object present in the box during step 119, the controller triggers an alert perceptible by the user at the level of the box, during a step 122.

Le contrôleur verrouille l'accès au volume intérieur du boîtier soit lorsqu'aucun identifiant d'objet n'est lu, soit lorsqu'un identifiant d'objet est lu pendant une durée prédéterminée, par exemple une minute, après le déclenchement de l'alerte, au cours d'une étape 123.The controller locks access to the interior volume of the enclosure either when no object identifier is read, or when an object identifier is read for a predetermined period of time, for example one minute, after the triggering of the alert, during a step 123.

Ainsi, la porte du boîtier n'est pas déverrouillée jusqu'à l'authentification de l'utilisateur devant retirer l'objet. De plus, le boîtier vérifie, après déverrouillage suivi d'une durée prédéterminée, par exemple de dix secondes, l'absence d'identification de l'objet. Au cas où l'utilisateur est authentifié mais que l'objet identifié reste dans le boîtier au-delà de cette durée prédéterminée, un signal d'alerte perceptible par l'utilisateur est déclenché au niveau du boîtier.Thus, the housing door is not unlocked until the authentication of the user to remove the object. In addition, the box checks, after unlocking followed by a predetermined time, for example ten seconds, the absence of identification of the object. In the event that the user is authenticated but the identified object remains in the box beyond this predetermined time, an alert signal perceptible by the user is triggered at the level of the box.

Chaque identification réussie, authentification réussie et alerte est transmise au serveur, où elle est horodatée et mémorisée, pour la traçabilité. Préférentiellement, l'alerte est transmise à un utilisateur du boîtier par des moyens lumineux et/ou sonores et/ou par le biais du terminal mobile communicant.Each successful identification, successful authentication and alert is transmitted to the server, where it is time-stamped and stored, for traceability. Preferably, the alert is transmitted to a user of the box by light and / or sound means and / or by means of the communicating mobile terminal.

Préférentiellement, chaque authentifiant est à usage unique et/ou à usage limité dans le temps, par le biais de la plage horaire à laquelle l'authentifiant est associé.Preferably, each authenticator is for single use and / or for limited use in time, through the time slot with which the authenticator is associated.

Dans des variantes, les moyens d'authentification de l'utilisateur devant déposer l'objet sont des moyens d'authentification de l'objet que l'utilisateur doit déposer dans le boîtier pendant la plage horaire courante. Cette authentification est donc réalisée pendant que l'objet est à l'extérieur du boîtier, par lecture et reconnaissance de l'identifiant porté par l'objet, et vérification que cet identifiant est identique à l'identifiant d'objet reçu par le boîtier de la part du serveur, pour la plage horaire courante. Dans ces variantes :

  • au cours de l'étape 114, le boîtier étant vide et la porte du boîtier étant verrouillée, un candidat utilisateur devant déposer un objet se présente devant le boîtier et l'objet qu'il porte fournit un identifiant d'objet candidat et
  • au cours d'une étape 115, le contrôleur du boîtier vérifie que l'identifiant de l'objet candidat correspond à l'identifiant d'objet devant être déposé reçu de la part du serveur, pour la plage horaire courante. Si non, la porte du boîtier reste verrouillée.
In variants, the means of authenticating the user who must deposit the object are means of authenticating the object that the user must deposit in the box during the current time slot. This authentication is therefore performed while the object is outside the box, by reading and recognizing the identifier carried by the object, and checking that this identifier is identical to the object identifier received by the box. from the server, for the current time slot. In these variants:
  • during step 114, the box being empty and the door of the box being locked, a candidate user having to deposit an object presents himself in front of the box and the object that he carries provides a candidate object identifier and
  • during a step 115, the box controller verifies that the identifier of the candidate object corresponds to the object identifier to be deposited received from the server, for the current time slot. If not, the enclosure door remains locked.

L'authentification d'utilisateur est ainsi effectuée par reconnaissance de l'utilisateur ou par la présence de l'objet portant l'identifiant reçu à proximité du boîtier.User authentication is thus performed by recognition of the user or by the presence of the object bearing the identifier received near the box.

La restitution de l'objet ou sa transmission à un troisième utilisateur s'effectue de la même manière, en réalisant les étapes 110 à 123, les rôles des utilisateurs étant intervertis.The return of the object or its transmission to a third user is carried out in the same way, by carrying out steps 110 to 123, the roles of the users being inverted.

Claims (14)

  1. Kit comprising a housing and at least one label that can be positioned on an object and having an identifier of the object, the secure-closure housing (1, 91) comprising a door (5) movable between a closed position and an open position, the housing comprising a locking device (7) adapted to lock the door in the closed position, and comprising furthermore:
    - a means for accessing an identifier of an object, which is then the received object identifier;
    - a means for accessing an authenticator of a user who is to deposit the object;
    - means (17) for authenticating a candidate user to determine whether the candidate user corresponds to the authenticator of the user who is to deposit the object;
    - a device (11) for identifying an object present in the housing, which provides an identifier of the object or absence of identification of the object in the housing;
    - a controller (9) of the locking device, designed such that
    . when the door is closed and the identification device of an object indicates an absence of identification of an object in the housing, an unlock command is sent to the locking device only after authentication of the user who is to deposit the object;
    . a lock command is sent after the identification device of an object has provided an identifier of an object that corresponds to the object identifier received; and
    . an alarm is triggered and the locking of the door is prevented when the identification device of an object provides an identifier of an object that does not correspond to the object identifier received;
    wherein the means (17) for authenticating the candidate user, to determine whether the candidate user corresponds to the authenticator of the user who is to deposit the object, comprises a means for reading, outside the housing, the identifier carried by the object, and determining whether the identifier read corresponds to the object identifier received.
  2. Kit according to claim 1, wherein the housing also comprises:
    - a means for accessing an authenticator of a user who is to remove the object;
    - means (17) for authenticating a candidate user to determine, after the door is locked with the object present in the housing, whether the candidate user corresponds to the authenticator of the user who is to remove the object;
    - the controller (9) of the locking device being additionally designed such that, when the door is closed and the object identification device indicates that the housing contains an identified object, an unlock command is sent to the locking device only after authentication of the user who is to remove the object.
  3. Kit according to claim 2, wherein the controller is designed such that, after unlocking, if the identification device of the object indicates that the identified object remains in the housing beyond a predefined period of time, an alarm perceptible to the user is triggered at the location of the housing.
  4. Kit according to one of claims 1 to 3, wherein the means for accessing an identifier of an object is designed to communicate with an identification server (21) and to receive from the server an identifier of the object.
  5. Kit according to claim 4, wherein the identification device (11) performs the identification of the predetermined object by recognizing the identification code, the identification code being reproduced on the object.
  6. Kit according to one of claims 1 to 5, wherein the housing comprises an emitter-receiver (19) designed to send a user authenticator read on the object by the authentication means to an authentication server and receive from the authentication server information on the correspondence between the authenticator read and a user authenticator.
  7. Kit according to one of claims 1 to 6, wherein the authentication means (17) comprise a keypad, and the authentication means are designed to authenticate the user by means of an authenticator being entered on the keypad and compared to an authenticator calculated in the absence of a server connection.
  8. Kit according to one of claims 1 to 7, wherein at least one user authenticator is single-use.
  9. Kit according to one of claims 1 to 8, wherein the door (73) is able to slide vertically between the closed position and the open position, such that gravity keeps the door in the closed position in the absence of another force, and the locking device comprises a notch (83) in the door and a pin (85) secured to the housing, the pin being maintained in the notch by a spring when the door is closed.
  10. Method of transmitting an object between users utilizing a secure-closure housing (1, 91) comprising a door (5) movable between a closed position and an open position, the housing comprising a locking device (7) designed to lock the door in the closed position, the method utilizing a label positioned on an object and having an identifier of the object, the method being characterized in that it comprises:
    - a step of accessing an identifier of an object, which is then the received object identifier;
    - a step of accessing an authenticator of a user who is to deposit the object;
    - a step (17) of authenticating a candidate user to determine whether the candidate user corresponds to the authenticator of the user who is to deposit the object;
    - a step of identifying an object present in the housing, which provides an identifier of the object or absence of identification of the object in the housing;
    - a step, when the door is closed and the step of identifying an object indicates an absence of object identification in the housing, of sending an unlock command to the locking device only after authentication of the user who is to deposit the object;
    and, after the door is unlocked:
    - a step of sending a lock command after the object identification step has provided an object identifier that corresponds to the identifier received; and
    - a step of triggering an alarm and preventing the door being locked when the object identification step provides an object identifier that does not correspond to the object identifier received;
    wherein the step (17) of authenticating the candidate user, to determine whether the candidate user corresponds to the memorized authenticator of the user who is to deposit the object, comprises a step of reading, outside the housing, the identifier carried by the object, and determining whether the identifier read corresponds to the object identifier received.
  11. Method according to claim 10, which also comprises:
    - a step of accessing an authenticator of a user who is to remove the object;
    - a step of authenticating a candidate user to determine, after the door is locked with the object present in the housing, whether the candidate user corresponds to the memorized authenticator of the user who is to remove the object; and
    - when the door is closed and the object identification device indicates that the housing contains an object, to send an unlock command to the locking device only after authentication of the user who is to remove the object.
  12. Method according to claim 11, which also comprises, after unlocking, a step of triggering an alarm perceptible to the user at the location of the housing if the object identification step indicates that the object remains in the housing beyond a predefined period of time.
  13. Method according to one of claims 10 to 12, which comprises a step of sending a user authenticator read on the object during the object identification step to an authentication server and a step of receiving from the authentication server information on the correspondence between the authenticator read and a user authenticator.
  14. Use of a kit according to one of claims 1 to 9 for vehicle sharing, a first user inserting into the housing at least a vehicle key and a second user retrieving the key in the housing.
EP17714845.9A 2016-02-26 2017-02-27 Secure housing with predetermined contents and dynamic management Active EP3420172B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1651602A FR3048257B1 (en) 2016-02-26 2016-02-26 SECURE BOX WITH PREDETERMINED CONTENT AND DYNAMIC MANAGEMENT
PCT/FR2017/050434 WO2017144836A1 (en) 2016-02-26 2017-02-27 Secure housing with predetermined contents and dynamic management

Publications (2)

Publication Number Publication Date
EP3420172A1 EP3420172A1 (en) 2019-01-02
EP3420172B1 true EP3420172B1 (en) 2022-01-05

Family

ID=56322045

Family Applications (1)

Application Number Title Priority Date Filing Date
EP17714845.9A Active EP3420172B1 (en) 2016-02-26 2017-02-27 Secure housing with predetermined contents and dynamic management

Country Status (6)

Country Link
US (1) US20190085616A1 (en)
EP (1) EP3420172B1 (en)
CN (1) CN109072661A (en)
ES (1) ES2906784T3 (en)
FR (1) FR3048257B1 (en)
WO (1) WO2017144836A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108021963B (en) * 2016-10-28 2020-12-01 北京东软医疗设备有限公司 Marking device for medical imaging equipment parts
JP6897536B2 (en) 2017-12-12 2021-06-30 トヨタ自動車株式会社 Authentication information control system, authentication information control method, and authentication information control program
EP3947882A1 (en) * 2019-03-28 2022-02-09 Pelipod Ltd. Container
US11512497B2 (en) * 2019-08-20 2022-11-29 William Nylander Remotely controlled cabinet assembly
AT523309B1 (en) * 2019-08-23 2022-06-15 Knapp Ag Security system for a danger area
CN110469234A (en) * 2019-08-31 2019-11-19 荆门市南博智能科技有限公司 A kind of intelligent and safe safety device
EP3819876B1 (en) * 2019-11-06 2023-11-22 Industrilås I Nässjö AB Handle arrangement with user authentication
CN111441692A (en) * 2020-05-29 2020-07-24 广东奥达信制冷科技有限公司 Placement device and safe deposit box
CN112664098B (en) * 2021-01-26 2022-03-25 北京呈创科技股份有限公司 Intelligent control integrated lock for safe deposit box
CN114673407B (en) * 2022-03-24 2023-05-16 中国核电工程有限公司 Containment dual-gate control system and method, containment and dual-gate system thereof

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5295743A (en) * 1991-09-06 1994-03-22 Dasco Data Products Limited Secure cabinets
FR2741103B1 (en) * 1995-11-15 1998-10-16 Brink S Sa DEVICE FOR CONTROLLING THE OPENING OF AT LEAST TWO DOORS AND DEVICE PROTECTION ARRANGEMENT COMPRISING SAME
WO2000016281A1 (en) * 1998-09-11 2000-03-23 Key-Trak, Inc. Mobile object tracking system
GB2425206B (en) * 2005-04-14 2007-08-01 Robert Grayson Secure delivery of goods
KR20090109281A (en) * 2008-04-15 2009-10-20 김기동 Key storage case
WO2011014116A1 (en) * 2009-07-31 2011-02-03 Raufoss Ammunisjonsfabrikker As Safe comprising a door which is linearly displaceable between closed and open position.
DE202012100168U1 (en) * 2012-01-18 2012-02-16 Kruse Sicherheitssysteme Gmbh & Co. Kg Device for secure storage and release of access keys to a building or a building section
DE102014105244A1 (en) * 2013-12-05 2015-06-11 Deutsche Post Ag Method for deactivating the locking of at least one door of a housing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
US20190085616A1 (en) 2019-03-21
CN109072661A (en) 2018-12-21
FR3048257A1 (en) 2017-09-01
EP3420172A1 (en) 2019-01-02
WO2017144836A1 (en) 2017-08-31
FR3048257B1 (en) 2021-06-18
ES2906784T3 (en) 2022-04-20

Similar Documents

Publication Publication Date Title
EP3420172B1 (en) Secure housing with predetermined contents and dynamic management
EP1780680B1 (en) Procedure for control of interlock and lock
USRE49450E1 (en) Asset management system utilizing a mobile application
EP2864966B1 (en) Electronic padlock, mobile terminal adapted for controlling the electronic padlock, and method for controlling the electronic padlock
US20240169306A1 (en) System and method for safe delivery of a package
EP3125201A1 (en) Method for controlling the opening of a lock by one-time passcode
US20220383680A1 (en) Touchless smart storage box with face recognition system
EP2979393B1 (en) Authentication method
EP3379015A1 (en) Method and system for monitoring an object intended to be shared by a plurality of potential users
EP3257028B1 (en) Semi-automatic display unit for gas cylinders and associated method
EP3262553B1 (en) Method of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers
EP3963823A1 (en) Method for securely connecting to an onboard web service and corresponding device
JP2014148850A (en) Delivery article reception box and delivery system
EP3195276A1 (en) Device for unlocking at least one opening leaf and equipment for receiving objects, associated data storage assembly and associated object distribution system
EP2691941A1 (en) Method and device for actuating a lock
WO2018210879A1 (en) Multifunctional integrated device and method for vehicle mobility
EP4254286B1 (en) System for conveying objects contained in boxes on which destination identification means are provided
WO2001075822A1 (en) Storage system for depositing and recovering an object
US11893846B2 (en) Devices, systems, apparatuses, and methods for smart cam locks and key lock boxes
WO2023089245A1 (en) Access control system and device
EP2728524B1 (en) Method for controlling access to a premise by reading a graphic code provided on an access coupon, related system and computer program
WO2012022856A1 (en) Method of authenticating a user of the internet network
FR2924843A1 (en) Access control system for e.g. computer in public/private enterprise, has authentication architecture comprising control procedure for providing access to computing system based on identity and contextual information relative to person
WO2013128119A1 (en) Recording of a transfer of an object

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20180919

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

RIN1 Information on inventor provided before grant (corrected)

Inventor name: SOUFFLET, STANISLAS

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20191030

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20210728

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1460761

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220115

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602017051861

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: FRENCH

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2906784

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20220420

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1460761

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220505

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220405

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220405

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220406

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220505

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602017051861

Country of ref document: DE

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220227

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

26N No opposition filed

Effective date: 20221006

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220228

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220227

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: ES

Payment date: 20230405

Year of fee payment: 7

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20170227

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20240228

Year of fee payment: 8

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20240328

Year of fee payment: 8

Ref country code: GB

Payment date: 20240229

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20240228

Year of fee payment: 8

Ref country code: FR

Payment date: 20240223

Year of fee payment: 8

Ref country code: BE

Payment date: 20240228

Year of fee payment: 8

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105