[go: up one dir, main page]

EP2649590B1 - Wireless biometric access control system and operation method thereof - Google Patents

Wireless biometric access control system and operation method thereof Download PDF

Info

Publication number
EP2649590B1
EP2649590B1 EP10816396.5A EP10816396A EP2649590B1 EP 2649590 B1 EP2649590 B1 EP 2649590B1 EP 10816396 A EP10816396 A EP 10816396A EP 2649590 B1 EP2649590 B1 EP 2649590B1
Authority
EP
European Patent Office
Prior art keywords
module
user
biometric
random code
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Not-in-force
Application number
EP10816396.5A
Other languages
German (de)
French (fr)
Other versions
EP2649590A1 (en
Inventor
Rui Manuel Lopes Da Silva
Luís Carlos MARTINS FERREIRA
Amadeu Luís DA MOTA ALVES
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yonos Lda
Original Assignee
Yonos Lda
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yonos Lda filed Critical Yonos Lda
Publication of EP2649590A1 publication Critical patent/EP2649590A1/en
Application granted granted Critical
Publication of EP2649590B1 publication Critical patent/EP2649590B1/en
Not-in-force legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/12Comprising means for protecting or securing the privacy of biometric data, e.g. cancellable biometrics
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/61Signal comprising different frequencies, e.g. frequency hopping

Definitions

  • the present invention relates to access control systems and methods, more specifically to wireless remote access control and, in particular, fingerprint enabled wireless remote access control systems and methods.
  • the present invention describes a wireless biometric access control system host which comprises:
  • a preferred embodiment further comprises a communication module (390) for connection (391, 501) with an external computer (500).
  • a preferred embodiment further comprises visual indicators (330) and/or a display (350).
  • the present invention also describes a wireless biometric access control system remote control comprising:
  • a preferred embodiment further comprises a key stuck module.
  • the present invention also describes an operation method of a wireless biometric access control system host comprising the steps:
  • the present invention also describes an operation method of a wireless biometric access control system remote control comprising the steps:
  • a preferred embodiment further comprises the step that after a preset time without use, the previously stored biometric key data is permanently erased from the remote control.
  • the biometric sensor (220) is a fingerprint sensor.
  • first and second signals are separated in frequency.
  • the proposed invention refers to a wireless fingerprint recognition remote control 200 that transmits the encrypted user fingerprint data namely through two separated wireless radiofrequency signals 251/311 and 252/312.
  • This secured process also means that fingerprint data is not permanently stored on the remote control 200 device and is only verified on the host controller.
  • the system is designed to provide a secure access 341 to the controlled device 400 allowed or halted by host controller 300 through the fingerprint remote control 200 by the user 100 and its fingerprint 111.
  • the controlled device 400 can be, for example, door lock, alarm system, automatic door/gates, rolling shutters, barriers, swing or slide gates, access control system,...
  • the user 100 selects the known host controller 300 by selecting one of four (or more) channels keys 210 through action indicated by arrow 110.
  • the controller module 240 collects this data together with a random code generated by the random number module and the user group selector module, typically done by a dipswitch, 270.
  • the random code is intended to be used to encrypt data to be sent later by the RF packet 252.
  • the packed data is sent to the host controller 300 through the wireless module 250 sending the first RF communication packet 251.
  • the subsystem 300 receives the RF packet data through the wireless module 310 and checks through comparator module in the controller 320 module.
  • configuration 380 (typically done by a dipswitch described as the system channel ID module) communication is established. Note that both the selector keys module 210 and the channel ID module 380 can optionally be used in combination with pairing modules.
  • the next step is to verify, by using the comparator module, if the random code was used before, by checking against the previous list saved on the memory module. If the first received packet sent through 251 matches with the whole host controller 300 data or configuration modules, then an acknowledge (ACK) feedback packet is sent by the communication 311 through the wireless module 310 and the system proceeds with the second process. If not, a Not acknowledge (NAK) feedback packet is sent and the remote control 200 restarts its process from the beginning, i.e. the first process.
  • ACK acknowledge
  • NAK Not acknowledge
  • the second process is triggered by acknowledge message 311 received from the module 310, the user 100 is then asked by lighting green led 230 to pass his fingerprint 111 over the fingerprint sensor module 220 .
  • the finger print sensor module 220 is activated.
  • the system processes the biometric data through the controller/memory module 240 and temporarily saves the biometric data in the memory module, which is useful for the user in case he needs to access consecutive multiple points, as he only has to scan his fingerprint once(After a preset timeout the biometric data is permanently erased from the memory module).
  • the biometric signature is encrypted by using the encryption module and the random code which was previously generated and stored by the respective random code and memory modules.
  • This information is packed and sent through the RF signal 252 by the wireless module 250 to the RF module 310.
  • this encrypted biometric signal is acknowledged by signal 312 and decrypted in the decryption module by using the previously saved random code.
  • the biometric signature is checked in the comparator module, against the biometric user list stored on the database memory module , present on the sub-system 320. If the user 100 was already registered on the host controller 300 the system sends an enable signal 341 to the controlled device 400 through output control 340. Otherwise the system keeps on the current disabled status signal access.
  • the remote control 200 is in stand-by mode waiting to be triggered by keys 210. Once triggered, a key scan is performed by the key scan module to determine which key was pressed.
  • the Key Stuck module present in the remote control module 200, monitors for stuck keys in the key module 210 (A Stuck Key occurs when some object is accidentally placed on the remote control, pressing down keys unknowingly).
  • the administrator 600 For registering, deleting and resetting the host controller 300, the administrator 600 has full access by enabling 611 the administrator key 360 typically done by a key switch. This key enables the functions of registering a user by pressing the register key 371 or deleting a registered user in the database module by pressing the delete key 372. Additionally, to perform those functions the user or administrator also has access to the human interface devices such as the keypad 374 and the, namely dot matrix LCD, display 350. An optional software hosted by PC 500 can also be used to have access to these functions.
  • the bidirectional communication 391 and 501 between the host controller 300 and Personal Computer 500 is done through, namely, the serial communication module 390.
  • Both subsystem 200 and 300 have the respective reset buttons 260 and 373. Just pressing them will optionally restart the system in case of crash.
  • Host controller leds 330 serve to signal operations or system status to the user and/or administrator.
  • the fingerprint sensor 220 could be replaced by any appropriate means for identifying a person, namely biometric, namely iris scanner, hand dimension scanner, face feature scanner, etc...
  • the invention presents, namely, the following advantages:
  • Main purpose user carries just one remote control 200 device to access any programmed host receiver 300 system.
  • the complete access system information is separated in two communication parts: first information is transmitted over a carrier frequency through communication 251/311 of namely 433MHz (for US region power must or can be reduced) and the second is sent in carrier frequency through communication 252/312 of namely 868MHz or 915MHz (for US region) as shown in figure 15 .
  • the first info is the basic system information and identification while the second is the fingerprint user.
  • the whole system can operate by using just one carrier frequency together with the frequency hopping technology; in this case there is no second transceiver installed.
  • the user biometric signature 111 is the key, the biometric signature is registered and verified on the host controller 300 thus, you can use any remote control 200 or even if you lose the remote control you can just obtain another one
  • the biometric signature is temporary stored on the remote control memory module for easy access on multiple access area, after this short period of time is permanently deleted from the memory module.
  • Random code transmissions up to 2n for each registered user are generated and are not repeated for that user. Note that all the random codes are stored and generated on the remote control 200's random module and stored on the host control 300 database module in order not to repeat the same code. Expandable memory according to the customer's requirements. Initially the system is designed for home users (medium/small family) but for buildings could ask for extra memory capacity. For this situation the system optionally allows memory expandable sockets.
  • the user database module is optionally divided by group users 700, 710 and 720 and user data 701, 702 and 703 for example for each user group 711, 712, 713, 721, 722, 723.
  • the first task is usually looking by the user group by using the comparator module and then the user data which contains the biometric fingerprint and the latest 2 n used random codes.
  • the Figure 16 explains the database user storage structure.
  • the system performs the communication using a set of device and user properties.
  • the overall string communication is, in a preferred embodiment, composed by: - System ID + Channel ID + Random Code + User Group + encrypted User Biometric Signature
  • the figure 3 shows the block diagram for a preferred embodiment for the present remote control system invention.
  • the system comprises the following items :
  • the dashed boxes means that those components can be integrated in the same module, i.e. if the microcontroller has enough memory to store the 2 n random generated code the microcontroller 1010 and memory 1020 is on the same IC 1000, integrated circuit 1000, module 1000, etc... otherwise they are separated. This applies also to the wireless modules (1600).
  • the system also provides the appropriate connections (1710 1720, 1730, 1740).
  • one of the RF transceivers can be avoided.
  • the figure 4 shows the system architecture.
  • Bill of materials / component description ( figure 4 ) Item Description Manufacturer Reference Manufacturer Finger Print Sensor (2100) Electronic device used for used to capture a digital image of the fingerprint pattern AES1710 or AES1711 Authentec Microcontroller (2000) Small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals GEN** GEN** Memory (2300) Electronic device used to store data or programs (sequences of instructions) on a temporary basis.
  • GEN** GEN** 433/868/91 5MHz RF transceive r Modules (2210 and 2220) Electronic device that has both a transmitter and a receiver which is combined and share common circuitry Hoperf RFM22-433-D* RFM22-868-D* RFM22-915-D* or a single housing and is used for transmit or receive radio frequency communication signals.
  • Green & Red LED (2810 and 2820) Electronic device used for emitting light and is used as an indicator lamp.
  • GEN** GEN** 8Bits Dip Switch (2400) A set of manual electric switches that are packaged in a group in a standard dual in-line package and used to customize the behavior of an electronic device for specific situations
  • GEN** GEN** Reset Button (2750) Internal button for erase the all the random codes used on the remote and/or restart the microcontroller.
  • GEN** GEN** Key 1 (2710), Key 2 External user key fob for system channel selection
  • * “D” is for DIP package S1 and S2 is for SMD version, for more details refer to the product datasheet.
  • ** "GEN” is a generic component reference for any easily available part, of common and direct knowledge in the area.
  • the system optionally performs a battery level monitoring (3000, 3100, 3200) in order to advise the user to replace by fresh units.
  • a battery level monitoring (3000, 3100, 3200) in order to advise the user to replace by fresh units. The operation is done as explained on flow chart from Fig. 5 .
  • Reset button (3300) is intended to be used to restart all the system (3500) in case of crash or hang.
  • Another function of this key in combination with any of the 4 key fobs (3400) is to optionally allow the administrator deleting all random codes (3410) stored on the memory.
  • the flow chart from Fig. 6 explains the operation.
  • the flux diagram from Fig. 7 shows the remote control functionality (4000-4720) .
  • the process remains on a keyscan mode (4000) and waits for any pressed button (4100) and starts by generating and storing a non repetitive random code (4120, 4200 and 4210) and starting to transmit the first part of the information (4220).
  • the system is looking for a biometric signature stored on the temporary memory (4300) and if available in the memory, encrypts the stored biometric signature together with the previous generated random code (4310) and saves it on the memory (4320). Finally, it transmits the random code and the previous encrypted data (4330) and gives feedback to the user by optionally blinking twice the green LED (4340).
  • biometric signature is not on the memory (4300) then the system wakes up (4400) and informs the user (4410) and enables the biometric sensor scan mode (4420). If the biometric signature is received successfully (4500) then the remote stores it temporarily on the memory (4510) and permanently deletes it from memory if an optionally timeout is set (4600 and 4610). Also a timeout is set for biometric signature scan process (4700, 4710 and 4720) to avoid unwanted operations.
  • system should optionally enable stand-by mode (4350) in the finger print circuitry and/or other non relevant hardware in order to save battery life.
  • Biometric Signature corresponds to biometric key or, simply, BioKey; Random Code corresponds Ran#.
  • the figure 8 shows the block diagram for host receiver/control.
  • the system comprises the following items: Administrator Key (5100): to register new or erase existing users, allow communication with a computer by using software for administration purposes.
  • Register (5110) and delete (5120) user buttons allow administrator add or remove users without using computer software.
  • Reset button (5130) just pressing this button performs a system refresh this is the soft reset operation.
  • system administrator can erase all registered users doing a hard reset operation by pressing this button simultaneously with delete button, administrator key must optionally be enabled to perform this operation.
  • Red/Green Led Status (5500): info feedback remote control status for the user/administrator;
  • 433MHz, 868MHz or 915MHz transceiver modules (5210 and 5220): send/receive RF packets from the user remote control;
  • RS232 port (5820): communication between computer software and the receiver.
  • Microcontroller to process all the input data from the receiver, software manager and status buttons;
  • Internal/external memory to store all the data necessary to deal by the microcontroller and according with system specifications.
  • Output Control digital output to grant/deny access to the controlled device/unit.
  • the controlled device/unit is a device that controls, for example, a door lock, alarm system or automatic door/gates, rolling shutters, barriers, swing and slide gates.
  • Dot Matrix LCD Liquid crystal display is used to show display information to the user.
  • Input Keypad (5150): Keyboard used to input information or control system functions.
  • the dashed boxes means that those components can be integrated in the same module, i.e. if the microcontroller 5010 and memory 5020 can be on the same element 5000, be it an integrated circuit, module, etc... otherwise they are separated. This applies also to the wireless modules 5200.
  • Figure 9 shows the system architecture.
  • "GEN” is a generic component reference for any easily available part, of common and direct knowledge in the area.
  • a keyswitch is an electrical component switch that can be activated by key.
  • GEN** GEN** Reset (6140), Register (6120) and delete (6130) Key Electrical component that can break or establish an electrical circuit, interrupting or conducting the current or diverting it from one conductor to another GEN** GEN** Microcontroller (6000) small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals GEN** GEN** Memory (6400) Electronic device used to store data or programs (sequences of instructions) on a temporary basis.
  • GEN** GEN** 433/868/91 5MHz Transceiver Modules (6520 and 6510) Electronic device that has both a transmitter and a receiver which is combined and share common circuitry or a single housing and is used for transmit or receive radio frequency communication signals. Hoperf RFM22-433-D* RFM22-868-D* RFM22-915-D Status LEDs: Green & Red (6620 and 6610) Electronic device used for emitting light and is used as an indicator lamp.
  • GEN** GEN** 2 bits Dipswitch (6150) A set of manual electric switches that are packaged in a group in a standard dual in-line package and used to customize the behaviour of an electronic device for specific situations
  • GEN** GEN** RS232 Port (6200) Serial communication physical interface by using the RS-232 standard, intended to interface with an external communication device Standard DB9 connector
  • GEN** Input Keypad (6160) Human interface device used to allow the user input or control data.
  • GEN** GEN** Dot Matrix LCD (6300) Liquid Crystal Display used to display/show information for the user GEN** GEN** * "D" is for DIP package S1 and S2 is for SMD version, for more details refer to the product datasheet. ** "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area.
  • the figures 10 , 11 , 12 , 13,14 shows the host receiver/control functionality.
  • A000 is the beginning of the main process (7000-7091)A001 is the start of the scan RF process.
  • A200 is the Random code cleaning.
  • A100 is the user registry process (7100-7145)
  • Fig 12 ,A300 is the erase user data process (7200-7241)and Fig 13 , A310 (7300-7322) continues this process;
  • Main process starts with check if admin key(7000)is not enabled.
  • System starts to scan for an RF-signal (7001) and decodes it (7010). If valid string format (7010), system id (7020)and channel ID(7030) match, system stores new random code, user group ID and feeds back to user (7031). If no matching found, system returns to the beginning.
  • Systems scans for separate RF signal (7032) and decodes it(7033). If string is valid(7040) and random code matches(7050), then biometric key is decrypted using encrypted biometric signature and stored random code (7051).
  • timeout (7090) if timeout (7090) has not occurred, then system returns to scan for 2 nd signal (7032); if timeout (7090), system cleans last random code(7091) and goes to beginning. If user group ID (7060) and biometric key (7070) are registered and admin key is not enabled (7080), then system registers random code for this user (7081) enabling access (7082)and feeds back to user (7083).
  • User registry process starts with the registry counter reset (7100), if admin key (7110), register key (7120) are enabled and if it is first registration (7130), system prompts user (7131) for new user ID and waits for input (7132).
  • System searches for user ID in database ( 7133) and if not found (7140) it registers the random code and new user ID(7142), registers the user group ID (7143),adds biometric key and increments registry counter (7144) and gives feedback to user (7145). If user ID found (7140) systems feeds back user (7141) and returns to prompting user for a new input (7131).
  • system proceeds with adding a biokey user (7144).
  • Erase user data process starts if erase key is enabled (7200).
  • the system resets the delete counter (7201), prompts for the user ID to be deleted (7202) and waits for user input (7203).
  • System searches for user ID (7204) and if found (7210) feeds back to the user (7211) prompting for deletion of user random code numbers (7212). If neither register key (7220) nor delete key (7230) are pressed, system waits for input at (7212). By pressing register key (7220) as "yes” system removes all random codes for selected user and feeds back to the user (7221). By pressing delete key (7230) as "no” system continues to (A310).
  • Continuation of Erase user data process starts with prompt to user to delete user ID (7300). If neither register key (7310) nor delete key (7320) are pressed, system waits for input at (7300). By pressing register key (7310) as "yes” system removes all user data (7311,7312,7313) for selected user and feeds back to the user (7314,7315). By pressing delete key (7320) as “no” system feeds back to the user (7321, 7322) and goes to (A200).
  • Fig 14 is the optional hard reset operation (9000-9220). If the admin key (9000), delete button (9100) and reset button (9200) are simultaneously activated, all registered users are deleted (9210) and the system is reset (9220). Note from the flow chart of figure 14 During delete users operation, red Led must optionally blink while the user database is being deleted.
  • Serial Peripheral Interface Bus is a synchronous serial data link standard that operates in full duplex mode.
  • RS232 Recommended Standard 232 is a standard for serial binary single-ended data and control signals connecting between a DTE (Data Terminal Equipment) and a DCE (Data Circuit-terminating Equipment).
  • DTE Data Terminal Equipment
  • DCE Data Circuit-terminating Equipment
  • LVD Low Voltage Detect
  • POR Power-on reset
  • Output Control output digital signal or electrical signal is used to enable or grant access to the controlled device.
  • ISM Industrial , scientific and medical radio bands were originally reserved internationally for the use of RF electromagnetic fields for industrial, scientific and medical purposes other than communications.
  • communications equipment must accept any interference generated by ISM equipment
  • Short Range Devices are radio devices that offer a low risk of interference with other radio services, usually because their transmitted power, and hence their range, is low.
  • the definition 'Short Range Device' may be applied to many different types of wireless equipment, including various forms of:
  • Short range devices often benefit from a relaxed regulatory regime compared with other radio communications equipment.
  • a user is licence free to operate such equipment, some specific cases may require an individual licence.
  • R&TTE Radio and Telecommunications Terminal Equipment

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Selective Calling Equipment (AREA)
  • Collating Specific Patterns (AREA)

Description

    Technical Field
  • The present invention relates to access control systems and methods, more specifically to wireless remote access control and, in particular, fingerprint enabled wireless remote access control systems and methods.
  • Document WO 2007/011311 describes a system and a method of communication between a portable user device and an access control device in two different frequencies.
  • Summary
  • The present invention describes a wireless biometric access control system host which comprises:
    • user (371, 372, 373, 374) and administrator (360) keys and/or keypad module; output control module (340); controller module (320); wireless module (310), configured to emit and receive a first and a second separated radio signals; channel ID module (380), configured to select a channel ID; memory module, configured to store a user random code and a user group ID; comparator module, at least configured to compare two user random codes; database module configured to register biometric keys, user group Ids; decryption module, configured to decrypt a biometric key.
  • A preferred embodiment further comprises a communication module (390) for connection (391, 501) with an external computer (500).
  • A preferred embodiment further comprises visual indicators (330) and/or a display (350).
  • The present invention also describes a wireless biometric access control system remote control comprising:
    • biometric sensor (220); user channel id keys and/or keypad module (210); controller module (240); random number generator module; user group selector module (270); memory module, configured to store at least one user random code and a biometric key; comparator module, configured to compare user random codes; wireless module (250), able to emit and receive a first and a second separated radio signals; encryption module, configured to encrypt a biometric key.
  • A preferred embodiment further comprises a key stuck module.
  • The present invention also describes an operation method of a wireless biometric access control system host comprising the steps:
    • scanning for a first signal emitted by a remote controller; decoding said first signal; checking for a valid format, system id and a channel id contained in said first signal; if verified, storing a random code and a user group id contained in a memory module for said first signal; scanning for a second signal emitted by said remote controller; decoding said second signal in a decryption module; verifying in a comparator module, if the previously random code stored in the memory module from the first signal and the random code contained in the second signal, match; if verified, obtaining a biometric key from decrypting a biometric signature contained in said second signal using the random code; verifying in the comparator module, if said biometric key and said user group id have been previously registered in a database module; if verified, registering the random code in the database module for the identified user; establishing that the identified user has been authenticated and triggering an action accordingly.
  • A preferred embodiment further comprises the steps:
    • if said biometric key or said user group id have not been previously registered in the database module, verifying if a suitable combination of user and administrator keys has been activated signalling a new registration operation; if verified, verifying through the comparator module if there is any previously stored biometric key in the database module for the identified user; if not verified, prompting for a new user id; verifying said user id is new in the database module; if verified, registering said user id, said random code and said user group id in the database module; storing the biometric key(s) for the identified user in the database module.
  • A preferred embodiment further comprises the steps:
    • previous to said method, verifying if a suitable combination of user and administrator keys has been activated signalling a delete operation; prompting for an user id; verifying through comparator module if, said user id has been previously registered in the database module; if verified, prompting if all random codes for the identified user should be erased and, if so selected, erasing all random codes for the identified user in the database module; prompting if the identified user should be erased and, if so selected, removing all biometric keys and user group id for the identified user and removing said user id from the database module.
  • The present invention also describes an operation method of a wireless biometric access control system remote control comprising the steps:
    • scanning for a user trigger through a key module (210); generating a new random code in a random code module; repeating said generation of a new random code until it is verified that said random code is not present in a memory module for previously stored random codes; storing said random code in the memory module; emitting a first signal with a system id, a channel id, said random code, and a user group id; verifying if there is a previously and temporarily stored biometric key in the memory module; if not verified, resuming power to biometric scanner (220), scanning a biometric signature, interrupting power to the biometric scanner (220), and storing said biometric information as a biometric key; encrypt the biometric signature through an encryption module using said random code emitting a second signal with said random code and an encrypted biometric signature obtained using said stored biometric key and the random code.
  • A preferred embodiment further comprises the step that after a preset time without use, the previously stored biometric key data is permanently erased from the remote control.
  • In a preferred embodiment the biometric sensor (220) is a fingerprint sensor.
  • In a preferred embodiment the first and second signals are separated in frequency.
  • General disclosure of the invention
  • The proposed invention refers to a wireless fingerprint recognition remote control 200 that transmits the encrypted user fingerprint data namely through two separated wireless radiofrequency signals 251/311 and 252/312. This secured process also means that fingerprint data is not permanently stored on the remote control 200 device and is only verified on the host controller.
  • The system, see fig. 1, is designed to provide a secure access 341 to the controlled device 400 allowed or halted by host controller 300 through the fingerprint remote control 200 by the user 100 and its fingerprint 111. The controlled device 400 can be, for example, door lock, alarm system, automatic door/gates, rolling shutters, barriers, swing or slide gates, access control system,...
  • In the system, described in detail in fig 2, the user 100, selects the known host controller 300 by selecting one of four (or more) channels keys 210 through action indicated by arrow 110. In this first process the controller module 240 collects this data together with a random code generated by the random number module and the user group selector module, typically done by a dipswitch, 270. The random code is intended to be used to encrypt data to be sent later by the RF packet 252. The packed data is sent to the host controller 300 through the wireless module 250 sending the first RF communication packet 251. The subsystem 300 receives the RF packet data through the wireless module 310 and checks through comparator module in the controller 320 module. If the received channel ID key matches with present , configuration 380 (typically done by a dipswitch described as the system channel ID module) communication is established. Note that both the selector keys module 210 and the channel ID module 380 can optionally be used in combination with pairing modules. The next step is to verify, by using the comparator module, if the random code was used before, by checking against the previous list saved on the memory module. If the first received packet sent through 251 matches with the whole host controller 300 data or configuration modules, then an acknowledge (ACK) feedback packet is sent by the communication 311 through the wireless module 310 and the system proceeds with the second process. If not, a Not acknowledge (NAK) feedback packet is sent and the remote control 200 restarts its process from the beginning, i.e. the first process.
  • The second process is triggered by acknowledge message 311 received from the module 310, the user 100 is then asked by lighting green led 230 to pass his fingerprint 111 over the fingerprint sensor module 220 . At this stage the finger print sensor module 220 is activated. If the biometric signature is received the system processes the biometric data through the controller/memory module 240 and temporarily saves the biometric data in the memory module, which is useful for the user in case he needs to access consecutive multiple points, as he only has to scan his fingerprint once(After a preset timeout the biometric data is permanently erased from the memory module). Afterwards, the biometric signature is encrypted by using the encryption module and the random code which was previously generated and stored by the respective random code and memory modules. This information is packed and sent through the RF signal 252 by the wireless module 250 to the RF module 310. Once received by the host controller 300, this encrypted biometric signal is acknowledged by signal 312 and decrypted in the decryption module by using the previously saved random code. The biometric signature is checked in the comparator module, against the biometric user list stored on the database memory module , present on the sub-system 320. If the user 100 was already registered on the host controller 300 the system sends an enable signal 341 to the controlled device 400 through output control 340. Otherwise the system keeps on the current disabled status signal access.
  • The remote control 200, is in stand-by mode waiting to be triggered by keys 210. Once triggered, a key scan is performed by the key scan module to determine which key was pressed.
  • The Key Stuck module, present in the remote control module 200, monitors for stuck keys in the key module 210 (A Stuck Key occurs when some object is accidentally placed on the remote control, pressing down keys unknowingly).
  • For registering, deleting and resetting the host controller 300, the administrator 600 has full access by enabling 611 the administrator key 360 typically done by a key switch. This key enables the functions of registering a user by pressing the register key 371 or deleting a registered user in the database module by pressing the delete key 372. Additionally, to perform those functions the user or administrator also has access to the human interface devices such as the keypad 374 and the, namely dot matrix LCD, display 350. An optional software hosted by PC 500 can also be used to have access to these functions. The bidirectional communication 391 and 501 between the host controller 300 and Personal Computer 500 is done through, namely, the serial communication module 390.
  • Both subsystem 200 and 300 have the respective reset buttons 260 and 373. Just pressing them will optionally restart the system in case of crash. Combining reset key 260 with any of four keys 210, optionally deletes all the saved random codes on the system on the remote control 200 while the reset key 373 in combination with delete key 372 on the host controller 200 optionally erases all the user data present on the system. Host controller leds 330 serve to signal operations or system status to the user and/or administrator.
  • It would seem obvious to the person skilled in the art that the fingerprint sensor 220 could be replaced by any appropriate means for identifying a person, namely biometric, namely iris scanner, hand dimension scanner, face feature scanner, etc...
  • The invention presents, namely, the following advantages:
    • The communication between the remote and the host is split in two separate signals;
    • The system can be used to access consecutive areas in a preset short time with just one finger print scan temporarily stored in the memory module;
    • The system can be used for multiple applications, typically door lock, alarm system, automatic door/gates, rolling shutters, barriers, swing or slide gates, access control system;
    • The fact that there is no permanent information saved in the remote control memory module, is a good safety measure against loss or theft. The remote can just be replaced by a new one without the worry of inappropriate access by someone else with the missing remote;
    • The information scanned on the remote is encrypted in the encryption module when transmitted, by using the generated random code as the encryption key;
    • The use of key scan module and key stuck module, contribute to lessen the energy consumption as the finger print sensor module is only activated when no temporary biometric information is stored in the remote Further, the same fact that the remote stores temporarily the biometric data, reduces the number of times the finger print sensor module is activated. These will result in less frequent recharge of batteries or even allow the use of normal ones;
    • The user group module concept will contribute to significantly speed up the verification access process for large groups of users.
    SYSTEM OVERVIEW AND SPECIFICATIONS
  • Main purpose: user carries just one remote control 200 device to access any programmed host receiver 300 system.
  • The complete access system information is separated in two communication parts: first information is transmitted over a carrier frequency through communication 251/311 of namely 433MHz (for US region power must or can be reduced) and the second is sent in carrier frequency through communication 252/312 of namely 868MHz or 915MHz (for US region) as shown in figure 15. The first info is the basic system information and identification while the second is the fingerprint user.
  • Alternatively the whole system can operate by using just one carrier frequency together with the frequency hopping technology; in this case there is no second transceiver installed. This means the first and second packet transmissions uses the same device and just one carrier frequency namely within 433MHz, 868MHz or 915MHz(US).
  • Two way ISM(industrial, scientific and medical) radiofrequency bands typically used on SRD(short range devices) of 433MHz (EU and US with power restrictions), 868MHz(EU) and 915MHz(US) transmission optionally with Frequency Hopping Technology. Each transmitted packet is validated and followed by an ACK return message from the receiver..
  • The user biometric signature 111 is the key, the biometric signature is registered and verified on the host controller 300 thus, you can use any remote control 200 or even if you lose the remote control you can just obtain another one Although, the biometric signature is temporary stored on the remote control memory module for easy access on multiple access area, after this short period of time is permanently deleted from the memory module.
  • To grant access just register on the host controller 300(an authorized master or administrator privileges optionally needed to register).
  • Security: all the finger print key signatures must optionally be transmitted over a secure method by using an encryption algorithm in the encryption module.
  • Random code transmissions up to 2n for each registered user are generated and are not repeated for that user. Note that all the random codes are stored and generated on the remote control 200's random module and stored on the host control 300 database module in order not to repeat the same code. Expandable memory according to the customer's requirements. Initially the system is designed for home users (medium/small family) but for buildings could ask for extra memory capacity. For this situation the system optionally allows memory expandable sockets.
  • For buildings administrators usually a software manager is required to add or delete users, also small/medium families may use this option, in this case is usually optional.
  • To speed-up the user search process, the user database module is optionally divided by group users 700, 710 and 720 and user data 701, 702 and 703 for example for each user group 711, 712, 713, 721, 722, 723. Thus the first task is usually looking by the user group by using the comparator module and then the user data which contains the biometric fingerprint and the latest 2n used random codes. The Figure 16 explains the database user storage structure.
  • Multiple biometric signatures registration mechanism:
    • One given user 100 can register more than one biometric signature 810, 820 and 830. This is done by the user 100 (with the administrator authorization) through inputting the User identification key 800 (UserID) in the register process. Further it is possible to generate or reset the random codes for any user. Figure 17 details the mechanism.
    SYSTEM COMMUNICATION OVERVIEW
  • The system performs the communication using a set of device and user properties. The overall string communication is, in a preferred embodiment, composed by: - System ID + Channel ID + Random Code + User Group + encrypted User Biometric Signature
    Figure imgb0001
  • The main string above is separated in two substrings:
    • [System ID] + [Channel ID]+[Random Code]+[User Group] transmitted over the first signal [Random Code]+[encrypted User Biometric Signature] transmitted over the second signalEach separated transmission frequency signal optionally combines the frequency hopping technology. To have a relationship/connection between the two substrings, the Random code is optionally used as the connection between them.
  • Each valid transmitted packet, within a random code, should usually be validated by an ACK message from the host receiver, shown as follow:
    • [System ID] + [Channel ID]+[Random Code]+[ACK].
    Description of the figures
  • The attached figures represent preferred embodiments of the invention and should not be considered in any way restrictive of the scope of the present invention.
    • Fig. 1 - Remote fingerprint system overview
    • Fig. 2 - Remote fingerprint system detailed
    • Fig. 3 - Remote control system block diagram
    • Fig. 4 - Remote control system architecture
    • Fig. 5 - remote control flow chart: Low battery status
    • Fig. 6 - remote control flow chart: Reset
    • Fig. 7 - Remote control flow chart
    • Fig. 8 - Host controller system block diagram
    • Fig. 9 - Host controller system architecture
    • Fig. 10 - Host control flow chart: scan, process and decoding signal and access.
    • Fig. 11 - Host control flow chart: registry process.
    • Fig. 12 - Host control flow chart: optionally erase user registry process
    • Fig. 13 - Host control flow chart: optionally erase user registry and/or removing user process.
    • Fig. 14 - Host control flow chart: reset
    • Fig. 15 - System communications overview
    • Fig. 16 - User group mechanism
    • Fig. 17 - Multiple biometric signature registration
    Detailed description and preferred embodiments
  • The figure 3, shows the block diagram for a preferred embodiment for the present remote control system invention. The system comprises the following items :
    • 4 Keys Key fob (1100): to select the channel or system to communicate;
    • Reset Button (1400): internal button used to erase all the random codes used on the remote control device and/or restart the controller;
    • Finger print sensor (1200): to read the user finger print signature;
    • Status Red/Green LED (1500): info feedback remote control status for the user;
    • 433MHz, 868MHz or 915MHz transceiver modules (1610 and 1620): to establish communication with the host or receiver/controller;
    • Microcontroller (1010): to process all the input data from the user and to feedback to the host or receiver/controller;
    • Internal/external memory (1020): to store all the data necessary to deal by the microcontroller and according with system specifications.
    • User Group (1300): used for identify the user group identification on the host database.
  • From Fig.3, the dashed boxes means that those components can be integrated in the same module, i.e. if the microcontroller has enough memory to store the 2n random generated code the microcontroller 1010 and memory 1020 is on the same IC 1000, integrated circuit 1000, module 1000, etc... otherwise they are separated. This applies also to the wireless modules (1600).
  • The system also provides the appropriate connections (1710 1720, 1730, 1740).
  • In case of just one RF carrier operating frequency, one of the RF transceivers can be avoided.
  • The figure 4, shows the system architecture.
  • Bill of materials / component description ( figure 4 )
    Item Description Manufacturer Reference Manufacturer
    Finger Print Sensor (2100) Electronic device used for used to capture a digital image of the fingerprint pattern AES1710 or AES1711 Authentec
    Microcontroller (2000) Small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals GEN** GEN**
    Memory (2300) Electronic device used to store data or programs (sequences of instructions) on a temporary basis. GEN** GEN**
    433/868/91 5MHz RF transceive r Modules (2210 and 2220) Electronic device that has both a transmitter and a receiver which is combined and share common circuitry Hoperf
    RFM22-433-D*
    RFM22-868-D*
    RFM22-915-D*
    or a single housing and is used for transmit or receive radio frequency communication signals.
    Green & Red LED (2810 and 2820) Electronic device used for emitting light and is used as an indicator lamp. GEN** GEN**
    8Bits Dip Switch (2400) A set of manual electric switches that are packaged in a group in a standard dual in-line package and used to customize the behavior of an electronic device for specific situations GEN** GEN**
    Reset Button (2750) Internal button for erase the all the random codes used on the remote and/or restart the microcontroller. GEN** GEN**
    Key 1 (2710), Key 2 External user key fob for system channel selection GEN** GEN**
    (2720), Key 3 (2730), Key 4 (2740) and remote control start-up after idle mode.
    * "D" is for DIP package S1 and S2 is for SMD version, for more details refer to the product datasheet.
    ** "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area.
  • Device Internal Communications
  • Device Communication
    AES1710/11 SPI / parallel 8 Bits
    RFM22-433, RFM22-868/915 SPI
    System Memory SPI /parallel
    uC (microcontroller) SPI; parallel; digital I/O
    Key
    1 to Key 4 4x Digital inputs
    Status LEDs: Green & Red. 2x Digital output
    8Bits Dipswitch 8x Digital inputs
    LVD (2500) 1x Digital input.
    Reset Button 1x Digital input.
    Communications between microcontroller and the AES1710/11 according to the manufacturer specifications and typically can be done either by SPI (2910) or 8 bit parallel (2920, 2930,2940).
    Notes for figure 4:
    * "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area.
    (**) In case of just one RF carrier operating frequency, one of the RF transceivers may be avoided.
  • Low Battery Status
  • For improved system performance, the system optionally performs a battery level monitoring (3000, 3100, 3200) in order to advise the user to replace by fresh units. The operation is done as explained on flow chart from Fig. 5.
  • Reset Button
  • Reset button (3300) is intended to be used to restart all the system (3500) in case of crash or hang. Another function of this key in combination with any of the 4 key fobs (3400) is to optionally allow the administrator deleting all random codes (3410) stored on the memory. The flow chart from Fig. 6 explains the operation.
  • Remote Control Functional Flow Diagram
  • The flux diagram from Fig. 7 shows the remote control functionality (4000-4720) . Optionally, the process remains on a keyscan mode (4000) and waits for any pressed button (4100) and starts by generating and storing a non repetitive random code (4120, 4200 and 4210) and starting to transmit the first part of the information (4220). The system is looking for a biometric signature stored on the temporary memory (4300) and if available in the memory, encrypts the stored biometric signature together with the previous generated random code (4310) and saves it on the memory (4320). Finally, it transmits the random code and the previous encrypted data (4330) and gives feedback to the user by optionally blinking twice the green LED (4340). If biometric signature is not on the memory (4300) then the system wakes up (4400) and informs the user (4410) and enables the biometric sensor scan mode (4420). If the biometric signature is received successfully (4500) then the remote stores it temporarily on the memory (4510) and permanently deletes it from memory if an optionally timeout is set (4600 and 4610). Also a timeout is set for biometric signature scan process (4700, 4710 and 4720) to avoid unwanted operations.
  • Note that system should optionally enable stand-by mode (4350) in the finger print circuitry and/or other non relevant hardware in order to save battery life.
  • Note from the figure 7 - (*) In case of using just one RF transceiver, the operation is optionally done by just one carrier frequency. Note that Biometric Signature corresponds to biometric key or, simply, BioKey; Random Code corresponds Ran#.
  • HOST RECEIVER/CONTROL
  • The figure 8, shows the block diagram for host receiver/control. The system comprises the following items: Administrator Key (5100): to register new or erase existing users, allow communication with a computer by using software for administration purposes.
  • Register (5110) and delete (5120) user buttons: allow administrator add or remove users without using computer software.
  • Reset button (5130): just pressing this button performs a system refresh this is the soft reset operation. Optionally, system administrator can erase all registered users doing a hard reset operation by pressing this button simultaneously with delete button, administrator key must optionally be enabled to perform this operation. Channel-ID (5140): to identify the host receiver.
  • Red/Green Led Status (5500): info feedback remote control status for the user/administrator;
  • 433MHz, 868MHz or 915MHz transceiver modules (5210 and 5220): send/receive RF packets from the user remote control;
  • RS232 port (5820): communication between computer software and the receiver.
  • Microcontroller (5010): to process all the input data from the receiver, software manager and status buttons;
  • Internal/external memory (5020): to store all the data necessary to deal by the microcontroller and according with system specifications.
  • Output Control (5400): digital output to grant/deny access to the controlled device/unit. The controlled device/unit is a device that controls, for example, a door lock, alarm system or automatic door/gates, rolling shutters, barriers, swing and slide gates.
  • Dot Matrix LCD (5300): Liquid crystal display is used to show display information to the user.
  • Input Keypad (5150): Keyboard used to input information or control system functions.
  • Appropriate communications 5600, 5700, 5800, 5900 are provided.
  • The dashed boxes means that those components can be integrated in the same module, i.e. if the microcontroller 5010 and memory 5020 can be on the same element 5000, be it an integrated circuit, module, etc... otherwise they are separated. This applies also to the wireless modules 5200.
  • Note from fig. 8, in case of just one RF carrier operating frequency, one of the RF transceivers may be avoided.
  • Figure 9 shows the system architecture.
    (*) "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area.
    (**)In case of just one RF carrier operating frequency, one of the RF transceivers may be avoided.
  • Bill of materials / component description
  • Item Description Manufacturer Reference Manufacturer
    Administrator Key (6110) A keyswitch is an electrical component switch that can be activated by key. GEN** GEN**
    Reset (6140), Register (6120) and delete (6130) Key Electrical component that can break or establish an electrical circuit, interrupting or conducting the current or diverting it from one conductor to another GEN** GEN**
    Microcontroller (6000) small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals GEN** GEN**
    Memory (6400) Electronic device used to store data or programs (sequences of instructions) on a temporary basis. GEN** GEN**
    433/868/91 5MHz Transceiver Modules (6520 and 6510) Electronic device that has both a transmitter and a receiver which is combined and share common circuitry or a single housing and is used for transmit or receive radio frequency communication signals. Hoperf
    RFM22-433-D*
    RFM22-868-D*
    RFM22-915-D
    Status LEDs: Green & Red (6620 and 6610) Electronic device used for emitting light and is used as an indicator lamp. GEN** GEN**
    2 bits Dipswitch (6150) A set of manual electric switches that are packaged in a group in a standard dual in-line package and used to customize the behaviour of an electronic device for specific situations GEN** GEN**
    RS232 Port (6200) Serial communication physical interface by using the RS-232 standard, intended to interface with an external communication device Standard DB9 connector GEN**
    Input Keypad (6160) Human interface device used to allow the user input or control data. GEN** GEN**
    Dot Matrix LCD (6300) Liquid Crystal Display used to display/show information for the user GEN** GEN**
    * "D" is for DIP package S1 and S2 is for SMD version, for more details refer to the product datasheet.
    ** "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area.
  • Host Receiver Internal Communications (Fig 9)
  • Device Communication
    RFM22-433, RFM22-868/915 SPI
    System Memory SPI /parallel
    uC (Microcontroller) SPI; parallel; digital I/O
    Administrator Key 2x Digital Inputs
    Register, Delete, Reset Key 3 x Digital inputs(****)
    Status Green and Red LED 2x Digital output
    RS232 RS232 standard communication*
    2 bits Dipswitch 2x Digital inputs
    Output Control (6700) 2 or 1 Bit output
    Dot Matrix LCD SPI
    3x4 Keypad 3x4 digital I/O(****)
    (*)RS232 communication can be built in microcontroller otherwise we need an external controller.
    (**) "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area.
    (***)In case of just one RF carrier operating frequency, one of the RF transceivers can be avoided.
    (****)Can be replaced by a 4x4 keypad.
    Communications between microcontroller and the other elements typically can be done either by SPI (6810) or 8 bit parallel (6820, 6830, 6840).
  • Host Receiver/Control Functional Flow Diagrams
  • The figures 10 , 11 , 12 , 13,14 shows the host receiver/control functionality.
  • Fig 10, A000 is the beginning of the main process (7000-7091)A001 is the start of the scan RF process. A200 is the Random code cleaning.
  • Fig 11, A100 is the user registry process (7100-7145)
  • Fig 12,A300) is the erase user data process (7200-7241)and Fig 13, A310 (7300-7322) continues this process;
  • Main process (A000), starts with check if admin key(7000)is not enabled. System starts to scan for an RF-signal (7001) and decodes it (7010).If valid string format (7010), system id (7020)and channel ID(7030) match, system stores new random code, user group ID and feeds back to user (7031). If no matching found, system returns to the beginning. Systems scans for separate RF signal (7032) and decodes it(7033). If string is valid(7040) and random code matches(7050), then biometric key is decrypted using encrypted biometric signature and stored random code (7051). If (7040) and (7050) not true, if timeout (7090) has not occurred, then system returns to scan for 2nd signal (7032); if timeout (7090), system cleans last random code(7091) and goes to beginning.
    If user group ID (7060) and biometric key (7070) are registered and admin key is not enabled (7080), then system registers random code for this user (7081) enabling access (7082)and feeds back to user (7083).
  • Note from the flow chart of figure 10
    (*) In case of using just one RF transceivers, the operation is normally done by just one carrier frequency.
  • User registry process (A100) starts with the registry counter reset (7100), if admin key (7110), register key (7120) are enabled and if it is first registration (7130), system prompts user (7131) for new user ID and waits for input (7132). System searches for user ID in database ( 7133) and if not found (7140) it registers the random code and new user ID(7142), registers the user group ID (7143),adds biometric key and increments registry counter (7144) and gives feedback to user (7145). If user ID found (7140) systems feeds back user (7141) and returns to prompting user for a new input (7131).
    At (7130) if not first register, system proceeds with adding a biokey user (7144).
  • Note from the flow chart of figure 11
    While registering new biometric signatures within a user id, (7145) green LED optionally flashes "n" times, depending of the biometric signature quantity.
  • (A200) mentioned in figures 10,11,12 insures that random code is deleted when not necessary anymore.
  • Erase user data process (A300) starts if erase key is enabled (7200). The system resets the delete counter (7201), prompts for the user ID to be deleted (7202) and waits for user input (7203). System searches for user ID (7204) and if found (7210) feeds back to the user (7211) prompting for deletion of user random code numbers (7212). If neither register key (7220) nor delete key (7230) are pressed, system waits for input at (7212). By pressing register key (7220) as "yes" system removes all random codes for selected user and feeds back to the user (7221). By pressing delete key (7230) as "no" system continues to (A310).
  • At (7210) if user ID is not found , systems feeds back to the user (7213) and checks number of attempts (7240). If number is less than three , counter is incremented (7242) and returns to prompt (7202). If maximum number of attempts reached, system feeds back to user (7241) and goes to (A200).
  • Continuation of Erase user data process (A310) starts with prompt to user to delete user ID (7300). If neither register key (7310) nor delete key (7320) are pressed, system waits for input at (7300). By pressing register key (7310) as "yes" system removes all user data (7311,7312,7313) for selected user and feeds back to the user (7314,7315). By pressing delete key (7320) as "no" system feeds back to the user (7321, 7322) and goes to (A200).
  • Fig 14 is the optional hard reset operation (9000-9220). If the admin key (9000), delete button (9100) and reset button (9200) are simultaneously activated, all registered users are deleted (9210) and the system is reset (9220).
    Note from the flow chart of figure 14
    During delete users operation, red Led must optionally blink while the user database is being deleted.
  • SPI, Serial Peripheral Interface Bus or SPI Bus is a synchronous serial data link standard that operates in full duplex mode.
  • RS232, Recommended Standard 232 is a standard for serial binary single-ended data and control signals connecting between a DTE (Data Terminal Equipment) and a DCE (Data Circuit-terminating Equipment).
  • LVD, Low Voltage Detect is an electronic device used to generate an electrical signal when the reading voltage falls below a preset reference voltage. Sometimes is combined with Power-on reset (POR) and then it is called POR-LVD.
  • Output Control, output digital signal or electrical signal is used to enable or grant access to the controlled device.
  • ISM, industrial, scientific and medical radio bands were originally reserved internationally for the use of RF electromagnetic fields for industrial, scientific and medical purposes other than communications. In general, communications equipment must accept any interference generated by ISM equipment
  • SRD, Short Range Devices are radio devices that offer a low risk of interference with other radio services, usually because their transmitted power, and hence their range, is low. The definition 'Short Range Device' may be applied to many different types of wireless equipment, including various forms of:
    • Access control (including door and gate openers)
    • Alarms and movement detectors
    • Closed-circuit television (CCTV)
    • Cordless audio devices, including wireless microphones
    • Industrial control
    • Local Area Networks
    • Medical implants
    • UWB Sensors & Radars (such as ground probing radar)
    • Remote control
    • Radio frequency identification (RFID)
    • Road Transport Telematics
    • Telemetry.
  • Short range devices often benefit from a relaxed regulatory regime compared with other radio communications equipment. As a general principle, a user is licence free to operate such equipment, some specific cases may require an individual licence.
  • However, like all radio equipment, short-range devices have to meet the Radio and Telecommunications Terminal Equipment (R&TTE) Directive to be placed on the market within the European Community. The operation of the equipment is subject to the frequency management regulations of the relevant member state.
  • The following claims set out particular embodiments of the invention.

Claims (16)

  1. A wireless biometric access control system host characterized by comprising:
    - user (371, 372, 373, 374) and administrator (360) keys and/or keypad module;
    - output control module (340);
    - controller module (320);
    - wireless module (310), configured to emit and receive a first and a second separated radio signals;
    - channel ID module (380), configured to select a channel ID;
    - memory module, configured to store a user random code and a user group ID;
    - comparator module, at least configured to compare two user random codes;
    - database module configured to register biometric keys, user group Ids;
    - decryption module, configured to decrypt a biometric key.
  2. The host according to claim 1 characterized by further comprising a communication module (390) for connection (391, 501) with an external computer (500).
  3. The host according to any previous claim characterized by further comprising visual indicators (330) and/or a display (350).
  4. The host according to any previous claim characterized by the first and second signals being separated in frequency.
  5. A wireless biometric access control system remote control characterized by comprising:
    - biometric sensor (220);
    - user channel id keys and/or keypad module (210);
    - controller module (240);
    - random number generator module;
    - user group selector module (270);
    - memory module, configured to store at least one user random code and a biometric key;
    - comparator module, configured to compare user random codes;
    - wireless module (250), able to emit and receive a first and a second separated radio signals;
    - encryption module, configured to encrypt a biometric key.
  6. The remote control according to claim 5 characterized in that the biometric sensor (220) is a fingerprint sensor.
  7. The remote control according to any claim 5 - 6 characterized by the first and second signals being separated in frequency.
  8. The remote control according to any claim 5 - 7 characterized by further comprising a key stuck detection module.
  9. An operation method of a wireless biometric access control system host characterized by comprising the steps:
    - scanning for a first signal emitted by a remote controller;
    - decoding said first signal;
    - checking for a valid format, system id and a channel id contained in said first signal;
    - if verified, storing a random code and a user group id contained in a memory module for said first signal;
    - scanning for a second signal emitted by said remote controller;
    - decoding said second signal in a decryption module;
    - verifying in a comparator module, if the previously random code stored in the memory module from the first signal and the random code contained in the second signal, match;
    - if verified, obtaining a biometric key from decrypting a biometric signature contained in said second signal using the random code;
    - verifying in the comparator module, if said biometric key and said user group id have been previously registered in a database module;
    - if verified, registering the random code in the database module for the identified user;
    - establishing that the identified user has been authenticated and triggering an action accordingly.
  10. The method according to claim 9 characterized in that it further comprises the steps:
    - if said biometric key or said user group id have not been previously registered in the database module, verifying if a suitable combination of user and administrator keys has been activated signalling a new registration operation;
    - if verified, verifying through the comparator module if there is any previously stored biometric key in the database module for the identified user;
    - if not verified, prompting for a new user id;
    - verifying said user id is new in the database module;
    - if verified, registering said user id, said random code and said user group id in the database module;
    - storing the biometric key(s) for the identified user in the database module.
  11. The method according to any claim 9 - 10 characterized in that it further comprises the steps:
    - previous to said method, verifying if a suitable combination of user and administrator keys has been activated signalling a delete operation;
    - prompting for an user id;
    - verifying through comparator module if, said user id has been previously registered in the database module;
    - if verified, prompting if all random codes for the identified user should be erased and, if so selected, erasing all random codes for the identified user in the database module;
    - prompting if the identified user should be erased and, if so selected, removing all biometric keys and user group id for the identified user and removing said user id from the database module.
  12. The method according to any claim 9 - 11 characterized in that the first and second signals are in different frequencies.
  13. An operation method of a wireless biometric access control system remote control characterized by comprising the steps:
    - scanning for a user trigger through a key module (210);
    - generating a new random code in a random code module;
    - repeating said generation of a new random code until it is verified that said random code is not present in a memory module for previously stored random codes;
    - storing said random code in the memory module;
    - emitting a first signal with a system id, a channel id, said random code, and a user group id;
    - verifying if there is a previously and temporarily stored biometric key in the memory module;
    - if not verified, resuming power to biometric scanner (220), scanning a biometric signature, interrupting power to the biometric scanner (220), and storing said biometric information as a biometric key;
    - encrypt the biometric signature through an encryption module using said random code
    - emitting a second signal with said random code and an encrypted biometric signature obtained using said stored biometric key and the random code.
  14. The method according to the previous claim characterized in that after a preset time without use, the previously stored biometric key data is permanently erased from the remote control.
  15. The method according to any claim 13 - 14 characterized in that the biometric signature is the user fingerprint.
  16. The method according to any claim 13 - 15 characterized in that the first and second signals are in different frequencies.
EP10816396.5A 2010-12-06 2010-12-06 Wireless biometric access control system and operation method thereof Not-in-force EP2649590B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/PT2010/000054 WO2012078061A1 (en) 2010-12-06 2010-12-06 Wireless biometric access control system and operation method thereof

Publications (2)

Publication Number Publication Date
EP2649590A1 EP2649590A1 (en) 2013-10-16
EP2649590B1 true EP2649590B1 (en) 2015-12-02

Family

ID=44227948

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10816396.5A Not-in-force EP2649590B1 (en) 2010-12-06 2010-12-06 Wireless biometric access control system and operation method thereof

Country Status (2)

Country Link
EP (1) EP2649590B1 (en)
WO (1) WO2012078061A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8990922B2 (en) * 2013-05-01 2015-03-24 Cheng Uei Precision Industry Co., Ltd. Access control system and control method thereof
US9582127B2 (en) 2014-04-04 2017-02-28 Synaptics Incorporated Large feature biometrics using capacitive touchscreens
CN104318655A (en) * 2014-11-03 2015-01-28 无锡港湾网络科技有限公司 Intelligent residential area monitoring method
CN206331496U (en) * 2016-09-23 2017-07-14 史蒂芬·若一思·图斯布雷 Fingerprint lock, fingerprint processing device and fingerprint lock system
CN106447877B (en) * 2016-11-29 2019-03-22 北京小米移动软件有限公司 Open method, device and the server of smart machine
CN107680227A (en) * 2017-10-20 2018-02-09 莲花丝路科技有限公司 A kind of application method and system of smart lock low power consumption remote control system
CN108230493A (en) * 2017-12-19 2018-06-29 资密科技有限公司 The control method and intelligent lock system of intelligent lock system
CN110690965B (en) * 2019-10-10 2022-09-13 山东浪潮科学研究院有限公司 A wireless communication security system
CN110853198B (en) * 2019-11-28 2022-06-14 北京市商汤科技开发有限公司 Object recognition apparatus, data processing method, electronic device, and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2233942A1 (en) * 1996-09-18 1998-03-26 Dew Engineering And Development Limited Biometric identification system for providing secure access
MY143028A (en) * 2003-12-02 2011-02-14 Multimedia Glory Sdn Bhd A method and system to electronically identify and verify an individual presenting himself for such identification and verification
WO2007011311A2 (en) * 2005-07-18 2007-01-25 Kristalbond Technologies (Singapore) Pte Ltd. Biometric transponder system
US20070050303A1 (en) * 2005-08-24 2007-03-01 Schroeder Dale W Biometric identification device

Also Published As

Publication number Publication date
WO2012078061A1 (en) 2012-06-14
EP2649590A1 (en) 2013-10-16

Similar Documents

Publication Publication Date Title
EP2649590B1 (en) Wireless biometric access control system and operation method thereof
US11089012B2 (en) Event driven second factor credential authentication
CN101872542B (en) Transmitter and method for transmitting an RF control signal
WO2021023164A1 (en) Intelligent lock control method and system
US6658328B1 (en) Passive function control system for a motor vehicle
US20090153290A1 (en) Secure interface for access control systems
EP1755061A2 (en) Protection of non-promiscuous data in an RFID transponder
CN105279832A (en) Intelligent door lock system and control method thereof
CN102158473A (en) Remote entry system
CN106652106A (en) Door lock control method, device and terminal
EP1901238A2 (en) Authentication and access control device
CN103538561A (en) Automobile starting control system and method
KR101506549B1 (en) Secure entrance method for preventing interception of radio messages and System using the method
AU2016241407A1 (en) A lock monitoring device and a lock monitoring system
US10026299B2 (en) Mobile supported disarming
WO2006094048A2 (en) Systems and methods for biometric authentication
CN107852586B (en) Electronic access control for application middle layer
US10687214B2 (en) Secure key fob
Cavalleri et al. A wearable device for a fully automated in-hospital staff and patient identification
JP2009151557A (en) Anti-theft device
WO2015068342A1 (en) Terminal device and wireless communication system
CN105393254A (en) Enabling access to data
EP3017433B1 (en) Secure mode for electronic access control readers
CA2864362C (en) System incorporating actively authenticated multifactor proximity card
CN2840136Y (en) Wireless data transmission computer safety command plate equipment

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20130705

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20140404

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20150708

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 763928

Country of ref document: AT

Kind code of ref document: T

Effective date: 20151215

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602010029409

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20160302

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: PT

Ref legal event code: SC4A

Free format text: AVAILABILITY OF NATIONAL TRANSLATION

Effective date: 20160302

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 763928

Country of ref document: AT

Kind code of ref document: T

Effective date: 20151202

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20160302

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20160303

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20151231

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PT

Payment date: 20160303

Year of fee payment: 6

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602010029409

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20160425

Year of fee payment: 6

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20160402

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20151231

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20151206

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20151231

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20160701

26N No opposition filed

Effective date: 20160905

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20161104

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20160202

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20101206

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20161206

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20151206

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20161206

Ref country code: PT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170906

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151202