EP2649590B1 - Wireless biometric access control system and operation method thereof - Google Patents
Wireless biometric access control system and operation method thereof Download PDFInfo
- Publication number
- EP2649590B1 EP2649590B1 EP10816396.5A EP10816396A EP2649590B1 EP 2649590 B1 EP2649590 B1 EP 2649590B1 EP 10816396 A EP10816396 A EP 10816396A EP 2649590 B1 EP2649590 B1 EP 2649590B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- module
- user
- biometric
- random code
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Not-in-force
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/26—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/12—Comprising means for protecting or securing the privacy of biometric data, e.g. cancellable biometrics
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/61—Signal comprising different frequencies, e.g. frequency hopping
Definitions
- the present invention relates to access control systems and methods, more specifically to wireless remote access control and, in particular, fingerprint enabled wireless remote access control systems and methods.
- the present invention describes a wireless biometric access control system host which comprises:
- a preferred embodiment further comprises a communication module (390) for connection (391, 501) with an external computer (500).
- a preferred embodiment further comprises visual indicators (330) and/or a display (350).
- the present invention also describes a wireless biometric access control system remote control comprising:
- a preferred embodiment further comprises a key stuck module.
- the present invention also describes an operation method of a wireless biometric access control system host comprising the steps:
- the present invention also describes an operation method of a wireless biometric access control system remote control comprising the steps:
- a preferred embodiment further comprises the step that after a preset time without use, the previously stored biometric key data is permanently erased from the remote control.
- the biometric sensor (220) is a fingerprint sensor.
- first and second signals are separated in frequency.
- the proposed invention refers to a wireless fingerprint recognition remote control 200 that transmits the encrypted user fingerprint data namely through two separated wireless radiofrequency signals 251/311 and 252/312.
- This secured process also means that fingerprint data is not permanently stored on the remote control 200 device and is only verified on the host controller.
- the system is designed to provide a secure access 341 to the controlled device 400 allowed or halted by host controller 300 through the fingerprint remote control 200 by the user 100 and its fingerprint 111.
- the controlled device 400 can be, for example, door lock, alarm system, automatic door/gates, rolling shutters, barriers, swing or slide gates, access control system,...
- the user 100 selects the known host controller 300 by selecting one of four (or more) channels keys 210 through action indicated by arrow 110.
- the controller module 240 collects this data together with a random code generated by the random number module and the user group selector module, typically done by a dipswitch, 270.
- the random code is intended to be used to encrypt data to be sent later by the RF packet 252.
- the packed data is sent to the host controller 300 through the wireless module 250 sending the first RF communication packet 251.
- the subsystem 300 receives the RF packet data through the wireless module 310 and checks through comparator module in the controller 320 module.
- configuration 380 (typically done by a dipswitch described as the system channel ID module) communication is established. Note that both the selector keys module 210 and the channel ID module 380 can optionally be used in combination with pairing modules.
- the next step is to verify, by using the comparator module, if the random code was used before, by checking against the previous list saved on the memory module. If the first received packet sent through 251 matches with the whole host controller 300 data or configuration modules, then an acknowledge (ACK) feedback packet is sent by the communication 311 through the wireless module 310 and the system proceeds with the second process. If not, a Not acknowledge (NAK) feedback packet is sent and the remote control 200 restarts its process from the beginning, i.e. the first process.
- ACK acknowledge
- NAK Not acknowledge
- the second process is triggered by acknowledge message 311 received from the module 310, the user 100 is then asked by lighting green led 230 to pass his fingerprint 111 over the fingerprint sensor module 220 .
- the finger print sensor module 220 is activated.
- the system processes the biometric data through the controller/memory module 240 and temporarily saves the biometric data in the memory module, which is useful for the user in case he needs to access consecutive multiple points, as he only has to scan his fingerprint once(After a preset timeout the biometric data is permanently erased from the memory module).
- the biometric signature is encrypted by using the encryption module and the random code which was previously generated and stored by the respective random code and memory modules.
- This information is packed and sent through the RF signal 252 by the wireless module 250 to the RF module 310.
- this encrypted biometric signal is acknowledged by signal 312 and decrypted in the decryption module by using the previously saved random code.
- the biometric signature is checked in the comparator module, against the biometric user list stored on the database memory module , present on the sub-system 320. If the user 100 was already registered on the host controller 300 the system sends an enable signal 341 to the controlled device 400 through output control 340. Otherwise the system keeps on the current disabled status signal access.
- the remote control 200 is in stand-by mode waiting to be triggered by keys 210. Once triggered, a key scan is performed by the key scan module to determine which key was pressed.
- the Key Stuck module present in the remote control module 200, monitors for stuck keys in the key module 210 (A Stuck Key occurs when some object is accidentally placed on the remote control, pressing down keys unknowingly).
- the administrator 600 For registering, deleting and resetting the host controller 300, the administrator 600 has full access by enabling 611 the administrator key 360 typically done by a key switch. This key enables the functions of registering a user by pressing the register key 371 or deleting a registered user in the database module by pressing the delete key 372. Additionally, to perform those functions the user or administrator also has access to the human interface devices such as the keypad 374 and the, namely dot matrix LCD, display 350. An optional software hosted by PC 500 can also be used to have access to these functions.
- the bidirectional communication 391 and 501 between the host controller 300 and Personal Computer 500 is done through, namely, the serial communication module 390.
- Both subsystem 200 and 300 have the respective reset buttons 260 and 373. Just pressing them will optionally restart the system in case of crash.
- Host controller leds 330 serve to signal operations or system status to the user and/or administrator.
- the fingerprint sensor 220 could be replaced by any appropriate means for identifying a person, namely biometric, namely iris scanner, hand dimension scanner, face feature scanner, etc...
- the invention presents, namely, the following advantages:
- Main purpose user carries just one remote control 200 device to access any programmed host receiver 300 system.
- the complete access system information is separated in two communication parts: first information is transmitted over a carrier frequency through communication 251/311 of namely 433MHz (for US region power must or can be reduced) and the second is sent in carrier frequency through communication 252/312 of namely 868MHz or 915MHz (for US region) as shown in figure 15 .
- the first info is the basic system information and identification while the second is the fingerprint user.
- the whole system can operate by using just one carrier frequency together with the frequency hopping technology; in this case there is no second transceiver installed.
- the user biometric signature 111 is the key, the biometric signature is registered and verified on the host controller 300 thus, you can use any remote control 200 or even if you lose the remote control you can just obtain another one
- the biometric signature is temporary stored on the remote control memory module for easy access on multiple access area, after this short period of time is permanently deleted from the memory module.
- Random code transmissions up to 2n for each registered user are generated and are not repeated for that user. Note that all the random codes are stored and generated on the remote control 200's random module and stored on the host control 300 database module in order not to repeat the same code. Expandable memory according to the customer's requirements. Initially the system is designed for home users (medium/small family) but for buildings could ask for extra memory capacity. For this situation the system optionally allows memory expandable sockets.
- the user database module is optionally divided by group users 700, 710 and 720 and user data 701, 702 and 703 for example for each user group 711, 712, 713, 721, 722, 723.
- the first task is usually looking by the user group by using the comparator module and then the user data which contains the biometric fingerprint and the latest 2 n used random codes.
- the Figure 16 explains the database user storage structure.
- the system performs the communication using a set of device and user properties.
- the overall string communication is, in a preferred embodiment, composed by: - System ID + Channel ID + Random Code + User Group + encrypted User Biometric Signature
- the figure 3 shows the block diagram for a preferred embodiment for the present remote control system invention.
- the system comprises the following items :
- the dashed boxes means that those components can be integrated in the same module, i.e. if the microcontroller has enough memory to store the 2 n random generated code the microcontroller 1010 and memory 1020 is on the same IC 1000, integrated circuit 1000, module 1000, etc... otherwise they are separated. This applies also to the wireless modules (1600).
- the system also provides the appropriate connections (1710 1720, 1730, 1740).
- one of the RF transceivers can be avoided.
- the figure 4 shows the system architecture.
- Bill of materials / component description ( figure 4 ) Item Description Manufacturer Reference Manufacturer Finger Print Sensor (2100) Electronic device used for used to capture a digital image of the fingerprint pattern AES1710 or AES1711 Authentec Microcontroller (2000) Small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals GEN** GEN** Memory (2300) Electronic device used to store data or programs (sequences of instructions) on a temporary basis.
- GEN** GEN** 433/868/91 5MHz RF transceive r Modules (2210 and 2220) Electronic device that has both a transmitter and a receiver which is combined and share common circuitry Hoperf RFM22-433-D* RFM22-868-D* RFM22-915-D* or a single housing and is used for transmit or receive radio frequency communication signals.
- Green & Red LED (2810 and 2820) Electronic device used for emitting light and is used as an indicator lamp.
- GEN** GEN** 8Bits Dip Switch (2400) A set of manual electric switches that are packaged in a group in a standard dual in-line package and used to customize the behavior of an electronic device for specific situations
- GEN** GEN** Reset Button (2750) Internal button for erase the all the random codes used on the remote and/or restart the microcontroller.
- GEN** GEN** Key 1 (2710), Key 2 External user key fob for system channel selection
- * “D” is for DIP package S1 and S2 is for SMD version, for more details refer to the product datasheet.
- ** "GEN” is a generic component reference for any easily available part, of common and direct knowledge in the area.
- the system optionally performs a battery level monitoring (3000, 3100, 3200) in order to advise the user to replace by fresh units.
- a battery level monitoring (3000, 3100, 3200) in order to advise the user to replace by fresh units. The operation is done as explained on flow chart from Fig. 5 .
- Reset button (3300) is intended to be used to restart all the system (3500) in case of crash or hang.
- Another function of this key in combination with any of the 4 key fobs (3400) is to optionally allow the administrator deleting all random codes (3410) stored on the memory.
- the flow chart from Fig. 6 explains the operation.
- the flux diagram from Fig. 7 shows the remote control functionality (4000-4720) .
- the process remains on a keyscan mode (4000) and waits for any pressed button (4100) and starts by generating and storing a non repetitive random code (4120, 4200 and 4210) and starting to transmit the first part of the information (4220).
- the system is looking for a biometric signature stored on the temporary memory (4300) and if available in the memory, encrypts the stored biometric signature together with the previous generated random code (4310) and saves it on the memory (4320). Finally, it transmits the random code and the previous encrypted data (4330) and gives feedback to the user by optionally blinking twice the green LED (4340).
- biometric signature is not on the memory (4300) then the system wakes up (4400) and informs the user (4410) and enables the biometric sensor scan mode (4420). If the biometric signature is received successfully (4500) then the remote stores it temporarily on the memory (4510) and permanently deletes it from memory if an optionally timeout is set (4600 and 4610). Also a timeout is set for biometric signature scan process (4700, 4710 and 4720) to avoid unwanted operations.
- system should optionally enable stand-by mode (4350) in the finger print circuitry and/or other non relevant hardware in order to save battery life.
- Biometric Signature corresponds to biometric key or, simply, BioKey; Random Code corresponds Ran#.
- the figure 8 shows the block diagram for host receiver/control.
- the system comprises the following items: Administrator Key (5100): to register new or erase existing users, allow communication with a computer by using software for administration purposes.
- Register (5110) and delete (5120) user buttons allow administrator add or remove users without using computer software.
- Reset button (5130) just pressing this button performs a system refresh this is the soft reset operation.
- system administrator can erase all registered users doing a hard reset operation by pressing this button simultaneously with delete button, administrator key must optionally be enabled to perform this operation.
- Red/Green Led Status (5500): info feedback remote control status for the user/administrator;
- 433MHz, 868MHz or 915MHz transceiver modules (5210 and 5220): send/receive RF packets from the user remote control;
- RS232 port (5820): communication between computer software and the receiver.
- Microcontroller to process all the input data from the receiver, software manager and status buttons;
- Internal/external memory to store all the data necessary to deal by the microcontroller and according with system specifications.
- Output Control digital output to grant/deny access to the controlled device/unit.
- the controlled device/unit is a device that controls, for example, a door lock, alarm system or automatic door/gates, rolling shutters, barriers, swing and slide gates.
- Dot Matrix LCD Liquid crystal display is used to show display information to the user.
- Input Keypad (5150): Keyboard used to input information or control system functions.
- the dashed boxes means that those components can be integrated in the same module, i.e. if the microcontroller 5010 and memory 5020 can be on the same element 5000, be it an integrated circuit, module, etc... otherwise they are separated. This applies also to the wireless modules 5200.
- Figure 9 shows the system architecture.
- "GEN” is a generic component reference for any easily available part, of common and direct knowledge in the area.
- a keyswitch is an electrical component switch that can be activated by key.
- GEN** GEN** Reset (6140), Register (6120) and delete (6130) Key Electrical component that can break or establish an electrical circuit, interrupting or conducting the current or diverting it from one conductor to another GEN** GEN** Microcontroller (6000) small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals GEN** GEN** Memory (6400) Electronic device used to store data or programs (sequences of instructions) on a temporary basis.
- GEN** GEN** 433/868/91 5MHz Transceiver Modules (6520 and 6510) Electronic device that has both a transmitter and a receiver which is combined and share common circuitry or a single housing and is used for transmit or receive radio frequency communication signals. Hoperf RFM22-433-D* RFM22-868-D* RFM22-915-D Status LEDs: Green & Red (6620 and 6610) Electronic device used for emitting light and is used as an indicator lamp.
- GEN** GEN** 2 bits Dipswitch (6150) A set of manual electric switches that are packaged in a group in a standard dual in-line package and used to customize the behaviour of an electronic device for specific situations
- GEN** GEN** RS232 Port (6200) Serial communication physical interface by using the RS-232 standard, intended to interface with an external communication device Standard DB9 connector
- GEN** Input Keypad (6160) Human interface device used to allow the user input or control data.
- GEN** GEN** Dot Matrix LCD (6300) Liquid Crystal Display used to display/show information for the user GEN** GEN** * "D" is for DIP package S1 and S2 is for SMD version, for more details refer to the product datasheet. ** "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area.
- the figures 10 , 11 , 12 , 13,14 shows the host receiver/control functionality.
- A000 is the beginning of the main process (7000-7091)A001 is the start of the scan RF process.
- A200 is the Random code cleaning.
- A100 is the user registry process (7100-7145)
- Fig 12 ,A300 is the erase user data process (7200-7241)and Fig 13 , A310 (7300-7322) continues this process;
- Main process starts with check if admin key(7000)is not enabled.
- System starts to scan for an RF-signal (7001) and decodes it (7010). If valid string format (7010), system id (7020)and channel ID(7030) match, system stores new random code, user group ID and feeds back to user (7031). If no matching found, system returns to the beginning.
- Systems scans for separate RF signal (7032) and decodes it(7033). If string is valid(7040) and random code matches(7050), then biometric key is decrypted using encrypted biometric signature and stored random code (7051).
- timeout (7090) if timeout (7090) has not occurred, then system returns to scan for 2 nd signal (7032); if timeout (7090), system cleans last random code(7091) and goes to beginning. If user group ID (7060) and biometric key (7070) are registered and admin key is not enabled (7080), then system registers random code for this user (7081) enabling access (7082)and feeds back to user (7083).
- User registry process starts with the registry counter reset (7100), if admin key (7110), register key (7120) are enabled and if it is first registration (7130), system prompts user (7131) for new user ID and waits for input (7132).
- System searches for user ID in database ( 7133) and if not found (7140) it registers the random code and new user ID(7142), registers the user group ID (7143),adds biometric key and increments registry counter (7144) and gives feedback to user (7145). If user ID found (7140) systems feeds back user (7141) and returns to prompting user for a new input (7131).
- system proceeds with adding a biokey user (7144).
- Erase user data process starts if erase key is enabled (7200).
- the system resets the delete counter (7201), prompts for the user ID to be deleted (7202) and waits for user input (7203).
- System searches for user ID (7204) and if found (7210) feeds back to the user (7211) prompting for deletion of user random code numbers (7212). If neither register key (7220) nor delete key (7230) are pressed, system waits for input at (7212). By pressing register key (7220) as "yes” system removes all random codes for selected user and feeds back to the user (7221). By pressing delete key (7230) as "no” system continues to (A310).
- Continuation of Erase user data process starts with prompt to user to delete user ID (7300). If neither register key (7310) nor delete key (7320) are pressed, system waits for input at (7300). By pressing register key (7310) as "yes” system removes all user data (7311,7312,7313) for selected user and feeds back to the user (7314,7315). By pressing delete key (7320) as “no” system feeds back to the user (7321, 7322) and goes to (A200).
- Fig 14 is the optional hard reset operation (9000-9220). If the admin key (9000), delete button (9100) and reset button (9200) are simultaneously activated, all registered users are deleted (9210) and the system is reset (9220). Note from the flow chart of figure 14 During delete users operation, red Led must optionally blink while the user database is being deleted.
- Serial Peripheral Interface Bus is a synchronous serial data link standard that operates in full duplex mode.
- RS232 Recommended Standard 232 is a standard for serial binary single-ended data and control signals connecting between a DTE (Data Terminal Equipment) and a DCE (Data Circuit-terminating Equipment).
- DTE Data Terminal Equipment
- DCE Data Circuit-terminating Equipment
- LVD Low Voltage Detect
- POR Power-on reset
- Output Control output digital signal or electrical signal is used to enable or grant access to the controlled device.
- ISM Industrial , scientific and medical radio bands were originally reserved internationally for the use of RF electromagnetic fields for industrial, scientific and medical purposes other than communications.
- communications equipment must accept any interference generated by ISM equipment
- Short Range Devices are radio devices that offer a low risk of interference with other radio services, usually because their transmitted power, and hence their range, is low.
- the definition 'Short Range Device' may be applied to many different types of wireless equipment, including various forms of:
- Short range devices often benefit from a relaxed regulatory regime compared with other radio communications equipment.
- a user is licence free to operate such equipment, some specific cases may require an individual licence.
- R&TTE Radio and Telecommunications Terminal Equipment
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Selective Calling Equipment (AREA)
- Collating Specific Patterns (AREA)
Description
- The present invention relates to access control systems and methods, more specifically to wireless remote access control and, in particular, fingerprint enabled wireless remote access control systems and methods.
- Document
WO 2007/011311 describes a system and a method of communication between a portable user device and an access control device in two different frequencies. - The present invention describes a wireless biometric access control system host which comprises:
- user (371, 372, 373, 374) and administrator (360) keys and/or keypad module; output control module (340); controller module (320); wireless module (310), configured to emit and receive a first and a second separated radio signals; channel ID module (380), configured to select a channel ID; memory module, configured to store a user random code and a user group ID; comparator module, at least configured to compare two user random codes; database module configured to register biometric keys, user group Ids; decryption module, configured to decrypt a biometric key.
- A preferred embodiment further comprises a communication module (390) for connection (391, 501) with an external computer (500).
- A preferred embodiment further comprises visual indicators (330) and/or a display (350).
- The present invention also describes a wireless biometric access control system remote control comprising:
- biometric sensor (220); user channel id keys and/or keypad module (210); controller module (240); random number generator module; user group selector module (270); memory module, configured to store at least one user random code and a biometric key; comparator module, configured to compare user random codes; wireless module (250), able to emit and receive a first and a second separated radio signals; encryption module, configured to encrypt a biometric key.
- A preferred embodiment further comprises a key stuck module.
- The present invention also describes an operation method of a wireless biometric access control system host comprising the steps:
- scanning for a first signal emitted by a remote controller; decoding said first signal; checking for a valid format, system id and a channel id contained in said first signal; if verified, storing a random code and a user group id contained in a memory module for said first signal; scanning for a second signal emitted by said remote controller; decoding said second signal in a decryption module; verifying in a comparator module, if the previously random code stored in the memory module from the first signal and the random code contained in the second signal, match; if verified, obtaining a biometric key from decrypting a biometric signature contained in said second signal using the random code; verifying in the comparator module, if said biometric key and said user group id have been previously registered in a database module; if verified, registering the random code in the database module for the identified user; establishing that the identified user has been authenticated and triggering an action accordingly.
- A preferred embodiment further comprises the steps:
- if said biometric key or said user group id have not been previously registered in the database module, verifying if a suitable combination of user and administrator keys has been activated signalling a new registration operation; if verified, verifying through the comparator module if there is any previously stored biometric key in the database module for the identified user; if not verified, prompting for a new user id; verifying said user id is new in the database module; if verified, registering said user id, said random code and said user group id in the database module; storing the biometric key(s) for the identified user in the database module.
- A preferred embodiment further comprises the steps:
- previous to said method, verifying if a suitable combination of user and administrator keys has been activated signalling a delete operation; prompting for an user id; verifying through comparator module if, said user id has been previously registered in the database module; if verified, prompting if all random codes for the identified user should be erased and, if so selected, erasing all random codes for the identified user in the database module; prompting if the identified user should be erased and, if so selected, removing all biometric keys and user group id for the identified user and removing said user id from the database module.
- The present invention also describes an operation method of a wireless biometric access control system remote control comprising the steps:
- scanning for a user trigger through a key module (210); generating a new random code in a random code module; repeating said generation of a new random code until it is verified that said random code is not present in a memory module for previously stored random codes; storing said random code in the memory module; emitting a first signal with a system id, a channel id, said random code, and a user group id; verifying if there is a previously and temporarily stored biometric key in the memory module; if not verified, resuming power to biometric scanner (220), scanning a biometric signature, interrupting power to the biometric scanner (220), and storing said biometric information as a biometric key; encrypt the biometric signature through an encryption module using said random code emitting a second signal with said random code and an encrypted biometric signature obtained using said stored biometric key and the random code.
- A preferred embodiment further comprises the step that after a preset time without use, the previously stored biometric key data is permanently erased from the remote control.
- In a preferred embodiment the biometric sensor (220) is a fingerprint sensor.
- In a preferred embodiment the first and second signals are separated in frequency.
- The proposed invention refers to a wireless fingerprint recognition
remote control 200 that transmits the encrypted user fingerprint data namely through two separatedwireless radiofrequency signals 251/311 and 252/312. This secured process also means that fingerprint data is not permanently stored on theremote control 200 device and is only verified on the host controller. - The system, see
fig. 1 , is designed to provide asecure access 341 to the controlleddevice 400 allowed or halted byhost controller 300 through thefingerprint remote control 200 by theuser 100 and itsfingerprint 111. The controlleddevice 400 can be, for example, door lock, alarm system, automatic door/gates, rolling shutters, barriers, swing or slide gates, access control system,... - In the system, described in detail in
fig 2 , theuser 100, selects the knownhost controller 300 by selecting one of four (or more)channels keys 210 through action indicated byarrow 110. In this first process thecontroller module 240 collects this data together with a random code generated by the random number module and the user group selector module, typically done by a dipswitch, 270. The random code is intended to be used to encrypt data to be sent later by theRF packet 252. The packed data is sent to thehost controller 300 through thewireless module 250 sending the firstRF communication packet 251. Thesubsystem 300 receives the RF packet data through thewireless module 310 and checks through comparator module in thecontroller 320 module. If the received channel ID key matches with present , configuration 380 (typically done by a dipswitch described as the system channel ID module) communication is established. Note that both theselector keys module 210 and thechannel ID module 380 can optionally be used in combination with pairing modules. The next step is to verify, by using the comparator module, if the random code was used before, by checking against the previous list saved on the memory module. If the first received packet sent through 251 matches with thewhole host controller 300 data or configuration modules, then an acknowledge (ACK) feedback packet is sent by thecommunication 311 through thewireless module 310 and the system proceeds with the second process. If not, a Not acknowledge (NAK) feedback packet is sent and theremote control 200 restarts its process from the beginning, i.e. the first process. - The second process is triggered by
acknowledge message 311 received from themodule 310, theuser 100 is then asked by lighting green led 230 to pass hisfingerprint 111 over thefingerprint sensor module 220 . At this stage the fingerprint sensor module 220 is activated. If the biometric signature is received the system processes the biometric data through the controller/memory module 240 and temporarily saves the biometric data in the memory module, which is useful for the user in case he needs to access consecutive multiple points, as he only has to scan his fingerprint once(After a preset timeout the biometric data is permanently erased from the memory module). Afterwards, the biometric signature is encrypted by using the encryption module and the random code which was previously generated and stored by the respective random code and memory modules. This information is packed and sent through theRF signal 252 by thewireless module 250 to theRF module 310. Once received by thehost controller 300, this encrypted biometric signal is acknowledged bysignal 312 and decrypted in the decryption module by using the previously saved random code. The biometric signature is checked in the comparator module, against the biometric user list stored on the database memory module , present on thesub-system 320. If theuser 100 was already registered on thehost controller 300 the system sends an enablesignal 341 to the controlleddevice 400 throughoutput control 340. Otherwise the system keeps on the current disabled status signal access. - The
remote control 200, is in stand-by mode waiting to be triggered bykeys 210. Once triggered, a key scan is performed by the key scan module to determine which key was pressed. - The Key Stuck module, present in the
remote control module 200, monitors for stuck keys in the key module 210 (A Stuck Key occurs when some object is accidentally placed on the remote control, pressing down keys unknowingly). - For registering, deleting and resetting the
host controller 300, theadministrator 600 has full access by enabling 611 the administrator key 360 typically done by a key switch. This key enables the functions of registering a user by pressing theregister key 371 or deleting a registered user in the database module by pressing thedelete key 372. Additionally, to perform those functions the user or administrator also has access to the human interface devices such as thekeypad 374 and the, namely dot matrix LCD,display 350. An optional software hosted by PC 500 can also be used to have access to these functions. Thebidirectional communication host controller 300 andPersonal Computer 500 is done through, namely, theserial communication module 390. - Both
subsystem respective reset buttons 260 and 373. Just pressing them will optionally restart the system in case of crash. Combiningreset key 260 with any of fourkeys 210, optionally deletes all the saved random codes on the system on theremote control 200 while the reset key 373 in combination with deletekey 372 on thehost controller 200 optionally erases all the user data present on the system. Host controller leds 330 serve to signal operations or system status to the user and/or administrator. - It would seem obvious to the person skilled in the art that the
fingerprint sensor 220 could be replaced by any appropriate means for identifying a person, namely biometric, namely iris scanner, hand dimension scanner, face feature scanner, etc... - The invention presents, namely, the following advantages:
- The communication between the remote and the host is split in two separate signals;
- The system can be used to access consecutive areas in a preset short time with just one finger print scan temporarily stored in the memory module;
- The system can be used for multiple applications, typically door lock, alarm system, automatic door/gates, rolling shutters, barriers, swing or slide gates, access control system;
- The fact that there is no permanent information saved in the remote control memory module, is a good safety measure against loss or theft. The remote can just be replaced by a new one without the worry of inappropriate access by someone else with the missing remote;
- The information scanned on the remote is encrypted in the encryption module when transmitted, by using the generated random code as the encryption key;
- The use of key scan module and key stuck module, contribute to lessen the energy consumption as the finger print sensor module is only activated when no temporary biometric information is stored in the remote Further, the same fact that the remote stores temporarily the biometric data, reduces the number of times the finger print sensor module is activated. These will result in less frequent recharge of batteries or even allow the use of normal ones;
- The user group module concept will contribute to significantly speed up the verification access process for large groups of users.
- Main purpose: user carries just one
remote control 200 device to access any programmedhost receiver 300 system. - The complete access system information is separated in two communication parts: first information is transmitted over a carrier frequency through
communication 251/311 of namely 433MHz (for US region power must or can be reduced) and the second is sent in carrier frequency throughcommunication 252/312 of namely 868MHz or 915MHz (for US region) as shown infigure 15 . The first info is the basic system information and identification while the second is the fingerprint user. - Alternatively the whole system can operate by using just one carrier frequency together with the frequency hopping technology; in this case there is no second transceiver installed. This means the first and second packet transmissions uses the same device and just one carrier frequency namely within 433MHz, 868MHz or 915MHz(US).
- Two way ISM(industrial, scientific and medical) radiofrequency bands typically used on SRD(short range devices) of 433MHz (EU and US with power restrictions), 868MHz(EU) and 915MHz(US) transmission optionally with Frequency Hopping Technology. Each transmitted packet is validated and followed by an ACK return message from the receiver..
- The user
biometric signature 111 is the key, the biometric signature is registered and verified on thehost controller 300 thus, you can use anyremote control 200 or even if you lose the remote control you can just obtain another one Although, the biometric signature is temporary stored on the remote control memory module for easy access on multiple access area, after this short period of time is permanently deleted from the memory module. - To grant access just register on the host controller 300(an authorized master or administrator privileges optionally needed to register).
- Security: all the finger print key signatures must optionally be transmitted over a secure method by using an encryption algorithm in the encryption module.
- Random code transmissions up to 2n for each registered user are generated and are not repeated for that user. Note that all the random codes are stored and generated on the
remote control 200's random module and stored on thehost control 300 database module in order not to repeat the same code. Expandable memory according to the customer's requirements. Initially the system is designed for home users (medium/small family) but for buildings could ask for extra memory capacity. For this situation the system optionally allows memory expandable sockets. - For buildings administrators usually a software manager is required to add or delete users, also small/medium families may use this option, in this case is usually optional.
- To speed-up the user search process, the user database module is optionally divided by
group users user data user group Figure 16 explains the database user storage structure. - Multiple biometric signatures registration mechanism:
- One given
user 100 can register more than onebiometric signature Figure 17 details the mechanism. -
- The main string above is separated in two substrings:
- [System ID] + [Channel ID]+[Random Code]+[User Group] transmitted over the first signal [Random Code]+[encrypted User Biometric Signature] transmitted over the second signalEach separated transmission frequency signal optionally combines the frequency hopping technology. To have a relationship/connection between the two substrings, the Random code is optionally used as the connection between them.
- Each valid transmitted packet, within a random code, should usually be validated by an ACK message from the host receiver, shown as follow:
- [System ID] + [Channel ID]+[Random Code]+[ACK].
- The attached figures represent preferred embodiments of the invention and should not be considered in any way restrictive of the scope of the present invention.
-
Fig. 1 - Remote fingerprint system overview -
Fig. 2 - Remote fingerprint system detailed -
Fig. 3 - Remote control system block diagram -
Fig. 4 - Remote control system architecture -
Fig. 5 - remote control flow chart: Low battery status -
Fig. 6 - remote control flow chart: Reset -
Fig. 7 - Remote control flow chart -
Fig. 8 - Host controller system block diagram -
Fig. 9 - Host controller system architecture -
Fig. 10 - Host control flow chart: scan, process and decoding signal and access. -
Fig. 11 - Host control flow chart: registry process. -
Fig. 12 - Host control flow chart: optionally erase user registry process -
Fig. 13 - Host control flow chart: optionally erase user registry and/or removing user process. -
Fig. 14 - Host control flow chart: reset -
Fig. 15 - System communications overview -
Fig. 16 - User group mechanism -
Fig. 17 - Multiple biometric signature registration - The
figure 3 , shows the block diagram for a preferred embodiment for the present remote control system invention. The system comprises the following items : - 4 Keys Key fob (1100): to select the channel or system to communicate;
- Reset Button (1400): internal button used to erase all the random codes used on the remote control device and/or restart the controller;
- Finger print sensor (1200): to read the user finger print signature;
- Status Red/Green LED (1500): info feedback remote control status for the user;
- 433MHz, 868MHz or 915MHz transceiver modules (1610 and 1620): to establish communication with the host or receiver/controller;
- Microcontroller (1010): to process all the input data from the user and to feedback to the host or receiver/controller;
- Internal/external memory (1020): to store all the data necessary to deal by the microcontroller and according with system specifications.
- User Group (1300): used for identify the user group identification on the host database.
- From
Fig.3 , the dashed boxes means that those components can be integrated in the same module, i.e. if the microcontroller has enough memory to store the 2n random generated code themicrocontroller 1010 andmemory 1020 is on thesame IC 1000, integratedcircuit 1000,module 1000, etc... otherwise they are separated. This applies also to the wireless modules (1600). - The system also provides the appropriate connections (1710 1720, 1730, 1740).
- In case of just one RF carrier operating frequency, one of the RF transceivers can be avoided.
- The
figure 4 , shows the system architecture. - Bill of materials / component description (
figure 4 )Item Description Manufacturer Reference Manufacturer Finger Print Sensor (2100) Electronic device used for used to capture a digital image of the fingerprint pattern AES1710 or AES1711 Authentec Microcontroller (2000) Small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals GEN** GEN** Memory (2300) Electronic device used to store data or programs (sequences of instructions) on a temporary basis. GEN** GEN** 433/868/91 5MHz RF transceive r Modules (2210 and 2220) Electronic device that has both a transmitter and a receiver which is combined and share common circuitry Hoperf RFM22-433-D* RFM22-868-D* RFM22-915-D* or a single housing and is used for transmit or receive radio frequency communication signals. Green & Red LED (2810 and 2820) Electronic device used for emitting light and is used as an indicator lamp. GEN** GEN** 8Bits Dip Switch (2400) A set of manual electric switches that are packaged in a group in a standard dual in-line package and used to customize the behavior of an electronic device for specific situations GEN** GEN** Reset Button (2750) Internal button for erase the all the random codes used on the remote and/or restart the microcontroller. GEN** GEN** Key 1 (2710), Key 2External user key fob for system channel selection GEN** GEN** (2720), Key 3 (2730), Key 4 (2740) and remote control start-up after idle mode. * "D" is for DIP package S1 and S2 is for SMD version, for more details refer to the product datasheet.
** "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area. -
Device Communication AES1710/11 SPI / parallel 8 Bits RFM22-433, RFM22-868/915 SPI System Memory SPI /parallel uC (microcontroller) SPI; parallel; digital I/ O Key 1 to Key 44x Digital inputs Status LEDs: Green & Red. 2x Digital output 8Bits Dipswitch 8x Digital inputs LVD (2500) 1x Digital input. Reset Button 1x Digital input. Communications between microcontroller and the AES1710/11 according to the manufacturer specifications and typically can be done either by SPI (2910) or 8 bit parallel (2920, 2930,2940).
Notes forfigure 4 :
* "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area.
(**) In case of just one RF carrier operating frequency, one of the RF transceivers may be avoided. - For improved system performance, the system optionally performs a battery level monitoring (3000, 3100, 3200) in order to advise the user to replace by fresh units. The operation is done as explained on flow chart from
Fig. 5 . - Reset button (3300) is intended to be used to restart all the system (3500) in case of crash or hang. Another function of this key in combination with any of the 4 key fobs (3400) is to optionally allow the administrator deleting all random codes (3410) stored on the memory. The flow chart from
Fig. 6 explains the operation. - The flux diagram from
Fig. 7 shows the remote control functionality (4000-4720) . Optionally, the process remains on a keyscan mode (4000) and waits for any pressed button (4100) and starts by generating and storing a non repetitive random code (4120, 4200 and 4210) and starting to transmit the first part of the information (4220). The system is looking for a biometric signature stored on the temporary memory (4300) and if available in the memory, encrypts the stored biometric signature together with the previous generated random code (4310) and saves it on the memory (4320). Finally, it transmits the random code and the previous encrypted data (4330) and gives feedback to the user by optionally blinking twice the green LED (4340). If biometric signature is not on the memory (4300) then the system wakes up (4400) and informs the user (4410) and enables the biometric sensor scan mode (4420). If the biometric signature is received successfully (4500) then the remote stores it temporarily on the memory (4510) and permanently deletes it from memory if an optionally timeout is set (4600 and 4610). Also a timeout is set for biometric signature scan process (4700, 4710 and 4720) to avoid unwanted operations. - Note that system should optionally enable stand-by mode (4350) in the finger print circuitry and/or other non relevant hardware in order to save battery life.
- Note from the
figure 7 - (*) In case of using just one RF transceiver, the operation is optionally done by just one carrier frequency. Note that Biometric Signature corresponds to biometric key or, simply, BioKey; Random Code corresponds Ran#. - The
figure 8 , shows the block diagram for host receiver/control. The system comprises the following items: Administrator Key (5100): to register new or erase existing users, allow communication with a computer by using software for administration purposes. - Register (5110) and delete (5120) user buttons: allow administrator add or remove users without using computer software.
- Reset button (5130): just pressing this button performs a system refresh this is the soft reset operation. Optionally, system administrator can erase all registered users doing a hard reset operation by pressing this button simultaneously with delete button, administrator key must optionally be enabled to perform this operation. Channel-ID (5140): to identify the host receiver.
- Red/Green Led Status (5500): info feedback remote control status for the user/administrator;
- 433MHz, 868MHz or 915MHz transceiver modules (5210 and 5220): send/receive RF packets from the user remote control;
- RS232 port (5820): communication between computer software and the receiver.
- Microcontroller (5010): to process all the input data from the receiver, software manager and status buttons;
- Internal/external memory (5020): to store all the data necessary to deal by the microcontroller and according with system specifications.
- Output Control (5400): digital output to grant/deny access to the controlled device/unit. The controlled device/unit is a device that controls, for example, a door lock, alarm system or automatic door/gates, rolling shutters, barriers, swing and slide gates.
- Dot Matrix LCD (5300): Liquid crystal display is used to show display information to the user.
- Input Keypad (5150): Keyboard used to input information or control system functions.
-
Appropriate communications - The dashed boxes means that those components can be integrated in the same module, i.e. if the
microcontroller 5010 andmemory 5020 can be on thesame element 5000, be it an integrated circuit, module, etc... otherwise they are separated. This applies also to thewireless modules 5200. - Note from
fig. 8 , in case of just one RF carrier operating frequency, one of the RF transceivers may be avoided. -
Figure 9 shows the system architecture.
(*) "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area.
(**)In case of just one RF carrier operating frequency, one of the RF transceivers may be avoided. -
Item Description Manufacturer Reference Manufacturer Administrator Key (6110) A keyswitch is an electrical component switch that can be activated by key. GEN** GEN** Reset (6140), Register (6120) and delete (6130) Key Electrical component that can break or establish an electrical circuit, interrupting or conducting the current or diverting it from one conductor to another GEN** GEN** Microcontroller (6000) small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals GEN** GEN** Memory (6400) Electronic device used to store data or programs (sequences of instructions) on a temporary basis. GEN** GEN** 433/868/91 5MHz Transceiver Modules (6520 and 6510) Electronic device that has both a transmitter and a receiver which is combined and share common circuitry or a single housing and is used for transmit or receive radio frequency communication signals. Hoperf RFM22-433-D* RFM22-868-D* RFM22-915-D Status LEDs: Green & Red (6620 and 6610) Electronic device used for emitting light and is used as an indicator lamp. GEN** GEN** 2 bits Dipswitch (6150) A set of manual electric switches that are packaged in a group in a standard dual in-line package and used to customize the behaviour of an electronic device for specific situations GEN** GEN** RS232 Port (6200) Serial communication physical interface by using the RS-232 standard, intended to interface with an external communication device Standard DB9 connector GEN** Input Keypad (6160) Human interface device used to allow the user input or control data. GEN** GEN** Dot Matrix LCD (6300) Liquid Crystal Display used to display/show information for the user GEN** GEN** * "D" is for DIP package S1 and S2 is for SMD version, for more details refer to the product datasheet.
** "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area. -
Device Communication RFM22-433, RFM22-868/915 SPI System Memory SPI /parallel uC (Microcontroller) SPI; parallel; digital I/O Administrator Key 2x Digital Inputs Register, Delete, Reset Key 3 x Digital inputs(****) Status Green and Red LED 2x Digital output RS232 RS232 standard communication* 2 bits Dipswitch 2x Digital inputs Output Control (6700) 2 or 1 Bit output Dot Matrix LCD SPI 3x4 Keypad 3x4 digital I/O(****) (*)RS232 communication can be built in microcontroller otherwise we need an external controller.
(**) "GEN" is a generic component reference for any easily available part, of common and direct knowledge in the area.
(***)In case of just one RF carrier operating frequency, one of the RF transceivers can be avoided.
(****)Can be replaced by a 4x4 keypad.
Communications between microcontroller and the other elements typically can be done either by SPI (6810) or 8 bit parallel (6820, 6830, 6840). - The
figures 10 ,11 ,12 ,13,14 shows the host receiver/control functionality. -
Fig 10 , A000 is the beginning of the main process (7000-7091)A001 is the start of the scan RF process. A200 is the Random code cleaning. -
Fig 11 , A100 is the user registry process (7100-7145) -
Fig 12 ,A300) is the erase user data process (7200-7241)andFig 13 , A310 (7300-7322) continues this process; - Main process (A000), starts with check if admin key(7000)is not enabled. System starts to scan for an RF-signal (7001) and decodes it (7010).If valid string format (7010), system id (7020)and channel ID(7030) match, system stores new random code, user group ID and feeds back to user (7031). If no matching found, system returns to the beginning. Systems scans for separate RF signal (7032) and decodes it(7033). If string is valid(7040) and random code matches(7050), then biometric key is decrypted using encrypted biometric signature and stored random code (7051). If (7040) and (7050) not true, if timeout (7090) has not occurred, then system returns to scan for 2nd signal (7032); if timeout (7090), system cleans last random code(7091) and goes to beginning.
If user group ID (7060) and biometric key (7070) are registered and admin key is not enabled (7080), then system registers random code for this user (7081) enabling access (7082)and feeds back to user (7083). - Note from the flow chart of
figure 10
(*) In case of using just one RF transceivers, the operation is normally done by just one carrier frequency. - User registry process (A100) starts with the registry counter reset (7100), if admin key (7110), register key (7120) are enabled and if it is first registration (7130), system prompts user (7131) for new user ID and waits for input (7132). System searches for user ID in database ( 7133) and if not found (7140) it registers the random code and new user ID(7142), registers the user group ID (7143),adds biometric key and increments registry counter (7144) and gives feedback to user (7145). If user ID found (7140) systems feeds back user (7141) and returns to prompting user for a new input (7131).
At (7130) if not first register, system proceeds with adding a biokey user (7144). - Note from the flow chart of
figure 11
While registering new biometric signatures within a user id, (7145) green LED optionally flashes "n" times, depending of the biometric signature quantity. - (A200) mentioned in
figures 10 ,11 ,12 insures that random code is deleted when not necessary anymore. - Erase user data process (A300) starts if erase key is enabled (7200). The system resets the delete counter (7201), prompts for the user ID to be deleted (7202) and waits for user input (7203). System searches for user ID (7204) and if found (7210) feeds back to the user (7211) prompting for deletion of user random code numbers (7212). If neither register key (7220) nor delete key (7230) are pressed, system waits for input at (7212). By pressing register key (7220) as "yes" system removes all random codes for selected user and feeds back to the user (7221). By pressing delete key (7230) as "no" system continues to (A310).
- At (7210) if user ID is not found , systems feeds back to the user (7213) and checks number of attempts (7240). If number is less than three , counter is incremented (7242) and returns to prompt (7202). If maximum number of attempts reached, system feeds back to user (7241) and goes to (A200).
- Continuation of Erase user data process (A310) starts with prompt to user to delete user ID (7300). If neither register key (7310) nor delete key (7320) are pressed, system waits for input at (7300). By pressing register key (7310) as "yes" system removes all user data (7311,7312,7313) for selected user and feeds back to the user (7314,7315). By pressing delete key (7320) as "no" system feeds back to the user (7321, 7322) and goes to (A200).
-
Fig 14 is the optional hard reset operation (9000-9220). If the admin key (9000), delete button (9100) and reset button (9200) are simultaneously activated, all registered users are deleted (9210) and the system is reset (9220).
Note from the flow chart offigure 14
During delete users operation, red Led must optionally blink while the user database is being deleted. - SPI, Serial Peripheral Interface Bus or SPI Bus is a synchronous serial data link standard that operates in full duplex mode.
- RS232, Recommended Standard 232 is a standard for serial binary single-ended data and control signals connecting between a DTE (Data Terminal Equipment) and a DCE (Data Circuit-terminating Equipment).
- LVD, Low Voltage Detect is an electronic device used to generate an electrical signal when the reading voltage falls below a preset reference voltage. Sometimes is combined with Power-on reset (POR) and then it is called POR-LVD.
- Output Control, output digital signal or electrical signal is used to enable or grant access to the controlled device.
- ISM, industrial, scientific and medical radio bands were originally reserved internationally for the use of RF electromagnetic fields for industrial, scientific and medical purposes other than communications. In general, communications equipment must accept any interference generated by ISM equipment
- SRD, Short Range Devices are radio devices that offer a low risk of interference with other radio services, usually because their transmitted power, and hence their range, is low. The definition 'Short Range Device' may be applied to many different types of wireless equipment, including various forms of:
- Access control (including door and gate openers)
- Alarms and movement detectors
- Closed-circuit television (CCTV)
- Cordless audio devices, including wireless microphones
- Industrial control
- Local Area Networks
- Medical implants
- UWB Sensors & Radars (such as ground probing radar)
- Remote control
- Radio frequency identification (RFID)
- Road Transport Telematics
- Telemetry.
- Short range devices often benefit from a relaxed regulatory regime compared with other radio communications equipment. As a general principle, a user is licence free to operate such equipment, some specific cases may require an individual licence.
- However, like all radio equipment, short-range devices have to meet the Radio and Telecommunications Terminal Equipment (R&TTE) Directive to be placed on the market within the European Community. The operation of the equipment is subject to the frequency management regulations of the relevant member state.
- The following claims set out particular embodiments of the invention.
Claims (16)
- A wireless biometric access control system host characterized by comprising:- user (371, 372, 373, 374) and administrator (360) keys and/or keypad module;- output control module (340);- controller module (320);- wireless module (310), configured to emit and receive a first and a second separated radio signals;- channel ID module (380), configured to select a channel ID;- memory module, configured to store a user random code and a user group ID;- comparator module, at least configured to compare two user random codes;- database module configured to register biometric keys, user group Ids;- decryption module, configured to decrypt a biometric key.
- The host according to claim 1 characterized by further comprising a communication module (390) for connection (391, 501) with an external computer (500).
- The host according to any previous claim characterized by further comprising visual indicators (330) and/or a display (350).
- The host according to any previous claim characterized by the first and second signals being separated in frequency.
- A wireless biometric access control system remote control characterized by comprising:- biometric sensor (220);- user channel id keys and/or keypad module (210);- controller module (240);- random number generator module;- user group selector module (270);- memory module, configured to store at least one user random code and a biometric key;- comparator module, configured to compare user random codes;- wireless module (250), able to emit and receive a first and a second separated radio signals;- encryption module, configured to encrypt a biometric key.
- The remote control according to claim 5 characterized in that the biometric sensor (220) is a fingerprint sensor.
- The remote control according to any claim 5 - 6 characterized by the first and second signals being separated in frequency.
- The remote control according to any claim 5 - 7 characterized by further comprising a key stuck detection module.
- An operation method of a wireless biometric access control system host characterized by comprising the steps:- scanning for a first signal emitted by a remote controller;- decoding said first signal;- checking for a valid format, system id and a channel id contained in said first signal;- if verified, storing a random code and a user group id contained in a memory module for said first signal;- scanning for a second signal emitted by said remote controller;- decoding said second signal in a decryption module;- verifying in a comparator module, if the previously random code stored in the memory module from the first signal and the random code contained in the second signal, match;- if verified, obtaining a biometric key from decrypting a biometric signature contained in said second signal using the random code;- verifying in the comparator module, if said biometric key and said user group id have been previously registered in a database module;- if verified, registering the random code in the database module for the identified user;- establishing that the identified user has been authenticated and triggering an action accordingly.
- The method according to claim 9 characterized in that it further comprises the steps:- if said biometric key or said user group id have not been previously registered in the database module, verifying if a suitable combination of user and administrator keys has been activated signalling a new registration operation;- if verified, verifying through the comparator module if there is any previously stored biometric key in the database module for the identified user;- if not verified, prompting for a new user id;- verifying said user id is new in the database module;- if verified, registering said user id, said random code and said user group id in the database module;- storing the biometric key(s) for the identified user in the database module.
- The method according to any claim 9 - 10 characterized in that it further comprises the steps:- previous to said method, verifying if a suitable combination of user and administrator keys has been activated signalling a delete operation;- prompting for an user id;- verifying through comparator module if, said user id has been previously registered in the database module;- if verified, prompting if all random codes for the identified user should be erased and, if so selected, erasing all random codes for the identified user in the database module;- prompting if the identified user should be erased and, if so selected, removing all biometric keys and user group id for the identified user and removing said user id from the database module.
- The method according to any claim 9 - 11 characterized in that the first and second signals are in different frequencies.
- An operation method of a wireless biometric access control system remote control characterized by comprising the steps:- scanning for a user trigger through a key module (210);- generating a new random code in a random code module;- repeating said generation of a new random code until it is verified that said random code is not present in a memory module for previously stored random codes;- storing said random code in the memory module;- emitting a first signal with a system id, a channel id, said random code, and a user group id;- verifying if there is a previously and temporarily stored biometric key in the memory module;- if not verified, resuming power to biometric scanner (220), scanning a biometric signature, interrupting power to the biometric scanner (220), and storing said biometric information as a biometric key;- encrypt the biometric signature through an encryption module using said random code- emitting a second signal with said random code and an encrypted biometric signature obtained using said stored biometric key and the random code.
- The method according to the previous claim characterized in that after a preset time without use, the previously stored biometric key data is permanently erased from the remote control.
- The method according to any claim 13 - 14 characterized in that the biometric signature is the user fingerprint.
- The method according to any claim 13 - 15 characterized in that the first and second signals are in different frequencies.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/PT2010/000054 WO2012078061A1 (en) | 2010-12-06 | 2010-12-06 | Wireless biometric access control system and operation method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2649590A1 EP2649590A1 (en) | 2013-10-16 |
EP2649590B1 true EP2649590B1 (en) | 2015-12-02 |
Family
ID=44227948
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP10816396.5A Not-in-force EP2649590B1 (en) | 2010-12-06 | 2010-12-06 | Wireless biometric access control system and operation method thereof |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2649590B1 (en) |
WO (1) | WO2012078061A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8990922B2 (en) * | 2013-05-01 | 2015-03-24 | Cheng Uei Precision Industry Co., Ltd. | Access control system and control method thereof |
US9582127B2 (en) | 2014-04-04 | 2017-02-28 | Synaptics Incorporated | Large feature biometrics using capacitive touchscreens |
CN104318655A (en) * | 2014-11-03 | 2015-01-28 | 无锡港湾网络科技有限公司 | Intelligent residential area monitoring method |
CN206331496U (en) * | 2016-09-23 | 2017-07-14 | 史蒂芬·若一思·图斯布雷 | Fingerprint lock, fingerprint processing device and fingerprint lock system |
CN106447877B (en) * | 2016-11-29 | 2019-03-22 | 北京小米移动软件有限公司 | Open method, device and the server of smart machine |
CN107680227A (en) * | 2017-10-20 | 2018-02-09 | 莲花丝路科技有限公司 | A kind of application method and system of smart lock low power consumption remote control system |
CN108230493A (en) * | 2017-12-19 | 2018-06-29 | 资密科技有限公司 | The control method and intelligent lock system of intelligent lock system |
CN110690965B (en) * | 2019-10-10 | 2022-09-13 | 山东浪潮科学研究院有限公司 | A wireless communication security system |
CN110853198B (en) * | 2019-11-28 | 2022-06-14 | 北京市商汤科技开发有限公司 | Object recognition apparatus, data processing method, electronic device, and storage medium |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2233942A1 (en) * | 1996-09-18 | 1998-03-26 | Dew Engineering And Development Limited | Biometric identification system for providing secure access |
MY143028A (en) * | 2003-12-02 | 2011-02-14 | Multimedia Glory Sdn Bhd | A method and system to electronically identify and verify an individual presenting himself for such identification and verification |
WO2007011311A2 (en) * | 2005-07-18 | 2007-01-25 | Kristalbond Technologies (Singapore) Pte Ltd. | Biometric transponder system |
US20070050303A1 (en) * | 2005-08-24 | 2007-03-01 | Schroeder Dale W | Biometric identification device |
-
2010
- 2010-12-06 EP EP10816396.5A patent/EP2649590B1/en not_active Not-in-force
- 2010-12-06 WO PCT/PT2010/000054 patent/WO2012078061A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2012078061A1 (en) | 2012-06-14 |
EP2649590A1 (en) | 2013-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2649590B1 (en) | Wireless biometric access control system and operation method thereof | |
US11089012B2 (en) | Event driven second factor credential authentication | |
CN101872542B (en) | Transmitter and method for transmitting an RF control signal | |
WO2021023164A1 (en) | Intelligent lock control method and system | |
US6658328B1 (en) | Passive function control system for a motor vehicle | |
US20090153290A1 (en) | Secure interface for access control systems | |
EP1755061A2 (en) | Protection of non-promiscuous data in an RFID transponder | |
CN105279832A (en) | Intelligent door lock system and control method thereof | |
CN102158473A (en) | Remote entry system | |
CN106652106A (en) | Door lock control method, device and terminal | |
EP1901238A2 (en) | Authentication and access control device | |
CN103538561A (en) | Automobile starting control system and method | |
KR101506549B1 (en) | Secure entrance method for preventing interception of radio messages and System using the method | |
AU2016241407A1 (en) | A lock monitoring device and a lock monitoring system | |
US10026299B2 (en) | Mobile supported disarming | |
WO2006094048A2 (en) | Systems and methods for biometric authentication | |
CN107852586B (en) | Electronic access control for application middle layer | |
US10687214B2 (en) | Secure key fob | |
Cavalleri et al. | A wearable device for a fully automated in-hospital staff and patient identification | |
JP2009151557A (en) | Anti-theft device | |
WO2015068342A1 (en) | Terminal device and wireless communication system | |
CN105393254A (en) | Enabling access to data | |
EP3017433B1 (en) | Secure mode for electronic access control readers | |
CA2864362C (en) | System incorporating actively authenticated multifactor proximity card | |
CN2840136Y (en) | Wireless data transmission computer safety command plate equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20130705 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20140404 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20150708 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 763928 Country of ref document: AT Kind code of ref document: T Effective date: 20151215 Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602010029409 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20160302 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: PT Ref legal event code: SC4A Free format text: AVAILABILITY OF NATIONAL TRANSLATION Effective date: 20160302 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 763928 Country of ref document: AT Kind code of ref document: T Effective date: 20151202 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160302 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160303 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20151231 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: PT Payment date: 20160303 Year of fee payment: 6 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602010029409 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20160425 Year of fee payment: 6 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160402 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20151231 Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20151206 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20151231 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20160701 |
|
26N | No opposition filed |
Effective date: 20160905 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20161104 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20160202 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20101206 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20161206 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20151206 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20161206 Ref country code: PT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170906 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151202 |