(19)
(11) EP 2 622 781 B1

(12) EUROPEAN PATENT SPECIFICATION

(45) Mention of the grant of the patent:
23.03.2016 Bulletin 2016/12

(21) Application number: 11745828.1

(22) Date of filing: 27.06.2011
(51) International Patent Classification (IPC): 
H04L 9/00(2006.01)
E06B 7/30(2006.01)
H04L 9/32(2006.01)
G07C 9/00(2006.01)
(86) International application number:
PCT/IB2011/052820
(87) International publication number:
WO 2012/001614 (05.01.2012 Gazette 2012/01)

(54)

AUTHENTICATION DEVICE OF A SUBJECT MAKING A HOUSE CALL

AUTHENTIFIZIERUNGSVORRICHTUNG EINER EINEN HAUSBESUCH TÄTIGENDEN PERSON

DISPOSITIF D'AUTHENTIFICATION D'UNE PERSONNE QUI FAIT UNE VISITE À DOMICILE


(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30) Priority: 01.07.2010 IT GE20100072

(43) Date of publication of application:
07.08.2013 Bulletin 2013/32

(73) Proprietor: SESAMO S.r.l.
16121 Genova (IT)

(72) Inventor:
  • Ghio, Marco
    16146 Genova (GE) (IT)

(74) Representative: Lunati & Mazzoni S.r.L. 
Via Carlo Pisacane, 36
20129 Milano
20129 Milano (IT)


(56) References cited: : 
US-A1- 2005 060 555
US-A1- 2007 085 662
US-B1- 6 663 420
US-A1- 2006 014 564
US-A1- 2010 159 953
   
  • BEAUFOUR A ET AL: "Personal servers as digital keys", PERVASIVE COMPUTING AND COMMUNICATIONS, 2004. PROCEEDINGS OF THE SECON D IEEE ANNUAL CONFERENCE ON MAR. 14-17, 2004, PISCATAWAY, NJ,IEEE, US, 14 March 2004 (2004-03-14), pages 319-328, XP010689694, DOI: DOI:10.1109/PERCOM.2004.1276869 ISBN: 978-0-7695-2090-2
   
Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


Description


[0001] The present invention relates to an authentication device for a subject paying a house call or visit, of the type pointed out in the preamble of the first claim.

[0002] In particular, the invention relates to a device that, in case of a visit to an office or a dwelling, is able to carry out preventive verification and control of the visitor's identity and therefore enables the resident to grant the visitor access to the office/house in full security.

[0003] It is known that house calls are necessary for carrying out services of public interest such as for instance notification of deeds, delivery of registered letters, meter reading for the different user bases, interventions for extraordinary maintenance. In addition, house calls are often made by suitable staff that, for commercial purposes, perform a "door-to-door" activity for selling goods or offering services and promoting activities.

[0004] For the above reasons, the resident is often obliged to open the door to unknown visitors whose identity he/she is therefore unable to ascertain, unless he/she bases himself/herself on that which is declared or shown by the visitor. This lack of knowledge concerning a visitor is frequently utilised as an expedient by delinquents that, giving wrong personal particulars, succeed in illegally getting into the resident's houses.

[0005] Very often the victims of these tricks are "weak" persons such as persons living alone, old people, disabled people or all those categories having low self-defence and reaction capacity, easily prone to persuasion on the basis if a simple declaration by the visitor. In particular, for easily verifying the visitor's identity, they are often brought to instinctively open the door on ringing of the bell thus determining elimination of the only efficient protection for their defence.

[0006] In order to solve this problem many front doors have been provided with a peephole, i.e. a through hole adapted to enable the resident to see the visitor and therefore carry out a first evaluation of same.

[0007] This solution however is weakly reliable because it can be easily overcome by the delinquent who may wear a uniform or show previously prepared visiting cards or a badge.

[0008] In order to solve this problem, the institutions have made available specific freephone numbers against fraud that are directly coordinated by the police and enable control of the identity by a telephone call to these numbers. Unfortunately, this operation is often neglected by the resident who, due to inattention, lack of information, laziness, confidence, opens the door and enables access to the house without any certification.

[0009] Therefore, taking into account the importance of a correct identification of the visitor, many apparatus have been developed that utilising videocameras, microphones or other similar means allow opening of the door by the resident only after the visitor has been recognised.

[0010] A first example is described in patent US2003086186A1 in which a videocamera is used for catching the visitor and a display enabling the resident to obtain a convenient and quick image of the visitor.

[0011] Another device is described in patent WO2007012831A1.

[0012] In this document, arrangement of a particular fixed terminal is provided which is placed at the front door and is equipped with a database containing the visitors' data and with an identification system made up of keyboard and microphone.

[0013] According to the provided authentication process, the visitor types in his/her identification code on the keyboard, speaks on the microphone and the device opens the door and allows access only if the visitor's voice is substantially coincident with that stored in the database in correspondence with the previously inputted code.

[0014] In other authentication apparatus, in addition to use of the aforesaid fixed terminal, adoption of a mobile terminal is provided, for example a mobile phone, in possession of the visitor.

[0015] A first example of these authentication apparatus is described in patent US2007085662A1 disclosing a fixed terminal, i.e. the terminal placed at the door, comprising a videocamera, a database and a screen.

[0016] According to the authentication procedure described in this patent, when the visitor comes close to the front door, he/she must send, through the mobile terminal, a code to the fixed terminal that retrieves in the database, a first image corresponding to the code it has received, records a second image of the visitor through the videocamera and then shows the two images to the resident who decides on opening the door or not.

[0017] Further examples of these authentication apparatus are disclosed in patent US2005060555A1 and in document "Personal Servers as Digital Keys" by Allan Beaufour.

[0018] In this case, when the visitor comes to the front door, the fixed terminal sends an encrypted signal to the mobile terminal that, based thereon, creates a second signal which, in turn, is sent to the fixed signal that will verify whether it is correct and will grant access to the visitor.

[0019] The above described known art has some important drawbacks.

[0020] A first important fault resides in the complexity of known authentication apparatus. In particular, this fault can be found in the fixed terminals placed at the front door which, being provided with a complex identification system, are both very complicated in manufacture and very expensive.

[0021] Another problem is represented by the fact that fixed devices, due to their complexity, are of difficult assembly at the front door.

[0022] In particular, due to the above described identification means, the fixed terminal is particularly bulky and therefore of difficult installation. This problem is further increased by the presence of powering means consisting of a battery and/or electric cables electrically feeding the fixed terminal by connecting it to the mains.

[0023] A further problem consists in the high installation cost of known authentication apparatus because, due to the bulkiness of same and the required connections for operation, they are not suitable for the front door presently in use and therefore replacement of these doors is required.

[0024] Another important problem resulting from the complexity of the authentication device is represented by the poor reliability of same and the reduced lifetime. Under this situation, the technical task underlying the present invention is to conceive an authentication device of a subject paying a house call capable of substantially obviating the mentioned drawbacks.

[0025] Within the scope of this technical task, it is an important aim of the invention to provide an authentication device of simple manufacture and reduced costs. Another important aim of the invention consists in obtaining an authentication device of easy installation.

[0026] A further aim of the invention is to make available an authentication device that is adapted for the presently used front doors, i.e. without being obliged to replace them.

[0027] Also an important result of the invention is the achievement of an authentication device characterised by high reliability that practically does not require servicing.

[0028] The technical task mentioned and the aims specified are achieved by an authentication device of a subject paying a house call as claimed in the appended Claim 1.

[0029] Preferred embodiments are highlighted in the sub-claims.

[0030] The features and advantages of the invention are hereinafter clarified by the detailed description of a preferred embodiment of the invention, with reference to the accompanying drawings, in which:

Fig. 1 as a whole shows an authentication device of a subject paying a house call in accordance with the invention;

Fig. 2 shows a component of the authentication device disposed at an entrance; and

Fig. 3 highlights, through a block diagram, an authentication process utilising the authentication device.



[0031] With reference to the drawings, the authentication device of a subject making a house call in accordance with the invention is generally identified by reference numeral 1.

[0032] It is adapted to be used for verifying the identity of a subject making a house call in a building, flat or office. Device 1 can therefore be positioned at an entrance 10 such as a door or gate or other similar element and is adapted to prevent access to the house without the resident's consent.

[0033] The authentication device 1 fundamentally comprises a fixed terminal 20 adapted to be connected in the vicinity of an entrance 10 and a mobile terminal 30 adapted to be carried by the coming subject and to be brought into connection with the fixed terminal 20.

[0034] The mobile terminal 30, shown in Fig. 1, consists of an electronic device comprising a storage component 31 adapted to store information such as alphanumeric codes for example, a battery 32, preferably of the rechargeable type, or other powering systems adapted to enable energy supply to at least said storage component 31. The mobile terminal 30 therefore may selectively consist of a mobile phone, a USB (Universal Serial Bus) key suitably provided with a battery 32 or other similar device. Preferably, the mobile terminal 30 is a USB key comprising a battery 32.

[0035] The mobile terminal 30 can be further provided with a recognition apparatus 33 adapted to enable use of the mobile terminal 30 exclusively by authorised subjects and a time meter 34 adapted to measure elapsing of time and to enable the mobile terminal 30 to know, date and time, instant by instant, i.e. the elapsed time from creation of the first signal.

[0036] The time meter 34 can consist of a clock/watch or other similar device adapted to enable the mobile terminal 30 to know date and time, at each instant. Alternatively, it may consist of a decreasing counter, a timer for example that, as better clarified in the following, enables the residual lifetime of the data stored in the mobile terminal 30 to be quantified.

[0037] The recognition apparatus 33 can consist, if it is a mobile phone, of a keypad adapted to enable introduction of a PIN (Personal Identification Number) or, if it is a USB key, of a fingerprint reader or other similar apparatus adapted to identify the subject using the mobile terminal 30.

[0038] In order to enable the coming subject to mutually connect the two terminals 20 and 30, as hereinafter clearly described, the mobile terminal 30 and fixed terminal 20 comprise first connecting means 35 and 21 respectively, that is adapted to carry out connection.

[0039] Said first means 35 and 21 is suitable to make a connection capable of allowing at least passage of current between the two terminals 20 and 30 so as to enable the mobile terminal 30 to supply the fixed terminal 20 with the activation energy, i.e. the energy adapted to enable the fixed terminal 20 to be activated and carry out the authentication process described below.

[0040] In addition, the first connecting means 35 and 21 creates a data passage connection between the mobile terminal 30 and fixed terminal 20 so as to enable the mobile terminal 30 to provide the fixed terminal 20 with data necessary for authentication of the coming subject.

[0041] The first connecting means 35 and 21 therefore may consist of USB (Universal Serial Bus) connectors or other similar means adapted to allow both passage of current and passage of data between terminals 20 and 30.

[0042] In particular, in some cases, to facilitate connection between the two terminals 20 and 30, device 1 can have a further connecting means such as a cable having two USB connectors at the ends so as to be connected to the first means 35 and 21, and therefore being operatively interposed between terminals 20 and 30.

[0043] The fixed terminal 20 is fastened in the vicinity of entrance 10, for example to a wall portion close to said entrance, and preferably terminal 20 is secured to the entrance itself. More preferably, the fixed terminal 20 is housed in the through hole 10a present in the entrance 10 that is usually employed as a peephole.

[0044] In order to enable the fixed terminal 20 to be housed in the through hole 10a, the fixed terminal 20, as shown in Fig. 1, comprises an outer block 22, facing the outside of the house and an inner block 23 facing the inside of the house, which blocks have a portion of smaller section adapted to be inserted in the through hole 20a, and a portion of bigger section adapted to abut against the entrance 10.

[0045] In addition, the fixed terminal 20 has tightening means 24 adapted to mutually fasten blocks 22 and 23 at the through hole 10a bringing them into abutment with the entrance 10 on opposite sides relative to said entrance. In particular, the tightening means 24 consists of screws, threaded couplings, friction fits or other similar elements adapted to mutually fasten blocks 22 and 23 varying their distance and therefore the length of the fixed terminal 20 so as to make the sizes of the fixed terminal 20 suit the thickness of said entrance 10. Preferably, the tightening means 24 is positioned in such a manner that said means is operable for assembling or disassembling the two blocks 22 and 23 exclusively from the inside of their housing seat. Therefore said means 24, if screws for example, have their head at the inner block 23, as shown in Fig. 2. The outer block is adapted to be connected to the mobile terminal 30 and therefore has said connecting means 21 such arranged that it can be brought into connection for data and power passage with the mobile terminal 30.

[0046] The inner block 23 is adapted to perform the authentication process and therefore it comprises a card 23a adapted to process the information of the mobile terminal 30 so as to perform authentication of the coming subject, and signalling members 23b adapted to signal the presence of the coming subject and the occurred authentication to the resident.

[0047] The signalling members 23b is adapted to carry out signalling of the presence of an authenticated coming subject through emission of a suitable acoustic and/or visual signal. Therefore they can comprise a loud-speaker adapted to reproduce a message or a sound and/or LEDs or other similar means adapted to emit a light signal.

[0048] To enable the card 23a to have the necessary power and data for carrying out authentication of the coming subject, the card 23a and therefore the inner block 23 are brought into connection for data and power passage with the outer block 22 and therefore the mobile terminal 30.

[0049] To this aim the fixed terminal 20 comprises second connecting means 25 adapted to carry out such a connection between the two blocks 22 and 23. Preferably, the second connecting means 25 consists of sliding/revolving contacts or other similar means adapted to carry out an electric connection between two components, i.e. blocks 22 and 23, irrespective of their mutual position.

[0050] In particular, the second connecting means 25 consists of sliding contacts and, more particularly linear sliding contacts adapted to connect the two blocks 22 and 23, irrespective of the sizes of the fixed terminal 20. The second connecting means 25 therefore consists of plates that, when the two blocks 22 and 23 are joined, comes mutually into contact and consequently carry out connection between the two blocks 22 and 23.

[0051] The second connecting means 25 is preferably made of gold or other material that does not oxidise when in contact with air.

[0052] Finally, in order to enable the resident to see the coming subject before opening the door, blocks 22 and 23 are provided with inner recesses that, when tightening is carried out, comes into mutual alignment so as to define an inner hole 20a substantially coaxial with the through hole 10a, through which the resident can visually identify the coming subject.

[0053] In particular, the fixed terminal 20 can comprise at least one lens 20b disposed in register with the inner hole 20a and adapted to improve the quality and width of the field of vision through said through hole. Preferably, lens 20b consists of a wide-angle lens capable of widening the field of vision of the resident and is fastened to the outer block 22.

[0054] The authentication device 1 is finally associable with a central server 40 comprising a database including the identification codes of all houses/offices, provided with a fixed terminal 20, the identification codes of the subjects/companies provided with a fixed terminal 20, and the history of all visits paid. In the database of the central server 40 also the identification codes of the coming subjects are present, i.e. the codes enabling the mobile terminal 30 to identify the coming subject through the recognition apparatus 33.

[0055] It is adapted to generate the first authentication signal and therefore supply the mobile terminal 30 with the necessary data for authentication. Therefore the central server 40 can consist of a computer or other similar device adapted to be connected to the mobile terminal 30 through the connecting means 35, for example.

[0056] Alternatively, if terminal 30 is a mobile phone, this connection can be a Bluetooth connection or other wireless connection typical of a mobile phone.

[0057] The invention comprises a new authentication process 100 for identifying a subject making a house call.

[0058] In this process, provision is made for a hashing calculation in combination with a shared secret consisting of the calculation algorithm and of elements that are fully known by the central server 40, while they are only partly known by the fixed terminal 20. In detail, as hereinafter better described, the fixed terminal 20, receiving the missing data in a plain form through the mobile terminal 30, is able to calculate an authentication signal of its own in an autonomous manner. If this signal is fully coincident with the signal stored by the central server 40 on the mobile terminal 30, the fixed terminal certifies the identity of the coming subject asking for entry.

[0059] Alternatively, process 100 is based on an asymmetric scheme cryptography, i.e. a cryptography in which the key used for encrypting the information differs from the key used for decrypting the information.

[0060] It should be pointed out that in both the aforesaid cases the mobile terminal 30 only carries out a function of making server 40 and fixed terminal 20 communicate with each other but it does not implement any information decrypting procedure.

[0061] The authentication process 100, diagrammatically shown in Fig. 3, contemplates an association step 110 in which the coming subject is associated with a first authentication signal; a connection step 120 in which the two terminals are mutually connected; an authentication step 130 in which the identity of the coming subject is ascertained; and a signalling step 140 in which the presence of the coming subject is signalled.

[0062] In the association step 110 the coming subject before coming to the house, connects the mobile terminal 30 to the central apparatus 40 to which, in order to obtain the first authentication signal, communicates the house he/she wishes to visit, the date and time of the visit and, more specifically, the date and time band in which the visit is foreseen.

[0063] The central apparatus 40 retrieves the identification codes corresponding to the residence that is wished to be visited and to the mobile terminal 30 connected thereto and processes the first authentication signal. In particular, this first authentication signal substantially consists of an alphanumeric code suitably processed by apparatus 40 as a function of the theoretical visit date and time, identification code of the residence, identification code of the coming subject.

[0064] After the first authentication signal has been obtained, the central apparatus 40 combines some information in plain form to this first signal, which information as better described hereinafter will help in providing part of the information to the fixed terminal 20 in such a manner as to enable it to calculate the second authentication signal in an autonomous manner.

[0065] The central server 40 stores on the storage component 31, the first authentication signal, theoretical date and time of the visit, comprising the validity time of the first signal, that together with the identification code of the mobile terminal 30 already present on the storage element 31, constitute the data required for authentication.

[0066] In addition, during the association step 110, the coming subject can ask for several first authentication signals in order to program a series of visits to different residents and therefore different fixed terminals 20, to be made at different dates and times.

[0067] In particular, in this case the central apparatus 40 creates different first authentication signals using, for each first signal, the identifier associated with the given fixed terminal 20 of the residence to which access is wished using that particular first identification code.

[0068] At this point the association step 110 is terminated and the connection step 120 begins.

[0069] Once the coming subject has reached the entrance 10 he/she, through the recognition apparatus 33, activates the mobile terminal 30 that is therefore ready to be brought into connection with the fixed terminal 20 through the first connecting means 21 and 35.

[0070] This connection enables current and data passage between the mobile terminal 30 and fixed terminal 20. In particular, due to this connection, the fixed terminal 20 receives the energy necessary for its activation and the energy necessary for performing authentication of the coming subject from battery 32. The fixed terminal 20, through the previously made connection, receives the energy necessary to its activation, retrieves the data for authentication from the mobile terminal 30 and starts processing these data.

[0071] In particular, the fixed terminal 20 identifies among all data saved on the storage component 31, the data corresponding to the unique first signal that can be coded through the unique identifier belonging to the same fixed terminal.

[0072] After retrieval of the first authentication signal, of the identification code of the fixed terminal 20 as well as of the theoretical date and time of the visit, it calculates the second authentication signal in an autonomous manner, based both on the aforesaid data, and on data the terminal itself possesses.

[0073] In particular, it processes a second authentication signal, based on its identification code suitably stored on the fixed terminal 20 when installed, on the identification code of the mobile terminal 30 and on the theoretical date and time of the visit.

[0074] At this point, the fixed terminal 20 compares the first authentication signal obtained by the central server 40, with the second authentication signal obtained by the fixed terminal 20. At this point, if the two signals differ, the authentication gives a negative result and therefore the coming subject is not allowed to enter the residence. On the contrary, if the two signals are coincident, the authentication gives a positive result and therefore the coming subject is allowed to enter the residence.

[0075] In particular, the result of the comparison between the two signals is preferably stored on both terminals 20 and 30 and, in addition, the first authentication signal and the different data connected thereto are preferably deleted.

[0076] Should the comparison result be positive, the authentication process 100 contemplates the signalling step 140.

[0077] In this step 140, the fixed terminal 20, by utilising the signalling members 23b, announces the presence of the coming subject to the resident who, through the second through hole 20a, can carry out a further visual control on the coming subject or, alternatively, directly grant access to the subject through the entrance 10.

[0078] Once all visits have been completed, the authentication process 100 terminates with a closing step 150 in which the coming subject connects the mobile terminal 30 to the central server 40 and updates the history of the visits he/she has made storing the outcomes of said visits on server 40.

[0079] In addition, the authentication process 100 may comprise one or more verification steps that can take place at any moment after the association step 110 and before the closing step 150.

[0080] In detail, in the verification step one of terminals 20 or 30, preferably the mobile terminal 30, analyses the validity of the first authentication signal comparing theoretical date and time of the visit, corresponding to the first signals stored thereon, with the examination time, i.e. the time that when the verification step is carried out, has elapsed from creation and storage of the first signal, which time is measured through the time meter 34. In particular, in this step the mobile terminal 30 obtains the examination time from the time meter 34, i.e. the elapsed time from storage of the first signal on the mobile terminal 30, and compares said examination time with the validity time included in the theoretical date and time of the visit, i.e. the theoretical duration associated with the first signal from server 40. If the validity time of a first signal is lower than the examination time, the mobile terminal 30 deletes the first authentication signal and the data connected thereto.

[0081] The invention enables important advantages to be achieved.

[0082] A first advantage is represented by the high security degree ensured by the authentication device 1 and the authentication process 100. This security resides in the high complexity and therefore decrypting difficulty of the different authentication signals making it almost impossible to tamper with device 1 or process 100.

[0083] This impossibility of the data being tampered with is ensured by use of very complicated cryptographic algorithms making it very difficult to identify the residence corresponding to a first authentication signal and therefore to use said first signal in a fraudulent manner.

[0084] The high security of device 1 is also ensured by the fact that card 23a, i.e. the component carrying out analysis of the signals, is housed in the inner block 23 and therefore can be hardly tampered with.

[0085] A further advantage is ensured by the fact that the first authentication signals, due to accomplishment of the verification procedure, have a time limit and therefore can be exclusively used during a given time gap.

[0086] In conclusion, due to the limited time duration of the first authentication signals and the difficulty in associating a given residence to one of said first signals, use of device 1 is impossible for an unauthorised person. This impossibility is further ensured by the recognition apparatus 33 according to which use of the fixed terminal 30 is made possible to the authorised coming subject alone. Another advantage is represented by the fact that, unlike presently known authentication devices, device 1 can be easily incorporated into the doors presently in use without modifications being required. This advantage is given by the possibility of arranging the fixed terminal inside a housing normally present in a door or an entrance, i.e. the through hole 10a.

[0087] In addition, since powering of the fixed terminal 20 is given by the mobile terminal 30 alone, the presence of batteries, cables or other similar elements is avoided, which elements would increase the sizes of the fixed terminal 20 and make installation of same much more complicated.

[0088] A further advantage resides in that device 1 and process 100 do not grant access to the residence but merely prove the truth and reliability of the coming subject while the choice of opening or not is left to the resident.

[0089] Another important advantage is represented by the presence of a history of all visits enabling identification, at any moment, of the person who has made the visit to a given residence at a given time.

[0090] Another achieved goal is represented by the low cost of terminals 20 and 30. In fact, the calculation complexity has been advantageously gathered on the central server 40 and therefore the fixed terminal 20 and mobile terminal 30 only need cheap and simple electronic components.

[0091] Also to be noted is the absence of operations by the resident who, in fact, must merely wait for a visual/acoustic signal emitted by the signalling members 23b.

[0092] An important goal is finally represented by the full absence of maintenance for the fixed terminal 20 because the routine maintenance for loading the authentication signals and recharging the powering battery is concentrated in the user base of the mobile terminal 30.


Claims

1. An authentication device (1) of a subject making a house call comprising a fixed terminal (20) adapted to be fastened in the vicinity of an entrance (10) of said house; a mobile terminal (30) adapted to be carried by said subject making a house call in the vicinity of said entrance (10), said fixed terminal (20) being adapted to be brought into connection with said mobile terminal (30) identifying said mobile terminal (30), characterised in that said connection between said mobile terminal (20) and fixed terminal (30) is adapted to enable said mobile terminal (30) to supply said fixed terminal (20) with activation energy.
 
2. An authentication device (1) as claimed in claim 1, wherein said connection between said mobile terminal (20) and fixed terminal (30) is adapted to enable passage of data between said fixed terminal (30) and mobile terminal (20).
 
3. An authentication device (1) as claimed in one or more of the preceding claims, wherein said fixed terminal (30) and mobile terminal (20) comprise first connecting means (35, 21) adapted to carry out said connection, and wherein said first connecting means (35, 21) consists of USB connectors.
 
4. An authentication device (1) as claimed in one or more of the preceding claims, wherein said mobile terminal (30) comprises a time meter (34) adapted to enable said mobile terminal (30) to measure the elapsed time.
 
5. An authentication device (1) as claimed in one or more of the preceding claims, wherein said mobile terminal (30) comprises a battery (32) adapted to store energy and to enable said mobile terminal (30) to power said fixed terminal (20).
 
6. An authentication device (1) as claimed in one or more of the preceding claims, wherein said entrance (10) comprises a through hole (10a) adapted to enable a resident to see said coming subject without moving said entrance (10); and wherein said fixed terminal (20) is adapted to be housed in said through hole (10a).
 
7. An authentication device (1) as claimed in the preceding claim, wherein said fixed terminal (20) comprises an outer block (22) and an inner block (23) adapted to be tightened together at said through hole (10a) so as to abut against said entrance (10) on opposite sides relative to said entrance (10).
 
8. An authentication device (1) as claimed in the preceding claim, wherein said fixed terminal (20) comprises second connecting means (25) adapted to bring said outer block (22) into connection for data and current passage with said inner block (23).
 
9. An authentication device (1) as claimed in one or more of the preceding claims, wherein said fixed terminal (20) comprises signalling members (23b) adapted to signal the presence of said coming subject to said resident.
 
10. An authentication process (100) of a subject making a house call, comprising a fixed terminal (20) fastened in the vicinity of an entrance (10) and a mobile terminal (30) adapted to be carried by said subject making a house call in the vicinity of said entrance (10), said authentication process comprising a connection step (120) in which said mobile terminal (30) is connected to said fixed terminal (20), characterised in that when said mobile terminal (30) is connected to said fixed terminal (20), said mobile terminal (30) supplies said fixed terminal (20) with energy causing activation of said fixed terminal (20).
 
11. An authentication process (100) as claimed in the preceding claim, wherein in said identification step (130) said mobile terminal (20), based on at least said authentication data, creates a second authentication signal, and wherein it compares said second authentication signal with said first authentication signal.
 
12. An authentication process (100) as claimed in the preceding claim, comprising an association step (110) in which said mobile terminal (30) is connected to a central apparatus (40) and wherein said central apparatus (40) creates a first authentication signal and supplies said mobile terminal with said authentication data including said first authentication signal; and a signalling step (140) in which, if said second authentication signal is coincident with said first authentication signal, said fixed terminal gives notice of the presence of said subject to the resident.
 
13. An authentication process (100) as claimed in one or more of claims 10-12, wherein associated with said first signal is a validity time; said authentication process (100) comprising at least one verification step in which said mobile terminal (30) compares said validity time with the examination time and wherein if the examination time is higher than said validity time, said first opening signal is deleted from said mobile terminal (30).
 


Ansprüche

1. Authentifizierungsvorrichtung (1) einer einen Hausbesuch tätigenden Person, die Folgendes umfasst: ein festes Endgerät (20), das geeignet ist, in der Nähe eines Eingangs (10) des genannten Hauses angebracht zu werden; ein tragbares Endgerät (30), das geeignet ist, von der genannten, den Hausbesuch tätigenden Person in die Nähe des genannten Eingangs (10) gebracht zu werden, wobei das genannte feste Endgerät (20) geeignet ist, mit dem genannten tragbaren Endgerät (30) verbunden zu werden und dabei das genannte tragbare Endgerät (30) zu identifizieren, dadurch gekennzeichnet, dass die genannte Verbindung zwischen dem genannten tragbaren Endgerät (20) und dem genannten festen Endgerät (30) geeignet ist, es dem genannten tragbaren Endgerät (30) zu gestatten, dem genannten festen Endgerät (20) Aktivierungsenergie zur Verfügung zu stellen.
 
2. Authentifizierungsvorrichtung (1) nach Anspruch 1, bei der die genannte Verbindung zwischen dem genannten tragbaren Endgerät (20) und dem genannten festen Endgerät (30) geeignet ist, die Datenübertragung zwischen dem genannten festen Endgerät (30) und dem genannten tragbaren Endgerät (20) zu gestatten.
 
3. Authentifizierungsvorrichtung (1) nach einem oder mehreren der vorangegangenen Ansprüche, bei dem das genannte feste Endgerät (30) und das genannte tragbare Endgerät (20) erste Verbindungsmittel (35, 21) umfassen, die geeignet sind, die genannte Verbindung herzustellen und bei denen die genannten ersten Verbindungsmittel (35, 21) aus USB-Verbindern bestehen können.
 
4. Authentifizierungsvorrichtung (1) nach einem oder mehreren der vorangegangenen Ansprüche, bei dem das genannte tragbare Endgerät (30) einen Zeitmesser (34) umfasst, der geeignet ist, es dem genannten tragbaren Endgerät (30) zu gestatten, die verstrichene Zeit zu messen.
 
5. Authentifizierungsvorrichtung (1) nach einem oder mehreren der vorangegangenen Ansprüche, bei dem das genannte tragbare Endgerät (30) eine Batterie (32) umfasst, die geeignet ist, Energie zu speichern und es dem genannten tragbaren Endgerät (30) zu gestatten, das genannte feste Endgerät (20) zu versorgen.
 
6. Authentifizierungsvorrichtung (1) nach einem oder mehreren der vorangegangenen Ansprüche, bei dem der genannte Eingang (10) eine durchgehende Öffnung (10a) umfasst, die geeignet ist, es einem Bewohner zu gestatten, die genannte, einen Hausbesuch tätigende Person zu sehen, ohne den genannten Eingang (10) zu bewegen und bei der das genannte feste Endgerät (20) geeignet ist, in der genannten durchgehenden Öffnung (10a) untergebracht zu werden.
 
7. Authentifizierungsvorrichtung (1) nach dem vorangegangenen Anspruch, bei dem das genannte feste Endgerät (20) eine äußere (22) und eine innere Sperre (23) umfasst, die geeignet sind, miteinander auf der genannten durchgehenden Öffnung (10a) zusammengepresst zu werden, um mit dem genannten Eingang (10) von im Verhältnis zu dem genannten Eingang (10) gegenüber liegenden Seiten anzuschlagen.
 
8. Authentifizierungsvorrichtung (1) nach dem vorangegangenen Anspruch, bei dem das genannte feste Endgerät (20) zweite Verbindungsmittel (25) umfasst, die geeignet sind, die Datenübertragung und die Stromversorgung der genannten äußeren (22) zu der genannten inneren Sperre (23) in Verbindung zu bringen.
 
9. Authentifizierungsvorrichtung (1) nach einem oder mehreren der vorangegangenen Ansprüche, bei dem das genannte feste Endgerät (20) Signalorgane (23b) umfasst, die geeignet sind, dem genannten Bewohner die Anwesenheit der den Hausbesuch tätigenden Person anzuzeigen.
 
10. Authentifizierungsverfahren (100) einer einen Hausbesuch tätigenden Person, die ein festes, in der Nähe eines Eingangs (10) angebrachtes Endgerät (20) und ein tragbares Endgerät (30) umfasst, das geeignet ist, von der genannten, den Hausbesuch tätigenden Person in die Nähe des genannten Eingangs (10) gebracht zu werden, wobei das genannte Authentifizierungsverfahren (100) eine Verbindungsphase (120) umfasst, in der das genannte tragbare Endgerät (30) mit dem genannten festen Endgerät (20) verbunden ist, dadurch gekennzeichnet, dass, wenn das genannte tragbare Endgerät (30) mit dem genannten festen Endgerät (20) verbunden ist, das genannte tragbare Endgerät (30) dem genannten festen Endgerät (20) Energie zur Verfügung stellt und so zur Aktivierung des genannten festen Endgeräts (20) führt.
 
11. Authentifizierungsverfahren (100) nach dem vorangegangenen Anspruch, bei dem in der genannten Identifizierungsphase (130), in der das genannte tragbare Endgerät (20), wenigstens abhängig von den genannten Authentifizierungsdaten, ein zweites Authentifizierungssignal erzeugt und das genannte zweite Authentifizierungssignal mit dem genannten ersten Authentifizierungssignal vergleicht.
 
12. Authentifizierungsverfahren (100) nach dem vorangegangenen Anspruch, das eine Zuordnungsphase (110) umfasst, in der das genannte tragbare Endgerät (30) mit einem zentralen Gerät (40) verbunden ist und das genannte zentrale Gerät (40) ein erstes Authentifizierungssignal erzeugt und dem genannten tragbaren Endgerät die genannten Authentifizierungsdaten zur Verfügung stellt und eine Signalisierungsphase (140), in der das genannte feste Endgerät, wenn das genannte zweite Authentifizierungssignal mit dem genannten ersten Authentifizierungssignal übereinstimmt, dem Bewohner die Anwesenheit der genannten Person mitteilt.
 
13. Authentifizierungsverfahren (100) nach einem oder mehreren der Ansprüche 10-12, bei dem mit dem genannten ersten Signal ein Gültigkeitszeitraum verknüpft ist; wobei das genannte Authentifizierungsverfahren (100) wenigstens eine Überprüfungsphase umfasst, in der das genannte tragbare Endgerät (30) den genannten Gültigkeitszeitraum mit dem Untersuchungszeitraum vergleicht und bei dem, wenn der Untersuchungszeitraum den genannten Gültigkeitszeitraum überschreitet, das erste Öffnungssignal aus dem genannten tragbaren Endgerät (30) gelöscht wird.
 


Revendications

1. Dispositif d'authentification (1) d'une personne qui fait une visite à dom i-cile comprenant un terminal fixe (20) apte à être fixé à proximité d'une entrée (10) dudit domicile ; un terminal mobile (30) apte à être transporté par ladite personne qui fait la visite à proximité de ladite entrée (10), ledit terminal fixe (20) étant apte à être mis en connexion avec ledit terminal mobile (30) identifiant ledit terminal mobile (30), caractérisé en ce que ladite connexion entre ledit terminal mobile (20) et ledit terminal fixe (30) est apte à permettre audit terminal mobile (30) de fournir l'énergie d'activation audit terminal fixe (20).
 
2. Dispositif d'authentification (1) selon la revendication 1, dans lequel ladite connexion entre ledit terminal mobile (20) et ledit terminal fixe (30) est apte à permettre le passage de données entre ledit terminal fixe (30) et ledit terminal mobile (20).
 
3. Dispositif d'authentification (1) selon une ou plusieurs des revendications précédentes, dans lequel ledit terminal fixe (30) et ledit terminal mobile (20) comprennent des premiers moyens de connexion (35, 21) aptes à réaliser ladite connexion et dans lequel lesdits premiers moyens de connexion (35, 21) peuvent être constitués de connecteurs USB.
 
4. Dispositif d'authentification (1) selon une ou plusieurs des revendications précédentes, dans lequel ledit terminal mobile (30) comprend un dispositif de mesure temporel (34) apte à permettre audit terminal mobile (30) de mesurer le temps écoulé.
 
5. Dispositif d'authentification (1) selon une ou plusieurs des revendications précédentes, dans lequel ledit terminal mobile (30) comprend une batterie (32) apte à stocker de l'énergie et à permettre audit terminal mobile (30) d'alimenter ledit terminal fixe (20).
 
6. Dispositif d'authentification (1) selon une ou plusieurs des revendications précédentes, dans lequel ladite entrée (10) comprend un trou traversant (10a) apte à permettre à un résident de voir ladite personne en visite sans mettre en mouvement ladite entrée (10) ; et dans lequel ledit terminal fixe (20) est apte à être logé dans ledit trou traversant (10a).
 
7. Dispositif d'authentification (1) selon la revendication précédente, dans lequel ledit terminal fixe (20) comprend un bloc extérieur (22) et un bloc intérieur (23) aptes à être serrés entre eux au niveau dudit trou traversant (10a) de sorte à être en butée contre ladite entrée (10) à partir de parties opposées par rapport à ladite entrée (10).
 
8. Dispositif d'authentification (1) selon la revendication précédente, dans lequel ledit terminal fixe (20) comprend des deuxièmes moyens de connexion (25) aptes à mettre en connexion de passage de données et de courant ledit bloc extérieur (22) avec ledit bloc intérieur (23).
 
9. Dispositif d'authentification (1) selon une ou plusieurs des revendications précédentes, dans lequel ledit terminal fixe (20) comprend des organes de signalisation (23b) aptes à signaler audit résident la présence de ladite personne en visite.
 
10. Procédé d'authentification (100) d'une personne qui fait une visite à domicile comprenant un terminal fixe (20) fixé à proximité d'une entrée (10) et un terminal mobile (30) apte à être transporté par ladite personne en visite à proximité de ladite entrée (10) ; ledit procédé d'authentification comprenant une phase de connexion (120) dans laquelle ledit terminal mobile (30) est connecté audit terminal fixe (20) caractérisé en ce que lorsque ledit terminal mobile (30) est connecté audit terminal fixe (20), ledit terminal mobile (30) fournit de l'énergie audit terminal fixe (20) déterminant l'activation dudit terminal fixe (20).
 
11. Procédé d'authentification (100) selon la revendication précédente, dans lequel, dans ladite phase d'identification (130), ledit terminal mobile (20) sur la base d'au moins lesdites données d'authentification créé un deuxième signal d'authentification et dans laquelle il compare ledit deuxième signal d'authentification avec ledit premier signal d'authentification.
 
12. Procédé d'authentification(100) selon la revendication précédente, comprenant une phase d'association (110) dans laquelle ledit terminal mobile (30) est connecté à un appareil central (40) et dans laquelle ledit appareil central (40) créé un premier signal d'authentification et fournit audit terminal mobile lesdites données d'authentification incluant ledit premier signal d'authentification ; et une phase de signalisation (140) dans laquelle si ledit deuxième signal d'authentification coïncide avec ledit premier signal d'authentification ledit terminal fixe notifie la présence de ladite personne au résident.
 
13. Procédé d'authentification (100) selon une ou plusieurs des revendications 10-12, dans lequel audit premier signal est associé un temps de validité ; ledit procédé d'authentification (100) comprend au moins une phase de vérification dans laquelle ledit terminal mobile (30) compare ledit temps de validité avec le temps d'examen et dans laquelle si ledit temps d'examen est supérieur audit temps de validité ledit premier signal d'ouverture est supprimé par ledit terminal mobile (30).
 




Drawing











Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description