[0001] The present invention relates to an authentication device for a subject paying a
house call or visit, of the type pointed out in the preamble of the first claim.
[0002] In particular, the invention relates to a device that, in case of a visit to an office
or a dwelling, is able to carry out preventive verification and control of the visitor's
identity and therefore enables the resident to grant the visitor access to the office/house
in full security.
[0003] It is known that house calls are necessary for carrying out services of public interest
such as for instance notification of deeds, delivery of registered letters, meter
reading for the different user bases, interventions for extraordinary maintenance.
In addition, house calls are often made by suitable staff that, for commercial purposes,
perform a "door-to-door" activity for selling goods or offering services and promoting
activities.
[0004] For the above reasons, the resident is often obliged to open the door to unknown
visitors whose identity he/she is therefore unable to ascertain, unless he/she bases
himself/herself on that which is declared or shown by the visitor. This lack of knowledge
concerning a visitor is frequently utilised as an expedient by delinquents that, giving
wrong personal particulars, succeed in illegally getting into the resident's houses.
[0005] Very often the victims of these tricks are "weak" persons such as persons living
alone, old people, disabled people or all those categories having low self-defence
and reaction capacity, easily prone to persuasion on the basis if a simple declaration
by the visitor. In particular, for easily verifying the visitor's identity, they are
often brought to instinctively open the door on ringing of the bell thus determining
elimination of the only efficient protection for their defence.
[0006] In order to solve this problem many front doors have been provided with a peephole,
i.e. a through hole adapted to enable the resident to see the visitor and therefore
carry out a first evaluation of same.
[0007] This solution however is weakly reliable because it can be easily overcome by the
delinquent who may wear a uniform or show previously prepared visiting cards or a
badge.
[0008] In order to solve this problem, the institutions have made available specific freephone
numbers against fraud that are directly coordinated by the police and enable control
of the identity by a telephone call to these numbers. Unfortunately, this operation
is often neglected by the resident who, due to inattention, lack of information, laziness,
confidence, opens the door and enables access to the house without any certification.
[0009] Therefore, taking into account the importance of a correct identification of the
visitor, many apparatus have been developed that utilising videocameras, microphones
or other similar means allow opening of the door by the resident only after the visitor
has been recognised.
[0010] A first example is described in patent
US2003086186A1 in which a videocamera is used for catching the visitor and a display enabling the
resident to obtain a convenient and quick image of the visitor.
[0012] In this document, arrangement of a particular fixed terminal is provided which is
placed at the front door and is equipped with a database containing the visitors'
data and with an identification system made up of keyboard and microphone.
[0013] According to the provided authentication process, the visitor types in his/her identification
code on the keyboard, speaks on the microphone and the device opens the door and allows
access only if the visitor's voice is substantially coincident with that stored in
the database in correspondence with the previously inputted code.
[0014] In other authentication apparatus, in addition to use of the aforesaid fixed terminal,
adoption of a mobile terminal is provided, for example a mobile phone, in possession
of the visitor.
[0015] A first example of these authentication apparatus is described in patent
US2007085662A1 disclosing a fixed terminal, i.e. the terminal placed at the door, comprising a videocamera,
a database and a screen.
[0016] According to the authentication procedure described in this patent, when the visitor
comes close to the front door, he/she must send, through the mobile terminal, a code
to the fixed terminal that retrieves in the database, a first image corresponding
to the code it has received, records a second image of the visitor through the videocamera
and then shows the two images to the resident who decides on opening the door or not.
[0017] Further examples of these authentication apparatus are disclosed in patent
US2005060555A1 and in document "Personal Servers as Digital Keys" by Allan Beaufour.
[0018] In this case, when the visitor comes to the front door, the fixed terminal sends
an encrypted signal to the mobile terminal that, based thereon, creates a second signal
which, in turn, is sent to the fixed signal that will verify whether it is correct
and will grant access to the visitor.
[0019] The above described known art has some important drawbacks.
[0020] A first important fault resides in the complexity of known authentication apparatus.
In particular, this fault can be found in the fixed terminals placed at the front
door which, being provided with a complex identification system, are both very complicated
in manufacture and very expensive.
[0021] Another problem is represented by the fact that fixed devices, due to their complexity,
are of difficult assembly at the front door.
[0022] In particular, due to the above described identification means, the fixed terminal
is particularly bulky and therefore of difficult installation. This problem is further
increased by the presence of powering means consisting of a battery and/or electric
cables electrically feeding the fixed terminal by connecting it to the mains.
[0023] A further problem consists in the high installation cost of known authentication
apparatus because, due to the bulkiness of same and the required connections for operation,
they are not suitable for the front door presently in use and therefore replacement
of these doors is required.
[0024] Another important problem resulting from the complexity of the authentication device
is represented by the poor reliability of same and the reduced lifetime. Under this
situation, the technical task underlying the present invention is to conceive an authentication
device of a subject paying a house call capable of substantially obviating the mentioned
drawbacks.
[0025] Within the scope of this technical task, it is an important aim of the invention
to provide an authentication device of simple manufacture and reduced costs. Another
important aim of the invention consists in obtaining an authentication device of easy
installation.
[0026] A further aim of the invention is to make available an authentication device that
is adapted for the presently used front doors, i.e. without being obliged to replace
them.
[0027] Also an important result of the invention is the achievement of an authentication
device characterised by high reliability that practically does not require servicing.
[0028] The technical task mentioned and the aims specified are achieved by an authentication
device of a subject paying a house call as claimed in the appended Claim 1.
[0029] Preferred embodiments are highlighted in the sub-claims.
[0030] The features and advantages of the invention are hereinafter clarified by the detailed
description of a preferred embodiment of the invention, with reference to the accompanying
drawings, in which:
Fig. 1 as a whole shows an authentication device of a subject paying a house call in accordance
with the invention;
Fig. 2 shows a component of the authentication device disposed at an entrance; and
Fig. 3 highlights, through a block diagram, an authentication process utilising the authentication
device.
[0031] With reference to the drawings, the authentication device of a subject making a house
call in accordance with the invention is generally identified by reference numeral
1.
[0032] It is adapted to be used for verifying the identity of a subject making a house call
in a building, flat or office. Device 1 can therefore be positioned at an entrance
10 such as a door or gate or other similar element and is adapted to prevent access
to the house without the resident's consent.
[0033] The authentication device 1 fundamentally comprises a fixed terminal
20 adapted to be connected in the vicinity of an entrance 10 and a mobile terminal
30 adapted to be carried by the coming subject and to be brought into connection with
the fixed terminal 20.
[0034] The mobile terminal 30, shown in Fig. 1, consists of an electronic device comprising
a storage component
31 adapted to store information such as alphanumeric codes for example, a battery
32, preferably of the rechargeable type, or other powering systems adapted to enable
energy supply to at least said storage component 31. The mobile terminal 30 therefore
may selectively consist of a mobile phone, a USB (Universal Serial Bus) key suitably
provided with a battery 32 or other similar device. Preferably, the mobile terminal
30 is a USB key comprising a battery 32.
[0035] The mobile terminal 30 can be further provided with a recognition apparatus
33 adapted to enable use of the mobile terminal 30 exclusively by authorised subjects
and a time meter
34 adapted to measure elapsing of time and to enable the mobile terminal 30 to know,
date and time, instant by instant, i.e. the elapsed time from creation of the first
signal.
[0036] The time meter 34 can consist of a clock/watch or other similar device adapted to
enable the mobile terminal 30 to know date and time, at each instant. Alternatively,
it may consist of a decreasing counter, a timer for example that, as better clarified
in the following, enables the residual lifetime of the data stored in the mobile terminal
30 to be quantified.
[0037] The recognition apparatus 33 can consist, if it is a mobile phone, of a keypad adapted
to enable introduction of a PIN (Personal Identification Number) or, if it is a USB
key, of a fingerprint reader or other similar apparatus adapted to identify the subject
using the mobile terminal 30.
[0038] In order to enable the coming subject to mutually connect the two terminals 20 and
30, as hereinafter clearly described, the mobile terminal 30 and fixed terminal 20
comprise first connecting means
35 and
21 respectively, that is adapted to carry out connection.
[0039] Said first means 35 and 21 is suitable to make a connection capable of allowing at
least passage of current between the two terminals 20 and 30 so as to enable the mobile
terminal 30 to supply the fixed terminal 20 with the activation energy, i.e. the energy
adapted to enable the fixed terminal 20 to be activated and carry out the authentication
process described below.
[0040] In addition, the first connecting means 35 and 21 creates a data passage connection
between the mobile terminal 30 and fixed terminal 20 so as to enable the mobile terminal
30 to provide the fixed terminal 20 with data necessary for authentication of the
coming subject.
[0041] The first connecting means 35 and 21 therefore may consist of USB (Universal Serial
Bus) connectors or other similar means adapted to allow both passage of current and
passage of data between terminals 20 and 30.
[0042] In particular, in some cases, to facilitate connection between the two terminals
20 and 30, device 1 can have a further connecting means such as a cable having two
USB connectors at the ends so as to be connected to the first means 35 and 21, and
therefore being operatively interposed between terminals 20 and 30.
[0043] The fixed terminal 20 is fastened in the vicinity of entrance 10, for example to
a wall portion close to said entrance, and preferably terminal 20 is secured to the
entrance itself. More preferably, the fixed terminal 20 is housed in the through hole
10a present in the entrance 10 that is usually employed as a peephole.
[0044] In order to enable the fixed terminal 20 to be housed in the through hole 10a, the
fixed terminal 20, as shown in Fig. 1, comprises an outer block
22, facing the outside of the house and an inner block
23 facing the inside of the house, which blocks have a portion of smaller section adapted
to be inserted in the through hole 20a, and a portion of bigger section adapted to
abut against the entrance 10.
[0045] In addition, the fixed terminal 20 has tightening means
24 adapted to mutually fasten blocks 22 and 23 at the through hole 10a bringing them
into abutment with the entrance 10 on opposite sides relative to said entrance. In
particular, the tightening means 24 consists of screws, threaded couplings, friction
fits or other similar elements adapted to mutually fasten blocks 22 and 23 varying
their distance and therefore the length of the fixed terminal 20 so as to make the
sizes of the fixed terminal 20 suit the thickness of said entrance 10. Preferably,
the tightening means 24 is positioned in such a manner that said means is operable
for assembling or disassembling the two blocks 22 and 23 exclusively from the inside
of their housing seat. Therefore said means 24, if screws for example, have their
head at the inner block 23, as shown in Fig. 2. The outer block is adapted to be connected
to the mobile terminal 30 and therefore has said connecting means 21 such arranged
that it can be brought into connection for data and power passage with the mobile
terminal 30.
[0046] The inner block 23 is adapted to perform the authentication process and therefore
it comprises a card
23a adapted to process the information of the mobile terminal 30 so as to perform authentication
of the coming subject, and signalling members
23b adapted to signal the presence of the coming subject and the occurred authentication
to the resident.
[0047] The signalling members 23b is adapted to carry out signalling of the presence of
an authenticated coming subject through emission of a suitable acoustic and/or visual
signal. Therefore they can comprise a loud-speaker adapted to reproduce a message
or a sound and/or LEDs or other similar means adapted to emit a light signal.
[0048] To enable the card 23a to have the necessary power and data for carrying out authentication
of the coming subject, the card 23a and therefore the inner block 23 are brought into
connection for data and power passage with the outer block 22 and therefore the mobile
terminal 30.
[0049] To this aim the fixed terminal 20 comprises second connecting means
25 adapted to carry out such a connection between the two blocks 22 and 23. Preferably,
the second connecting means 25 consists of sliding/revolving contacts or other similar
means adapted to carry out an electric connection between two components, i.e. blocks
22 and 23, irrespective of their mutual position.
[0050] In particular, the second connecting means 25 consists of sliding contacts and, more
particularly linear sliding contacts adapted to connect the two blocks 22 and 23,
irrespective of the sizes of the fixed terminal 20. The second connecting means 25
therefore consists of plates that, when the two blocks 22 and 23 are joined, comes
mutually into contact and consequently carry out connection between the two blocks
22 and 23.
[0051] The second connecting means 25 is preferably made of gold or other material that
does not oxidise when in contact with air.
[0052] Finally, in order to enable the resident to see the coming subject before opening
the door, blocks 22 and 23 are provided with inner recesses that, when tightening
is carried out, comes into mutual alignment so as to define an inner hole
20a substantially coaxial with the through hole 10a, through which the resident can visually
identify the coming subject.
[0053] In particular, the fixed terminal 20 can comprise at least one lens
20b disposed in register with the inner hole 20a and adapted to improve the quality and
width of the field of vision through said through hole. Preferably, lens 20b consists
of a wide-angle lens capable of widening the field of vision of the resident and is
fastened to the outer block 22.
[0054] The authentication device 1 is finally associable with a central server
40 comprising a database including the identification codes of all houses/offices, provided
with a fixed terminal 20, the identification codes of the subjects/companies provided
with a fixed terminal 20, and the history of all visits paid. In the database of the
central server 40 also the identification codes of the coming subjects are present,
i.e. the codes enabling the mobile terminal 30 to identify the coming subject through
the recognition apparatus 33.
[0055] It is adapted to generate the first authentication signal and therefore supply the
mobile terminal 30 with the necessary data for authentication. Therefore the central
server 40 can consist of a computer or other similar device adapted to be connected
to the mobile terminal 30 through the connecting means 35, for example.
[0056] Alternatively, if terminal 30 is a mobile phone, this connection can be a Bluetooth
connection or other wireless connection typical of a mobile phone.
[0057] The invention comprises a new authentication process 100 for identifying a subject
making a house call.
[0058] In this process, provision is made for a hashing calculation in combination with
a shared secret consisting of the calculation algorithm and of elements that are fully
known by the central server 40, while they are only partly known by the fixed terminal
20. In detail, as hereinafter better described, the fixed terminal 20, receiving the
missing data in a plain form through the mobile terminal 30, is able to calculate
an authentication signal of its own in an autonomous manner. If this signal is fully
coincident with the signal stored by the central server 40 on the mobile terminal
30, the fixed terminal certifies the identity of the coming subject asking for entry.
[0059] Alternatively, process 100 is based on an asymmetric scheme cryptography, i.e. a
cryptography in which the key used for encrypting the information differs from the
key used for decrypting the information.
[0060] It should be pointed out that in both the aforesaid cases the mobile terminal 30
only carries out a function of making server 40 and fixed terminal 20 communicate
with each other but it does not implement any information decrypting procedure.
[0061] The authentication process 100, diagrammatically shown in Fig. 3, contemplates an
association step
110 in which the coming subject is associated with a first authentication signal; a connection
step
120 in which the two terminals are mutually connected; an authentication step
130 in which the identity of the coming subject is ascertained; and a signalling step
140 in which the presence of the coming subject is signalled.
[0062] In the association step 110 the coming subject before coming to the house, connects
the mobile terminal 30 to the central apparatus 40 to which, in order to obtain the
first authentication signal, communicates the house he/she wishes to visit, the date
and time of the visit and, more specifically, the date and time band in which the
visit is foreseen.
[0063] The central apparatus 40 retrieves the identification codes corresponding to the
residence that is wished to be visited and to the mobile terminal 30 connected thereto
and processes the first authentication signal. In particular, this first authentication
signal substantially consists of an alphanumeric code suitably processed by apparatus
40 as a function of the theoretical visit date and time, identification code of the
residence, identification code of the coming subject.
[0064] After the first authentication signal has been obtained, the central apparatus 40
combines some information in plain form to this first signal, which information as
better described hereinafter will help in providing part of the information to the
fixed terminal 20 in such a manner as to enable it to calculate the second authentication
signal in an autonomous manner.
[0065] The central server 40 stores on the storage component 31, the first authentication
signal, theoretical date and time of the visit, comprising the validity time of the
first signal, that together with the identification code of the mobile terminal 30
already present on the storage element 31, constitute the data required for authentication.
[0066] In addition, during the association step 110, the coming subject can ask for several
first authentication signals in order to program a series of visits to different residents
and therefore different fixed terminals 20, to be made at different dates and times.
[0067] In particular, in this case the central apparatus 40 creates different first authentication
signals using, for each first signal, the identifier associated with the given fixed
terminal 20 of the residence to which access is wished using that particular first
identification code.
[0068] At this point the association step 110 is terminated and the connection step 120
begins.
[0069] Once the coming subject has reached the entrance 10 he/she, through the recognition
apparatus 33, activates the mobile terminal 30 that is therefore ready to be brought
into connection with the fixed terminal 20 through the first connecting means 21 and
35.
[0070] This connection enables current and data passage between the mobile terminal 30 and
fixed terminal 20. In particular, due to this connection, the fixed terminal 20 receives
the energy necessary for its activation and the energy necessary for performing authentication
of the coming subject from battery 32. The fixed terminal 20, through the previously
made connection, receives the energy necessary to its activation, retrieves the data
for authentication from the mobile terminal 30 and starts processing these data.
[0071] In particular, the fixed terminal 20 identifies among all data saved on the storage
component 31, the data corresponding to the unique first signal that can be coded
through the unique identifier belonging to the same fixed terminal.
[0072] After retrieval of the first authentication signal, of the identification code of
the fixed terminal 20 as well as of the theoretical date and time of the visit, it
calculates the second authentication signal in an autonomous manner, based both on
the aforesaid data, and on data the terminal itself possesses.
[0073] In particular, it processes a second authentication signal, based on its identification
code suitably stored on the fixed terminal 20 when installed, on the identification
code of the mobile terminal 30 and on the theoretical date and time of the visit.
[0074] At this point, the fixed terminal 20 compares the first authentication signal obtained
by the central server 40, with the second authentication signal obtained by the fixed
terminal 20. At this point, if the two signals differ, the authentication gives a
negative result and therefore the coming subject is not allowed to enter the residence.
On the contrary, if the two signals are coincident, the authentication gives a positive
result and therefore the coming subject is allowed to enter the residence.
[0075] In particular, the result of the comparison between the two signals is preferably
stored on both terminals 20 and 30 and, in addition, the first authentication signal
and the different data connected thereto are preferably deleted.
[0076] Should the comparison result be positive, the authentication process 100 contemplates
the signalling step 140.
[0077] In this step 140, the fixed terminal 20, by utilising the signalling members 23b,
announces the presence of the coming subject to the resident who, through the second
through hole 20a, can carry out a further visual control on the coming subject or,
alternatively, directly grant access to the subject through the entrance 10.
[0078] Once all visits have been completed, the authentication process 100 terminates with
a closing step
150 in which the coming subject connects the mobile terminal 30 to the central server
40 and updates the history of the visits he/she has made storing the outcomes of said
visits on server 40.
[0079] In addition, the authentication process 100 may comprise one or more verification
steps that can take place at any moment after the association step 110 and before
the closing step 150.
[0080] In detail, in the verification step one of terminals 20 or 30, preferably the mobile
terminal 30, analyses the validity of the first authentication signal comparing theoretical
date and time of the visit, corresponding to the first signals stored thereon, with
the examination time, i.e. the time that when the verification step is carried out,
has elapsed from creation and storage of the first signal, which time is measured
through the time meter 34. In particular, in this step the mobile terminal 30 obtains
the examination time from the time meter 34, i.e. the elapsed time from storage of
the first signal on the mobile terminal 30, and compares said examination time with
the validity time included in the theoretical date and time of the visit, i.e. the
theoretical duration associated with the first signal from server 40. If the validity
time of a first signal is lower than the examination time, the mobile terminal 30
deletes the first authentication signal and the data connected thereto.
[0081] The invention enables important advantages to be achieved.
[0082] A first advantage is represented by the high security degree ensured by the authentication
device 1 and the authentication process 100. This security resides in the high complexity
and therefore decrypting difficulty of the different authentication signals making
it almost impossible to tamper with device 1 or process 100.
[0083] This impossibility of the data being tampered with is ensured by use of very complicated
cryptographic algorithms making it very difficult to identify the residence corresponding
to a first authentication signal and therefore to use said first signal in a fraudulent
manner.
[0084] The high security of device 1 is also ensured by the fact that card 23a, i.e. the
component carrying out analysis of the signals, is housed in the inner block 23 and
therefore can be hardly tampered with.
[0085] A further advantage is ensured by the fact that the first authentication signals,
due to accomplishment of the verification procedure, have a time limit and therefore
can be exclusively used during a given time gap.
[0086] In conclusion, due to the limited time duration of the first authentication signals
and the difficulty in associating a given residence to one of said first signals,
use of device 1 is impossible for an unauthorised person. This impossibility is further
ensured by the recognition apparatus 33 according to which use of the fixed terminal
30 is made possible to the authorised coming subject alone. Another advantage is represented
by the fact that, unlike presently known authentication devices, device 1 can be easily
incorporated into the doors presently in use without modifications being required.
This advantage is given by the possibility of arranging the fixed terminal inside
a housing normally present in a door or an entrance, i.e. the through hole 10a.
[0087] In addition, since powering of the fixed terminal 20 is given by the mobile terminal
30 alone, the presence of batteries, cables or other similar elements is avoided,
which elements would increase the sizes of the fixed terminal 20 and make installation
of same much more complicated.
[0088] A further advantage resides in that device 1 and process 100 do not grant access
to the residence but merely prove the truth and reliability of the coming subject
while the choice of opening or not is left to the resident.
[0089] Another important advantage is represented by the presence of a history of all visits
enabling identification, at any moment, of the person who has made the visit to a
given residence at a given time.
[0090] Another achieved goal is represented by the low cost of terminals 20 and 30. In fact,
the calculation complexity has been advantageously gathered on the central server
40 and therefore the fixed terminal 20 and mobile terminal 30 only need cheap and
simple electronic components.
[0091] Also to be noted is the absence of operations by the resident who, in fact, must
merely wait for a visual/acoustic signal emitted by the signalling members 23b.
[0092] An important goal is finally represented by the full absence of maintenance for the
fixed terminal 20 because the routine maintenance for loading the authentication signals
and recharging the powering battery is concentrated in the user base of the mobile
terminal 30.
1. An authentication device (1) of a subject making a house call comprising a fixed terminal
(20) adapted to be fastened in the vicinity of an entrance (10) of said house; a mobile
terminal (30) adapted to be carried by said subject making a house call in the vicinity
of said entrance (10), said fixed terminal (20) being adapted to be brought into connection
with said mobile terminal (30) identifying said mobile terminal (30), characterised in that said connection between said mobile terminal (20) and fixed terminal (30) is adapted
to enable said mobile terminal (30) to supply said fixed terminal (20) with activation
energy.
2. An authentication device (1) as claimed in claim 1, wherein said connection between
said mobile terminal (20) and fixed terminal (30) is adapted to enable passage of
data between said fixed terminal (30) and mobile terminal (20).
3. An authentication device (1) as claimed in one or more of the preceding claims, wherein
said fixed terminal (30) and mobile terminal (20) comprise first connecting means
(35, 21) adapted to carry out said connection, and wherein said first connecting means
(35, 21) consists of USB connectors.
4. An authentication device (1) as claimed in one or more of the preceding claims, wherein
said mobile terminal (30) comprises a time meter (34) adapted to enable said mobile
terminal (30) to measure the elapsed time.
5. An authentication device (1) as claimed in one or more of the preceding claims, wherein
said mobile terminal (30) comprises a battery (32) adapted to store energy and to
enable said mobile terminal (30) to power said fixed terminal (20).
6. An authentication device (1) as claimed in one or more of the preceding claims, wherein
said entrance (10) comprises a through hole (10a) adapted to enable a resident to
see said coming subject without moving said entrance (10); and wherein said fixed
terminal (20) is adapted to be housed in said through hole (10a).
7. An authentication device (1) as claimed in the preceding claim, wherein said fixed
terminal (20) comprises an outer block (22) and an inner block (23) adapted to be
tightened together at said through hole (10a) so as to abut against said entrance
(10) on opposite sides relative to said entrance (10).
8. An authentication device (1) as claimed in the preceding claim, wherein said fixed
terminal (20) comprises second connecting means (25) adapted to bring said outer block
(22) into connection for data and current passage with said inner block (23).
9. An authentication device (1) as claimed in one or more of the preceding claims, wherein
said fixed terminal (20) comprises signalling members (23b) adapted to signal the
presence of said coming subject to said resident.
10. An authentication process (100) of a subject making a house call, comprising a fixed
terminal (20) fastened in the vicinity of an entrance (10) and a mobile terminal (30)
adapted to be carried by said subject making a house call in the vicinity of said
entrance (10), said authentication process comprising a connection step (120) in which
said mobile terminal (30) is connected to said fixed terminal (20), characterised in that when said mobile terminal (30) is connected to said fixed terminal (20), said mobile
terminal (30) supplies said fixed terminal (20) with energy causing activation of
said fixed terminal (20).
11. An authentication process (100) as claimed in the preceding claim, wherein in said
identification step (130) said mobile terminal (20), based on at least said authentication
data, creates a second authentication signal, and wherein it compares said second
authentication signal with said first authentication signal.
12. An authentication process (100) as claimed in the preceding claim, comprising an association
step (110) in which said mobile terminal (30) is connected to a central apparatus
(40) and wherein said central apparatus (40) creates a first authentication signal
and supplies said mobile terminal with said authentication data including said first
authentication signal; and a signalling step (140) in which, if said second authentication
signal is coincident with said first authentication signal, said fixed terminal gives
notice of the presence of said subject to the resident.
13. An authentication process (100) as claimed in one or more of claims 10-12, wherein
associated with said first signal is a validity time; said authentication process
(100) comprising at least one verification step in which said mobile terminal (30)
compares said validity time with the examination time and wherein if the examination
time is higher than said validity time, said first opening signal is deleted from
said mobile terminal (30).
1. Authentifizierungsvorrichtung (1) einer einen Hausbesuch tätigenden Person, die Folgendes
umfasst: ein festes Endgerät (20), das geeignet ist, in der Nähe eines Eingangs (10)
des genannten Hauses angebracht zu werden; ein tragbares Endgerät (30), das geeignet
ist, von der genannten, den Hausbesuch tätigenden Person in die Nähe des genannten
Eingangs (10) gebracht zu werden, wobei das genannte feste Endgerät (20) geeignet
ist, mit dem genannten tragbaren Endgerät (30) verbunden zu werden und dabei das genannte
tragbare Endgerät (30) zu identifizieren, dadurch gekennzeichnet, dass die genannte Verbindung zwischen dem genannten tragbaren Endgerät (20) und dem genannten
festen Endgerät (30) geeignet ist, es dem genannten tragbaren Endgerät (30) zu gestatten,
dem genannten festen Endgerät (20) Aktivierungsenergie zur Verfügung zu stellen.
2. Authentifizierungsvorrichtung (1) nach Anspruch 1, bei der die genannte Verbindung
zwischen dem genannten tragbaren Endgerät (20) und dem genannten festen Endgerät (30)
geeignet ist, die Datenübertragung zwischen dem genannten festen Endgerät (30) und
dem genannten tragbaren Endgerät (20) zu gestatten.
3. Authentifizierungsvorrichtung (1) nach einem oder mehreren der vorangegangenen Ansprüche,
bei dem das genannte feste Endgerät (30) und das genannte tragbare Endgerät (20) erste
Verbindungsmittel (35, 21) umfassen, die geeignet sind, die genannte Verbindung herzustellen
und bei denen die genannten ersten Verbindungsmittel (35, 21) aus USB-Verbindern bestehen
können.
4. Authentifizierungsvorrichtung (1) nach einem oder mehreren der vorangegangenen Ansprüche,
bei dem das genannte tragbare Endgerät (30) einen Zeitmesser (34) umfasst, der geeignet
ist, es dem genannten tragbaren Endgerät (30) zu gestatten, die verstrichene Zeit
zu messen.
5. Authentifizierungsvorrichtung (1) nach einem oder mehreren der vorangegangenen Ansprüche,
bei dem das genannte tragbare Endgerät (30) eine Batterie (32) umfasst, die geeignet
ist, Energie zu speichern und es dem genannten tragbaren Endgerät (30) zu gestatten,
das genannte feste Endgerät (20) zu versorgen.
6. Authentifizierungsvorrichtung (1) nach einem oder mehreren der vorangegangenen Ansprüche,
bei dem der genannte Eingang (10) eine durchgehende Öffnung (10a) umfasst, die geeignet
ist, es einem Bewohner zu gestatten, die genannte, einen Hausbesuch tätigende Person
zu sehen, ohne den genannten Eingang (10) zu bewegen und bei der das genannte feste
Endgerät (20) geeignet ist, in der genannten durchgehenden Öffnung (10a) untergebracht
zu werden.
7. Authentifizierungsvorrichtung (1) nach dem vorangegangenen Anspruch, bei dem das genannte
feste Endgerät (20) eine äußere (22) und eine innere Sperre (23) umfasst, die geeignet
sind, miteinander auf der genannten durchgehenden Öffnung (10a) zusammengepresst zu
werden, um mit dem genannten Eingang (10) von im Verhältnis zu dem genannten Eingang
(10) gegenüber liegenden Seiten anzuschlagen.
8. Authentifizierungsvorrichtung (1) nach dem vorangegangenen Anspruch, bei dem das genannte
feste Endgerät (20) zweite Verbindungsmittel (25) umfasst, die geeignet sind, die
Datenübertragung und die Stromversorgung der genannten äußeren (22) zu der genannten
inneren Sperre (23) in Verbindung zu bringen.
9. Authentifizierungsvorrichtung (1) nach einem oder mehreren der vorangegangenen Ansprüche,
bei dem das genannte feste Endgerät (20) Signalorgane (23b) umfasst, die geeignet
sind, dem genannten Bewohner die Anwesenheit der den Hausbesuch tätigenden Person
anzuzeigen.
10. Authentifizierungsverfahren (100) einer einen Hausbesuch tätigenden Person, die ein
festes, in der Nähe eines Eingangs (10) angebrachtes Endgerät (20) und ein tragbares
Endgerät (30) umfasst, das geeignet ist, von der genannten, den Hausbesuch tätigenden
Person in die Nähe des genannten Eingangs (10) gebracht zu werden, wobei das genannte
Authentifizierungsverfahren (100) eine Verbindungsphase (120) umfasst, in der das
genannte tragbare Endgerät (30) mit dem genannten festen Endgerät (20) verbunden ist,
dadurch gekennzeichnet, dass, wenn das genannte tragbare Endgerät (30) mit dem genannten festen Endgerät (20)
verbunden ist, das genannte tragbare Endgerät (30) dem genannten festen Endgerät (20)
Energie zur Verfügung stellt und so zur Aktivierung des genannten festen Endgeräts
(20) führt.
11. Authentifizierungsverfahren (100) nach dem vorangegangenen Anspruch, bei dem in der
genannten Identifizierungsphase (130), in der das genannte tragbare Endgerät (20),
wenigstens abhängig von den genannten Authentifizierungsdaten, ein zweites Authentifizierungssignal
erzeugt und das genannte zweite Authentifizierungssignal mit dem genannten ersten
Authentifizierungssignal vergleicht.
12. Authentifizierungsverfahren (100) nach dem vorangegangenen Anspruch, das eine Zuordnungsphase
(110) umfasst, in der das genannte tragbare Endgerät (30) mit einem zentralen Gerät
(40) verbunden ist und das genannte zentrale Gerät (40) ein erstes Authentifizierungssignal
erzeugt und dem genannten tragbaren Endgerät die genannten Authentifizierungsdaten
zur Verfügung stellt und eine Signalisierungsphase (140), in der das genannte feste
Endgerät, wenn das genannte zweite Authentifizierungssignal mit dem genannten ersten
Authentifizierungssignal übereinstimmt, dem Bewohner die Anwesenheit der genannten
Person mitteilt.
13. Authentifizierungsverfahren (100) nach einem oder mehreren der Ansprüche 10-12, bei
dem mit dem genannten ersten Signal ein Gültigkeitszeitraum verknüpft ist; wobei das
genannte Authentifizierungsverfahren (100) wenigstens eine Überprüfungsphase umfasst,
in der das genannte tragbare Endgerät (30) den genannten Gültigkeitszeitraum mit dem
Untersuchungszeitraum vergleicht und bei dem, wenn der Untersuchungszeitraum den genannten
Gültigkeitszeitraum überschreitet, das erste Öffnungssignal aus dem genannten tragbaren
Endgerät (30) gelöscht wird.
1. Dispositif d'authentification (1) d'une personne qui fait une visite à dom i-cile
comprenant un terminal fixe (20) apte à être fixé à proximité d'une entrée (10) dudit
domicile ; un terminal mobile (30) apte à être transporté par ladite personne qui
fait la visite à proximité de ladite entrée (10), ledit terminal fixe (20) étant apte
à être mis en connexion avec ledit terminal mobile (30) identifiant ledit terminal
mobile (30), caractérisé en ce que ladite connexion entre ledit terminal mobile (20) et ledit terminal fixe (30) est
apte à permettre audit terminal mobile (30) de fournir l'énergie d'activation audit
terminal fixe (20).
2. Dispositif d'authentification (1) selon la revendication 1, dans lequel ladite connexion
entre ledit terminal mobile (20) et ledit terminal fixe (30) est apte à permettre
le passage de données entre ledit terminal fixe (30) et ledit terminal mobile (20).
3. Dispositif d'authentification (1) selon une ou plusieurs des revendications précédentes,
dans lequel ledit terminal fixe (30) et ledit terminal mobile (20) comprennent des
premiers moyens de connexion (35, 21) aptes à réaliser ladite connexion et dans lequel
lesdits premiers moyens de connexion (35, 21) peuvent être constitués de connecteurs
USB.
4. Dispositif d'authentification (1) selon une ou plusieurs des revendications précédentes,
dans lequel ledit terminal mobile (30) comprend un dispositif de mesure temporel (34)
apte à permettre audit terminal mobile (30) de mesurer le temps écoulé.
5. Dispositif d'authentification (1) selon une ou plusieurs des revendications précédentes,
dans lequel ledit terminal mobile (30) comprend une batterie (32) apte à stocker de
l'énergie et à permettre audit terminal mobile (30) d'alimenter ledit terminal fixe
(20).
6. Dispositif d'authentification (1) selon une ou plusieurs des revendications précédentes,
dans lequel ladite entrée (10) comprend un trou traversant (10a) apte à permettre
à un résident de voir ladite personne en visite sans mettre en mouvement ladite entrée
(10) ; et dans lequel ledit terminal fixe (20) est apte à être logé dans ledit trou
traversant (10a).
7. Dispositif d'authentification (1) selon la revendication précédente, dans lequel ledit
terminal fixe (20) comprend un bloc extérieur (22) et un bloc intérieur (23) aptes
à être serrés entre eux au niveau dudit trou traversant (10a) de sorte à être en butée
contre ladite entrée (10) à partir de parties opposées par rapport à ladite entrée
(10).
8. Dispositif d'authentification (1) selon la revendication précédente, dans lequel ledit
terminal fixe (20) comprend des deuxièmes moyens de connexion (25) aptes à mettre
en connexion de passage de données et de courant ledit bloc extérieur (22) avec ledit
bloc intérieur (23).
9. Dispositif d'authentification (1) selon une ou plusieurs des revendications précédentes,
dans lequel ledit terminal fixe (20) comprend des organes de signalisation (23b) aptes
à signaler audit résident la présence de ladite personne en visite.
10. Procédé d'authentification (100) d'une personne qui fait une visite à domicile comprenant
un terminal fixe (20) fixé à proximité d'une entrée (10) et un terminal mobile (30)
apte à être transporté par ladite personne en visite à proximité de ladite entrée
(10) ; ledit procédé d'authentification comprenant une phase de connexion (120) dans
laquelle ledit terminal mobile (30) est connecté audit terminal fixe (20) caractérisé en ce que lorsque ledit terminal mobile (30) est connecté audit terminal fixe (20), ledit terminal
mobile (30) fournit de l'énergie audit terminal fixe (20) déterminant l'activation
dudit terminal fixe (20).
11. Procédé d'authentification (100) selon la revendication précédente, dans lequel, dans
ladite phase d'identification (130), ledit terminal mobile (20) sur la base d'au moins
lesdites données d'authentification créé un deuxième signal d'authentification et
dans laquelle il compare ledit deuxième signal d'authentification avec ledit premier
signal d'authentification.
12. Procédé d'authentification(100) selon la revendication précédente, comprenant une
phase d'association (110) dans laquelle ledit terminal mobile (30) est connecté à
un appareil central (40) et dans laquelle ledit appareil central (40) créé un premier
signal d'authentification et fournit audit terminal mobile lesdites données d'authentification
incluant ledit premier signal d'authentification ; et une phase de signalisation (140)
dans laquelle si ledit deuxième signal d'authentification coïncide avec ledit premier
signal d'authentification ledit terminal fixe notifie la présence de ladite personne
au résident.
13. Procédé d'authentification (100) selon une ou plusieurs des revendications 10-12,
dans lequel audit premier signal est associé un temps de validité ; ledit procédé
d'authentification (100) comprend au moins une phase de vérification dans laquelle
ledit terminal mobile (30) compare ledit temps de validité avec le temps d'examen
et dans laquelle si ledit temps d'examen est supérieur audit temps de validité ledit
premier signal d'ouverture est supprimé par ledit terminal mobile (30).