TECHNICAL FIELD
[0001] The present invention relates to access control, in particular remote control of
access to areas protected by access restriction devices, such as doors or barriers,
wherein the access is activated via a user mobile device.
BACKGROUND
[0002] There are known various solutions to remotely control access restriction devices,
such as door locks or road barrier actuators.
[0003] One solution is to send an activation command directly from a user mobile device
to the access restriction device. A system of this type is disclosed in
US7205908, which describes a system and method for proximity control of a barrier comprising
a stationary wireless signal receiving device and a mobile transmitting device. The
wireless signal receiving device may monitor at least one transmitting device within
a predetermined coverage area and may be a radio frequency receiver or a spread spectrum
receiver located near the barrier. The disadvantage of that solution is that it requires
the user to be registered as an authorized user directly at the access restriction
device.
[0004] Another solution is to send an activation command from a user mobile device to a
remote server that controls the operation of the access restriction device. A system
of this type is disclosed in
US9367978, which describes application software for a mobile device that can provide an owner
or operator of a premises with the ability to remotely grant a guest authorization
to access an access control device on or in the premises. The access control device
can control the operation of the one or more secondary devices, so that with the owner
authorization, the guest can access the access control device to cause an action at
the premises with the secondary device. However, that requires the user mobile device
to handle long-range communication to communicate with the server.
[0005] Therefore, there is a need to improve the access control systems to achieve at least
one of the following technical objectives: ease of use usability, secure access, low
requirements for the user mobile device.
SUMMARY
[0006] The object of the invention is a method for controlling an access restriction device,
the method comprising: monitoring the vicinity of the access restriction device to
detect, via a wireless communication module an access request message from a user
device, the access request message comprising a user ID (identifier); forwarding the
access request message to a backend server; upon receiving an action request from
the backend server, activating an access restriction module to allow access via the
access restriction device.
[0007] The access request message may be encrypted with a public key known to the backend
server.
[0008] The access request message may be encrypted by a user-unique secret value known to
the access control application and the backend server.
[0009] The access request message may further comprise a command to execute a particular
action by the access restriction device.
[0010] The access request message may be broadcast by the user device via a wireless communication
interface.
[0011] The wireless communication interface may be compliant with Bluetooth Low Energy.
[0012] The object of the invention is also a controller for an access restriction device
comprising a processor configured to operate an access verification application for
performing the steps of the method as described herein.
BRIEF DESCRIPTION OF DRAWINGS
[0013] The invention is shown by means of example embodiments on a drawing, wherein:
Fig. 1 shows a structure of modules of the system for access control;
Fig. 2 shows communication between system modules;
Fig. 3 shows example of a database with user access rights;
Fig. 4 shows an example embodiment of the system.
DETAILED DESCRIPTION
[0014] The system comprises three main cooperating components: a user application 110 operated
at a user device 100, an access restriction device 200 and an backend server 300.
[0015] The user device 100 comprises a memory 101 for storing typical software components
such as an operating system of the device, and in particular an access control application
110 and a processor 102 for executing the operating system and the access control
application 110. The device is operable by the user via an input/output interface
103, including a display and an input controller, for example a touch display. The
device further comprises a wireless user communication module 104, preferably a low
energy device, such as a BLE (Bluetooth Low Energy) communication module. The user
device is preferably a mobile device, such as a mobile smartphone, but can be also
a dedicated device e.g. a specialized module connected to an onboard car system, or
even a low-power beacon device that only transmits the access request message.
[0016] The access restriction device 200 may be a lockable door or a road barrier. It a
memory 201 for storing typical software components such as an operating system of
the access restriction device, and in particular an access verification application
210 and a processor 202 for executing the operating system and the access verification
application 210. The device further comprises a wireless user communication module
204, in particular a BLE (Bluetooth Low Energy) communication module, that is able
to communicate with the user communication module 104 of the user device. The user
communication module 204 may have a range of communication adapted to the particular
type of the access restriction device 200, for example the module 204 installed at
office door may have the range of communication limited to 50 cm, while the module
204 installed at a garage door may have the range of communication limited to 10 m.
The access restriction device further comprises a controllable access restriction
module 205 (such as a lock or a barrier actuator) that is operable by the processor.
Furthermore, the device comprises a backend communication module 206 to communicate
with the backend server 300, for example any type of interface allowing access to
the Internet or other type of network via which the backend server 300 is accessible.
[0017] The backend server 300 comprises a memory 301 for storing typical software components
such as an operating system of the backend server, and in particular a user verification
application 310 and a processor 302 for executing the operating system and the user
verification application 310. The server also comprises an access rights database
307 that stores information about users registered in the system and their permissions
to activate particular access restriction devices 200. Furthermore, the server comprises
a backend communication module 306 to communicate with the communication module 206
of the access restriction device 200.
[0018] The system operates as shown in Fig. 2.
[0019] When the user access control application is active, it continuously broadcasts, in
step 11, an access request message, comprising at least a user ID (identifier). Optionally,
the access request message may include other information, such as the requested command
for the access restriction device, in case the device is capable of performing more
than one action (for example, the road barrier control device may be optionally requested
to turn on the light). Preferably, the access request message is encrypted with a
secret user-unique value, as explained later. In case the access restriction device
is a simple bi-state device (such as ON/OFF or OPEN/CLOSED), it is enough to transmit
the user ID, since it is evident that the user intention is to have the access restriction
device to move to an access enablement state (such as ON or OPEN). Since the broadcasting
of the access request message data is performed via a low energy wireless communication
module 204, the power usage performed by this step is relatively low. In order to
avoid the broadcasting at times when it is not necessary, the access control application
may be activated when the user device detects that it is located at a particular area
(based on GPS, WiFi or other localizing module), at a particular time of day, upon
detecting a signal from another module or upon manual activation by the user.
[0020] The access verification application 210 is configured to continuously monitor the
vicinity of the access restriction device 200 in order to detect the access request
messages broadcast by the user devices, via the wireless communication module 204.
When the access request message is detected, the access verification application forwards
the access request message (along with the device identifier (ID) at which the message
was received) to the backend server 300.
[0021] At the backend server 300, the user verification application 310 receives the access
request message, decrypts it (if it was encrypted, in order to check its authenticity,
by checking whether it is decipherable by the security value associated with that
user and/or whether it contains a correct timestamp) and reads the user ID. Next it
checks, in step 13, in the access rights database 307, whether the particular user
has access rights to activate the particular access restriction device 200 (or to
perform a particular action as requested at the access request message). If the user
does not have a permission, no action is taken or a response is sent to the access
verification application that the action is denied. In case the user does have access
rights, an action request (such as to activate the device or to perform the particular
requested action) is sent in step 14 to the access verification application.
[0022] The access request message may be encrypted, for example with a public key of the
backend server and a time stamp corresponding to the time of generating the message
and/or other unique data that allows the message to change, such that the contents
of the message, in particular the user ID, can be read only at the backend server
300. This increases the security of the system, as a malicious third party will not
be able to determine the user ID, even if the broadcast access restriction message
is captured.
[0023] Fig. 3 presents an example of access rights database 307. The access restriction
devices D1, D2, D3 are bistate devices, therefore it is enough to specify whether
the user has permission to access or not. The access restriction device D4 has more
elaborate functionality, such as Open or Lights functions. The user U1 is allowed
to access devices D1, D2 and D4 (with Open and Lights function permissions). The user
U2 is allowed to access devices D2 and D4 (with Open function permission only). The
user U3 is allowed to access device D3 only.
[0024] As an optional feature, the database 307 may comprise a "secret" value unique for
the user that is a symmetrical key used to verify the authenticity of messages sent
by the user application. In that case, the user may send packets containing a User
ID (and preferably a timestamp to effect a change of the message content, so as to
avoid transmitting repeatedly the same message and its re-use by unauthorized entities)
that are encrypted by the secret value S1-S3 that is known to the access control application
at the user device and the backend server.
[0025] Once the action request is received by the access verification application 210, in
step 15 it sends an activation command to the access restriction module 205, such
as to open a door lock or lift a road barrier.
[0026] Fig. 4 shows an example embodiment of operation of a road barrier 200, e.g. a barrier
allowing access to a parking space. A user with a smartphone 100 drives a car and
approaches the parking space. At that time, the smartphone geolocation module recognizes
that the user is in the vicinity of the road barrier to be operated and sends a command
to activate the access control application 110 to broadcast the access request message
in step 11. The access request message is received by the access verification application
210 at the road barrier 200 and forwarded to the backend server 300 in step 12. The
backend server 300 checks whether a user with the user ID contained in the access
request message has permission rights to open that road barrier and if so, sends a
command to open the barrier in step 14. The access verification application 210, upon
receiving the command from the server, activates the road barrier actuator 205 to
open the barrier. The same backend server 300 can also handle access control for other
access restriction barriers D2, D3, D4 located at various other locations.
[0027] The advantage of the system is that it provides safety, ease of use and low resources
to operate. The user device only needs to be capable of broadcasting the access request
message via a low-power wireless communication interface, such as BLE. The user device
does not need to be capable of communicating with the backend server, since the access
request message is forwarded to the server by the access restriction device. The access
restriction application (controller) can be universal and mounted to any kinds of
access restriction devices and does not have to include the database of users, since
the database can be central and provided at the backend server, while the controller
at the access restriction device must be only able to receive messages from users,
forward them to the backend server and respond to instructions received from the server.
The presented method and system therefore provides an alternative solution for controlling
access rights.
1. A method for controlling an access restriction device (200), the method comprising:
- monitoring the vicinity of the access restriction device (200) to detect, via a
wireless communication module (204) an access request message from a user device (100),
the access request message comprising a user ID (identifier);
- forwarding the access request message to a backend server (300);
- upon receiving an action request from the backend server (300), activating an access
restriction module (205) to allow access via the access restriction device (200).
2. The method according to claim 1, wherein the access request message is encrypted
with a public key known to the backend server (300).
3. The method according to claim 1, wherein the access request message is encrypted
by a user-unique secret value (S1-S3) known to the access control application and
the backend server (300).
3. The method according to any of previous claims, wherein the access request message
further comprises a command to execute a particular action by the access restriction
device (200).
4. The method according to any of previous claims, wherein the access request message
is broadcast by the user device (100) via a wireless communication interface (104).
5. The method according to any of previous claims, wherein the wireless communication
interface (104) is compliant with Bluetooth Low Energy (BLE).
6. A controller for an access restriction device (200) comprising a processor (202)
configured to operate an access verification application (210) for performing the
steps of the method of any of previous claims 1-5.