(19)
(11) EP 4 181 094 A1

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
17.05.2023 Bulletin 2023/20

(21) Application number: 21207733.3

(22) Date of filing: 11.11.2021
(51) International Patent Classification (IPC): 
G07C 9/00(2020.01)
G07C 9/28(2020.01)
(52) Cooperative Patent Classification (CPC):
G07C 9/28; G07C 9/00309; G07C 2209/63
(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME
Designated Validation States:
KH MA MD TN

(71) Applicant: dormakaba Schweiz AG
8623 Wetzikon (CH)

(72) Inventors:
  • Saken, Dieter
    8620 Kempten (CH)
  • Meier, Tom
    8620 Kempten (CH)
  • Wolf, Martin
    8620 Kempten (CH)
  • Schmidt, Andreas
    8620 Kempten (CH)

(74) Representative: Balder IP Law, S.L. 
Paseo de la Castellana 93 5ยช planta
28046 Madrid
28046 Madrid (ES)

   


(54) METHOD FOR ACCESS CONTROL, READER DEVICE AND ACCESS CONTROL SYSTEM


(57) The invention relates to a method comprising:
- receiving by a reader device (R) a communication signal from a first mobile device (M1), the reader determining a first received signal strength indicator (RSSI1) of the communication signal of the first mobile device;
- receiving by the reader device (R) the first correction value (cv1) from the first mobile device (M1), wherein the first correction value (cv1) is a first correction value (cv1) of the mobile device (M1);
- applying the first correction value (cv1) to the first received signal strength indicator (RSSI1) to obtain a first distance indicator (DI1);
- performing at least one function by the reader device (R) depending on the first distance indicator (DI1).




Description

TECHNICAL FIELD



[0001] The present invention is related to the field of access control systems for controlling access to one or more specific areas in a building.

STATE OF THE ART



[0002] It is known that electronic access control systems are often used to control access to certain areas or physical spaces within the building. These electronic access control systems (which will be also referred to in the following as EAC systems) usually comprise a door lock that gives access to that specific physical space of the building; a user who wants to access this space is in possession of some sort of mobile data carrier with an identification code stored therein. When the user approaches that door lock and the mobile data carrier is within certain proximity of a reader in the door, a communication channel is established between the mobile data carrier and the reader for the exchange of authentication data. After this authentication process, access to the space secured by the door lock may be given to the holder of the mobile data carrier.

[0003] In order to improve the user experience, for example, regarding speediness of the authentication procedure with the reader, it may be desirable that the exchange of data between the mobile data carrier and the reader starts whenever it is determined that the mobile data carrier is within a specific distance from the reader.

[0004] Some solutions evaluate the proximity of the mobile data carrier to the reader based on the received signal strength.

[0005] Patent document WO-2014/028893-A2 discloses an access control system including a mobile device that communicates with a reader device associated with an electronic lock. In this system, once the mobile device is determined to be within pre-established ranges of the reader device, the system can cause the electronic lock to perform a specific function, such as an auto-unlock feature, or an auto-open feature, or other feature that is automatically performed (wirelessly transmitting a message, ringing a doorbell, etc.). The position of the mobile device with respect to the reader device can be determined by processing position data received via the GPS capability, or RSSI data received and/or determined via the BLE capability.

[0006] However, the determination of the position based on these data may prove not to be sufficiently reliable, for instance, due to the inaccuracy of the position provided by the GPS, or due to the fact that the received signal strength at the reader may be different depending on the mobile data carrier, and also, depending on the battery of the mobile data carrier. Thus, the system may determine that the mobile device is positioned within the pre-established range when it is actually not within range, and vice versa.

[0007] This problem can become more severe in the case of several mobile devices being close to a same reader device, when it may occur that the reader device receives a signal strength from a first mobile device that is lower than the signal strength received from a second mobile device, when the first mobile device is actually closer to the reader device than the second mobile device. As a result, the automatic function performed by the system may be applied to a mobile device which is, in fact, not the closest one to the reader device and, for instance, it is the one that should be given access.

[0008] To overcome this problem, some other solutions have proposed to include further parameters, such as an estimation of the direction of movement of the mobile device, based for instance in the output of an accelerometer of the mobile device, or by including additional beacons in the system) to more securely measure distance. But in exchange, determination of the actual distance in these systems is too complicated.

[0009] It is thus necessary to find a solution that overcomes the above situation, in a simple and reliable way.

DESCRIPTION OF THE INVENTION



[0010] In order to solve the deficiencies posed by the prior-art solutions, the present invention relates to a method for access control, to a reader device and to an access control system, in which the signal strength of a mobile device received by a reader device is corrected to provide a more accurate and reliable of the actual distance between that mobile device and the reader.

[0011] For this purpose, a first aspect of the present invention relates to a method comprising:
  • receiving by a reader device a communication signal from a first mobile device, the reader determining a first received signal strength indicator of the communication signal of the first mobile device;
  • receiving by the reader device a first correction value from the first mobile device, wherein the first correction value is a first correction value of the mobile device;
  • applying the correction value to the first received signal strength indicator to obtain a first distance indicator;
  • performing at least one function (or an action) by the reader device depending on the first distance indicator.


[0012] That is, according to the invention, the reader device only performs a specific function after the received signal strength indicator has been corrected with the correction value, and it is thus more representative of the real distance the mobile device is from the reader.

[0013] In certain embodiments the function performed by the reader device is starting an authenticating procedure with the first mobile device when the received first distance indicator is lower than a preestablished threshold. That is, the reader device only starts the authenticating procedure upon verifying that the corrected first distance indicator is below that preestablished threshold which is indicative that the mobile device is in close proximity of the reader device, close enough to start an authentication procedure. It should be noted that it is also possible that this verification is carried out in a negative manner without departing from the scope of the invention; that is, if the received first distance indicator is lower than a preestablished threshold then the reader device will not start any authenticating procedure with the first mobile device which has been determined to be at a distance greater than that of the threshold. The preestablished threshold can be established, for instance, at the reader device; and this threshold can be defined as a value or as a range. The threshold can be defined as a value or range above which users are considered to be too far from the reader, or a value or range below which users are considered close enough to the reader. The threshold value or range can be pre-set in the reader or it can be configured into the reader by any existing configuration way (which is also used for other configuration data).

[0014] In certain embodiments the method further comprises:
  • receiving by the reader device a communication signal from a second mobile device, the reader determining a second received signal strength indicator of the communication signal of the second mobile device;
  • receiving by the reader device a second correction value from the second mobile device, wherein the second correction value is a second correction value of the second mobile device;
  • applying the second correction value to the second received signal strength indicator to obtain a second distance indicator.


[0015] And the function performed by the reader device is determining which of the first and the second mobile devices is closer to the reader device based on the first distance indicator and the second distance indicator.

[0016] That is, if two or more mobile devices are within communication range from the reader device, and the reader device receives signals from those two or more mobile devices, the reader device only performs the specific function or action in respect with the mobile device that has been determined to be closest to the reader device upon comparing the first and the second distance indicators.

[0017] In certain embodiments the method further comprises starting an authenticating procedure with the i-th mobile device when the distance indicator of the i-th mobile device closer to the reader device is greater than or lower than a preestablished threshold.

[0018] The method of the present invention is applicable in a scenario where there are more than two mobiles device. For the sake of clarity, instead of referring to the first correction value, the second correction value, the third correction value and so forth, in the present disclosure they may be generically referred to as "the i-th correction value" or simply to "the correction value". A similar approach has been followed with the first mobile device, the second mobile device, etc., which can also be referred to as "the i-th mobile device" or simply "the mobile device". And also with their respective received signal strengths indicators and distance indicators.

[0019] The correction value can be made dependent on the mobile device make and/or model and/or type. This way, the correction value accounts for the differences between the signal strengths existing among different manufacturers and models of mobile devices. The correction value can also be dependent on other factors such as hardware or firmware versions, the operating system of the mobile device; or upon other parameters such as temperature of the mobile device

[0020] There are several ways in which the i-th correction value of the i-th mobile device can be made available to the mobile device.

[0021] For instance, the i-th correction value can be stored in a server -remote or local-, and the method comprises retrieving or receiving the correction value from the server. This way it can be assured that the reader receives from each mobile device the most updated value of the correction value and this most updated value is applied by the reader device.

[0022] If the correction values of the different mobile devices are stored in a remote server, for instance, in a database, these correction values can be easily and readily updated with any new model of mobile device that is launched on the market.

[0023] The step of sending by the i-th mobile device its i-th correction value to the reader can be done upon request of the reader. It can also be done at the mobile device's own motion. So, the i-th correction value can be stored in the respective i-th mobile device and that the method comprises automatically sending the i-th correction value to the reader device by the mobile device (at its own motion or initiative), usually once a communication has been established between the reader device and the i-th mobile device. This way, each mobile device can promptly provide its correction value to the reader device, thereby providing a faster way of enabling the reader to carry out the function.

[0024] It is also possible that the reader requests the correction value. This way, the reader device has a control of the whole process and only requests correction value(s) to the mobile devices which have been previously determined to be within certain proximity of the reader.

[0025] In some embodiments, the i-th correction value is inputted in the i-th mobile device upon request, and the method comprises sending the i-th correction value to the reader device. The user may be prompted to input a correction value within a certain range, which range depends on how the correction value is applied to the received signal strength. This may prove useful if no correction value has been previously assigned or registered to that mobile device. For instance, if the correction value is applied by multiplication, the user may be able to input 1 as correction value so as to indicate that no correction value is to be applied. Or if the correction value is applied by addition, then a 0 value can be inputted.

[0026] The above possibilities for providing the correction value to the reader device may be combined. For instance, the first and second correction values can be both stored in the first and second mobile devices, respectively. But it is also possible that the first correction value is stored in a server, while the second correction value is stored in the second mobile device or inputted into the second mobile device upon request.

[0027] The received communication signal at the reader device can be a Bluetooth signal, preferably a Bluetooth Low Energy signal. It is also possible that the received communication signal follows another short-range communication protocol the signal strength of which is measurable at the reader device.

[0028] In certain embodiments the method further comprises:
  • receiving by the reader device credential information sent by the i-th mobile device (be it the first mobile device or the second mobile device);
  • determining validity of the credential information received by the reader device;
  • actuating an electronic lock in a manner depending on the distance indicator (be it the first or the second distance indicators) and on the determined validity of the credential information.


[0029] A second aspect of the invention relates to a reader device, the reader device comprising:
  • a short-range wireless communication interface for wirelessly communicating with, at least, a first mobile device;
  • a non-transitory computer-readable medium storing executable instructions; and
  • one or more processors configured to execute executable instructions,
    wherein executing the executable instructions causes the one or more processors to:
    • receive a communication signal from the first mobile device and determine a first received signal strength indicator of the communication signal of the first mobile device;
    • receive a first correction value from the first mobile device;
    • apply the first correction value to the first received signal strength indicator to obtain a first distance indicator;
    • perform at least one function depending on the first distance indicator.


[0030] In certain embodiments, executing the executable instructions causes the one or more processors to start an authenticating procedure with the at least first mobile device when the received distance indicator is lower than a preestablished threshold. Alternatively, if the received distance indicator is greater than a preestablished threshold, no authenticating procedure with the at least first mobile device will be started.

[0031] In certain embodiments the reader device is configured to:
  • receive another communication signal from at least a second mobile device, the reader determining a second received signal strength indicator of the communication signal of the second mobile device;
  • receive a second correction value from the second mobile device;
  • apply the second correction value to the second received signal strength indicator to obtain a second distance indicator;
  • compare the first and the second distance indicators to determine which of the first and the second mobile devices is closer to the reader device.


[0032] In certain embodiments executing the executable instructions at the reader device further causes the one or more processors to start an authenticating procedure with the i-th mobile device when the distance indicator of the i-th mobile device closer to the reader device is lower than a preestablished threshold.

[0033] According to another aspect, the invention relates to a computer program product comprising computer-executable instructions which, when executed by a processor of a reader device, causes the reader device to carry out the method defined in the first aspect and its embodiments.

[0034] The invention also relates to an access control system which comprises a reader device as defined in the foregoing.

[0035] The different aspects and embodiments of the invention defined in the foregoing can be combined with one another, as long as they are compatible with each other.

[0036] Additional advantages and features of the invention will become apparent from the detailed description that follows and will be particularly pointed out in the appended claims.

BRIEF DESCRIPTION OF THE DRAWINGS



[0037] To complete the description and in order to provide for a better understanding of the invention, a set of drawings is provided. Said drawings form an integral part of the description and illustrate an embodiment of the invention, which should not be interpreted as restricting the scope of the invention, but just as an example of how the invention can be carried out. The drawings comprise the following figures:

Figure 1 is a schematic block representation of the access control system of the present invention, with a mobile device trying to gain access to premises limited by a door.

Figures 2 shows the access control system of Figure 1, with two mobile devices near the door.

Figures 3 shows another situation in which there are three mobile devices in the surroundings of the premises, but only two mobile devices being near the reader.

Figure 4 is a diagram flow of the method of the invention, in a situation with more than one mobile devices.

Figure 5 shows a possible way of feeding correction values to a database of correction values, and their subsequent distribution to mobile devices.

Figure 6 shows another possible way of providing a mobile device with a correction value.


DESCRIPTION OF A WAY OF CARRYING OUT THE INVENTION



[0038] The following description is not to be taken in a limiting sense but is given solely for the purpose of describing the broad principles of the invention. Embodiments of the invention will be now described by way of example, with reference to the above-mentioned drawings showing elements and results according to the invention.

[0039] Figure 1 shows a first mobile device M1 arranged nearby premises P. An access control system restricts the access to premises P. When access is allowed by the reader R, and a door D of the premises P is in a locked state through lock L, the state of the lock L is changed such that the door D is unlocked thereby allowing access to the premises P.

[0040] The access control system comprises a reader device R which receives a signal, for example a Bluetooth Low Energy BLE signal, from the first mobile device M1 through a first wireless communication link L1. The BLE signal is received at the reader device R with a particular signal strength, and the reader determines a first signal strength indicator RSSI1 of the signal received from the mobile device M1. The first mobile device M1 sends a first correction value cv1 of the first mobile device M1 to the reader R. The first correction value cv1 is a correction value of the first signal strength indicator RSSI1 of the signal received by the reader device R.

[0041] At some point, the access control system defines a distance threshold DT and the reader is made aware of this distance threshold DT. Access to the premises P is checked to users carrying the first mobile device M1 when the distance D1 between the first mobile device M1 and the reader device R is lower than the distance threshold DT; that is, an authentication process between n the reader R and the mobile device M1 will be carried out once the distance check has been done, having used the correction value cv1.

[0042] In order to obtain a first indicator DI1 of the distance D1 between the first mobile device M1 and the reader device R, the reader R performs a calculation f with the signal strength indicator RSSI1 and the correction value cv1 sent by the first mobile device M1. In particular the operation(s) of the calculation f may be predefined in a memory (not shown in the drawings), and can be, for instance, in the form of addition/subtraction and/or multiplication/division or other simple mathematical operations, to keep the operation of the reader R simple and fast. The reader R comprises some sort of processing means PM for performing the calculation.

[0043] After obtaining the first distance indicator DI1 of the distance D1 between the reader device R and the first mobile device M1, the first distance indicator DI1 is compared with an indicator of the distance threshold DT in order to estimate whether the distance D1 between the first mobile device M1 and the reader device R is lower than the distance threshold TD. If it is estimated that the distance D1 is lower than the threshold distance DT, and the door D is locked, the reader device R sends a signal for unlocking the door D if the mobile device M1 is authenticated by the reader R. If it is estimated that the distance D1 is higher than the distance threshold DT, the reader device R does not carry out any specific function or action, since that mobile device M1 is deemed to be too far. This way, access to the premises P is allowed first, depending on the actual distance D1 between the first mobile device M1 and the reader device R and then, depending on the specific authentication process defined between the mobile device and the reader.

[0044] Figures 2 shows the access control system of Figure 1, in this case two mobile devices are near the door. As shown in Figure 2, the reader device R may receive signals from the first mobile device M1, in the manner explained in reference to figure 1, and from a second mobile device M2. In addition, the reader device R receives a signal (for instance, a BLE signal) from the second mobile device M2 through a second wireless communication link L2. The signal is received at the reader device R having a particular signal strength, and the reader determines a second signal strength indicator RSSI2 of the signal received from the second mobile device M2. The second mobile device M2 sends a second correction value cv2 of the second mobile device M2. The second correction value cv2 is a correction value of the second signal strength indicator RSSI2.

[0045] In order to obtain a second indicator DI2 of the distance D2 between the second mobile device M2 and the reader device R, the reader R performs a calculation f2 with the signal strength indicator RSSI2 and the correction value cv2 of the signal sent by the second mobile device M2.

[0046] In the situation shown in Figure 2, where there is more than one mobile device within reach of the reader R, it is desirable to grant access to the mobile device which is closest to the reader R. Thus, after obtaining the second distance indicator DI2 of the distance D2 between the reader device R and the second mobile device M2, the first and second distance indicators DI1, DI2 are compared, and access is granted to the mobile device closest to the reader (to the first mobile device M1 in the situation shown in Figure 2). It is possible that subsequently access is granted to the other mobile device(s) within reach of the reader R, if it is determined that the distance Di of the mobile device is lower than the defined distance threshold DT (as is the case of the second mobile device M2 in Figure 2).

[0047] In the situation shown in Figure 3, three mobile devices are in the surroundings of the premises P, but only two mobile devices are sufficiently close to the reader R, within a distance lower than the distance threshold DT. In this situation, the reader R determines a respective received signal strength indicator RSSli for each of the signals received from the two mobile devices. The i-th correction value cvi sent to the reader R is used to determine the i-th distance indicator Dli. Upon comparing the distance indicators from the mobile devices M1, M2 and Mi, the i-th mobile device Mi is determined to be farthest from the reader. The reader will also determine that this i-th mobile device Mi is farther than the distance threshold DT and thus, the function performed by the reader relating to authenticating the mobile device will not be carried out for that i-th mobile device Mi.

[0048] The method performed by the reader R of Figures 1-3 is shown as a flow diagram in Figure 4. At step S11 the reader device R receives a BLE signal from the first mobile device M1 and, also the reader R receives the BLE signal from another mobile device Mi (step S21). The reader R determines respective signal strength indicators RSSI1 and RSSli of the received signals from the respective mobile devices M1, Mi (steps S12 & S22). Each mobile device M1, Mi sends their respective correction values cv1, cvi to the reader R (S13 & S23), where they are received (steps S14 & S24). At the reader, the respective correction values cv1, cvi are applied to the respective signal strength indicators RSSI1 and RSSli at the reader R to obtain a respective distance indicator DI1, Dli of the respective first and i-th mobile devices M1, Mi (steps S15 & S25).

[0049] It is then checked whether the distance indicators DI1, Dli correspond to a distance which is smaller than a specific distance threshold DT (step S16, S26). The distance threshold is a value that has been previously defined, as a distance within which it is considered that the mobile device is sufficiently close to the reader R so as to believe that a user carrying such mobile device wants to enter the premises P. The distance threshold in this example is set as a top value below which the distance between mobile device and reader is considered to be sufficient to start an authentication procedure. Obviously, it is also possible to set the distance threshold as a minimum value and discard mobile devices whose distance is greater than the threshold value; so, if the distance indicator is above the distance threshold DT, the corresponding mobile device is considered not to be sufficiently close to the reader R and no action is taken.

[0050] As a result of the decision steps S16 & S26, the first mobile device M1 and/or the i-th mobile device Mi are left out (steps S17 & S27) of any function to be done by the reader R if they are determined to be farther away from the reader R than the distance threshold DT.

[0051] If the result of the decision steps S16 & S26 is affirmative, then at step S8, the distance indicators DI1, Dli are compared to find out the mobile device that has the smallest distance indicator DI, so as to establish which is the mobile device that is closest to the reader.

[0052] Finally, at step S9 the reader R carries out or performs an action with the mobile device that is associated with the smallest distance indicator DI. This action can be, for example, to check the credentials of the mobile device (or its user) to unlock the door D, if it the mobile device is authenticated and determined to be an authorized user to access that premises P.

[0053] Figure 5 shows a possible way of feeding correction values to a server S including a database which stores correction values cv. There are several possible ways of building or feeding and updating this database. For instance, a user U can input a correction value cvx into the server S by means of a terminal T. The correction value cvx can be linked to an identifier IDx associated to a mobile device. These two values are stored in the database in the form of a tuple. Similarly, other users (not shown in the figure) can upload their correction values cva, cvb, cvc, etc. by means of corresponding mobile devices Ma, Mb, Mc, etc. upon establishing respective communication links La, Lb, Lc, etc. with the server S, be it remote or local.

[0054] It is possible that the user U works as a "bulk uploader" and sends to the server Sthe correction values cvx of several mobile devices, which are identified by the corresponding identifier IDx. This identifier IDx can refer to a single mobile device model, or to a mobile device make.

[0055] The right-hand side of Figure 5 shows how the correction values cv stored in the server S can be subsequently distributed to mobile devices. A mobile device M1, M2, ..., Mi establishes a link L1, L2,... Li with the server s. For retrieving the correction value cv from the server S, the mobile device sends an identifier ID1, ID2, ... IDi of the mobile device Mi to the server S. The server S then sends the corresponding correction value cv linked to that identifier IDi to the respective mobile devices.

[0056] Figure 6 shows another possible way of providing a mobile device with a correction value. In this case, a user Ui of a mobile device Mi directly inputs the correction value cvi into the mobile device. This manual inputting of the correction value cvi can be done at any moment, and also once the user is in front of a door, upon request of the reader R.

[0057] The correction value can be determined using the following procedure:
  • Set a known distance between a reader R and a mobile device.
  • Define a reference value of the distance indicator DI for that known distance between the reader R and a mobile device.
  • Measure the signal received at the reader R from the mobile device at that known distance and determine the received signal strength indicator RSSI for that mobile device.
  • Establish a correction value based on the reference value at the known distance and the determined value of the received signal strength indicator RSSI. That is, the correction value could be defined as follows: cv=f-1 (RSSI, DI)


[0058] For instance, a mobile device is set at a distance of 50 cm of a reader R. A reference value of the distance indicator is defined to be 50. Then, the RSSI for that mobile device is measured to be -40 dBm. Then, the correction value for that mobile device is 10 (formula: correction value 10 = distance indicator 50 - measured RSSI value -40 * -1). With another mobile device the RSSI measured is, for instance, -30 dBm. For that mobile device the correction value is 20 (formula: correction value 20 = distance indicator 50 - measured RSSI value -30 * -1). With third mobile device the RSSI measured is, for instance, -60 dBm. For that mobile device the correction value is -10 (formula: correction value -10 = distance indicator 50 - measured RSSI value -60 * -1).

[0059] Following this procedure, once a new model of mobile device is launched into the market, it is possible to establish its correction value. And the server S can be updated with this new correction value either by a bulk uploader, or by any individual user U.

[0060] In this text, the term "comprises" and its derivations (such as "comprising", etc.) should not be understood in an excluding sense, that is, these terms should not be interpreted as excluding the possibility that what is described and defined may include further elements, steps, etc.

[0061] The invention is obviously not limited to the specific embodiment(s) described herein, but also encompasses any variations that may be considered by any person skilled in the art (for example, as regards the choice of materials, dimensions, components, configuration, etc.), within the general scope of the invention as defined in the claims.


Claims

1. A method comprising:

- receiving by a reader device (R) a communication signal from a first mobile device (M1), the reader determining a first received signal strength indicator (RSSI1) of the communication signal of the first mobile device;

- receiving by the reader device (R) a first correction value (cv1) from the first mobile device (M1), wherein the first correction value (cv1) is a first correction value (cv1) of the first mobile device (M1);

- applying the first correction value (cv1) to the first received signal strength indicator (RSSI1) to obtain a first distance indicator (DI1);

- performing at least one function by the reader device (R) depending on the first distance indicator (DI1).


 
2. The method of claim 1, wherein the function performed by the reader device (R) is starting an authenticating procedure with the first mobile device (M1) when the received first distance indicator (DI1) is lower than a preestablished threshold.
 
3. The method of claim 1 or 2, the method further comprises:

- receiving by the reader device (R) another communication signal from a second mobile device (M2), the reader determining a second received signal strength indicator (RSSI2) of the communication signal of the first mobile device;

- receiving by the reader device (R) a second correction value (cv2) from the second mobile device (M2), wherein the second correction value (cv2) is a second correction value (cv2) of the second mobile device (M2);

- applying the second correction value (cv2) to the second received signal strength indicator (RSSI2) to obtain a second distance indicator (DI2);

wherein the function performed by the reader device is determining which of the first and the second mobile devices (M1, M2) is closer to the reader device (R) based on the first distance indicator (DI1) and the second distance indicator (DI2).
 
4. The method of claim 3, wherein the method further comprises starting an authenticating procedure with the first or the second mobile devices (M1, M2) when the distance indicator (Dli) of the first or the second mobile devices closest to the reader device (R) is lower than a preestablished threshold.
 
5. The method of any previous claim, wherein the i-th correction value is stored in the i-th mobile device.
 
6. The method of any of claims 1-4, comprising retrieving or receiving the i-th correction value from a server.
 
7. The method of any of claims 1-4, wherein the i-th correction value is entered in the i-th mobile device.
 
8. The method of any of claims 1-7, wherein the i-th correction value is dependent on the mobile device make and/or model.
 
9. The method of any of claims 1-8, wherein the communication signal is a Bluetooth signal, preferably a Bluetooth Low Energy signal.
 
10. The method of any previous claim, further comprising:

- receiving by the reader device (R) credential information sent by the i-th mobile device (Mi);

- determining validity of the credential information received by the reader device (R);

- actuating an electronic lock in a manner depending on the i-th distance indicator (Dli) and on the determined validity of the credential information.


 
11. A reader device (R) comprising:

- a short-range wireless communication interface for wirelessly communicating with, at least, a first mobile device (M1);

- a non-transitory computer-readable medium storing executable instructions; and

- one or more processors configured to execute executable instructions,

wherein executing the executable instructions causes the one or more processors to:

- receive a communication signal from the first mobile device (M1) and determine a first received signal strength indicator (RSSI1) of the communication signal of the first mobile device;

- receive a first correction value (cv1) from the first mobile device;

- apply the first correction value (cv1) to the first received signal strength indicator (RSSI1) to obtain a first distance indicator (DI1);

- perform at least one function depending on the first distance indicator (DI1).


 
12. The reader device (R) of claim 11, wherein executing the executable instructions further causes the one or more processors to:

- receive another communication signal from at least a second mobile device (M2), the reader determining a second received signal strength indicator (RSSI2) of the communication signal of the second mobile device;

- receive a second correction value (cv2) from the second mobile device;

- apply the second correction value (cv2) to the second received signal strength indicator (RSSI2) to obtain a second distance indicator (DI2);

- compare the first distance indicator (DI1) and the second distance indicator (DI2) to determine which of the first and the second mobile devices (M1, M2) is closer to the reader device (R).


 
13. The reader device of any of claims 11-12, wherein executing the executable instructions further causes the one or more processors to start an authenticating procedure with the i-th mobile device (Mi) when the distance indicator of the i-th device is lower than a preestablished threshold.
 
14. An access control system, comprising a reader device according to any of claim 11-13.
 
15. A computer program product comprising computer-executable instructions which, when executed by a processor of a reader device, causes the reader device to carry out the method according to one of the claims 1 to 10.
 




Drawing



















Search report









Search report




Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description