×

SOURCE PROGRAMMING AND MANAGEMENT SYSTEM FOR LOCKS COMPRISING CONTACTLESS COMMUNICATION MEANS THAT CAN BE CONTROLLED BY A PORTABLE NFC TELEPHONE

  • US 20120114122A1
  • Filed: 04/28/2010
  • Published: 05/10/2012
  • Est. Priority Date: 04/30/2009
  • Status: Abandoned Application
First Claim
Patent Images

1. A system comprising:

  • at least one lock (40) provided with electronic circuits for NFC transmission/reception and with electric circuits for the control of locking/unlocking mechanical elements;

    a portable telephone (32) provided with circuits enabling it to operate in NFC mode;

    a remote lock management site (18);

    a distinct site (16) of a lock manufacturer; and

    a mobile network operator (20) interfaced with the management site (18), with the mobile telephone (32) and with a user (28),said system being characterized in that;

    the management site is capable of generating, for each lock, a unique random algorithm, a unique identifier (PUID) and a transport key, and of transmitting to the distinct site (16) of the lock manufacturer, for each fabricated lock, said unique identifier and said transport key;

    the lock manufacturer is capable of programming each lock with its unique identifier and its corresponding transport key;

    the mobile network operator (20) communicates with the management site via a secured interface (24), and with the mobile telephone (32) via a trusted service manager (34);

    the mobile network operator is capable of receiving from the user a unique identifier (PUID) of a lock and of transmitting it to the management site for a preliminary recognition;

    the management site is capable of transmitting back to the telephone, via said secured interface (24) of the mobile network operator and via said trusted service manager (34);

    the unique random algorithm, a cryptographic key, the transport key and a user key that correspond to this lock; and

    the telephone comprises means for operating an initial programming of the lock by uploading into the lock the unique random algorithm, the cryptographic key and the user key, and by activating a secured cryptographic procedure.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×