Method of controlling access to a reserve zone with control of the validity of an access entitlement installed in the memory of a mobile terminal
First Claim
1. A method of controlling access to a reserve zone via a system for controlling access to the reserve zone, the method comprising the following steps:
- presenting a mobile terminal to an access control point of the access control system,capturing an image carried by the access control point, representative of an encoded item of computer data, using a camera of the mobile terminal, anddecrypting, via the mobile terminal, the image captured by the camera, to deduce the encoded computer data therefrom,wherein the encoded item of computer data is a unique identifier of the access control point, and in that the method further comprises the following steps;
establishing a wireless connection between the mobile terminal and the access control point, by the mobile terminal, using the unique identifier of the decrypted access control point,sending the access control point, via the mobile terminal, an access entitlement to the reserve zone stored in its memory, via a wireless connection, the access entitlement comprising an expiration timestamp and a transportation contract,first check of the validity of the data of said access entitlement by the access control point, said check comprising the following sub-steps;
reading the expiration timestamp of the access entitlement, andcomparing said expiration timestamp with the date-time of the presentation moment of the mobile terminal to the access control point,second check of the validity of the data of the access entitlement, andif it is concluded that said data of the access entitlement is valid as part of the second check, replacing the expiration timestamp of the access entitlement with a later expiration date-time.
1 Assignment
0 Petitions
Accused Products
Abstract
The method comprises the following steps: presentation of a mobile terminal to an access control point, capture of an image carried by the access control point, and representative of an encoded item of computer data, by a camera of the terminal, and decryption, by the terminal of the of the image captured by the camera, so as to deduce therefrom the encoded item of computer data, which is a unique identifier of the access control point, by the mobile terminal, by the unique identifier of the access control point decrypted, transmission to the access control point broadcast, by the mobile terminal, of an entitlement for access to the reserve zone, which entitlement is stored in its memory, via the wireless connection, and control of the validity of the data of the access entitlement by the access control point.
22 Citations
14 Claims
-
1. A method of controlling access to a reserve zone via a system for controlling access to the reserve zone, the method comprising the following steps:
-
presenting a mobile terminal to an access control point of the access control system, capturing an image carried by the access control point, representative of an encoded item of computer data, using a camera of the mobile terminal, and decrypting, via the mobile terminal, the image captured by the camera, to deduce the encoded computer data therefrom, wherein the encoded item of computer data is a unique identifier of the access control point, and in that the method further comprises the following steps; establishing a wireless connection between the mobile terminal and the access control point, by the mobile terminal, using the unique identifier of the decrypted access control point, sending the access control point, via the mobile terminal, an access entitlement to the reserve zone stored in its memory, via a wireless connection, the access entitlement comprising an expiration timestamp and a transportation contract, first check of the validity of the data of said access entitlement by the access control point, said check comprising the following sub-steps; reading the expiration timestamp of the access entitlement, and comparing said expiration timestamp with the date-time of the presentation moment of the mobile terminal to the access control point, second check of the validity of the data of the access entitlement, and if it is concluded that said data of the access entitlement is valid as part of the second check, replacing the expiration timestamp of the access entitlement with a later expiration date-time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification