SECURE ACCESS CONTROL METHOD WITH SHORT RANGE AND MEDIUM OR LONG-RANGE MODES OF OPERATION
First Claim
1. A secure access control method using a reader, of the secure access control reader type, and at least one radiocommunication mobile terminal carried by a user, the reader comprising a control module in connection with a remote processing unit, a first radiocommunication module having a first range, and a second radiocommunication module having a second range less than the first range, said secure access control method comprising:
- implementing a first mode of operation when the mobile terminal is located at a distance from the reader less than the first range and greater than the second range, wherein in the first mode, a first radiocommunication chip of the mobile terminal establishes a radiocommunication in a first radiocommunication channel with the first radiocommunication module of the reader to exchange identification data by way of the first radiocommunication channel between the mobile terminal and the control module of the reader during or subsequent to an authentication phase; and
implementing a second mode of operation when the mobile terminal is located at a distance from the reader less than the second range, wherein in the second mode, a second radiocommunication chip of the mobile terminal establishes a radiocommunication in a second radiocommunication channel with the second radiocommunication module of the reader to exchange identification data by way of the second radiocommunication channel between the mobile terminal and the control module of the reader during or subsequent to the authentication phase, wherein the second radiocommunication channel is selected automatically and as a priority over the first radiocommunication channel,wherein, during the authentication phase, the mobile terminal communicates authenticated identification data specific to said mobile terminal and towards the remote processing unit.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure access control method uses a reader and a radiocommunication mobile terminal. The reader includes a first radiocommunication module having a first range and a second radiocommunication module having a second range less than the first range. The mobile terminal includes a first radiocommunication chip that establishes a first radiocommunication channel with the first radiocommunication module and a second radiocommunication chip that establishes a second radiocommunication channel with the second radiocommunication module. The method implements two modes of operation. In the first mode, when the mobile terminal is at a distance from the reader less than the first range and greater than the second range, the first radiocommunication channel is established. In the second mode, when the mobile terminal is at a distance from the reader less than the second range, the second radiocommunication channel is established as a priority.
-
Citations
15 Claims
-
1. A secure access control method using a reader, of the secure access control reader type, and at least one radiocommunication mobile terminal carried by a user, the reader comprising a control module in connection with a remote processing unit, a first radiocommunication module having a first range, and a second radiocommunication module having a second range less than the first range, said secure access control method comprising:
-
implementing a first mode of operation when the mobile terminal is located at a distance from the reader less than the first range and greater than the second range, wherein in the first mode, a first radiocommunication chip of the mobile terminal establishes a radiocommunication in a first radiocommunication channel with the first radiocommunication module of the reader to exchange identification data by way of the first radiocommunication channel between the mobile terminal and the control module of the reader during or subsequent to an authentication phase; and implementing a second mode of operation when the mobile terminal is located at a distance from the reader less than the second range, wherein in the second mode, a second radiocommunication chip of the mobile terminal establishes a radiocommunication in a second radiocommunication channel with the second radiocommunication module of the reader to exchange identification data by way of the second radiocommunication channel between the mobile terminal and the control module of the reader during or subsequent to the authentication phase, wherein the second radiocommunication channel is selected automatically and as a priority over the first radiocommunication channel, wherein, during the authentication phase, the mobile terminal communicates authenticated identification data specific to said mobile terminal and towards the remote processing unit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification