Secure access control method with reader and mobile terminal, in particular such as a telephone terminal

ABSTRACT

A secure access control method is provided that uses secure access control readers having radiocommunication associated to a microcontroller in connection with a remote processing unit and radiocommunication mobile terminals carried by a user. The method includes emitting an announcement signal having security parameters defining access conditions to mobile terminals that determines and evaluates the power of each signal, notifying the mobile terminal of an access action by the user on the mobile terminal or close reader, and translating it by an access pass. If the access pass and/or access conditions are met, a radiofrequency connection is established and inhibits the emission of the announcement signal by said close reader, and passes into an authentication phase.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.15/835,733, filed on Dec. 8, 2017, which claims priority toInternational Application No. PCT/FR2016/051358, filed on Jun. 7, 2016,which claims priority to and the benefit of FR 15/55216 filed on Jun. 8,2015. The disclosures of the above applications are incorporated hereinby reference.

FIELD

The present disclosure relates to a secure access control method.

BACKGROUND

The statements in this section merely provide background informationrelated to the present disclosure and may not constitute prior art.

In the field of access control, it is known to use secure access controlreaders comprising an active radio-identification chip in order to allowshort-distance and contactless access control according to the RFIDtechnology, generally by means of badges provided with a passiveradio-identification chip.

It is also known to use, instead of such badges, mobile terminals of thetelephone terminal (or smartphone) type implementing a secureradiocommunication with the secure access control reader according to along-distance wireless communication protocol of the BLUETOOTH® type.

However, the long range of such a radiocommunication between thetelephone terminal and the access control reader has a major drawbackwhen several access control readers are located within the range of thetelephone terminal, with risks of conflict giving rise to securityflaws.

SUMMARY

The present disclosure provides a secure access control method adaptedfor secure radiocommunications according to long-distance wirelesscommunication protocols, while allowing for an improved security levelwith several secure access control readers likely to be located withinthe range of a mobile terminal.

To this end, the present disclosure proposes a secure access controlmethod using:

at least one secure access control reader comprising a box internallyreceiving radiocommunication device associated to a microcontroller inconnection with a remote processing unit; and

at least one radiocommunication mobile terminal, in particular of thetelephone terminal type, carried by a user.

The access control method comprising an authentication phase at the endof which the microcontroller of an access control reader transmitsauthenticated identification data specific to the mobile terminal to theremote processing unit.

According to the present disclosure, the access control method isnoteworthy in that, prior to the authentication phase, the methodimplements the following steps:

a) the or each access control reader repeatedly emits an announcementsignal comprising security parameters defining at least one conditionfor access to a communication with the corresponding access controlreader;

b) the mobile terminal receives, within a given range, the or eachannouncement signal and determines a receiving power of the or eachannouncement signal;

c) the mobile terminal evaluates the or each receiving power in order toestablish a parameter called distance parameter reflecting the distancebetween the mobile terminal and the or each reader, and recognizes areader as being a close reader depending on this evaluation;

d) the mobile terminal is notified of an action called access actioninitiated by the user on the mobile terminal or on the close reader andtranslates said access action by an access pass to said close reader, inparticular depending on the distance parameter associated to said closereader, said access pass being representative of said access action;

e) the mobile terminal checks whether the access pass corresponds to anaccess condition defined by the security parameters contained in theannouncement signal of said close reader; and

f) if the access pass corresponds to an access condition and if thepossible other access conditions are met, therefore the mobile terminalestablishes a radiofrequency connection with the close reader, saidradio frequency connection having the effect of inhibiting the emissionof the announcement signal by said close reader, and finally the methodpasses into the authentication phase.

Thus, the mobile terminal establishes a radiofrequency connection (orradio-connection or radiocommunication) with a reader depending on itsdistance, and if the access condition(s) are respected in order to avoiduntimely or unwanted communications.

In a particular use, during step b, the mobile terminal receives atleast two announcement signals from at least two distinct readers; andduring step c, the mobile terminal compares the receiving powers of eachreader and determines the close reader as being that whose correspondingreceiving power is the highest.

Thus, when several access control readers are located within the rangeof the mobile terminal, said mobile terminal can establish a radioconnection only with the closest reader.

According to a possibility, during step e, the mobile terminal comparesthe receiving power of the announcement signal of the close reader witha predefined threshold and, during step f, the mobile terminalestablishes a radiofrequency connection with the close reader if saidreceiving power is greater than said threshold.

Thus, a new condition is imposed based on this receiving power, thethreshold being set to translate a proximity of the mobile terminalvis-a-vis the reader.

According to a feature, during step d, an access action corresponds toan approach, with or without contact, of the user, in particular of auser's hand, in the vicinity of a presence detection system integratedinto the close reader, and the detection of said approach by saidpresence detection system causes the emission, by said close reader, ofa new announcement signal comprising the security parameters and adetection index signaling the detection of said approach, and the mobileterminal receives the new announcement signal with said detection indexand translates this detection index into an access pass representativeof said approach.

Thus, the radio connection between the mobile terminal and the closereader is established only after detection of the approach of the userin the vicinity of the reader, unless other access conditions areimposed by the reader.

If the reader does not impose additional access conditions, the usermight get past the secure access only by approaching the reader (inparticular by approaching his hand), without having to handle his mobileterminal which might remain inside a garment or a bag worn by the userand which will necessarily be in the vicinity of the reader in order toexchange with it.

In a particular form, the presence detection system corresponds to acapacitive sensor integrated into the close reader, thus providing acapacitive detection, with or without contact, of the approach of theuser's body vis-a-vis to the reader.

According to another feature, during step d, an access actioncorresponds to a pressure on a touch screen, in particular locally, heldor along a predefined trajectory, or on a button of the mobile terminal,and the mobile terminal translates this pressure into an access passrepresentative of said pressure.

Thus, the radio-connection between the mobile terminal and the closereader is established only after pressing on the screen or on the buttonof the mobile terminal, unless other access conditions are imposed bythe reader. The pressure on the touch screen may correspond to thepressure on a dedicated virtual button and symbolized by an icon on thetouch screen, this virtual button being able, for example, to be presenton a standby screen, a home screen or a screen of a page opened by acomputer application.

According to another form of the present disclosure, during step d, anaccess action corresponds to a predefined impact or displacementmovement of the mobile terminal detected by a movement detector, inparticular of the accelerometer type, integrated into the mobileterminal, and the mobile terminal translates this detection by theaccelerometer into an access pass representative of said predefinedmovement.

Thus, the radio-connection between the mobile terminal and the closereader is established only after the detection of the predefinedmovement by the movement detector.

This detection takes place when the mobile terminal is in standby modeor not, or only after launching a dedicated computer program, inparticular a computer application on a mobile telephone. The movementdetector thus detects a movement of the mobile terminal and the mobileterminal recognizes that this movement corresponds to the predefinedmovement to establish the radio-connection with the reader.

In a particular form, the predefined movement corresponds to an impactmovement composed of a succession of at least two consecutive blows tothe mobile terminal.

In this manner, the user makes do with typing on the mobile terminal,for example through the fabric of a garment pocket or a bag, in order toinitiate the radio-connection between the mobile terminal and the readerand thus gets past the secure access.

According to another form of the present disclosure, during step d, anaccess action corresponds to an unlocking action of the mobile terminalin order to cause it to exit its standby mode, and the mobile terminaltranslates this unlocking into an access pass representative of saidunlocking.

In this particular case, the mobile terminal establishes aradio-connection with the close reader if the mobile terminal isunlocked, and not on standby, unless another access conditions areimposed by the reader.

According to another form of the present disclosure, during step d, anaccess action corresponds to the activation of an access computerprogram stored in the mobile terminal, in particular accessible in theform of an application for mobile phone, and the mobile terminaltranslates this activation into an access pass representative of saidactivation of the computer program.

Thus, the radio-connection between the mobile terminal and the closereader is established only after the activation of the computer program,unless other access conditions are imposed by the reader.

Optionally and advantageously, prior to the authentication phase, it ispossible to expect a complementary identification step based on anidentification action of the user of the mobile terminal, saididentification action including a predefined action on the mobileterminal to generate an identification signal which is received andanalyzed by the microcontroller in order to authorize the passage to theauthentication phase.

Thus, in addition to the cryptographic authentication of theidentification data by the reader, the method takes advantage of themobile terminal in order to provide complementary identification byexploiting the calculation possibilities offered by the mobile terminal.

Advantageously, the complementary identification step is managed by thecomputer program previously activated on the mobile terminal.

In accordance with another feature of the present disclosure, theidentification action corresponds to an input of a code on a keyboard ofthe mobile terminal, or to a biometric control on a biometric deviceintegrated into the mobile terminal, or to a facial recognition using animage capturing by a camera integrated into the mobile terminal, or to avoice recognition using a sound recording by a microphone integratedinto the mobile terminal.

According to a possibility, the emission of the announcement signal byeach access control reader and the radio-connection between the mobileterminal and the concerned access control reader are establishedaccording to a long-distance wireless communication protocol of theBLUETOOTH®, WIFI®, WIBREE®, WIMAX®, LORA®, ZIGBEE® type or the like.

According to another possibility, each access control reader alsocomprises at least one complementary access control system selected fromthe list comprising:

an active radio-identification chip to allow a complementary accesscontrol according to the RFID technology;

a biometric control device to allow a complementary access control bybiometry;

an image capturing device to allow a complementary access control byfacial recognition; and

a keyboard to allow a complementary access control by inputting a code.

Thus, several possibilities are offered for the secure access with sucha reader, either with a mobile terminal as previously described, or witha complementary access control system which will involve using an RFIDbadge (active or passive badge) for the active radio-identificationchip, or knowing a code with the keyboard (in the form of a touch screenor in the form of a keypad), or performing a biometric control(fingerprint, retina, iris, . . . ), or performing an image capturingfor a facial recognition.

According to another feature, during step d, the mobile terminal isnotified of the access action without this warning being linked to thedetermination of the receiving power carried out during step b.

In other words, it is not the determination of the receiving powercarried out during step b which will serve as a warning of the accessaction. In this way, the determination of the receiving power carriedout during step b will not serve as a trigger for switching to step dwhich will lead the mobile terminal to translate an access action intoan access pass.

Further areas of applicability will become apparent from the descriptionprovided herein. It should be understood that the description andspecific examples are intended for purposes of illustration only and arenot intended to limit the scope of the present disclosure.

DRAWINGS

In order that the disclosure may be well understood, there will now bedescribed various forms thereof, given by way of example, referencebeing made to the accompanying drawings, in which:

FIG. 1 illustrates a secure access control method in accordance with theteachings of the present disclosure;

FIG. 2 illustrates an access action corresponding to presence detectionof a user's hand in accordance with the present disclosure;

FIG. 3 illustrates an access action corresponding to pressure and/or anunlocking action of a mobile terminal in accordance with the presentdisclosure;

FIG. 4 illustrates an access action corresponding to a predefined impactmovement of a mobile terminal in accordance with the present disclosure;

FIG. 5 illustrates an access action corresponding to a predefineddisplacement movement of a mobile terminal in accordance with thepresent disclosure; and

FIG. 6 illustrates a complementary access control system in accordancewith the present disclosure.

The drawings described herein are for illustration purposes only and arenot intended to limit the scope of the present disclosure in any way.

DETAILED DESCRIPTION

The following description is merely exemplary in nature and is notintended to limit the present disclosure, application, or uses. Itshould be understood that throughout the drawings, correspondingreference numerals indicate like or corresponding parts and features.

Other features and advantages of the present disclosure will appear uponreading the following detailed description, of a non-limiting example ofimplementation, made with reference to the appended figures in whichFIGS. 1 to 6 illustrate different situations and steps during theimplementation of an access control method in accordance with thepresent disclosure.

With reference to FIG. 1, the method in accordance to the presentdisclosure is implemented with at least two secured access controlreaders 1 and at least one radiocommunication mobile terminal 2 carriedby a user U. The method may also be implemented with a single reader 1.

Each reader 1 comprises a housing internally receivingradiocommunication device according to a long-distance wirelesscommunication protocol of the BLUETOOTH®, WIFI®, WIBREE®, WIMAX®, LORA®,ZIGBEE® type or the like, associated to a microcontroller in (wirelessor wired) connection with a remote processing unit (not illustrated).

The mobile terminal 2 is a telephone terminal, of the smartphone type,but might also be a digital tablet, a personal digital assistant or abadge or key fob called intelligent key fob equipped with a battery andan electronic card or chip.

This mobile terminal 2 integrates radiocommunication device according toa long-distance wireless communication protocol of the BLUETOOTH®,WIFI®, WIBREE®, WIMAX®, ZIGBEE® type or the like, in order to be capableof communicating with the readers 1, as well as control electronics.

The mobile terminal 2 also integrates a touch screen and a movementdetector, such as for example an accelerometer and in particular athree-dimensional accelerometer.

With reference to FIG. 1, in a step a), each reader 1 repeatedly emits,in particular periodically, an announcement signal SA comprising, in itsframe, status parameters and security parameters. The status parameterstranslate the status or the state of the reader 1 and indicate, ininitial operation, a free or available status. The security parametersdefine at least one condition of access to a communication with thereader 1.

With reference to FIG. 1, in a step b), when a user U, carrying a mobileterminal 2, is located within the range of at least two readers 1, themobile terminal 2 receives the announcement signals SA of the differentreaders 1. In this particular case, the mobile terminal 2 determines areceiving power of each announcement signal SA.

Afterwards, in a step c), the mobile terminal 2 compares these receivingpowers and determines the close reader 1 as being that whosecorresponding receiving power is the highest. In the example of FIG. 1,the close reader 1 is the one on the left. The mobile terminal 2 alsocompares these receiving powers with a predetermined power threshold.

Then, in a step d), the mobile terminal 2 is notified of an actioncalled access action initiated by the user U on the mobile terminal 2 oron the close reader 1, and translates this access action by an accesspass representative of said access action.

With reference to FIG. 2, a possible access action corresponds to anapproach, with or without contact, of the hand of the user U in thevicinity of a presence detection system (in particular of the capacitivesensor type) integrated into the close reader 1.

This detection of the approach or the presence of the hand by thepresence detection system causes the emission, by the close reader 1, ofa new announcement signal comprising, in its frame, the statusparameters and the security parameters, where the security parametersare unchanged and the status parameters indicate a “presence detection”status following the detection of the approach of the hand. In otherwords, the new announcement signal comprises a detection index (in thestatus parameters) which signal the detection of the approach of thehand.

Thus, the mobile terminal 2 is noticed of this approach action of thehand by receiving the new announcement signal with this detection index,and the mobile terminal 2 translates this detection index into an accesspass representative of said approach of the hand. It should be notedthat, in this particular case, the user U can keep his mobile terminal 2in his hand, in his pocket or in a bag, unless other access conditionsinvolve acting on the mobile terminal 2.

With reference to FIG. 3, a possible access action corresponds to apressure, with one or more finger(s), on the touch screen of the mobileterminal 2 (alternatively, this pressure may be exerted on a button ofthe mobile terminal 2).

This pressure may be performed on a virtual button present on thestandby screen of the mobile terminal 2, or visible only afteropening/activating a computer program (for example a computerapplication on a smartphone).

This pressure may be also performed in a dedicated interface (inparticular within a dedicated application) and along a predefinedtrajectory, in order to define a predefined symbol. The mobile terminalthen translates this pressure into an access pass representative of saidpressure.

Also with reference to FIG. 3, a possible access action corresponds tothe activation of an access computer program stored in the mobileterminal 2, in particular in the form of a smartphone application.Conventionally, this activation is carried out by clicking, on the touchscreen, on a dedicated icon. The mobile terminal translates thisactivation into an access pass representative of said activation of thecomputer program.

Also with reference to FIG. 3, a possible access action corresponds toan unlocking action of the mobile terminal 2 in order to switch it froma standby mode to an activated or awake mode; this unlocking actionbeing carried out conventionally by pressing on a button or on the touchscreen. The mobile terminal 2 translates this unlocking into an accesspass representative of said unlocking.

With reference to FIG. 4, a possible access action corresponds to apredefined impact movement MI of the mobile terminal 2 detected by themovement detector (not illustrated) integrated into the mobile terminal2, in other words a movement during which the mobile terminal 2undergoes at least one impact or shock, of small magnitude to avoiddamaging the mobile terminal 2.

Concerning the type of impact movement MI, it may for example be amovement during which the user U applies a succession of at least twoconsecutive blows to the mobile terminal 2.

As shown in FIG. 4, the mobile terminal 2 may remain in a garment pocket(or in a bag) during this impact movement MI. This impact movement maybe detected while the mobile terminal 2 is in the standby mode. Themobile terminal 2 translates this detection of an impact or of asuccession of impacts by the movement detector into an access passrepresentative of said predefined impact movement.

With reference to FIG. 5, a possible access action corresponds to apredefined displacement movement MD of the mobile terminal 2 detected bythe movement detector (not illustrated) integrated into the mobileterminal 2.

Concerning the type of displacement movement MD, it may for example be amovement during which the user U takes in hand the mobile terminal 2 andmakes it follow a predefined trajectory in the space, for example bymaking it follow a trajectory of a given shape as illustratedschematically and by way of example in FIG. 5 with a substantiallycircular trajectory.

This displacement movement MD may be detected while the mobile terminal2 is in standby mode, or after opening a dedicated computer program. Themobile terminal 2 translates this detection by the movement detectorinto an access pass representative of said predefined displacementmovement MD.

Afterwards, during step e, the mobile terminal 2 checks the or all theaccess condition(s) defined by the security parameters contained in theannouncement signal SA of the close reader 1 are met, in other words itchecks whether the or each access pass corresponds to an accesscondition.

In the case of the example of FIG. 2, during step e, the mobile terminal2 checks whether said access pass representative of the approach of thehand corresponds to an access condition and, it compares the receivingpower of the new announcement signal with a predefined power threshold.

Thus, a new condition is translated by this power comparison such that,during step f, the mobile terminal 2 establishes a radio-connection withthe close reader 1 if this receiving power is greater than said powerthreshold, this threshold being calculated to translate the proximity ofthe mobile terminal 2 vis-a-vis the reader 1.

Then, during a step f, if the access conditions are met, therefore themobile terminal 2 establishes a radio-connection with the close reader1, this radio-connection having the effect of inhibiting the emission ofthe announcement signal SA by said reader 1, in other words thisradio-connection causes the cessation of the emission of theannouncement signal SA by the close reader 1. At the end, the methodpasses into an authentication phase.

By ceasing to emit the announcement signal SA, no other mobile terminal2 may enter into a radio-connection with the close reader 1, and thisreader 1 accordingly becomes invisible for possible other mobileterminals 2 present in the environment.

During the authentication phase, the mobile terminal 2 transmits itsidentification data and the microcontroller of the close reader 1authenticates its identification data and, then, transmits itsauthenticated identification data to the remote processing unit.

This authentication phase may be of the type with simple or mutualauthentication.

By way of example, during a simple authentication, the mobile terminal 2and the close reader 1 enter into a secure radio-connection andsuccessively:

the reader 1 communicates to the mobile terminal 2 its own identifier(such as, for example, a serial number);

the mobile terminal 2 calculates a signature from this identifier of thereader 1 and also from the identification data of the mobile terminal 2;

the mobile terminal 2 transmits to the reader 1 its identification dataas well as this signature; and

the microcontroller of the reader 1 checks with the signature theauthenticity of the identification data, before transmitting saididentification data to the remote processing unit.

The microcontroller of the reader 1 may authenticate the identificationdata with the public key of a public/private key pair, this public keybeing stored in a memory, such as a secure memory, associated to themicrocontroller.

The processing unit will then recover these identification data for thepurpose of processing and deciding one or more action(s), such as forexample, unlocking an access, launching an alert, actuating a homecontrol system, creating passage information history, etc.

Additionally, it may be expected that, prior to the authenticationphase, the method implements a complementary identification step basedon an identification action of the user U of the mobile terminal 2, thisidentification action includes a predefined action on the mobileterminal 2 for generating an identification signal which is received andanalyzed by the microcontroller in order to authorize the transmissionof the authenticated identification data specific to the mobile terminalto the remote processing unit.

In other words, although the access conditions are met, it may beexpected to request the user U to carry out an identification action inorder to obtain access, this identification action being performed onthe mobile terminal 2. This identification action may be carried out onan interface of a dedicated computer program of the mobile terminal 2,and may include the input of a code, a biometric control, a facialrecognition or voice recognition.

The reader 1 may also integrate at least one complementary accesscontrol system (not illustrated) selected from the list comprising:

an active radio-identification chip to allow a complementary accesscontrol according to the RFID technology;

a biometric control device to allow a complementary access control bybiometry, in particular by fingerprint, retina or iris control;

an image capturing device, such as a digital camera, to allow acomplementary access control by facial recognition; and

a keyboard to allow a complementary access control by inputting a code.

Thus, and as illustrated in FIG. 6, a person PE not holding a mobileterminal 2 adapted for the implementation of the previously describedmethod, may obtain access by means of such a complementary accesscontrol system.

In the example of FIG. 6, the person PE holds a badge 3 provided with apassive RFID chip which communicates with an active radio-identificationchip integrated into the reader 1, in order to obtain the access.

The description of the disclosure is merely exemplary in nature and,thus, variations that do not depart from the substance of the disclosureare intended to be within the scope of the disclosure. Such variationsare not to be regarded as a departure from the spirit and scope of thedisclosure.

What is claimed is:
 1. A secure access control method using at least onesecure access control reader comprising a box internally receivingradiocommunication device associated to a microcontroller in connectionwith a remote processing unit and at least one radiocommunication mobileterminal, in particular of the telephone terminal type, carried by auser, said secure access control method comprising: repeatedly emittingan announcement signal from the at least one secure access controlreader to a radiocommunication mobile terminal, the announcement signalcomprising security parameters defining at least one access conditionfor access to a communication with a corresponding access controlreader; determining a receiving power of the announcement signal;evaluating the receiving power in order to establish a distanceparameter translating a distance between the radiocommunication mobileterminal and a reader, and recognizes a secure access control reader asbeing a close reader depending on said evaluation of the receivingpower; notifying the radiocommunication mobile terminal of an accessaction initiated by the user on the radiocommunication mobile terminalor on the close reader and translating said access action by an accesspass to said close reader, said access pass being representative of saidaccess action; checking whether the access pass corresponds to an accesscondition defined by security parameters contained in the announcementsignal of said close reader; establishing a radiofrequency connectionwith the close reader if the access pass corresponds to at least oneaccess condition is met, said radio frequency connection having theeffect of inhibiting the emission of the announcement signal by saidreader, and finally the method passes into the authentication phase;transmitting authenticated identification data specific to saidradiocommunication mobile terminal from the microcontroller to a remoteprocessing unit; and authenticating the identification data, wherein theaccess action corresponds to a predefined impact or displacementmovement of the radiocommunication mobile terminal detected by anaccelerometer integrated into the radiocommunication mobile terminal,and the radiocommunication mobile terminal translates the detection bythe accelerometer into an access pass representative of said predefinedmovement.
 2. The secure access control method according to claim 1,wherein the predefined movement corresponds to an impact movementcomprising a succession of at least two consecutive blows to theradiocommunication mobile terminal.
 3. The secure access control methodaccording to claim 1, wherein at least two distinct secure accesscontrol readers repeatedly emit an announcement signal and theradiocommunication mobile terminal receives at least two announcementsignals from the at least two distinct secure access control readers anddetermines the receiving powers of each announcement signal, and theradiocommunication mobile terminal compares the receiving powers of eachsecure access control reader and determines the close reader as beingthat whose corresponding receiving power is the highest.
 4. The secureaccess control method according to claim 3, wherein theradiocommunication mobile terminal compares the receiving power of theannouncement signal of the close reader with a predefined threshold andthe radiocommunication mobile terminal establishes a radiofrequencyconnection with the close reader if said receiving power is greater thansaid threshold.
 5. The secure access control method according to claim1, wherein, prior to transmitting authenticated identification data, acomplementary identification step is provided, based on anidentification action of the user of the radiocommunication mobileterminal, said identification action comprising a predefined action onthe radiocommunication mobile terminal to generate an identificationsignal which is received and analyzed by the microcontroller in order toauthorize the transmission of the authenticated identification dataspecific to the radiocommunication mobile terminal to the remoteprocessing unit.
 6. The secure access control method according to claim5, wherein the complementary identification step is managed by acomputer program activated beforehand on the radiocommunication mobileterminal.
 7. The secure access control method according to claim 5,wherein the identification action corresponds to an input of a code on akeyboard of the radiocommunication mobile terminal, a biometric controlon a biometric device integrated into the radiocommunication mobileterminal, a facial recognition using an image capturing by a cameraintegrated into the radiocommunication mobile terminal, or to a voicerecognition using a sound recording by a microphone integrated into theradiocommunication mobile terminal.
 8. The secure access control methodaccording to claim 1 wherein the emission of the announcement signal byeach secure access control reader and the radiocommunication between theradiocommunication mobile terminal and the concerned access controlreader are established according to a long-distance wirelesscommunication protocol.
 9. The secure access control method according toclaim 1, wherein the secure access control reader further comprises atleast one complementary access control system selected from the groupconsisting of an active radio-identification chip to allow acomplementary access control according to the RFID technology, abiometric control device to allow a complementary access control bybiometry, an image capturing device to allow a complementary accesscontrol by facial recognition, and a keyboard to allow a complementaryaccess control by inputting a code.
 10. The secure access control methodaccording to claim 1, wherein the radiocommunication mobile terminal isnotified of the access action without a warning being linked to thedetermination of the receiving power of the announcement signal.
 11. Thesecure access control according to claim 1, wherein theradiocommunication mobile terminal is a telephone terminal.
 12. Thesecure access control method according to claim 1, wherein theradiocommunication mobile terminal translates the access action by anaccess pass to said close reader depending on a distance parameterassociated to said close reader.