[go: up one dir, main page]

WO2006136662A1 - Communication method of access control system - Google Patents

Communication method of access control system Download PDF

Info

Publication number
WO2006136662A1
WO2006136662A1 PCT/FI2006/050277 FI2006050277W WO2006136662A1 WO 2006136662 A1 WO2006136662 A1 WO 2006136662A1 FI 2006050277 W FI2006050277 W FI 2006050277W WO 2006136662 A1 WO2006136662 A1 WO 2006136662A1
Authority
WO
WIPO (PCT)
Prior art keywords
access control
lock
mobile terminal
control infrastructure
door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/FI2006/050277
Other languages
French (fr)
Inventor
Jouni Koljonen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MOHINET Oy
Original Assignee
MOHINET Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MOHINET Oy filed Critical MOHINET Oy
Priority to EP06764516A priority Critical patent/EP1897066A4/en
Publication of WO2006136662A1 publication Critical patent/WO2006136662A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Definitions

  • the invention relates to access control systems and especially to mobile communication between the lock and the access control system.
  • the objective of the invention is to create a cost effective way to connect a lock in separate premises to a centralized control system with minimum required hardware and to create a way for occasional visitors to get the access licence for a remote lock in cost efficient and easy way.
  • the present access control systems are based on hierarchical structure.
  • the database of the access control data is in one server, and the database is at least partially copied to the lower level servers. If the main database server is down or disconnected from the network, the rest of the system works still autonomously. All the lower level components are working in the same way. This makes the system fail tolerant, only updating of the control data is delayed, if the connection to the control data database is lost.
  • one building has at least one server for managing doors and routing the communications between the door controllers and the rest of the infrastructure. This makes it very costly to connect a separate building with only one controlled door to the infrastructure.
  • a lock needs to be connected in some way to the server in order to get the access right information from the database and report the transactions to the database.
  • the problem is that the needed infrastructure is very expensive for one separate door, as the cost of servers and network infrastructure is needed only for small amount of doors in one building and the need for temporary keys and connection to infrastructure is still needed for security.
  • An example of that kind of access control need is for a telecommunications switch, a cross-connection closet, a base station, or a transformer room or other kind of technical premises that are not maintained by the occupant of the house. In this case, often the visitors should be logged and the access licences should often be only for some hours at a time.
  • the lock is standalone, the present infrastructure model needs communication channel, and local infrastructure for even only one lock. This is extremely expensive, as only one lock shares a communications server and door manager and the wiring in also a considerable cost.
  • the aim of invention is to create an inexpensive infrastructure for a single or only a few doors to connect to the access control infrastructure without needing any costly cabling, computer system or complicated configuration. Further the aim is to create an easy way to grant access licences and to track use of them. Further the licences should be granted without distributing access control tag or badges to users.
  • the invention makes effectively use of the existing access control infrastructure, connecting only a gateway to the controlling servers of the access control infrastructure.
  • the communications between the lock controller and the gateway is enabled by a mobile terminal of the lock user.
  • This makes the infrastructure cost per door very small, the lock is off-line, but the user's mobile terminal is online-key to it, and the infrastructure is able to log events and use up-to-date licensing and key-database with minimal changes to the existing system.
  • the user identification is based on the mobile terminal's phone number (embedded in the phone's SW) and an (optional) password inquiry which makes the identification fairly safe. This makes it possible to give an authorization to a user of defined phone number and password instead of giving authorization to a key badge that must be sent in advance to the user.
  • the licences can be easily granted to a user of other organization, and still having a track of at least the phone number of the user.
  • the invention is based on using an on-line mobile terminal as a key and communication gateway for an off-line lock.
  • the lock is still controlled by the infrastructure for each event, if necessary.
  • Another object is to grant and cancel "keys" or licences to mobile terminal users without a badge.
  • Fig 1 Schematic diagram of a known access control infrastructure
  • Fig 2 Schematic diagram of the arrangement according to the invention
  • Figure 1 shows an example of an infrastructure of existing technology.
  • the system is redundant and hierarchical, geographically distributed.
  • Database server DS also called application server
  • Communication Servers CS are often in same strictly guarded premises with database server DS.
  • Door manager controllers DMC are based for each location, and finally the door managers DM are reading the badges, communicating with the rest of the infrastructure and monitoring the door.
  • the complicated hierarchical system is necessary for decentralizing and for fault-proofing. Also the load balancing is one issue, so that the data base can be updated hierarchically.
  • door manager DM is a small computer with I/0-lines for communication to DMC and for controlling the lock, reading badges or cards, motion detection, or for example to connect to biometric devices.
  • one separate lock in one building needs always 2 computers, namely Door Manager DM and Door manager controller DMC and the wiring and communications channel from the building to the access manager. Therefore, connecting one separate door to the system needs a lot work and expensive hardware.
  • FIG. 2 shows infrastructure needed for a door controlled with method according to the invention.
  • the Front Manager and the Door manager controller is replaced by a Gateway GW, and a mobile terminal MT.
  • the Lock Manager sends its identification to the mobile terminal MT.
  • the software in the mobile terminal MT sends the identification information of the door together with the identification information of the MT itself to GW.
  • the gateway is connected to DS, so it acts like a CS. If gateway is under a CS, it acts like a DMC towards the closed network of the infrastructure.
  • the port of the gateway is connected to public network PNW, for example to internet or to public telecomm network or to public mobile network through which the mobile terminal can communicates with the gateway.
  • public network PNW for example to internet or to public telecomm network or to public mobile network through which the mobile terminal can communicates with the gateway.
  • the door manager used in the method according to the invention may be much simpler than the door manager in the system of figure 1.
  • the door manager in the system according to the invention may have very limited amount of connections.
  • the necessary connections for the DM are power supply, Bluetooth and lock control, maybe also keyboard.
  • the door manager should have enough processing power for encrypting messages and memory for storing the encryption keys and badge key codes and their validity information.
  • the gateway server is working as a link between the mobile net or the internet or other equivalent communications media (PNW) and the network of the access control infrastructure.
  • the later network is usually physically strictly isolated, usually inside locked and guarded room.
  • the gateway is acting towards the servers of the access control infrastructure as a network element of the infrastructure. Therefore, there is no need for change of configure the infrastructure, the system according the invention is bolt-on solution, that is transparent to the rest of the infrastructure.
  • the lock is controlled by a door manager DM next to the lock.
  • the controller includes a short range communication means (BT), for example a display, Bluetooth, IrDA or WLAN.
  • BT short range communication means
  • BT Bluetooth is the preferred option, but also WLAN or even manual entry with keyboard and a display is a possible option, even it is more expensive to install, and inconvenient and slow for the user.
  • the short-range communication means (BT) are used to send the identifying information of the lock to a mobile terminal of the user of the lock. In the mobile terminal there is a midlet that recognizes the identifying information, and possibly the midlet asks confirmation or password from the user. After that, the terminal sends the identifying information of the user, itself and the lock to the gateway.
  • the lock uses first a beacon-signal, after a MT makes a communication link with the DM; the DM sends a single use random code to MT.
  • the MT sends this random code, its own identification information and maybe a pass code of the user to GW.
  • GW verifies the message, sends an encrypted, unique reply to the MT, and MT can use the content of the reply once or several times to open the door by sending the content of message from GW to the DM.
  • the gateway sends the information in a form of a key and the lock information and asks authentication from the infrastructure to open the lock. In the same time the GW send the auditing information of the users acts. In case of later described automatic mode, where the key code is valid for opening the lock several times, the GW does not necessarily get the auditing information immediately or maybe never gets detailed information about all the incidents. If the key code is valid for single use only, the infrastructure is always aware of all the incidents.
  • All the communications are preferably encrypted with public key encryption, preferably the messages include a single use random number to ensure that recording or copying the message is not useful for fraud.
  • the communications in the public network must be encrypted.
  • the public key encryption is easier, as the mobile terminal needs not to exchange secret key.
  • random encryption keys for each communication session there is no way for outsider to track the users by capturing the radio- communications, as only the door beacon is always the same and the first connection of the MT is already encrypted with the public single use key of the DM.
  • the DM and GW may know each others public keys, so they do not need to change the public key every time, but the message needs to have an order number or time stamp, so that the code is unique.
  • the gateway is critical point, as it connects the closed network to the public network.
  • the gateway may be therefore a combination of several computers, for example a firewall and a gateway. This makes cracking into the closed network more difficult, as both computers in serial must be cracked.
  • the system can work in two different modes, manual mode works every time on-line.
  • manual mode the mobile terminal asks every time the authorization information from the central lock infrastructure. The authorization is therefore for single use.
  • automatic mode the mobile terminal may ask the authorization automatically in a background process and the authorization is valid for a time period.
  • the mobile terminal asks an authorization that is valid for a certain time interval and maybe also for a set of doors.
  • the phone may ask a new authorization after the old authorization is expired. This may be done automatically in a background process or when first time trying to open the door after the expiration or when entering to the coverage area of the DM transmitter.
  • the authorization for multiple uses is easier to abuse, but the opening the door does not need to open the GPRS-connection to the gateway, so the opening of the lock is practically instantaneous.
  • the automatic mode is preferably using public key encryption, so that the lock uses every time a different code, and the mobile terminal uses its authorization code for creating the reply message. The opening message is never the same twice, so capturing the message would not make possible to copy the authorization.
  • the automatic mode authorization code is not normally easy to cancel, so the automatic "key code" should be for moderately short period.
  • the lock controller may have a list of cancelled codes, but it can be updated only if there is a communication channel to the infrastructure.
  • automatic mode is used for less critical areas, where a lost phone and key code is not critical.
  • the software in the mobile phone may also be able to cancel the code by remote control from the network. If the code of the MT software is for example Java, this is moderately easy to tamper by end user and the cancelling may be inactivated.
  • the key codes are valid only for some hours, so the probability of misuse of a lost phone is relatively small in any case.
  • the infrastructure may command the lock (DM) to manual mode, that case the next mobile terminal requesting a key does not receive automatic mode key-code but a command to enter manual mode, this code may be encrypted and transparent for the MT, so it is not possible to tamper.
  • the message from GW may also contain more information, a list of banned key- codes, and the lock manager may send access information to the infrastructure with the authorization request.
  • the off-line lock is practically on-line each time there is a transaction with first to MT and maybe later (automatic mode) to GW, as the communications is preferably encrypted with keys of DM and GW, the MT is not able to detect or alter the contents of the messages. So there no easy way to false any codes, as the MT can be also recognized by the mobile network, as the MT has unique number and also it is possible to detect the IMEI and the MT software serial number together with the software password, if necessary.
  • the mobile terminal is listening in a background process the beacon signals and the mobile terminal automatically makes a contact to the door managers (DM) the mobile terminal assumes the user may want to open or the user may have access rights.
  • the phone may also ask automatically a short term ticket for each door, or open a connectionless channel to GW in advance.
  • the infrastructure also receives more often information from the door managers and the infrastructure gats also information about the movement of the users, even they do not open any door. This enables higher security, and the door managers may receive cancelling message of user rights faster, as any user nearby can relay the information between the DM and GW. Also the stolen MT or user with cancelled user rights may cause alarm even by entering to the coverage of any DM.
  • This background process is cost effective, as the GPRS data needed is very limited and the Bluetooth is mainly only receiving.
  • the battery consumption of the mobile terminal is not raised too much and a few kilobytes of data sent automatically are not too costly to send over GPRS or UMTS even in daily bases.
  • the time for opening in full manual mode is around 10 to 20 seconds more than in the automatic mode with background negotiating in advance.
  • the opening tickets expiry times may vary from some minutes to days.
  • the operation of door is virtually immediate, the user selects the door from the door list and the door opens immediately.
  • the beacon signals of the doors enable the mobile terminals to connect to all the DMs that are in the range of the Bluetooth, and therefore the Bluetooth connection to the DM is ready all the time, and if the opening "key code" or ticket is asked in advance from the GW, the phone can open the door immediately.
  • the phone next time takes contact to the GW, and the door the incident information is sent to the GW.
  • the DM and GW can track the communications and if there is fraud detected the user may be banned and the system makes an alarm.
  • the fraud may be for example, that the terminal is refusing to pass the messages after opening the door. That case the alarm may be set, and also the next user's terminal is passing the necessary information in any case.
  • There is no easy way to prevent the incident information transmission as the encrypted message content is not readable by the mobile terminal, and the user cannot control the message content.
  • the method is as fast for the user as a pass code ticket stored in the mobile terminal used in the prior art.
  • the pure gateway solution for data transmission via mobile phone offers high security for the user identification, and the user rights may be checked for each incident. But if the authentication is not prepared in advance, the opening of the lock takes typically over ten seconds, which is annoyingly slow.
  • the automatic negotiation and frequent connection between the lock and the lock solves both security problem and smooth operation for the user.
  • the mobile phone (MT) of the user is replacing the need for own communication channel for the lock and the infrastructure can be sure, that the mobile phone is in the proximity of the lock before opening the lock.
  • the lock manager computer with Bluetooth is much cheaper to manufacture and to maintain than if the lock would have own GPRS-, WLAN- or Ethernet- connection for connecting to the gateway.
  • This case still the identity of the mobile phone must be verified through the telecomm or GPRS-network and the short distance communications is needed anyway for the proximity check, i.e. the user is close to the door, he wants to open. So, if the phone is to be used to open the lock, it is advantageous to use the user's phone for all the communications between the lock manager and the gateway.
  • the amount of the data to be transferred is relatively small, much less than a kilobyte for authorization. In automatic mode the authorization is made relatively seldom. It is possible to use the text-messages (SMS) to transfer the authorization codes, but typically the GPRS is cheaper to use for a short two-way connection.
  • SMS text-messages
  • the connection type is not relevant; the connection may as well be WLAN with user authentication, if available for the MT.
  • the GW is connected to public internet, to mobile cellular network with SMS or with GPRS or equivalent, or to several communication channels or it may use external gateways for reception of SMS from public internet.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method for remote controlling an electrical lock within an access control infrastructure including access database for access information and incidents, the lock being controlled by a door manager computer (DM), the method using mobile terminal (MT) with short range communication link (BT) to establish a communication link to the door manager (DM) and a mobile network connection (PNW) to establish a communication link to the access control infrastructure to communicate the authentication information between the door manager and the access control infrastructure.

Description

Communication method of access control system
The invention relates to access control systems and especially to mobile communication between the lock and the access control system.
The objective of the invention is to create a cost effective way to connect a lock in separate premises to a centralized control system with minimum required hardware and to create a way for occasional visitors to get the access licence for a remote lock in cost efficient and easy way.
The present access control systems are based on hierarchical structure. Usually the database of the access control data is in one server, and the database is at least partially copied to the lower level servers. If the main database server is down or disconnected from the network, the rest of the system works still autonomously. All the lower level components are working in the same way. This makes the system fail tolerant, only updating of the control data is delayed, if the connection to the control data database is lost. Typically one building has at least one server for managing doors and routing the communications between the door controllers and the rest of the infrastructure. This makes it very costly to connect a separate building with only one controlled door to the infrastructure.
A lock needs to be connected in some way to the server in order to get the access right information from the database and report the transactions to the database. The problem is that the needed infrastructure is very expensive for one separate door, as the cost of servers and network infrastructure is needed only for small amount of doors in one building and the need for temporary keys and connection to infrastructure is still needed for security. An example of that kind of access control need is for a telecommunications switch, a cross-connection closet, a base station, or a transformer room or other kind of technical premises that are not maintained by the occupant of the house. In this case, often the visitors should be logged and the access licences should often be only for some hours at a time. If the lock is standalone, the present infrastructure model needs communication channel, and local infrastructure for even only one lock. This is extremely expensive, as only one lock shares a communications server and door manager and the wiring in also a considerable cost.
The aim of invention is to create an inexpensive infrastructure for a single or only a few doors to connect to the access control infrastructure without needing any costly cabling, computer system or complicated configuration. Further the aim is to create an easy way to grant access licences and to track use of them. Further the licences should be granted without distributing access control tag or badges to users.
The invention makes effectively use of the existing access control infrastructure, connecting only a gateway to the controlling servers of the access control infrastructure. The communications between the lock controller and the gateway is enabled by a mobile terminal of the lock user. This makes the infrastructure cost per door very small, the lock is off-line, but the user's mobile terminal is online-key to it, and the infrastructure is able to log events and use up-to-date licensing and key-database with minimal changes to the existing system. The user identification is based on the mobile terminal's phone number (embedded in the phone's SW) and an (optional) password inquiry which makes the identification fairly safe. This makes it possible to give an authorization to a user of defined phone number and password instead of giving authorization to a key badge that must be sent in advance to the user. The licences can be easily granted to a user of other organization, and still having a track of at least the phone number of the user.
The invention is based on using an on-line mobile terminal as a key and communication gateway for an off-line lock. The lock is still controlled by the infrastructure for each event, if necessary. Another object is to grant and cancel "keys" or licences to mobile terminal users without a badge.
The invention is described with reference to figures
Fig 1: Schematic diagram of a known access control infrastructure
Fig 2: Schematic diagram of the arrangement according to the invention
Figure 1 shows an example of an infrastructure of existing technology. The system is redundant and hierarchical, geographically distributed. Database server DS (also called application server) maintains and controls the central database. Communication Servers CS are often in same strictly guarded premises with database server DS. Door manager controllers DMC are based for each location, and finally the door managers DM are reading the badges, communicating with the rest of the infrastructure and monitoring the door. The complicated hierarchical system is necessary for decentralizing and for fault-proofing. Also the load balancing is one issue, so that the data base can be updated hierarchically. In practice door manager DM is a small computer with I/0-lines for communication to DMC and for controlling the lock, reading badges or cards, motion detection, or for example to connect to biometric devices. In this kind of hierarchical structure one separate lock in one building needs always 2 computers, namely Door Manager DM and Door manager controller DMC and the wiring and communications channel from the building to the access manager. Therefore, connecting one separate door to the system needs a lot work and expensive hardware.
Figure 2 shows infrastructure needed for a door controlled with method according to the invention. The Front Manager and the Door manager controller is replaced by a Gateway GW, and a mobile terminal MT. The Lock Manager sends its identification to the mobile terminal MT. The software in the mobile terminal MT sends the identification information of the door together with the identification information of the MT itself to GW. In the figure 2 the gateway is connected to DS, so it acts like a CS. If gateway is under a CS, it acts like a DMC towards the closed network of the infrastructure. The port of the gateway is connected to public network PNW, for example to internet or to public telecomm network or to public mobile network through which the mobile terminal can communicates with the gateway.
The door manager used in the method according to the invention may be much simpler than the door manager in the system of figure 1. The door manager in the system according to the invention may have very limited amount of connections. The necessary connections for the DM are power supply, Bluetooth and lock control, maybe also keyboard. The door manager should have enough processing power for encrypting messages and memory for storing the encryption keys and badge key codes and their validity information.
The gateway server is working as a link between the mobile net or the internet or other equivalent communications media (PNW) and the network of the access control infrastructure. The later network is usually physically strictly isolated, usually inside locked and guarded room. The gateway is acting towards the servers of the access control infrastructure as a network element of the infrastructure. Therefore, there is no need for change of configure the infrastructure, the system according the invention is bolt-on solution, that is transparent to the rest of the infrastructure.
The lock is controlled by a door manager DM next to the lock. The controller includes a short range communication means (BT), for example a display, Bluetooth, IrDA or WLAN. Presently Bluetooth is the preferred option, but also WLAN or even manual entry with keyboard and a display is a possible option, even it is more expensive to install, and inconvenient and slow for the user. The short-range communication means (BT) are used to send the identifying information of the lock to a mobile terminal of the user of the lock. In the mobile terminal there is a midlet that recognizes the identifying information, and possibly the midlet asks confirmation or password from the user. After that, the terminal sends the identifying information of the user, itself and the lock to the gateway.
The lock uses first a beacon-signal, after a MT makes a communication link with the DM; the DM sends a single use random code to MT. The MT sends this random code, its own identification information and maybe a pass code of the user to GW. GW verifies the message, sends an encrypted, unique reply to the MT, and MT can use the content of the reply once or several times to open the door by sending the content of message from GW to the DM.
The gateway sends the information in a form of a key and the lock information and asks authentication from the infrastructure to open the lock. In the same time the GW send the auditing information of the users acts. In case of later described automatic mode, where the key code is valid for opening the lock several times, the GW does not necessarily get the auditing information immediately or maybe never gets detailed information about all the incidents. If the key code is valid for single use only, the infrastructure is always aware of all the incidents.
All the communications are preferably encrypted with public key encryption, preferably the messages include a single use random number to ensure that recording or copying the message is not useful for fraud. Especially the communications in the public network must be encrypted. The public key encryption is easier, as the mobile terminal needs not to exchange secret key. With random encryption keys for each communication session there is no way for outsider to track the users by capturing the radio- communications, as only the door beacon is always the same and the first connection of the MT is already encrypted with the public single use key of the DM. The DM and GW may know each others public keys, so they do not need to change the public key every time, but the message needs to have an order number or time stamp, so that the code is unique.
An important security issue is that the gateway is critical point, as it connects the closed network to the public network. The gateway may be therefore a combination of several computers, for example a firewall and a gateway. This makes cracking into the closed network more difficult, as both computers in serial must be cracked.
The system can work in two different modes, manual mode works every time on-line. In manual mode the mobile terminal asks every time the authorization information from the central lock infrastructure. The authorization is therefore for single use. In automatic mode the mobile terminal may ask the authorization automatically in a background process and the authorization is valid for a time period.
In automatic mode the mobile terminal asks an authorization that is valid for a certain time interval and maybe also for a set of doors. The phone may ask a new authorization after the old authorization is expired. This may be done automatically in a background process or when first time trying to open the door after the expiration or when entering to the coverage area of the DM transmitter. The authorization for multiple uses is easier to abuse, but the opening the door does not need to open the GPRS-connection to the gateway, so the opening of the lock is practically instantaneous. The automatic mode is preferably using public key encryption, so that the lock uses every time a different code, and the mobile terminal uses its authorization code for creating the reply message. The opening message is never the same twice, so capturing the message would not make possible to copy the authorization. The automatic mode authorization code is not normally easy to cancel, so the automatic "key code" should be for moderately short period. The lock controller may have a list of cancelled codes, but it can be updated only if there is a communication channel to the infrastructure. Typically automatic mode is used for less critical areas, where a lost phone and key code is not critical. The software in the mobile phone may also be able to cancel the code by remote control from the network. If the code of the MT software is for example Java, this is moderately easy to tamper by end user and the cancelling may be inactivated. Typically the key codes are valid only for some hours, so the probability of misuse of a lost phone is relatively small in any case. The infrastructure may command the lock (DM) to manual mode, that case the next mobile terminal requesting a key does not receive automatic mode key-code but a command to enter manual mode, this code may be encrypted and transparent for the MT, so it is not possible to tamper. The message from GW may also contain more information, a list of banned key- codes, and the lock manager may send access information to the infrastructure with the authorization request. This way the off-line lock is practically on-line each time there is a transaction with first to MT and maybe later (automatic mode) to GW, as the communications is preferably encrypted with keys of DM and GW, the MT is not able to detect or alter the contents of the messages. So there no easy way to false any codes, as the MT can be also recognized by the mobile network, as the MT has unique number and also it is possible to detect the IMEI and the MT software serial number together with the software password, if necessary.
In one preferable embodiment the mobile terminal is listening in a background process the beacon signals and the mobile terminal automatically makes a contact to the door managers (DM) the mobile terminal assumes the user may want to open or the user may have access rights. The phone may also ask automatically a short term ticket for each door, or open a connectionless channel to GW in advance. When the user wants to open the door, there is no need for handshaking the Bluetooth connection and the connection to the GW. If the authentication information is asked automatically, the infrastructure also receives more often information from the door managers and the infrastructure gats also information about the movement of the users, even they do not open any door. This enables higher security, and the door managers may receive cancelling message of user rights faster, as any user nearby can relay the information between the DM and GW. Also the stolen MT or user with cancelled user rights may cause alarm even by entering to the coverage of any DM.
This background process is cost effective, as the GPRS data needed is very limited and the Bluetooth is mainly only receiving. The battery consumption of the mobile terminal is not raised too much and a few kilobytes of data sent automatically are not too costly to send over GPRS or UMTS even in daily bases.
In the experiments the time for opening in full manual mode is around 10 to 20 seconds more than in the automatic mode with background negotiating in advance. The opening tickets expiry times may vary from some minutes to days. The operation of door is virtually immediate, the user selects the door from the door list and the door opens immediately.
The beacon signals of the doors enable the mobile terminals to connect to all the DMs that are in the range of the Bluetooth, and therefore the Bluetooth connection to the DM is ready all the time, and if the opening "key code" or ticket is asked in advance from the GW, the phone can open the door immediately. When the phone next time takes contact to the GW, and the door, the incident information is sent to the GW. The DM and GW can track the communications and if there is fraud detected the user may be banned and the system makes an alarm. The fraud may be for example, that the terminal is refusing to pass the messages after opening the door. That case the alarm may be set, and also the next user's terminal is passing the necessary information in any case. There is no easy way to prevent the incident information transmission, as the encrypted message content is not readable by the mobile terminal, and the user cannot control the message content.
The method is as fast for the user as a pass code ticket stored in the mobile terminal used in the prior art. The pure gateway solution for data transmission via mobile phone offers high security for the user identification, and the user rights may be checked for each incident. But if the authentication is not prepared in advance, the opening of the lock takes typically over ten seconds, which is annoyingly slow. The automatic negotiation and frequent connection between the lock and the lock solves both security problem and smooth operation for the user.
The mobile phone (MT) of the user is replacing the need for own communication channel for the lock and the infrastructure can be sure, that the mobile phone is in the proximity of the lock before opening the lock. Also the lock manager computer with Bluetooth is much cheaper to manufacture and to maintain than if the lock would have own GPRS-, WLAN- or Ethernet- connection for connecting to the gateway. This case, still the identity of the mobile phone must be verified through the telecomm or GPRS-network and the short distance communications is needed anyway for the proximity check, i.e. the user is close to the door, he wants to open. So, if the phone is to be used to open the lock, it is advantageous to use the user's phone for all the communications between the lock manager and the gateway. The amount of the data to be transferred is relatively small, much less than a kilobyte for authorization. In automatic mode the authorization is made relatively seldom. It is possible to use the text-messages (SMS) to transfer the authorization codes, but typically the GPRS is cheaper to use for a short two-way connection. The connection type is not relevant; the connection may as well be WLAN with user authentication, if available for the MT. The GW is connected to public internet, to mobile cellular network with SMS or with GPRS or equivalent, or to several communication channels or it may use external gateways for reception of SMS from public internet.

Claims

Claims
1. A method for remote controlling an electrical lock within an access control infrastructure including access database for access information and incidents, the lock being controlled by a door manager computer (DM), using mobile terminal (MT) with short range communication link (BT) to establish a communication link to the door manager (DM) and a mobile network connection (PNW) to establish a communication link to the access control infrastructure to communicate the authentication information between the door manager and the access control infrastructure, characterized by that the door manager (DM) sends a beacon signal to mobile terminal (MT) and the mobile terminal automatically communicates in a background process at least part of the authentication process with door manager (DM) before the user of the mobile terminal (MT) triggers the opening of the lock.
2. Method according to the claim 1, characterized by that the door manager (DM) is off-line and has no steady communications channel to the rest of the access control infrastructure except short range communications link (BT).
3. Method according to the claim 1 or 2, characterized by that the mobile terminal receives an authorization code from the access control infrastructure and the code is valid for short time and for one opening of the lock.
4. Method according to the claim 1 or 2, characterized by that the mobile terminal receives an authorization code from the access control infrastructure and the code is valid for a period of time for opening one or more locks one or more times.
5. A method according any of claims 1-4, characterized by the door manager (DM) being without other on-line means of communication than the communication link through the mobile terminals (MT) of the users.
6. A method according any of claims 1-4, characterized by sending the incident information in a public key encrypted message in a way that the mobile terminal (MT) cannot read or alter the messages, the messages may contain incident information of other users also.
7. An midlet/software for the phone, characterized by that the software uses short range communication link to establish a communication link to the door manager (DM) controlling an electronic lock and a mobile network connection to establish a communication link to the access control infrastructure to communicate the authentication information between the door manager and the access control infrastructure.
8. A gateway server (GW) software for use in a network element of a access control infrastructure performing the method according any of claims 1-5, characterized by the gateway server comprising means for simulating an network element of the access control infrastructure towards the access control network and means for communicating in safe way through the public network (PNW) to the mobile terminal (MT) of the lock user for communicating the authentication codes between the access control infrastructure and the mobile terminal (MT) having a short range communicating means (BT) to further by-pass the authentication information between the lock controller (DM) and the gateway (GW).
PCT/FI2006/050277 2005-06-23 2006-06-22 Communication method of access control system Ceased WO2006136662A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP06764516A EP1897066A4 (en) 2005-06-23 2006-06-22 Communication method of access control system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI20055344A FI20055344A0 (en) 2005-06-23 2005-06-23 Data transfer system for passage control
FI20055344 2005-06-23

Publications (1)

Publication Number Publication Date
WO2006136662A1 true WO2006136662A1 (en) 2006-12-28

Family

ID=34778480

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2006/050277 Ceased WO2006136662A1 (en) 2005-06-23 2006-06-22 Communication method of access control system

Country Status (3)

Country Link
EP (1) EP1897066A4 (en)
FI (1) FI20055344A0 (en)
WO (1) WO2006136662A1 (en)

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202007007611U1 (en) * 2007-04-17 2008-09-04 Bruch, Claus-Dieter Device for presence detection and / or access control
WO2008145803A1 (en) * 2007-05-25 2008-12-04 Kone Corporation Management system
EP2043055A1 (en) * 2007-09-28 2009-04-01 iLoq Oy Lock administration system
EP2146328A2 (en) 2008-07-18 2010-01-20 CargoGuard GmbH Lock for securing a safety container or area and method for securing the transport of a safety container
EP2192560A1 (en) * 2008-11-25 2010-06-02 Rockwell Automation Limited Access control
WO2011010052A1 (en) * 2009-07-21 2011-01-27 Openways Sas Secure control system for opening locking devices by encrypted acoustic accreditations
DE102010019467A1 (en) 2010-05-05 2011-11-10 Giesecke & Devrient Gmbh Contactless entry system for use in hotel to open door, has digital keys, where count contained in keys is compared with count stored in near-field enabled lock, and lock is released based on positive comparison result
WO2011159921A1 (en) * 2010-06-16 2011-12-22 Delphian Systems, LLC Wireless device enabled locking system
WO2012094667A1 (en) * 2011-01-07 2012-07-12 Delphian Systems, LLC System and method for access control via mobile device
CN102592338A (en) * 2012-02-06 2012-07-18 深圳市广宁实业有限公司 Method for controlling access control system by mobile terminal and access control system
US20120233687A1 (en) * 2011-03-08 2012-09-13 Metivier Pascal Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
GB2489509A (en) * 2011-03-31 2012-10-03 Lifealike Ltd Wireless device for door entry
FR2974590A1 (en) * 2011-04-28 2012-11-02 Sar Technologies Internat Method for authenticating unlocking of storage device of mobile telephone, involves comparing signal signature with signatures stored in memory, and generating instruction for opening locking mechanism of stopper when test is validated
WO2012151290A1 (en) * 2011-05-02 2012-11-08 Apigy Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
WO2013078561A1 (en) * 2011-11-29 2013-06-06 1556053 Alberta Ltd. Electronic wireless lock
US20140195810A1 (en) * 2012-10-11 2014-07-10 Openways Sas Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption
EP2816532A3 (en) * 2013-06-20 2015-01-07 Honeywell International Inc. Systems and methods for enabling access control via mobile devices
CN104680630A (en) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 Method and system for controlling door locks
WO2016007732A1 (en) * 2014-07-09 2016-01-14 Deja View Concepts, Inc. Bluetooth low energy for access control
CN105659523A (en) * 2013-10-23 2016-06-08 谷歌公司 Re-programmable secure cryptographic device
WO2016087478A1 (en) * 2014-12-02 2016-06-09 Inventio Ag Method for providing a visitor controlled access into a building
WO2017139220A1 (en) * 2016-02-11 2017-08-17 Carrier Corporation Soft badge-in system
CN107276639A (en) * 2017-06-12 2017-10-20 上海金念信息技术有限公司 A kind of bluetooth Near-field Data communicating circuit plate and its means of communication for IOS mobile terminals
WO2018204430A1 (en) * 2017-05-03 2018-11-08 Carrier Corporation On demand access control authorization using mobile devices
US10446012B2 (en) 2017-12-23 2019-10-15 Carrier Corporation Method and apparatus for detecting when a mobile device is left in a room
US10529156B2 (en) 2013-05-20 2020-01-07 Delphian Systems, LLC Access control via selective direct and indirect wireless communications
US10713869B2 (en) 2017-08-01 2020-07-14 The Chamberlain Group, Inc. System for facilitating access to a secured area
US11055942B2 (en) 2017-08-01 2021-07-06 The Chamberlain Group, Inc. System and method for facilitating access to a secured area
EP3847630A1 (en) * 2018-10-09 2021-07-14 Assa Abloy Ab Physical access control system and method
US11158144B2 (en) 2016-11-15 2021-10-26 Inventio Ag Access control system having automatic status update
US11354958B2 (en) 2010-06-16 2022-06-07 Delphian Systems, LLC Wireless device enabled locking system having different modalities
US11507711B2 (en) 2018-05-18 2022-11-22 Dollypup Productions, Llc. Customizable virtual 3-dimensional kitchen components
US11887424B2 (en) 2019-06-12 2024-01-30 Honeywell International Inc. Access control system using mobile device
US12027007B2 (en) 2021-03-01 2024-07-02 Honeywell International Inc. Building access using a mobile device
US12159497B2 (en) 2014-12-02 2024-12-03 Carrier Corporation Remote programming for access control system with virtual card data

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916464A (en) * 2010-08-25 2010-12-15 华南理工大学 Access control management method and device based on Zigbee technology
CN105488881A (en) * 2015-12-01 2016-04-13 南京邮电大学 Bluetooth-information-identifying-based vehicle access control system and method
CN106453251A (en) * 2016-09-05 2017-02-22 伟创达电子科技(深圳)有限公司 Internet-based cloud intercom monitoring system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001023694A1 (en) * 1999-09-27 2001-04-05 Tactel Ab Automatic locking system
WO2001074045A1 (en) * 2000-03-24 2001-10-04 Abb Metering Ltd. Transmission of control information
US20020031228A1 (en) * 2000-06-27 2002-03-14 Karkas Kalle J. Devices
FI114183B (en) * 2001-06-07 2004-08-31 Elisa Oyj Method and system for controlling a remote device by means of a terminal under the control of a central unit

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001023694A1 (en) * 1999-09-27 2001-04-05 Tactel Ab Automatic locking system
WO2001074045A1 (en) * 2000-03-24 2001-10-04 Abb Metering Ltd. Transmission of control information
US20020031228A1 (en) * 2000-06-27 2002-03-14 Karkas Kalle J. Devices
FI114183B (en) * 2001-06-07 2004-08-31 Elisa Oyj Method and system for controlling a remote device by means of a terminal under the control of a central unit

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1897066A4 *

Cited By (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202007007611U1 (en) * 2007-04-17 2008-09-04 Bruch, Claus-Dieter Device for presence detection and / or access control
WO2008145803A1 (en) * 2007-05-25 2008-12-04 Kone Corporation Management system
JP2010540802A (en) * 2007-09-28 2010-12-24 イロク オサケ ユキチュア Lock management system
EP2043055A1 (en) * 2007-09-28 2009-04-01 iLoq Oy Lock administration system
WO2009040470A3 (en) * 2007-09-28 2009-05-28 Iloq Oy Lock administration system
US8516250B2 (en) 2007-09-28 2013-08-20 Iloq Oy Lock administration system
CN101855653A (en) * 2007-09-28 2010-10-06 伊洛克公司 Lock administration system
EP2146328A3 (en) * 2008-07-18 2012-04-04 CargoGuard GmbH Lock for securing a safety container or area and method for securing the transport of a safety container
EP2146328A2 (en) 2008-07-18 2010-01-20 CargoGuard GmbH Lock for securing a safety container or area and method for securing the transport of a safety container
US8508332B2 (en) 2008-11-25 2013-08-13 Rockwell Automation Technologies, Inc. Access control
EP2192560A1 (en) * 2008-11-25 2010-06-02 Rockwell Automation Limited Access control
WO2011010052A1 (en) * 2009-07-21 2011-01-27 Openways Sas Secure control system for opening locking devices by encrypted acoustic accreditations
EP2282297A1 (en) * 2009-07-21 2011-02-09 Openways Sas Security system to control the opening of locking devices using encoded acoustic verifications
US8565725B2 (en) 2009-07-21 2013-10-22 Openways Sas Secure control system for opening locking devices by encrypted acoustic accreditations
DE102010019467A1 (en) 2010-05-05 2011-11-10 Giesecke & Devrient Gmbh Contactless entry system for use in hotel to open door, has digital keys, where count contained in keys is compared with count stored in near-field enabled lock, and lock is released based on positive comparison result
US20170365113A1 (en) * 2010-06-16 2017-12-21 Delphian Systems, LLC Wireless device enabled locking system
US9691201B2 (en) 2010-06-16 2017-06-27 Delphian Systems, LLC Wireless device enabled locking system
US11443577B2 (en) 2010-06-16 2022-09-13 Delphian Systems, LLC Wireless device enabled locking system
US11354958B2 (en) 2010-06-16 2022-06-07 Delphian Systems, LLC Wireless device enabled locking system having different modalities
CN103026682A (en) * 2010-06-16 2013-04-03 德尔斐系统有限公司 Wireless device enabled locking system
US20210233337A1 (en) * 2010-06-16 2021-07-29 Delphian Systems, LLC Wireless Device Enabled Locking System
US9077716B2 (en) 2010-06-16 2015-07-07 Delphian Systems, LLC Wireless device enabled locking system
US10832506B2 (en) * 2010-06-16 2020-11-10 Delphian Systems, LLC Wireless device enabled locking system
WO2011159921A1 (en) * 2010-06-16 2011-12-22 Delphian Systems, LLC Wireless device enabled locking system
CN103404105A (en) * 2011-01-07 2013-11-20 德尔斐系统有限公司 System and method for access control via mobile device
CN103404105B (en) * 2011-01-07 2016-12-07 德尔斐系统有限公司 The system and method for access and exit control is carried out by mobile device
US9781599B2 (en) 2011-01-07 2017-10-03 Delphian Systems, LLC System and method for access control via mobile device
WO2012094667A1 (en) * 2011-01-07 2012-07-12 Delphian Systems, LLC System and method for access control via mobile device
US8793784B2 (en) * 2011-03-08 2014-07-29 Openways Sas Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
US20120233687A1 (en) * 2011-03-08 2012-09-13 Metivier Pascal Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
GB2489509A (en) * 2011-03-31 2012-10-03 Lifealike Ltd Wireless device for door entry
US9571661B2 (en) 2011-03-31 2017-02-14 Klevio Limited Controller for a door entry system
FR2974590A1 (en) * 2011-04-28 2012-11-02 Sar Technologies Internat Method for authenticating unlocking of storage device of mobile telephone, involves comparing signal signature with signatures stored in memory, and generating instruction for opening locking mechanism of stopper when test is validated
US10382608B2 (en) 2011-05-02 2019-08-13 The Chamberlain Group, Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
US12219081B2 (en) 2011-05-02 2025-02-04 The Chamberlain Group Llc. Systems and methods for controlling a locking mechanism using a portable electronic device
WO2012151290A1 (en) * 2011-05-02 2012-11-08 Apigy Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
US10708410B2 (en) 2011-05-02 2020-07-07 The Chamberlain Group, Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
WO2013078561A1 (en) * 2011-11-29 2013-06-06 1556053 Alberta Ltd. Electronic wireless lock
US20130335193A1 (en) * 2011-11-29 2013-12-19 1556053 Alberta Ltd. Electronic wireless lock
CN102592338A (en) * 2012-02-06 2012-07-18 深圳市广宁实业有限公司 Method for controlling access control system by mobile terminal and access control system
US20140195810A1 (en) * 2012-10-11 2014-07-10 Openways Sas Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption
US9258281B2 (en) * 2012-10-11 2016-02-09 Openways Sas Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption
US10529156B2 (en) 2013-05-20 2020-01-07 Delphian Systems, LLC Access control via selective direct and indirect wireless communications
US11100736B2 (en) 2013-05-20 2021-08-24 Delphian Systems, LLC Access control via selective direct and indirect wireless communications
US10395452B2 (en) 2013-06-20 2019-08-27 Honeywell International Inc. Systems and methods for enabling access control via mobile devices
EP2816532A3 (en) * 2013-06-20 2015-01-07 Honeywell International Inc. Systems and methods for enabling access control via mobile devices
CN105659523A (en) * 2013-10-23 2016-06-08 谷歌公司 Re-programmable secure cryptographic device
EP3061204A4 (en) * 2013-10-23 2017-08-02 Google, Inc. Re-programmable secure cryptographic device
US10581814B2 (en) 2013-10-23 2020-03-03 Google Llc Re-programmable secure device
WO2016007732A1 (en) * 2014-07-09 2016-01-14 Deja View Concepts, Inc. Bluetooth low energy for access control
US20170206722A1 (en) * 2014-07-09 2017-07-20 Deja View Concepts, Inc. Bluetooth Low Energy for Access Control
US10521992B2 (en) 2014-12-02 2019-12-31 Inventio Ag Method for providing a visitor controlled access into a building
US12159497B2 (en) 2014-12-02 2024-12-03 Carrier Corporation Remote programming for access control system with virtual card data
WO2016087478A1 (en) * 2014-12-02 2016-06-09 Inventio Ag Method for providing a visitor controlled access into a building
CN104680630A (en) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 Method and system for controlling door locks
WO2017139220A1 (en) * 2016-02-11 2017-08-17 Carrier Corporation Soft badge-in system
US11158144B2 (en) 2016-11-15 2021-10-26 Inventio Ag Access control system having automatic status update
WO2018204430A1 (en) * 2017-05-03 2018-11-08 Carrier Corporation On demand access control authorization using mobile devices
US11501588B2 (en) 2017-05-03 2022-11-15 Carrier Corporation On demand access control authorization using mobile devices
CN107276639A (en) * 2017-06-12 2017-10-20 上海金念信息技术有限公司 A kind of bluetooth Near-field Data communicating circuit plate and its means of communication for IOS mobile terminals
CN107276639B (en) * 2017-06-12 2021-06-25 上海金念信息技术有限公司 Bluetooth near field data communication circuit board for IOS mobile terminal and communication method thereof
US11941929B2 (en) 2017-08-01 2024-03-26 The Chamberlain Group Llc System for facilitating access to a secured area
US11562610B2 (en) 2017-08-01 2023-01-24 The Chamberlain Group Llc System and method for facilitating access to a secured area
US11574512B2 (en) 2017-08-01 2023-02-07 The Chamberlain Group Llc System for facilitating access to a secured area
US11055942B2 (en) 2017-08-01 2021-07-06 The Chamberlain Group, Inc. System and method for facilitating access to a secured area
US12106623B2 (en) 2017-08-01 2024-10-01 The Chamberlain Group Llc System and method for facilitating access to a secured area
US10713869B2 (en) 2017-08-01 2020-07-14 The Chamberlain Group, Inc. System for facilitating access to a secured area
US10446012B2 (en) 2017-12-23 2019-10-15 Carrier Corporation Method and apparatus for detecting when a mobile device is left in a room
US11507711B2 (en) 2018-05-18 2022-11-22 Dollypup Productions, Llc. Customizable virtual 3-dimensional kitchen components
EP3847630A1 (en) * 2018-10-09 2021-07-14 Assa Abloy Ab Physical access control system and method
US11887424B2 (en) 2019-06-12 2024-01-30 Honeywell International Inc. Access control system using mobile device
US12027007B2 (en) 2021-03-01 2024-07-02 Honeywell International Inc. Building access using a mobile device
US12367726B2 (en) 2021-03-01 2025-07-22 Honeywell International Inc. Building access using a mobile device

Also Published As

Publication number Publication date
FI20055344A0 (en) 2005-06-23
EP1897066A4 (en) 2010-09-15
EP1897066A1 (en) 2008-03-12

Similar Documents

Publication Publication Date Title
WO2006136662A1 (en) Communication method of access control system
CA2632298C (en) Integrated access control system and a method of controlling the same
US7012503B2 (en) Electronic key device a system and a method of managing electronic key information
CN103248484B (en) Access control system and method
EP1810093B1 (en) Actuating a security system using a wireless device
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN104732636B (en) Bluetooth cellphone-based intelligent community access control system and control method thereof
US6975202B1 (en) Electronic key system, apparatus and method
US9437061B2 (en) Arrangement for the authorised access of at least one structural element located in a building
CA2324679A1 (en) Method and system for physical access control using wireless connection to a network
GB2417858A (en) Access control device using mobile phones for automatic wireless access with secure codes and biometrics data
RU2310233C2 (en) Method and device for controlling access
KR100422377B1 (en) System and method for maintenance of public security and exit and entrance control using bar code displayed liquid crystal display
CA3080097A1 (en) Managing and controlling access to secured areas
JP2007034974A (en) Security system
CA2360120C (en) Door access control and key management system and the method thereof
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
KR102883873B1 (en) Multi-factor authentication hub device for access control and multi-factor authentication relay system including the same
CN113936364B (en) Method and device for checking out of network-connected hotel electronic door lock
CN118968662A (en) How to unlock the smart cash box
KR20230097632A (en) A method and apparatus for LwM2M-based AMI device authentication using blockchain
TW202420245A (en) Access management system
JP2007279906A (en) Network access management system
DK201200065U3 (en) Controlling access to a place
JP2004250888A (en) Access control system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2006764516

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

WWP Wipo information: published in national office

Ref document number: 2006764516

Country of ref document: EP