WO2006136662A1 - Procede de communication d'un systeme de commande d'acces - Google Patents
Procede de communication d'un systeme de commande d'acces Download PDFInfo
- Publication number
- WO2006136662A1 WO2006136662A1 PCT/FI2006/050277 FI2006050277W WO2006136662A1 WO 2006136662 A1 WO2006136662 A1 WO 2006136662A1 FI 2006050277 W FI2006050277 W FI 2006050277W WO 2006136662 A1 WO2006136662 A1 WO 2006136662A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access control
- lock
- mobile terminal
- control infrastructure
- door
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
Definitions
- the invention relates to access control systems and especially to mobile communication between the lock and the access control system.
- the objective of the invention is to create a cost effective way to connect a lock in separate premises to a centralized control system with minimum required hardware and to create a way for occasional visitors to get the access licence for a remote lock in cost efficient and easy way.
- the present access control systems are based on hierarchical structure.
- the database of the access control data is in one server, and the database is at least partially copied to the lower level servers. If the main database server is down or disconnected from the network, the rest of the system works still autonomously. All the lower level components are working in the same way. This makes the system fail tolerant, only updating of the control data is delayed, if the connection to the control data database is lost.
- one building has at least one server for managing doors and routing the communications between the door controllers and the rest of the infrastructure. This makes it very costly to connect a separate building with only one controlled door to the infrastructure.
- a lock needs to be connected in some way to the server in order to get the access right information from the database and report the transactions to the database.
- the problem is that the needed infrastructure is very expensive for one separate door, as the cost of servers and network infrastructure is needed only for small amount of doors in one building and the need for temporary keys and connection to infrastructure is still needed for security.
- An example of that kind of access control need is for a telecommunications switch, a cross-connection closet, a base station, or a transformer room or other kind of technical premises that are not maintained by the occupant of the house. In this case, often the visitors should be logged and the access licences should often be only for some hours at a time.
- the lock is standalone, the present infrastructure model needs communication channel, and local infrastructure for even only one lock. This is extremely expensive, as only one lock shares a communications server and door manager and the wiring in also a considerable cost.
- the aim of invention is to create an inexpensive infrastructure for a single or only a few doors to connect to the access control infrastructure without needing any costly cabling, computer system or complicated configuration. Further the aim is to create an easy way to grant access licences and to track use of them. Further the licences should be granted without distributing access control tag or badges to users.
- the invention makes effectively use of the existing access control infrastructure, connecting only a gateway to the controlling servers of the access control infrastructure.
- the communications between the lock controller and the gateway is enabled by a mobile terminal of the lock user.
- This makes the infrastructure cost per door very small, the lock is off-line, but the user's mobile terminal is online-key to it, and the infrastructure is able to log events and use up-to-date licensing and key-database with minimal changes to the existing system.
- the user identification is based on the mobile terminal's phone number (embedded in the phone's SW) and an (optional) password inquiry which makes the identification fairly safe. This makes it possible to give an authorization to a user of defined phone number and password instead of giving authorization to a key badge that must be sent in advance to the user.
- the licences can be easily granted to a user of other organization, and still having a track of at least the phone number of the user.
- the invention is based on using an on-line mobile terminal as a key and communication gateway for an off-line lock.
- the lock is still controlled by the infrastructure for each event, if necessary.
- Another object is to grant and cancel "keys" or licences to mobile terminal users without a badge.
- Fig 1 Schematic diagram of a known access control infrastructure
- Fig 2 Schematic diagram of the arrangement according to the invention
- Figure 1 shows an example of an infrastructure of existing technology.
- the system is redundant and hierarchical, geographically distributed.
- Database server DS also called application server
- Communication Servers CS are often in same strictly guarded premises with database server DS.
- Door manager controllers DMC are based for each location, and finally the door managers DM are reading the badges, communicating with the rest of the infrastructure and monitoring the door.
- the complicated hierarchical system is necessary for decentralizing and for fault-proofing. Also the load balancing is one issue, so that the data base can be updated hierarchically.
- door manager DM is a small computer with I/0-lines for communication to DMC and for controlling the lock, reading badges or cards, motion detection, or for example to connect to biometric devices.
- one separate lock in one building needs always 2 computers, namely Door Manager DM and Door manager controller DMC and the wiring and communications channel from the building to the access manager. Therefore, connecting one separate door to the system needs a lot work and expensive hardware.
- FIG. 2 shows infrastructure needed for a door controlled with method according to the invention.
- the Front Manager and the Door manager controller is replaced by a Gateway GW, and a mobile terminal MT.
- the Lock Manager sends its identification to the mobile terminal MT.
- the software in the mobile terminal MT sends the identification information of the door together with the identification information of the MT itself to GW.
- the gateway is connected to DS, so it acts like a CS. If gateway is under a CS, it acts like a DMC towards the closed network of the infrastructure.
- the port of the gateway is connected to public network PNW, for example to internet or to public telecomm network or to public mobile network through which the mobile terminal can communicates with the gateway.
- public network PNW for example to internet or to public telecomm network or to public mobile network through which the mobile terminal can communicates with the gateway.
- the door manager used in the method according to the invention may be much simpler than the door manager in the system of figure 1.
- the door manager in the system according to the invention may have very limited amount of connections.
- the necessary connections for the DM are power supply, Bluetooth and lock control, maybe also keyboard.
- the door manager should have enough processing power for encrypting messages and memory for storing the encryption keys and badge key codes and their validity information.
- the gateway server is working as a link between the mobile net or the internet or other equivalent communications media (PNW) and the network of the access control infrastructure.
- the later network is usually physically strictly isolated, usually inside locked and guarded room.
- the gateway is acting towards the servers of the access control infrastructure as a network element of the infrastructure. Therefore, there is no need for change of configure the infrastructure, the system according the invention is bolt-on solution, that is transparent to the rest of the infrastructure.
- the lock is controlled by a door manager DM next to the lock.
- the controller includes a short range communication means (BT), for example a display, Bluetooth, IrDA or WLAN.
- BT short range communication means
- BT Bluetooth is the preferred option, but also WLAN or even manual entry with keyboard and a display is a possible option, even it is more expensive to install, and inconvenient and slow for the user.
- the short-range communication means (BT) are used to send the identifying information of the lock to a mobile terminal of the user of the lock. In the mobile terminal there is a midlet that recognizes the identifying information, and possibly the midlet asks confirmation or password from the user. After that, the terminal sends the identifying information of the user, itself and the lock to the gateway.
- the lock uses first a beacon-signal, after a MT makes a communication link with the DM; the DM sends a single use random code to MT.
- the MT sends this random code, its own identification information and maybe a pass code of the user to GW.
- GW verifies the message, sends an encrypted, unique reply to the MT, and MT can use the content of the reply once or several times to open the door by sending the content of message from GW to the DM.
- the gateway sends the information in a form of a key and the lock information and asks authentication from the infrastructure to open the lock. In the same time the GW send the auditing information of the users acts. In case of later described automatic mode, where the key code is valid for opening the lock several times, the GW does not necessarily get the auditing information immediately or maybe never gets detailed information about all the incidents. If the key code is valid for single use only, the infrastructure is always aware of all the incidents.
- All the communications are preferably encrypted with public key encryption, preferably the messages include a single use random number to ensure that recording or copying the message is not useful for fraud.
- the communications in the public network must be encrypted.
- the public key encryption is easier, as the mobile terminal needs not to exchange secret key.
- random encryption keys for each communication session there is no way for outsider to track the users by capturing the radio- communications, as only the door beacon is always the same and the first connection of the MT is already encrypted with the public single use key of the DM.
- the DM and GW may know each others public keys, so they do not need to change the public key every time, but the message needs to have an order number or time stamp, so that the code is unique.
- the gateway is critical point, as it connects the closed network to the public network.
- the gateway may be therefore a combination of several computers, for example a firewall and a gateway. This makes cracking into the closed network more difficult, as both computers in serial must be cracked.
- the system can work in two different modes, manual mode works every time on-line.
- manual mode the mobile terminal asks every time the authorization information from the central lock infrastructure. The authorization is therefore for single use.
- automatic mode the mobile terminal may ask the authorization automatically in a background process and the authorization is valid for a time period.
- the mobile terminal asks an authorization that is valid for a certain time interval and maybe also for a set of doors.
- the phone may ask a new authorization after the old authorization is expired. This may be done automatically in a background process or when first time trying to open the door after the expiration or when entering to the coverage area of the DM transmitter.
- the authorization for multiple uses is easier to abuse, but the opening the door does not need to open the GPRS-connection to the gateway, so the opening of the lock is practically instantaneous.
- the automatic mode is preferably using public key encryption, so that the lock uses every time a different code, and the mobile terminal uses its authorization code for creating the reply message. The opening message is never the same twice, so capturing the message would not make possible to copy the authorization.
- the automatic mode authorization code is not normally easy to cancel, so the automatic "key code" should be for moderately short period.
- the lock controller may have a list of cancelled codes, but it can be updated only if there is a communication channel to the infrastructure.
- automatic mode is used for less critical areas, where a lost phone and key code is not critical.
- the software in the mobile phone may also be able to cancel the code by remote control from the network. If the code of the MT software is for example Java, this is moderately easy to tamper by end user and the cancelling may be inactivated.
- the key codes are valid only for some hours, so the probability of misuse of a lost phone is relatively small in any case.
- the infrastructure may command the lock (DM) to manual mode, that case the next mobile terminal requesting a key does not receive automatic mode key-code but a command to enter manual mode, this code may be encrypted and transparent for the MT, so it is not possible to tamper.
- the message from GW may also contain more information, a list of banned key- codes, and the lock manager may send access information to the infrastructure with the authorization request.
- the off-line lock is practically on-line each time there is a transaction with first to MT and maybe later (automatic mode) to GW, as the communications is preferably encrypted with keys of DM and GW, the MT is not able to detect or alter the contents of the messages. So there no easy way to false any codes, as the MT can be also recognized by the mobile network, as the MT has unique number and also it is possible to detect the IMEI and the MT software serial number together with the software password, if necessary.
- the mobile terminal is listening in a background process the beacon signals and the mobile terminal automatically makes a contact to the door managers (DM) the mobile terminal assumes the user may want to open or the user may have access rights.
- the phone may also ask automatically a short term ticket for each door, or open a connectionless channel to GW in advance.
- the infrastructure also receives more often information from the door managers and the infrastructure gats also information about the movement of the users, even they do not open any door. This enables higher security, and the door managers may receive cancelling message of user rights faster, as any user nearby can relay the information between the DM and GW. Also the stolen MT or user with cancelled user rights may cause alarm even by entering to the coverage of any DM.
- This background process is cost effective, as the GPRS data needed is very limited and the Bluetooth is mainly only receiving.
- the battery consumption of the mobile terminal is not raised too much and a few kilobytes of data sent automatically are not too costly to send over GPRS or UMTS even in daily bases.
- the time for opening in full manual mode is around 10 to 20 seconds more than in the automatic mode with background negotiating in advance.
- the opening tickets expiry times may vary from some minutes to days.
- the operation of door is virtually immediate, the user selects the door from the door list and the door opens immediately.
- the beacon signals of the doors enable the mobile terminals to connect to all the DMs that are in the range of the Bluetooth, and therefore the Bluetooth connection to the DM is ready all the time, and if the opening "key code" or ticket is asked in advance from the GW, the phone can open the door immediately.
- the phone next time takes contact to the GW, and the door the incident information is sent to the GW.
- the DM and GW can track the communications and if there is fraud detected the user may be banned and the system makes an alarm.
- the fraud may be for example, that the terminal is refusing to pass the messages after opening the door. That case the alarm may be set, and also the next user's terminal is passing the necessary information in any case.
- There is no easy way to prevent the incident information transmission as the encrypted message content is not readable by the mobile terminal, and the user cannot control the message content.
- the method is as fast for the user as a pass code ticket stored in the mobile terminal used in the prior art.
- the pure gateway solution for data transmission via mobile phone offers high security for the user identification, and the user rights may be checked for each incident. But if the authentication is not prepared in advance, the opening of the lock takes typically over ten seconds, which is annoyingly slow.
- the automatic negotiation and frequent connection between the lock and the lock solves both security problem and smooth operation for the user.
- the mobile phone (MT) of the user is replacing the need for own communication channel for the lock and the infrastructure can be sure, that the mobile phone is in the proximity of the lock before opening the lock.
- the lock manager computer with Bluetooth is much cheaper to manufacture and to maintain than if the lock would have own GPRS-, WLAN- or Ethernet- connection for connecting to the gateway.
- This case still the identity of the mobile phone must be verified through the telecomm or GPRS-network and the short distance communications is needed anyway for the proximity check, i.e. the user is close to the door, he wants to open. So, if the phone is to be used to open the lock, it is advantageous to use the user's phone for all the communications between the lock manager and the gateway.
- the amount of the data to be transferred is relatively small, much less than a kilobyte for authorization. In automatic mode the authorization is made relatively seldom. It is possible to use the text-messages (SMS) to transfer the authorization codes, but typically the GPRS is cheaper to use for a short two-way connection.
- SMS text-messages
- the connection type is not relevant; the connection may as well be WLAN with user authentication, if available for the MT.
- the GW is connected to public internet, to mobile cellular network with SMS or with GPRS or equivalent, or to several communication channels or it may use external gateways for reception of SMS from public internet.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention concerne un procédé pour télécommander un verrou électrique à l'intérieur d'une infrastructure de commande d'accès comprenant une base de données d'accès pour accéder à des informations et à des incidents, le verrou étant commandé par un ordinateur gestionnaire de porte (DM). Ce procédé fait appel à un terminal mobile (MT) à liaison de communication à courte distance (BT) pour établir une communication avec le gestionnaire de porte (DM) et à une connexion de réseau mobile (PNW) pour établir une communication avec l'infrastructure de commande d'accès et communiquer l'information d'authentification entre le gestionnaire de porte et l'infrastructure de commande d'accès.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP06764516A EP1897066A4 (fr) | 2005-06-23 | 2006-06-22 | Procede de communication d'un systeme de commande d'acces |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FI20055344 | 2005-06-23 | ||
| FI20055344A FI20055344A0 (fi) | 2005-06-23 | 2005-06-23 | Kulunvalvontajärjestelmän tiedonsiirtomenetelmä |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2006136662A1 true WO2006136662A1 (fr) | 2006-12-28 |
Family
ID=34778480
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/FI2006/050277 Ceased WO2006136662A1 (fr) | 2005-06-23 | 2006-06-22 | Procede de communication d'un systeme de commande d'acces |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP1897066A4 (fr) |
| FI (1) | FI20055344A0 (fr) |
| WO (1) | WO2006136662A1 (fr) |
Cited By (35)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE202007007611U1 (de) * | 2007-04-17 | 2008-09-04 | Bruch, Claus-Dieter | Vorrichtung zur Anwesenheitserfassung und/oder Zugangskontrolle |
| WO2008145803A1 (fr) * | 2007-05-25 | 2008-12-04 | Kone Corporation | Système de gestion |
| EP2043055A1 (fr) * | 2007-09-28 | 2009-04-01 | iLoq Oy | Verrouillage de système d'administration |
| EP2146328A2 (fr) | 2008-07-18 | 2010-01-20 | CargoGuard GmbH | Serrure de sécurité d'un récipient ou d'une pièce de sécurité et procédé de sécurisation du transport d'un récipient de sécurité |
| EP2192560A1 (fr) * | 2008-11-25 | 2010-06-02 | Rockwell Automation Limited | Contrôle d'accès |
| WO2011010052A1 (fr) * | 2009-07-21 | 2011-01-27 | Openways Sas | Systeme securise de commande d'ouverture de dispositifs de serrure par accreditations acoustiques chiffrees |
| DE102010019467A1 (de) | 2010-05-05 | 2011-11-10 | Giesecke & Devrient Gmbh | Kontaktlos arbeitendes Zugangssystem |
| WO2011159921A1 (fr) * | 2010-06-16 | 2011-12-22 | Delphian Systems, LLC | Système de verrouillage activé par un dispositif sans fil |
| WO2012094667A1 (fr) * | 2011-01-07 | 2012-07-12 | Delphian Systems, LLC | Système et procédé permettant un contrôle d'accès par l'intermédiaire d'un dispositif mobile |
| CN102592338A (zh) * | 2012-02-06 | 2012-07-18 | 深圳市广宁实业有限公司 | 移动终端控制门禁系统的方法及门禁系统 |
| US20120233687A1 (en) * | 2011-03-08 | 2012-09-13 | Metivier Pascal | Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone |
| GB2489509A (en) * | 2011-03-31 | 2012-10-03 | Lifealike Ltd | Wireless device for door entry |
| FR2974590A1 (fr) * | 2011-04-28 | 2012-11-02 | Sar Technologies Internat | Procede de deverrouillage d'un acces a une zone de rangement, dispositif de stockage et de fermeture. |
| WO2012151290A1 (fr) * | 2011-05-02 | 2012-11-08 | Apigy Inc. | Systèmes et procédés de commande d'un mécanisme de verrouillage à l'aide d'un dispositif électronique portable |
| WO2013078561A1 (fr) * | 2011-11-29 | 2013-06-06 | 1556053 Alberta Ltd. | Verrou électronique sans fil |
| US20140195810A1 (en) * | 2012-10-11 | 2014-07-10 | Openways Sas | Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption |
| EP2816532A3 (fr) * | 2013-06-20 | 2015-01-07 | Honeywell International Inc. | Systèmes et procédés permettant un contrôle d'accès via des dispositifs mobiles |
| CN104680630A (zh) * | 2014-12-29 | 2015-06-03 | 深圳市进林科技有限公司 | 一种控制门锁的方法和系统 |
| WO2016007732A1 (fr) * | 2014-07-09 | 2016-01-14 | Deja View Concepts, Inc. | Bluetooth basse énergie pour contrôle d'accès |
| CN105659523A (zh) * | 2013-10-23 | 2016-06-08 | 谷歌公司 | 能够重新编程的安全密码设备 |
| WO2016087478A1 (fr) * | 2014-12-02 | 2016-06-09 | Inventio Ag | Procédé permettant de fournir un contrôle d'accès des visiteurs dans un bâtiment |
| WO2017139220A1 (fr) * | 2016-02-11 | 2017-08-17 | Carrier Corporation | Système d'entrée par badge souple |
| CN107276639A (zh) * | 2017-06-12 | 2017-10-20 | 上海金念信息技术有限公司 | 一种用于ios移动端的蓝牙近场数据通讯电路板及其通讯方法 |
| WO2018204430A1 (fr) * | 2017-05-03 | 2018-11-08 | Carrier Corporation | Autorisation de commande d'accès à la demande au moyen de dispositifs mobiles |
| US10446012B2 (en) | 2017-12-23 | 2019-10-15 | Carrier Corporation | Method and apparatus for detecting when a mobile device is left in a room |
| US10529156B2 (en) | 2013-05-20 | 2020-01-07 | Delphian Systems, LLC | Access control via selective direct and indirect wireless communications |
| US10713869B2 (en) | 2017-08-01 | 2020-07-14 | The Chamberlain Group, Inc. | System for facilitating access to a secured area |
| US11055942B2 (en) | 2017-08-01 | 2021-07-06 | The Chamberlain Group, Inc. | System and method for facilitating access to a secured area |
| EP3847630A1 (fr) * | 2018-10-09 | 2021-07-14 | Assa Abloy Ab | Système et procédé de contrôle d'accès physique |
| US11158144B2 (en) | 2016-11-15 | 2021-10-26 | Inventio Ag | Access control system having automatic status update |
| US11354958B2 (en) | 2010-06-16 | 2022-06-07 | Delphian Systems, LLC | Wireless device enabled locking system having different modalities |
| US11507711B2 (en) | 2018-05-18 | 2022-11-22 | Dollypup Productions, Llc. | Customizable virtual 3-dimensional kitchen components |
| US11887424B2 (en) | 2019-06-12 | 2024-01-30 | Honeywell International Inc. | Access control system using mobile device |
| US12027007B2 (en) | 2021-03-01 | 2024-07-02 | Honeywell International Inc. | Building access using a mobile device |
| US12159497B2 (en) | 2014-12-02 | 2024-12-03 | Carrier Corporation | Remote programming for access control system with virtual card data |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101916464A (zh) * | 2010-08-25 | 2010-12-15 | 华南理工大学 | 基于Zigbee技术的门禁管理方法及装置 |
| CN105488881A (zh) * | 2015-12-01 | 2016-04-13 | 南京邮电大学 | 一种基于蓝牙信息识别的车辆出入管理系统和方法 |
| CN106453251A (zh) * | 2016-09-05 | 2017-02-22 | 伟创达电子科技(深圳)有限公司 | 基于互联网的云对讲监控系统 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001023694A1 (fr) * | 1999-09-27 | 2001-04-05 | Tactel Ab | Systeme de verrouillage automatique |
| WO2001074045A1 (fr) * | 2000-03-24 | 2001-10-04 | Abb Metering Ltd. | Transmission d'informations de commande |
| US20020031228A1 (en) * | 2000-06-27 | 2002-03-14 | Karkas Kalle J. | Devices |
| FI114183B (fi) * | 2001-06-07 | 2004-08-31 | Elisa Oyj | Menetelmä ja järjestelmä etälaitteen ohjaamiseksi päätelaitteen avulla keskusyksikön valvonnan alaisesti |
-
2005
- 2005-06-23 FI FI20055344A patent/FI20055344A0/fi not_active Application Discontinuation
-
2006
- 2006-06-22 WO PCT/FI2006/050277 patent/WO2006136662A1/fr not_active Ceased
- 2006-06-22 EP EP06764516A patent/EP1897066A4/fr not_active Withdrawn
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001023694A1 (fr) * | 1999-09-27 | 2001-04-05 | Tactel Ab | Systeme de verrouillage automatique |
| WO2001074045A1 (fr) * | 2000-03-24 | 2001-10-04 | Abb Metering Ltd. | Transmission d'informations de commande |
| US20020031228A1 (en) * | 2000-06-27 | 2002-03-14 | Karkas Kalle J. | Devices |
| FI114183B (fi) * | 2001-06-07 | 2004-08-31 | Elisa Oyj | Menetelmä ja järjestelmä etälaitteen ohjaamiseksi päätelaitteen avulla keskusyksikön valvonnan alaisesti |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP1897066A4 * |
Cited By (73)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE202007007611U1 (de) * | 2007-04-17 | 2008-09-04 | Bruch, Claus-Dieter | Vorrichtung zur Anwesenheitserfassung und/oder Zugangskontrolle |
| WO2008145803A1 (fr) * | 2007-05-25 | 2008-12-04 | Kone Corporation | Système de gestion |
| JP2010540802A (ja) * | 2007-09-28 | 2010-12-24 | イロク オサケ ユキチュア | 錠管理システム |
| EP2043055A1 (fr) * | 2007-09-28 | 2009-04-01 | iLoq Oy | Verrouillage de système d'administration |
| WO2009040470A3 (fr) * | 2007-09-28 | 2009-05-28 | Iloq Oy | Système de gestion de verrous |
| US8516250B2 (en) | 2007-09-28 | 2013-08-20 | Iloq Oy | Lock administration system |
| CN101855653A (zh) * | 2007-09-28 | 2010-10-06 | 伊洛克公司 | 锁管理系统 |
| EP2146328A3 (fr) * | 2008-07-18 | 2012-04-04 | CargoGuard GmbH | Serrure de sécurité d'un récipient ou d'une pièce de sécurité et procédé de sécurisation du transport d'un récipient de sécurité |
| EP2146328A2 (fr) | 2008-07-18 | 2010-01-20 | CargoGuard GmbH | Serrure de sécurité d'un récipient ou d'une pièce de sécurité et procédé de sécurisation du transport d'un récipient de sécurité |
| US8508332B2 (en) | 2008-11-25 | 2013-08-13 | Rockwell Automation Technologies, Inc. | Access control |
| EP2192560A1 (fr) * | 2008-11-25 | 2010-06-02 | Rockwell Automation Limited | Contrôle d'accès |
| WO2011010052A1 (fr) * | 2009-07-21 | 2011-01-27 | Openways Sas | Systeme securise de commande d'ouverture de dispositifs de serrure par accreditations acoustiques chiffrees |
| EP2282297A1 (fr) * | 2009-07-21 | 2011-02-09 | Openways Sas | Système sécurisé de commande d'ouverture de dispositifs de serrure par accréditions acoustiques chiffrées |
| US8565725B2 (en) | 2009-07-21 | 2013-10-22 | Openways Sas | Secure control system for opening locking devices by encrypted acoustic accreditations |
| DE102010019467A1 (de) | 2010-05-05 | 2011-11-10 | Giesecke & Devrient Gmbh | Kontaktlos arbeitendes Zugangssystem |
| US20170365113A1 (en) * | 2010-06-16 | 2017-12-21 | Delphian Systems, LLC | Wireless device enabled locking system |
| US9691201B2 (en) | 2010-06-16 | 2017-06-27 | Delphian Systems, LLC | Wireless device enabled locking system |
| US11443577B2 (en) | 2010-06-16 | 2022-09-13 | Delphian Systems, LLC | Wireless device enabled locking system |
| US11354958B2 (en) | 2010-06-16 | 2022-06-07 | Delphian Systems, LLC | Wireless device enabled locking system having different modalities |
| CN103026682A (zh) * | 2010-06-16 | 2013-04-03 | 德尔斐系统有限公司 | 无线装置启动锁定系统 |
| US20210233337A1 (en) * | 2010-06-16 | 2021-07-29 | Delphian Systems, LLC | Wireless Device Enabled Locking System |
| US9077716B2 (en) | 2010-06-16 | 2015-07-07 | Delphian Systems, LLC | Wireless device enabled locking system |
| US10832506B2 (en) * | 2010-06-16 | 2020-11-10 | Delphian Systems, LLC | Wireless device enabled locking system |
| WO2011159921A1 (fr) * | 2010-06-16 | 2011-12-22 | Delphian Systems, LLC | Système de verrouillage activé par un dispositif sans fil |
| CN103404105A (zh) * | 2011-01-07 | 2013-11-20 | 德尔斐系统有限公司 | 通过移动装置进行出入控制的系统和方法 |
| CN103404105B (zh) * | 2011-01-07 | 2016-12-07 | 德尔斐系统有限公司 | 通过移动装置进行出入控制的系统和方法 |
| US9781599B2 (en) | 2011-01-07 | 2017-10-03 | Delphian Systems, LLC | System and method for access control via mobile device |
| WO2012094667A1 (fr) * | 2011-01-07 | 2012-07-12 | Delphian Systems, LLC | Système et procédé permettant un contrôle d'accès par l'intermédiaire d'un dispositif mobile |
| US8793784B2 (en) * | 2011-03-08 | 2014-07-29 | Openways Sas | Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone |
| US20120233687A1 (en) * | 2011-03-08 | 2012-09-13 | Metivier Pascal | Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone |
| GB2489509A (en) * | 2011-03-31 | 2012-10-03 | Lifealike Ltd | Wireless device for door entry |
| US9571661B2 (en) | 2011-03-31 | 2017-02-14 | Klevio Limited | Controller for a door entry system |
| FR2974590A1 (fr) * | 2011-04-28 | 2012-11-02 | Sar Technologies Internat | Procede de deverrouillage d'un acces a une zone de rangement, dispositif de stockage et de fermeture. |
| US10382608B2 (en) | 2011-05-02 | 2019-08-13 | The Chamberlain Group, Inc. | Systems and methods for controlling a locking mechanism using a portable electronic device |
| US12219081B2 (en) | 2011-05-02 | 2025-02-04 | The Chamberlain Group Llc. | Systems and methods for controlling a locking mechanism using a portable electronic device |
| WO2012151290A1 (fr) * | 2011-05-02 | 2012-11-08 | Apigy Inc. | Systèmes et procédés de commande d'un mécanisme de verrouillage à l'aide d'un dispositif électronique portable |
| US10708410B2 (en) | 2011-05-02 | 2020-07-07 | The Chamberlain Group, Inc. | Systems and methods for controlling a locking mechanism using a portable electronic device |
| WO2013078561A1 (fr) * | 2011-11-29 | 2013-06-06 | 1556053 Alberta Ltd. | Verrou électronique sans fil |
| US20130335193A1 (en) * | 2011-11-29 | 2013-12-19 | 1556053 Alberta Ltd. | Electronic wireless lock |
| CN102592338A (zh) * | 2012-02-06 | 2012-07-18 | 深圳市广宁实业有限公司 | 移动终端控制门禁系统的方法及门禁系统 |
| US20140195810A1 (en) * | 2012-10-11 | 2014-07-10 | Openways Sas | Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption |
| US9258281B2 (en) * | 2012-10-11 | 2016-02-09 | Openways Sas | Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption |
| US10529156B2 (en) | 2013-05-20 | 2020-01-07 | Delphian Systems, LLC | Access control via selective direct and indirect wireless communications |
| US11100736B2 (en) | 2013-05-20 | 2021-08-24 | Delphian Systems, LLC | Access control via selective direct and indirect wireless communications |
| US10395452B2 (en) | 2013-06-20 | 2019-08-27 | Honeywell International Inc. | Systems and methods for enabling access control via mobile devices |
| EP2816532A3 (fr) * | 2013-06-20 | 2015-01-07 | Honeywell International Inc. | Systèmes et procédés permettant un contrôle d'accès via des dispositifs mobiles |
| CN105659523A (zh) * | 2013-10-23 | 2016-06-08 | 谷歌公司 | 能够重新编程的安全密码设备 |
| EP3061204A4 (fr) * | 2013-10-23 | 2017-08-02 | Google, Inc. | Dispositif cryptographique sécurisé reprogrammable |
| US10581814B2 (en) | 2013-10-23 | 2020-03-03 | Google Llc | Re-programmable secure device |
| WO2016007732A1 (fr) * | 2014-07-09 | 2016-01-14 | Deja View Concepts, Inc. | Bluetooth basse énergie pour contrôle d'accès |
| US20170206722A1 (en) * | 2014-07-09 | 2017-07-20 | Deja View Concepts, Inc. | Bluetooth Low Energy for Access Control |
| US10521992B2 (en) | 2014-12-02 | 2019-12-31 | Inventio Ag | Method for providing a visitor controlled access into a building |
| US12159497B2 (en) | 2014-12-02 | 2024-12-03 | Carrier Corporation | Remote programming for access control system with virtual card data |
| WO2016087478A1 (fr) * | 2014-12-02 | 2016-06-09 | Inventio Ag | Procédé permettant de fournir un contrôle d'accès des visiteurs dans un bâtiment |
| CN104680630A (zh) * | 2014-12-29 | 2015-06-03 | 深圳市进林科技有限公司 | 一种控制门锁的方法和系统 |
| WO2017139220A1 (fr) * | 2016-02-11 | 2017-08-17 | Carrier Corporation | Système d'entrée par badge souple |
| US11158144B2 (en) | 2016-11-15 | 2021-10-26 | Inventio Ag | Access control system having automatic status update |
| WO2018204430A1 (fr) * | 2017-05-03 | 2018-11-08 | Carrier Corporation | Autorisation de commande d'accès à la demande au moyen de dispositifs mobiles |
| US11501588B2 (en) | 2017-05-03 | 2022-11-15 | Carrier Corporation | On demand access control authorization using mobile devices |
| CN107276639A (zh) * | 2017-06-12 | 2017-10-20 | 上海金念信息技术有限公司 | 一种用于ios移动端的蓝牙近场数据通讯电路板及其通讯方法 |
| CN107276639B (zh) * | 2017-06-12 | 2021-06-25 | 上海金念信息技术有限公司 | 一种用于ios移动端的蓝牙近场数据通讯电路板及其通讯方法 |
| US11941929B2 (en) | 2017-08-01 | 2024-03-26 | The Chamberlain Group Llc | System for facilitating access to a secured area |
| US11562610B2 (en) | 2017-08-01 | 2023-01-24 | The Chamberlain Group Llc | System and method for facilitating access to a secured area |
| US11574512B2 (en) | 2017-08-01 | 2023-02-07 | The Chamberlain Group Llc | System for facilitating access to a secured area |
| US11055942B2 (en) | 2017-08-01 | 2021-07-06 | The Chamberlain Group, Inc. | System and method for facilitating access to a secured area |
| US12106623B2 (en) | 2017-08-01 | 2024-10-01 | The Chamberlain Group Llc | System and method for facilitating access to a secured area |
| US10713869B2 (en) | 2017-08-01 | 2020-07-14 | The Chamberlain Group, Inc. | System for facilitating access to a secured area |
| US10446012B2 (en) | 2017-12-23 | 2019-10-15 | Carrier Corporation | Method and apparatus for detecting when a mobile device is left in a room |
| US11507711B2 (en) | 2018-05-18 | 2022-11-22 | Dollypup Productions, Llc. | Customizable virtual 3-dimensional kitchen components |
| EP3847630A1 (fr) * | 2018-10-09 | 2021-07-14 | Assa Abloy Ab | Système et procédé de contrôle d'accès physique |
| US11887424B2 (en) | 2019-06-12 | 2024-01-30 | Honeywell International Inc. | Access control system using mobile device |
| US12027007B2 (en) | 2021-03-01 | 2024-07-02 | Honeywell International Inc. | Building access using a mobile device |
| US12367726B2 (en) | 2021-03-01 | 2025-07-22 | Honeywell International Inc. | Building access using a mobile device |
Also Published As
| Publication number | Publication date |
|---|---|
| FI20055344A0 (fi) | 2005-06-23 |
| EP1897066A1 (fr) | 2008-03-12 |
| EP1897066A4 (fr) | 2010-09-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2006136662A1 (fr) | Procede de communication d'un systeme de commande d'acces | |
| CA2632298C (fr) | Systeme integre de controle d'acces et methode de commande | |
| US7012503B2 (en) | Electronic key device a system and a method of managing electronic key information | |
| CN103248484B (zh) | 门禁控制系统及方法 | |
| US7616091B2 (en) | Actuating a security system using a wireless device | |
| US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
| CN104732636B (zh) | 基于蓝牙手机的智能小区门禁控制系统及其控制方法 | |
| US6975202B1 (en) | Electronic key system, apparatus and method | |
| US9437061B2 (en) | Arrangement for the authorised access of at least one structural element located in a building | |
| CA2324679A1 (fr) | Methode et systeme de controle d'acces physique utlisant une connection sans fils a un reseau | |
| GB2417858A (en) | Access control device using mobile phones for automatic wireless access with secure codes and biometrics data | |
| RU2310233C2 (ru) | Способ и устройство для управления доступом | |
| KR100422377B1 (ko) | 액정 바코드를 이용한 보안 및 출입통제 시스템 및 그 방법 | |
| CA3080097A1 (fr) | Gestion et controle de l`acces aux zones securisees | |
| JP2007034974A (ja) | セキュリティシステム | |
| CA2360120C (fr) | Commande d'acces a une porte, systeme de gestion des cles et methode connexe | |
| US10645070B2 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
| KR102883873B1 (ko) | 출입통제를 위한 다중 인증 처리용 허브 장치 및 이를 포함하는 다중 인증 처리용 중계 시스템 | |
| CN113936364B (zh) | 一种联网型酒店电子门锁退房方法及装置 | |
| CN118968662A (zh) | 智能款箱开锁方法 | |
| KR20230097632A (ko) | 블록체인을 활용한 LwM2M 기반의 AMI 장치 인증 방법 및 장치 | |
| TW202420245A (zh) | 門禁管理系統 | |
| JP2007279906A (ja) | ネットワークアクセス管理システム | |
| DK201200065U3 (da) | Styring af adgang til et sted | |
| JP2004250888A (ja) | 出入管理システム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 2006764516 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
| WWP | Wipo information: published in national office |
Ref document number: 2006764516 Country of ref document: EP |