[go: up one dir, main page]

WO2006136662A1 - Procede de communication d'un systeme de commande d'acces - Google Patents

Procede de communication d'un systeme de commande d'acces Download PDF

Info

Publication number
WO2006136662A1
WO2006136662A1 PCT/FI2006/050277 FI2006050277W WO2006136662A1 WO 2006136662 A1 WO2006136662 A1 WO 2006136662A1 FI 2006050277 W FI2006050277 W FI 2006050277W WO 2006136662 A1 WO2006136662 A1 WO 2006136662A1
Authority
WO
WIPO (PCT)
Prior art keywords
access control
lock
mobile terminal
control infrastructure
door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/FI2006/050277
Other languages
English (en)
Inventor
Jouni Koljonen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MOHINET Oy
Original Assignee
MOHINET Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MOHINET Oy filed Critical MOHINET Oy
Priority to EP06764516A priority Critical patent/EP1897066A4/fr
Publication of WO2006136662A1 publication Critical patent/WO2006136662A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Definitions

  • the invention relates to access control systems and especially to mobile communication between the lock and the access control system.
  • the objective of the invention is to create a cost effective way to connect a lock in separate premises to a centralized control system with minimum required hardware and to create a way for occasional visitors to get the access licence for a remote lock in cost efficient and easy way.
  • the present access control systems are based on hierarchical structure.
  • the database of the access control data is in one server, and the database is at least partially copied to the lower level servers. If the main database server is down or disconnected from the network, the rest of the system works still autonomously. All the lower level components are working in the same way. This makes the system fail tolerant, only updating of the control data is delayed, if the connection to the control data database is lost.
  • one building has at least one server for managing doors and routing the communications between the door controllers and the rest of the infrastructure. This makes it very costly to connect a separate building with only one controlled door to the infrastructure.
  • a lock needs to be connected in some way to the server in order to get the access right information from the database and report the transactions to the database.
  • the problem is that the needed infrastructure is very expensive for one separate door, as the cost of servers and network infrastructure is needed only for small amount of doors in one building and the need for temporary keys and connection to infrastructure is still needed for security.
  • An example of that kind of access control need is for a telecommunications switch, a cross-connection closet, a base station, or a transformer room or other kind of technical premises that are not maintained by the occupant of the house. In this case, often the visitors should be logged and the access licences should often be only for some hours at a time.
  • the lock is standalone, the present infrastructure model needs communication channel, and local infrastructure for even only one lock. This is extremely expensive, as only one lock shares a communications server and door manager and the wiring in also a considerable cost.
  • the aim of invention is to create an inexpensive infrastructure for a single or only a few doors to connect to the access control infrastructure without needing any costly cabling, computer system or complicated configuration. Further the aim is to create an easy way to grant access licences and to track use of them. Further the licences should be granted without distributing access control tag or badges to users.
  • the invention makes effectively use of the existing access control infrastructure, connecting only a gateway to the controlling servers of the access control infrastructure.
  • the communications between the lock controller and the gateway is enabled by a mobile terminal of the lock user.
  • This makes the infrastructure cost per door very small, the lock is off-line, but the user's mobile terminal is online-key to it, and the infrastructure is able to log events and use up-to-date licensing and key-database with minimal changes to the existing system.
  • the user identification is based on the mobile terminal's phone number (embedded in the phone's SW) and an (optional) password inquiry which makes the identification fairly safe. This makes it possible to give an authorization to a user of defined phone number and password instead of giving authorization to a key badge that must be sent in advance to the user.
  • the licences can be easily granted to a user of other organization, and still having a track of at least the phone number of the user.
  • the invention is based on using an on-line mobile terminal as a key and communication gateway for an off-line lock.
  • the lock is still controlled by the infrastructure for each event, if necessary.
  • Another object is to grant and cancel "keys" or licences to mobile terminal users without a badge.
  • Fig 1 Schematic diagram of a known access control infrastructure
  • Fig 2 Schematic diagram of the arrangement according to the invention
  • Figure 1 shows an example of an infrastructure of existing technology.
  • the system is redundant and hierarchical, geographically distributed.
  • Database server DS also called application server
  • Communication Servers CS are often in same strictly guarded premises with database server DS.
  • Door manager controllers DMC are based for each location, and finally the door managers DM are reading the badges, communicating with the rest of the infrastructure and monitoring the door.
  • the complicated hierarchical system is necessary for decentralizing and for fault-proofing. Also the load balancing is one issue, so that the data base can be updated hierarchically.
  • door manager DM is a small computer with I/0-lines for communication to DMC and for controlling the lock, reading badges or cards, motion detection, or for example to connect to biometric devices.
  • one separate lock in one building needs always 2 computers, namely Door Manager DM and Door manager controller DMC and the wiring and communications channel from the building to the access manager. Therefore, connecting one separate door to the system needs a lot work and expensive hardware.
  • FIG. 2 shows infrastructure needed for a door controlled with method according to the invention.
  • the Front Manager and the Door manager controller is replaced by a Gateway GW, and a mobile terminal MT.
  • the Lock Manager sends its identification to the mobile terminal MT.
  • the software in the mobile terminal MT sends the identification information of the door together with the identification information of the MT itself to GW.
  • the gateway is connected to DS, so it acts like a CS. If gateway is under a CS, it acts like a DMC towards the closed network of the infrastructure.
  • the port of the gateway is connected to public network PNW, for example to internet or to public telecomm network or to public mobile network through which the mobile terminal can communicates with the gateway.
  • public network PNW for example to internet or to public telecomm network or to public mobile network through which the mobile terminal can communicates with the gateway.
  • the door manager used in the method according to the invention may be much simpler than the door manager in the system of figure 1.
  • the door manager in the system according to the invention may have very limited amount of connections.
  • the necessary connections for the DM are power supply, Bluetooth and lock control, maybe also keyboard.
  • the door manager should have enough processing power for encrypting messages and memory for storing the encryption keys and badge key codes and their validity information.
  • the gateway server is working as a link between the mobile net or the internet or other equivalent communications media (PNW) and the network of the access control infrastructure.
  • the later network is usually physically strictly isolated, usually inside locked and guarded room.
  • the gateway is acting towards the servers of the access control infrastructure as a network element of the infrastructure. Therefore, there is no need for change of configure the infrastructure, the system according the invention is bolt-on solution, that is transparent to the rest of the infrastructure.
  • the lock is controlled by a door manager DM next to the lock.
  • the controller includes a short range communication means (BT), for example a display, Bluetooth, IrDA or WLAN.
  • BT short range communication means
  • BT Bluetooth is the preferred option, but also WLAN or even manual entry with keyboard and a display is a possible option, even it is more expensive to install, and inconvenient and slow for the user.
  • the short-range communication means (BT) are used to send the identifying information of the lock to a mobile terminal of the user of the lock. In the mobile terminal there is a midlet that recognizes the identifying information, and possibly the midlet asks confirmation or password from the user. After that, the terminal sends the identifying information of the user, itself and the lock to the gateway.
  • the lock uses first a beacon-signal, after a MT makes a communication link with the DM; the DM sends a single use random code to MT.
  • the MT sends this random code, its own identification information and maybe a pass code of the user to GW.
  • GW verifies the message, sends an encrypted, unique reply to the MT, and MT can use the content of the reply once or several times to open the door by sending the content of message from GW to the DM.
  • the gateway sends the information in a form of a key and the lock information and asks authentication from the infrastructure to open the lock. In the same time the GW send the auditing information of the users acts. In case of later described automatic mode, where the key code is valid for opening the lock several times, the GW does not necessarily get the auditing information immediately or maybe never gets detailed information about all the incidents. If the key code is valid for single use only, the infrastructure is always aware of all the incidents.
  • All the communications are preferably encrypted with public key encryption, preferably the messages include a single use random number to ensure that recording or copying the message is not useful for fraud.
  • the communications in the public network must be encrypted.
  • the public key encryption is easier, as the mobile terminal needs not to exchange secret key.
  • random encryption keys for each communication session there is no way for outsider to track the users by capturing the radio- communications, as only the door beacon is always the same and the first connection of the MT is already encrypted with the public single use key of the DM.
  • the DM and GW may know each others public keys, so they do not need to change the public key every time, but the message needs to have an order number or time stamp, so that the code is unique.
  • the gateway is critical point, as it connects the closed network to the public network.
  • the gateway may be therefore a combination of several computers, for example a firewall and a gateway. This makes cracking into the closed network more difficult, as both computers in serial must be cracked.
  • the system can work in two different modes, manual mode works every time on-line.
  • manual mode the mobile terminal asks every time the authorization information from the central lock infrastructure. The authorization is therefore for single use.
  • automatic mode the mobile terminal may ask the authorization automatically in a background process and the authorization is valid for a time period.
  • the mobile terminal asks an authorization that is valid for a certain time interval and maybe also for a set of doors.
  • the phone may ask a new authorization after the old authorization is expired. This may be done automatically in a background process or when first time trying to open the door after the expiration or when entering to the coverage area of the DM transmitter.
  • the authorization for multiple uses is easier to abuse, but the opening the door does not need to open the GPRS-connection to the gateway, so the opening of the lock is practically instantaneous.
  • the automatic mode is preferably using public key encryption, so that the lock uses every time a different code, and the mobile terminal uses its authorization code for creating the reply message. The opening message is never the same twice, so capturing the message would not make possible to copy the authorization.
  • the automatic mode authorization code is not normally easy to cancel, so the automatic "key code" should be for moderately short period.
  • the lock controller may have a list of cancelled codes, but it can be updated only if there is a communication channel to the infrastructure.
  • automatic mode is used for less critical areas, where a lost phone and key code is not critical.
  • the software in the mobile phone may also be able to cancel the code by remote control from the network. If the code of the MT software is for example Java, this is moderately easy to tamper by end user and the cancelling may be inactivated.
  • the key codes are valid only for some hours, so the probability of misuse of a lost phone is relatively small in any case.
  • the infrastructure may command the lock (DM) to manual mode, that case the next mobile terminal requesting a key does not receive automatic mode key-code but a command to enter manual mode, this code may be encrypted and transparent for the MT, so it is not possible to tamper.
  • the message from GW may also contain more information, a list of banned key- codes, and the lock manager may send access information to the infrastructure with the authorization request.
  • the off-line lock is practically on-line each time there is a transaction with first to MT and maybe later (automatic mode) to GW, as the communications is preferably encrypted with keys of DM and GW, the MT is not able to detect or alter the contents of the messages. So there no easy way to false any codes, as the MT can be also recognized by the mobile network, as the MT has unique number and also it is possible to detect the IMEI and the MT software serial number together with the software password, if necessary.
  • the mobile terminal is listening in a background process the beacon signals and the mobile terminal automatically makes a contact to the door managers (DM) the mobile terminal assumes the user may want to open or the user may have access rights.
  • the phone may also ask automatically a short term ticket for each door, or open a connectionless channel to GW in advance.
  • the infrastructure also receives more often information from the door managers and the infrastructure gats also information about the movement of the users, even they do not open any door. This enables higher security, and the door managers may receive cancelling message of user rights faster, as any user nearby can relay the information between the DM and GW. Also the stolen MT or user with cancelled user rights may cause alarm even by entering to the coverage of any DM.
  • This background process is cost effective, as the GPRS data needed is very limited and the Bluetooth is mainly only receiving.
  • the battery consumption of the mobile terminal is not raised too much and a few kilobytes of data sent automatically are not too costly to send over GPRS or UMTS even in daily bases.
  • the time for opening in full manual mode is around 10 to 20 seconds more than in the automatic mode with background negotiating in advance.
  • the opening tickets expiry times may vary from some minutes to days.
  • the operation of door is virtually immediate, the user selects the door from the door list and the door opens immediately.
  • the beacon signals of the doors enable the mobile terminals to connect to all the DMs that are in the range of the Bluetooth, and therefore the Bluetooth connection to the DM is ready all the time, and if the opening "key code" or ticket is asked in advance from the GW, the phone can open the door immediately.
  • the phone next time takes contact to the GW, and the door the incident information is sent to the GW.
  • the DM and GW can track the communications and if there is fraud detected the user may be banned and the system makes an alarm.
  • the fraud may be for example, that the terminal is refusing to pass the messages after opening the door. That case the alarm may be set, and also the next user's terminal is passing the necessary information in any case.
  • There is no easy way to prevent the incident information transmission as the encrypted message content is not readable by the mobile terminal, and the user cannot control the message content.
  • the method is as fast for the user as a pass code ticket stored in the mobile terminal used in the prior art.
  • the pure gateway solution for data transmission via mobile phone offers high security for the user identification, and the user rights may be checked for each incident. But if the authentication is not prepared in advance, the opening of the lock takes typically over ten seconds, which is annoyingly slow.
  • the automatic negotiation and frequent connection between the lock and the lock solves both security problem and smooth operation for the user.
  • the mobile phone (MT) of the user is replacing the need for own communication channel for the lock and the infrastructure can be sure, that the mobile phone is in the proximity of the lock before opening the lock.
  • the lock manager computer with Bluetooth is much cheaper to manufacture and to maintain than if the lock would have own GPRS-, WLAN- or Ethernet- connection for connecting to the gateway.
  • This case still the identity of the mobile phone must be verified through the telecomm or GPRS-network and the short distance communications is needed anyway for the proximity check, i.e. the user is close to the door, he wants to open. So, if the phone is to be used to open the lock, it is advantageous to use the user's phone for all the communications between the lock manager and the gateway.
  • the amount of the data to be transferred is relatively small, much less than a kilobyte for authorization. In automatic mode the authorization is made relatively seldom. It is possible to use the text-messages (SMS) to transfer the authorization codes, but typically the GPRS is cheaper to use for a short two-way connection.
  • SMS text-messages
  • the connection type is not relevant; the connection may as well be WLAN with user authentication, if available for the MT.
  • the GW is connected to public internet, to mobile cellular network with SMS or with GPRS or equivalent, or to several communication channels or it may use external gateways for reception of SMS from public internet.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé pour télécommander un verrou électrique à l'intérieur d'une infrastructure de commande d'accès comprenant une base de données d'accès pour accéder à des informations et à des incidents, le verrou étant commandé par un ordinateur gestionnaire de porte (DM). Ce procédé fait appel à un terminal mobile (MT) à liaison de communication à courte distance (BT) pour établir une communication avec le gestionnaire de porte (DM) et à une connexion de réseau mobile (PNW) pour établir une communication avec l'infrastructure de commande d'accès et communiquer l'information d'authentification entre le gestionnaire de porte et l'infrastructure de commande d'accès.
PCT/FI2006/050277 2005-06-23 2006-06-22 Procede de communication d'un systeme de commande d'acces Ceased WO2006136662A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP06764516A EP1897066A4 (fr) 2005-06-23 2006-06-22 Procede de communication d'un systeme de commande d'acces

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI20055344 2005-06-23
FI20055344A FI20055344A0 (fi) 2005-06-23 2005-06-23 Kulunvalvontajärjestelmän tiedonsiirtomenetelmä

Publications (1)

Publication Number Publication Date
WO2006136662A1 true WO2006136662A1 (fr) 2006-12-28

Family

ID=34778480

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2006/050277 Ceased WO2006136662A1 (fr) 2005-06-23 2006-06-22 Procede de communication d'un systeme de commande d'acces

Country Status (3)

Country Link
EP (1) EP1897066A4 (fr)
FI (1) FI20055344A0 (fr)
WO (1) WO2006136662A1 (fr)

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202007007611U1 (de) * 2007-04-17 2008-09-04 Bruch, Claus-Dieter Vorrichtung zur Anwesenheitserfassung und/oder Zugangskontrolle
WO2008145803A1 (fr) * 2007-05-25 2008-12-04 Kone Corporation Système de gestion
EP2043055A1 (fr) * 2007-09-28 2009-04-01 iLoq Oy Verrouillage de système d'administration
EP2146328A2 (fr) 2008-07-18 2010-01-20 CargoGuard GmbH Serrure de sécurité d'un récipient ou d'une pièce de sécurité et procédé de sécurisation du transport d'un récipient de sécurité
EP2192560A1 (fr) * 2008-11-25 2010-06-02 Rockwell Automation Limited Contrôle d'accès
WO2011010052A1 (fr) * 2009-07-21 2011-01-27 Openways Sas Systeme securise de commande d'ouverture de dispositifs de serrure par accreditations acoustiques chiffrees
DE102010019467A1 (de) 2010-05-05 2011-11-10 Giesecke & Devrient Gmbh Kontaktlos arbeitendes Zugangssystem
WO2011159921A1 (fr) * 2010-06-16 2011-12-22 Delphian Systems, LLC Système de verrouillage activé par un dispositif sans fil
WO2012094667A1 (fr) * 2011-01-07 2012-07-12 Delphian Systems, LLC Système et procédé permettant un contrôle d'accès par l'intermédiaire d'un dispositif mobile
CN102592338A (zh) * 2012-02-06 2012-07-18 深圳市广宁实业有限公司 移动终端控制门禁系统的方法及门禁系统
US20120233687A1 (en) * 2011-03-08 2012-09-13 Metivier Pascal Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
GB2489509A (en) * 2011-03-31 2012-10-03 Lifealike Ltd Wireless device for door entry
FR2974590A1 (fr) * 2011-04-28 2012-11-02 Sar Technologies Internat Procede de deverrouillage d'un acces a une zone de rangement, dispositif de stockage et de fermeture.
WO2012151290A1 (fr) * 2011-05-02 2012-11-08 Apigy Inc. Systèmes et procédés de commande d'un mécanisme de verrouillage à l'aide d'un dispositif électronique portable
WO2013078561A1 (fr) * 2011-11-29 2013-06-06 1556053 Alberta Ltd. Verrou électronique sans fil
US20140195810A1 (en) * 2012-10-11 2014-07-10 Openways Sas Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption
EP2816532A3 (fr) * 2013-06-20 2015-01-07 Honeywell International Inc. Systèmes et procédés permettant un contrôle d'accès via des dispositifs mobiles
CN104680630A (zh) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 一种控制门锁的方法和系统
WO2016007732A1 (fr) * 2014-07-09 2016-01-14 Deja View Concepts, Inc. Bluetooth basse énergie pour contrôle d'accès
CN105659523A (zh) * 2013-10-23 2016-06-08 谷歌公司 能够重新编程的安全密码设备
WO2016087478A1 (fr) * 2014-12-02 2016-06-09 Inventio Ag Procédé permettant de fournir un contrôle d'accès des visiteurs dans un bâtiment
WO2017139220A1 (fr) * 2016-02-11 2017-08-17 Carrier Corporation Système d'entrée par badge souple
CN107276639A (zh) * 2017-06-12 2017-10-20 上海金念信息技术有限公司 一种用于ios移动端的蓝牙近场数据通讯电路板及其通讯方法
WO2018204430A1 (fr) * 2017-05-03 2018-11-08 Carrier Corporation Autorisation de commande d'accès à la demande au moyen de dispositifs mobiles
US10446012B2 (en) 2017-12-23 2019-10-15 Carrier Corporation Method and apparatus for detecting when a mobile device is left in a room
US10529156B2 (en) 2013-05-20 2020-01-07 Delphian Systems, LLC Access control via selective direct and indirect wireless communications
US10713869B2 (en) 2017-08-01 2020-07-14 The Chamberlain Group, Inc. System for facilitating access to a secured area
US11055942B2 (en) 2017-08-01 2021-07-06 The Chamberlain Group, Inc. System and method for facilitating access to a secured area
EP3847630A1 (fr) * 2018-10-09 2021-07-14 Assa Abloy Ab Système et procédé de contrôle d'accès physique
US11158144B2 (en) 2016-11-15 2021-10-26 Inventio Ag Access control system having automatic status update
US11354958B2 (en) 2010-06-16 2022-06-07 Delphian Systems, LLC Wireless device enabled locking system having different modalities
US11507711B2 (en) 2018-05-18 2022-11-22 Dollypup Productions, Llc. Customizable virtual 3-dimensional kitchen components
US11887424B2 (en) 2019-06-12 2024-01-30 Honeywell International Inc. Access control system using mobile device
US12027007B2 (en) 2021-03-01 2024-07-02 Honeywell International Inc. Building access using a mobile device
US12159497B2 (en) 2014-12-02 2024-12-03 Carrier Corporation Remote programming for access control system with virtual card data

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916464A (zh) * 2010-08-25 2010-12-15 华南理工大学 基于Zigbee技术的门禁管理方法及装置
CN105488881A (zh) * 2015-12-01 2016-04-13 南京邮电大学 一种基于蓝牙信息识别的车辆出入管理系统和方法
CN106453251A (zh) * 2016-09-05 2017-02-22 伟创达电子科技(深圳)有限公司 基于互联网的云对讲监控系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001023694A1 (fr) * 1999-09-27 2001-04-05 Tactel Ab Systeme de verrouillage automatique
WO2001074045A1 (fr) * 2000-03-24 2001-10-04 Abb Metering Ltd. Transmission d'informations de commande
US20020031228A1 (en) * 2000-06-27 2002-03-14 Karkas Kalle J. Devices
FI114183B (fi) * 2001-06-07 2004-08-31 Elisa Oyj Menetelmä ja järjestelmä etälaitteen ohjaamiseksi päätelaitteen avulla keskusyksikön valvonnan alaisesti

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001023694A1 (fr) * 1999-09-27 2001-04-05 Tactel Ab Systeme de verrouillage automatique
WO2001074045A1 (fr) * 2000-03-24 2001-10-04 Abb Metering Ltd. Transmission d'informations de commande
US20020031228A1 (en) * 2000-06-27 2002-03-14 Karkas Kalle J. Devices
FI114183B (fi) * 2001-06-07 2004-08-31 Elisa Oyj Menetelmä ja järjestelmä etälaitteen ohjaamiseksi päätelaitteen avulla keskusyksikön valvonnan alaisesti

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1897066A4 *

Cited By (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202007007611U1 (de) * 2007-04-17 2008-09-04 Bruch, Claus-Dieter Vorrichtung zur Anwesenheitserfassung und/oder Zugangskontrolle
WO2008145803A1 (fr) * 2007-05-25 2008-12-04 Kone Corporation Système de gestion
JP2010540802A (ja) * 2007-09-28 2010-12-24 イロク オサケ ユキチュア 錠管理システム
EP2043055A1 (fr) * 2007-09-28 2009-04-01 iLoq Oy Verrouillage de système d'administration
WO2009040470A3 (fr) * 2007-09-28 2009-05-28 Iloq Oy Système de gestion de verrous
US8516250B2 (en) 2007-09-28 2013-08-20 Iloq Oy Lock administration system
CN101855653A (zh) * 2007-09-28 2010-10-06 伊洛克公司 锁管理系统
EP2146328A3 (fr) * 2008-07-18 2012-04-04 CargoGuard GmbH Serrure de sécurité d'un récipient ou d'une pièce de sécurité et procédé de sécurisation du transport d'un récipient de sécurité
EP2146328A2 (fr) 2008-07-18 2010-01-20 CargoGuard GmbH Serrure de sécurité d'un récipient ou d'une pièce de sécurité et procédé de sécurisation du transport d'un récipient de sécurité
US8508332B2 (en) 2008-11-25 2013-08-13 Rockwell Automation Technologies, Inc. Access control
EP2192560A1 (fr) * 2008-11-25 2010-06-02 Rockwell Automation Limited Contrôle d'accès
WO2011010052A1 (fr) * 2009-07-21 2011-01-27 Openways Sas Systeme securise de commande d'ouverture de dispositifs de serrure par accreditations acoustiques chiffrees
EP2282297A1 (fr) * 2009-07-21 2011-02-09 Openways Sas Système sécurisé de commande d'ouverture de dispositifs de serrure par accréditions acoustiques chiffrées
US8565725B2 (en) 2009-07-21 2013-10-22 Openways Sas Secure control system for opening locking devices by encrypted acoustic accreditations
DE102010019467A1 (de) 2010-05-05 2011-11-10 Giesecke & Devrient Gmbh Kontaktlos arbeitendes Zugangssystem
US20170365113A1 (en) * 2010-06-16 2017-12-21 Delphian Systems, LLC Wireless device enabled locking system
US9691201B2 (en) 2010-06-16 2017-06-27 Delphian Systems, LLC Wireless device enabled locking system
US11443577B2 (en) 2010-06-16 2022-09-13 Delphian Systems, LLC Wireless device enabled locking system
US11354958B2 (en) 2010-06-16 2022-06-07 Delphian Systems, LLC Wireless device enabled locking system having different modalities
CN103026682A (zh) * 2010-06-16 2013-04-03 德尔斐系统有限公司 无线装置启动锁定系统
US20210233337A1 (en) * 2010-06-16 2021-07-29 Delphian Systems, LLC Wireless Device Enabled Locking System
US9077716B2 (en) 2010-06-16 2015-07-07 Delphian Systems, LLC Wireless device enabled locking system
US10832506B2 (en) * 2010-06-16 2020-11-10 Delphian Systems, LLC Wireless device enabled locking system
WO2011159921A1 (fr) * 2010-06-16 2011-12-22 Delphian Systems, LLC Système de verrouillage activé par un dispositif sans fil
CN103404105A (zh) * 2011-01-07 2013-11-20 德尔斐系统有限公司 通过移动装置进行出入控制的系统和方法
CN103404105B (zh) * 2011-01-07 2016-12-07 德尔斐系统有限公司 通过移动装置进行出入控制的系统和方法
US9781599B2 (en) 2011-01-07 2017-10-03 Delphian Systems, LLC System and method for access control via mobile device
WO2012094667A1 (fr) * 2011-01-07 2012-07-12 Delphian Systems, LLC Système et procédé permettant un contrôle d'accès par l'intermédiaire d'un dispositif mobile
US8793784B2 (en) * 2011-03-08 2014-07-29 Openways Sas Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
US20120233687A1 (en) * 2011-03-08 2012-09-13 Metivier Pascal Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
GB2489509A (en) * 2011-03-31 2012-10-03 Lifealike Ltd Wireless device for door entry
US9571661B2 (en) 2011-03-31 2017-02-14 Klevio Limited Controller for a door entry system
FR2974590A1 (fr) * 2011-04-28 2012-11-02 Sar Technologies Internat Procede de deverrouillage d'un acces a une zone de rangement, dispositif de stockage et de fermeture.
US10382608B2 (en) 2011-05-02 2019-08-13 The Chamberlain Group, Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
US12219081B2 (en) 2011-05-02 2025-02-04 The Chamberlain Group Llc. Systems and methods for controlling a locking mechanism using a portable electronic device
WO2012151290A1 (fr) * 2011-05-02 2012-11-08 Apigy Inc. Systèmes et procédés de commande d'un mécanisme de verrouillage à l'aide d'un dispositif électronique portable
US10708410B2 (en) 2011-05-02 2020-07-07 The Chamberlain Group, Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
WO2013078561A1 (fr) * 2011-11-29 2013-06-06 1556053 Alberta Ltd. Verrou électronique sans fil
US20130335193A1 (en) * 2011-11-29 2013-12-19 1556053 Alberta Ltd. Electronic wireless lock
CN102592338A (zh) * 2012-02-06 2012-07-18 深圳市广宁实业有限公司 移动终端控制门禁系统的方法及门禁系统
US20140195810A1 (en) * 2012-10-11 2014-07-10 Openways Sas Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption
US9258281B2 (en) * 2012-10-11 2016-02-09 Openways Sas Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption
US10529156B2 (en) 2013-05-20 2020-01-07 Delphian Systems, LLC Access control via selective direct and indirect wireless communications
US11100736B2 (en) 2013-05-20 2021-08-24 Delphian Systems, LLC Access control via selective direct and indirect wireless communications
US10395452B2 (en) 2013-06-20 2019-08-27 Honeywell International Inc. Systems and methods for enabling access control via mobile devices
EP2816532A3 (fr) * 2013-06-20 2015-01-07 Honeywell International Inc. Systèmes et procédés permettant un contrôle d'accès via des dispositifs mobiles
CN105659523A (zh) * 2013-10-23 2016-06-08 谷歌公司 能够重新编程的安全密码设备
EP3061204A4 (fr) * 2013-10-23 2017-08-02 Google, Inc. Dispositif cryptographique sécurisé reprogrammable
US10581814B2 (en) 2013-10-23 2020-03-03 Google Llc Re-programmable secure device
WO2016007732A1 (fr) * 2014-07-09 2016-01-14 Deja View Concepts, Inc. Bluetooth basse énergie pour contrôle d'accès
US20170206722A1 (en) * 2014-07-09 2017-07-20 Deja View Concepts, Inc. Bluetooth Low Energy for Access Control
US10521992B2 (en) 2014-12-02 2019-12-31 Inventio Ag Method for providing a visitor controlled access into a building
US12159497B2 (en) 2014-12-02 2024-12-03 Carrier Corporation Remote programming for access control system with virtual card data
WO2016087478A1 (fr) * 2014-12-02 2016-06-09 Inventio Ag Procédé permettant de fournir un contrôle d'accès des visiteurs dans un bâtiment
CN104680630A (zh) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 一种控制门锁的方法和系统
WO2017139220A1 (fr) * 2016-02-11 2017-08-17 Carrier Corporation Système d'entrée par badge souple
US11158144B2 (en) 2016-11-15 2021-10-26 Inventio Ag Access control system having automatic status update
WO2018204430A1 (fr) * 2017-05-03 2018-11-08 Carrier Corporation Autorisation de commande d'accès à la demande au moyen de dispositifs mobiles
US11501588B2 (en) 2017-05-03 2022-11-15 Carrier Corporation On demand access control authorization using mobile devices
CN107276639A (zh) * 2017-06-12 2017-10-20 上海金念信息技术有限公司 一种用于ios移动端的蓝牙近场数据通讯电路板及其通讯方法
CN107276639B (zh) * 2017-06-12 2021-06-25 上海金念信息技术有限公司 一种用于ios移动端的蓝牙近场数据通讯电路板及其通讯方法
US11941929B2 (en) 2017-08-01 2024-03-26 The Chamberlain Group Llc System for facilitating access to a secured area
US11562610B2 (en) 2017-08-01 2023-01-24 The Chamberlain Group Llc System and method for facilitating access to a secured area
US11574512B2 (en) 2017-08-01 2023-02-07 The Chamberlain Group Llc System for facilitating access to a secured area
US11055942B2 (en) 2017-08-01 2021-07-06 The Chamberlain Group, Inc. System and method for facilitating access to a secured area
US12106623B2 (en) 2017-08-01 2024-10-01 The Chamberlain Group Llc System and method for facilitating access to a secured area
US10713869B2 (en) 2017-08-01 2020-07-14 The Chamberlain Group, Inc. System for facilitating access to a secured area
US10446012B2 (en) 2017-12-23 2019-10-15 Carrier Corporation Method and apparatus for detecting when a mobile device is left in a room
US11507711B2 (en) 2018-05-18 2022-11-22 Dollypup Productions, Llc. Customizable virtual 3-dimensional kitchen components
EP3847630A1 (fr) * 2018-10-09 2021-07-14 Assa Abloy Ab Système et procédé de contrôle d'accès physique
US11887424B2 (en) 2019-06-12 2024-01-30 Honeywell International Inc. Access control system using mobile device
US12027007B2 (en) 2021-03-01 2024-07-02 Honeywell International Inc. Building access using a mobile device
US12367726B2 (en) 2021-03-01 2025-07-22 Honeywell International Inc. Building access using a mobile device

Also Published As

Publication number Publication date
FI20055344A0 (fi) 2005-06-23
EP1897066A1 (fr) 2008-03-12
EP1897066A4 (fr) 2010-09-15

Similar Documents

Publication Publication Date Title
WO2006136662A1 (fr) Procede de communication d'un systeme de commande d'acces
CA2632298C (fr) Systeme integre de controle d'acces et methode de commande
US7012503B2 (en) Electronic key device a system and a method of managing electronic key information
CN103248484B (zh) 门禁控制系统及方法
US7616091B2 (en) Actuating a security system using a wireless device
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN104732636B (zh) 基于蓝牙手机的智能小区门禁控制系统及其控制方法
US6975202B1 (en) Electronic key system, apparatus and method
US9437061B2 (en) Arrangement for the authorised access of at least one structural element located in a building
CA2324679A1 (fr) Methode et systeme de controle d'acces physique utlisant une connection sans fils a un reseau
GB2417858A (en) Access control device using mobile phones for automatic wireless access with secure codes and biometrics data
RU2310233C2 (ru) Способ и устройство для управления доступом
KR100422377B1 (ko) 액정 바코드를 이용한 보안 및 출입통제 시스템 및 그 방법
CA3080097A1 (fr) Gestion et controle de l`acces aux zones securisees
JP2007034974A (ja) セキュリティシステム
CA2360120C (fr) Commande d'acces a une porte, systeme de gestion des cles et methode connexe
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
KR102883873B1 (ko) 출입통제를 위한 다중 인증 처리용 허브 장치 및 이를 포함하는 다중 인증 처리용 중계 시스템
CN113936364B (zh) 一种联网型酒店电子门锁退房方法及装置
CN118968662A (zh) 智能款箱开锁方法
KR20230097632A (ko) 블록체인을 활용한 LwM2M 기반의 AMI 장치 인증 방법 및 장치
TW202420245A (zh) 門禁管理系統
JP2007279906A (ja) ネットワークアクセス管理システム
DK201200065U3 (da) Styring af adgang til et sted
JP2004250888A (ja) 出入管理システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2006764516

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

WWP Wipo information: published in national office

Ref document number: 2006764516

Country of ref document: EP