EP2691940A1 - Management of access rights to operating and/or control data from buildings or building complexes - Google Patents
Management of access rights to operating and/or control data from buildings or building complexesInfo
- Publication number
- EP2691940A1 EP2691940A1 EP12709625.3A EP12709625A EP2691940A1 EP 2691940 A1 EP2691940 A1 EP 2691940A1 EP 12709625 A EP12709625 A EP 12709625A EP 2691940 A1 EP2691940 A1 EP 2691940A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- building
- communication
- access rights
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 claims abstract description 84
- 238000013475 authorization Methods 0.000 claims abstract description 44
- 238000000034 method Methods 0.000 claims abstract description 8
- 238000010438 heat treatment Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000004378 air conditioning Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000001816 cooling Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Definitions
- the invention relates to a system for managing access rights to operating and / or control data of buildings or building complexes. Furthermore, the invention relates to a method for operating such a system.
- the access rights are usually assigned and managed for the individual systems or components. As a rule, this is an access of an authorized User via the interfaces provided by the building operator to the respective systems or installations.
- the invention is based on the object of enabling a central service for enabling data access to one or more buildings.
- a system for managing access rights to operating and / or control data of buildings or building complexes comprising: a first server for a building authorization service with at least one authorization database for storing user-specific access rights for specific buildings or building complexes, a second communication release service server having an authentication database for storing users registered in the system, the authentication database comprising a list of all users having user specific access rights, the list containing, for each user having access rights, the buildings or building complexes for which the User has access rights, wherein the communication release service for releasing a communication of a user with those for him in the list behind ten buildings or building complexes is provided and wherein the building authorization service to release the specific access rights for the user on operating and / or control data of the building or building complex is provided based on the stored in the authorization database access rights.
- the object is further achieved by a method for operating a system for managing access rights to operating and / or control data of buildings or building complexes, in which a running on a first server communication release service communication of a user logged in with an identity with the for him in a list of stored buildings or building complexes, if its identity matches an identity stored in the list, and a building automation service running on a second server after the release of communication by the communication release service grants the user specific access rights to the building's operation and / or control data or Building complex on the basis of stored in an authentication database access rights free.
- the invention is based on the recognition that it is advantageous to allow access rights to building-specific data via a system in which the authentication of a user who wishes to have access to the data is separate from the specific access rights stored for the corresponding user.
- the authentication of a registered user can be done in a simple manner via an application, for example via a web application provided by a service provider.
- the service that regulates the authentication of the user does not require any special information as to which specific data or data sources the user has access to. Likewise, no information is needed about the specific role that the user fills in the system.
- the authentication service merely has to determine whether the user has been registered at all and authorized for access, ie communication with a specific building or building complex. The operator of the system does not need to have any trustworthy data.
- the trusted data can be managed directly in the building management.
- the users registered in the system with their identity and also their role, i. which function they are allowed to perform and what they are allowed to do with the data released for communication. Likewise, it is stored, which extent of access rights they have.
- the specific data maintenance can thus be carried out independently by the building management on site.
- a user logon of the system can be made centrally via the authorization service for the respective buildings registered in the system.
- the access of users to various buildings or building complexes that are managed in the system can be made possible in a simple manner.
- the user thus has the ability to access different buildings from different owners and retrieve operational data there, as well as to perform operations such as data updating, through a single identity with which he is deposited in the system.
- the system is advantageous because, for example, a service technician receives access to diagnostic data of different buildings or building complexes via a single logon in the system. This allows a service technician, for example, before his visit to a single site Application query the condition of certain system components in the different buildings and already take the necessary measures in advance, or order needed spare parts.
- the system provides easy and consistent access to the building-specific data and easy management of the necessary access rights to multiple buildings or building complexes.
- An advantageous embodiment of the invention consists in that the communication release service runs on a central server and is provided for the release of the communication of registered users for several buildings or building complexes, each building or each building complex has its own, decentralized server for the building authorization service and between the central server and the remote server, a communication connection is provided. If a user of the system logs on with his identity to the communication release service on the central server, then it merely has to be checked whether access rights to one or more buildings or building complexes exist at all. If this is the case, a message is sent from the central server to the remote server that has the user's specific access rights.
- the communication can also be released for several buildings or building complexes.
- the decentralized server it is then merely determined which specific access rights exist for the logged on user and released for communication, and then this data is then released for communication.
- a further advantageous embodiment is that the communication release service has at least one data interface for receiving identities, the user stored in an authorization database of a building authorization service with user-specific access rights.
- the users are stored with their user-specific access rights on the decentralized server or the authorization database of the decentralized server. In doing so, users are provided with their identity, their role and the amount of data they are allowed to access. After a user has been saved with his user-specific access rights, the identity of the user can now be detected by the communication release service via the data interface of the communication release service. and are stored in the list in which the identities of the users with access rights are stored.
- the data interface can in this case be designed such that a message sent by the decentralized server can be received directly with the identity of the user and the recognition of the building, for example via the Internet. It is also conceivable that the data interface is designed so that, for example, a communication with a mobile phone, the mobile phone transmits its identity and this identity is deposited simultaneously as the identity of the user in the system on both the authorization database and the authentication database.
- the communication release service may have multiple interfaces that allow the reception of sent identities from different communication media. Overall, all identities received via such interfaces are stored in the list.
- a further advantageous embodiment consists in that the communication release service has a user interface for registration by a user by means of an identity. The user must thereby use only the one identity that has been assigned to him by the building automation service or that corresponds to the identity of his mobile telephone.
- the application advantageously takes place centrally via an application which is provided by the communication release service. So the user always has the same "look and feel" and easy interaction with the system is possible.
- a further advantageous embodiment is that the user interface is provided for providing a user environment adapted to the user-specific access rights.
- the decentralized server or the building authorization service sends information indicating which of the user-specific environments available in the system is most suitable for operating the system. For example, depending on the role of a user, a surface is provided on which only data can be read by the user.
- the interface may be static, so that the user has no opportunity to gain more knowledge than those provided by the building management.
- the user interface may also be dynamic and allow for user interaction so that it can navigate in different hierarchies of the operational data structure.
- the user interface can be designed so that the user is allowed to manipulate or manipulate the data.
- the user can change thresholds via the system, but it is also conceivable that the user can load software updates. It is advantageous here that the user-specific user environment is provided only when the communication is also enabled for the user and the system knows which user interface is the user interface suitable for its access rights.
- the various user interfaces themselves are provided exclusively by the communication release service and are also stored there only.
- the building authorization service only needs to report which user interface is appropriate for the role or scope that the user is using.
- the communication release service thus does not need to have the confidential data of the individual users for the provision of the user-specific user interface. Again, all that suffices is the identity and the subsequent transmission of the preferred user interface by the building authorization service. As a result, a simple handling of the user interface by the operator of the service is possible.
- the user interfaces can be designed centrally and also changed.
- a further advantageous embodiment consists in that the user interface when registering by a user is already provided for providing a selection of user-specific roles.
- the user can thereby immediately restrict which of the various applications for the communication with the building-specific data is useful or necessary for him. He can already select on the user interface if he is merely a visitor, if he needs access to control data, if he wants to change something in an elevator configuration, if he only wants to know about the performance of the system by means of a scorecard containing the metrics be registered, want to be informed. He can alternatively indicate whether he would like to carry out a remote maintenance. In all of these specific applications, the user will only be provided with data corresponding to his selected current role.
- FIG. 1 shows a schematic representation of the system for managing access rights.
- the system 1 for managing access rights to operating and / or control data of buildings or building complexes 5 consists of a first server 2 on which a building authorization service runs.
- the server 2 has one or more authorization databases 20.
- User-specific access rights for specific buildings or building complexes 5 are stored in the authorization database (s) 20.
- an identity for a user 10 of the system 1 are stored.
- the identity of the user 10 is further defined as to what role the user 10 has. For example, the role may be limited and the user only has rights to read data generated or present in various components of the building or building complex 5. However, the role may also be that the user may manipulate data of the building complex 5.
- an entry can be added in the authorization database 20 to the identity of the user in which the spatial extent of his access rights is defined.
- a user can only have access rights to certain buildings of a building complex or, within a building complex, only access rights to certain system components, for example exclusively elevators or exclusively building automation or exclusively to the heating system.
- the system 1 also has a second server 3 on which a communication release service is running.
- the second server 3 has an authentication database 30 on. In this database, all users registered in system 1 are stored in a list 4 with their identity 4.1. Each identity of a user is further included in the list 4, to which buildings or building complexes 5 the user may access by means of communication via the communication link 23.
- the second server 3 can in this case be operated centrally by a service provider, while the first servers 2 are arranged decentrally in the system 1.
- the first servers 2 can be located here at any locations selected by a customer of the system. However, the first servers 2 can also be accommodated directly in the buildings or building complexes.
- a user 10 can access the operation or control data of the buildings or building complexes via the user interface 7, which is located on the second server 3 and provided by the communication release service. For this purpose, the user 10 logs on the user interface 7 with his identity, which he has in the system. The communication release service checks whether the identity matches an identity stored in the list 4. If this is the case, it is determined from column 4.2 of list 4 for which buildings or building complexes 5 the user has access rights. Subsequently, the user is enabled to communicate with the building or building complex or several buildings or building complexes stored in column 4.2. Via the communication connection 23, the user can now access the data of the building or building complex. On site, however, only the access rights are granted to him, which are stored on the first server 2 in the authorization database.
- the basic communication possibility is thus made possible for the user 10 by the authentication service with the aid of the information stored in the authentication database.
- the user 10 is then granted the special data access by means of the building authorization service on the basis of the information stored in the authorization database 20. Separation of authentication and authorization is achieved in this way.
- the authentication service allows access to different buildings or building complexes without this authentication service having confidential data.
- the user-specific roles and access rights are only stored on the first server 2 in the building authorization service.
- the registration of a new user for access to a building or building complex 5 can be done in different ways.
- the user 10 may log in to the authentication service via the user interface 7.
- the building management system assigns the user an identity that corresponds to the one with which he logged on to the authentication service. This identity is assigned a role and scope by the facility management.
- the data is stored on the first server 2 in the authorization database 20. If the user 10 is detected by the building management and stored in the database 20, then a message is sent to the authentication service by the building authorization service. The authentication service then enters the identity of the user in the list 4 on the authentication database 30. In column 4.2, the authentication service enters the building ID of the building or building complex 5 from which the message was sent. The user 10 is now in the system 1 with his identity and the buildings to which he can get access stored.
- any standard communication can be used.
- communication via the Internet is possible, but it is also conceivable that the communication takes place via a telecommunication line or a leased line.
- the communication can be wired or via radio.
- the registration of a user 10 can also take place via a device which has an identity and is capable of communication, ie, of sending and receiving data.
- a device which has an identity and is capable of communication, ie, of sending and receiving data.
- This may be, for example, a mobile phone, an i-phone or i-pad.
- a registration is made on the first server 2 by the user 10 with the aid of the communication device 8.
- the communication device in this case sends its identity to the first server 2 via a communication connection 8.1. This is done together with a request from the user as to whether he is granted access rights.
- the identity of the user in this case, the identity of his Communication device deposited and assigned to this identity role and its scope.
- the deposit takes place in the authorization database 20.
- the building authorization service then transmits the communication device 8 via the communication connection 8.1 an encrypted message in which the identity is stored.
- the identity is noted in the encrypted message, from which building this message comes, ie it is the building code deposited, which allows access to the respective building or the building complex 5 together with the identity of the authentication service.
- the communication device 8 now transmits the encrypted message to a data interface 6 of the authentication service running on the second server 3. Here, another communication connection is used.
- the authentication service sends the communication device 8 after receiving the encrypted message confirmation that the message has arrived.
- the encrypted information is decrypted by the authentication service and stored in the identity of the user 10 stored in it together with the identifier of the building for which he has registered in the list 4 on the authentication database.
- the encrypted message may be, for example, a two-dimensional barcode that can be received by the mobile device and also sent.
- Other ways of message encryption are also conceivable. If the user 10 is now stored in the authentication service on the authentication database, he can make an application in the system 1 via the user interface 7 by means of the mobile device, whose identity is now in the system, and if the identity of the mobile stored in the list 4 matches Device with the identity at login, the user via the communication link 23, the communication with the building or building complex 5 allows.
- the user interface 7 can be configured in many ways.
- the user interface may have various applications through which the user can already select a user-specific role when logging on in the system 1, and he will then be provided with a user-specific interface which is optimally adapted to his needs.
- someone who does not need to manipulate data, but only needs to read data will be provided with a surface that has no input capabilities. If someone has to manipulate data, for example to change thresholds, they will be provided that he can enter data accordingly.
- the changed data is then transmitted via the communication link 23 to the building, or complex of buildings, where, depending on the user's access rights, the data change is made in the various components installed in the building.
- the authorization service can provide the user with a very specific operator control and monitoring interface.
- a user can connect to the authentication service or the interface of the authentication service via the Internet, via VPN, via Facebook, via Twitter or via a normal telecommunications connection, and via the interface which is then displayed in their respective environment. communicate with the building or building complex.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP12709625.3A EP2691940B1 (en) | 2011-03-29 | 2012-03-16 | Management of access rights to operating and/or control data from buildings or building complexes |
PL12709625T PL2691940T3 (en) | 2011-03-29 | 2012-03-16 | Management of access rights to operating and/or control data from buildings or building complexes |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11160155 | 2011-03-29 | ||
PCT/EP2012/054679 WO2012130640A1 (en) | 2011-03-29 | 2012-03-16 | Management of access rights to operating and/or control data from buildings or building complexes |
EP12709625.3A EP2691940B1 (en) | 2011-03-29 | 2012-03-16 | Management of access rights to operating and/or control data from buildings or building complexes |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2691940A1 true EP2691940A1 (en) | 2014-02-05 |
EP2691940B1 EP2691940B1 (en) | 2017-10-18 |
Family
ID=44170245
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP12709625.3A Active EP2691940B1 (en) | 2011-03-29 | 2012-03-16 | Management of access rights to operating and/or control data from buildings or building complexes |
Country Status (5)
Country | Link |
---|---|
US (1) | US8689353B2 (en) |
EP (1) | EP2691940B1 (en) |
ES (1) | ES2647295T3 (en) |
PL (1) | PL2691940T3 (en) |
WO (1) | WO2012130640A1 (en) |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7706778B2 (en) | 2005-04-05 | 2010-04-27 | Assa Abloy Ab | System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone |
US9985950B2 (en) | 2006-08-09 | 2018-05-29 | Assa Abloy Ab | Method and apparatus for making a decision on a card |
US8074271B2 (en) | 2006-08-09 | 2011-12-06 | Assa Abloy Ab | Method and apparatus for making a decision on a card |
US8914851B2 (en) * | 2010-12-06 | 2014-12-16 | Golba Llc | Method and system for improved security |
US8924713B2 (en) | 2012-03-30 | 2014-12-30 | Golba Llc | Method and system for state machine security device |
CA2836137C (en) | 2012-12-05 | 2020-12-01 | Braeburn Systems Llc | Climate control panel with non-planar display |
EP2821970B2 (en) | 2013-07-05 | 2019-07-10 | Assa Abloy Ab | Access control communication device, method, computer program and computer program product |
EP2821972B1 (en) | 2013-07-05 | 2020-04-08 | Assa Abloy Ab | Key device and associated method, computer program and computer program product |
US9443362B2 (en) * | 2013-10-18 | 2016-09-13 | Assa Abloy Ab | Communication and processing of credential data |
CA2894359C (en) | 2014-06-16 | 2022-07-05 | Braeburn Systems Llc | Graphical highlight for programming a control |
US8966578B1 (en) * | 2014-08-07 | 2015-02-24 | Hytrust, Inc. | Intelligent system for enabling automated secondary authorization for service requests in an agile information technology environment |
CN107077763B (en) | 2014-09-10 | 2021-07-06 | 亚萨合莱有限公司 | First entry notification |
MX2015014860A (en) | 2014-10-22 | 2017-03-13 | Braeburn Systems Llc | Thermostat code input system and method therefor using ssid. |
CA2910895C (en) | 2014-10-30 | 2023-01-10 | Braeburn Systems Llc | System and method for monitoring building environmental data |
MX360294B (en) | 2014-10-30 | 2018-10-29 | Braeburn Systems Llc | Quick edit system. |
MX365282B (en) * | 2014-12-02 | 2019-05-29 | Inventio Ag | Method for providing a visitor controlled access into a building. |
CA2920281C (en) | 2015-02-10 | 2021-08-03 | Daniel S. Poplawski | Thermostat configuration duplication system |
US10317867B2 (en) | 2016-02-26 | 2019-06-11 | Braeburn Systems Llc | Thermostat update and copy methods and systems |
JP6728390B2 (en) | 2016-04-06 | 2020-07-22 | オーチス エレベータ カンパニーOtis Elevator Company | Mobile visitor management |
US10317919B2 (en) | 2016-06-15 | 2019-06-11 | Braeburn Systems Llc | Tamper resistant thermostat having hidden limit adjustment capabilities |
MX2017011987A (en) | 2016-09-19 | 2018-09-26 | Braeburn Systems Llc | Control management system having perpetual calendar with exceptions. |
EP4290400A3 (en) * | 2018-04-03 | 2024-03-06 | Palantir Technologies Inc. | Controlling access to computer resources |
US10921008B1 (en) | 2018-06-11 | 2021-02-16 | Braeburn Systems Llc | Indoor comfort control system and method with multi-party access |
BR102018068736A2 (en) * | 2018-09-14 | 2020-03-24 | Haganá Comércio De Sistemas Eletrônicos Ltda. | METHOD FOR ACCESS CONTROL THROUGH REMOTE COMMUNICATION DEVICES |
US10802513B1 (en) | 2019-05-09 | 2020-10-13 | Braeburn Systems Llc | Comfort control system with hierarchical switching mechanisms |
US11704441B2 (en) | 2019-09-03 | 2023-07-18 | Palantir Technologies Inc. | Charter-based access controls for managing computer resources |
CN111192393B (en) * | 2019-09-19 | 2022-04-22 | 腾讯科技(深圳)有限公司 | Network door opening method and device and computer equipment |
CN113900753B (en) * | 2021-10-09 | 2023-09-22 | 国家电网有限公司客户服务中心 | Intelligent energy information management system and method |
US11925260B1 (en) | 2021-10-19 | 2024-03-12 | Braeburn Systems Llc | Thermostat housing assembly and methods |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5850518A (en) * | 1994-12-12 | 1998-12-15 | Northrup; Charles J. | Access-method-independent exchange |
US7194554B1 (en) * | 1998-12-08 | 2007-03-20 | Nomadix, Inc. | Systems and methods for providing dynamic network authorization authentication and accounting |
SE516208C2 (en) * | 2000-03-30 | 2001-12-03 | Vattenfall Ab | Procedures and systems for identification |
US8479258B2 (en) * | 2011-01-06 | 2013-07-02 | Martin Herman Weik, III | Garage management system |
CA2324679A1 (en) * | 2000-10-26 | 2002-04-26 | Lochisle Inc. | Method and system for physical access control using wireless connection to a network |
JP3474548B2 (en) * | 2001-04-09 | 2003-12-08 | アライドテレシス株式会社 | Collective building |
WO2004011747A1 (en) * | 2002-07-31 | 2004-02-05 | Sony Corporation | Collective housing shared entrance device, collective housing door-to-door interphone device, door-to-door container box management device, and communication system |
US7831628B1 (en) * | 2005-06-01 | 2010-11-09 | Osiris Quintana | System and method for management of building department services |
US20090138953A1 (en) * | 2005-06-22 | 2009-05-28 | Dennis Bower Lyon | User controlled identity authentication |
GB0623842D0 (en) * | 2006-11-29 | 2007-01-10 | British Telecomm | Secure access |
US8239922B2 (en) * | 2007-08-27 | 2012-08-07 | Honeywell International Inc. | Remote HVAC control with user privilege setup |
TWI389536B (en) * | 2008-11-07 | 2013-03-11 | Ind Tech Res Inst | Access control system and method based on hierarchical key, and authentication key exchange thereof |
FI122260B (en) * | 2010-05-10 | 2011-11-15 | Kone Corp | Procedure and system for limiting passing rights |
-
2012
- 2012-03-16 EP EP12709625.3A patent/EP2691940B1/en active Active
- 2012-03-16 WO PCT/EP2012/054679 patent/WO2012130640A1/en active Application Filing
- 2012-03-16 ES ES12709625.3T patent/ES2647295T3/en active Active
- 2012-03-16 PL PL12709625T patent/PL2691940T3/en unknown
- 2012-03-28 US US13/433,134 patent/US8689353B2/en active Active
Non-Patent Citations (1)
Title |
---|
See references of WO2012130640A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2012130640A1 (en) | 2012-10-04 |
EP2691940B1 (en) | 2017-10-18 |
ES2647295T3 (en) | 2017-12-20 |
PL2691940T3 (en) | 2018-04-30 |
US8689353B2 (en) | 2014-04-01 |
US20120278901A1 (en) | 2012-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2691940B1 (en) | Management of access rights to operating and/or control data from buildings or building complexes | |
EP1249982A2 (en) | System and method for data communication, in particular for the parameterization and remote supervision of heating systems | |
EP3314868B1 (en) | Exchanging data with a laser or a machine tool | |
EP1722534A1 (en) | Attribute-based allocating of resources to security domains | |
DE10021222A1 (en) | Procedure for the dynamic determination of access rights | |
EP1321901B1 (en) | Method for controlling access rights to an object | |
EP3647887A1 (en) | Method and apparatus for the transmission of an access token for access to a field device used in the processing industry | |
AT503783B1 (en) | SYSTEM FOR CONTROLLING PERSONS 'AUTHORIZATION TO DO AUTHORIZED ACTIVITIES | |
WO2018114102A1 (en) | Method for checking a client assignment, computer program product, and device | |
EP3358802B1 (en) | Method for securely providing a cryptographic key | |
EP0904644A1 (en) | Distributed closed and/or open-loop control device for building management systems with network and local bus | |
DE19824814C2 (en) | Device for determining functions to be released in a telecommunications system | |
DE102006018889A1 (en) | A method for restricting access to data of group members and group management computers | |
DE102014005945A1 (en) | Method for transmitting information | |
DE10340386B3 (en) | Updating method for keeping data on presence current as allocated to a user of a communications service transmits data about the status of a registered user's presence to a server for storage | |
WO2018114101A1 (en) | Method for checking a tenant assignment, computer program product, and automation system having field devices | |
BE1030391B1 (en) | Service provider-customer communication system with central data storage and management, integrated synchronized time recording system and local terminals | |
DE602004010754T2 (en) | Expandable, local network associated with a building | |
EP2645630A1 (en) | Adaptive remote service protocol | |
DE102017217057A1 (en) | Method and device for establishing a communication channel between a first and a second device | |
DE102016108303B4 (en) | Method for establishing remote access to a building installation bus | |
DE102014008654A1 (en) | Temporary permission | |
EP4050545A1 (en) | Method for the installation of multiple door components | |
DE102009055186A1 (en) | Method for integrating new subscriber into wireless network in industrial plant, involves providing communication through wireless network by interface, and integrating new subscriber in network through data related to another interface | |
DE102022110223A1 (en) | Method for creating and monitoring a history of at least one intervention on a home automation system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20130814 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20160719 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20170515 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 938557 Country of ref document: AT Kind code of ref document: T Effective date: 20171115 Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 502012011476 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2647295 Country of ref document: ES Kind code of ref document: T3 Effective date: 20171220 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: FP |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 7 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180118 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180218 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180119 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180118 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: AT Payment date: 20180322 Year of fee payment: 7 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 502012011476 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
26N | No opposition filed |
Effective date: 20180719 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180316 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180316 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MM01 Ref document number: 938557 Country of ref document: AT Kind code of ref document: T Effective date: 20190316 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190316 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20120316 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 Ref country code: MK Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20171018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20171018 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20220324 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: PL Payment date: 20220304 Year of fee payment: 11 Ref country code: NL Payment date: 20220325 Year of fee payment: 11 Ref country code: IT Payment date: 20220323 Year of fee payment: 11 Ref country code: BE Payment date: 20220325 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: ES Payment date: 20220418 Year of fee payment: 11 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20230323 Year of fee payment: 12 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MM Effective date: 20230401 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20230331 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230401 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230331 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230331 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230331 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230316 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240328 Year of fee payment: 13 Ref country code: GB Payment date: 20240319 Year of fee payment: 13 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FD2A Effective date: 20240507 |