DE202013004667U1 - The virtual key - Google Patents

The virtual key Download PDF

Info

Publication number
DE202013004667U1
DE202013004667U1 DE201320004667 DE202013004667U DE202013004667U1 DE 202013004667 U1 DE202013004667 U1 DE 202013004667U1 DE 201320004667 DE201320004667 DE 201320004667 DE 202013004667 U DE202013004667 U DE 202013004667U DE 202013004667 U1 DE202013004667 U1 DE 202013004667U1
Authority
DE
Germany
Prior art keywords
technical
virtual
virtual key
key
devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE201320004667
Other languages
German (de)
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to DE201320004667 priority Critical patent/DE202013004667U1/en
Publication of DE202013004667U1 publication Critical patent/DE202013004667U1/en
Priority to DE102014106364.3A priority patent/DE102014106364A1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00968Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

Der virtuelle Schlüssel ermöglicht Zugang zu bestimmten Bereichen. Dieser kann sich auf technischen Geräten, wie z. B. Smartphones befinden. Dieser Schlüssel ist dadurch gekennzeichnet, dass es virtuell existiert und sich in technischen mobilen Endgeräten (wie Smartphones) befindet. Anwender dieser technischen mobilen Endgeräte können diese Schlüssel verwenden, um sich Zugang zu den entsprechend gesperrten Bereichen beschaffen bzw. technische Geräte sperren/entsperren.The virtual key provides access to specific areas. This can affect technical devices, such. B. smartphones are located. This key is characterized by the fact that it exists virtually and is located in technical mobile terminals (such as smartphones). Users of these technical mobile devices can use these keys to gain access to the corresponding restricted areas or lock / unlock technical devices.

Description

Mit Hilfe von üblichen traditionellen real existierenden Schlüsseln in materiellen Form kann man sich Zugang zu gesperrten Bereichen schaffen, in dem man die entsprechenden real existierenden Schlüssel dafür verwendet. Im einfachsten Fall bestehen diese Schlüssel aus Metall und werden an einem dem Schlüssel entsprechenden (passenden) Schloss verwendet.With the help of common traditional real existing keys in material form, one can gain access to restricted areas by using the corresponding real existing keys. In the simplest case, these keys are made of metal and are used on a lock corresponding to the key.

Diese herkömmlichen traditionellen Schlüssel sind umständlich in der Benutzung und führen Probleme mit sich, wie z. B.: Sie nehmen viel Platz weg, können beschädigt werden, können verloren gehen, können leicht vertauscht werden (wenn sie ähnlich aussehen) und eine Neuanfärtigung könnte kompliziert und Zeitaufwändig sein. Eine Abhilfe schaffen auch moderne Lösungen mittels RFID – Technologien nicht, da man hierfür ebenfalls Materialien (wie: Karten, Chips, Tags) bei sich führen muss, um zu den entsprechenden gesperrten Bereichen Zugang zu erhalten.These traditional traditional keys are cumbersome to use and cause problems such as: B: They take up a lot of space, can be damaged, can be lost, can easily be reversed (if they look similar), and a re-attachment could be complicated and time-consuming. Even modern solutions using RFID technologies do not remedy this, as you also have to carry materials (such as: cards, chips, tags) with you to gain access to the corresponding restricted areas.

Der im Schutzanspruch 1 angegebene Erfindung liegt das Problem zugrunde, ein virtuelles Schlüssel zu schaffen, welche den Zugang zu entsprechend gesperrten Bereichen ermöglichen soll. Dabei befindet sich der virtuelle Schlüssel in technischen Endgeräten, wie z. B. Smartphones, somit kann es viele andere reale Schlüssel ersetzen.The specified in the protection claim 1 invention is based on the problem to provide a virtual key, which should allow access to appropriately locked areas. Here is the virtual key in technical devices, such. As smartphones, so it can replace many other real keys.

Diese genannten Probleme werden mit den im Schutzanspruch 1 aufgeführten Merkmalen gelöst.These problems mentioned are solved with the features listed in the protection claim 1.

Mit der Erfindung wird erreicht, dass der Zugang mit Hilfe des virtuellen Schlüssels zu den entsprechend gesperrten Bereichen ermöglicht wird, ohne dass dafür herkömmliche materielle Schlüssel verwendet werden muss. Der virtuelle Schlüssel ist für die Anwender unsichtbar und kann symbolisch auf den Displays der mobilen Endgeräten (Smartphones, Tablets) dargestellt werden.With the invention it is achieved that the access with the help of the virtual key to the corresponding locked areas is made possible without the need for conventional material keys. The virtual key is invisible to users and can be displayed symbolically on the displays of mobile devices (smartphones, tablets).

Claims (7)

Der virtuelle Schlüssel ermöglicht Zugang zu bestimmten Bereichen. Dieser kann sich auf technischen Geräten, wie z. B. Smartphones befinden. Dieser Schlüssel ist dadurch gekennzeichnet, dass es virtuell existiert und sich in technischen mobilen Endgeräten (wie Smartphones) befindet. Anwender dieser technischen mobilen Endgeräte können diese Schlüssel verwenden, um sich Zugang zu den entsprechend gesperrten Bereichen beschaffen bzw. technische Geräte sperren/entsperren.The virtual key provides access to specific areas. This can affect technical devices, such. B. smartphones are located. This key is characterized by the fact that it exists virtually and is located in technical mobile terminals (such as smartphones). Users of these technical mobile devices can use these keys to gain access to the corresponding restricted areas or to lock / unlock technical devices. Viruelle Schlüssel nach Anspruch 1, dadurch gekennzeichnet, dass der Schlüssel sich in Form einer Applikation in mobilen Endgeräten bedienen lässt oder als zusätzliches technisches Endgerät existiert.Viruelle key according to claim 1, characterized in that the key can be operated in the form of an application in mobile devices or exists as an additional technical device. Virtuelle Schlüssel nach einem der vorhergenden Ansprüche, dadurch gekennzeichnet, dass die Funktion des Schlüssel über Sender/Empfänger Prinzip funktioniert.Virtual key according to one of the preceding claims, characterized in that the function of the key via transmitter / receiver principle works. Virtuelle Schlüssel nach einem der vorhergenden Ansprüche, dadurch gekennzeichnet, dass zwischen virtuelle Schlüssel und den zur Freigabe der gesperrten Bereiche existierenden technischen Geräten eine Kommunikation stattfindet.Virtual key according to one of the preceding claims, characterized in that communication takes place between virtual keys and the technical devices existing for releasing the restricted areas. Virtuelle Schlüssel nach einem der vorhergenden Ansprüche, dadurch gekennzeichnet, dass es sich auf mobilen Endgeräten befindet und kann symbolisch auf deren (falls vorhanden) Display dargestellt werden.Virtual key according to one of the preceding claims, characterized in that it is located on mobile terminals and can be represented symbolically on their (if available) display. Virtuelle Schlüssel nach einem der vorhergenden Ansprüche, dadurch gekennzeichnet, dass der Zugang zu den gesperrten Bereichen oder das sperren/entsperren von technischen Geräten bzw. das sperren/entsperren von Anwendungen auf den technischen Geräten kann durch manuelles bedienen des virtuellen Schlüssels ermöglicht werden oder positions- bzw. Zeitabhängig ermöglicht werden.Virtual keys according to one of the preceding claims, characterized in that the access to the locked areas or the locking / unlocking of technical devices or the locking / unlocking of applications on the technical devices can be enabled by manually operating the virtual key or positional or time-dependent be enabled. Virtuelle Schlüssel nach einem der vorhergenden Ansprüche, dadurch gekennzeichnet, dass der virtuelle Schlüssel virtuell ist und nicht real. (Daher kann man es nicht anfassen.)Virtual key according to one of the preceding claims, characterized in that the virtual key is virtual and not real. (That's why you can not touch it.)
DE201320004667 2013-05-13 2013-05-13 The virtual key Expired - Lifetime DE202013004667U1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
DE201320004667 DE202013004667U1 (en) 2013-05-13 2013-05-13 The virtual key
DE102014106364.3A DE102014106364A1 (en) 2013-05-13 2014-05-07 System for checking access authorization for a locking device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE201320004667 DE202013004667U1 (en) 2013-05-13 2013-05-13 The virtual key

Publications (1)

Publication Number Publication Date
DE202013004667U1 true DE202013004667U1 (en) 2013-07-31

Family

ID=49044308

Family Applications (1)

Application Number Title Priority Date Filing Date
DE201320004667 Expired - Lifetime DE202013004667U1 (en) 2013-05-13 2013-05-13 The virtual key

Country Status (1)

Country Link
DE (1) DE202013004667U1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE20011760U1 (en) * 2000-07-06 2001-01-11 Ortlepp Wolfgang Mobile phone or module that can be connected to it for actuating a locking and security device or a remote control receiver
DE10005087A1 (en) * 2000-02-04 2001-08-09 Matthias Gradenwitz Mobile telephone with integrated remote control uses same key-pad and display to control all functions
US20020180582A1 (en) * 1999-11-30 2002-12-05 Nielsen Ernst Lykke Electronic key device a system and a method of managing electronic key information
US20060218627A1 (en) * 2005-03-25 2006-09-28 Nec Corporation Authentication system and the authentication method which use a portable communication terminal
DE202009005403U1 (en) * 2009-04-08 2009-06-25 Thürnau, Bernd Device for releasing a closed closing element, in particular a door
US20120068818A1 (en) * 2009-04-03 2012-03-22 Inventio Ag Access control system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020180582A1 (en) * 1999-11-30 2002-12-05 Nielsen Ernst Lykke Electronic key device a system and a method of managing electronic key information
DE10005087A1 (en) * 2000-02-04 2001-08-09 Matthias Gradenwitz Mobile telephone with integrated remote control uses same key-pad and display to control all functions
DE20011760U1 (en) * 2000-07-06 2001-01-11 Ortlepp Wolfgang Mobile phone or module that can be connected to it for actuating a locking and security device or a remote control receiver
US20060218627A1 (en) * 2005-03-25 2006-09-28 Nec Corporation Authentication system and the authentication method which use a portable communication terminal
US20120068818A1 (en) * 2009-04-03 2012-03-22 Inventio Ag Access control system
DE202009005403U1 (en) * 2009-04-08 2009-06-25 Thürnau, Bernd Device for releasing a closed closing element, in particular a door

Similar Documents

Publication Publication Date Title
DE102012008395A1 (en) Method and system for secure key handover
EP2835732A3 (en) Electronic device provided with touch screen and operating method thereof
Thomson Local faith actors and protection in complex and insecure environments
AT515703A5 (en) LOCKING DEVICE
TR201001561A2 (en) Four-way electronic lock.
DE102014106364A1 (en) System for checking access authorization for a locking device
DE202013004667U1 (en) The virtual key
BRPI0503226A (en) system and method for generating a safe status indicator on a screen
CN205318502U (en) Developments trick lock
DE102014220527B4 (en) System and method for controlling a vehicle door
CN205003757U (en) Safety device is deposited to finance seal
DE102015216547A1 (en) Access control system, access control arrangement with the access control system and method of operation
DE202009005403U1 (en) Device for releasing a closed closing element, in particular a door
MX2017002590A (en) Anti-vandalism padlock.
Gibson Constructing the World's Largest Prison: Understanding Identity by Examining Labor
CN105788033A (en) Cipher-fingerprint theftproof lock
CN202788280U (en) Verification code type electronic lock
Broder Blunders abounded before gulf spill, panel says
DE102011101711A1 (en) Method for authenticating person for accessing information-technology (IT)/non-technology (NT) system in bank, involves comparing authentication code with authentication input of user interface transmitted to data processing unit
DE202016106519U1 (en) Release system and display device for access to a work equipment
PH12014000231A1 (en) Lock arrangement
Hawkins Credit Reporting Dispute
DE102013218066A1 (en) Railway system
CN106150223A (en) Fireproofing door lock
Rutherford Rutherford

Legal Events

Date Code Title Description
R163 Identified publications notified
R207 Utility model specification

Effective date: 20130919

R156 Lapse of ip right after 3 years