EP0410024B1 - Système de fermeture électronique - Google Patents

Système de fermeture électronique Download PDF

Info

Publication number
EP0410024B1
EP0410024B1 EP89113595A EP89113595A EP0410024B1 EP 0410024 B1 EP0410024 B1 EP 0410024B1 EP 89113595 A EP89113595 A EP 89113595A EP 89113595 A EP89113595 A EP 89113595A EP 0410024 B1 EP0410024 B1 EP 0410024B1
Authority
EP
European Patent Office
Prior art keywords
key
lock
area
keys
assignment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP89113595A
Other languages
German (de)
English (en)
Other versions
EP0410024A1 (fr
Inventor
Siegmar Dipl.-Ing. Zirkl
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Priority to DE58908418T priority Critical patent/DE58908418D1/de
Priority to EP89113595A priority patent/EP0410024B1/fr
Publication of EP0410024A1 publication Critical patent/EP0410024A1/fr
Application granted granted Critical
Publication of EP0410024B1 publication Critical patent/EP0410024B1/fr
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Definitions

  • the invention relates to an electronic locking system with means for forming diverse hierarchies of locking authorization, the locking system having a lock with a mechanical locking device in particular and an electronic control device in particular and further consisting of an electronic key that cooperates with the control device in detail
  • Control device and electronic key are each designed to carry out the same sequence of programmable or selectable operations that form an access code on the basis of operands which can be input when a locking operation is initiated by coupling the key to the assigned lock.
  • the key and lock are designed to have at least one assignment area for storing an access code.
  • One assignment area of the key has the function of a conventional key and another assignment area another conventional key or optionally a central locking function in a hierarchy level. Further assignment areas of a key can correspond to further conventional keys on a key ring or further hierarchy levels.
  • the invention has for its object to develop a particularly simple and universally applicable electronic locking system according to the generic term so that it corresponds to high security requirements, especially with regard to reprogramming.
  • the solution to the described problem consists in an electronic locking system according to claim 1.
  • a lock or key carrier for a security code for example a card
  • the lock or the key can be additionally assigned to a programming device by means of appropriate precautions, the security code of the wearer is part of the basis for changing the access code of the locking system.
  • the locking operation itself is carried out by coupling the key to the associated lock, for example by placing the key on the lock at a designated point.
  • An access code is understood here as a work code that embodies the authorization to lock.
  • the access code is stored in at least one assignment area per key and in one assignment area per lock.
  • the access code cannot be changed without special carriers for a security code assigned to the lock or key.
  • the security code is to be inserted, for example, into a programming device designed as a service device on a card and the same security code is also stored at the lock.
  • An assignment area of the key fulfills the function of a conventional key and another assignment area can correspond to another conventional key or alternatively fulfill a central locking function in a hierarchy level. Further assignment areas of a key can correspond to further conventional keys, for example on a key ring or further hierarchy levels.
  • the electronic locking system is particularly convenient because the locks can be easily reprogrammed by the authorized person without the need for a bus system.
  • a conventional keychain can be replaced by a single key with multiple assignment areas.
  • Several conventional keyrings can also be replaced by a key with several assignment areas. The key does not apply because only the memory area in the key is expanded. In addition, you avoid a battery in the key.
  • the assignment areas can be easily programmed and also deleted using a programming device designed as a service device.
  • Such an access code can be stored in a non-volatile, electrically programmable memory, according to today's technical development in an EEPROM.
  • the locks can be equipped with plug-in modules, each of which carries a security code and can hold an access code. In the basic version, they can initially be provided with an access code.
  • the security code is advantageously only readable, according to the current state of development, for example in ROM masks.
  • Such a security code is advantageously arranged on a carrier which, in addition to an access code, can also contain an identifier for an assignment area.
  • the hierarchical organizations can be prepared by the manufacturer by assigning corresponding or different security codes under the same assignment areas and by correspondingly providing locks with the assigned security code. This can be done on carriers that are inserted or attached to the lock in a modular manner. It is advantageous if the lock supports for carriers with security code, access code and characteristic of the assignment area.
  • a device for delivering an identifier for the assignment area is provided at the lock, which, when coupled with the key, leads to the search for the corresponding assignment area. This avoids a repeated search in the lock, which would have to be triggered by the key until the assignment area is found in the lock, which matches the corresponding assignment area of the key.
  • a flat coil can be attached in a region designated on the door, which is used for energy transmission and data exchange to the key.
  • the data transmission can advantageously take place in "frequency shift key", FSK, or in frequency modulation, FM, and can be operated in handshake mode. This eliminates the need for a battery in the key, since in the meantime alternating acknowledgment charging can electromagnetically transmit energy to a memory in the key, which ensures that the computer is supplied in the key.
  • the means for recognizing the coupling can advantageously work with pulses, in particular needle pulses, the damping of which serves as a criterion for a present coupling.
  • Securing keys which are handed over to children, can be achieved according to a further development in that the key is attached to a tether that is to be attached to a child's wrist if the access code is designed in such a way that when the tether is opened for the key is destroyed.
  • an intended opening point can be secured against impairment of the code by a supplementary device, to which contact can be made by the tether, so as not to destroy the access code when the tether is authorized to be opened.
  • a key can be called a self-deleting key.
  • the control device of the lock carries out operations on the basis of an access code if the assigned key is coupled at the intended location.
  • the core part of an access code is stored in a field.
  • an access code can consist in each case of a core part 1 or 1 ', etc. and consist of operands which are formed by a random generator in the control device of the lock.
  • the core part can be a memory field in which computing algorithms are stored.
  • the control device of the lock On the basis of the damping of a test signal, the control device of the lock is brought into the activated state, the energy store of the key is charged by the control device of the lock by inductive coupling via the coupling coils and a sequence of programmable or selectable operations on the basis of determined or specified operands and on the basis of the core part 1 of the access code in the assignment area 4 of the lock on the one hand and of the access code in the assignment area 5 of the key.
  • the energy store of the key can be charged at intervals between the arithmetic operations.
  • the computational algorithms in the core part, for the operations and for the sequence of operations can be stored in a non-volatile, electrically programmable memory, as of today in an EEPROM.
  • a number of arithmetic operations can be varied in the result by selecting specific operands.
  • these operands can each be new in the control device of the lock with the assignment area 4 formed and communicated to the assignment area 5 of the key.
  • the arithmetic operations, the arithmetic algorithms, in the assignment area 4 in the control device of the lock and in the assignment area 5 in the control device of the key then run with these selected operands as the access code.
  • the result determined for the key is fed to the lock via the communication line 6 and compared with the result for the lock. If there is a match, the lock or its locking device is actuated and opened by means of its energy store. This can be understood to mean that the door can then be opened by hand or that a bolt is automatically withdrawn.
  • An access code can also be formed by making a selection from several computing algorithms using operands. These operands can again be generated in a random generator.
  • an identifier, a word or a number is also stored in the assignment area 5 of the key as the area number with the reference symbol 2.
  • the corresponding area number 2 is also stored in the assignment area 4 of the lock.
  • the area number 2 of the assignment area 4 is fed via the control line 7 to the field with the area numbers and there to the corresponding area number. This avoids running through all access codes in the key. Otherwise, if another access code is stored in the key in the first place during the search, the operation with the computing algorithm will deliver a different result than for the assignment area 4 of the lock. If the assigned access code is finally found in the key, the results match and the lock is opened.
  • a device at the lock for issuing an identifier for the assigned core part of the access code is provided in such a way that, when coupled with the key, it immediately leads to the search for the corresponding core part, so that the search over all fields with core parts is avoided. This can significantly shorten the closing process.
  • a security code 3 is also stored in the assignment area 4 of the control device of the lock.
  • the security code can be stored in a read-out memory, a ROM. It ensures that a recoding of the lock is only possible with a programming device 8 designed as a service device if the security code 3, with its ROM mask, the programming device corresponds with the security code 3, or the ROM mask, of the lock.
  • the programming device can be inserted for programming, carrier 9 for information, for example when inserted as plug-in cards.
  • the programming device 8 has a generator 10 for operations, for example computing algorithms.
  • An area number 2 and a security code 3 are stored on the carrier 9, and a field is provided for the core part 1 of an access code.
  • the core part is a computing algorithm or a majority of computing algorithms.
  • the programming device 8 can reprogram the assignment area 4 in the control device of the lock with its core part 1 of the access code or else the access code.
  • a calculation algorithm can be generated by the generator 10 of the programming device 8, which is based on the Carrier 9 of the core part 1 of the access code is stored and transferred to the assignment area 4 of the lock as core part 1 of the access code.
  • the security code 3 of the carrier cannot be changed.
  • the programming device 8 with the inserted carrier 9 in the assignment area 4 of the lock can find the assigned area number 2 and via the communication line 6 a comparison can be made with regard to the security code 3 between the carrier 9 and the assignment area 4 of the lock.
  • the core part of the access code 1 can be reprogrammed in the assignment area 4 of the lock via a working line 11.
  • the lines 6, 7 and 11 can be understood as paths of a communication route. This can in particular be designed as an inductive transition path.
  • the corresponding area number 2 can be found in the assignment area 5 of the key by the programming device 8 when the carrier 9 is inserted via a control line 7 and the core part of the access code 1 can be reprogrammed via a work line 11.
  • the area number can be indicated by a pointer 12.
  • the pointer can point to the associated field for the core part of the access code 1 by specifying the area number.
  • the security code stored for example as a ROM mask, should be appropriately high-coded to eliminate the risk of manipulation.
  • the assignment area 5 of the key can contain a variety of assignment areas, each of which can hold the area number 2 and a corresponding core part 1 of an access code.
  • the lock can have several assignment areas 4, in the exemplary embodiment 4 and 4 ', in the manner of modules.
  • the assignment areas can be plugged in or permanently installed in the lock by the manufacturer.
  • Several hierarchy levels can be ensured by several assignment areas 4 and 4 'of the lock.
  • the carrier 9 can be displayed in a field 12 for visual indication of the area number 2.
  • the programming device is designed as a universal device that can be manufactured in large quantities.
  • the security code which is produced as a ROM mask, can be generated by the manufacturer using random generators and can be stored on the carrier 9 for the first time. Using this carrier, the number of modules required for the lock can then be assigned to an assignment area be programmed and made available by hardware.
  • the computation algorithm for the access code can be accommodated in two parts, an immutable part stored in a ROM and a variable part which is stored in a non-volatile, electrically programmable memory, for example an EEPROM.
  • a non-volatile, electrically programmable memory for example an EEPROM.
  • the amount of all arithmetic operations can be stored in the ROM, whereas the amount of the specific operands available for selection or the specific operations can be stored in the EEPROM.
  • a key can be organized according to FIG. 2, which shows a block diagram of the key according to one exemplary embodiment.
  • Signals are read into the key and transmitted from the key via a coupling coil 13.
  • energy is transmitted via the coupling coil 13 into the energy store 14 of the key.
  • An electronic switch 15 in the line to the energy store 14 is open during transmission.
  • the reading into the main memory 16 takes place via an amplifier 18 controlled by the main memory 16, which is followed by a demodulator 17.
  • the working memory 16 also accommodates the assignment area 4 or a variety of assignment areas 4, 4 'etc., each consisting of area number 2, for example B3 and B7, between which a deleted area is arranged in the example.
  • the working memory 16 further takes the respectively assigned core part 1, 1 ', 1' '. . . an access code.
  • the reading out of the working memory 16 takes place via a modulator 19 which is followed by an amplifier 20 which is controlled from the working memory 16.
  • a trigger threshold 21 fulfills the "power on reset" function.
  • the Elements Demodulator, modulator and power-on-reset can be contained in a microcomputer or created by software.
  • a slide switch 22 can expand its functional area on the key and, depending on the position, can implement a figuratively speaking further set of keys of conventional keys.
  • a lock can be organized according to FIG 3, which shows a block diagram of the lock according to one embodiment.
  • signals are read into the lock or more precisely into the working memory of the control device of the lock and sent out from the lock.
  • the reading into the main memory takes place via an amplifier 18, which is controlled by a processor 16 with main memory and which is followed by a demodulator 17.
  • the signal is fed from the connecting line between amplifier 18 and demodulator 17 to an attenuation measuring element 23.
  • the attenuation measuring element 23 determines when an attenuation of the pulses of the pulse stage 24 emitted via the coupling coil 13 occurs, corresponding to an applied key.
  • the read-out from the main memory takes place via a modulator 19, which is followed by an amplifier 20, which is controlled by a processor 16 with main memory.
  • a pulse stage 24 is connected to the input of the amplifier 20.
  • the processor 16 with the working memory of the lock is expanded by carriers for allocation areas 4 and 4 ', each of which contains a security code 3 or 3', the core part 1 or 1 'of an access code and a characteristic z. B. have an area number 2 or 2 '. In order to be able to infect such carriers at the castle, this has a plug-in rail 25 or a plug-in base with support receptacles 26.
  • the plug-in rail 25 is designed to be electrically conductive and is connected to the processor 16.
  • the operating program is stored in the permanent memory of the processor 16, for example in a ROM 27. Unchangeable parts of the computing algorithms can also be stored in the ROM 27.
  • the lock transmits needle pulses 28, which are generated by the pulse stage 24 according to FIG. 3, via the coupling coil 13 at regular time intervals. Time is plotted on the abscissa and the envelope of the signals is illustrated on the ordinate.
  • a charging phase 29 follows, which initially charges the energy store of the key. This is followed by a lock telegram 31 starting with a start bit 30.
  • the lock telegram is composed of a term for "lock" and operands for the access code.
  • the lock control unit switches to reception and the code 33 "key" is received.
  • the area number of the lock is transmitted in a transmission signal 34. This is followed by an intermediate charging phase 35, during which and the subsequent signal pause 32 there is time to perform the arithmetic operations according to the access code.
  • the signal 36 for the calculation result of the key is received at intervals 37 for bit groups with intermediate intermediate charging phases 35. If the result of the algorithm matches the key and lock access code, the lock controller sends an unlock pulse 38 to its unlocking device. Meanwhile the final word 42 can be sent to the key. After a work break 39, needle pulses 28 are again transmitted.
  • the access codes one, two and four are stored on the key "K” in its assignment area 5. So there is no storage of access code three, for example for a first garage. Only the access code one and special software are stored in a memory location 40 on the key “K1” in its assignment area 5. This software ensures that the key for toddlers is destroyed if the key strap is opened without authorization.
  • the key "R” is again a normal key, in the assignment area 5 of which only the access code one is stored.
  • the access code one is stored, for example, in the lock of the garden door, the front gate and a second entrance door.
  • Access code two is in the lock of the basement
  • access code three is in the lock of a first garage and in the lock of a study
  • the access code four in the lock of a second garage.
  • the locking system described has the function of a level authorization system. So there is no main key hierarchy. Each lock is equipped with a single assignment area. The security code can be the same for all locks. You then work with a lock type. It is advisable to work with several lock types, i.e. with similar locks and a specific security code for each lock type:
  • the exemplary embodiment described above can then be understood in such a way that the numbers one to four in the columns illustrate assignment areas, each with its own security code for each identical number.
  • the user for example the father, then receives four plug-in cards in order to be able to reprogram the four lock types, so that at least one access code can be assigned to each assignment area one to four.
  • the plug-in cards can advantageously be provided with an identifier, an area number 2, each with a number one to four.
  • Each memory location for an access code corresponds to a conventional key, so that a column, V or M or K or K1 or R corresponds to a set of keys with keys that can be made up and made out.
  • the keys that can be made out refer to the free memory locations.
  • Each assignment area 5, 5 'of the key corresponds to an assignment area 4, 4' of the lock, each with its own security code for the assignment area 4 and its own security code for the assignment area 4 '.
  • the numbers in the compartments of the columns, the numbers one to two can be understood as the order numbers of the fields for the numbers of the assignment areas.
  • Each of the tenants provides an assignment area with at least one access code. With a correspondingly high coding possibility, the assignment areas are provided with matching order numbers, i.e. area numbers, with different access codes.
  • the caretaker A has a key with the assignment areas one to three and the caretaker B with the assignment areas one, two and four. Using the assignment area one, the caretakers can lock their own apartments or offices. The caretakers have access to the tenants' apartments via the assignment areas three and four if the lock is provided with the corresponding assignment area.
  • a cleaning company has a key with assignment area two.
  • the locks can have the order number "area two" for gate, garden and underground garage in the assignment area 4.
  • the apartments 1.1, 1.2 and following can have assignment areas one and three and the apartments 2.1, 2.2 and following locks with the assignment areas one and four.
  • the rental house 41 there is a plug-in card distribution matrix for the rental house 41, so that all tenants and caretakers receive a card with the security code for "area one".
  • the caretaker A also receives the security code for the assignment areas two and three and the caretaker B in addition to the "area one" the security code for the "area four".
  • the exemplary embodiment according to FIG. 6 shows a simple master key hierarchy with up to two assignment areas in the locks.
  • the locks each have two security codes thanks to a plug-in system or secure software.
  • the locks for the apartment door are coded in "area one" and in "area two" for the gate, garden and underground car park.
  • the caretakers have no access via assignment area one. You also cannot transcode.
  • the caretaker A can, in addition to his assignment area one, recode locks with the "areas two and three" for his own apartment or for his office and the caretaker B locks with the "area four".
  • Each tenant in the exemplary embodiment according to FIG. 6 can have one or more keys.
  • the unused areas in the key can be used to form another authorization subsystem. So it is conceivable to set up the organization of a flat authorization system according to the example for a family home according to FIG. 5 for each apartment.
  • the order of the "areas" or the assignment areas in the keys can be arbitrary in practice, as can be seen from the exemplary embodiment according to FIG. 5 for the single-family house. If the locks have several assignment areas, a correspondingly multiple hierarchical authorization organization can be set up, as described by the hierarchy of rankings Master key systems of conventional locking systems is known.
  • guests 1.2 and 2.1 receive keys with assignment ranges one to three.
  • guests 1.1 and 2.2 have keys with programmed allocation ranges one to four.
  • the assignment area one refers to the room door or the door of the apartment, the assignment area two to the hotel entrance, the assignment area three to the garage and the assignment area four to the sauna.
  • Area four can be organized as an area for various access options, so that the guest can be given permission to access certain rooms, such as the sauna, if desired.
  • This assignment area can be programmed if the key is given to the guest.
  • Group A personnel are assigned to assignment areas one, two and five
  • group B personnel are assigned to assignment areas one, two and six
  • the director is assigned to assignment areas one to six
  • administration is assigned to one and three.
  • the locks are provided with modules for the following assignment areas: rooms 1.1 and following with assignment areas one and five, rooms 2.1, 2.2 and the following with assignment areas one and six.
  • the lock on the front door of the hotel is assigned to assignment area two, that of the garage with assignment area three and that of the sauna with assignment area four.
  • the reproduced distribution matrix 41 can be provided as an example.
  • the security code on a carrier for example a plug-in card, is then given the following scope: the directorate for assignment areas one to four, the administration for assignment areas one, five and six and the staff of both groups A and B for assignment area one.
  • the assignment areas are shown abbreviated in the drawing with "B".
  • the second assignment area on the room keys, the assignment area five or the reproduced assignment area six enable a main group master key hierarchy. Keys with the corresponding assignment area five or six therefore allow access to the doors with the corresponding locks regardless of the respective programming state of the assignment area one.
  • the keys of the guests, whose hospitality has ended, can, for example, be placed on a key board, which is designed as a programming device or service device.
  • the assignment areas with the access codes can thus be deleted centrally and reprogrammed when they are allocated or in stock, that is to say they can be provided with a corresponding access code.
  • FIGS. 8 and 9 illustrate a functional structure diagram of the key and the lock.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Claims (10)

  1. Système de fermeture électronique, comportant des moyens pour former de multiples hiérarchies de l'autorisation de fermeture,
    - le système de fermeture comportant notamment une installation électronique de commande et une serrure ("serrures") ayant notamment un dispositif mécanique de verrouillage, et le système de fermeture étant en outre constitué d'une clé électronique ("clés"), qui coopère avec l'installation de commande,
    - l'installation de commande et la clé électronique étant chacune formée, pour effectuer la même suite d'opérations, qui peuvent être programmées ou choisies et qui forment un code (1) d'accès, à l'aide d'opérandes que l'on peut introduire, lors du déclenchement d'une activation de fermeture, par couplage de la clé avec la serrure associée,
    - la clé et la serrure comportant au moins une zone (4, 4' ...; 5, 5'...) d'association pour mémoriser un code d'accès,
    - la fonction d'une clé conventionnelle étant dévolue à une zone (5) d'association et une autre zone d'association correspondant à une autre clé conventionnelle ou au choix, à une fonction de fermeture centrale d'un plan hiérarchique, et d'autres zones d'association d'une clé correspondant à d'autres clés conventionnelles d'un trousseau de clés ou à d'autres plans hiérarchiques, caractérisé en ce que,
    un support (9) propre à chaque serrure ou clé, et destiné à un code (3) de sûreté, par exemple une carte, peut être associé à la serrure ("serrures") ou à la clé ("clés") en prenant des dispositions correspondantes supplémentaires en ce qui concerne un appareil (8) de programmation, le code (3) de sûreté du support (9) faisant partie de la base de changement du code (1) d'accès.
  2. Système électronique de fermeture suivant la revendication 1, caractérisé en ce que la serrure ("serrures") comporte des récepteurs (26) pour support ayant un code (3) de sécurité, un code (1) d'accès et une caractéristique (2) d'identification de la zone (4,4', ...) d'association.
  3. Système électronique de fermeture suivant la revendication 1, caractérisé en ce qu'en liaison avec la serrure ("serrures"), il est prévu une installation destinée à fournir un identificateur pour la zone d'association, qui, au couplage dans la serrure avec la clé ("clés"), provoque la recherche de la zone (4, 4', ...) correspondante d'association.
  4. Système électronique de fermeture suivant la revendication 1, caractérisé par des installations, qui transmettent l'énergie de fonctionnement et des données de façon inductive à une mémoire de travail dans la clé ("clés").
  5. Système électronique de fermeture suivant la revendication 1, caractérisé en ce qu'il est prévu, pour les opérations programmables, des installations (8) connectées à un bus central pour programmer ces opérations.
  6. Système électronique de fermeture suivant la revendication 1, caractérisé en ce qu'il est prévu dans la serrure ("serrures") des moyens pour reconnaître le couplage avec une clé ("clés"), qui déclenchent l'état de service de la serrure et mettent la serrure dans un état de repos, qui économise de l'énergie, lorsque la clé n'est pas coupée avec la serrure.
  7. Système électronique de fermeture suivant la revendication 6, caractérisé en ce que les moyens pour reconnaître le couplage fonctionnent avec des impulsions, notamment des impulsions (28) en pointe, dont l'atténuation sert de critère pour un couplage effectif.
  8. Système électronique de fermeture suivant la revendication 1, caractérisé en ce que le code (1) d'accès est formé de sorte qu'il est détruit à l'ouverture d'un collier de support pour la clé ("clés"), et de sorte qu'en outre un endroit prévu pour une ouverture peut être protégé contre des dégradations du code, grâce à un appareil complémentaire, avec lequel on peut entrer en contact par le collier de support.
  9. Système électronique de fermeture suivant la revendication 1, caractérisé en ce que les supports pour le code (3) de sûreté, par exemple des cartes, sont munis d'un identificateur, par exemple un numéro (2) de zone, d'une zone (4,4', ...; 5,5', ...) d'association.
  10. Système électronique de fermeture suivant la revendication 1, caractérisé en ce que plus d'une zone (4,4', ...; 5, 5', ...) d'association est codée pour la serrure ("serrures") et pour la clé ("clés") en correspondance et'ou plus d'un dispositif de verrouillage à installation de commande est associé à un verrou de sûreté.
EP89113595A 1989-07-24 1989-07-24 Système de fermeture électronique Expired - Lifetime EP0410024B1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
DE58908418T DE58908418D1 (de) 1989-07-24 1989-07-24 Elektronisches Schliesssystem.
EP89113595A EP0410024B1 (fr) 1989-07-24 1989-07-24 Système de fermeture électronique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP89113595A EP0410024B1 (fr) 1989-07-24 1989-07-24 Système de fermeture électronique

Publications (2)

Publication Number Publication Date
EP0410024A1 EP0410024A1 (fr) 1991-01-30
EP0410024B1 true EP0410024B1 (fr) 1994-09-21

Family

ID=8201676

Family Applications (1)

Application Number Title Priority Date Filing Date
EP89113595A Expired - Lifetime EP0410024B1 (fr) 1989-07-24 1989-07-24 Système de fermeture électronique

Country Status (2)

Country Link
EP (1) EP0410024B1 (fr)
DE (1) DE58908418D1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7042334B2 (en) 2003-01-31 2006-05-09 General Electric Company Methods for managing access to physical assets
US7123127B2 (en) 2003-01-31 2006-10-17 General Electric Company System for managing physical assets
US9670694B2 (en) 2007-04-12 2017-06-06 Utc Fire & Security Americas Corporation, Inc. Restricted range lockbox, access device and methods

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4302550C2 (de) * 1993-01-29 1997-02-20 Siemens Ag Fahrzeug-Schließsystem
DE4411435A1 (de) * 1994-03-31 1995-10-05 Bayerische Motoren Werke Ag Verfahren zum Steuern der Benutzung eines Kraftfahrzeugs mit Hilfe eines aus zwei Teilen bestehenden Codesignals
DE19618526A1 (de) * 1996-05-08 1997-11-20 Zangenstein Elektro Schloßsystem
SE517464C2 (sv) * 2000-03-10 2002-06-11 Assa Abloy Ab Elektromekanisk nyckel- och låsanordning, låssystem och metod för uppdatering av auktorisationsinforamtion
SE517465C2 (sv) 2000-03-10 2002-06-11 Assa Abloy Ab Metod för att auktorisera en nyckel- eller låsanordning, elektromekanisk nyckel- och låsanordning och nyckel- och låssystem
IL146168A (en) * 1999-05-06 2005-09-25 Assa Abloy Ab Key and lock device
AU6604900A (en) * 1999-07-22 2001-02-13 Mas-Hamilton Group, Inc. Computer software for issuing one-time combinations to electronic locks with lock group control
DE19942788A1 (de) * 1999-09-08 2001-03-15 Winkhaus Fa August Schliessanlage und Verfahren zum Betrieb einer Schliessanlage
WO2001041075A1 (fr) * 1999-11-30 2001-06-07 Bording Data A/S Systeme de controle d'acces
DE10025094B4 (de) * 2000-05-20 2013-07-25 Volkswagen Ag Anordnung zum Valet-Parken für ein Kraftfahrzeug
DE10029614A1 (de) * 2000-06-15 2001-12-20 Volkswagen Ag Vorrichtung zur Bedienung von Verschlußeinrichtungen eines Fahrzeugs
EP1271418A1 (fr) 2001-06-27 2003-01-02 Nokia Corporation Procédé permettant d'accéder à un dispositif actionnable par l'utilisateur avec contrôle d'accès
ES2183739B1 (es) * 2001-08-03 2004-01-01 Talleres Escoriaza Sa Sistema de cerradura electronica para control de accesos.
EP1643457A1 (fr) * 2004-10-04 2006-04-05 SimonsVoss Technologies AG Serrure à combinaisons multiples et procédé de fonctionnement du serrure à combinaisons multiples.
CN107346109A (zh) * 2016-05-06 2017-11-14 珠海优特电力科技股份有限公司 用于作业安全的管控系统及方法
DE102021003583B4 (de) 2021-07-08 2023-03-23 Datasec Electronic Gmbh Kontaktlose Schalteinrichtung zur Zutrittskontrolle und Überwachung eines Sicherungsbereiches

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI841986A (fi) * 1984-05-17 1985-11-18 Waertsilae Oy Ab Laosningssystem.
DE3514660A1 (de) * 1985-04-23 1986-10-30 Siemens AG, 1000 Berlin und 8000 München Elektronisches schliesssystem mit mehreren schloessern und schluesseln
EP0239342A3 (fr) * 1986-03-21 1988-12-07 Emhart Industries, Inc. Systèmes de verrouillage électronique

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7042334B2 (en) 2003-01-31 2006-05-09 General Electric Company Methods for managing access to physical assets
US7123127B2 (en) 2003-01-31 2006-10-17 General Electric Company System for managing physical assets
US9670694B2 (en) 2007-04-12 2017-06-06 Utc Fire & Security Americas Corporation, Inc. Restricted range lockbox, access device and methods

Also Published As

Publication number Publication date
DE58908418D1 (de) 1994-10-27
EP0410024A1 (fr) 1991-01-30

Similar Documents

Publication Publication Date Title
EP0410024B1 (fr) Système de fermeture électronique
EP0215291B1 (fr) Dispositif de serrage pour véhicules automobiles
EP0842500B1 (fr) Dispositif de verrouillage pour systemes a acces limite dans le temps
DE69024367T2 (de) Verfahren und vorrichtung zur sicheren identifizierung und echtheitsprüfung
DE3905651C2 (fr)
DE2729062C3 (de) Sicherheitsschließanlage
EP0098437A2 (fr) Dispositif de fermeture électronique avec action réciproque par l'intermédiaire d'impulsions électriques, des sous-ensembles formant clé et serrure
DE2401602A1 (de) Elektronisches kombinationsschloss und schleusensystem
EP0103791A2 (fr) Procédé de codage pour une clé électronique
DE69125553T2 (de) Progammierbare Sicherheitsschlösser
EP0600194B1 (fr) Système de contrÔle d'accès
EP0709534A1 (fr) Serrure activée par un porteur d'identité
DE19520180A1 (de) Fernbedienung für ein Empfangsgerät
DE2224937C2 (de) Einrichtung zur Prüfung der Gültigkeit von einer Mehrzahl von Benutzern der Einrichtung zugeordneten Datenträgern
DE2851396A1 (de) Elektronische schliessvorrichtung
EP1281827B1 (fr) Système de fermeture électronique pour controle d'accès
DE69120310T2 (de) Minibarsystem
DE4138101C1 (fr)
DE19621909A1 (de) Elektronische Zugangskontrollanlage
DE3342651A1 (de) Verfahren zur absicherung des zugriffs an terminals
DE19516429A1 (de) Verfahren für eine Zugangsautorisierung zu einer gesicherten Einrichtung
DE3231063C1 (de) Programmierbare Verschlußeinrichtung mit Schlüsselkarte
CH592797A5 (en) Electronic gate circuit with separate transmitter and receiver - each with two antennae and demodulators and shift register or multiple OR=gate connected with coincidence unit
EP1155213B1 (fr) Ensemble consigne automatique
DE19618526A1 (de) Schloßsystem

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19901205

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): DE FR IT

17Q First examination report despatched

Effective date: 19930108

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): DE FR IT

REF Corresponds to:

Ref document number: 58908418

Country of ref document: DE

Date of ref document: 19941027

ITF It: translation for a ep patent filed
ET Fr: translation filed
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed
PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 19980729

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 19980917

Year of fee payment: 10

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: THE PATENT HAS BEEN ANNULLED BY A DECISION OF A NATIONAL AUTHORITY

Effective date: 19990731

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20000503

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED.

Effective date: 20050724