EP0539763B1 - Système de contrÔle - Google Patents

Système de contrÔle Download PDF

Info

Publication number
EP0539763B1
EP0539763B1 EP92116992A EP92116992A EP0539763B1 EP 0539763 B1 EP0539763 B1 EP 0539763B1 EP 92116992 A EP92116992 A EP 92116992A EP 92116992 A EP92116992 A EP 92116992A EP 0539763 B1 EP0539763 B1 EP 0539763B1
Authority
EP
European Patent Office
Prior art keywords
data
reader
control
memory
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP92116992A
Other languages
German (de)
English (en)
Other versions
EP0539763A2 (fr
EP0539763A3 (fr
Inventor
Anatoli Stobbe
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=6443213&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP0539763(B1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Individual filed Critical Individual
Publication of EP0539763A2 publication Critical patent/EP0539763A2/fr
Publication of EP0539763A3 publication Critical patent/EP0539763A3/de
Application granted granted Critical
Publication of EP0539763B1 publication Critical patent/EP0539763B1/fr
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00579Power supply for the keyless data carrier
    • G07C2009/00603Power supply for the keyless data carrier by power transmission from lock
    • G07C2009/00611Power supply for the keyless data carrier by power transmission from lock by using inductive transmission
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Definitions

  • the invention relates to a control system as access control to objects such as rooms, buildings, building complexes, etc. according to the preamble of claim 1.
  • Control systems of this type are known. They serve to give only authorized persons access to certain objects, buildings or rooms, etc.
  • Essential components of such a control system are a data carrier with a programmable memory and a reader for reading data that is transmitted wirelessly from the data carrier, for example.
  • the reader evaluates the received data and routes it to a central evaluation unit.
  • the authorization data are checked here and, if they match the test data stored in the evaluation unit, the evaluation unit enables access to the specific object, for example by unlocking a door and allowing the authorized person to enter the room.
  • the data carriers used in such control systems often also referred to as transponders or detection plates - are known per se, for example, from DE 40 03 410 A1.
  • these data carriers are the size of a check card and, as essential components, comprise a chip with a programmable and readable data memory and an antenna.
  • Magnetic cards with a magnetic memory or other data carriers can also be used.
  • the data carrier is carried by the authorized person and, in the case of wireless data transmission, is brought near the reader if necessary, who is, for example, fixedly mounted near a door frame of the door of a building or a room. Then, as described above, those in the disk stored data transmitted wirelessly to the reader and further evaluated in order to open a door if the data matches, which happens when the correct data carrier with the assigned authorization data is used for the object in question.
  • bit allocation map is determined for the data carrier, which comprises several groups of individual bits, each group characterizing a very special identifier in order to control corresponding authorization functions.
  • a common structure of a bit allocation pattern includes, for example, a country code, a system code, the card number of the data carrier in question and possibly bits for a check digit as additional security. All these bits together form the useful bits or the authorization data, which are transmitted from the data carrier to the reader. Depending on the scope of the identification data, this results in a different number of bits, which determines the size of the memory.
  • the manufacturer of the data carriers and the readers must program the data carriers and also the readers accordingly, taking into account the bit allocation pattern. This programming of all readers and data carriers means a considerable expenditure of time, and in connection with this also a significant cost factor.
  • the manufacturer interprets the memory capacity of the reader so that the maximum number of useful bits can be processed. However, if it later turns out in an order that the customer needs fewer useful bits for his bit allocation pattern, the remaining bits that are not required would be read uselessly during operation and forwarded to the evaluation unit.
  • the invention has for its object a Control system of the type mentioned in the preamble of claim 1 to be improved so that readers can be used whose programming required according to the respective special requirements is significantly simplified.
  • the invention is based on the fact that the customer-specific programming of the data carrier is basically adhered to.
  • the invention offers the significant advantage that it is no longer necessary to program the assigned readers in accordance with customer requirements. Rather, it is made possible by the invention to use virgin neutral readers and to install them on the object in question, so that the time-consuming programming of the readers previously required can be dispensed with.
  • the reader is programmed through the data carrier, which has already been programmed with all the necessary data.
  • Virgin and neutral readers have the advantage that they are produced in large numbers by the manufacturer and can now be kept in stock by the customer and used there immediately if required. The customer can use the neutral readers directly in different systems.
  • control data when programming the data carrier, in addition to the authorization data, control data are also stored, which contain information about the number of useful bits of the authorization data, and this control data is transmitted to the reader in addition to the authorization data.
  • the virgin reader or its memory is programmed by the control data in such a way that the reader can recognize the predetermined number of useful bits of the authorization data and can pass it on to the central evaluation unit in an unadulterated manner.
  • the virgin readers provided in the invention and to be regarded as neutrals can thus in principle be used for all possible types of data carriers. As before, only the data carrier itself needs to be programmed, with additional programming using the control data mentioned taking place according to the invention. In contrast, programming the readers themselves is no longer necessary.
  • control data of the programmed data carrier additionally contain information about the type of the output formats with which the useful bits of the authorization data are read out by the reader and forwarded to the central evaluation unit.
  • the advantage of this measure is that, by appropriate programming of the data carrier, it can be specified with which of the different possible output formats the data of the reader are routed to the central evaluation unit, thereby adapting different evaluation units.
  • control data additionally contain test data with which test functions on the reader are activated.
  • This measure enables certain test functions to be carried out to check the reader. For example, signals on the line leading from the reader to the central evaluation unit can be measured using a known bit pattern. A hardware test can also be carried out, for example by checking the functions of indicator lights on the reader.
  • control data additionally also contain customer data which represent a specific customer number.
  • the reader memory of the reader has an initially unprogrammed read-only memory, in which the customer data is written once during commissioning, that is to say during the first data transfer from the data carrier, and is permanently retained there.
  • This advantageous development of the invention further increases the security of a control system.
  • the use of the control system is only possible if the permanently assigned customer number, which is previously stored in the data carrier, matches the customer number in the read-only memory. This ensures that access to certain secure rooms can only be achieved with a data carrier if the customer number of the data carrier matches the customer number located in the read-only memory of the reader memory. Misuse of data carriers by another customer who has a different customer number is therefore excluded.
  • FIG. 1 illustrates the basic structure of a control system using a data carrier 10 with a programmable memory 12. Furthermore, the control system comprises a reader 16, which is installed in a fixed position near a door 32 and is connected to an energy source.
  • the reader 16 has a reader memory 18 (RAM), a read-only memory (EEPROM) 20 and a comparator 22. Furthermore, a plurality of function lamps 26 are provided which optically signal the operating state and other functions of the reader.
  • RAM reader memory
  • EEPROM read-only memory
  • comparator 22 comparator 22
  • a plurality of function lamps 26 are provided which optically signal the operating state and other functions of the reader.
  • the reader 16 is connected via data lines 24 to a central evaluation unit 28 to which several readers can be connected.
  • a line 30 leads from the evaluation unit 28 to the door lock of the door 32, which is only released and thus allows access to a room if an authorized person has the appropriate data carrier 10.
  • an enable signal is transmitted via line 30, which opens the door 32.
  • the data received by the reader 16 are read by it in a manner to be explained in more detail. Only the authorization data are then forwarded to the evaluation unit 28 via the data lines 24. There, the transmitted authorization data is compared with the test data located in the evaluation unit 28. If the authorization data match the test data, a release signal reaches door 32 via line 30.
  • FIG. 2 shows an example of a bit allocation pattern, such as may arise for certain objects to be secured on customer request.
  • the bit allocation pattern here comprises 32 bits, which form the useful bits 44 and the authorization data 34.
  • the bit allocation pattern generally defines the number, the positions and the meaning of the bits.
  • the first four identifier bits 36 form a country identifier, that is to say they define a specific country for the use of the data carrier.
  • identifier bits 40 are followed by two further identifier bits 42, one for security Represent check digit, for example to check the correct structure of the bit allocation pattern.
  • bits are each represented by either a "zero” or a "one", so that the bit allocation pattern appears as a sequence of zeros and ones.
  • the associated bit allocation pattern can be defined and set up. So far, it was the case that both the data carrier and the reader were programmed accordingly.
  • virgin readers with a RAM memory can be used, since the readers are programmed wirelessly from the data carrier, using control data 50 present in the data carrier, which are transmitted to the reader 16 in addition to the authorization data 34.
  • FIG. 3 shows a schematic representation of the structure of a data record in the data carrier 10.
  • the control data 50 with the control bits follow a header 48 which is used for synchronization.
  • the actual useful bits 44 then follow, which form the authorization data 34, and finally the data record structure also includes check data 52 in a manner known per se, with which the control data 50 and the authorization data 44 can be checked in a manner known per se.
  • the control data 50 enables the reader 16 to correctly read the authorization data 34, which has also been transmitted, and to pass it on to the central evaluation unit 28 in an unadulterated manner.
  • the position of the first useful bit can either be defined in the data carrier 10 and in the reader 16 from the start or transmitted with the control data 50.
  • control data 50 comprise a plurality of information data sets 54, 56, 58 and 60.
  • the information data record 56 specifies the number of available useful bits, ie 32 useful bits in the case of the bit allocation pattern according to FIG. 2.
  • the subsequent information data record 58 defines one of several possible output formats. It is thus determined in which output format the authorization data 34 is interpreted by the reader 16 and is led to the central evaluation unit 28 via the data lines 24 (cf. FIG. 1). Different output formats are known in the prior art, so that a detailed explanation is not given here.
  • Desired test functions are defined by the further information data record 60 in order to be able to check the operation of the reader 16 if necessary or to be able to measure signals on the lines 24 using known bit patterns. Special data carriers corresponding to the respective test functions are then preferably used. Such test functions are also known. What is new, however, is the fact that the information data set 60 relating to the test functions as well as the information data sets 56 and 58 are transmitted from the data carrier to the reader by the control data 50.
  • the data in the information data sets 56 (number of useful bits), 58 (output format) and 60 (test functions) are read by the reader 16 as variable data viewed and overwritten in the memory again and again when a wireless transmission takes place from the data carrier 10.
  • a RAM can therefore be used for the reader memory 18.
  • the control data 50 (the information data record 54 still shown in FIG. 4 will be discussed in greater detail below) enables the reader to correctly receive the actual authorization data 34 or the predetermined number of useful bits 44 and to the central evaluation unit 28 in an unadulterated manner to be able to forward.
  • the control data 50 thus effect an operation of the reader 16 which corresponds to the operation of a known reader which was previously programmed in a complex manner in accordance with a bit allocation pattern.
  • control data also comprise an information data record 54 which reproduces a predetermined customer number (or another assignment number).
  • the reader 16 has a read-only memory (EEPROM) 20, in which the information data record 54, ie the customer number, during the first data transmission from the data carrier 10 to the reader 16 is taken over once.
  • the information data record 54 is then permanently retained in the permanent memory 20.
  • the information data record 54 is therefore only written once by the reader 16 into the initially unprogrammed read-only memory 20.
  • the use of a customer number which is represented by the information data record 54, ensures that the reader 16 only responds to data carriers 10 whose customer number matches the customer number stored in the permanent memory 20.
  • the reader 16 will therefore only recognize the received data and pass it on to the central evaluation unit 28 if the named customer numbers match.
  • the reader 16 has a comparison circuit 22 (cf. FIG. 1) with which it is determined whether the required identity of the customer number sent from the data carrier 10 is identical to that in the fixed memory 20 customer number is available.
  • the reader 16 becomes active only in this case, and only then is the authorization data 34 forwarded to the central evaluation unit 28 via the data lines 24.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Iron Core Of Rotating Electric Machines (AREA)
  • Crystals, And After-Treatments Of Crystals (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Claims (6)

  1. Installation de contrôle en tant que contrôle d'accès à des immeubles comme des locaux, des bâtiments, des groupes de bâtiments, etc., comportant au moins un support programmé de données (10) affecté à une personne, dans la mémoire programmable (12) duquel sont mémorisées les données d'autorisation spécifiques (34) à la personne concernée et à l'objet concerné, qui sont déterminées dans un topogramme de distribution de bits et qui sont constituées d'un nombre prédéterminé de bits utiles (44), et comportant un lecteur (16) installé fixe sur l'immeuble, pourvu d'une mémoire de lecteur programmable (18) et destiné à la réception, en particulier à la réception sans fil des données d'autorisation spécifiques (34) mémorisées dans le support de données (10), les données d'autorisation étant envoyées par le lecteur (16) à une unité centrale d'évaluation (28) en circuit, laquelle libère l'accès à l'immeuble s'il y a concordance des données d'autorisation reçues du lecteur (16) avec des données de contrôle mémorisées dans l'unité d'évaluation (28), caractérisée en ce que la mémoire (18) du lecteur (16) n'est pas programmée, ni initialisée, en ce que, dans la mémoire (12) du support de données (10), sont programmées, outre les données d'autorisation (34), des données de commande supplémentaires (50) qui renferment, à cet effet, une information sur le nombre de bits utiles (44) que les données d'autorisation (34) comprennent, en ce que les données de commande (50) sont envoyées, en plus des données d'autorisation (34), au lecteur (16) dont la mémoire (18), auparavant non initialisée et non programmée, est programmée par les données de commande (50) de façon que le lecteur (16) puisse reconnaître le nombre prédéterminé de bits utiles (44) des données d'autorisation (34) et puisse transmettre exactement le topogramme de distribution de bits ou les bits utiles à l'unité centrale d'évaluation (28).
  2. Installation de contrôle suivant la revendication 1, caractérisée en ce que les données de commande (50) renferment des informations supplémentaires (58) sur le genre du format de sortie avec lequel les bits utiles (44) des données d'autorisation (34) sont lus du lecteur (16) et retransmis à l'unité centrale d'évaluation (28).
  3. Installation de contrôle suivant la revendication 1 et/ou la revendication 2, caractérisée en ce que les données de commande (50) renferment des données de test (60) avec lesquelles peuvent être réalisées des fonctions de test sur le lecteur (16).
  4. Installation de contrôle suivant une des revendications précédentes 1 à 3, caractérisée en ce que les données de commande (50) renferment des données de client supplémentaires (54) qui représentent un numéro de client.
  5. Installation de contrôle suivant la revendication 4, caractérisée en ce que la mémoire (18) de lecteur contient une mémoire morte (EEPROM) non programmée (20) dans laquelle sont, une seule fois, écrites les données de client (54) par le support de données (10) et qui y restent en permancence.
  6. Installation de contrôle suivant la revendication 5, caractérisée en ce que le lecteur (16) possède un circuit de comparaison (22) ou un programme de comparaison qui comparent les données de client mémorisées dans la mémoire morte (20) au données de client (54) envoyées par le support de données (10), et en ce que les données d'autorisation (34) ne sont transmises à l'unité d'évaluation (28) que s'il y a concordance des données mentionnées de client (54) provenant du lecteur (16).
EP92116992A 1991-10-23 1992-10-05 Système de contrÔle Expired - Lifetime EP0539763B1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE4134922A DE4134922C1 (fr) 1991-10-23 1991-10-23
DE4134922 1991-10-23

Publications (3)

Publication Number Publication Date
EP0539763A2 EP0539763A2 (fr) 1993-05-05
EP0539763A3 EP0539763A3 (fr) 1995-06-14
EP0539763B1 true EP0539763B1 (fr) 1996-08-14

Family

ID=6443213

Family Applications (1)

Application Number Title Priority Date Filing Date
EP92116992A Expired - Lifetime EP0539763B1 (fr) 1991-10-23 1992-10-05 Système de contrÔle

Country Status (5)

Country Link
US (1) US5491471A (fr)
EP (1) EP0539763B1 (fr)
AT (1) ATE141430T1 (fr)
CA (1) CA2080716C (fr)
DE (2) DE4134922C1 (fr)

Families Citing this family (95)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6631842B1 (en) * 2000-06-07 2003-10-14 Metrologic Instruments, Inc. Method of and system for producing images of objects using planar laser illumination beams and image detection arrays
DE4305361A1 (de) * 1993-02-22 1994-08-25 Siemens Ag Verfahren zur Sicherstellung der exklusiven Bedienung von Geräten und/oder Anlagen, insbesondere Förderfahrzeugen, durch berechtigte Personen
DE4308193C2 (de) * 1993-03-15 1998-05-14 Siemens Ag Benutzungskontrollanlage für Lifte und Seilbahnen
BE1007453A3 (fr) * 1993-09-13 1995-07-04 Ledent Georges Systeme integre de controle a distance, des inventaires permanents d'unites marquees individuellement, applique aux bovins.
DE4337637A1 (de) * 1993-11-04 1995-05-11 Licentia Gmbh Transponder und Datenkommunikationssystem
US7387253B1 (en) 1996-09-03 2008-06-17 Hand Held Products, Inc. Optical reader system comprising local host processor and optical reader
JP3526928B2 (ja) * 1994-11-15 2004-05-17 株式会社ルネサスLsiデザイン 非接触icカードシステム
DE4440855C2 (de) * 1994-11-15 2000-04-06 Simons & Vos Identifikationssy Kontrollsystem
DE19519450C2 (de) * 1995-05-26 1997-06-12 Oliver Simons Kontrollsystem
DE19542732B4 (de) * 1995-11-16 2007-06-14 Littlefeet, Inc., Fremont Verfahren zur Erkennung des Mißbrauchs einer Zugangsberechtigung
DE19604206A1 (de) * 1996-02-06 1997-08-07 Martin Ulrich Transponder zum Übertragen insbesondere sicherheitstechnisch relevanter Daten zu einem Basisgerät
US6097292A (en) * 1997-04-01 2000-08-01 Cubic Corporation Contactless proximity automated data collection system and method
DE19613178A1 (de) * 1996-04-02 1997-10-09 Heinrich Landert Verfahren zum Betrieb einer Türanlage und eine nach dem Verfahren arbeitende Türanlage
US6945457B1 (en) 1996-05-10 2005-09-20 Transaction Holdings Ltd. L.L.C. Automated transaction machine
DE19621909A1 (de) * 1996-05-31 1997-12-11 Michael Kohne Elektronische Zugangskontrollanlage
GB9613726D0 (en) * 1996-06-28 1996-08-28 Cassiere Uk Limited Improvements relating to locking systems
DE29613136U1 (de) * 1996-08-02 1997-11-27 Rösler, Klaus-Dieter, Dipl.-Ing., 28844 Weyhe Schloß- oder Zugangsberechtigungssystem
US20040004128A1 (en) * 1996-09-03 2004-01-08 Hand Held Products, Inc. Optical reader system comprising digital conversion circuit
US5666106A (en) * 1996-09-04 1997-09-09 Micron Electronics, Inc. Accessway with grounding sensor
DE19738938B4 (de) * 1996-09-16 2009-04-02 Simonsvoss Technologies Ag Schloß
DE19641022A1 (de) * 1996-10-07 1998-04-09 Abb Patent Gmbh Einrichtung zum Scharf-und Unscharfschalten einer Gefahrenmeldeanlage
US6570487B1 (en) * 1997-01-24 2003-05-27 Axcess Inc. Distributed tag reader system and method
US5982888A (en) * 1997-02-13 1999-11-09 American Game Technologies Programmable key and receptacle system and method therefor
DE19713736A1 (de) * 1997-04-03 1998-10-08 Draegerwerk Ag Vorrichtung und Verfahren zum Erfassen und Identifizieren von tragbaren Benutzerkennungseinheiten
DE29710694U1 (de) * 1997-06-19 1997-09-11 HSB Industrieelektronik GmbH, 97657 Sandberg Näherungsschalter mit Datenübertragung über ein elektromagnetisches Feld
DE19731035B4 (de) * 1997-07-18 2004-09-02 Anatoli Stobbe Verfahren zur Datenübertragung zwischen einem Schreib-Lesegerät und einem Transponder
US6157952A (en) * 1997-08-20 2000-12-05 Keri Systems, Inc. Method and apparatus for networked access control
US5936544A (en) * 1997-09-30 1999-08-10 Pittway Corporation Wireless access system
DE19744781C2 (de) * 1997-10-10 2000-03-02 Anatoli Stobbe Verfahren zur Datenübertragung zwischen einem Schreib-Lesegerät und einem Transponder sowie Vorrichtung zur Durchführung des Verfahrens
US6942143B1 (en) * 1997-10-16 2005-09-13 Dentsu, Inc. System and method for accessing broadcast media in data communication with a broadcast receiving device
US6766946B2 (en) * 1997-10-16 2004-07-27 Dentsu, Inc. System for granting permission of user's personal information to third party
ATE264979T1 (de) * 1998-02-16 2004-05-15 Skidata Ag Betätigungsvorrichtung
DE19838129C2 (de) * 1998-08-21 2000-10-12 Simons & Vos Identifikationssy Elektronisches Schließsystem
US6411199B1 (en) 1998-08-21 2002-06-25 Keri Systems, Inc. Radio frequency identification system
DE19908511A1 (de) * 1999-02-26 2000-09-07 Simons & Vos Identifikationssy Schließvorrichtung
US7005985B1 (en) * 1999-07-20 2006-02-28 Axcess, Inc. Radio frequency identification system and method
WO2001026048A2 (fr) * 1999-10-01 2001-04-12 Keri Systems, Incorporated Lecteur electronique destine a lire une caracteristique d'un objet
AU4136201A (en) * 1999-11-16 2001-05-30 United States Postal Service Electromagnetic postal indicia and method of applying same
AU2131801A (en) * 1999-12-07 2001-06-18 Ilco Unican Inc. Key control system for electronic locks
US7286158B1 (en) 1999-12-22 2007-10-23 Axcess International Inc. Method and system for providing integrated remote monitoring services
US7120935B2 (en) * 2000-08-10 2006-10-10 Shield Security Systems, Llc Interactive key control system and method of managing access to secured locations
FR2813515B1 (fr) * 2000-09-05 2003-03-28 Blr Dispositif de commande et d'autorisation d'acces a une vitrine d'exposition
AU2002227200A1 (en) * 2000-11-02 2002-05-15 Best Access Systems Vending machine lock
US6486950B1 (en) * 2000-12-05 2002-11-26 Jds Uniphase Corporation Multi-channel wavelength monitor
EP1233129A1 (fr) * 2001-02-16 2002-08-21 Sensotec AG Serrure électronique programmable et procédé de programmation d'une serrure électronique
US6988203B2 (en) * 2001-04-06 2006-01-17 Honeywell International Inc. System and method of extending communications with the wiegand protocol
FR2826394B1 (fr) * 2001-06-25 2004-03-19 Cogelec Systeme et procede de controle d'acces comportant plusieurs centrales d'acces
TWI222609B (en) * 2001-07-25 2004-10-21 Matsushita Electric Ind Co Ltd A method of producing a decrypting apparatus having a cryptographic device and cryptographic information, a system for providing such device and information, and the decrypting apparatus produced by the production method
US7248836B2 (en) * 2001-09-30 2007-07-24 Schlage Lock Company RF channel linking method and system
US20030096607A1 (en) * 2001-09-30 2003-05-22 Ronald Taylor Maintenance/trouble signals for a RF wireless locking system
US20030103472A1 (en) * 2001-09-30 2003-06-05 Ronald Taylor RF wireless access control for locking system
US7346331B2 (en) * 2001-09-30 2008-03-18 Harrow Products, Llc Power management for locking system
US7006799B2 (en) * 2001-09-30 2006-02-28 Harrow Products Llc Energy saving motor-driven locking subsystem
US7065323B2 (en) * 2001-09-30 2006-06-20 Harrow Products, Inc. RF dynamic channel switching method
US7289764B2 (en) * 2001-09-30 2007-10-30 Harrow Products, Llc Cardholder interface for an access control system
US20030098780A1 (en) * 2001-09-30 2003-05-29 Ronald Taylor General access control features for a RF access control system
US7113073B2 (en) 2001-09-30 2006-09-26 Harrow Products, Llc System management interface for radio frequency access control
US20030112123A1 (en) * 2001-12-19 2003-06-19 Hom Wayne C. Method and apparatus for providing a programmable gate security system
DE10209015A1 (de) * 2002-02-25 2003-09-18 Dom Sicherheitstechnik Zugangskontrollsystem, -anlage und -verfahren
WO2003085587A1 (fr) * 2002-04-10 2003-10-16 Axalto Sa Ensemble comprenant une carte a puce et un lecteur
EP1353289A1 (fr) * 2002-04-10 2003-10-15 Schlumberger Systèmes Système comportant une carte à puce et un lecteur
JP4323146B2 (ja) * 2002-08-29 2009-09-02 株式会社東海理化電機製作所 照明システム
US20040189439A1 (en) * 2003-03-28 2004-09-30 Cansino Juan Miguel Dominguez Local and remote management of lock systems from a network
DE10318884A1 (de) * 2003-04-17 2004-11-18 Volkswagen Ag Transponder und Verfahren zur Überwachung von Objekten
DE10325089A1 (de) 2003-06-04 2004-12-30 Leopold Kostal Gmbh & Co Kg Verfahren zum funktionellen Verheiraten der Komponenten einer Authentisierungseinrichtung miteinander sowie Authentisierungseinrichtung
DE602004004129T2 (de) 2003-06-13 2007-10-04 Sap Ag Datenverarbeitungssystem
WO2005026475A2 (fr) * 2003-09-11 2005-03-24 Stanley Security Solutions, Inc. Serrure pour distributeur automatique
US20060059963A1 (en) * 2004-01-20 2006-03-23 Harrow Products Llc Wireless access control system including wireless exit kit (''WEXK'') with panic bar
US7747286B2 (en) * 2004-01-20 2010-06-29 Harrow Products Llc Wireless access control system with energy-saving piezo-electric locking
US7639117B2 (en) * 2004-01-20 2009-12-29 Harrow Products Llc Access control system with energy-saving optical token presence sensor system
US20050224313A1 (en) * 2004-01-26 2005-10-13 Cubic Corporation Robust noncontact media processor
US7841120B2 (en) 2004-03-22 2010-11-30 Wilcox Industries Corp. Hand grip apparatus for firearm
US7616090B2 (en) * 2004-05-20 2009-11-10 Von Duprin, Inc. Electronic security system
FR2882177B1 (fr) * 2005-02-15 2007-05-11 Cogelec Soc Par Actions Simpli Lecteur et tete de lecture de cles a transpondeur et systeme de controle d'acces incorporant ces lecteur et tete de lecture
US20060181395A1 (en) 2005-02-16 2006-08-17 Sensormatic Electronics Corporation Techniques to configure radio-frequency identification readers
US20070109098A1 (en) * 2005-07-27 2007-05-17 Siemon John A System for providing network access security
DE102006007262B3 (de) 2006-02-10 2007-05-10 Atmel Germany Gmbh Verfahren zur drahtlosen Datenübertragung zwischen einer Basisstation und einem Transponder mittels induktiver Kopplung
US20070205896A1 (en) * 2006-03-02 2007-09-06 Axcess International Inc. System and Method for Determining Location, Directionality, and Velocity of RFID Tags
US20070285241A1 (en) * 2006-03-20 2007-12-13 Axcess International Inc. Multi-Tag Tracking Systems and Methods
US7800503B2 (en) * 2006-05-11 2010-09-21 Axcess International Inc. Radio frequency identification (RFID) tag antenna design
US8063734B2 (en) * 2006-11-06 2011-11-22 Harrow Products Llc Access control system wherein the remote device is automatically updated with a central user list from the central station upon use of the remote device
US20080129444A1 (en) * 2006-12-01 2008-06-05 Shary Nassimi Wireless Security System
US8186585B2 (en) * 2007-07-24 2012-05-29 Honeywell International Inc. Integrated on-line door control system with standardized interfaces
US7967197B2 (en) * 2007-07-24 2011-06-28 Honeywell International Inc. Integrated online door via electronic door handle
US20090153290A1 (en) * 2007-12-14 2009-06-18 Farpointe Data, Inc., A California Corporation Secure interface for access control systems
US8638194B2 (en) * 2008-07-25 2014-01-28 Axcess International, Inc. Multiple radio frequency identification (RFID) tag wireless wide area network (WWAN) protocol
US8358783B2 (en) * 2008-08-11 2013-01-22 Assa Abloy Ab Secure wiegand communications
ES2485501T3 (es) * 2008-08-14 2014-08-13 Assa Abloy Ab Lector de RFID con heurísticas de detección de ataques incorporadas
US20130006479A1 (en) * 2009-07-30 2013-01-03 Anderson Gerald G Microchip System and Method for Operating a Locking Mechanism and for Cashless Transactions
US9805529B2 (en) * 2012-10-12 2017-10-31 United Parcel Service Of America, Inc. Concepts for asset identification
US11671807B2 (en) 2016-11-11 2023-06-06 Carnival Corporation Wireless device and methods for making and using the same
US10499228B2 (en) 2016-11-11 2019-12-03 Carnival Corporation Wireless guest engagement system
US10045184B2 (en) * 2016-11-11 2018-08-07 Carnival Corporation Wireless guest engagement system
US10452877B2 (en) 2016-12-16 2019-10-22 Assa Abloy Ab Methods to combine and auto-configure wiegand and RS485
EP3779899A1 (fr) * 2019-08-16 2021-02-17 EUCHNER GmbH + Co. KG Système de contrôle

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3944928A (en) * 1974-07-01 1976-03-16 Microlab/Fxr Harmonic communication system
US3959633A (en) * 1974-09-10 1976-05-25 Merck & Co., Inc. Security guard recording system
US4144523A (en) * 1977-11-23 1979-03-13 General Motors Corporation Digital key system
US4384288A (en) * 1980-12-31 1983-05-17 Walton Charles A Portable radio frequency emitting identifier
US4471345A (en) * 1982-03-05 1984-09-11 Sensormatic Electronics Corporation Randomized tag to portal communication system
DE3420100C2 (de) * 1984-05-25 1986-05-07 Deister Elektronik GmbH, 3013 Barsinghausen Kontrollanlage mit mindestens einer ortsfesten Kontrollstelle
US5168520A (en) * 1984-11-30 1992-12-01 Security Dynamics Technologies, Inc. Method and apparatus for personal identification
JPH0762854B2 (ja) * 1985-03-05 1995-07-05 カシオ計算機株式会社 Icカードシステム
JPS62128358A (ja) * 1985-11-29 1987-06-10 Toshiba Corp 入場者管理システム
NL8601021A (nl) * 1986-04-22 1987-11-16 Nedap Nv Programmeerbare responder.
US4829296A (en) * 1986-04-30 1989-05-09 Carey S. Clark Electronic lock system
US4711995A (en) * 1986-07-10 1987-12-08 Genest Leonard Joseph Electronic key code recording device
US4924210A (en) * 1987-03-17 1990-05-08 Omron Tateisi Electronics Company Method of controlling communication in an ID system
US4980913A (en) * 1988-04-19 1990-12-25 Vindicator Corporation Security system network
NL8803170A (nl) * 1988-12-27 1990-07-16 Nedap Nv Identificatiesysteem.
DE4003140A1 (de) * 1990-02-02 1991-08-08 Suedzucker Ag Verfahren zur herstellung eines glucose-, fructose- und saccharosearmen inulooligosaccharid-produktes
DE4003410A1 (de) * 1990-02-05 1991-08-08 Anatoli Stobbe Tragbares feldprogrammierbares detektierplaettchen
DE4039936A1 (de) * 1990-12-14 1992-06-17 Hoechst Ag Verfahren zur herstellung von gesaettigten primaeren fettaminen durch hydrierung von ungesaettigten fettsaeurenitrilen
US5099226A (en) * 1991-01-18 1992-03-24 Interamerican Industrial Company Intelligent security system
US5193114A (en) * 1991-08-08 1993-03-09 Moseley Donald R Consumer oriented smart card system and authentication techniques

Also Published As

Publication number Publication date
DE4134922C1 (fr) 1992-12-03
US5491471A (en) 1996-02-13
CA2080716C (fr) 1999-09-21
ATE141430T1 (de) 1996-08-15
CA2080716A1 (fr) 1993-04-24
EP0539763A2 (fr) 1993-05-05
DE59206907D1 (de) 1996-09-19
EP0539763A3 (fr) 1995-06-14

Similar Documents

Publication Publication Date Title
EP0539763B1 (fr) Système de contrÔle
EP0466969B1 (fr) Méthode pour éviter des écarts inautorisés d'un protocole de déroulement d'une application dans un système d'échange de données
DE2837201C2 (fr)
EP0385070B1 (fr) Système de commande à distance avec transmission de code à mots de code
EP0558132B1 (fr) Disposition d'échange de données
DE69814438T2 (de) Elektronisches etikett mit hf-modem zur überwachung der leistung eines fahrzeugs, mit filterung
DE19624079C1 (de) Kartenleser für Chipkarten
DE2512935C2 (de) Datenaustauschsystem
EP0811739B1 (fr) Dispositif et méthode pour vérifier l'autorisation de contrôle d'accés, en particulier dispositif de fermeture des véhicules
EP0258227A1 (fr) Systeme de commande pour des unites de transport mobiles sur des voies de transport.
EP2033137A2 (fr) Support de donnees et procede pour la communication sans contact entre le support de donnees et un appareil de lecture
DE1499687B2 (de) Speicherschutz-einrichtung
DE60307318T2 (de) Verfahren zum erkennen einer gruppenzugehörigkeit von transpondern
EP0510322A2 (fr) Réseau de radio téléphonie numérique
EP2326959B1 (fr) Procédé de déconnexion de fonctions d'un tachygraphe
EP1249795A2 (fr) Dispositif électronique avec configuration spécifique à la position
EP1194844B1 (fr) Carte a puce comportant plusieurs programmes d'application
EP0840229B1 (fr) Dispositif et méthode de sélection de mots d'adresse
EP3376430B1 (fr) Procédé d'attribution d'adresses dans des modules d'un système comportant au moins deux antennes rfid ainsi que dispositif d'antennes de grille comportant au moins deux antennes rfid
WO1997047203A1 (fr) Dispositif de regulation et/ou de commande a repartition pour la gestion de systemes avec bus reseau et bus local
DE19928468C2 (de) Verfahren zum Einschreiben von Daten in den programmierbaren Festwertspeicher (EEPROM) eines mikroprozessorgestützten, tragbaren Datenträgers
EP0906601B1 (fr) Procede d'execution d'une operation comptable
DE19732941A1 (de) Fahrtschreiber mit einer Schnittstelle für seinen Anschluß an einen Datenbus
DE4307413C2 (de) Verfahren zum Laden von für den Betrieb von elektrischen Einrichtungen erforderlichen Betriebsprogrammen
DE102004053562B4 (de) Verfahren und Vorrichtung zur Bereitstellung von Kartenrohlingen

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH DE DK ES FR GB GR IT LI LU NL SE

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE CH DE DK ES FR GB GR IT LI LU NL SE

17P Request for examination filed

Effective date: 19950622

GRAG Despatch of communication of intention to grant

Free format text: ORIGINAL CODE: EPIDOS AGRA

GRAH Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOS IGRA

17Q First examination report despatched

Effective date: 19960119

GRAH Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOS IGRA

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH DE DK ES FR GB GR IT LI LU NL SE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRE;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED.SCRIBED TIME-LIMIT

Effective date: 19960814

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 19960814

Ref country code: ES

Free format text: THE PATENT HAS BEEN ANNULLED BY A DECISION OF A NATIONAL AUTHORITY

Effective date: 19960814

Ref country code: DK

Effective date: 19960814

REF Corresponds to:

Ref document number: 141430

Country of ref document: AT

Date of ref document: 19960815

Kind code of ref document: T

ET Fr: translation filed
REF Corresponds to:

Ref document number: 59206907

Country of ref document: DE

Date of ref document: 19960919

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Effective date: 19961005

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 19961031

Ref country code: LI

Effective date: 19961031

Ref country code: BE

Effective date: 19961031

Ref country code: CH

Effective date: 19961031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Effective date: 19961114

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)

Effective date: 19961106

PLBQ Unpublished change to opponent data

Free format text: ORIGINAL CODE: EPIDOS OPPO

PLBI Opposition filed

Free format text: ORIGINAL CODE: 0009260

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PLBF Reply of patent proprietor to notice(s) of opposition

Free format text: ORIGINAL CODE: EPIDOS OBSO

26 Opposition filed

Opponent name: PHILIPS PATENTVERWALTUNG GMBH

Effective date: 19970512

NLR1 Nl: opposition has been filed with the epo

Opponent name: PHILIPS PATENTVERWALTUNG GMBH

PLBF Reply of patent proprietor to notice(s) of opposition

Free format text: ORIGINAL CODE: EPIDOS OBSO

PLBO Opposition rejected

Free format text: ORIGINAL CODE: EPIDOS REJO

PLBN Opposition rejected

Free format text: ORIGINAL CODE: 0009273

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: OPPOSITION REJECTED

27O Opposition rejected

Effective date: 19980222

NLR2 Nl: decision of opposition
REG Reference to a national code

Ref country code: GB

Ref legal event code: IF02

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20071016

Year of fee payment: 16

Ref country code: NL

Payment date: 20071016

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20071019

Year of fee payment: 16

Ref country code: GB

Payment date: 20071022

Year of fee payment: 16

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20081005

NLV4 Nl: lapsed or anulled due to non-payment of the annual fee

Effective date: 20090501

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20090630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20090501

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20090501

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20081031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20081005