EP0716399A1 - Système à porteurs de code d'autorisation - Google Patents

Système à porteurs de code d'autorisation Download PDF

Info

Publication number
EP0716399A1
EP0716399A1 EP95203382A EP95203382A EP0716399A1 EP 0716399 A1 EP0716399 A1 EP 0716399A1 EP 95203382 A EP95203382 A EP 95203382A EP 95203382 A EP95203382 A EP 95203382A EP 0716399 A1 EP0716399 A1 EP 0716399A1
Authority
EP
European Patent Office
Prior art keywords
code
interrogating
identification code
central processor
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP95203382A
Other languages
German (de)
English (en)
Inventor
Josephus Wilhelmus Maria Van Der Valk
Wilhelmus Johannus Maria Van Der Valk
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VALK WILHELMUS JOHANNUS MARIA
Original Assignee
VALK WILHELMUS JOHANNUS MARIA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by VALK WILHELMUS JOHANNUS MARIA filed Critical VALK WILHELMUS JOHANNUS MARIA
Publication of EP0716399A1 publication Critical patent/EP0716399A1/fr
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Definitions

  • the invention relates to a system for authorizing code carriers each carrying a unique identification code.
  • the interrogating stations are through a cable of wireless network in permanent communication connection with the central processor.
  • the interrogating stations transmit each received identification code to the central processor to be compared with the series of authorized identification codes whereafter, in case correspondence between the received code and one of the stored authorized codes is detected, a return signal is transmitted back to the respective interrogating station to generate there an authorization signal granting the holder of the code carrier for instance access to an industrial area.
  • the disadvantage of this embodiment is the permanent communication connection between each of the interrogating stations and the central processor. Applying such a system on a large scale, for instance in an industrial site or something similar, would, especially in relation to the permanent communication connections lead to significant costs. Application in a situation with more buildings or sites which are situated at a distance of each other, will for this reason alone not be very obvious. Such systems are in general therefore only used in small scale applications.
  • each of the interrogating stations comprises a memory in which a series of authorized identification codes is stored and each interrogating station comprises means to compare the received code with the series of stored codes to establish if the received code belongs to the series.
  • the eventual communication connection with the central processor is only used to "update" the stored codes from time to time, i.e. eventually to change or correct the codes.
  • An object of the invention is now to provide a system whereby no permanent communication connection is necessary between the central processor and the interrogating stations, however, enabling updating of the codes present in the interrogating stations in a flexible manner and enabling temporary authorization of codes which are normally not authorized.
  • Figure 1 illustrates a first prior art system.
  • FIG. 2 illustrates another prior art system.
  • Figure 3 illustrates a first embodiment of a system according to the invention.
  • Figure 4 illustrates a second embodiment of a system according to the invention.
  • FIG 1 a first prior art system is illustrated comprising a number of interrogating stations 10a ... 10d which through a permanent communication connection 18 are connected to a central processor 12.
  • the communication connection 18 can for instance be established through a cable connection.
  • a memory 14 is present in which authorized identification codes are stored.
  • Each of the interrogating stations 10a ... 10d is located near the access (entrance or exit) to a terrain, building or something similar, and is destined to enable access for persons, goods, animals etc. which do have a transponder in which an authorized identification code is stored.
  • a transponder is schematically indicated by 16.
  • the interrogating stations 10a ... 10d are continuously transmitting interrogating signals.
  • the transponder 16 moves within the interrogating field the transponder will be activated by said interrogating field and will start transmitting the identification code stored in the transponder.
  • the respective interrogating station 10b receives said identification code and transmits the code through the communication connection 18 to the central processor 12 where the received code is compared with the series of codes stored in the memory 14. If during said comparison it is established that the received code is indeed authorized, then the processor 12 returns a signal to the interrogating station 10b which in respone thereto provides access for instance by unlatching a lock, opening a gate, raising a barrier etc.. Further details of such a system are considered to be known to the expert in this field.
  • FIG. 2 An other prior art system is schematically illustrated in figure 2.
  • This prior art system comprises a number of interrogating stations 20a ... 20d and a central processor 22.
  • each interrogating station comprises an own memory 24a ... 24d in which authorized identification codes are stored.
  • the transponder 26 moves to within an interrogating field of one the interrogating stations, for instance interrogating station 20c, then the transponder 26 will be activated by the interrogating field to transmit its own identification code.
  • the identification code is compared with the series of codes which is stored in the memory 24c. If it is established thereby that the received code is an authorized code, then the station 20c will take the necessary measures to grant access.
  • the central processor 22 has the possibility to get into contact with each of the interrogating stations 20a ... 20d through a communication network 28. This is done for instance once a day in such a manner that the central processor 22 calls each of the interrogating stations checking thereby whether the identification data stored in the respective memory 24a ... 24d are still correct or need correction or amendment.
  • FIG. 3 illustrates a first embodiment of a system according to the invention.
  • This system comprises a number of interrogating stations 30a ... 30d, each having an own code memory 34a ... 34d. Furthermore the system comprises a central processor 32 also having its own code memory 40. Through the communication network 38 connections can be built up between the central processor 32 and each of the interrogating stations 30a ... 30b.
  • the transponder 36 shall be activated by the interrogating field to transmit its own identification code.
  • This identification code is received in the interrogating station 30a and compared with the series of codes which are stored in the memory 34a. If it is established thereby that the received code belongs to the series of authorized codes, then the interrogating station 30a takes measures to grant access.
  • the interrogating station 30a builds up a connection with the central processor 32 through the network 38.
  • the central compressor 32 comprises a memory 40 in which further identification codes are stored.
  • the code, which was not recognized as authorized in the station 30a is transmitted to the central processor 32 in which the received code is compared with the series of codes which is stored in memory 40. If it is thereby established that the received code is present in the memory 40, then the processor 32 transmits a return signal of the first type to the interrogating station 30a indicating thereby that this transponder may be granted access. However, if the received code is not found in the memory 40, then another return signal of a second type is transmitted back indicating to the interrogating station 30 that acced has to be denied.
  • the memories 34a ... 34d contain the identification codes of transponders which always should have access.
  • each staff member has a transponder with authorized identification code with help of which the respective staff member can have access to the site without hindrance.
  • the authorized identification codes are stored in the interrogating stations at the entrances/exists which are used by the staff members. As long as the respective staff member carries the transponder said exits or entrances may be used freely.
  • transponders may be used which provide a temporary access.
  • Suppliers for instance could have transponders granting access to the site within predetermined periods.
  • Such transponders granting only access within predetermined periods, are programmed with identification codes which are stored in the memory 40 of the central processor 32. With each of these identification codes in the memory 40 one or more time indications are stored indicating within which period or periods the owner of the transponder with the respective identification code may be granted access.
  • a return signal of the first type is transmitted back to the interrogating station where the transponder is interrogated and access is granted.
  • the connection with the processor 32 will be built up, the code will be compared with the second series of codes in the memory 40 and it will be established thereby that the interrogation time was outside the allowed period and as a result a return signal of the second type will be transmitted back indicating to the respective interrogating station to deny access.
  • the system is embodied such that each time when a transponder is interrogated by an interrogating station and the identification code is recognized either in the interrogating station itself or in the central processor 32, then for instance the time at which the interrogation took place will be registered in relation to the respective identification code either in the interrogating station or in the central processor 32.
  • registering the time moments at which a certain transponder is interrogated by one of the interrogating stations a kind of supervising function can be carried out. In relation to staff members it is possible therewith to check their attendance.
  • a return signal of a third type is transmitted back to the respective interrogating station where on the one hand access is denied and on the other hand said alarm signal is generated to alarm either the surveyance personnel or the porter.
  • the central processor but eventually also at least part of the interrogating stations comprises a peripheral with which it is possible to visualize the registrations and the memories, i.e. the moments of time (and eventually an identification of the interrogating station in case of registration in the central processor) at which the interrogating station interrogated the various transponders.
  • a display unit on which the identification codes with their corresponding interrogation time moments can be made visible as a list.
  • One may think furthermore of a printer which prints a list of the interrogated identification codes together with the interrogation time moments.
  • each of the interrogating stations with an output connection from which the respective data can be read for instance and can be stored in a temporary data acquisition unit to be processed for instance afterwards in a separate computer.
  • a communiction connection can be established between one of the stations 30 and the central processor 32 in case such a connection is necessary.
  • Such a connection can be established for instance through a telephone connection or through another data communication path which is maintained as long as necessary to exchange data between the interrogating station and the central processor and vice versa.
  • the central processor after completing the comparison process can transmit the return signal together with the address of the respective interrogating station through the communication path whereafter it will be received and processed by the interrogating station.
  • the interrogating stations 30a ... 30d are for instance related to one single industrial site, office etc..
  • the interrogating stations in a geographical sense are more or less remotely located.
  • Each site comprises one or more interrogating stations which all can make contact with one central processor 32 located somewhere in the country and not necessarily onto one of the sites.
  • one central processor 32 is used to guard the sites and offices of a number of companies.
  • FIG 4 such an embodiment is schematiscally illustrated.
  • the system illustrated in figure 4 comprises a number of interrogating stations 46a ... 46e each having a code memory 44a ... 44e, which interrogating stations are located at one or more entrances/exits of one or more sites or buildings of a first company. Furthermore the system comprises a number of interrogating stations 50a, 50b, 50c, each having a code memory 48a, 48b, 48c which interrogating stations are located at the entrances/exits of one or more sites or buildings of a second company. The interrogating stations 54a and 54b each with a code memory 52a, 52b are located at one or more entrances/exits of sites or buildings of a third company.
  • All interrogating stations illustrated in figure 4 are through a communication network 58 connected to a central processor 42 which comprises an identification code memory 56. It will be clear that the number of companies and the number of identification stations at wish can be enlarged or diminished. In this way one central post 42 is in command over the interrogating stations of a large number of companies whereby per company identification stations can be used at a number of sites and/or buildings.
  • the communication network 58 use can be made of the normal telephone network, the wireless telephone network, the car telephone network, a data net or another suitable communication path.
  • a part of the interrogating stations can be installed for instance near apparatuses or machines which may only brought into action by the holder of an authorized code carrier.
  • an industrial environment or a manufacturing company one may think of specialized apparatuses which have to be operated by predetermined experts. Each of these experts has to be in the possession of a code carrier with an authorized code. Only these experts are able, by offering the code carrier to the responding interrogating station, to activate the respective machines. Also the activating or deactivating of alarm circuits of a security installation on a predetermined area or within a predetermined building can be authorized in this way.
  • code carriers of various different types can be used such as E.M. transponders, magnetic cards, optically readable bar codes, etc..

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
EP95203382A 1994-12-07 1995-12-07 Système à porteurs de code d'autorisation Ceased EP0716399A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NL9402057 1994-12-07
NL9402057A NL9402057A (nl) 1994-12-07 1994-12-07 Stelsel voor het autoriseren van codedragers.

Publications (1)

Publication Number Publication Date
EP0716399A1 true EP0716399A1 (fr) 1996-06-12

Family

ID=19864978

Family Applications (1)

Application Number Title Priority Date Filing Date
EP95203382A Ceased EP0716399A1 (fr) 1994-12-07 1995-12-07 Système à porteurs de code d'autorisation

Country Status (2)

Country Link
EP (1) EP0716399A1 (fr)
NL (1) NL9402057A (fr)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2776255A1 (fr) * 1998-03-19 1999-09-24 Siemens Ag Procede et dispositif de protection d'un vehicule automobile vis-a-vis d'une utilisation non autorisee
FR2789493A1 (fr) * 1999-02-09 2000-08-11 Gemplus Card Int Procede de detection d'objets portables et systeme de mise en oeuvre
EP1043693A2 (fr) * 1999-04-09 2000-10-11 Matsushita Electric Industrial Co., Ltd. Système et procédé d'autorisation
EP1191328A2 (fr) * 2000-08-30 2002-03-27 Heimann Systems GmbH Système de commande pour un appareil de test par rayons X
WO2002035479A1 (fr) * 2000-10-26 2002-05-02 Lochisle Inc. Systeme et procede de gestion de cles et de controle d"acces a des portes
EP1269419A2 (fr) * 2000-03-22 2003-01-02 Global Eticket Exchange Ltd Systeme d'achat et d'echange de billets pour manifestations
EP1286295A2 (fr) * 2001-07-19 2003-02-26 Symbol Technologies, Inc. Système et procédé de suivi de dispositifs portables
WO2003091956A1 (fr) * 2002-04-25 2003-11-06 Hermos Informatik Gmbh Dispositif de controle pour surveiller la limite spatiale ou la limite des machines de biens de production ou de materiaux dans un processus de production, au moyen de transpondeurs
US6837422B1 (en) 2000-09-01 2005-01-04 Heimann Systems Gmbh Service unit for an X-ray examining device
EP1335328A3 (fr) * 2002-02-04 2005-03-30 Kabushiki Kaisha Tokai Rika Denki Seisakusho Système à clé électronique
EP1564690A2 (fr) * 2004-02-16 2005-08-17 Kabushiki Kaisha Tokai Rika Denki Seisakusho Système de contrôle de sécurité pour gérer l'enregistrement de codes d'identification d'appareils portables
EP1646937A2 (fr) * 2003-07-18 2006-04-19 CoreStreet, Ltd. Commande d'acces a une zone
FR2915606A1 (fr) * 2007-04-24 2008-10-31 Digitick Procede et systeme de controle d'acces a un evenement ou a un service
WO2008145803A1 (fr) * 2007-05-25 2008-12-04 Kone Corporation Système de gestion
US7716486B2 (en) 1995-10-02 2010-05-11 Corestreet, Ltd. Controlling group access to doors
US7822989B2 (en) 1995-10-02 2010-10-26 Corestreet, Ltd. Controlling access to an area
US8015597B2 (en) 1995-10-02 2011-09-06 Corestreet, Ltd. Disseminating additional data used for controlling access
US8261319B2 (en) 1995-10-24 2012-09-04 Corestreet, Ltd. Logging access attempts to an area

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4142097A (en) * 1977-09-01 1979-02-27 A-T-O Inc. Programmable keyboard sequencing for a security system
US4216375A (en) 1979-03-12 1980-08-05 A-T-O Inc. Self-contained programmable terminal for security systems
US4218690A (en) * 1978-02-01 1980-08-19 A-T-O, Inc. Self-contained programmable terminal for security systems
US4248690A (en) 1980-01-28 1981-02-03 Pennwalt Corporation Apparatus for production of sodium hypochlorite
US4831374A (en) 1983-03-14 1989-05-16 Barry Masel Electric lock system
DE4308193A1 (de) * 1993-03-15 1994-09-22 Siemens Ag Benutzungskontrollsystem für Lifte und Seilbahnen

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4142097A (en) * 1977-09-01 1979-02-27 A-T-O Inc. Programmable keyboard sequencing for a security system
US4218690A (en) * 1978-02-01 1980-08-19 A-T-O, Inc. Self-contained programmable terminal for security systems
US4216375A (en) 1979-03-12 1980-08-05 A-T-O Inc. Self-contained programmable terminal for security systems
US4248690A (en) 1980-01-28 1981-02-03 Pennwalt Corporation Apparatus for production of sodium hypochlorite
US4831374A (en) 1983-03-14 1989-05-16 Barry Masel Electric lock system
DE4308193A1 (de) * 1993-03-15 1994-09-22 Siemens Ag Benutzungskontrollsystem für Lifte und Seilbahnen

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7716486B2 (en) 1995-10-02 2010-05-11 Corestreet, Ltd. Controlling group access to doors
US7822989B2 (en) 1995-10-02 2010-10-26 Corestreet, Ltd. Controlling access to an area
US8015597B2 (en) 1995-10-02 2011-09-06 Corestreet, Ltd. Disseminating additional data used for controlling access
US8261319B2 (en) 1995-10-24 2012-09-04 Corestreet, Ltd. Logging access attempts to an area
FR2776255A1 (fr) * 1998-03-19 1999-09-24 Siemens Ag Procede et dispositif de protection d'un vehicule automobile vis-a-vis d'une utilisation non autorisee
WO2000048134A1 (fr) * 1999-02-09 2000-08-17 Gemplus Procede de detection d'objets portables et systeme de mise en oeuvre
FR2789493A1 (fr) * 1999-02-09 2000-08-11 Gemplus Card Int Procede de detection d'objets portables et systeme de mise en oeuvre
US6972663B1 (en) 1999-02-09 2005-12-06 Gemplus Method for detecting portable objects and system for carrying out said method
EP1043693A3 (fr) * 1999-04-09 2002-09-04 Matsushita Electric Industrial Co., Ltd. Système et procédé d'autorisation
EP1043693A2 (fr) * 1999-04-09 2000-10-11 Matsushita Electric Industrial Co., Ltd. Système et procédé d'autorisation
EP1269419A2 (fr) * 2000-03-22 2003-01-02 Global Eticket Exchange Ltd Systeme d'achat et d'echange de billets pour manifestations
EP1191328A2 (fr) * 2000-08-30 2002-03-27 Heimann Systems GmbH Système de commande pour un appareil de test par rayons X
EP1191328A3 (fr) * 2000-08-30 2004-04-07 Smiths Heimann GmbH Système de commande pour un appareil de test par rayons X
US7000827B2 (en) 2000-09-01 2006-02-21 Heimann Systems Gmbh Operator unit for an X-ray examining apparatus
US6837422B1 (en) 2000-09-01 2005-01-04 Heimann Systems Gmbh Service unit for an X-ray examining device
WO2002035479A1 (fr) * 2000-10-26 2002-05-02 Lochisle Inc. Systeme et procede de gestion de cles et de controle d"acces a des portes
US7170998B2 (en) 2000-10-26 2007-01-30 Lochisle Inc. Door access control and key management system and the method thereof
EP1286295A2 (fr) * 2001-07-19 2003-02-26 Symbol Technologies, Inc. Système et procédé de suivi de dispositifs portables
AU784451B2 (en) * 2001-07-19 2006-04-06 Symbol Technologies, Llc. Cordless identification security system and method
EP1286295A3 (fr) * 2001-07-19 2005-06-08 Symbol Technologies, Inc. Système et procédé de suivi de dispositifs portables
US6992564B2 (en) 2001-07-19 2006-01-31 Symbol Technologies, Inc. Cordless identification security system and method
CN100343833C (zh) * 2001-07-19 2007-10-17 讯宝科技公司 无绳识别安全防范系统及方法
US7042332B2 (en) 2002-02-04 2006-05-09 Kabushiki Kaisha Tokai Rika Denki Seisakusho Electronic key system
EP1335328A3 (fr) * 2002-02-04 2005-03-30 Kabushiki Kaisha Tokai Rika Denki Seisakusho Système à clé électronique
JP2005524155A (ja) * 2002-04-25 2005-08-11 ヘルモス インフォルマティーク ゲーエムベーハー アクセス管理方法及びその装置並びに移動管理方法
WO2003091956A1 (fr) * 2002-04-25 2003-11-06 Hermos Informatik Gmbh Dispositif de controle pour surveiller la limite spatiale ou la limite des machines de biens de production ou de materiaux dans un processus de production, au moyen de transpondeurs
EP1646937A4 (fr) * 2003-07-18 2007-09-12 Corestreet Ltd Commande d'acces a une zone
EP1646937A2 (fr) * 2003-07-18 2006-04-19 CoreStreet, Ltd. Commande d'acces a une zone
US7432796B2 (en) 2004-02-16 2008-10-07 Kabushiki Kaisha Tokai Rika Denki Seisakusho Security control system for managing registration of ID codes for portable devices
EP1564690A2 (fr) * 2004-02-16 2005-08-17 Kabushiki Kaisha Tokai Rika Denki Seisakusho Système de contrôle de sécurité pour gérer l'enregistrement de codes d'identification d'appareils portables
EP1564690A3 (fr) * 2004-02-16 2006-05-10 Kabushiki Kaisha Tokai Rika Denki Seisakusho Système de contrôle de sécurité pour gérer l'enregistrement de codes d'identification d'appareils portables
FR2915606A1 (fr) * 2007-04-24 2008-10-31 Digitick Procede et systeme de controle d'acces a un evenement ou a un service
WO2008145803A1 (fr) * 2007-05-25 2008-12-04 Kone Corporation Système de gestion

Also Published As

Publication number Publication date
NL9402057A (nl) 1996-07-01

Similar Documents

Publication Publication Date Title
EP0716399A1 (fr) Système à porteurs de code d'autorisation
US6232877B1 (en) Security system
US5705991A (en) Access control device featuring key ordering or key simultaneity
US7487538B2 (en) Security system
CN1912906B (zh) 用于车辆的rfid财产管理方法及系统
US6072402A (en) Secure entry system with radio communications
CN101833796B (zh) 管理系统
US7170407B2 (en) Method and apparatus for asset tracking and room monitoring in establishments having multiple rooms for temporary occupancy
ES2326894T3 (es) Procedimiento y sistema para obtener el acceso a un objeto o a un servicio.
US20030125961A1 (en) Autonomous rental store
CN101868810A (zh) 用于普遍配置智能锁管理的系统
CN102122399A (zh) 对远程无咪表停车监控系统的增强
ITTO991158A1 (it) Procedimento per rilevare l'accesso ad aree controllate e relativo sistema.
GB2517527A (en) A combination care monitoring and access control system
JP2002334361A (ja) 出入管理装置及び出入管理方法
WO2006056657A1 (fr) Système, procédé et programme antivol
JP2007132031A (ja) 入退室管理システムおよび入退室管理方法
GB2236354A (en) Combined key/radio pager
US20060212566A1 (en) Remote control method and device controlled from communicating terminals
RU2158444C2 (ru) Электронная контролирующая система/сеть
KR20060066923A (ko) Rfid 기반의 출입관리시스템 및 그 방법
GB2277850A (en) Intelligent radio frequency transponder system
AU2020209521A1 (en) System for monitoring persons
JP2002123803A (ja) 個人識別システム
Chitra et al. AN OPTIMIZED METHOD FOR VEHICLE PARKING SYSTEM BASED ON IOT

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE ES FR GB IE IT LI NL SE

17P Request for examination filed

Effective date: 19961212

17Q First examination report despatched

Effective date: 19980529

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20000623