EP1260659A2 - Procédé de contrôle d'une serrure électronique - Google Patents
Procédé de contrôle d'une serrure électronique Download PDFInfo
- Publication number
- EP1260659A2 EP1260659A2 EP02011312A EP02011312A EP1260659A2 EP 1260659 A2 EP1260659 A2 EP 1260659A2 EP 02011312 A EP02011312 A EP 02011312A EP 02011312 A EP02011312 A EP 02011312A EP 1260659 A2 EP1260659 A2 EP 1260659A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- lock
- data
- code
- authorization code
- programming
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00658—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
- G07C9/00674—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
Definitions
- the invention relates to a method for controlling an electronic Lock, in which the lock at least via an input element is controlled in terms of opening and closing by data, for example, entered an access authorization code and with a stored code can be compared before the lock is opened or is closed.
- Electronic locks in particular electronic door locks are known from the prior art.
- the DE 196 03 200 C2 an electronic door lock for mortise locks, the one inside door fitting with a rotary knob, one outside door fitting with a unit for entering a code and with a rotary knob, and an internal one, with the input unit electrically has connected electronics in which a code is stored and via which the knob in the outside door fitting if they match unlocked the stored code with the entered code is.
- an electronic door lock is known from US Pat. No. 5,040,391. with a code card as the unit for entering the code is used. The control electronics are on the outside of the code card intended. This version does not meet the electrical requirements for burglary protection in the lock area. It should be taken into account that electronic door locks of the type mentioned serve to increase the burglary protection in the lock area. Without input the code matching the stored code, for example, when entering one with a key secret matching digit sequence for a numeric code lock, it is not possible to open the lock non-violently from the outside. The usage an unauthorized duplicate key is generally not applicable such electronic door locks. It is also usually here not possible to crack the code, for example with a normal ten-digit keypad as input unit the variation options are almost unlimited. Moreover, by an authorized person the code can be changed if necessary. Such locks are over it also in the area of safety cabinets, in particular known for use in hotels where the hotel guest Can change access code.
- a locking system is also known from WO 00/40829, which consists of a master lock and several subordinate ones Locks. This can be done using a codable key system Master lock and at least one assigned to the coded key Lock to be opened.
- Such a locking system is, for example useful in the area of safe deposit systems in financial institutions applicable where the master lock is issued with each Key can be opened, but this key only for Opening a single subordinate lock is suitable. hereby all key holders are given access to one Room with multiple lockers, one with each key but only one can be opened.
- the invention has for its object a method for Control of a lock to develop such that the lock in easily adjusted to the requirements of the user can be made without the one-off production of the corresponding Locks is required.
- this task is solved by that optional functions of the lock, such as temporal Access authorizations, personal access authorizations, Opening delays or the like after entering an authorization code be activated or deactivated.
- optional functions of the lock such as temporal Access authorizations, personal access authorizations, Opening delays or the like after entering an authorization code be activated or deactivated.
- electronic locks can be can be configured at the factory, for example, only the to have the simplest function of opening and closing.
- the The user can then configure the lock individually be made. For example, the user an opening delay of the lock, an alarm coding, a time limit of opening times or the like accordingly program his requirements.
- the user can do this request an access authorization from the manufacturer with which he can enter the required data into the memory of the lock, to adapt the lock to its individual requirements.
- the manufacturer can for each additional individual function, which is associated with additional programming of the lock is to charge an additional license fee so that the Manufacturers with the method according to the invention also have the possibility is given to offer an electronic lock relatively cheap, to develop a large customer base.
- the user receives an individual access authorization code, with which the lock can be activated and further operable with regard to its basic functions opening and closing is.
- the individual access calculation code is in the data memory in this way filed that he is not manipulable or a manipulation only after extensive checking of manipulation authorization can be carried out.
- the locks are registered by the manufacturer with a serial number, so that an individualized programming code for each lock is provided to the programming or activation of optional Limit functions to individual locks and abuse to avoid regarding other locks.
- the Authorization code via the input element for example a Keyboard is entered.
- a keyboard represents a relatively inexpensive one Component and enables quick and easy entry of data.
- a keyboard is part of common electronic Locks to enter an opening code. Therefore, it is advantageous, the already existing components for the invention Apply procedures.
- a telecommunications device in particular a data line or to transmit a telephone radio network. You can do both a landline network and a radio network are used for data transmission become.
- data from the lock using a multi-frequency method can be read out, as is the case, for example, with remote queries from Answering machine is common.
- Other methods can also be used become.
- the lock generates a when the data is called up certain tone sequence that is acoustic over a telecommunication line to a recipient, for example the manufacturer and / or one entrusted with programming and / or maintenance of such locks Dealer is transmitted.
- the recipient can use the Tone sequence the essential data and properties of the castle recognize and in return transmit data to the lock.
- the transmitted tone sequence can also be decoded, for example done by a computer.
- the necessary code entries can be made directly in the lock transmitted and shown on a display. In return, you can for example, via certain providers of telephone lines from Manufacturers and / or distributors provide services directly at Utilization will be charged.
- the optional function of Lock is programmed. This ensures that a Programming of optional functions only by authorized persons can be carried out. If programming is carried out using a Data line, this is the previous activation of the programming option by entering the authorization code through an authorized one Person required. This also ensures that manipulation cannot take place from the outside.
- the authorized person can for example, a manufacturer's computer for maintenance and / or programming person.
- the procedure required for activation is preferred or deactivation of an optional function in a display of the Lock displayed. It has proven to be advantageous to the user to transmit a code if an additional function is required, which is entered via the input unit. If applicable Enter the code, which can be individualized for each lock, the user is guided through the display to select the desired one Install function. This eliminates the need for the manufacturer Providing extensive instruction manuals in different Languages because such products are generally used internationally become. This procedure also makes billing easier the locks of different configuration, so that the user a lock can be offered that exactly fits his needs is adjusted. The user must therefore not need, but in the usual Do not pay for locks preinstalled features.
- the activation or deactivation of optional functions of the Locks can be displayed and / or controlled via menus.
- a four-line display can be provided, which over Texts and / or pictograms the necessary procedure for Activation of optional functions easy to understand.
- Andre Display devices such as LEDs are alternatively or additionally possible and can represent letters, numbers or pictograms serve.
- the use of pictograms has in particular the advantage of having a detailed text description the associated problems of different languages can be.
- the use of text modules is also not a problem, because corresponding memory modules with the required Texts made and used in a variety of languages can be, so that in a first step the desired Language is selected.
- the choice of the language can anyway on the part of the manufacturer, the dealer and the user be carried out and, for example, represents a procedural step when the lock is started up for the first time.
- Procedures provided for programming and / or configuration the lock via an optional function and read as in particular encrypted data record is transmitted.
- this function is preferably secured by locking functions, so that only the programming can be read out with a certain code.
- Changes to the programming also require additional security levels be provided to prevent unauthorized manipulation.
- certain data of the lock can be used for maintenance and / or Control purposes read out using an optional function become.
- a transmission of additional data for example one
- the data relating to programming the lock via a telecommunication device especially a data line or a telephone radio network be transmitted.
- this opens up the possibility of using the lock in a simple manner to provide updated program versions without this Maintenance carried out on site by a service person or that Lock must be made available to the manufacturer.
- the user can be updated at any time, if necessary, further receive programs with optional functions.
- the lock is connected via a telecommunication device, especially a data line or a telephone radio network addressed about maintenance and / or repair work becomes.
- the programming of the lock is preferably read out and maintenance of the lock in return via a bidirectional Data transmission is carried out.
- This can make maintenance very difficult be largely automated and, for example, via a Manufacturers installed computers to the extent that there is communication between the lock and the computer for a diagnosis leads, as a result, the necessary maintenance or repair work specifies and the user in the form of a to be entered Maintenance code transmitted.
- This maintenance code can, for example after its entry also contain the request, a legitimate one Maintenance company to instruct that over a code key the necessary maintenance work is transmitted.
- the Programming the lock via the telecommunication facility is carried out, in particular an update of the Records for the operation of the castle is carried out.
- a Programming or configuration can also be done via an interface be provided in the lock to which a computer, for example a laptop, pocket computer and / or other electronic Tool can be connected to read data from the lock and / or feed into the castle.
- the data transmission via an in Lock arranged GSM, DECT or similar component or a reader for a GSM used for the purpose of data transmission, DECT or similar component is carried out.
- a phone number can be assigned to each lock, which makes it possible to select the lock immediately in order to necessary data for maintenance and / or additional programming read out or transmit optional functions.
- has the lock is a reader for GSM, DECT or similar chips, so can the authorized user an individualized and in his name Use the registered phone number. Access to the record of the lock is only possible if the corresponding GSM, DECT or similar chip used and the maintenance and / or manufacturing company the access number is announced. It lies thus the access requirements in the hands of the authorized user for remote maintenance and / or supplementing the data set create.
- the GSM, DECT or similar chip can preferably only be used or be removed if the access authorization code has been entered beforehand has been.
- the reader has therefore proven to be useful to be arranged so that it is only in the open position of the lock is accessible.
- the optional function can also limit the usability of the castle.
- Such locks can for example can be used in the hotel area for room doors.
- Hotel guests receive a time against payment of the room price limited individual access authorization code, with which he the Open the room door and, if necessary, also other facilities, such as Minibar and / or prepaid TV programs (Pay TV) unlock and use.
- Payment TV Minibar and / or prepaid TV programs
- the individual access authorization code becomes invalid, so that further or new use of the hotel room only after purchase a new individual access authorization code is possible.
- This application of the invention is remote monitoring and maintenance of the castle particularly advantageous, for example, a direct Settlement of those prepaid with bank cards (credit cards) To be able to make rooms.
- An electronic lock has a housing 1, which a numeric keyboard 2 and a three-line display 3. Next to the Display 3, two buttons 4, 5 are arranged, the so-called “Scroll” function serve. Accordingly, the buttons 4, 5 are used for opening and closing Movement of a text shown on the display 3 or like.
- the keyboard 2 has thirteen keys 6, of which ten keys to enter individual digits 0 to 9. There is also a key 6 provided with the symbol "E", via which a arranged in the housing 1 and data storage not shown can be activated, i.e. can be switched on. Also a key labeled "Q" provided to store commands or an associated, Microprocessor not shown to enter. One continues provided, larger button is in the present embodiment not used, but can be used for this purpose, for example the last commands entered are corrected or deleted become.
- the lock is only with the above equipped function.
- the menu control can be activated by pressing the "E" key twice can be called up, with for example the optional function "time delay" is displayed.
- time delay stipulates that the lock is only a predetermined time interval opens after entering the access authorization code.
- the optional function is now in the middle line of display 3 "Time delay” is displayed, the top line of the display 3 the word “yes” and the word “no” appear in the lower line.
- the buttons 4 and 5 the user can now choose whether to use the Want to set the "time delay” function on his lock. If he presses the button 4 for this purpose, the message appears that the user, for example, specifying a specific one Contact the manufacturer of the lock or its distributor for codes may.
- the user If the user specifies the code received there, he will receive from Manufacturer or sales an authorization code with which the function "Time delay" can be activated. In return, the user pays a license fee to the manufacturer for this additional function.
- buttons 5 The user selects with button 5 regarding the optional function "Time delay” the answer "no", so he gets to the next one optional function, for example an "alarm” function, in which a Alarm is triggered as soon as a certain code is entered.
- a code can, for example, enter the access authorization code be in reverse order.
- the electronic lock can do a variety of optional functions on the part of the user selected and installed according to its requirements can. All optional functions are in the original programming of the data storage included and can activated via the procedure described above or be deactivated.
- the lock also has a loudspeaker 7 and / or a card reader 8 and / or a connection 9 for a data line with which Data of the data memory are transmitted over a fixed telephone network can.
- a loudspeaker 7 is provided.
- the lock generates this when the data is called up a certain sequence of tones, acoustically over a Telecommunication line to a receiver, for example the Manufacturer and / or one with programming and / or maintenance such locks entrusted to dealers.
- the recipient can use the tone sequence to get the essential data and Recognize the properties of the lock and, in return, recognize data transmit the lock. For example, this way Data are transmitted that make it recognizable when the lock opened and closed.
- the generated tones over the Speakers in a telecommunications device for example a phone can be transmitted.
- the evaluation of the generated tones can be done by the recipient using a computer that by means of a computer that immediately transmits the Errors or the transmitted data are decoded and a corresponding one Provides concept for eliminating the error.
- connection 9 As an alternative to a transmission of the data described above data can also be transmitted via connection 9.
- the lock is connected to port 9 with a data cable with a telecommunications network, especially a landline connected.
- the advantage of this embodiment is that it is essential more reliable data transmission takes place. This advantage can go as far as that be used that additional data to the data storage of the lock are transmitted, so that on the one hand also optional Functions can be entered via the data line and on the other hand malfunctions are recognized and eliminated, insofar as these Faults not eliminated by the use of a service employee Need to become.
- connection 9 can also provide access to an interface of the processor integrated in the lock. Via this interface can read data from the lock and / or into the lock can be stored, for example, the type of use and / or determine maintenance requirements. Furthermore, updated Programs saved and / or optional function activated become.
- the data can also be sent via a telephone radio network are transmitted, on the one hand the connection 9 to the connection a conventional radio telephone (cell phone) can be used.
- a corresponding transmission and / or Receiving unit can be arranged, either its own Has a chip card in GSM, DECT or similar mode or the card reader in which the user of the lock has, for example, a Insert card with a GSM, DECT or similar chip.
- the lock with a computer installed at the manufacturer communicate and transmit data. The user removes the card with the GSM, DECT or similar chip, is an unauthorized access not possible by selecting the lock.
- DECT or similar chip it can be provided that after entering the card with the GSM, DECT or similar chip first the Access authorization code must be entered before the sending / receiving unit of the lock activated for data exchange becomes.
- a distributor provides the services and for this purpose with a Chip card in GSM, DECT or similar mode is equipped with which it can be used can contact the manufacturer's computer.
- the advantage of the method according to the invention is in particular that such Electronic locks in the factory as a series product with always same configuration in terms of performance can be. There is then a function that is optionally required Possibility to acquire additional licenses from the manufacturer, so that the functions described above and others Functions of an electronic lock can be used. Such an electronic lock in the simplest configuration can therefore be offered inexpensively.
- an inventive method also Numerous maintenance and / or repair work carried out can be maintained without the need for maintenance personnel must become.
- the simple design of the castle with a Menu control enables such a lock almost without extensive operating instructions. Different Languages in which such operating instructions at international Sales must be held in the data store filed and on the part of the manufacturer or its central distributor be activated in the respective country or by the user. Supplementary Information can be transmitted via data lines in the display 3 of the Housing 1 are transmitted.
- the processor integrated in the lock detects an error, for example a reduction in battery performance, such Errors are shown in time on display 3, whereupon the user appropriate information on how to rectify this error quickly and easily communicated via certain encodings.
- an error for example a reduction in battery performance
- so-called emergency openings on the part manufacturer's access code should not more are available.
- a method according to the invention can be used, for example, for a Locking system with a variety of locks can be used each lock closes access to a room in which a transmitting / receiving unit with an antenna is arranged.
- a such a transmitting / receiving unit can be used, for example, for radio telephone networks be provided.
- the antenna is connected to the lock via the transmitter / receiver unit connected to data from a central computer in the data storage to be able to transmit.
- Each lock is provided with an access authorization code having data carrier in the form of a so-called Open smart cards.
- the Lock data is transmitted for further access rights with other smart cards. This allows maintenance the transmitter / receiver units quickly and reliably performed by a variety of maintenance personnel Appropriate smart cards are given that give access to individual rooms.
- a lock without an access authorization code and therefore not functional is delivered.
- the optional function can then be seen in that the lock after installation and connection to a data line and connecting to a computer for the access authorization code is configured.
- the lock is ready for operation and function.
- the configuration of the castle can, for example, through a dialogue between the processor installed in the lock and a central computer respectively.
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10125502 | 2001-05-23 | ||
DE10125502 | 2001-05-23 | ||
DE10125866 | 2001-05-25 | ||
DE10125866 | 2001-05-25 | ||
DE10126235 | 2001-05-30 | ||
DE10126235 | 2001-05-30 | ||
DE10128146 | 2001-06-09 | ||
DE10128146A DE10128146A1 (de) | 2001-05-23 | 2001-06-09 | Verfahren zur Steuerung eines elektronischen Schlosses |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1260659A2 true EP1260659A2 (fr) | 2002-11-27 |
EP1260659A3 EP1260659A3 (fr) | 2004-02-04 |
Family
ID=27437972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP02011312A Withdrawn EP1260659A3 (fr) | 2001-05-23 | 2002-05-23 | Procédé de contrôle d'une serrure électronique |
Country Status (1)
Country | Link |
---|---|
EP (1) | EP1260659A3 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006053042A1 (fr) * | 2004-11-12 | 2006-05-18 | Wayne-Dalton Corp. | Appareil pre-installe a systeme d'avertissement et procedes de fonctionnement |
EP1710760A1 (fr) * | 2005-04-06 | 2006-10-11 | Scheidt & Bachmann GmbH | Activation sécurisée de dispositifs |
EP3065110A1 (fr) * | 2015-03-03 | 2016-09-07 | Insys Microelectronics GmbH | Verrou modulaire de haute securite et son procede de mise a jour |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5040391A (en) | 1990-08-07 | 1991-08-20 | Taiwan Fu Hsing Industry Co., Ltd. | Structure for controlling the dead bolt used in an electronic lock |
DE19603200C2 (de) | 1996-01-30 | 1998-12-24 | Burg Waechter Kg Luelin A | Elektronisches Türschloß |
WO2000040829A1 (fr) | 1999-01-06 | 2000-07-13 | Mas-Hamilton Group, Inc. | Systeme electronique de verrouillage superviseur et subordonne |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4947163A (en) * | 1985-10-16 | 1990-08-07 | Supra Products, Inc. | Electronic security system with configurable key |
CH690502A5 (fr) * | 1995-04-28 | 2000-09-29 | Relhor Sa | Système à déclenchement programmable pour le verrouillage/ déverrouillage temporisé d'une installation de sécurité. |
AU5687798A (en) * | 1996-12-03 | 1998-06-29 | E.J. Brooks Company | Programmable lock and security system therefor |
DE29715426U1 (de) * | 1997-08-28 | 1997-12-11 | Datasec Electronic Gmbh | Berührungslos betätigbare Schalteinheit |
-
2002
- 2002-05-23 EP EP02011312A patent/EP1260659A3/fr not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5040391A (en) | 1990-08-07 | 1991-08-20 | Taiwan Fu Hsing Industry Co., Ltd. | Structure for controlling the dead bolt used in an electronic lock |
DE19603200C2 (de) | 1996-01-30 | 1998-12-24 | Burg Waechter Kg Luelin A | Elektronisches Türschloß |
WO2000040829A1 (fr) | 1999-01-06 | 2000-07-13 | Mas-Hamilton Group, Inc. | Systeme electronique de verrouillage superviseur et subordonne |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006053042A1 (fr) * | 2004-11-12 | 2006-05-18 | Wayne-Dalton Corp. | Appareil pre-installe a systeme d'avertissement et procedes de fonctionnement |
US7190266B2 (en) | 2004-11-12 | 2007-03-13 | Wayne-Dalton Corp. | Pre-installed appliance with warning system and methods of operation |
EP1710760A1 (fr) * | 2005-04-06 | 2006-10-11 | Scheidt & Bachmann GmbH | Activation sécurisée de dispositifs |
EP3065110A1 (fr) * | 2015-03-03 | 2016-09-07 | Insys Microelectronics GmbH | Verrou modulaire de haute securite et son procede de mise a jour |
Also Published As
Publication number | Publication date |
---|---|
EP1260659A3 (fr) | 2004-02-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0842500B1 (fr) | Dispositif de verrouillage pour systemes a acces limite dans le temps | |
EP0875871B1 (fr) | Méthode et système d'authorisation dans des systèmes de transfert de données | |
DE19607017C2 (de) | Fernbedienungseinrichtung und Betriebsverfahren hierfür, insbesondere zur Ansteuerung von kraftfahrzeugbezogenen Einrichtungen | |
DE19753401B4 (de) | Kraftfahrzeug mit einem elektronischen Schließsystem | |
DE69735166T2 (de) | Verfahren und einrichtung zur sicherung der ferndienstleistungen der finanzinstitute | |
EP0709534B1 (fr) | Serrure activée par un porteur d'identité | |
DE102005028677A1 (de) | Integrierter Sendeempfänger für ein passives Verriegelungssystem | |
EP0410024B1 (fr) | Système de fermeture électronique | |
EP0600194B1 (fr) | Système de contrÔle d'accès | |
EP1062135A2 (fr) | Systeme de controle d'autorisation pour vehicules a moteur | |
EP1744285A1 (fr) | Système de paiement de taxes de stationnement | |
DE10250135A1 (de) | Zugangssteuersystem in nahtloser Kommunikation mit Personalmanagemen-Systemen und ähnlichen | |
DE102005005378A1 (de) | Vorrichtung zur Eingabe und Übertragung von verschlüsselten Signalen | |
DE10128146A1 (de) | Verfahren zur Steuerung eines elektronischen Schlosses | |
DE10056119A1 (de) | Elektronisch codierbares Schloss-System | |
DE69817889T2 (de) | Sicherheitsvorrichtung für Kraftfahrzeuge und Lernverfahren dafür | |
EP1260659A2 (fr) | Procédé de contrôle d'une serrure électronique | |
EP1498855A2 (fr) | Méthode et système pour la location de véhicules | |
DE4436605A1 (de) | Verfahren zur sicheren Ver- und Entriegelung von Schlössern mit einer Authentisierung | |
EP1828993A1 (fr) | Installation de contrôle d'accès munie de plusieurs dispositifs de fermeture | |
DE3342651A1 (de) | Verfahren zur absicherung des zugriffs an terminals | |
DE10111247C2 (de) | Verfahren zur Steuerung eines elektronischen Schlosses | |
DE19516429A1 (de) | Verfahren für eine Zugangsautorisierung zu einer gesicherten Einrichtung | |
WO1992004694A1 (fr) | Procede et dispositif de teletransmission confidentielle de donnees | |
DE102011004849A1 (de) | System zur Vergabe / Entzug von Zutrittsrechten zu Schließanlagen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: 7G 07C 9/00 A |
|
AKX | Designation fees paid | ||
REG | Reference to a national code |
Ref country code: DE Ref legal event code: 8566 |
|
17P | Request for examination filed |
Effective date: 20041019 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AT BE CH CY DE LI |
|
RBV | Designated contracting states (corrected) |
Designated state(s): DE ES FR GB IT |
|
17Q | First examination report despatched |
Effective date: 20060505 |
|
APBK | Appeal reference recorded |
Free format text: ORIGINAL CODE: EPIDOSNREFNE |
|
APBN | Date of receipt of notice of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA2E |
|
APBR | Date of receipt of statement of grounds of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA3E |
|
APAF | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNE |
|
APBT | Appeal procedure closed |
Free format text: ORIGINAL CODE: EPIDOSNNOA9E |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20140114 |