EP1484858A1 - Methode pour l assemblage functionnel des composants d un dispositif d authentification ainsi que dispositif d authentification - Google Patents

Methode pour l assemblage functionnel des composants d un dispositif d authentification ainsi que dispositif d authentification Download PDF

Info

Publication number
EP1484858A1
EP1484858A1 EP04012990A EP04012990A EP1484858A1 EP 1484858 A1 EP1484858 A1 EP 1484858A1 EP 04012990 A EP04012990 A EP 04012990A EP 04012990 A EP04012990 A EP 04012990A EP 1484858 A1 EP1484858 A1 EP 1484858A1
Authority
EP
European Patent Office
Prior art keywords
base station
transmitter
transmitters
programming unit
programming
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP04012990A
Other languages
German (de)
English (en)
Other versions
EP1484858B1 (fr
Inventor
Dieter Rickhoff
Martin Degener
Thomas Dr. Kaiser
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leopold Kostal GmbH and Co KG
Original Assignee
Leopold Kostal GmbH and Co KG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leopold Kostal GmbH and Co KG filed Critical Leopold Kostal GmbH and Co KG
Publication of EP1484858A1 publication Critical patent/EP1484858A1/fr
Application granted granted Critical
Publication of EP1484858B1 publication Critical patent/EP1484858B1/fr
Anticipated expiration legal-status Critical
Active legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/00865Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed remotely by wireless communication

Definitions

  • the invention relates to a method for functional marriage of Components of an authentication device with each other, which device one or more mobile identification transmitters serving as keys (ID transmitter) and at least one assigned to an object Base station includes.
  • the invention further relates to an authentication device with one or more keys mobile identification transmitters (ID transmitters), at least one of an object assigned base station and a programming device.
  • Such authentication devices are used to query an authorization to trigger a specific action by an identification transmitter, when it reaches the area of a base station.
  • authentication mechanisms are used, for example, for checking the access authorization of a person carrying a mobile identification transmitter Person, for example regarding access to a building or the like.
  • Authentication devices of this type are used also to monitor a flow of goods.
  • a such identification transmitter of an individual product or a batch For example, be assigned to a pallet to monitor whether and possibly also when it leaves a warehouse, for example.
  • Keyless entry control devices each include an object to be monitored of a door, a gate or the like assigned reader and one or more mobile identification transmitters (ID transmitter).
  • ID transmitters are transponders.
  • the communication between such an ID transmitter and the base station can take place, for example, on an HF radio link. It exists both systems where one-way communication between the ID transmitter and the base station for authentication of the ID transmitter takes place, as well as those systems in which a bidirectional Communication between these two elements of the access authorization control device takes place to perform authentication. With such an authentication, a data comparison takes place between Data stored in the ID transmitter and transmitted to the base station and a review of this data for authorization, open the door or the like controlled by this base station to be allowed.
  • the communication usually contains a cryptic one Key, a so-called cryptcode.
  • Such access authorization control devices are known where customer and property specific the ID transmitters and the readers are saved by the manufacturer a specific identifier in the ID transmitter (s) and or the readers can be programmed or initialized. The facility the individual components are referred to as "getting married". These access authorization control devices must therefore, before you start using it, you must be familiar with how many as Key ID transmitters and how many readers are required. It must also be known which ID transmitter from which reading device as should be recognized with access authorization. As long as all parameters before the functional marriage of the individual components to one another are known through the measures described above, this is not a problem. In the event, however, that the number of objects assigned ID transmitters or readers must be enlarged, all Units of such an access authorization control device new to be married to each other. The same applies if individual ID transmitters must be lost and replaced with new ones.
  • DE 41 34 922 C2 describes a system for controlling access to objects became known in which the reader or readers by the individual ID transmitter can be programmed. This enables the use of unprogrammed Readers, so that an object extension by a The use of other readers is basically possible.
  • ID transmitters are still preprogrammed by the manufacturer. So when you use this system you are at a Retrofitting of ID transmitters still depends on the manufacturer.
  • this prior art system can be hierarchical It is difficult to implement locking structures, since every ID transmitter also works simultaneously Is a data carrier and therefore basically program every reader can.
  • the invention lies Task based on a generic method mentioned at the outset to further develop such that an authentication device, such as a keyless access control device only in terms of use and number of readers but also with regard to the use and number of ID transmitters with larger numbers Variability and can be set up with simple measures.
  • an authentication device such as a keyless access control device only in terms of use and number of readers but also with regard to the use and number of ID transmitters with larger numbers Variability and can be set up with simple measures.
  • An authentication device is used to marry each other between one or more readers - which are readers in connection with the invention due to its programming the ID transmitter Characteristics called base stations - with those ID donors by one or more of those involved in the establishment Base stations should be recognized as authorized, that the cryptcode used to operate the facility is not initialized components initially only the programming unit and thus a single, in particular mobile element of the authentication device is known.
  • This cryptcode is used when the Setup of this programming unit, also called a master transmitted to each base station. With the transfer of the Cryptcodes on each base station - a process that takes place at every base station is carried out - each is defined and labeled Base station.
  • All base stations assigned to a programming unit receive their individual identification in this way.
  • the programming unit is an element of the authentication device so that without further ado as with the initialization of a base station An existing object with additional base stations can be. These only need in the manner described to be initialized by the programming unit.
  • An initialization the ID transmitter belonging to the authentication device takes place in one second initialization step by the base stations, all ID transmitters that this base station should recognize as authorized, initialized or programmed by this base station. This On the one hand, initialization includes a transmission of the programming unit transmitted to the base station in a previous step Kryptcodes.
  • the cryptcode is only transmitted if it was previously recognized as part of a query that this ID transmitter has not yet received a cryptcode or at least the one for communication does not know the cryptcode serving this base station.
  • this base station creates an individual identification assigned to the individual ID transmitters and transferred to them. With this individual identification is then carried out using the given Authentication control using cryptcodes. Is in an ID transmitter the cryptcode used for this object has already been saved, then this ID transmitter is only assigned its individual identification. This is the case, for example, if this ID transmitter previously at another base station with regard to transmission of the cryptcode has already been initialized and the programming on each other Base station serves the purpose of this base station this ID transmitter to make known about its eligibility.
  • each ID transmitter of this authentication device by one or more on the authentication device Base stations involved make it clear that for configuration the authentication device only unprogrammed ID transmitters are needed. The same applies to the use of the required Base stations, which in turn - as described above - by the programming unit initialized and programmed. So this can Mass production access control device elements be removed. An individualization of the individual Components only take place if these components with the help a programming unit in the manner described be functionally married. Consequently, it is not just a retrofit Base stations unproblematic, but in particular can without further ID transmitters are added to the system and above all lost ones can also be replaced by new ones. This method is particularly suitable as part of a keyless access control system.
  • each ID transmitter via an NF part and a HF part to be available, however, the NF line and thus the NF part of the ID transmitter also used to separate the ID transmitter from one Wake up sleep or sleep mode to put it into its operating mode to be able to switch in which the HF part of the ID transmitter for communication started up with a base station.
  • Data is transmitted to program the ID transmitters on the NF line on the NF route expediently only with a very low field strength, so for this purpose the ID transmitter in immediate Must be kept close to the base station.
  • the change in Field strength can vary due to the different operating mode of the base station - Programming or initialization mode or control mode - respectively.
  • Communication between the programming unit and the base station for initializing and programming the base stations is also done on a short-range communication route. This can also be carried out on a NF route.
  • a programming or initialization of the base stations by the programming unit also on another route, for example an infrared route or also be provided contact-related.
  • the programming unit itself is mobile so that it can be sent to the individual, in base stations distributed to an object can be brought. It is therefore generally not necessary with this method that the Base stations are networked with each other.
  • the programming unit itself generally does not need to be actively programmable; rather can the programming of the individual base stations by the programming unit yourself. This is then expediently more active Transponder designed to work.
  • the programming unit can therefore do the same be made small, like the individual ID transmitters. Conveniently, the programming unit differs in color or in others However, by the individual ID providers.
  • a counter namely a base station counter and an ID transmitter counter. This has under Another advantage is that for storing the individual elements only a small memory requirement is required and in particular also that access to authorization data possibly assigned to an ID transmitter is possible much more quickly than would be the case if the entire memory for the identification of, for example, an ID transmitter should be searched.
  • the use of a counter serves in this case as an order number or address to access if necessary to receive further existing data.
  • Such an access authorization control device can easily be used in addition to the appropriately provided mobile passive programming unit an active programming unit can also be assigned. With This then gives you the option to set certain authorizations in the delete individual base stations, for example in the event that a ID transmitter has been lost.
  • an active programming unit can the base stations with regard to the authorization levels of the individual ID transmitter can be programmed.
  • the authorization of the ID transmitters known to this base station stored data can, for example, a time authorization in the Framework of a keyless access authorization control facility included, according to which certain ID transmitters can only be used within a specific one Time zone can be embedded in an object as authorized.
  • permission levels can also be designed in this way, for example be within the framework of an access authorization control facility Access to a particular ID provider is only permitted if next to this ID transmitter Another ID transmitter in the communication area of the base station is arranged.
  • the described method and the described authentication device can be easily combined with other known systems and / or overlay them.
  • a keyless access authorization control device 1 comprises a plurality, an object 2 associated with base stations B 1, B 2, three ID transmitter ID 1 - ID 3 and serving as a programming unit master M.
  • the base stations B 1, B 2 are within the object 2 are each a door assigned and serve the purpose of operating the access authorization control device 1 upon detection of an ID transmitter defined as authorized to unlock the door assigned to the respective base station B 1 , B 2 and, if necessary, to open it by motor.
  • the ID transmitters ID 1 - ID 3 are the mobile keys that can communicate with the base stations B 1 , B 2 on an HF link to carry out the authentication query.
  • the ID transmitters ID 1 - ID 3 are transponders.
  • the ID transmitters ID 1 - ID 3 and the base stations B 1 and B 2 take place with the aid of a crypt code. Furthermore, the ID transmitters ID 1 - ID 3 and also the base stations B 1 and B 2 are identified with an individual identification in order to assign different authorizations for the use of the base stations B 1 and B 2 to the ID transmitters ID 1 - ID 3 to be able to. For this purpose, the base stations B 1 , B 2 must be functionally married to those identification transmitters ID 1 - ID 3 which are each to be recognized as authorized by a base station B 1 , B 2 , so that when an ID transmitter recognized as authorized is detected, the desired door is unlocked or opened by a motor.
  • the master M serves for the purpose of marrying the components of the access authorization device 1.
  • the master M is a mobile passive programming unit.
  • the Master M differs from the ID transmitters ID 1 - ID 3 by a slightly larger design and by a different color coding of its housing.
  • a master code is stored in the master M in an electronic storage medium, with which the bidirectional communication between a base station B 1 or B 2 and an ID transmitter ID 1 , ID 2 or ID 3 is to take place.
  • the Master M also contains two counters - a base station counter and an ID transmitter counter.
  • the master M and the base stations B 1 , B 2 belonging to the access authorization control device 1 can communicate with one another on an NF line, the range of this communication being limited to a few centimeters. Communication between the master M and a base station B 1 , B 2 is thus possible if the master M is held against a base station B 1 , B 2 .
  • the base stations B 1 , B 2 and also the ID transmitters ID 1 - ID 3 each comprise an RF transmit / receive part for handling the bidirectional communication in an access authorization control operation of the access authorization control device 1.
  • the base stations B 1 , B 2 further comprise an NF transmitting-receiving part; the ID transmitters ID 1 - ID 3 comprise an LF receiving part.
  • a programming or initialization of the ID transmitters ID 1 - ID 3 is carried out by the base stations B 1 and B 2 on the NF route, whereby it is provided that confirmation signals as feedback from the ID transmitters ID 1 - ID 3 to the respective base station B 1 or B 2 are transmitted on the HF link. In principle, it can also be provided that such feedback or acknowledgment signals are also sent on the NF route.
  • the ID transmitters ID 1 - ID 3 also comprise an LF transmission unit.
  • the base stations B 1 , B 2 and also the ID transmitters ID 1 - ID 3 originate from a mass production and have no individual features before their functional marriage to one another and their assignment to the object 2, which would be necessary in the context of the description of the invention.
  • these elements - base stations and ID transmitters - can be assigned to any access authorization control device 1 or any object before they are initialized.
  • the master M is held in the immediate vicinity of the base station B 1 , so that the master M can communicate with the base station B 1 on an LF radio link.
  • the master M is placed directly on the base station B 1 .
  • the master M enters the LF transmission area of the base station B 1 , this is woken up and transmits a first signal to the base station B 1 , with which the programming mode of the base station B 1 is opened. In this programming mode, bidirectional communication can take place between the master M and the base station B 1 .
  • the master M checks whether the base station B 1 has already received an individual identification (identifier). This can be done, for example, by querying an identification memory. If the memory is empty, the base station - in this case the base station B 1 - is neither functionally assigned to the object 2 nor to the access authorization control device 1. In this case, the master M transmits a base station identification, an object identifier and a crypt code to the base station B 1 . All transmitted data are stored in the base station B 1 . The transmitted cryptcode is expediently stored on a different storage medium than the transmission of the base station identification and the object identifier.
  • the base station identification in the illustrated embodiment is an element of a row of counters. Since the base station B 1 is initialized and programmed as an example when the access authorization control device 1 is initialized, it receives the counter element "1" as the base station identification.
  • the object identifier transmitted is a suitable identifier for the object 2 represents After successfully transmitting and storing said data from the master M to the base station B 1 an acknowledgment is received from the base station B 1 to the master M.
  • the base station counters of the master M. is then increased by one counter so that the first counter cannot be reassigned.
  • the base station identification of the next base station to be programmed and initialized, for example base station B 2 is thus clearly specified with the next counter.
  • the programming of the base station B 1 is basically ended after receiving the feedback from the base station B 1 to the master M. By removing the master M from the base station B 1 , the latter automatically switches from its programming mode to the access authorization control operating mode.
  • This communication takes place between the base station B 1 and the ID transmitter ID 3 on an LF radio link.
  • This is woken up and switched to its programming mode.
  • the programming of the ID transmitter ID 3 is basically carried out in the same way as the programming of the base station B 1 by the master M.
  • a first query in the exemplary embodiment shown it is queried whether the ID transmitter ID 3 is the one in the base station B 1 stored cryptcode is known. This can be done, for example, by reading out the cryptcode memory of the ID transmitter ID 3 . If the cryptographic code memory of the ID transmitter ID 3 is empty, the ID transmitter ID 3 has so far neither been programmed nor initialized. The ID transmitter ID 3 is therefore a new one.
  • the base station B 1 transmits the cryptcode, the object identifier and an ID transmitter identification to the ID transmitter ID 3 .
  • the base station B 1 has an ID transmitter counter that basically works like the base station counter of the master M described above. If the ID transmitter ID 3 is the first ID transmitter that is authorized to access this base station B 1 is to be programmed, it receives the ID transmitter identification "1". The subsequent ID transmitters to be programmed by the base station B 1 as part of this programming process, for example the ID transmitters ID 1 , ID 2 , then successively receive the following elements of this row of counters, namely the ID transmitter identifications "2" or " 3 ".
  • the ID transmitter ID 3 sends a response to the base station B 1 .
  • the ID transmitter counter of the base station B 1 is then increased by one counter. In the event that further ID transmitters are to be initialized by base station B 1 or programmed as authorized to access, these are successively brought into the close range of base station B 1 and initialized or programmed in the same way. If the ID transmitter programming or initialization is completed, the feedback previously described is sent from the base station B 1 to the master M. This feedback also contains information about the number of ID transmitters set up by the base station B 1 in the course of the previous initialization or programming.
  • the master M comprises an ID transmitter counter which is set by this feedback.
  • the counter of the master M is at position "4".
  • the base station when a base station is programmed, the base station also sends the "ID transmitter counter" count of the master M, so that during programming of the ID transmitter ID 3 as authorized to access the base station B 2, which would receive the counter element "4" as the ID transmitter identification. In this way, every authorization recognition is possible via the ID transmitter identification.
  • the ID transmitter When programming the ID transmitter with regard to the access authorization to several base stations, for example the base stations B 1 and B 2, they receive an identifier that is independent of each base station B 1 or B 2 . Therefore, in order to identify the individual ID transmitters ID 1 - ID 3 , complex identifiers can be dispensed with.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
EP04012990A 2003-06-04 2004-06-02 Methode pour l assemblage functionnel des composants d un dispositif d authentification ainsi que dispositif d authentification Active EP1484858B1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10325089A DE10325089A1 (de) 2003-06-04 2003-06-04 Verfahren zum funktionellen Verheiraten der Komponenten einer Authentisierungseinrichtung miteinander sowie Authentisierungseinrichtung
DE10325089 2003-06-04

Publications (2)

Publication Number Publication Date
EP1484858A1 true EP1484858A1 (fr) 2004-12-08
EP1484858B1 EP1484858B1 (fr) 2005-10-05

Family

ID=33154528

Family Applications (1)

Application Number Title Priority Date Filing Date
EP04012990A Active EP1484858B1 (fr) 2003-06-04 2004-06-02 Methode pour l assemblage functionnel des composants d un dispositif d authentification ainsi que dispositif d authentification

Country Status (4)

Country Link
US (1) US7054616B2 (fr)
EP (1) EP1484858B1 (fr)
AT (1) ATE306160T1 (fr)
DE (2) DE10325089A1 (fr)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060061482A1 (en) * 2004-09-23 2006-03-23 Patrick Monney RFID auto-connect for wireless devices
US7436300B2 (en) * 2004-11-12 2008-10-14 Microsoft Corporation Wireless device support for electronic devices
JP4509863B2 (ja) * 2005-05-27 2010-07-21 株式会社東芝 無線基地局と無線端末
US7755505B2 (en) 2006-09-06 2010-07-13 Lutron Electronics Co., Inc. Procedure for addressing remotely-located radio frequency components of a control system
US7880639B2 (en) * 2006-09-06 2011-02-01 Lutron Electronics Co., Inc. Method of establishing communication with wireless control devices
US7768422B2 (en) 2006-09-06 2010-08-03 Carmen Jr Lawrence R Method of restoring a remote wireless control device to a known state
TWI421726B (zh) * 2008-07-01 2014-01-01 Avermedia Information Inc 無線簡報系統與應用其上之配對方法
JP5835485B2 (ja) * 2012-07-18 2015-12-24 日本電気株式会社 無線基地局、移動通信システム、ハンドオーバ制御方法およびプログラム
US9363836B2 (en) * 2013-04-01 2016-06-07 Silver Spring Networks, Inc. Secure management of radio transmissions in an endpoint device of a network
US10769562B2 (en) 2016-03-16 2020-09-08 Triax Technologies, Inc. Sensor based system and method for authorizing operation of worksite equipment using a locally stored access control list
US11170616B2 (en) 2016-03-16 2021-11-09 Triax Technologies, Inc. System and interfaces for managing workplace events
US11810032B2 (en) 2016-03-16 2023-11-07 Triax Technologies, Inc. Systems and methods for low-energy wireless applications using networked wearable sensors
US10528902B2 (en) * 2016-03-16 2020-01-07 Triax Technologies, Inc. System and interfaces for managing workplace events

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4134922C1 (fr) * 1991-10-23 1992-12-03 Anatoli 3013 Barsinghausen De Stobbe
WO1999002377A1 (fr) * 1997-07-05 1999-01-21 Leopold Kostal Gmbh & Co. Kg Dispositif de controle d'acces sans cle pour vehicules a moteur et procede pour realiser un controle d'autorisation d'acces sans cle dans un vehicule a moteur
US20020049904A1 (en) * 2000-08-24 2002-04-25 Juergen Nowottnick Access system with possibility of learing unknown access keys
WO2002065403A1 (fr) * 2001-02-15 2002-08-22 Leopold Kostal Gmbh & Co. Kg Dispositif de commande d'autorisation d'acces sans cle
WO2002067205A1 (fr) * 2001-02-15 2002-08-29 Leopold Kostal Gmbh & Co. Kg Dispositif de controle d'autorisation d'acces sans cle et emetteur d'identification associe

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US71714A (en) * 1867-12-03 Benjamin day ot
US14953A (en) * 1856-05-27 Secttkietg nuts to cabkiage-axles
US89429A (en) * 1869-04-27 Improved animal-trap
JPH1039685A (ja) * 1996-07-26 1998-02-13 Canon Inc 画像形成装置及びプロセスカートリッジ
US6323566B1 (en) * 1996-10-10 2001-11-27 Texas Instruments Incorported Transponder for remote keyless entry systems
FI980427A (fi) * 1998-02-25 1999-08-26 Ericsson Telefon Ab L M Menetelmä, järjestely ja laite todentamiseen
IT1305533B1 (it) * 1998-06-30 2001-05-09 Alessandro Manneschi Apparato e metodo operativo per la rivelazione e lettura ditrasponder nel passaggio controllato
DE19900415B4 (de) 1999-01-08 2008-02-21 Leopold Kostal Gmbh & Co. Kg Verfahren zum Durchführen einer schlüssellosen Zugangsberechtigungskontrolle für Kraftfahrzeuge
EP1018692B1 (fr) * 1999-01-08 2006-06-28 Anatoli Stobbe Système de sécurité, transpondeur et dispositif de réception
DE19902797C1 (de) 1999-01-25 2000-06-21 Kostal Leopold Gmbh & Co Kg Schlüssellose Zugangskontrolleinrichtung für Kraftfahrzeuge sowie Verfahren zum Durchführen einer schlüssellosen Zugangsberechtigungskontrolle bei Kraftfahrzeugen
US6323782B1 (en) * 1999-06-21 2001-11-27 Freight Locker, Inc. Unattended item delivery system
DE10004615C2 (de) * 2000-02-03 2003-08-07 Siemens Ag Berechtigungskontrollsystem, insbesondere für ein Kraftfahrzeug
DE50112712D1 (de) * 2000-02-21 2007-08-23 E Plus Mobilfunk Gmbh & Co Kg Verfahren zum festellen der authentizität der identität eines dienste-nutzers und vorrichtung zum durchführen des verfahrens
US7136999B1 (en) * 2000-06-20 2006-11-14 Koninklijke Philips Electronics N.V. Method and system for electronic device authentication
EP1302374B1 (fr) * 2001-10-16 2007-05-02 Siemens Aktiengesellschaft Procédé d'initialisation d'un système de contrôle d'accès avec plusieurs clées electroniques et plusieurs objéts
FR2834156B1 (fr) * 2001-12-20 2004-03-05 Gemplus Card Int Procede d'acces a un service par un moyen radiofrequence associe a un objet portable a puce electronique
US7050947B2 (en) * 2002-01-04 2006-05-23 Siemens Vdo Automotive Corporation Remote control communication including secure synchronization
US6961541B2 (en) * 2002-05-24 2005-11-01 Aeroscout, Inc. Method and apparatus for enhancing security in a wireless network using distance measurement techniques
US7231041B2 (en) * 2003-08-19 2007-06-12 General Motors Corporation Method, device, and system for secure motor vehicle remote keyless entry

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4134922C1 (fr) * 1991-10-23 1992-12-03 Anatoli 3013 Barsinghausen De Stobbe
WO1999002377A1 (fr) * 1997-07-05 1999-01-21 Leopold Kostal Gmbh & Co. Kg Dispositif de controle d'acces sans cle pour vehicules a moteur et procede pour realiser un controle d'autorisation d'acces sans cle dans un vehicule a moteur
US20020049904A1 (en) * 2000-08-24 2002-04-25 Juergen Nowottnick Access system with possibility of learing unknown access keys
WO2002065403A1 (fr) * 2001-02-15 2002-08-22 Leopold Kostal Gmbh & Co. Kg Dispositif de commande d'autorisation d'acces sans cle
WO2002067205A1 (fr) * 2001-02-15 2002-08-29 Leopold Kostal Gmbh & Co. Kg Dispositif de controle d'autorisation d'acces sans cle et emetteur d'identification associe

Also Published As

Publication number Publication date
ATE306160T1 (de) 2005-10-15
US7054616B2 (en) 2006-05-30
DE10325089A1 (de) 2004-12-30
EP1484858B1 (fr) 2005-10-05
DE502004000084D1 (de) 2006-02-16
US20040248556A1 (en) 2004-12-09

Similar Documents

Publication Publication Date Title
EP0811739B1 (fr) Dispositif et méthode pour vérifier l'autorisation de contrôle d'accés, en particulier dispositif de fermeture des véhicules
DE3905651C2 (fr)
EP1484858B1 (fr) Methode pour l assemblage functionnel des composants d un dispositif d authentification ainsi que dispositif d authentification
EP1302374B1 (fr) Procédé d'initialisation d'un système de contrôle d'accès avec plusieurs clées electroniques et plusieurs objéts
DE102006032129A1 (de) Skalierbares Verfahren zur Zugriffssteuerung
DE19900415A1 (de) Verfahren zum Durchführen einer schlüssellosen Zugangsberechtigungskontrolle für Kraftfahrzeuge
EP0600194B1 (fr) Système de contrÔle d'accès
EP0410024A1 (fr) Système de fermeture électronique
DE4414297C1 (de) Überwachungsanlage für kostenpflichtige Parkplätze
EP3009992B1 (fr) Procede et dispositif de gestion d'autorisations d'acces
EP1006248B1 (fr) Dispositif de contrôle d'accès commandé à distance, en particulier pour un véhicule à moteur et transpondeur portable associé
WO1999008471A2 (fr) Procede pour le fonctionnement d'une telecommande, et telecommande associee
WO2001035358A1 (fr) Procede pour faire fonctionner un systeme d'expedition de marchandises comportant une pluralite de conteneurs a marchandises, et systeme correspondant
EP2584539B1 (fr) Procédé de configuration d'une serrure électromécanique
DE19743101B4 (de) Verfahren zum Zuordnen eines Betätigungselementes zu einem Gerät
DE10112573C2 (de) Verfahren zum Initialisieren eines Diebstahlschutzsystems für ein Kraftfahrzeug
EP0948779B1 (fr) Dispositif pour attribuer un élément d'opération à un appareil
DE10004615C2 (de) Berechtigungskontrollsystem, insbesondere für ein Kraftfahrzeug
DE102015220798A1 (de) Zugangskontrollsystem für einen Lagerbereich sowie Verfahren zur Zugangskontrolle
DE102016210139A1 (de) Verfahren zum Setzen eines Identifikationsmerkmals, Fahrzeug, Betriebsverfahren für ein Sicherheitssystem und Sicherheitssystem
EP2371631B1 (fr) Contrôle de justification d'accès pour un véhicule de travail
EP0954666A1 (fr) Dispositif de commande pour systeme d'autorisation
EP0813170A2 (fr) Système électronique d'autorisation d'accès et procédé pour détecter l'accès autorisé
EP1040454B1 (fr) Procede pour reattribuer un element de commande a un dispositif de commande a distance, et dispositif de commande a distance y relatif
EP1017916B1 (fr) Procede d'affectation d'une telecommande a une station de base

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL HR LT LV MK

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

17P Request for examination filed

Effective date: 20041222

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AKX Designation fees paid

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED.

Effective date: 20051005

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

Ref country code: IE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: PA ALDO ROEMPLER

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060105

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060105

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060105

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060116

GBT Gb: translation of ep patent filed (gb section 77(6)(a)/1977)

Effective date: 20060119

REF Corresponds to:

Ref document number: 502004000084

Country of ref document: DE

Date of ref document: 20060216

Kind code of ref document: P

NLV1 Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act
PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060306

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20060406

REG Reference to a national code

Ref country code: IE

Ref legal event code: FD4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20060630

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

ET Fr: translation filed
26N No opposition filed

Effective date: 20060706

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20060602

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

REG Reference to a national code

Ref country code: CH

Ref legal event code: PCAR

Free format text: ALDO ROEMPLER PATENTANWALT;BRENDENWEG 11 POSTFACH 154;9424 RHEINECK (CH)

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20051005

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20110517

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: AT

Payment date: 20110629

Year of fee payment: 8

Ref country code: GB

Payment date: 20110512

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 20110601

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20110907

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20120525

Year of fee payment: 9

BERE Be: lapsed

Owner name: LEOPOLD *KOSTAL G.M.B.H. & CO. K.G.

Effective date: 20120630

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

Ref country code: AT

Ref legal event code: MM01

Ref document number: 306160

Country of ref document: AT

Kind code of ref document: T

Effective date: 20120602

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20120602

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20130228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120630

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120602

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120630

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120702

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20120602

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 502004000084

Country of ref document: DE

Effective date: 20140101

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20140101