EP1702306B1 - Systeme de controle d'acces, et procede pour faire fonctionner ce systeme - Google Patents
Systeme de controle d'acces, et procede pour faire fonctionner ce systeme Download PDFInfo
- Publication number
- EP1702306B1 EP1702306B1 EP04820940A EP04820940A EP1702306B1 EP 1702306 B1 EP1702306 B1 EP 1702306B1 EP 04820940 A EP04820940 A EP 04820940A EP 04820940 A EP04820940 A EP 04820940A EP 1702306 B1 EP1702306 B1 EP 1702306B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- access control
- access
- mobile telephone
- transmitter
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000007246 mechanism Effects 0.000 claims abstract description 17
- 230000008569 process Effects 0.000 claims abstract description 4
- 238000005516 engineering process Methods 0.000 claims description 14
- 230000005540 biological transmission Effects 0.000 claims description 13
- 238000013475 authorization Methods 0.000 claims description 11
- 238000001514 detection method Methods 0.000 claims 1
- 238000012795 verification Methods 0.000 abstract 1
- 238000004891 communication Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 5
- 238000010295 mobile communication Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 230000004807 localization Effects 0.000 description 3
- 229920001690 polydopamine Polymers 0.000 description 2
- 238000009420 retrofitting Methods 0.000 description 2
- 230000003321 amplification Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
Definitions
- the present invention relates to an access control system, and a method for its operation.
- the access control system is based on a standard access control system, via which a plurality of access points can be controlled via individual physical locking mechanisms, wherein at each access point at least one reader and an associated controller for controlling the closing mechanism 'is provided.
- at least one access control server is present, which performs a central administration of the access data, and which is in communication with the respective controllers, as well as at least one mobile telephony server in connection with the access control server, which is at least indirectly capable of Sending or receiving data via a mobile phone network to mobile subscribers.
- Access control systems are essentially electronically controlled centralized Systems that monitor, control and manage a large number of access points (passages) in their accessibility.
- Modern access control systems are often based on non-contact technology, ie the access point is no longer a physical key used, but electronically readable media, which are activated by appropriate, provided at the access points reader and read from them.
- These electronically readable media are typically the term RFID (Radio Frequency Identification) known and high-technologies are successfully and reliably, for example in the Applicant under the trade name LEGIC ® has long been in use.
- RFID tag RFID tag
- This technology is particularly suitable for permanent employees, which can be equipped with such an electronic medium, which then allows both access control, possibly also time recording or other applications.
- An access control system comprises several access control devices, in each of which an access code is stored. Specific access codes and access rights for a plurality of access control devices are transmitted from an access control center via a mobile radio network to the mobile communication terminal, for example a mobile telephone of a user. From an access control device to be passed, an access control device identification is transmitted to the mobile communication terminal. In the mobile communication terminal, the access code and the access rights for the access control device to be passed are determined on the basis of the received identification and transmitted to the access control device.
- the access checking device enables access for the user if the received access rights are sufficient and the received access code matches the stored access code.
- a similar access control system is known in which a mobile telephone or a PDA can also be used as the terminal.
- the use of the wireless bluetooth technology is proposed as a means of communication between the mobile phone and the access control device and a central office. Again, the communication between the terminal and the local transmitter at the access control device is used to authenticate and initiate the opening of the access.
- the invention is therefore based on the object to propose an improved in this context access control system, and a method for its operation.
- the access control system is based on a standard access control system, via which a plurality of access points can be controlled via individual physical locking mechanisms, wherein at each access point at least one reader and an associated controller for controlling the closing mechanism 'is provided.
- at least one access control server is present, which performs a central administration of the access data, and which is in communication with the respective controllers, as well as at least one mobile telephony server in connection with the access control server, which is at least indirectly capable of Sending or receiving data via a mobile phone network to mobile subscribers.
- a short-range transmitter is provided at a specified location, which is formed as an independent unit without direct connection to the standard access control system, and which access point-specific identification information sends out so that they are only one near the reception received by the transmitter mobile phone and is used by this at least indirectly for controlling the access control of a specific assigned access point.
- the core of the invention thus consists on the one hand only to allow mobile phones the opening at the access point, which are actually in the immediate vicinity of this transmitter and thus in the immediate vicinity of a specific location. Otherwise, it would be possible to initiate a corresponding procedure with a mobile phone without being physically present or at a specified location. This is a security hole. In the present case, this is now prevented by only a corresponding opening request can be placed by the mobile phone when it over a corresponding interface, the identification information of Sender receives.
- the specific location may be the immediate vicinity of the assigned access point, in which case the positioning of the transmitter is preferably carried out so that the mobile phone can only receive this transmitter if it is located immediately before the access point.
- a transmitter may be placed in a surveillance room or other work space so that personnel, when in that interception room, can open one or more access points via a mobile telephone.
- a transmitter may be placed in a surveillance room or other work space so that personnel, when in that interception room, can open one or more access points via a mobile telephone.
- Receiving the identification information of the sender also involves an additional simplification and an increase in security in other respects. Without a corresponding local identifier, the user of the mobile phone, unless he is authorized to access only a single access point, must at a certain moment enter an identifier of the specific access point on his mobile telephone. This process is on the one hand tedious and on the other hand prone to error as well as manipulatable.
- the cell information of the mobile phone in question for such a localization it turns out in practice, however, that on the one hand, the cell information is usually local for individual access points too little accurate (different passages in the same cell), and that of a specific Users just used cell may also be different depending on the mobile phone operator and also would have to be updated with changing cells in the access control system always.
- Another significant advantage of the proposed method is that actually not the mobile phone is used as a so-called "trusted device", but that only a mobile phone associated phone number, as received by Access Control server respectively from the associated mobile telephony server, for authentication, if necessary in combination with a PIN code is used. In other words, no specific data is stored on the mobile phone, and it may be possible to use another mobile phone for the same access authorizations, for example, as long as the same SIM card is used.
- the term mobile telephone basically means devices which on the one hand are able to exchange data with the access control system via a mobile telephone network, for example the GSM network, and which, on the other hand capable of receiving the signals transmitted by the transmitter, d. H. which have an appropriate interface. It does not necessarily have to be a mobile phone in the traditional sense, it can also be a PDA (Personal Digital Assistant) or another computer, as long as he has the above-mentioned possibilities of communication with the transmitter or the access control system.
- a mobile telephone network for example the GSM network
- PDA Personal Digital Assistant
- the transmitter is a Bluetooth device, in particular preferably with a range of less than 10 meters.
- Modern mobile phones usually have Bluetooth interfaces, and accordingly it proves to be particularly simple, since no additional user-side hardware is required to design the respective transmitter at the access point as a Bluetooth device.
- the Bluetooth standard automatically performs a constant polling and continuous reception of 48-bit addresses specifically assigned to each device. If such a mobile phone thus comes within the range of another Bluetooth device, they automatically exchange each other's ID (48-bit address). This fact is exploited according to the invention for "localization".
- a Bluetooth device is arranged. The ID of this device is assigned in the system to the reader or the access point.
- the identification information is preferably a hardware-specific, unambiguous address of the transmitter, in particular preferably a device-specific 48-bit address of a Bluetooth device.
- WLAN wireless local area network
- Wi-fi wireless local area network
- Wi-fi wireless local area network
- Wi-fi wireless local area network
- IEEE 802.11 the IEEE 802.11 standard
- Medium Access Mode Devices operating on the 802.11b variant transmit data via radio waves in the license-free ISM band at 2.4 GHz with a gross transmission rate of up to 11 Mbps.
- Bluetooth / WLAN transmitter assigned to the passage. This may be physically the same, but also at a different location compared to the reader (eg truck access or interstitial space). This also eliminates the need to enter the pass number (automatically known via Bluetooth ID or Wi-Fi ID, when installing the Bluetooth / WLAN device at the access point, the system only needs to specify the corresponding correlation between Bluetooth / WLAN ID and access point once). If necessary with a PIN or another authentication, this ID is now sent to the access control server.
- the transmitter can be designed as an independent unit, also equipped with an individual power supply, since to a certain extent it serves only to generate the localization information on the mobile telephone.
- the transmitter as mentioned preferably a Bluetooth or a WLAN device, thus has no direct connection with the standard access control system and / or preferably the mobile telephony server.
- the transmission of an ID can be done on a very short time scale of less than a few seconds, while typically building an effective Bluetooth connection takes about 10 seconds. This is usually a too long period of time in practice.
- only a very specific aspect of the Bluetooth technology is used, which to a certain extent takes advantage of access control advantages without having to accept the disadvantages such as slow connection setup.
- the access control system is an access control system that mainly manages access control using standard technology.
- the standard access control system thus allows, for example, the access control using means without mobile telephony, in particular on the basis of RFID technology in the main.
- the transmitter may be advantageous to design the transmitter such that the transmitter additionally has a connection to the controller, so that in the event of a failure of the connection between the controller and the access control server transmits user-specific identification information from the mobile phone to the transmitter and This can be passed to the controller for controlling the closing mechanism. While in other words during normal operation the transmitter acts exclusively as a transmitter, and thus Information is only transmitted from the sender to the mobile phone, the reverse route can also be released in emergency situations, ie it is possible to transfer information from the mobile phone to the transmitter, which then acts as a receiver.
- the present invention relates to a method for access control, particularly preferably using an access control system, as described above.
- a standard access control system is provided, via which a plurality of access points can be controlled via individual physical locking mechanisms, wherein at each access point preferably at least one reader and a related controller for controlling the closing mechanism 'is provided.
- at least one access control server is present, which performs a central administration of the access data, and which is in communication with the respective controllers.
- at least one mobile telephony server is present in connection with the access control server, which is at least indirectly able to send data via a mobile telephone network to mobile telephone subscribers or to receive from these, whereby this mobile telephony server is also an integral part of the Access Control server.
- at least one access point or more generally a short-range transmitter is placed at a specific location.
- the procedure is now such that a mobile telephone is authorized to access certain access points in a certain period of time via the access control server or via the mobile telephony server via the mobile telephone network.
- This process can be triggered by appropriate personnel.
- the transmitter at the corresponding access point or more generally at the specific location transmits access point-specific identification information continuously or in sections such that it can be received by a mobile telephone located only in the immediate vicinity of the access point (if the transmitter is located in the vicinity thereof) or of the transmitter ( Control of the physical presence at the access point or at the transmitter).
- the sender located mobile phone now detects the identifier of this access point on this identification information, and then automatically via mobile phone, mobile phone network, mobile telephony server, access control server, respectively controller causes the opening of the corresponding access point under direct or indirect use of this identification information.
- the transmission of data is done by the mobile phone preferably via the mobile phone network either as a telephone transmission or as an email or SMS (Short Message Service, short message service, CEPT standard for short text messages, ie up to 160 alphanumeric characters) Mobile phones in the GSM network, which are displayed on the mobile phone display).
- SMS Short Message Service, short message service, CEPT standard for short text messages, ie up to 160 alphanumeric characters
- the mobile telephone after the identification information has been acquired, the mobile telephone additionally requires the input of an authentication such as, in particular, a PIN code, password, biometric information, and this user-specific information is then sent via the mobile telephone network to the user along with the identifier of the access point to be processed Handing over the mobile telephony server and the access control server. Then, with the appropriate authorization, the associated controller is activated or the closing mechanism is triggered.
- an authentication such as, in particular, a PIN code, password, biometric information
- the transmitter is preferably a Bluetooth or a WLAN device, which transmits its unique 48-bit address as an identification information. This 48-bit address is used to identify the corresponding access point.
- the mobile phone has a Bluetooth interface, whereby the mobile phone automatically enters into an appropriate dialogue with the mobile phone user upon receiving specific authorized 48-bit addresses that correspond to, ie, are recognized by the authorized access points entry. If necessary, an authentication of the user is subsequently requested (eg PIN code). In any case, an opening request of the specific access point will then be transmitted via the mobile telephone network to the mobile telephony server or the access control server. After the authorization has been checked, the access control server will then trigger the controller, if the authorization has been granted.
- the security can be further improved if, according to a further preferred embodiment of the inventive method, the Bluetooth resp. WLAN device is arranged in the area of the access point, that the reception of the identification information by a mobile phone only at a distance of less than 1m, preferably less than 0.5m outside and before the access point is possible.
- the time recording system has a standard time recording system, which comprises at least one time recording server, which performs a central administration of the time data; it also has at least one mobile telephony server in connection with the time registration server, which is at least indirectly able to send and receive data via a mobile telephone network to mobile subscribers, and this mobile telephony server also integral part of the time recording server.
- the time recording system is characterized in that at least one authorized area has a short-range transmitter which transmits area-specific identification information in such a way that it is received only by a mobile telephone located in the immediate vicinity of the authorized area and at least indirectly manipulated by the latter Time data is used.
- a short-range transmitter which transmits area-specific identification information in such a way that it is received only by a mobile telephone located in the immediate vicinity of the authorized area and at least indirectly manipulated by the latter Time data is used.
- the method comprises a standard time recording system, with at least one time recording server, which performs a central administration of the time data; Furthermore, at least one mobile telephony server is present in connection with the time registration server, which is at least indirectly able to send and receive data via a mobile telephone network to mobile telephone subscribers, whereby this mobile telephony server is also an integral part the time tracking server can be In addition, at least one authorized area has a short range transmitter.
- the method is now characterized in particular by the fact that a mobile telephone for entering time data in certain authorized areas is authorized in at least one specific time period via the time recording server or via the mobile telephony server via the mobile telephone network that the transmitter is area-specific identification information such that it can only be received by a mobile telephone located in the immediate vicinity of the authorized area, that a mobile telephone located in the immediate vicinity of the area detects the identification of this area via this identification information, and that subsequently via mobile telephone, mobile telephone network , Mobile telephony server time data to the time attendance server be transmitted or queried by the latter.
- the present invention also relates to a specific data processing program (software) which is capable of running on a mobile telephone and which allows implementation of an access control method as described above.
- the data processing program is capable of automatically transmitting the identification information received from the sender, if appropriate in combination with another identification such as PIN code or the like, to the access control.
- the present invention relates to a mobile phone or in principle another device on which such a data processing program is loaded, or from which such a data processing program can be downloaded.
- FIG. 1 shows a schematic representation of an access control system.
- Fig. 1 shows a schematic representation of an access control system. From this illustration, the invention will be explained, without thereby limiting the breadth of the protection, as formulated in the claims.
- the access control system comprises an access control server 4, on which the access authorizations are defined and managed.
- the access control server 4 can also simultaneously take over time control, ie store and manage the corresponding time data in a person-specific manner.
- the Access Control server 4 is on the one hand connected to a plurality of access points, ie passages 1 and 1 'respectively. He manages the access, ie the possible opening and / or closing of these access points.
- a controller 3 is initially arranged at the individual access points 1, which, inter alia, serves as an interface to the access control server 4, and on which certain information of the access control server is mirrored, depending on the design of the system.
- the controllers 3 assume the task of processing the data received by a reader 3, and to use these either directly or only after appropriate consultation of the access authorizations on the access control server 4. Use here means that the controller 3 physically activates corresponding closing mechanisms 8, ie, for example, by returning bars or the like, so that the access point, ie the passage 1, can be opened by the user.
- the access control system described up to this point is an access control system according to the prior art.
- Such access control systems can be used in combination with electronic, mechatronic and / or mechanical components there, and, for example, by the applicant under the trade name Kaba exos ® in combination with RFID technology under the name LEGIC ® available.
- each access point 1 is a Bluetooth or alternatively resp. additionally wireless LAN (WLAN) device 9 arranged.
- This device 9 is provided in the area of the access point 1 such that a corresponding receiver, such as a mobile phone 7 with a Bluetooth or WLAN interface, this device 9 only receives when the mobile phone 7 is disposed substantially immediately before the passage 1 ,
- Bluetooth is basically a protocol for wireless (wireless) data transmission.
- the standard is used for data transmission by shortwave radio in the globally license-free ISM network (2.45 GHz, as in IEEE 802.11b) with a maximum range of 10 m, by amplification up to a maximum of 100m (usually not provided in this case).
- the transmission speed reaches 1Mbps.
- the connection type is one-to-one.
- voice channels are also available.
- PANs Personal Area Network
- d. H. for very local personal wireless networks, which are as automatic as possible, d. H. without specific influence of the user to be built. This refers to the close range of a maximum of ten meters around one person.
- the wired data transfer should be superfluous. This can be used to install wireless local area networks, for example, or to enable data transfer between mobile and stationary devices. The data exchange can also take place automatically as soon as the range is undershot. Another area of application is networking in the private sector.
- Bluetooth To be Bluetooth enabled, the devices must be equipped with a Bluetooth chip for send and receive control.
- the Bluetooth standard was specified by the Bluetooth Special Interest Group, Bluetooth 1.0 in July 1999. The standard is open. Each device has a unique 48-bit address, which is constantly communicated to the outside. If two Bluetooth-enabled devices come in close enough contact, they swap according to. Log automatically the corresponding ID addresses.
- Wireless LAN is another open standard (IEEE 802.11) for wireless data transmission and, in contrast to Bluetooth, will be used more often, especially with larger data volumes and distances.
- IEEE 802.11 wireless data transmission and a respectively unique identifier are used and the WLAN is therefore also suitable for the proposed method.
- WLAN interfaces e.g., mobile-phone-capable PDAs.
- the Bluetooth or the WLAN standard thus offers a very wide range of communication options.
- the Bluetooth / WLAN device 9 but only used to serve as a transmitter, d. H. it is only exploited the property that such a device 9 constantly sends out its unique address. This, as already mentioned, to ensure the physical presence of the mobile phone in the area of the access point 1 and to convey the identity of the access point.
- Retrofitting the conventional access control system with such Bluetooth or WLAN devices 9 is extremely simple. Essentially, it consists in such a device 9 to be attached to each optionally be released input such that a reception by a mobile phone 7 is only possible directly in front of the entrance 1. Typically, reception of the specific ID of the device 9 by a mobile telephone 7 should only be possible if the mobile telephone 7 is closer than one meter in front of the entrance 1.
- the device 9 does not have to be physically integrated into the access control system in any way, ie it is not necessary to connect the device 9 to the controller 3, for example, and to coordinate with it.
- the device 9 is arranged only in the region of the passage 1 and, for example, can also be supplied via a separate power supply.
- the only step that is required afterwards is one Assigning the unique address of a specific device 9 to a specific passage 1. For this purpose, it is sufficient to read this ID once, and then allocate this ID to the specific input 1 in the access control server 4. So to a certain extent a virtual access point is created.
- An administrator of the access control system is then directly or indirectly on the Access Control server 4 instead of or in addition to the RFID medium, the mobile number. the person e.g. at an operator station 10, and assigns this mobile phone no.
- the authorization is granted to use the main entrance of the building complex during the given afternoon.
- the unique addresses assigned to the main entrances of the building complex of the Bluetooth / WLAN devices 9 arranged at these main entrances are either transmitted directly to the person's mobile telephone, normally together with a software executable on the mobile telephone (eg Java) and deposited thereon; Alternatively, and this solution is preferred insofar as no data is stored on the mobile phone and thus possibly the mobile phone can be changed as long as the same mobile phone number is assigned, this software is not assigned addresses of the allowed devices 9 only on the Access control system provided such that at a first contact of the mobile phone of the person (for example, if this is located in front of the door and a corresponding mobile phone number for the first time) with the access control server or its GSM server 5, the associated software automatically the mobile phone is handed over.
- a software executable on the mobile telephone eg Java
- the person's Bluetooth-enabled mobile phone automatically receives the unique address of the device of that specific main entrance. If the corresponding software has already been stored on the mobile phone, the mobile phone now recognizes such a sender. It is now, if necessary, automatically triggered the associated software on the mobile phone 7, and, if necessary, the person, for example, for security reasons additionally queried the input of a PIN code. If this has entered the PIN code, the PIN code is transmitted automatically from the mobile phone to the access control system together with the unique address of the specific Bluetooth / WLAN device 9 of the specific main entrance.
- the access control server 4 now checks whether this mobile telephone 7 or this mobile telephone number is bound because the identifier is not bound to the device but to the number assigned to the mobile telephone at this point in time (due to the unique address, respectively) a corresponding information generated from this address) is authorized, and whether the entered PIN code is correct. If all conditions are met, the access control server 4 will control the associated controller 3 in such a way that the closing mechanism 8 of the passage 1 is influenced in such a way that the person can enter.
- Another advantage of the method is that the person can change their personal mobile phone 7 at any time without losing their privileges. It is only important that the SIM card and thus the phone number of the used mobile phone remains the same. Especially with the use of two or more mobile phones 7 with a mobile phone number has the advantage to wear. This flexibility is possible because on the mobile phone 7 no data of the access control system, at most the software mentioned, but which is automatically re-downloaded whenever necessary, are stored and the transmitter 9 does not need to know the unique Bluetooth / WLAN address of the mobile phone 7 , In pure Bluetooth based Access control systems, this problem is very expensive solvable.
- the method also allows identification at any distance to the passage 1, as long as the mobile phone is in sufficient proximity to a Bluetooth / WLAN transmitter, ie as long as the mobile phone is in a specific and defined area.
- a wide-area solution without limits can be realized, which is still localized.
- This variant is possible in particular because the transmitter 9 does not have to be connected to the controller 3 and, in addition, if necessary, several transmitters 9 are possible per access point. Factory accesses to suppliers are such an example or remote opening of a passageway 1 by a system operator who does not have access to his operator station 10 but is within the reach of the transmitter 1 associated with this passageway 1 among others.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Selective Calling Equipment (AREA)
Claims (17)
- Système de contrôle d'accès qui présente :- un système standard (2-4, 8) de contrôle d'accès par lequel plusieurs points d'accès (1) peuvent être contrôlés, chacun par un mécanisme physique individuel de fermeture (8),
en chaque point d'accès (1), au moins un lecteur (2) ainsi qu'un contrôleur (3) relié à ce dernier pour la commande du mécanisme de fermeture (8),
au moins un serveur (4) de contrôle d'accès qui assure l'administration centrale des données d'accès,- au moins un serveur (5) de téléphonie mobile relié au serveur (4) de contrôle d'accès et qui est au moins indirectement capable de transmettre à des abonnés (7) de téléphonie mobile des données concernant un réseau de téléphonie mobile ou de les recevoir de ceux-ci, ce serveur (5) de téléphonie mobile pouvant faire également partie intégrante du serveur (4) de contrôle d'accès, caractérisé en ce que
le serveur (4) de contrôle d'accès est relié à chacun des contrôleurs (3),
en ce qu'un émetteur (9) à courte portée est prévu en un emplacement spécifié, est configuré comme unité indépendante sans liaison directe avec le système standard (2-4, 8) de contrôle d'accès et émet des informations d'identification spécifiques au point d'accès de telle sorte qu'elles soient reçues par un téléphone mobile (7) situé à proximité de l'émetteur (9) et soient utilisées par ce dernier au moins indirectement pour commander le contrôle d'accès d'un point d'accès (1) spécifiquement associé. - Système de contrôle d'accès selon la revendication 1, caractérisé en ce que l'emplacement spécifié est un emplacement situé dans la zone occupée par le point d'accès (1) associé, de telle sorte que l'information d'identification de l'émetteur (9) ne puisse être reçue par le téléphone mobile (7) qu'à proximité immédiate du point d'accès (1).
- Système de contrôle d'accès selon la revendication 1, caractérisé en ce que l'emplacement spécifique est un emplacement situé en avant du point d'accès (1) associé ou d'une zone de travail spécifique.
- Système de contrôle d'accès selon l'une des revendications précédentes, caractérisé en ce que l'émetteur (9) est un appareil dit Bluetooth dont la portée est de manière particulièrement préférable inférieure à 10 mètres et en ce que le téléphone mobile (7) autorisé dispose d'une interface Bluetooth.
- Système de contrôle d'accès selon l'une des revendications précédentes, caractérisé en que l'émetteur (9) est un poste WLAN et en ce que le téléphone mobile (7) autorisé disposée d'une interface WLAN.
- Système de contrôle d'accès selon l'une des revendications précédentes, caractérisé en ce que l'information d'identification est une adresse unique, spécifique au matériel électronique, de l'émetteur (9) et de façon particulièrement préférable une adresse à 48 bits spécifiques à l'appareil Bluetooth (9) ou une adresse spécifique d'un appareil WLAN ou d'un réseau WLAN.
- Système de contrôle d'accès selon l'une des revendications précédentes, caractérisé en ce que l'émetteur (9) est configuré comme unité indépendante qui de préférence ne dispose pas d'une liaison directe avec le serveur (5) de téléphonie mobile.
- Système de contrôle d'accès selon l'une des revendications précédentes, caractérisé en ce que le système standard (2-4, 8) de contrôle d'accès permet de plus le contrôle d'accès par recours à des moyens n'utilisant pas la téléphonie mobile (7) et en particulier basé sur la technologique RFID.
- Procédé de contrôle d'accès, de façon particulièrement préférable par recours à un système de contrôle d'accès selon l'une des revendications précédentes, et dans lequel- un système standard (2-4, 8) de contrôle d'accès par lequel plusieurs points d'accès (1) peuvent être contrôlés, chacun par un mécanisme physique individuel de fermeture (8), est prévu,
en chaque point d'accès (1), au moins un lecteur (2) ainsi qu'un contrôleur (3) relié à ce dernier pour la commande du mécanisme de fermeture (8) sont prévus,
au moins un serveur (4) de contrôle d'accès est prévu pour assurer l'administration centrale des données d'accès,- au moins un serveur (5) de téléphonie mobile relié au serveur (4) de contrôle d'accès et qui est au moins indirectement capable de transmettre à des abonnés (7) de téléphonie mobile des données concernant un réseau de téléphonie mobile ou de les recevoir de ceux-ci est prévu, ce serveur (5) de téléphonie mobile pouvant faire également partie intégrante du serveur (4) de contrôle d'accès,
caractérisé en ce que
le serveur (4) de contrôle d'accès est relié à chacun des contrôleurs (3),
en ce qu'en un emplacement spécifié, de préférence en au moins un point d'accès (1), il présente un émetteur (9) à courte portée,
en ce qu'un téléphone mobile (7) est autorisé pour accéder à certains points d'accès (1) pendant un laps de temps défini par le serveur (4) de contrôle d'accès ou par le serveur (5) de téléphonie mobile par l'intermédiaire du réseau de téléphonie mobile,
en ce que l'émetteur (9) émet en continu ou par morceaux des informations d'identification spécifiques au point d'accès de telle sorte qu'elles ne puissent être reçues que par un téléphone mobile (7) situé à proximité de réception de l'émetteur,
en ce qu'un téléphone mobile (7) situé à proximité de réception de l'émetteur (9) saisit l'identification de cet émetteur (9) par l'intermédiaire de cette information d'identification et
en ce qu'ensuite, par le téléphone mobile (7), le réseau de téléphonie mobile, le serveur (5) de téléphonie mobile, le serveur (4) de contrôle d'accès ou le contrôleur (3) l'ouverture du point d'accès (1) associé à l'émetteur (9) est permise en recourant directement ou indirectement à cette information d'identification. - Procédé selon la revendication 9, caractérisé en ce que l'émetteur (9) est disposé à proximité du point d'accès (1) de telle sorte que le téléphone mobile (7) ne puisse recevoir son information d'identification qu'à proximité immédiate du point d'accès (1).
- Procédé selon l'une des revendications 9 ou 10, caractérisé en ce qu'après avoir saisi les informations d'identification, le téléphone mobile (7) demande de plus l'introduction d'une authentification, en particulier un corde PIN, un mot de passe ou une information biométrique, en ce que cette information spécifique à l'utilisateur est transmise par l'intermédiaire du réseau de téléphonie mobile au serveur (5) de téléphonie mobile et au serveur (4) de contrôle d'accès en même temps que l'identification du point d'accès (1) à traiter, ce serveur activant ensuite le contrôleur (3) associé.
- Procédé selon l'une des revendications 9 à 11, caractérisé en ce que le téléphone mobile (7) transmet l'information d'identification et éventuellement le code PIN par le réseau GSM sous la forme d'une transmission téléphonique de données ou sous la forme d'un SMS au serveur (4) de contrôle d'accès.
- Procédé selon l'une des revendications 9 à 12, caractérisé en ce que l'émetteur (9) est un appareil (9) Bluetooth ou WLAN qui émet comme information d'identification son adresse unique, cette adresse servant à identifier le point d'accès (1) associé, en ce que le téléphone mobile (7) dispose d'une interface Bluetooth ou WLAN, le téléphone mobile (7) entrant automatiquement en dialogue approprié avec l'utilisateur du téléphone mobile lorsqu'il reçoit des adresses spécifiques transmises dans cadre de l'autorisation et qui correspondent aux points d'accès (1) autorisés, et ce automatiquement, demande éventuellement à l'utilisateur de s'authentifier et en tout cas une demande d'ouverture du point d'accès (1) spécifique est ensuite transmise par le réseau de téléphonie mobile au serveur (5) de téléphonie mobile ou au serveur (4) de contrôle d'accès.
- Procédé selon l'une des revendications 9 à 13, caractérisé en ce que l'émetteur (9) est un appareil (9) Bluetooth ou WLAN qui est disposé dans la zone du passage (1) de telle sorte que la réception de l'information d'identification par un téléphone mobile (7) ne soit possible qu'à une distance inférieure à 1 m et de préférence inférieure à 0,5 m à l'extérieur du passage (1) et en avant de ce dernier.
- Procédé selon l'une des revendications 9 à 14, caractérisé en ce que l'émetteur (9) est un appareil (9) Bluetooth ou WLAN qui est disposé dans une zone spécifique située en avant du point d'accès (1) associé ou dans une zone de travail associée au point d'accès.
- Programme de traitement de données apte à être exécuté sur un téléphone mobile (7) en vue de l'exécution d'un procédé selon l'une des revendications 9 à 15 et conçu pour transmettre de manière automatique à un serveur (4) de contrôle d'accès par l'intermédiaire du réseau GSM des informations d'identification reçues par l'intermédiaire d'une interface Bluetooth ou WLAN, émises de manière automatique en demande permanente par l'interface d'un émetteur (9), éventuellement en même temps que des informations supplémentaires demandées dans la demande, par exemple un code PIN, un mot de passe ou des informations biométriques, et ce de manière automatique.
- Téléphone mobile (7) doté d'un programme de traitement de données selon la revendication 16.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CH122004 | 2004-01-06 | ||
PCT/CH2004/000739 WO2005066908A2 (fr) | 2004-01-06 | 2004-12-16 | Systeme de controle d'acces, et procede pour faire fonctionner ce systeme |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1702306A2 EP1702306A2 (fr) | 2006-09-20 |
EP1702306B1 true EP1702306B1 (fr) | 2010-08-11 |
Family
ID=34744467
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04820940A Active EP1702306B1 (fr) | 2004-01-06 | 2004-12-16 | Systeme de controle d'acces, et procede pour faire fonctionner ce systeme |
Country Status (5)
Country | Link |
---|---|
US (1) | US20070200665A1 (fr) |
EP (1) | EP1702306B1 (fr) |
AT (1) | ATE477561T1 (fr) |
DE (1) | DE502004011533D1 (fr) |
WO (1) | WO2005066908A2 (fr) |
Families Citing this family (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7706778B2 (en) | 2005-04-05 | 2010-04-27 | Assa Abloy Ab | System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone |
AT503461B1 (de) * | 2006-03-29 | 2008-06-15 | Christian Csank | Verfahren zur authentifizierung zumindest eines mobilfunkendgerätes zur betätigung eines aktuators |
NZ571374A (en) * | 2006-04-03 | 2012-03-30 | Resonance Holdings Ltd | Methods for determining proximity between radio frequency devices and controlling switches |
US8074271B2 (en) | 2006-08-09 | 2011-12-06 | Assa Abloy Ab | Method and apparatus for making a decision on a card |
US9985950B2 (en) | 2006-08-09 | 2018-05-29 | Assa Abloy Ab | Method and apparatus for making a decision on a card |
US20080129444A1 (en) * | 2006-12-01 | 2008-06-05 | Shary Nassimi | Wireless Security System |
KR101321288B1 (ko) * | 2007-01-25 | 2013-10-25 | 삼성전자주식회사 | 디스에이블된 단말기의 기능을 다시 인에이블하기 위한 방법 및 이를 위한 디바이스 관리 시스템 |
DE102007024705A1 (de) * | 2007-05-25 | 2008-11-27 | Et Lumen Gmbh Lichttechnik Und Design | Elektronisches System und Verfahren zur Steuerung einer Hotelgastlogistik mit Hilfe multifunktionaler Endgeräte der Hotelgäste |
US7957528B2 (en) * | 2007-08-21 | 2011-06-07 | Sony Corporation | Near field registration of home system audio-video device |
US8706083B2 (en) | 2009-01-07 | 2014-04-22 | Eckey Corporation | Bluetooth authentication system and method |
EP2254086A1 (fr) * | 2009-05-22 | 2010-11-24 | Merlin Inc. | Procédé et système pour reconnaître le client en utilisant son téléphone portable |
EP2522001A1 (fr) * | 2010-01-08 | 2012-11-14 | Telekom Deutschland GmbH | Procédé et système d'autorisation d'accès |
WO2011109460A2 (fr) | 2010-03-02 | 2011-09-09 | Liberty Plug-Ins, Inc. | Procédé et système permettant d'utiliser un téléphone intelligent pour charger un véhicule électrique |
EP2387007A1 (fr) * | 2010-05-14 | 2011-11-16 | Deutsche Telekom AG | Procédé et système de contrôle d'accès |
NL2004825C2 (en) | 2010-06-04 | 2011-12-06 | Ubiqu B V | A method of authorizing a person, an authorizing architecture and a computer program product. |
US20120169461A1 (en) * | 2010-12-31 | 2012-07-05 | Schneider Electric Buildings Ab | Electronic physical access control with remote authentication |
US9781599B2 (en) * | 2011-01-07 | 2017-10-03 | Delphian Systems, LLC | System and method for access control via mobile device |
US8571471B2 (en) * | 2011-04-22 | 2013-10-29 | Adam Kuenzi | Batteryless lock with trusted time |
EP2568421A1 (fr) * | 2011-09-07 | 2013-03-13 | Amadeus | Procédé et système pour accéder à des endroits |
US8947200B2 (en) * | 2011-11-17 | 2015-02-03 | Utc Fire & Security Corporation | Method of distributing stand-alone locks |
AT513016B1 (de) | 2012-06-05 | 2014-09-15 | Phactum Softwareentwicklung Gmbh | Verfahren und Vorrichtung zur Steuerung eines Schließmechanismus mit einem mobilen Endgerät |
CN102791016B (zh) * | 2012-07-04 | 2014-12-10 | 大唐移动通信设备有限公司 | 一种接入处理方法及装置 |
WO2014125028A1 (fr) * | 2013-02-15 | 2014-08-21 | Bernhard Mehl | Ensemble permettant un contact autorisé avec au moins un élément se trouvant dans un immeuble |
US9557719B2 (en) * | 2013-02-26 | 2017-01-31 | Honeywell International Inc. | Access control system using smart phone |
JP5503774B1 (ja) * | 2013-04-23 | 2014-05-28 | 株式会社Nttドコモ | 無線タグ捜索方法およびその装置 |
CN103366433B (zh) * | 2013-07-08 | 2015-10-07 | 上海大学 | 一种实时监测一卡通门禁状态方法 |
EP2833330B1 (fr) | 2013-07-30 | 2018-07-18 | Paxton Access Limited | Procédé et système de communication |
US9763086B2 (en) | 2013-08-27 | 2017-09-12 | Qualcomm Incorporated | Owner access point to control the unlocking of an entry |
CA2926474A1 (fr) * | 2013-10-29 | 2015-05-07 | Cubic Corporation | Perception de droits de transport a l'aide de balises sans fil |
US9367974B1 (en) * | 2014-04-07 | 2016-06-14 | Rockwell Collins, Inc. | Systems and methods for implementing network connectivity awareness, monitoring and notification in distributed access control |
DE102014107242A1 (de) | 2014-05-22 | 2015-11-26 | Huf Hülsbeck & Fürst Gmbh & Co. Kg | System und Verfahren zur Zugriffskontrolle |
CN104103111B (zh) * | 2014-07-19 | 2016-08-17 | 张明 | 基于手机蓝牙通信的自动门禁系统及其实现方法 |
US9558377B2 (en) | 2015-01-07 | 2017-01-31 | WaveLynx Technologies Corporation | Electronic access control systems including pass-through credential communication devices and methods for modifying electronic access control systems to include pass-through credential communication devices |
JP6836034B2 (ja) * | 2015-08-31 | 2021-02-24 | 株式会社日立国際電気 | 入退室管理システム |
DE102015216910A1 (de) * | 2015-09-03 | 2017-03-09 | Siemens Aktiengesellschaft | Verfahren zum Betätigen einer Zugangseinheit mittels eines mobilen elektronischen Endgeräts |
EP3147869A1 (fr) * | 2015-09-25 | 2017-03-29 | Assa Abloy AB | Détermination d'accès dans un scénario d'une pluralité de verrous |
CN110114541B (zh) | 2016-10-19 | 2021-08-13 | 多玛凯拔美国股份有限公司 | 电子机械锁芯 |
US10647544B2 (en) | 2017-06-05 | 2020-05-12 | Otis Elevator Company | Elevator notifications on mobile device associated with user identification device |
EP3679207B1 (fr) | 2017-09-08 | 2022-08-03 | Dormakaba USA Inc. | Partie centrale de verrou électromécanique |
DE102017219533B4 (de) * | 2017-11-03 | 2024-03-14 | Siemens Schweiz Ag | System und Verfahren zur Zutrittskontrolle von Personen |
EP3489914A1 (fr) * | 2017-11-27 | 2019-05-29 | dormakaba Schweiz AG | Procédé de contrôle d'entrée et système de contrôle d'entrée |
CN108257240A (zh) * | 2018-01-16 | 2018-07-06 | 南宁学院 | 一种多功能考勤系统 |
US11466473B2 (en) | 2018-04-13 | 2022-10-11 | Dormakaba Usa Inc | Electro-mechanical lock core |
EP3775445A4 (fr) | 2018-04-13 | 2022-01-05 | Dormakaba USA Inc. | Partie centrale de verrou électromécanique |
CN109300208A (zh) * | 2018-09-03 | 2019-02-01 | 李扬渊 | 开锁方法、开锁装置、锁系统、锁设备和存储介质 |
US10952077B1 (en) * | 2019-09-30 | 2021-03-16 | Schlage Lock Company Llc | Technologies for access control communications |
US12021653B2 (en) * | 2021-07-01 | 2024-06-25 | Schlage Lock Company Llc | Access control embedded into network gear |
ES2937716B2 (es) * | 2021-09-28 | 2023-07-31 | Laliga Content Prot Sl | Procedimiento y sistema de control de acceso |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4113986A (en) * | 1977-10-21 | 1978-09-12 | Bell Telephone Laboratories, Incorporated | Telephone controlled lock release arrangement |
US6072402A (en) * | 1992-01-09 | 2000-06-06 | Slc Technologies, Inc. | Secure entry system with radio communications |
US6038666A (en) * | 1997-12-22 | 2000-03-14 | Trw Inc. | Remote identity verification technique using a personal identification device |
US6759956B2 (en) * | 1998-10-23 | 2004-07-06 | Royal Thoughts, L.L.C. | Bi-directional wireless detection system |
US6720861B1 (en) * | 1999-03-12 | 2004-04-13 | Best Access Systems | Wireless security control system |
AT4105U1 (de) * | 1999-10-15 | 2001-01-25 | Disoft Edv Programme Gmbh | Einrichtung zur datenerfassung |
AU778481B2 (en) * | 1999-11-30 | 2004-12-09 | Bording Data A/S | An electronic key device, a system and a method of managing electronic key information |
FI20002255A (fi) * | 2000-10-13 | 2002-04-14 | Nokia Corp | Menetelmä lukkojen hallintaan ja kontrollointiin |
EP1271418A1 (fr) * | 2001-06-27 | 2003-01-02 | Nokia Corporation | Procédé permettant d'accéder à un dispositif actionnable par l'utilisateur avec contrôle d'accès |
US7202783B2 (en) * | 2001-12-18 | 2007-04-10 | Intel Corporation | Method and system for identifying when a first device is within a physical range of a second device |
ATE268926T1 (de) * | 2002-02-13 | 2004-06-15 | Swisscom Ag | Zutrittskontrollsystem, zutrittskontrollverfahren und dafur geeignete vorrichtungen |
US6885738B2 (en) * | 2003-02-25 | 2005-04-26 | Bellsouth Intellectual Property Corporation | Activation of electronic lock using telecommunications network |
US20070096869A1 (en) * | 2003-06-24 | 2007-05-03 | Stefan Trohler | Work time recording system and method for recording work time |
-
2004
- 2004-12-16 DE DE502004011533T patent/DE502004011533D1/de active Active
- 2004-12-16 EP EP04820940A patent/EP1702306B1/fr active Active
- 2004-12-16 US US10/585,317 patent/US20070200665A1/en not_active Abandoned
- 2004-12-16 AT AT04820940T patent/ATE477561T1/de not_active IP Right Cessation
- 2004-12-16 WO PCT/CH2004/000739 patent/WO2005066908A2/fr active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2005066908A2 (fr) | 2005-07-21 |
ATE477561T1 (de) | 2010-08-15 |
WO2005066908A3 (fr) | 2005-11-24 |
DE502004011533D1 (de) | 2010-09-23 |
EP1702306A2 (fr) | 2006-09-20 |
US20070200665A1 (en) | 2007-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1702306B1 (fr) | Systeme de controle d'acces, et procede pour faire fonctionner ce systeme | |
EP2238576B1 (fr) | Procédé et dispositif de commande du contrôle d'accès | |
EP1955287B1 (fr) | Procede et dispositif central destines a des controles d'acces a des zones ou installations securisees | |
EP3729385B1 (fr) | Système de contrôle d'accès à fonction d'authentification radio et de saisie du mot de passe | |
WO2018091354A1 (fr) | Système de contrôle d'accès avec mise à jour d'état automatique | |
EP3610466B1 (fr) | Procédé d'enregistrement et de contrôle d'accès de visiteurs | |
EP2956913A1 (fr) | Ensemble permettant un contact autorisé avec au moins un élément se trouvant dans un immeuble | |
ZA200707606B (en) | Method for modernizing the control of an elevator car | |
EP2387007A1 (fr) | Procédé et système de contrôle d'accès | |
WO2019121335A1 (fr) | Système de contrôle d'accès avec identification radio et reconnaissance faciale | |
WO2018224426A1 (fr) | Système d'ascenseur avec mode de fonctionnement pour visiteur | |
WO2018050654A1 (fr) | Terminal d'étage hybride pour une installation d'ascenseur | |
EP3465636A1 (fr) | Système de porte | |
EP3422301B1 (fr) | Système de verrouillage de véhicule mains libres au moyen d'un terminal mobile | |
AT504633B1 (de) | Verfahren zur authentifizierung eines mobilfunkendgerätes | |
DE102010019467A1 (de) | Kontaktlos arbeitendes Zugangssystem | |
EP3748590B1 (fr) | Appareil d'authentification pouvant être monté au mur | |
EP1808819A1 (fr) | Gestion automatique du séjour de personnes dans des locaux d'immeubles | |
AT503461B1 (de) | Verfahren zur authentifizierung zumindest eines mobilfunkendgerätes zur betätigung eines aktuators | |
EP3739554A1 (fr) | Procédé de fonctionnement d'un système de contrôle d'accès ainsi que système de contrôle d'accès | |
DE10144936A1 (de) | Verfahren zur Prüfung der Zugangsberechtigung | |
EP1768316B1 (fr) | Déblocage d'une carte mobile | |
EP1752929B2 (fr) | Procédé destiné au contrôle d'entrée d'une zone accessible à des personnes, en particulier pour une pièce fermée par une porte | |
EP3289729B1 (fr) | Commande de fonctions de la domotique | |
EP1762998B1 (fr) | Commande d'éléments actionneurs à l'aide de terminaux mobiles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20060717 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20070808 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
REF | Corresponds to: |
Ref document number: 502004011533 Country of ref document: DE Date of ref document: 20100923 Kind code of ref document: P |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: VDEP Effective date: 20100811 |
|
LTIE | Lt: invalidation of european patent or patent extension |
Effective date: 20100811 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20101211 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20101111 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20101213 Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FD4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20101112 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 Ref country code: IE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
BERE | Be: lapsed |
Owner name: KABA A.G. Effective date: 20101231 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20101122 |
|
26N | No opposition filed |
Effective date: 20110512 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20101231 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20101216 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 502004011533 Country of ref document: DE Effective date: 20110512 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20110831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20101231 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20110103 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20101216 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20101216 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MM01 Ref document number: 477561 Country of ref document: AT Kind code of ref document: T Effective date: 20101216 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20101216 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20110212 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20100811 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20231214 Year of fee payment: 20 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20240101 Year of fee payment: 20 |