EP1897066A1 - Kommunikationsverfahren für ein zugangssteuerungssystem - Google Patents

Kommunikationsverfahren für ein zugangssteuerungssystem

Info

Publication number
EP1897066A1
EP1897066A1 EP06764516A EP06764516A EP1897066A1 EP 1897066 A1 EP1897066 A1 EP 1897066A1 EP 06764516 A EP06764516 A EP 06764516A EP 06764516 A EP06764516 A EP 06764516A EP 1897066 A1 EP1897066 A1 EP 1897066A1
Authority
EP
European Patent Office
Prior art keywords
access control
lock
mobile terminal
control infrastructure
door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP06764516A
Other languages
English (en)
French (fr)
Other versions
EP1897066A4 (de
Inventor
Jouni Koljonen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mohinet Oy
Original Assignee
Mohinet Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mohinet Oy filed Critical Mohinet Oy
Publication of EP1897066A1 publication Critical patent/EP1897066A1/de
Publication of EP1897066A4 publication Critical patent/EP1897066A4/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Definitions

  • the invention relates to access control systems and especially to mobile communication between the lock and the access control system.
  • the objective of the invention is to create a cost effective way to connect a lock in separate premises to a centralized control system with minimum required hardware and to create a way for occasional visitors to get the access licence for a remote lock in cost efficient and easy way.
  • the present access control systems are based on hierarchical structure.
  • the database of the access control data is in one server, and the database is at least partially copied to the lower level servers. If the main database server is down or disconnected from the network, the rest of the system works still autonomously. All the lower level components are working in the same way. This makes the system fail tolerant, only updating of the control data is delayed, if the connection to the control data database is lost.
  • one building has at least one server for managing doors and routing the communications between the door controllers and the rest of the infrastructure. This makes it very costly to connect a separate building with only one controlled door to the infrastructure.
  • a lock needs to be connected in some way to the server in order to get the access right information from the database and report the transactions to the database.
  • the problem is that the needed infrastructure is very expensive for one separate door, as the cost of servers and network infrastructure is needed only for small amount of doors in one building and the need for temporary keys and connection to infrastructure is still needed for security.
  • An example of that kind of access control need is for a telecommunications switch, a cross-connection closet, a base station, or a transformer room or other kind of technical premises that are not maintained by the occupant of the house. In this case, often the visitors should be logged and the access licences should often be only for some hours at a time.
  • the lock is standalone, the present infrastructure model needs communication channel, and local infrastructure for even only one lock. This is extremely expensive, as only one lock shares a communications server and door manager and the wiring in also a considerable cost.
  • the aim of invention is to create an inexpensive infrastructure for a single or only a few doors to connect to the access control infrastructure without needing any costly cabling, computer system or complicated configuration. Further the aim is to create an easy way to grant access licences and to track use of them. Further the licences should be granted without distributing access control tag or badges to users.
  • the invention makes effectively use of the existing access control infrastructure, connecting only a gateway to the controlling servers of the access control infrastructure.
  • the communications between the lock controller and the gateway is enabled by a mobile terminal of the lock user.
  • This makes the infrastructure cost per door very small, the lock is off-line, but the user's mobile terminal is online-key to it, and the infrastructure is able to log events and use up-to-date licensing and key-database with minimal changes to the existing system.
  • the user identification is based on the mobile terminal's phone number (embedded in the phone's SW) and an (optional) password inquiry which makes the identification fairly safe. This makes it possible to give an authorization to a user of defined phone number and password instead of giving authorization to a key badge that must be sent in advance to the user.
  • the licences can be easily granted to a user of other organization, and still having a track of at least the phone number of the user.
  • the invention is based on using an on-line mobile terminal as a key and communication gateway for an off-line lock.
  • the lock is still controlled by the infrastructure for each event, if necessary.
  • Another object is to grant and cancel "keys" or licences to mobile terminal users without a badge.
  • Fig 1 Schematic diagram of a known access control infrastructure
  • Fig 2 Schematic diagram of the arrangement according to the invention
  • Figure 1 shows an example of an infrastructure of existing technology.
  • the system is redundant and hierarchical, geographically distributed.
  • Database server DS also called application server
  • Communication Servers CS are often in same strictly guarded premises with database server DS.
  • Door manager controllers DMC are based for each location, and finally the door managers DM are reading the badges, communicating with the rest of the infrastructure and monitoring the door.
  • the complicated hierarchical system is necessary for decentralizing and for fault-proofing. Also the load balancing is one issue, so that the data base can be updated hierarchically.
  • door manager DM is a small computer with I/0-lines for communication to DMC and for controlling the lock, reading badges or cards, motion detection, or for example to connect to biometric devices.
  • one separate lock in one building needs always 2 computers, namely Door Manager DM and Door manager controller DMC and the wiring and communications channel from the building to the access manager. Therefore, connecting one separate door to the system needs a lot work and expensive hardware.
  • FIG. 2 shows infrastructure needed for a door controlled with method according to the invention.
  • the Front Manager and the Door manager controller is replaced by a Gateway GW, and a mobile terminal MT.
  • the Lock Manager sends its identification to the mobile terminal MT.
  • the software in the mobile terminal MT sends the identification information of the door together with the identification information of the MT itself to GW.
  • the gateway is connected to DS, so it acts like a CS. If gateway is under a CS, it acts like a DMC towards the closed network of the infrastructure.
  • the port of the gateway is connected to public network PNW, for example to internet or to public telecomm network or to public mobile network through which the mobile terminal can communicates with the gateway.
  • public network PNW for example to internet or to public telecomm network or to public mobile network through which the mobile terminal can communicates with the gateway.
  • the door manager used in the method according to the invention may be much simpler than the door manager in the system of figure 1.
  • the door manager in the system according to the invention may have very limited amount of connections.
  • the necessary connections for the DM are power supply, Bluetooth and lock control, maybe also keyboard.
  • the door manager should have enough processing power for encrypting messages and memory for storing the encryption keys and badge key codes and their validity information.
  • the gateway server is working as a link between the mobile net or the internet or other equivalent communications media (PNW) and the network of the access control infrastructure.
  • the later network is usually physically strictly isolated, usually inside locked and guarded room.
  • the gateway is acting towards the servers of the access control infrastructure as a network element of the infrastructure. Therefore, there is no need for change of configure the infrastructure, the system according the invention is bolt-on solution, that is transparent to the rest of the infrastructure.
  • the lock is controlled by a door manager DM next to the lock.
  • the controller includes a short range communication means (BT), for example a display, Bluetooth, IrDA or WLAN.
  • BT short range communication means
  • BT Bluetooth is the preferred option, but also WLAN or even manual entry with keyboard and a display is a possible option, even it is more expensive to install, and inconvenient and slow for the user.
  • the short-range communication means (BT) are used to send the identifying information of the lock to a mobile terminal of the user of the lock. In the mobile terminal there is a midlet that recognizes the identifying information, and possibly the midlet asks confirmation or password from the user. After that, the terminal sends the identifying information of the user, itself and the lock to the gateway.
  • the lock uses first a beacon-signal, after a MT makes a communication link with the DM; the DM sends a single use random code to MT.
  • the MT sends this random code, its own identification information and maybe a pass code of the user to GW.
  • GW verifies the message, sends an encrypted, unique reply to the MT, and MT can use the content of the reply once or several times to open the door by sending the content of message from GW to the DM.
  • the gateway sends the information in a form of a key and the lock information and asks authentication from the infrastructure to open the lock. In the same time the GW send the auditing information of the users acts. In case of later described automatic mode, where the key code is valid for opening the lock several times, the GW does not necessarily get the auditing information immediately or maybe never gets detailed information about all the incidents. If the key code is valid for single use only, the infrastructure is always aware of all the incidents.
  • All the communications are preferably encrypted with public key encryption, preferably the messages include a single use random number to ensure that recording or copying the message is not useful for fraud.
  • the communications in the public network must be encrypted.
  • the public key encryption is easier, as the mobile terminal needs not to exchange secret key.
  • random encryption keys for each communication session there is no way for outsider to track the users by capturing the radio- communications, as only the door beacon is always the same and the first connection of the MT is already encrypted with the public single use key of the DM.
  • the DM and GW may know each others public keys, so they do not need to change the public key every time, but the message needs to have an order number or time stamp, so that the code is unique.
  • the gateway is critical point, as it connects the closed network to the public network.
  • the gateway may be therefore a combination of several computers, for example a firewall and a gateway. This makes cracking into the closed network more difficult, as both computers in serial must be cracked.
  • the system can work in two different modes, manual mode works every time on-line.
  • manual mode the mobile terminal asks every time the authorization information from the central lock infrastructure. The authorization is therefore for single use.
  • automatic mode the mobile terminal may ask the authorization automatically in a background process and the authorization is valid for a time period.
  • the mobile terminal asks an authorization that is valid for a certain time interval and maybe also for a set of doors.
  • the phone may ask a new authorization after the old authorization is expired. This may be done automatically in a background process or when first time trying to open the door after the expiration or when entering to the coverage area of the DM transmitter.
  • the authorization for multiple uses is easier to abuse, but the opening the door does not need to open the GPRS-connection to the gateway, so the opening of the lock is practically instantaneous.
  • the automatic mode is preferably using public key encryption, so that the lock uses every time a different code, and the mobile terminal uses its authorization code for creating the reply message. The opening message is never the same twice, so capturing the message would not make possible to copy the authorization.
  • the automatic mode authorization code is not normally easy to cancel, so the automatic "key code" should be for moderately short period.
  • the lock controller may have a list of cancelled codes, but it can be updated only if there is a communication channel to the infrastructure.
  • automatic mode is used for less critical areas, where a lost phone and key code is not critical.
  • the software in the mobile phone may also be able to cancel the code by remote control from the network. If the code of the MT software is for example Java, this is moderately easy to tamper by end user and the cancelling may be inactivated.
  • the key codes are valid only for some hours, so the probability of misuse of a lost phone is relatively small in any case.
  • the infrastructure may command the lock (DM) to manual mode, that case the next mobile terminal requesting a key does not receive automatic mode key-code but a command to enter manual mode, this code may be encrypted and transparent for the MT, so it is not possible to tamper.
  • the message from GW may also contain more information, a list of banned key- codes, and the lock manager may send access information to the infrastructure with the authorization request.
  • the off-line lock is practically on-line each time there is a transaction with first to MT and maybe later (automatic mode) to GW, as the communications is preferably encrypted with keys of DM and GW, the MT is not able to detect or alter the contents of the messages. So there no easy way to false any codes, as the MT can be also recognized by the mobile network, as the MT has unique number and also it is possible to detect the IMEI and the MT software serial number together with the software password, if necessary.
  • the mobile terminal is listening in a background process the beacon signals and the mobile terminal automatically makes a contact to the door managers (DM) the mobile terminal assumes the user may want to open or the user may have access rights.
  • the phone may also ask automatically a short term ticket for each door, or open a connectionless channel to GW in advance.
  • the infrastructure also receives more often information from the door managers and the infrastructure gats also information about the movement of the users, even they do not open any door. This enables higher security, and the door managers may receive cancelling message of user rights faster, as any user nearby can relay the information between the DM and GW. Also the stolen MT or user with cancelled user rights may cause alarm even by entering to the coverage of any DM.
  • This background process is cost effective, as the GPRS data needed is very limited and the Bluetooth is mainly only receiving.
  • the battery consumption of the mobile terminal is not raised too much and a few kilobytes of data sent automatically are not too costly to send over GPRS or UMTS even in daily bases.
  • the time for opening in full manual mode is around 10 to 20 seconds more than in the automatic mode with background negotiating in advance.
  • the opening tickets expiry times may vary from some minutes to days.
  • the operation of door is virtually immediate, the user selects the door from the door list and the door opens immediately.
  • the beacon signals of the doors enable the mobile terminals to connect to all the DMs that are in the range of the Bluetooth, and therefore the Bluetooth connection to the DM is ready all the time, and if the opening "key code" or ticket is asked in advance from the GW, the phone can open the door immediately.
  • the phone next time takes contact to the GW, and the door the incident information is sent to the GW.
  • the DM and GW can track the communications and if there is fraud detected the user may be banned and the system makes an alarm.
  • the fraud may be for example, that the terminal is refusing to pass the messages after opening the door. That case the alarm may be set, and also the next user's terminal is passing the necessary information in any case.
  • There is no easy way to prevent the incident information transmission as the encrypted message content is not readable by the mobile terminal, and the user cannot control the message content.
  • the method is as fast for the user as a pass code ticket stored in the mobile terminal used in the prior art.
  • the pure gateway solution for data transmission via mobile phone offers high security for the user identification, and the user rights may be checked for each incident. But if the authentication is not prepared in advance, the opening of the lock takes typically over ten seconds, which is annoyingly slow.
  • the automatic negotiation and frequent connection between the lock and the lock solves both security problem and smooth operation for the user.
  • the mobile phone (MT) of the user is replacing the need for own communication channel for the lock and the infrastructure can be sure, that the mobile phone is in the proximity of the lock before opening the lock.
  • the lock manager computer with Bluetooth is much cheaper to manufacture and to maintain than if the lock would have own GPRS-, WLAN- or Ethernet- connection for connecting to the gateway.
  • This case still the identity of the mobile phone must be verified through the telecomm or GPRS-network and the short distance communications is needed anyway for the proximity check, i.e. the user is close to the door, he wants to open. So, if the phone is to be used to open the lock, it is advantageous to use the user's phone for all the communications between the lock manager and the gateway.
  • the amount of the data to be transferred is relatively small, much less than a kilobyte for authorization. In automatic mode the authorization is made relatively seldom. It is possible to use the text-messages (SMS) to transfer the authorization codes, but typically the GPRS is cheaper to use for a short two-way connection.
  • SMS text-messages
  • the connection type is not relevant; the connection may as well be WLAN with user authentication, if available for the MT.
  • the GW is connected to public internet, to mobile cellular network with SMS or with GPRS or equivalent, or to several communication channels or it may use external gateways for reception of SMS from public internet.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
EP06764516A 2005-06-23 2006-06-22 Kommunikationsverfahren für ein zugangssteuerungssystem Withdrawn EP1897066A4 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI20055344A FI20055344A0 (fi) 2005-06-23 2005-06-23 Kulunvalvontajärjestelmän tiedonsiirtomenetelmä
PCT/FI2006/050277 WO2006136662A1 (en) 2005-06-23 2006-06-22 Communication method of access control system

Publications (2)

Publication Number Publication Date
EP1897066A1 true EP1897066A1 (de) 2008-03-12
EP1897066A4 EP1897066A4 (de) 2010-09-15

Family

ID=34778480

Family Applications (1)

Application Number Title Priority Date Filing Date
EP06764516A Withdrawn EP1897066A4 (de) 2005-06-23 2006-06-22 Kommunikationsverfahren für ein zugangssteuerungssystem

Country Status (3)

Country Link
EP (1) EP1897066A4 (de)
FI (1) FI20055344A0 (de)
WO (1) WO2006136662A1 (de)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916464A (zh) * 2010-08-25 2010-12-15 华南理工大学 基于Zigbee技术的门禁管理方法及装置
CN105488881A (zh) * 2015-12-01 2016-04-13 南京邮电大学 一种基于蓝牙信息识别的车辆出入管理系统和方法
CN106453251A (zh) * 2016-09-05 2017-02-22 伟创达电子科技(深圳)有限公司 基于互联网的云对讲监控系统

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202007007611U1 (de) * 2007-04-17 2008-09-04 Bruch, Claus-Dieter Vorrichtung zur Anwesenheitserfassung und/oder Zugangskontrolle
FI20070416L (fi) * 2007-05-25 2008-11-26 Kone Corp Hallinnointijärjestelmä
PT2043055T (pt) 2007-09-28 2020-09-29 Iloq Oy Sistema de administração de fechaduras
DE102008033731A1 (de) 2008-07-18 2010-01-21 Cargoguard Gmbh Schloss zur Sicherung eines Sicherungsbehälters oder Sicherheitsraumes und Verfahren zur Sicherung des Transports eines Sicherungsbehälters
GB0821482D0 (en) 2008-11-25 2008-12-31 Rockwell Automation Ltd Access control
EP2282297A1 (de) * 2009-07-21 2011-02-09 Openways Sas Gesichertes Steuerungssystem zur Öffnung von Schließvorrichtungen durch chiffrierte akustische Akkreditierungen
DE102010019467A1 (de) 2010-05-05 2011-11-10 Giesecke & Devrient Gmbh Kontaktlos arbeitendes Zugangssystem
WO2011159921A1 (en) 2010-06-16 2011-12-22 Delphian Systems, LLC Wireless device enabled locking system
US11354958B2 (en) 2010-06-16 2022-06-07 Delphian Systems, LLC Wireless device enabled locking system having different modalities
EP2661860A1 (de) * 2011-01-07 2013-11-13 Delphian Systems, LLC System und verfahren für zugriffssteuerung über eine mobile vorrichtung
EP2500872A1 (de) * 2011-03-08 2012-09-19 Openways Sas Gesichertes Steuerungsverfahren zur Öffnung von Schließvorrichtungen mit Hilfe eines kommunizierenden Objekts vom Typ Handy
GB2489509A (en) * 2011-03-31 2012-10-03 Lifealike Ltd Wireless device for door entry
FR2974590A1 (fr) * 2011-04-28 2012-11-02 Sar Technologies Internat Procede de deverrouillage d'un acces a une zone de rangement, dispositif de stockage et de fermeture.
WO2012151290A1 (en) 2011-05-02 2012-11-08 Apigy Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
US20130335193A1 (en) * 2011-11-29 2013-12-19 1556053 Alberta Ltd. Electronic wireless lock
CN102592338A (zh) * 2012-02-06 2012-07-18 深圳市广宁实业有限公司 移动终端控制门禁系统的方法及门禁系统
FR2996947B1 (fr) * 2012-10-11 2015-09-04 Openways Sas Procede securise de commande d'ouverture de dispositifs de serrure a partir de messages mettant en oeuvre un cryptage symetrique
US10529156B2 (en) 2013-05-20 2020-01-07 Delphian Systems, LLC Access control via selective direct and indirect wireless communications
EP2816532B1 (de) * 2013-06-20 2019-03-20 Honeywell International Inc. Systeme und Verfahren zur Ermöglichung einer Zugangskontrolle mit Hilfe von mobilen Geräte
US9516006B2 (en) 2013-10-23 2016-12-06 Google Inc. Re-programmable secure cryptographic device
US20170206722A1 (en) * 2014-07-09 2017-07-20 Deja View Concepts, Inc. Bluetooth Low Energy for Access Control
WO2016087478A1 (en) 2014-12-02 2016-06-09 Inventio Ag Method for providing a visitor controlled access into a building
CN104680630A (zh) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 一种控制门锁的方法和系统
US20190051073A1 (en) * 2016-02-11 2019-02-14 Carrier Corporation Soft badge-in system
WO2018091354A1 (de) 2016-11-15 2018-05-24 Inventio Ag Zugangskontrollsystem mit automatischer statusaktualisierung
CN110800028A (zh) 2017-05-03 2020-02-14 开利公司 使用移动装置的按需访问控制授权
CN107276639B (zh) * 2017-06-12 2021-06-25 上海金念信息技术有限公司 一种用于ios移动端的蓝牙近场数据通讯电路板及其通讯方法
US11055942B2 (en) 2017-08-01 2021-07-06 The Chamberlain Group, Inc. System and method for facilitating access to a secured area
CA3071616A1 (en) 2017-08-01 2019-02-07 The Chamberlain Group, Inc. System for facilitating access to a secured area
US10446012B2 (en) 2017-12-23 2019-10-15 Carrier Corporation Method and apparatus for detecting when a mobile device is left in a room
US11507711B2 (en) 2018-05-18 2022-11-22 Dollypup Productions, Llc. Customizable virtual 3-dimensional kitchen components
US10878650B1 (en) 2019-06-12 2020-12-29 Honeywell International Inc. Access control system using mobile device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002100040A1 (en) * 2001-06-07 2002-12-12 Elisa Communications Oyj Method and system for controlling a remote unit with the aid of a terminal under the supervision of a central unit

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001023694A1 (en) * 1999-09-27 2001-04-05 Tactel Ab Automatic locking system
GB2366132B (en) * 2000-03-24 2004-11-24 Abb Metering Ltd Transmission of information in a utility commodity system
GB2364202A (en) * 2000-06-27 2002-01-16 Nokia Mobile Phones Ltd Mobile phone for opening locks

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002100040A1 (en) * 2001-06-07 2002-12-12 Elisa Communications Oyj Method and system for controlling a remote unit with the aid of a terminal under the supervision of a central unit

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2006136662A1 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916464A (zh) * 2010-08-25 2010-12-15 华南理工大学 基于Zigbee技术的门禁管理方法及装置
CN105488881A (zh) * 2015-12-01 2016-04-13 南京邮电大学 一种基于蓝牙信息识别的车辆出入管理系统和方法
CN106453251A (zh) * 2016-09-05 2017-02-22 伟创达电子科技(深圳)有限公司 基于互联网的云对讲监控系统

Also Published As

Publication number Publication date
WO2006136662A1 (en) 2006-12-28
EP1897066A4 (de) 2010-09-15
FI20055344A0 (fi) 2005-06-23

Similar Documents

Publication Publication Date Title
EP1897066A1 (de) Kommunikationsverfahren für ein zugangssteuerungssystem
CA2632298C (en) Integrated access control system and a method of controlling the same
US7012503B2 (en) Electronic key device a system and a method of managing electronic key information
CN104732636B (zh) 基于蓝牙手机的智能小区门禁控制系统及其控制方法
CN103248484B (zh) 门禁控制系统及方法
US7616091B2 (en) Actuating a security system using a wireless device
US6975202B1 (en) Electronic key system, apparatus and method
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN100588814C (zh) 用于授权的方法
CN101052970B (zh) 访问控制系统
CA2324679A1 (en) Method and system for physical access control using wireless connection to a network
US9437061B2 (en) Arrangement for the authorised access of at least one structural element located in a building
GB2417858A (en) Access control device using mobile phones for automatic wireless access with secure codes and biometrics data
RU2310233C2 (ru) Способ и устройство для управления доступом
US20200357214A1 (en) Managing and controlling access to secured areas
KR100422377B1 (ko) 액정 바코드를 이용한 보안 및 출입통제 시스템 및 그 방법
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CA2360120C (en) Door access control and key management system and the method thereof
CN113936364B (zh) 一种联网型酒店电子门锁退房方法及装置
JP2007279906A (ja) ネットワークアクセス管理システム
KR20230097632A (ko) 블록체인을 활용한 LwM2M 기반의 AMI 장치 인증 방법 및 장치
DK201200065U3 (da) Styring af adgang til et sted
JP2004250888A (ja) 出入管理システム
TW200524389A (en) Door entrance security system and vehicle control by mobile phone

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20080123

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20100818

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20110317