EP2958085A1 - Procédé de fonctionnement d'un système d'accès électronique - Google Patents

Procédé de fonctionnement d'un système d'accès électronique Download PDF

Info

Publication number
EP2958085A1
EP2958085A1 EP14173036.6A EP14173036A EP2958085A1 EP 2958085 A1 EP2958085 A1 EP 2958085A1 EP 14173036 A EP14173036 A EP 14173036A EP 2958085 A1 EP2958085 A1 EP 2958085A1
Authority
EP
European Patent Office
Prior art keywords
electronic
record
lock
key
subkey
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP14173036.6A
Other languages
German (de)
English (en)
Inventor
Harald Lüling
Hossein Bagheri
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Burg Waechter KG
Original Assignee
Burg Waechter KG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Burg Waechter KG filed Critical Burg Waechter KG
Priority to EP14173036.6A priority Critical patent/EP2958085A1/fr
Publication of EP2958085A1 publication Critical patent/EP2958085A1/fr
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
    • G07C2009/00492Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a rolling code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses

Definitions

  • the invention relates to a method for operating an electronic access system, with an electronic key and an electronic lock, which can communicate with each other for the purpose of actuating the lock data, wherein in the electronic key, a first data set is provided with in particular a base key.
  • an electronic key for example in the form of a radio key, is used to communicate with an electronic lock.
  • the electronic key has a communication interface comprising transmitting and receiving means and an antenna, whereby a wireless data communications link can be formed with an electronic lock.
  • the electronic key also has a computer unit which manages a (basic) key in the form of a key secret and makes it available on request. In order to make it difficult to read the key secret unauthorized, it is provided there that an authorized request signal (of the electronic lock) must be present. If the electronic key is used as intended, so that can electronic lock can be opened or closed.
  • the generic methods are therefore distinguished by the fact that an electronic key has a digital key in the form of a data record which is used for the authorization of the electronic key as intended for the respective electronic lock.
  • the known electronic keys have the form of a transponder or a smartcard, for example.
  • the known electronic keys are individually tailored to the respective electronic lock and can usually be obtained only from the manufacturer of the electronic lock. So if several electronic keys are needed in a known method, they must be obtained from the manufacturer. Sales of additional electronic keys represent a not inconsiderable component in the calculation of a manufacturer of electronic access systems.
  • Electronic keys are therefore already offered in the form of applications (apps) for mobile devices, such as smartphones. This provides the user with the advantage that he does not have to carry any additional hardware elements with him and can operate the operation of an access system using his already carried along mobile device.
  • the manufacturer and / or operator of an electronic access system however, this has the disadvantage that the corresponding applications can be passed on the mobile devices uncontrolled. Possibly. the manufacturer or operator of an electronic access system can only sell a single key in the form of a basic key record (for example a smartphone app), which key is then duplicated by the users of the system.
  • a basic key record for example a smartphone app
  • a second record is provided, in particular with a subkey, the records, in particular the base key and the subkey are at least partially combined to form a common record, the lock then using at least the second Record is actuated, wherein the second record is locked after a predetermined number of operations of the lock and / or expiration of a predetermined period of use for a further particular next operation of the castle
  • the essence of the method according to the invention consists in that an individual key in the form of the second data set is required for each actuation of the electronic lock.
  • a second data set can be used according to the invention only for a predetermined number of operations of the electronic lock, in particular only a single operation of the lock. Additionally or alternatively, the second data set may have a time-limited validity. Thereafter, the record becomes invalid. This prevents re-actuation of the lock with this record. It must first be provided a new second record.
  • the lock can also be operated using the common record.
  • the first data record in particular the basic key, is part of the key required to operate the lock.
  • the first record may contain information that authorizes the electronic key as basically to participate in the electronic access system.
  • the first data record in particular the base key, may be, for example, a smartphone app.
  • This app serves the purpose of data-technically coupling the electronic key, for example in the form of a mobile terminal, with the electronic access system, in particular the electronic lock.
  • the first data record can also be a serial number, a MAC address and / or the like. In other words, it is a kind of identifier in which the electronic key than to participate within the Access system entitled identifies.
  • the at least partial combination of the first data set with the second data set serves to use the second data set for actuating the lock as intended in the system. If, for example, a smartphone with an app is used as the first data record, the second data record is downloaded, registered and / or the like within the app. For example, one speaks of a so-called in-app purchase. The subsequent operation of the lock can then be done exclusively using the second record or using the common record.
  • the second record has a finite validity.
  • the first record can be permanently valid.
  • the first data record can be freely output to the users of a method according to the invention.
  • the first record can also be freely shared among users and shared.
  • the validity of the second data set can be formed temporally and / or quantitatively. With a temporal validity can be provided that the record, for example, 24 hours, several days and / or the like is valid. With regard to the quantitative validity, it may be provided that the data record is valid only for a predetermined number of operations of the electronic lock, for example 5, 10 or more actuations.
  • the electronic key may be a mobile terminal carried by a user.
  • This can be a mobile phone, a smartphone, a tablet computer, a notebook and / or the like. These terminals are characterized by the fact that they have their own power supply. It can also be a transponder, a smart card and / or the like. Act. It is crucial that the electronic key on the one hand and the electronic lock on the other hand each have data communication interfaces, by means of which a data communication link between the two can be formed. It is also crucial that the electronic key can be provided with different data sets. That way, the electronic key be equipped with the consumable according to the invention by use of second data sets, in particular sub-keys.
  • a Bluetooth, NFC and / or RFID interface can be used.
  • Bluetooth 4.0 can be used.
  • This standard provides a so-called low energy profile. This allows the mobile terminal on the one hand and the electronic lock on the other hand operate particularly energy-efficient.
  • a specialized Bluetooth profile can be used especially for locks.
  • white lists and / or black lists can be used, in which admitted or just unauthorized mobile terminals are registered. For example, a mobile terminal used for the first time in the system can be included in a white list when first used, so that it can be immediately recognized during subsequent operations.
  • the base key and / or subkey are provided in the form of records. This means that this is stored in a memory of the electronic key digital information. These are locking secrets, which serve to authorize the electronic key as authorized to operate the electronic lock.
  • the first and / or second data set may be provided encoded. Decoding can be done by the electronic lock, in particular a computer unit in the electronic lock.
  • the second data record, in particular subkey can be transmitted by e-mail to the electronic key, in particular a mobile terminal.
  • the base key and subkey can be combined into a common record. This can be done in the electronic key itself.
  • the electronic key preferably has a microprocessor, a memory, communication interfaces and / or the like. Possibly. can be detected in the electronic key, whether the subkey is authorized by the operator or manufacturer of the electronic access system or not. This prevents misuse.
  • base key and subkey are also generally a first and a second record meant.
  • the operator and / or the users of the electronic access system may request new subkeys.
  • the subkeys can be requested in certain quotas or individually. After requesting a subkey, the subkey is transferred to the electronic key. Alternatively, the subkey can also be generated in the electronic key itself. It is crucial that the subkeys are generated, for example, according to a given by the manufacturer and / or operator coding, which is kept secret from the users. For use within the procedure, only sub-keys coded by the manufacturer and / or operator are permitted, other sub-keys are denied by the electronic key and / or electronic lock.
  • the invention has the advantage that the users can already use their electronic keys in a manner already known, for example in the form of mobile terminals such as smartphones.
  • the operator and / or manufacturer of an access system with the method according to the invention has the possibility of profiting economically from the ongoing operation of the electronic access system. This is accomplished by not having a once issued, constant base key record sufficient to operate the electronic lock, but rather requiring a common record consisting of the constant base key and a subkey to be purchased by the users.
  • This also creates the opportunity to provide an electronic access system particularly cost-effective or even free of charge. Only the ongoing operation of the electronic access system must be paid for by the regular purchase of subkeys. This technical solution may be advantageous both for the economic calculation of the users of the electronic access system as well for the operator and the manufacturer
  • the base key is combined with a multiplicity of subkeys for respective common data records.
  • the base key is a constant record.
  • This can be assigned to the respective electronic lock to be actuated individually.
  • the basic key can also be designed to operate any electronic key. The assignment to a specific electronic lock then takes place only by the subkey.
  • a first actuation of the electronic lock can lead to a not yet used common data record being used in a subsequent second actuation of the electronic lock. This can be done automatically. It can be provided that an already used subkey is automatically deleted in the electronic key, and / or in the electronic lock.
  • multiple users use the same base key. Users can share the base key with each other at will. Thus, the users themselves can ensure that additional users are allowed to participate in the method according to the invention. This is economically possible for the operator or manufacturer of the electronic access system because it does not cover its costs by selling basic keys, but rather by distributing the subkeys.
  • the same subkeys may be provided on the electronic keys of multiple users. It is crucial, however, that in case of operation of the lock using a particular subkey by a user of this subkey is locked for the operation of the lock by other users.
  • this development has the advantage that a fixed quota of, for example, 100 subkeys can be distributed at will to the users of the method. Depending on the current situation of use, one and the same user can use up all 100 subkeys, but it is also possible for multiple users to use up the 100 subkeys in equal parts. With this training is no prior planning and allocation of subkeys required. In particular, the operation of the lock using one of the subkeys by one of the users results in preventing a re-actuation of the lock with this subkey used for all users.
  • the electronic key communicates with a background system in terms of data.
  • the background system may be part of the electronic access system and / or part of a device of the operator and / or manufacturer of the access system.
  • the background system is, in particular, a computer unit with a microprocessor, memory, data communication interface and / or the like.
  • the electronic key has a data communication interface, by means of which it can communicate with the background system via a data communications link. If several electronic keys are provided, these can be networked with each other via the background system.
  • the background system may be local to or remote from the electronic access system.
  • Communication with the background system may be via a local area network, such as LAN, Bluetooth, WLAN, and / or the like, or via a global network, such as a cellular network.
  • the background system is used, for example, to manage the subkeys, to transfer subkeys to the electronic key (s), to transmit subkeys to the electronic lock, to synchronize already used and not yet used subkeys between multiple electronic keys and / or electronic locks and / or like.
  • the first record with the base key can be transmitted from the background system to the electronic key.
  • the second record with the subkey can be transferred from the background system to the electronic key.
  • the second record with the subkey can also be generated in the electronic key itself. In that case, however, it is provided that the electronic key informs the generated subkey of the background system and / or the electronic lock so that it can be correspondingly authorized and, in addition, billing is made possible for the operator or manufacturer of the electronic access system.
  • the inventive method can be used not only in ordinary door locks, for example, within a company building, but also in other applications.
  • An application is conceivable, for example, in hotels.
  • the user can use his electronic key to open the electronic lock of a hotel room provided that he has a valid subkey, i. valid shared record.
  • This is an advantage for those users who regularly visit a specific or specific hotels.
  • These users, and especially companies can in advance acquire whole quotas of overnight stays at the hotel, and also benefit from discounts and / or the like.
  • a pre-purchased night is used by a user with a valid subkey to open the hotel room.
  • a reservation request for example, using the electronic key, must be made in advance and / or the like.
  • a further advantage of the method according to the invention is that the costs for the acquisition of subkeys, in particular entire quotas of subkeys, can be billed automatically and / or centrally.
  • the acquisition and / or use of a subkey may trigger an automated billing process whereby an invoice may be sent directly to the previously designated billing recipient. This facilitates, for example, access to a hotel room and in particular the billing for company-traveling company employees and / or the like.
  • the invention further relates to the use of a method described above for picking up in particular large-volume consignments such as parcels by a logistics service provider from one of the goods consigning person assigned receiving device, wherein the logistics service provider a second record is transmitted with a subkey, wherein a subsequent operation of the receiving device to causes a re-actuation with the used subkey is prevented.
  • the receiving device may be a mailbox, a parcel box and the like.
  • the receiving device is used to accommodate in particular large-volume shipments such as parcels, parcels and / or the like.
  • the receiving device is a assigned to a consignment of goods. This means that the receiving device is arranged in the (exclusive) sphere of influence of the person. This includes, for example, the arrangement of the receiving device on the property of the person.
  • a special feature of such a recording device is therefore that it is a recording device associated with a specific person. In other words, the receiving device is permanently assigned to one or a finite number of consignee-receiving persons.
  • the logistics service provider can be a delivery person who usually delivers the goods and does not pick them up. However, it may also be a service provider, which specifically operates only the collection of consignments placed in reception facilities for shipping consignments.
  • the receiving device can usually be provided to receive consignments. According to the invention, however, it can be used in addition to abandon consignments, i. to send. As a result, the person issuing a consignment can save the way to the post office or to a central collection point for consignments of goods such as parcels and / or the like. Rather, the consignment can be inserted in a simple manner in, for example, the household of the person directly associated receiving device. A feature of the receiving device is namely that this is in the immediate vicinity of the apartment, the operation and / or the like. The person issuing the consignment.
  • a pick-up device can perform a dual function, i. both for receiving and for sending consignments.
  • the logistics service provider receives a key for the receiving device, he can access the receiving device at any time, ie even if this is not desired by the person operating the receiving device.
  • the invention provides a remedy.
  • the logistics service provider is indeed provided a first record with a base key for access to the receiving device.
  • this alone is not enough to the To operate recording device, ie to open and / or close, in particular to open an electronic lock of the receiving device and / or close.
  • a second record with a subkey is required, which can be combined with the base key to form a common record.
  • the lock of the receiving device can only then be actuated using the common data set, ie in particular be opened.
  • the logistics service provider can only selectively open the receiving device once when the person issuing the consignment wishes to do so.
  • the logistics service provider is automatically delivered a second record with a subkey after inserting a consignment to be shipped in the receiving device.
  • the logistics service provider can be notified automatically about the shipping request by inserting a consignment to the receiving device. For this purpose, for example, an email, SMS and / or the like. Be sent.
  • the use according to the invention brings with it the surprising effect that a receiving device provided only for receiving consignments of goods can now also be used to send consignments of goods.
  • the functionality of a recording device can thus be extended by the use according to the invention, so that two diametrically opposite functions (receiving of broadcasts and sending of broadcasts) can be realized with one and the same device.
  • a second data record with a subkey for actuating the receiving device can be transmitted from a central administration of the logistics service provider to a plurality of parcel collectors or deliverers.
  • different parcel collectors or deliverers can alternatively access the receiving device.
  • the contract for the logistics service is awarded to the service provider who can first carry out a collection of the consignment. This can be used to stimulate a competition that becomes one for the consumer as quickly as possible to pick up his consignment can lead.
  • the subkey once used for a renewed operation of the lock is locked, the other logistics service providers can not access the receiving device, if it has already been opened by a first logistics provider and the abandoned consignment has been removed. As a result, the security is further increased.
  • the Fig. 1 schematically represents an embodiment of a method according to the invention.
  • There are three electronic keys 1, 2, 3 are provided. However, it could just as well be more or less electronic keys.
  • the electronic keys 1, 2, 3 are each assigned to a user, not shown.
  • the electronic keys 1, 2, 3 may be mobile terminals, for example smartphones.
  • the electronic keys 1, 2, 3 serve to actuate an electronic lock 5 of a door 4. Actuation means in particular the opening or closing of the electronic lock.
  • the electronic lock 5 serves the particular mechanical locking of the door 4.
  • an electric motor is provided, which in turn receives electrical signals from a control unit.
  • the control unit in turn has a data communication interface 9, which can communicate with the electronic keys 1, 2, 3.
  • the electronic keys 1, 2, 3 each have data communication interfaces 6, 7, 8.
  • a data communication link 13, 14, 15 form between an electronic key and the electronic lock.
  • This communication connection 13, 14, 15 may be bidirectional.
  • the electronic keys 1, 2, 3 can not be readily used to operate the electronic lock 5. Rather, it is necessary that they use a common data record 12 as the operation of the electronic lock 5 authorized to authorize.
  • the common record comprises a base key 10 and a subkey 11.
  • the base key 10 and the subkey 11 each form a separate record.
  • the base key 10 is a general data record which fundamentally enables communication with the electronic lock 5.
  • the base key 10 may be a type of transponder or even an application on a smartphone.
  • the basic key 10 may be the same for different electronic locks 5. This simplifies the equipping of the electronic keys 1, 2, 3 with the basic key 10.
  • the subkey 11 allows a finite number of operations of the electronic lock 5.
  • the electronic lock 5 per subkey 11 can be actuated only once.
  • the subkey 11 is consumed. For example, it is automatically deleted from the electronic key 1, 2, 3 and / or locked in the electronic lock 5 for further use.
  • all three electronic keys 1, 2, 3 have the same subkey 11. However, if one of the electronic keys 1, 2, 3 is used to operate the electronic lock 5, the subkey 11 - as described above - consumed. It can then be provided that the subkey 11 is automatically deleted in the remaining electronic keys 1, 2, 3. This can be done as follows.
  • the electronic keys 1, 2, 3 preferably have a further data communication interface 18, 19, 20. This may be a communication interface for a mobile network, WLAN and / or the like. This is presently shown as a data network 17 in general. Via the data network 17, a communication with a background system 16 can take place. The background system 16 has a corresponding data communication interface. Thus, between each electronic key 1, 2, 3 and the background system 16, a data communications link 21, 22, 23 are formed.
  • the background system 16 ensures, by a corresponding communication with the remaining electronic keys, that the subkey 11 currently being used in these electronic keys is deleted or locked for further use.
  • the electronic keys 1, 2, 3 may comprise a microprocessor, a memory, communication interfaces and / or the like. They may be configured to store a plurality of subkeys 11.
  • the subkeys 11 are either transmitted from the background system 16 to the electronic key 1, 2, 3 or generated by the electronic keys 1, 2, 3 itself. It is crucial that according to each conceivable variant for the provision of subkeys 11 in the electronic keys 1, 2, 3, the provision or the subsequent use can be billed. If the subkeys 11 are provided by the background system 16, billing can be initiated directly by the background system 16 itself. If the subkeys 11 are generated by the electronic keys 1, 2, 3 themselves, the electronic keys can report this to the background system 16 by means of the data network 17. Subsequently, a central billing can take place there.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
EP14173036.6A 2014-06-17 2014-06-18 Procédé de fonctionnement d'un système d'accès électronique Withdrawn EP2958085A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP14173036.6A EP2958085A1 (fr) 2014-06-17 2014-06-18 Procédé de fonctionnement d'un système d'accès électronique

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP14172802 2014-06-17
EP14173036.6A EP2958085A1 (fr) 2014-06-17 2014-06-18 Procédé de fonctionnement d'un système d'accès électronique

Publications (1)

Publication Number Publication Date
EP2958085A1 true EP2958085A1 (fr) 2015-12-23

Family

ID=50943199

Family Applications (1)

Application Number Title Priority Date Filing Date
EP14173036.6A Withdrawn EP2958085A1 (fr) 2014-06-17 2014-06-18 Procédé de fonctionnement d'un système d'accès électronique

Country Status (1)

Country Link
EP (1) EP2958085A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110428525A (zh) * 2019-08-01 2019-11-08 马鞍山钢铁股份有限公司 一种车辆物流门禁自动控制系统及方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202010010892U1 (de) 2010-07-30 2011-11-15 Burg-Wächter Kg Elektronischer Schlüssel
EP2595341A1 (fr) * 2011-11-17 2013-05-22 Sven Sauter Gestion des droits d'utilisateurs et système de contrôle d'accès avec restriction de durée
US20130176107A1 (en) * 2011-03-17 2013-07-11 Unikey Technologies, Inc Wireless access control system and related methods
EP2620919A1 (fr) * 2012-01-26 2013-07-31 SimonsVoss Technologies AG Système de verrouillage
US20140068247A1 (en) * 2011-12-12 2014-03-06 Moose Loop Holdings, LLC Security device access

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202010010892U1 (de) 2010-07-30 2011-11-15 Burg-Wächter Kg Elektronischer Schlüssel
US20130176107A1 (en) * 2011-03-17 2013-07-11 Unikey Technologies, Inc Wireless access control system and related methods
EP2595341A1 (fr) * 2011-11-17 2013-05-22 Sven Sauter Gestion des droits d'utilisateurs et système de contrôle d'accès avec restriction de durée
US20140068247A1 (en) * 2011-12-12 2014-03-06 Moose Loop Holdings, LLC Security device access
EP2620919A1 (fr) * 2012-01-26 2013-07-31 SimonsVoss Technologies AG Système de verrouillage

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110428525A (zh) * 2019-08-01 2019-11-08 马鞍山钢铁股份有限公司 一种车辆物流门禁自动控制系统及方法

Similar Documents

Publication Publication Date Title
EP3043684B1 (fr) Boîtier comprenant une unité de déverrouillage et procédé de déverrouillage d'une ou de plusieurs portes du boîtier
EP2898483B1 (fr) Procédé et système de configuration de petites installations de fermeture
EP2238576B1 (fr) Procédé et dispositif de commande du contrôle d'accès
EP2991045B1 (fr) Système de distribution intelligent
EP3542350A1 (fr) Système de contrôle d'accès avec mise à jour d'état automatique
DE102012008395A1 (de) Verfahren und System für eine gesicherteSchlüssel-Übergabe
WO2013071999A1 (fr) Appareil domotique, commande domotique, système domotique, et procédé d'intégration d'un appareil domotique dans un système domotique
EP3125200B1 (fr) Procédé assurant des actions de contrôle d'accès dans un système de distribution et/ou de retrait de colis
AT513461B1 (de) Verfahren zur Zutrittskontrolle
EP1679665A1 (fr) Procédé et système pour obtenir l'accès à un objet ou à un service
DE102017125134A1 (de) Ladesäule zur Bereitstellung elektrischer Energie
DE102014219502A1 (de) System und Verfahren für einen beschränkten Zugang zu einem Fahrzeug
WO2021239428A1 (fr) Station de charge pour véhicule électrique, et infrastructure de charge
EP3567557A1 (fr) Système de fermeture
EP3394839B1 (fr) Système d'accés ayant une fonction de remplacement /assistance
DE102013003799A1 (de) Verfahren zum Steuern eines elektronisch gesicherten Geräts und Transponder dafür
EP2958085A1 (fr) Procédé de fonctionnement d'un système d'accès électronique
EP3027827B1 (fr) Poignée de fenêtre, verrouillable de façon électromagnétique
DE102010019467A1 (de) Kontaktlos arbeitendes Zugangssystem
WO2017157831A1 (fr) Système de déverrouillage d'une serrrure d'un espace à verrrouiller
EP2941985A2 (fr) Dispositif de verrouillage de clapet d'un compartiment de rangement
DE102015108028A1 (de) Schließanlage
DE102017004802A1 (de) Empfangsbox mit elektronischem Schließsystem mit Retouren- und Absendefunktion
EP2958084A1 (fr) Procédé de fonctionnement d'une serrure de porte
DE102018209690A1 (de) Verfahren zum Einrichten eines Kommunikationskanals zwischen einem Datengerät und einem Endgerät eines Benutzers

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

17P Request for examination filed

Effective date: 20160623

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20180103