MXPA01005239A - Method for triggering a process within a building - Google Patents

Method for triggering a process within a building

Info

Publication number
MXPA01005239A
MXPA01005239A MXPA/A/2001/005239A MXPA01005239A MXPA01005239A MX PA01005239 A MXPA01005239 A MX PA01005239A MX PA01005239 A MXPA01005239 A MX PA01005239A MX PA01005239 A MXPA01005239 A MX PA01005239A
Authority
MX
Mexico
Prior art keywords
key
person
building
event
authorized
Prior art date
Application number
MXPA/A/2001/005239A
Other languages
Spanish (es)
Inventor
Schuster Kilian
Friedli Paul
Original Assignee
Friedli Paul
Schuster Kilian
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Friedli Paul, Schuster Kilian filed Critical Friedli Paul
Publication of MXPA01005239A publication Critical patent/MXPA01005239A/en

Links

Abstract

The procedure for triggering a process within a building, is generated with a key, this key is given to a subject. When the authorized subject is identified by means of such key, a process is triggered within the building, for example the preparation of an elevator.

Description

PROCEDURE TO ACTIVATE A PROCESS WITHIN A BUILDING D E S C R I P C I O N The invention relates to a method for activating a process within a building. Modern buildings, especially the most complex buildings, also have a large infrastructure, such as doors in the entrance area and, where appropriate, in each of the floors with electronic access control, turnstiles with electronic access control and facilities of elevator that are also equipped with an access control. If in that building a person requires urgent medical assistance, a series of processes must be carried out without the possibility of breakdowns. In the first place, the person who needs assistance has to make another person understand that he needs help and to what extent he needs help. Then, this other person must inform the emergency doctor and make sure that the building's staff is aware of the emergency doctor's visit, receives it, passes it through the building's security barriers and takes him to the emergency room. corresponding floor and the room in which the person who needs help is located. To do this, the building's staff must have ample and correct information and receive the appropriate instructions.
False information by mistake can have fatal consequences. In addition, the emergency doctor must be able to reach the person who needs help as quickly as possible. This requires a high administrative cost and the staff must have extensive training. Another case may be the delivery of an order to a person working in the building or to a neighbor of the building, but when for some reason, this person or neighbor can not receive the ordered goods or services by himself. Therefore, the person or neighbor must actively take care that the ordered merchandise or service can be received. As a general rule, the person or neighbor can instruct another person to take over this task, but if this person is not available or if there is a misunderstanding, the merchandise or service ordered can not be received, which can have the corresponding consequences. In the event that a building cleaning service must clean and take care of certain parts of the building at certain times, the corresponding access rights must be provided to the cleaning staff. In general, this is carried out by providing the cleaning staff with one or more mechanical keys that serve for certain doors. In this way, it is not guaranteed that the person in possession of the key belongs to the cleaning staff. There is also the problem that in case of losing the key considerable damage occurs. Nor can the possibility of misuse be excluded. In the event that a neighbor of the building waits for several visitors, he must provide access to the building to each individual visitor who presents himself at the reception and, if necessary, describe each time the path to reach the place where he is. In certain circumstances, this can be quite tiring. If a single service or one that is repeated infrequently is carried out in the building or in a dwelling of the building, the authorization of access for the service personnel can only be made with a high administrative cost. Either a person has to accompany the service personnel or a mechanical key must be made available to the service personnel, which requires a certain concession of trust and increases the danger of misuse. Therefore, an object of the invention consists in proposing a procedure to activate a process inside a building, with which, certainly, automatically and without failures, certain components of the infrastructure are made available to an authorized person. of the building. This object is solved by means of a process for activating a process inside a building with the characteristics indicated in claim 1. Advantageous improvements of the invention arise from the characteristics indicated in the subclaims. In the method according to the inventionTo activate a process inside a building, a virtual key is generated by a specific event. The virtual key is then delivered to a person. When the authorized person identifies with the key, the process is activated in the building. Preferably, the key is assigned a code determined by a coding method. It is also advantageous to add a signature to the key with which the key receiver can be accredited to third parties as a person authorized to use it. It is also advantageous that the type of process depends on the type of the event. Advantageously, the process controls an elevator of a building. Another advantageous development of the invention is that the type of event determines to which person the key is delivered. You can also check if a key already exists for the person to whom the corresponding key is delivered, and if necessary, use the first modified key. Another advantage of the invention is that it is verified that means are available to the person to be authorized for it to be accredited, and among these an appropriate one is selected. In another embodiment of the invention, if a key already exists, it is checked whether it satisfies the security requirements and, if necessary, a new key or a completed key is generated. Advantageously, the person is identified upon receiving the key. The invention is explained in more detail below on the basis of a figure. The figure shows a flow chart of the method according to the invention for activating a process inside a building.
As shown in the figure, the activating element is a specific event. As indicated above, the event may consist of an emergency call, an order, an order, for example a cleaning service, an invitation or an event that is repeated periodically, for example a supervision or a maintenance service. The type of event determines what requirements are imposed on the key to be generated. For example, if there is a fire in the building, the security requirements of the key must be lower and the availability requirements of the key must be higher. However, if the activating event is a commission for a building cleaning service, the security requirements of the key to be generated must be considerably higher. That is, in this case the danger of improper use of the key must be as small as possible and, on the contrary, in case of fire access to the building must be insured at all times. Therefore, depending on the type of event, different requirements for the key to be generated result. By the term "key" or "virtual key" a code must be understood. The event also determines which person should receive the authorization. For example, if the activating event is an emergency call, the emergency doctor must be called by this event. On the contrary, when the activating event is a personal invitation from a neighbor of the building, the guest or guests must be cited. The marginal conditions of the system determine whether the requirements of the key are first established and then the person or persons who must receive the authorization. Next, it is necessary to check if there are means of the person to authorize that they can serve as a key. These means can be, for example, means of communication such as telephone, mobile phone, printer or PC. As a key, for example, a secret word, a secret number, a phrase, a symbol or an image come into consideration. Once the requirements of the key have been established, the person who has to be authorized and if the person has means that can serve as a key, it is checked whether the quality of a possibly existing key satisfies the requirements. If this is not the case, a new key is generated or the existing key is completed so that the key requirements are satisfied. Once an adequate key is generated, it is transmitted to the authorized person. The type of transmission depends on the means available to the authorized person. If the authorized person has a mobile phone, the transmission can take place through a wireless interface. However, if the key is to be transmitted to a fax machine, the transmission will usually be wire. The type of transmission of the key depends on the marginal technical conditions. If necessary, with the reception of the key an identification of the authorized person can already take place. This can be done for example through biometric features, such as the voice of the receiver or their fingerprints. Once the key has been received and, if necessary, the person authorized to use it has been identified, the key is stored in the means of communication available to the authorized person. However, this is not necessarily necessary. Rather, the authorized person can retain the key in memory. As soon as the authorized person arrives at the corresponding building, the key is put into use. Depending on the key, the use, that is, the application of the key takes place by entering the secret number, the secret word or the like on a keyboard, by registering the key verbally through a microphone of the building, or through the biometric characteristics of the person authorized by a corresponding biometric sensor disposed in the building. Once the key has been entered, the validity of the key is checked. If the key is identified as invalid, for example by a too late use when the key is only usable for a certain time, the rejection of the key occurs. The person does not get access to the building, the process is not activated. On the contrary, if the key is recognized as valid, the activation of the process occurs, for example, the doors of the building are opened, the elevator is available and the elevator doors are opened; The existing security barriers also open. Another process may consist in the transmission of a message to the transmitter of the key. The user of the key can also be informed about the path he must take to reach the person who has issued the key. A welcome can also be reproduced for the authorized person or other information left for the authorized person. The activated process can also include an automatic trip to the destination floor. Finally, the process can also be a receipt for the delivery of the goods or the provision of the service. By means of the invention, an electronic key is automatically generated and delivered for the granting of access to certain areas by virtue of external events, for example a mail order, a request for assistance, a fire detection, etc. This means that there is an automatic implication of the activating event in the need for access and that the necessary measures are taken for it (preparation and sending of the key). For example, the requirement of an emergency doctor has as a consequence the delivery of a code to the doctor through an emergency station. The doctor is accredited with this code before the access control system, to be able to arrive there without impediments to the patient. The electronic key can be made, for example, in the form of a number or a number sequence represented binary. The relevant people in the generation of the key and in the distribution and use of it are the person who makes the order (for example the person who is going to be visited), the visitor and a management position. In this context there are different possible forms and methods of identification and authentication, for example as those available through the "Public Key Cryptography". For this, reference is made to the publication of R.L. Rivest, A. Shamir, L. Adleman, "A Method for Obteining Digital Signatures and Public-key Cryptosystems ", 1977. The publication describes a coding procedure in which a coding key is publicly available without the decoding key being publicly available.This procedure is also known as the RSA procedure. of a simple embodiment of the key, this can also be a PIN code, a bookmark, a telephone number or a secret word.It can achieve greater protection against misuse using a public key for authentication and employing corresponding coding procedures In this case, public keys based on an authentication are distributed in a first phase.If a user has to be granted access or other rights, he obtains his rights represented in numerical form and insured through the public key. using these rights decoding occurs, which ensures that the proclaimed rights, such as access, are granted by a legitimized position. In addition, a signature procedure can be added, which allows proof against third parties.
The key can present different information. For example, a part of the key may consist of a signature of the receiver or the administration position. Another part of the key can describe the activating event itself. You can also add to the key information that contains for example the access rights, that is, who, where and when you should have access. It can also be entered in the key to the corresponding type of right. Finally, a reference or a pointer (indicator) representing a reference to the memory address in which the management post has deposited the additional information can also be stored in the key. Depending on the application case, the key can be stored completely or partially in one or several places. If the Uve is stored completely in several places, there is a high redundancy and with it a high access security, but also a greater danger of misuse. The storage of the key completely in several places can be useful for example in case of fire in the building. The information stored in the key can be transmitted to the receiver of the building, for example through an infrared interface (IrDA) or a "bluetooth" emission interface of a mobile phone.
The IrDA (Infrared Data Association) represents a standard of infrared communication. With it, wireless connections can be achieved with a range between 0 and 1 meter and a data transmission speed between 9600 and 16 Mbaud. The "bluetooth" is intended for the transmission of short-range voice and data with radio frequencies at 2.4 GHz in the ISM band. The range varies between 10 cm and 10 m, but can be extended up to 100 m by means of an amplification of the emission power. The generation and distribution of the key can be done through different places, such as an alarm trigger, the building management post or a third place. The generation of the key is automatically based on an indication, for example, that given by the activation of an alarm. At the reception of the key other information and indications can be transmitted, such as a road sketch, a restriction of the visit times or service instructions. When using the key, a communication connection can be established between the sender of the key and the holder of the key, for example to inform about the user or to authenticate the same. ££ ußai ^ £ _Í_ It is also possible to inform the sender of the key when it has not been used after a certain time has elapsed. You can also modify the rights granted to the person authorized to use the key, so that the person is no longer authorized or is only authorized in a limited way.
You can also modify the rights assigned to all the keys. This can be important when multiple keys have been distributed but only some of them can be used. The sender of the key or the administration station can be notified in case of defective operation of the key and / or in case of manipulation attempts. The key can be embedded in a higher order program, so that together with the key a control program is transmitted to a mobile phone with WAP-Browser. In that case, the telephone can be used as a command surface, among other things to use the key. It is also possible to charge a fee for each use of the key, which may depend on the type of key and the action / process activated. The settlement can be borne by the key holder, that is, the person authorized to use it, by the issuer of the key or by a third party. When the key is used, there is also the possibility of activating a special service mode with the help of the key. This could be especially important for firefighters in case of fire, to control an elevator. If a key is not used, certain actions can be activated, such as a reminder to the receiver of the key. With the use of the key, other information can also be transmitted to the lock, that is, to the electronic receiver. The type of information can be determined by the key itself and / or be required by the lock. This information may include, for example, details about the visitor, such as your personal number, preferred room temperature or communication capacity.

Claims (10)

  1. CLAIMS 1.- Procedure to activate a process inside a building, characterized in that a virtual key is generated by a specific event, the key is given to a person and, when the authorized person is identified by the key, the building is activated the process.
  2. Method according to claim 1, characterized in that a specific code is assigned to the key by means of a coding method.
  3. 3. Method according to claim 1 or 2, characterized in that a signature is added to the key by means of which the key receiver can be accredited to third parties as an authorized person. 4. - Method according to one of claims 1-3, characterized in that the type of process depends on the type of event. 5. - Method according to one of claims 1-4, characterized in that the process controls a building elevator. 6. - Method according to one of claims 1-5, characterized in that the type of event determines to which person the key is delivered. 7. - Method according to one of claims 1-6, characterized in that it is checked if a key already exists for the person to whom the key is to be delivered, and this, if necessary, is used modified. 8. - Method according to one of claims 1-7, characterized in that it is checked what means the person has to identify himself and between them a suitable one is selected. 9. - Method according to one of claims 1-8, characterized in that, if a key already exists, it is checked whether it satisfies the security requirements and, if necessary, a new or completed key is generated. 10. - Method according to one of claims 1-9, characterized in that the person is identified upon receiving the key. SUMMARY In the method according to the invention to activate a process inside a building, a key is generated by a certain event and the key is delivered to a person. When the authorized person is identified by the key, a process is activated in the building, for example the preparation of an elevator.
MXPA/A/2001/005239A 2000-05-25 2001-05-24 Method for triggering a process within a building MXPA01005239A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP00810454.9 2000-05-25

Publications (1)

Publication Number Publication Date
MXPA01005239A true MXPA01005239A (en) 2002-06-05

Family

ID=

Similar Documents

Publication Publication Date Title
CN105593911B (en) Access control method and access control system
ES2749399T3 (en) Automated control system for a multi-level authority to operate electronic and electrical devices
ES2501516T3 (en) Distribution of access information to facilities
JP2013021717A (en) Method for triggering process within building
WO2005104516A2 (en) Method and device for access communication/control
US20020187791A1 (en) Security system and security apparatus
JP2008067310A (en) Security system for multiple dwelling building
JP2014063401A (en) Institution management system and institution management method
JP5991798B2 (en) Apartment house management device
JP2008025278A (en) Comings/goings management system and method
IT201900002525A1 (en) SYSTEM AND METHOD OF INTERCOMMUNICATION IN CORRESPONDENCE OF ENTRANCE POINTS IN BUILDINGS OR LIMITED AREAS AND FOR THE MANAGEMENT AND REMOTE CONTROL OF ENTRANCES
MXPA01005239A (en) Method for triggering a process within a building
JP2023540316A (en) Entrance/exit door opening/closing control device and system
KR102268117B1 (en) Apparatus and system for controlling the opening and closing of the door
KR20170015955A (en) A digital doorlock which performs additional authentication by user's callback
KR20150136456A (en) Digital Door Locks with Text Display Display Liquid Crystal
JP2011210046A (en) Access control system
KR101720330B1 (en) A digital door lock system and a method of providing a message for displaying a personalized message to a specific user
JP2006188294A (en) System and method for providing information of elevator
KR20190020708A (en) Digital Door Locks with Text Display Display Liquid Crystal
JP2001262884A (en) Communication system
KR20180087221A (en) Digital Door Locks with Text Display Display Liquid Crystal
KR20170140147A (en) Digital Door Locks with Text Display Display Liquid Crystal
JP2002281161A (en) Responding system to visitor
KR20150132041A (en) Digital door lock security system and security service method