WO2000035178A2 - Method and device for access control by use of mobile phone - Google Patents

Method and device for access control by use of mobile phone Download PDF

Info

Publication number
WO2000035178A2
WO2000035178A2 PCT/SE1999/002202 SE9902202W WO0035178A2 WO 2000035178 A2 WO2000035178 A2 WO 2000035178A2 SE 9902202 W SE9902202 W SE 9902202W WO 0035178 A2 WO0035178 A2 WO 0035178A2
Authority
WO
WIPO (PCT)
Prior art keywords
identification number
control unit
register
telephone
identification
Prior art date
Application number
PCT/SE1999/002202
Other languages
French (fr)
Other versions
WO2000035178A3 (en
Inventor
Martin Jervill
Per Jeppsson
Lars Ericsson
Original Assignee
M-Phone Communications Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by M-Phone Communications Ab filed Critical M-Phone Communications Ab
Priority to AU15942/00A priority Critical patent/AU1594200A/en
Publication of WO2000035178A2 publication Critical patent/WO2000035178A2/en
Publication of WO2000035178A3 publication Critical patent/WO2000035178A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/02Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
    • H04M11/025Door telephones
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Definitions

  • the invention concerns a method and device for access control.
  • the designation 'access control' pertains, among other things, to the unlocking and opening of doors, ordering and reception of products, and control of charging for expenses to the account of an authorized person and similar.
  • Examples of practical applications are automatically opening doors for garage installations, activation or deactivation of alarms, purchases from vending machines and similar, and starting or stopping of heating systems and similar.
  • One objective of the invention is to provide a method and device with access control, whereby an arbitrary number of users can be checked for purposes of authorization in a simple manner and so that authorized users can easily be added or removed. This objective is attained in that the invention incorporates the special features cited in patent claims 1 and 3, respectively.
  • the authorized identification numbers are stored in a register that is connected with a control unit.
  • the register and control unit are included in a central processor that is connected with the equipment to which the user will receive access if correct authorization can be established.
  • the central processor can have a wireless connection with a remote control device by means of a telephone unit included in the central processor, preferably in form of a conventional mobile telephone.
  • a telephone connection is made from the remote control device to the central processor's telephone unit.
  • the identification number of the party dialing actually the subscriber number, is thereby transmitted to the telephone unit in a conven- tional manner.
  • the identification number is available in the telephone unit without the connection being answered.
  • the identification number is usually used for the so-called CLIP, "Calling Line Identification Presentation", i.e. a caller-ID.
  • a prerequisite is thus that the mobile telephone be connected with an operator and a mobile telephone system that includes this or correspond- ing service.
  • the received identification number is compared with the authorized identification numbers stored in the register.
  • the control unit can emit a control signal to the appropriate equipment so that the subscriber is given access to it, for example in that an automatically con- trolled door is opened.
  • the comparison with the stored numbers and subsequent control of the equipment or service to which the identification number grants access occurs without a telephone connection being set up. Nor does the user need to enter a code but needs only to dial the telephone number that is associated with the equipment or service.
  • FIG 1 schematically shows two alternative embodiments of a device according to the invention
  • FIG 2 is a flow chart that shows an example of steps carried out in a man- ner according to the invention.
  • FIG 1 The embodiment of a device according to the invention shown schematically in FIG 1 includes a central processor 10, which can be connected with different types of equipment for control of the equipment. Central processor 10 is also connected with a remote control unit 11 by means of a wireless connection.
  • remote control unit 11 includes a mobile telephone.
  • remote control unit 11 consists wholly of a conventional mobile telephone.
  • Central processor 10 includes a telephone unit 12 for mobile telephony and a control unit 13 operatively connected with telephone unit 12. When connection of telephone unit 12 occurs, the identification number of the connecting subscriber is transferred directly to control unit 13. The trans- fer of the identification number occurs without the connection being answered.
  • Central processor 10 also includes a memory 14 with a register for identification numbers. Identification numbers can be transferred to memory 14 by means of telephone unit 12 or another unit in the manner described below. Without answering the connection control unit 13 compares the in- coming identification number with identification numbers stored in the register of memory 14.
  • control unit 13 determines that there is authorization. In the embodiment shown the condition that there is authorization leads to transmission of a control signal to drive unit 15 that is operatively connected with control unit 13.
  • the control signal causes drive unit 15 to start motor 16, so that a door 17 is opened.
  • Door 17 is preferably a garage door or similar.
  • a system of the type described above is more secure than a conventional lock and key system, since a person who comes into possession of remote control unit 11 and is not authorized must also know the telephone number that is required in order to communicate with the telephone unit. Cor- respondingly higher security is also present as compared to systems based on conventional remote controls and magnetic cards.
  • control signal from control unit 13 is used to activate or deactivate an alarm in an alarm unit 18.
  • Activation or de- activation can occur directly or by means of a suitable drive unit 15.
  • the alarm is activated at every second telephone connection and deactivated at every second connection.
  • a simple embodiment of this type gives limited security, since authorization to activate alarm unit 18 is given to the person who has remote control unit 11.
  • Security can be increased in different ways or provided on different levels, for example by letting telephone unit 12 answer a telephone connection from remote control unit 11 and also requiring that a code be transferred to telephone unit 12 and accepted by control unit 13 in order to grant a higher or complete authorization.
  • a mobile telephone and the associated keypad for transfer of tone signals corresponding to the pressing of keys in a conventional way are preferably used in such an embodiment.
  • the identification numbers that are stored in the register of memory 14 can be transmitted to the register in different ways. According to a preferred embodiment all identification numbers are transmitted wirelessly by means of telephone unit 12. In such an embodiment a special software program is activated in control unit 13 and data corresponding to identification numbers are loaded by means of a modem 29 into the register in memory 14 after a telephone connection has been established from a telephone unit with predetermined identification numbers and the connection has been
  • a computer 19 operatively connected with control unit 13.
  • Computer 19 is suitably portable and is connected with central processor 10 in connection with storage of current identification numbers.
  • a telephone connection that corresponds to an authorized identification number is made from remote control unit 11 , usually by means of a normal mobile telephone.
  • the connection is made to the telephone number that corresponds to the desired service or product, for example the telephone number of the telephone unit that is associated with a garage door or similar.
  • FIG 1 also schematically shows a third alternative embodiment.
  • drive unit 15 is connected with a vending machine 28 or similar.
  • an owner of a mobile telephone with a registered subscriber number or identification number can have access to any product in vending machine 28 by connecting with telephone unit 12, which is associated with vending machine 28.
  • the removed product can later be debited from the account of the owner of the registered identification number.
  • Corresponding amounts can alterna- tively be charged to an associated account, for example a gasoline card or credit card.
  • the flow chart in FIG 2 schematically shows what happens after that in central processor 10.
  • the subscriber number or identification number of the party calling is detected in po- sition 20. It is determined in position 21 whether the incoming identification number corresponds to an identification number that gives authorization to make changes in the register of authorized users or subscribers. If that is the case, the call is answered in position 22.
  • suitable program software in control unit 13 and suitable hardware, for example a modem central processor 13 receives new identification numbers in position 23 and stores them in the register in memory 14. When all changes or additions have been made, the connection is terminated in position 24.
  • positions 21 to 24 can be eliminated if updating of the register in memory 14 and central processor 10 is otherwise accomplished by means of direct physical connection with computer 19 or in another way.
  • a detected called-in identification number is compared in position 25 with the identification numbers stored in the register in memory 14. The comparison preferably occurs with the aid of control unit 13 and without the telephone connection being answered. If the calling identification number is found in the register, authorization is accepted in position 26. The external unit that is associated with the subscriber number of the telephone is then activated in position 27. The central processor then returns to position 20 and detects any new called-in subscriber number.
  • the central processor returns to position 20 and detects any new called-in subscriber number.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Transceivers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method and a device for access control, whereby a control unit (13) is operatively connected with a memory (14) for storage of authorized identification numbers for current service or access in a register. The control unit (13) is operatively connected with a telephone unit (12) for reception of an identification number of a calling party by means of a telephone connection made by wireless telephony from a remote control unit (11). The control unit (13) is designed to compare the received identification number with the stored identification numbers without answering the telephone connection, and to emit a signal to accept authorization if the received identification number is in agreement with an identification number stored in the register.

Description

METHOD AND DEVICE FOR ACCESS CONTROL
BY USE OF MOBILE PHONE
THE FIELD OF THE INVENTION
The invention concerns a method and device for access control. The designation 'access control' pertains, among other things, to the unlocking and opening of doors, ordering and reception of products, and control of charging for expenses to the account of an authorized person and similar.
Examples of practical applications are automatically opening doors for garage installations, activation or deactivation of alarms, purchases from vending machines and similar, and starting or stopping of heating systems and similar.
STATE OF THE ART
Completely different systems are used today for the applications listed above. Today garage installations can be equipped with remote control devices, by means of which the user of the garage can open the garage door from an automobile. All remote control devices are usually designed to emit a simple identification signal that is the same for all users. A receiver at the garage door receives the signal emitted by the remote control device and opens the door if the identification signal is the correct one. It is a great disadvantage that a remote control device can be stolen and misused for entrance into the garage. If even one remote control device is misused in any way, it can be necessary to exchange all of them so that a new identification signal can be used. It is also necessary to replace or adjust the receiver.
Similar remote control devices are used for remote activation and corresponding deactivation of alarms. It is, however a prerequisite that the identification signal be unique for every alarm installation so that individual alarm installations are not activated by others than persons who are authorized. Remote control devices must therefore be produced in many different de- signs with unique identification signals. Even every alarm installation must be given a unique design, which becomes costly both to produce and exchange.
There are systems on the market today by means of which heating systems and similar can be remotely controlled by telephone. The simplest systems are based on a receiver connected to the telephone network that registers the number of incoming telephone connection signals. A certain number of signals corresponds to a certain command or a certain control signal. An advantage with this type of remotely-controlled systems is that there is no on-line connection, which means that no expense is incurred for the connection. Such a simple system can, however, easily be misused and activated accidentally.
More complicated but secure systems suffer in principle from the same drawbacks and disadvantages as the alarm systems described above.
THE INVENTION IN SUMMARY
One objective of the invention is to provide a method and device with access control, whereby an arbitrary number of users can be checked for purposes of authorization in a simple manner and so that authorized users can easily be added or removed. This objective is attained in that the invention incorporates the special features cited in patent claims 1 and 3, respectively.
In accordance with a preferred embodiment the authorized identification numbers are stored in a register that is connected with a control unit. The register and control unit are included in a central processor that is connected with the equipment to which the user will receive access if correct authorization can be established. The central processor can have a wireless connection with a remote control device by means of a telephone unit included in the central processor, preferably in form of a conventional mobile telephone. In conjunction with checking for purposes of authorization, a telephone connection is made from the remote control device to the central processor's telephone unit. The identification number of the party dialing, actually the subscriber number, is thereby transmitted to the telephone unit in a conven- tional manner. The identification number is available in the telephone unit without the connection being answered. The identification number is usually used for the so-called CLIP, "Calling Line Identification Presentation", i.e. a caller-ID. A prerequisite is thus that the mobile telephone be connected with an operator and a mobile telephone system that includes this or correspond- ing service.
The received identification number is compared with the authorized identification numbers stored in the register. When they are in agreement, the control unit can emit a control signal to the appropriate equipment so that the subscriber is given access to it, for example in that an automatically con- trolled door is opened. The comparison with the stored numbers and subsequent control of the equipment or service to which the identification number grants access occurs without a telephone connection being set up. Nor does the user need to enter a code but needs only to dial the telephone number that is associated with the equipment or service. Further advantages and special features of the invention can be seen from the following description, drawings, and dependent patent claims.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will now be described in more detail with the aid of exemplary embodiments with reference to the enclosed drawings on which FIG 1 schematically shows two alternative embodiments of a device according to the invention and FIG 2 is a flow chart that shows an example of steps carried out in a man- ner according to the invention. THE INVENTION
The embodiment of a device according to the invention shown schematically in FIG 1 includes a central processor 10, which can be connected with different types of equipment for control of the equipment. Central processor 10 is also connected with a remote control unit 11 by means of a wireless connection. In a preferred embodiment of the device according to the invention remote control unit 11 includes a mobile telephone. In a simple embodiment remote control unit 11 consists wholly of a conventional mobile telephone.
Central processor 10 includes a telephone unit 12 for mobile telephony and a control unit 13 operatively connected with telephone unit 12. When connection of telephone unit 12 occurs, the identification number of the connecting subscriber is transferred directly to control unit 13. The trans- fer of the identification number occurs without the connection being answered. Central processor 10 also includes a memory 14 with a register for identification numbers. Identification numbers can be transferred to memory 14 by means of telephone unit 12 or another unit in the manner described below. Without answering the connection control unit 13 compares the in- coming identification number with identification numbers stored in the register of memory 14.
If the incoming identification number is in agreement with a stored identification number, control unit 13 determines that there is authorization. In the embodiment shown the condition that there is authorization leads to transmission of a control signal to drive unit 15 that is operatively connected with control unit 13. The control signal causes drive unit 15 to start motor 16, so that a door 17 is opened. Door 17 is preferably a garage door or similar.
A system of the type described above is more secure than a conventional lock and key system, since a person who comes into possession of remote control unit 11 and is not authorized must also know the telephone number that is required in order to communicate with the telephone unit. Cor- respondingly higher security is also present as compared to systems based on conventional remote controls and magnetic cards.
In an alternative embodiment the control signal from control unit 13 is used to activate or deactivate an alarm in an alarm unit 18. Activation or de- activation can occur directly or by means of a suitable drive unit 15. In accordance with one embodiment the alarm is activated at every second telephone connection and deactivated at every second connection. A simple embodiment of this type gives limited security, since authorization to activate alarm unit 18 is given to the person who has remote control unit 11. Security can be increased in different ways or provided on different levels, for example by letting telephone unit 12 answer a telephone connection from remote control unit 11 and also requiring that a code be transferred to telephone unit 12 and accepted by control unit 13 in order to grant a higher or complete authorization. A mobile telephone and the associated keypad for transfer of tone signals corresponding to the pressing of keys in a conventional way are preferably used in such an embodiment.
The identification numbers that are stored in the register of memory 14 can be transmitted to the register in different ways. According to a preferred embodiment all identification numbers are transmitted wirelessly by means of telephone unit 12. In such an embodiment a special software program is activated in control unit 13 and data corresponding to identification numbers are loaded by means of a modem 29 into the register in memory 14 after a telephone connection has been established from a telephone unit with predetermined identification numbers and the connection has been
Figure imgf000007_0001
of identification numbers into the register of memory 14 according to an alternative embodiment is accomplished by means of a computer 19 operatively connected with control unit 13. Computer 19 is suitably portable and is connected with central processor 10 in connection with storage of current identification numbers. When a device according to the invention is to be used, a telephone connection that corresponds to an authorized identification number is made from remote control unit 11 , usually by means of a normal mobile telephone. The connection is made to the telephone number that corresponds to the desired service or product, for example the telephone number of the telephone unit that is associated with a garage door or similar.
FIG 1 also schematically shows a third alternative embodiment. In accordance with this embodiment, drive unit 15 is connected with a vending machine 28 or similar. By the same means, in principle, as described below an owner of a mobile telephone with a registered subscriber number or identification number can have access to any product in vending machine 28 by connecting with telephone unit 12, which is associated with vending machine 28. The removed product can later be debited from the account of the owner of the registered identification number. Corresponding amounts can alterna- tively be charged to an associated account, for example a gasoline card or credit card.
The flow chart in FIG 2 schematically shows what happens after that in central processor 10. When the telephone connection is made, the subscriber number or identification number of the party calling is detected in po- sition 20. It is determined in position 21 whether the incoming identification number corresponds to an identification number that gives authorization to make changes in the register of authorized users or subscribers. If that is the case, the call is answered in position 22. With use of suitable program software in control unit 13 and suitable hardware, for example a modem, central processor 13 receives new identification numbers in position 23 and stores them in the register in memory 14. When all changes or additions have been made, the connection is terminated in position 24. The steps taken in positions 21 to 24 can be eliminated if updating of the register in memory 14 and central processor 10 is otherwise accomplished by means of direct physical connection with computer 19 or in another way. A detected called-in identification number is compared in position 25 with the identification numbers stored in the register in memory 14. The comparison preferably occurs with the aid of control unit 13 and without the telephone connection being answered. If the calling identification number is found in the register, authorization is accepted in position 26. The external unit that is associated with the subscriber number of the telephone is then activated in position 27. The central processor then returns to position 20 and detects any new called-in subscriber number.
If, on the other hand, the called-in identification number is not found in the register upon comparison in position 25, the central processor returns to position 20 and detects any new called-in subscriber number.
Through the fact that information on authorized persons is stored in the register of memory 14 in the manner described above, updating can be accomplished quite simply. Updating can remain current when new users are added or old ones dropped. It is also very easy to remove an identification number, if the remote control unit is lost or stolen. Such correction can occur without other users being affected in any way.

Claims

PATENT CLAIMS
1. A method of access control, c h a ra c t e r i z e d in that authorized identity numbers are stored in a register for current service or access, that the identification number of a user is sent as an identification signal for the calling party in a telephone call by means of a wireless telephone, that the identification number is compared with the identification numbers stored in the register without answering the telephone call, and that authorization is accepted if the incoming identification number is in agreement with an identification number stored in the register.
2. A method according to Claim 1 , whereby the register is updated by re- ceiving a predetermined identification number through a telephone connection, by answering the telephone call, and by transmiting data corresponding to identification numbers by means of telephony for storage in the register.
3. A device for access control, c h a r a c t e ri z e d in that a control unit (13) is operatively connected with a memory (14) for storage of authorized identification numbers for current service or access in a register, that the control unit (13) is operatively connected with a telephone unit (12) for reception of an identification number of a calling party by means of a telephone connection made by wireless telephony from a remote control unit (11), that the control unit (13) is designed to compare the received identification number with the stored identification numbers without answering the telephone connection, and that control unit (13) is designed to emit a signal to accept authorization if the received identification number is in agreement with an identification number stored in the register.
4. A device according to Claim 3, character!' zed in that the remote control unit (11) comprises a mobile telephone and that the identification number consists of the subscriber number associated with the mobile telephone.
5. A device according to Claim 3, characterized in that the control unit (13) is operatively connected with a drive unit (15) for activation of the drive unit (15) by means of the signal accepting au- thorization.
6. A device according to Claim 5, characterized in that the drive unit (15) is operatively connected with a motor unit (16) for opening of a door (17) when receiving the signal accepting authoriza- tion.
7. A device according to Claim 5, characterized in that the drive unit (15) is operatively connected with an alarm unit (18) for activation and deactivation when receiving the signal accepting au- thorization.
8. A device according to Claim 5, character!' zed in that the drive unit (15) is operatively connected with a vending machine (28), for supplying vended items when receiving the signal accepting authorization.
9. A device according to Claim 3, character! zed in that a computer unit (19) is operatively connected with the control unit (13) for transfer or updating of identification numbers in the register of memory (14).
10. A device according to Claim 3, character! zed in that the control unit (13) is designed to answer an incoming call if a current identification number is in agreement with a predetermined identification number, and that the control unit comprises a modem for transfer of identification num- bers for entry into or updating of the register of memory (14).
PCT/SE1999/002202 1998-11-26 1999-11-26 Method and device for access control by use of mobile phone WO2000035178A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU15942/00A AU1594200A (en) 1998-11-26 1999-11-26 Method and device for access control by use of mobile phone

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE9804055A SE516589C2 (en) 1998-11-26 1998-11-26 Methods and devices for access control
SE9804055-3 1998-11-26

Publications (2)

Publication Number Publication Date
WO2000035178A2 true WO2000035178A2 (en) 2000-06-15
WO2000035178A3 WO2000035178A3 (en) 2000-08-31

Family

ID=20413421

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE1999/002202 WO2000035178A2 (en) 1998-11-26 1999-11-26 Method and device for access control by use of mobile phone

Country Status (3)

Country Link
AU (1) AU1594200A (en)
SE (1) SE516589C2 (en)
WO (1) WO2000035178A2 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001006747A1 (en) * 1999-07-20 2001-01-25 Patrick Mossberg Method and system for identifying a juridical person
WO2001057824A1 (en) * 2000-02-04 2001-08-09 Alexander Shemer System and method for operation of a device using caller id function of a telephone
WO2003023722A3 (en) * 2001-09-12 2003-10-16 Giesecke & Devrient Gmbh Method for verifying access authorization
EP1087602A3 (en) * 1999-09-24 2003-10-22 Cedardell Limited Alarm system
DE10321307A1 (en) * 2003-05-08 2004-12-02 Deutsche Telekom Ag Mobile phone access control system operation procedure uses speech dialogue system and DTMF response through acoustic coupler to generate access data
DE10121705B4 (en) * 2001-05-04 2005-09-22 Web.De Ag Unified messaging communication method and unified messaging communication system
EP1646176A2 (en) 2003-06-25 2006-04-12 France Telecom Granting of the authorization to access a resource
NL1029550C2 (en) * 2005-07-18 2007-01-19 Der Kinderen Beheer B V Method, system and computer program are for procurement electronically of an access product, such as an access permit, parking permit, opening of access door or similar
EP1965595A1 (en) * 2007-02-27 2008-09-03 Lucent Technologies Inc. Wireless communication techniques for controlling access granted by a security device
WO2011010052A1 (en) * 2009-07-21 2011-01-27 Openways Sas Secure control system for opening locking devices by encrypted acoustic accreditations
US8041016B2 (en) 2004-04-21 2011-10-18 Anders Trell Trust Method and device for access communication/control
DE102010044414A1 (en) * 2010-09-04 2012-03-08 Deutsches Zentrum für Luft- und Raumfahrt e.V. Person authentication method for access control system for securing e.g. building against unauthorized access or use, involves deeming person to be authenticated when transmitted telephone number matches with stored telephone number
US20120233687A1 (en) * 2011-03-08 2012-09-13 Metivier Pascal Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
GB2540173A (en) * 2015-07-08 2017-01-11 Hugslock Systems Ltd Encrypted locks
US10305966B2 (en) 2014-05-23 2019-05-28 Anders Edvard Trell System for authorization of access
US10354463B2 (en) 2017-03-20 2019-07-16 Ademco Inc. Systems and methods for secure authentication for access control, home control, and alarm systems

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04357747A (en) * 1991-06-04 1992-12-10 Matsushita Electric Ind Co Ltd telephone equipment
JPH066428A (en) * 1992-06-18 1994-01-14 Nec Corp Telephone set with incoming call identifying function
AU4661093A (en) * 1992-07-08 1994-01-31 Joseph Rozgonyi Cellular telephone access control and identification system
JPH11120398A (en) * 1997-10-21 1999-04-30 Ntt Power And Building Facilities Inc Security system and security method

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001006747A1 (en) * 1999-07-20 2001-01-25 Patrick Mossberg Method and system for identifying a juridical person
EP1087602A3 (en) * 1999-09-24 2003-10-22 Cedardell Limited Alarm system
WO2001057824A1 (en) * 2000-02-04 2001-08-09 Alexander Shemer System and method for operation of a device using caller id function of a telephone
DE10121705B4 (en) * 2001-05-04 2005-09-22 Web.De Ag Unified messaging communication method and unified messaging communication system
WO2003023722A3 (en) * 2001-09-12 2003-10-16 Giesecke & Devrient Gmbh Method for verifying access authorization
DE10321307A1 (en) * 2003-05-08 2004-12-02 Deutsche Telekom Ag Mobile phone access control system operation procedure uses speech dialogue system and DTMF response through acoustic coupler to generate access data
EP1646176A2 (en) 2003-06-25 2006-04-12 France Telecom Granting of the authorization to access a resource
EP1738572B1 (en) * 2004-04-21 2015-08-26 Anders Edvard Trell Method and device for access communication/control
US8041016B2 (en) 2004-04-21 2011-10-18 Anders Trell Trust Method and device for access communication/control
NL1029550C2 (en) * 2005-07-18 2007-01-19 Der Kinderen Beheer B V Method, system and computer program are for procurement electronically of an access product, such as an access permit, parking permit, opening of access door or similar
EP1965595A1 (en) * 2007-02-27 2008-09-03 Lucent Technologies Inc. Wireless communication techniques for controlling access granted by a security device
WO2008106044A1 (en) * 2007-02-27 2008-09-04 Lucent Technologies Inc. Wireless communication techniques for controlling access granted by a security device
US9449445B2 (en) 2007-02-27 2016-09-20 Alcatel Lucent Wireless communication techniques for controlling access granted by a security device
WO2011010052A1 (en) * 2009-07-21 2011-01-27 Openways Sas Secure control system for opening locking devices by encrypted acoustic accreditations
US8565725B2 (en) 2009-07-21 2013-10-22 Openways Sas Secure control system for opening locking devices by encrypted acoustic accreditations
EP2282297A1 (en) * 2009-07-21 2011-02-09 Openways Sas Security system to control the opening of locking devices using encoded acoustic verifications
DE102010044414A1 (en) * 2010-09-04 2012-03-08 Deutsches Zentrum für Luft- und Raumfahrt e.V. Person authentication method for access control system for securing e.g. building against unauthorized access or use, involves deeming person to be authenticated when transmitted telephone number matches with stored telephone number
US20120233687A1 (en) * 2011-03-08 2012-09-13 Metivier Pascal Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
US8793784B2 (en) * 2011-03-08 2014-07-29 Openways Sas Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
US10305966B2 (en) 2014-05-23 2019-05-28 Anders Edvard Trell System for authorization of access
GB2540173A (en) * 2015-07-08 2017-01-11 Hugslock Systems Ltd Encrypted locks
US10354463B2 (en) 2017-03-20 2019-07-16 Ademco Inc. Systems and methods for secure authentication for access control, home control, and alarm systems

Also Published As

Publication number Publication date
SE9804055L (en) 2000-05-27
WO2000035178A3 (en) 2000-08-31
AU1594200A (en) 2000-06-26
SE516589C2 (en) 2002-01-29
SE9804055D0 (en) 1998-11-26

Similar Documents

Publication Publication Date Title
EP0766902B1 (en) User authentication method and apparatus
EP0493895B2 (en) Telephone network credit card calling apparatus and method of operation
CA2078077C (en) Centralized security control system
US7200220B1 (en) Portable telephone maintenance service system and maintenance service method
US4779224A (en) Identity verification method and apparatus
US5022067A (en) Telephone call security system
WO2000035178A2 (en) Method and device for access control by use of mobile phone
US6173172B1 (en) System and method for preventing the unauthorized use of a mobile communication device
US6078908A (en) Method for authorizing in data transmission systems
US5745559A (en) Restricted access telephones for logical telephone networks
CA2184302C (en) Personal identification number security system incorporating a time dimension
US7657287B2 (en) Mobile station in a mobile communication system and method for accessing a service and/or a data record in the mobile station's standby mode
JPH05284228A (en) Method for approving access to telecommunication service
EP1011285A1 (en) Personal communication system and communication method thereof for performing a subscriber authenticating process
KR20040068342A (en) Access control system
WO2005104516A2 (en) Method and device for access communication/control
JP2001350724A (en) User authentication method
CA2193819C (en) User authentication method and apparatus
EP1119147A1 (en) Provision of secure access for telecommunications system
EP0565528A1 (en) Secure over-the-air registration of cordless telephones
US6983485B1 (en) Method and apparatus for authentication for a multiplicity of services
WO1995024107A1 (en) Cellular telephone fraud control system and method
JP2002300637A (en) Lock control system
JP2001177520A (en) Method, communication system, and device for authorizing communication between at least two devices
GB2285200A (en) An analogue mobile telephone system

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref country code: AU

Ref document number: 2000 15942

Kind code of ref document: A

Format of ref document f/p: F

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase