WO2002008551A1 - Access method and system - Google Patents
Access method and system Download PDFInfo
- Publication number
- WO2002008551A1 WO2002008551A1 PCT/AU2001/000883 AU0100883W WO0208551A1 WO 2002008551 A1 WO2002008551 A1 WO 2002008551A1 AU 0100883 W AU0100883 W AU 0100883W WO 0208551 A1 WO0208551 A1 WO 0208551A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- access code
- secured facility
- authority
- code
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/215—Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Definitions
- the present invention relates generally to access control and, more particularly, to methods and systems for providing access to secured facilities.
- Access control systems are employed to secure distinct areas and prevent unauthorised access of those areas.
- areas include enclosed areas (such as fenced sports clubs etc.), buildings, vehicles and containers.
- Conventional access control systems employ codes or tokens for verification of authorisation for access.
- Typical tokens include keys, radio frequency identification cards and magnetic swipe cards.
- tokens have to be physically distributed to users and are thus vulnerable to loss or theft.
- tokens are usable until the verification device at the point of access is reprogrammed.
- Conventional code-based access systems grant access to a user on input of a valid identification code.
- On-line access control systems are common, particularly for the case of a large number of users, h this instance, control of access and/or reprogramming of one or more verification devices are performed by a central controller. This necessitates the use of a communications link between the central controller and the verification devices.
- computer networks and telephone lines are typically employed as a medium for communication.
- a further potential application for access control systems is the securing of containers for the storing of goods.
- One particular type of container might be for the secure delivery (or pick up) of goods at an unmanned location.
- An example might be the ordering of goods via telephone or the Internet for delivery to a person's home.
- Obvious logistical problems are encountered, as a person needs to be present to accept delivery of the goods.
- Various secure storage containers have been proposed for this purpose, which seek to provide security against unauthorised access.
- these systems rely on communications links such as telephone lines to provide security against unauthorised access. This inevitably results in an increase in cost and complexity of the system, higher failure rate due to reliance on third party communication networks and higher initial hardware and maintenance costs.
- a method of authorising access to a secured facility by an authority to one or more parties includes the steps of validating an end-user by the authority, acquiring access information from the end-user by the authority, and providing an access code to the one or more parties by the authority for accessing the secured facility.
- An authorisation verification device is located at the secured facility which is incommunicable with the authority. The validity of the access code is restricted for access of the secured facility during a specific time period.
- a system for authorising access to a secured facility by an authority to one or more parties includes means for validating an end-user by the authority, means for acquiring access information from the end-user by the authority, and means for providing an access code to the one or more parties by the authority for accessing the secured facility.
- An authorisation verification device is located at the secured facility, which is incommunicable with the authority. The validity of the access code is restricted for access of the secured facility during a specific time period.
- a method of verifying authorisation provided by an authority to one or more parties for access to a secured facility is provided.
- the method includes the steps of receiving an access code from one of the parties, generating a representation of the access code according to a decoding algorithm, and verifying validity of the access code using the representation of the access code by an authorisation verification device located at the secured facility.
- the authorisation verification device is incommunicable with the authority and the validity of teh access code is restricted for access of the secured facility during a specific time period.
- an authorisation verification device for verifying authorisation provided by an authority to one or more parties for access to a secured facility.
- the device includes means for receiving an access code from one of the parties, means for generating a representation of the access code according to a decoding algorithm and means for verifying validity of the access code, using the representation of the access code.
- the device is located at the secured facility and is incommunicable with the authority. The validity of the access code is restricted for access of the secured facility during a specific time period.
- a method of selectively providing access to a secured facility includes the steps of generating and submitting an access code to a lock device operable to validate the access code and, upon successful validation of the access code, providing access to the secured facility.
- the code is valid for access of the secured facility during a specified time period only.
- a system for selectively providing access to a secured facility includes processing means for generating an access code and a lock device.
- the lock device includes receiving means for receiving an access code, processing means for validating the access code and means for providing access to the secured facility in response to successful validation of the access code.
- the access code is valid for access of the secured facility during a specified time period only.
- the validity of an access code may further be restricted to a specific number of access occurrences of said secured facility.
- Fig. 1 is a block diagram that illustrates a system according to a first embodiment of the present invention
- Fig. 2 is a flowchart that illustrates processing of a purchase or delivery request
- Fig. 3 is a flowchart that illustrates processing of an access request by an authority
- Fig. 4 illustrates a block diagram of a lock in accordance with any one of the embodiments of the present invention
- Fig. 5 is a flowchart of the software program operating in the lock of Fig. 4.
- Fig. 6 is a flowchart that illustrates an application of the present invention according to a second embodiment.
- Fig. 1 shows an authority 100 and a number of secure containers 160, 161 .... 160 + n.
- Secure containers 160, 161 ... 160 + n are installed remotely and independently from one another and from the authority 100.
- Secure containers 160, 161 ... 160 + n are secured by locks 170, 171 ... 170 + n, respectively.
- Each of locks 170, 171 ... 170 + n include electronic circuits for entry of an access code by a delivery agent and a lock mechanism which may be activated in response to a valid code being entered by the delivery agent, thus providing access to secure containers 160, 161 .... 160 + n.
- the authority 100 includes a processor 150, which is connected to an end-user database 110, an end-user address database 120 and a lock identification number and algorithm database 130.
- the end-user database 110 contains a list of end-users of secure containers 160, 161 .... 160 + n and the end-user address database 120 contains the physical address at which each of secure containers 160, 161 ... 160 + n are installed, corresponding to the end-user database 110.
- the lock identification number and algorithm database 130 contains a unique identification number in respect of each lock 170, 171 .... 170 + n which form part of secure containers 160, 161 ... 160 + n, respectively, and a reference to the particular software algorithm installed in each of locks 170, 171 ... 170 + n.
- the authority 100 has the ability to generate access codes, by means of an encoding algorithm, for any of locks 170, 171 ... 170 + n in order to allow single or multiple access occurrences to secure containers 160, 161 .... 160 + n, respectively. Once such a code has been generated, by the authority 100, processor 150 also updates the authorisations database 140.
- Fig. 2 shows an application of the system described in Fig. 1 in respect of the processing of a purchase or delivery request from an end-user.
- a retailer receives a purchase or delivery request, typically via an Internet web site of the retailer, at step 200. However, such requests may also be made via other communications means such as an intranet, an extranet or by a conventional voice telephone call.
- the end-user further provides a unique identification number, which was issued by the authority 100, and a specified time period during which delivery should take place, to the retailer.
- the retailer then proceeds to request access authorisation and delivery information from the authority 100, via the Internet web site of the authority 100, by providing the identification number of the end-user and the specified time period for delivery, at step 210.
- the authority 100 issues delivery information to the retailer, including an access code corresponding to the specific secure container 160, 161 ... 160 + n of the end-user from whom the request originated and the physical address of the specific secure container, at step 230.
- the delivery information is issued to a delivery agent, by the retailer, at step 240.
- the delivery agent uses the supplied access code to gain access to the specific secure container, within the allotted time period, to deliver the goods.
- the end-user identification code is invalid (N)
- the end-user is advised that the request was unsuccessful, at step 260. Processing then returns to waiting for a further purchase or delivery request from an end-user.
- Fig. 3 illustrates the processing, by the authority 100, of an access authorisation request received from a retailer.
- the authority 100 receives an access authorisation request, typically via the Internet web site of the authority 100, at step 310. However, such requests may also be made via other communications means such as an intranet, an extranet or by a conventional voice telephone call.
- the retailer provides a unique identification number, obtained from a specific end-user, and an end-user specified time period during which delivery should take place, to the authority 100. Validation of the end-user identification number is performed by the authority 100 at step 320. In the event that additional security is required, validation may require the entry of a secret password. If the end-user identification number is valid (i.e.
- the authority 100 uses the provided information to generate an access code by means of processor 150 executing an encoding algorithm, at step 330.
- the processor 150 at step 340 updates the authorisations database 140.
- the lock location is extracted from the end-user address database 120 at step 350 and, together with the access code generated at step 330, is issued to the retailer by the authority 100, at step 360.
- the retailer is advised by the authority 100 that the access authorisation request was unsuccessful, at step 370. Processing then returns to waiting for a further access authorisation request.
- Access authorisation requests may also originate from an end-user.
- an end-user could provide the delivery information either to the retailer or directly to a delivery agent.
- Fig. 4 illustrates the structure of a lock 400, corresponding to locks 170, 171 ... 170 + n.
- a processor 410 is connected to a keypad 420 for entry of an access code, by a delivery agent, to gain access to a secure container 160, 161 ... 160 + n. Physical access to a secure container 160, 161 ... 160 + n is controlled by a lock mechanism 430 under the control of the processor 410.
- the processor 410 is also connected to a memory 440 for storage and processing of a computer programme that includes a software algorithm for decoding and determining the validity of an access code entered via the keypad 420. This decoding algorithm is complementary to the encoding algorithm used by the authority 100, in respect of a specific lock 170, 171 ... 170 + n.
- the processor 410 is further connected to a real time clock 450 and a display 460.
- An end-user may gain access to a secure container 160, 161 ... 160 + n by means of a mechanical key for locking and unlocking of a lock 400.
- the key is physically inserted and turned in the lock mechanism 430.
- Fig. 5 illustrates the procedure followed by the software programme contained in the memory 440 of the lock 400.
- Access to a secure container 160, 161 .... 160 + n is requested by the entry of an access code at the keypad 420 (step 510).
- processor 410 determines whether the particular access code entered is valid. Validity is determined according to the current date and/or time or according to the number of remaining allowable access occurrences. Prior access is determined with reference to a used access code database stored in the memory 440. If the access code is no longer valid (Y), the lock 400 reverts to waiting for entry of a further access code, at step 510.
- the processor 410 proceeds to perform further validation of the entered access code using a specific secrecy algorithm stored in the memory 440 and the time and date obtained from the real time clock 450, at step 530. If this validation fails (N), at decision step 550, an unsuccessful access attempt is signalled via a LED on the keypad 420 at step 540. Processing then reverts to waiting for the entry of a further access code at step 510. However, if validation was successful and access to secure container 160, 161 ... 160 + n is to be granted (Y), at step 550, it is further determined, at decision step 560, whether the specific access code may be valid for another access (i.e., a multiple access code).
- the access code is not valid for another access (N)
- the used number database is updated at step 570 and the lock mechanism 430 is activated to enable access to the secure container, at step 580. If the specific access code is valid for another access (Y), the lock mechanism 430 is likewise activated to enable access to the secured delivery container, at step 580.
- An exemplary decoding system for a lock 400 typically uses a series of random numbers unique to the particular lock and which are stored in the non-volatile memory 440 of the lock (sometimes referred to as "one time pad").
- the random numbers are known to the authority granting access and represent different access parameters, for example, the number of times access is permitted and the period of time a code is valid.
- the specific secrecy algorithm includes one or more mathematical and/or logical functions that are processed by the processor 410 to decrypt the entered code for comparison with the series of numbers stored in the non-volatile memory 440 so as to determine whether access should be granted at any particular time.
- the processor 410, non-volatile memory 440 and "one time pad" functionality allow virtually unlimited flexibility in establishing access parameters for any given lock, while providing very high levels of security.
- a more detailed example is presented, of a decoding algorithm employed in a lock 400, in respect of an eight digit code generated by the authority 100. The steps of the algorithm are as follows:
- the system described is applied to tightly defined user groups such as sporting facilities, accommodation facilities, utility facilities and building sites.
- the owner or administrator of a facility, for which access restriction is required acts as the authority 100.
- the second embodiment differs from the first embodiment in that there is no independent third-party authority 100.
- the authority software program is installed on a stand-alone personal computer or computer system of the facility owner or administrator.
- One or more locks 400 are installed to access points such as doors and gates of the facility in respect of which access is to be restricted.
- An end-user identification number is entered at step 600. If the end-user is a new end-user (i.e. previously unknown to authority 100) (Y), at decision step 610, the new end-user is registered at step 620. Registration includes loading of specific details of the end-user, including restricted access dates and times or number of access occurrences allowed. An access code is then generated, at step 640, and issued to the end-user at step 650. If the end-user is not a new end-user (N), at decision step 610, decision step 630 determines whether a new access code is required to be generated for an existing end- user. If a new access code is required (Y), the new access code is generated at step 640 and issued to the end-user at step 650. If a new access code is not required (N), processing returns to waiting for entry of a further end-user identification number.
- club members might be issued with an annual pass, which remains valid for a period of one year.
- Temporary members might be issued with an access code with a validity period of one week, say.
- a tradesman, contracted to undertake maintenance at the club might be issued with an access code valid for one day or for a single entry.
- Entry of an access code at the keypad 420 of a lock 400, by a registered end-user, is equivalent to that of a delivery agent in the first embodiment, as described in relation to Figs. 4 and 5.
- This arrangement applies to houses or dwellings, including holiday homes and cabins.
- the owner of a dwelling installs a lock as described hereinbefore to one or more access points through which access is to be granted at specified times. Examples of persons who may be granted access include tradespeople, delivery agents, cleaners, friends, family and tenants renting a property for a specified period of time.
- the lock/s can be supplied with access code generation software to be installed on a computer system by the owner, or an agent of the owner, of the dwelling.
- the owner can generate access codes using a website provided on the
- a 1-900 telephone link, or alternative reduced cost link, can be utilised for this purpose.
- All forms of code generation allow the owner of the dwelling to specify a time- defined single, multiple or periodic access to the dwelling by any party provided with an appropriate code.
- a delivery agent may require a single access at a specified time.
- a cleaner may require multiple accesses during a specified period each week.
- a tradesperson may require access during business hours for a defined number of hours, days, or months.
- a tenant may require access for days or weeks. All access attempts, whether successful or not, are stored in the memory of the lock for audit trail purposes.
- This arrangement provides access by workers to controlled sites, areas or rooms, examples of which include a copy room, computer room, lifts, toilets, kitchen areas, areas or sites such as a remote network facility to which access is required infrequently by a range of people, and any area deemed unsuitable for general access by the relevant authority.
- Examples of typical access requirements include senior management access to executive toilets which could be regulated on a daily, weekly or monthly basis, after hours access to kitchen and toilet areas by cleaners, and single access to a computer room for service by external IT technicians.
- Lock/s as described hereinbefore, are installed on one or more doors to the controlled areas. Locks may be added to or deleted from the system as required.
- the lock/s are supplied with code generation software, which is typically installed on a computer system by a relevant authority. A single code generation software program is normally sufficient for generating codes for all the locks.
- Any employee or person can be provided with one or more access codes to any controlled area in the building at the discretion of the authority controlling the code generation software for the locks.
- the system may be configured so that employees are able to access the code generation system via an intranet link and, subject to password validation, generate access codes to gain access to controlled areas.
- access codes could be obtained by request from an authority controlling the code generation software and satisfying the authority that the required access is legitimate.
- the generated codes thus provide time-defined single, multiple or periodic access to the specified controlled area/s. All access attempts, whether successful or not, are stored in the memory of the lock for audit trail purposes.
- This arrangement relates to emergency access by fire authorities.
- emergency access is via a key held by the fire brigade or by the demolition of doors.
- Lock/s are installed on one or more doors of the relevant building and interfaced to the fire alarm system of the building.
- an access code is generated either at the building premises or at a fire alarm monitoring company and is passed to the fire brigade with the alarm notification.
- the fire brigade is thus able to respond to the emergency and gain access to one or more designated entry points to the building.
- This embodiment relates to access to temporary storage provided to the general public at transportation terminals.
- Lock/s are installed on lockers at the storage facility.
- the facility is further equipped with an access code dispenser that essentially comprises a computer system executing an access code generation software program. Upon receipt of a payment, the dispenser allocates an access code for a particular locker for a pre- determined period of time. Upon entry of the access code by a user, via a key pad external to the locker, access to the locker is granted.
- a lock as described hereinbefore, fitted to an appropriate cabinet or room can substitute for a "time delay" safe by providing time-defined coded access.
- the system can provide the possibility of silently triggering an alarm in the event of a robbery.
- a lock as described hereinbefore, and fitted to an appropriate cabinet or room substitutes for this dual key approach by providing relevant authorised staff with a code for the drug cabinet at the beginning of a shift.
- the lock (or locks) are configured to require two separate codes to permit entry to the cabinet, thus requiring a "supervisor” code and "prescribing staff member” code to be entered.
- a bar code reader can also be used to facilitate tracking of drugs as the time a prescribing staff member gained access to the cabinet is recorded in the lock and can be periodically retrieved from the lock to match the records generated by the bar code reader.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001272225A AU2001272225A1 (en) | 2000-07-20 | 2001-07-20 | Access method and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AUPQ008900 | 2000-07-20 | ||
AUPQ8900 | 2000-07-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002008551A1 true WO2002008551A1 (en) | 2002-01-31 |
Family
ID=3814293
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2001/000883 WO2002008551A1 (en) | 2000-07-20 | 2001-07-20 | Access method and system |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2002008551A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1646937A2 (en) * | 2003-07-18 | 2006-04-19 | CoreStreet, Ltd. | Controlling access to an area |
EP1650716A1 (en) * | 2004-10-25 | 2006-04-26 | Leicher Projekt GmbH | Method for managing the user rights of an object protected by a code |
WO2009086635A2 (en) * | 2008-01-07 | 2009-07-16 | Adams Albert G | Electro-mechanical leverlock with switching system |
CN101065789B (en) * | 2003-07-18 | 2010-05-26 | 科尔街有限公司 | Logging access attempts to an area |
AU2006200187B2 (en) * | 2003-07-18 | 2010-08-26 | Assa Abloy Ab | Controlling access to an area |
US9158288B2 (en) | 1995-10-24 | 2015-10-13 | Assa Abloy Ab | Logging access attempts to an area |
US10255736B2 (en) | 2014-04-18 | 2019-04-09 | Ademco Inc. | System and method to access/restrict a security system for temporary users using a mobile application |
US11854329B2 (en) | 2019-05-24 | 2023-12-26 | Ademco Inc. | Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device |
US12118481B2 (en) | 2021-04-12 | 2024-10-15 | Alarm.Com Incorporated | Scheduled temporary rental property access |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0152678A2 (en) * | 1984-02-13 | 1985-08-28 | James W. Raymond | Electronic lock and key system for hotels and the like |
US4870400A (en) * | 1988-01-26 | 1989-09-26 | Yale Security Inc. | Electronic door lock key re-sequencing function |
US5204663A (en) * | 1990-05-21 | 1993-04-20 | Applied Systems Institute, Inc. | Smart card access control system |
US5260551A (en) * | 1990-12-03 | 1993-11-09 | Trioving A.S | Time controlled lock system |
US5591950A (en) * | 1992-11-04 | 1997-01-07 | Talleres De Escoriaza, S.A. (Tesa) | Programmable electronic lock |
US6005487A (en) * | 1990-05-11 | 1999-12-21 | Medeco Security Locks, Inc. | Electronic security system with novel electronic T-handle lock |
-
2001
- 2001-07-20 WO PCT/AU2001/000883 patent/WO2002008551A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0152678A2 (en) * | 1984-02-13 | 1985-08-28 | James W. Raymond | Electronic lock and key system for hotels and the like |
US4870400A (en) * | 1988-01-26 | 1989-09-26 | Yale Security Inc. | Electronic door lock key re-sequencing function |
US6005487A (en) * | 1990-05-11 | 1999-12-21 | Medeco Security Locks, Inc. | Electronic security system with novel electronic T-handle lock |
US5204663A (en) * | 1990-05-21 | 1993-04-20 | Applied Systems Institute, Inc. | Smart card access control system |
US5260551A (en) * | 1990-12-03 | 1993-11-09 | Trioving A.S | Time controlled lock system |
US5591950A (en) * | 1992-11-04 | 1997-01-07 | Talleres De Escoriaza, S.A. (Tesa) | Programmable electronic lock |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9158288B2 (en) | 1995-10-24 | 2015-10-13 | Assa Abloy Ab | Logging access attempts to an area |
EP1646937A2 (en) * | 2003-07-18 | 2006-04-19 | CoreStreet, Ltd. | Controlling access to an area |
EP1646937A4 (en) * | 2003-07-18 | 2007-09-12 | Corestreet Ltd | Controlling access to an area |
CN101065789B (en) * | 2003-07-18 | 2010-05-26 | 科尔街有限公司 | Logging access attempts to an area |
AU2006200187B2 (en) * | 2003-07-18 | 2010-08-26 | Assa Abloy Ab | Controlling access to an area |
EP1650716A1 (en) * | 2004-10-25 | 2006-04-26 | Leicher Projekt GmbH | Method for managing the user rights of an object protected by a code |
WO2009086635A2 (en) * | 2008-01-07 | 2009-07-16 | Adams Albert G | Electro-mechanical leverlock with switching system |
WO2009086635A3 (en) * | 2008-01-07 | 2009-09-11 | Adams Albert G | Electro-mechanical leverlock with switching system |
US10255736B2 (en) | 2014-04-18 | 2019-04-09 | Ademco Inc. | System and method to access/restrict a security system for temporary users using a mobile application |
US11854329B2 (en) | 2019-05-24 | 2023-12-26 | Ademco Inc. | Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device |
US12118481B2 (en) | 2021-04-12 | 2024-10-15 | Alarm.Com Incorporated | Scheduled temporary rental property access |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7170998B2 (en) | Door access control and key management system and the method thereof | |
US6747564B1 (en) | Security guarantee method and system | |
CN108269330B (en) | Access control method, device and system | |
US20070247276A1 (en) | Electronic or automatic identification method to remotely manage a lock or access point to a secure distribution receptacle, via the Internet or wireless communication network | |
US20070266081A1 (en) | Remotely managed lock or access point, via the Internet, to a distribution receptacle or secure location | |
US10055918B2 (en) | System and method for providing secure and anonymous personal vaults | |
JP5368543B2 (en) | Rental housing management system | |
WO2005078668A1 (en) | Access administration system and method for a currency compartment | |
US11043049B2 (en) | Access control system bypass for audit and electronic safe locks | |
WO2002008551A1 (en) | Access method and system | |
JP2019138027A (en) | Cabinet management device | |
US20020138740A1 (en) | Locked portal unlocking control apparatus and method | |
EP1261941B1 (en) | Management of permit codes | |
US11416919B2 (en) | System and method for retrieving an unlock code via electronic messaging | |
JP7492705B2 (en) | Indoor Use Management System | |
JP4965965B2 (en) | Rental housing management system | |
WO2018218297A1 (en) | Physical access control systems and methods | |
CA2360120C (en) | Door access control and key management system and the method thereof | |
JP2005155236A (en) | Lock opening and closing control system | |
US12014294B2 (en) | System and method for transmitting unlock codes based on event triggers | |
JP7183318B2 (en) | Storage management device | |
US11538098B2 (en) | System and method for randomly generating and associating unlock codes and lock identifiers | |
KR20240008242A (en) | System and method for randomly generating and associating unlock codes and lock identifiers | |
JP2007002477A (en) | Key system for rental house | |
GB2620666A (en) | System and method for randomly generating and associating unlock codes and lock identifiers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
ENP | Entry into the national phase |
Ref document number: 2003134018 Country of ref document: RU Kind code of ref document: A Format of ref document f/p: F |
|
NENP | Non-entry into the national phase |
Ref country code: JP |