WO2002008551A1 - Access method and system - Google Patents

Access method and system Download PDF

Info

Publication number
WO2002008551A1
WO2002008551A1 PCT/AU2001/000883 AU0100883W WO0208551A1 WO 2002008551 A1 WO2002008551 A1 WO 2002008551A1 AU 0100883 W AU0100883 W AU 0100883W WO 0208551 A1 WO0208551 A1 WO 0208551A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
access code
secured facility
authority
code
Prior art date
Application number
PCT/AU2001/000883
Other languages
French (fr)
Inventor
Craig John Rochfort
Richard Ian Marshall
Adam James Smith
Andrew Samuel Palframan
Original Assignee
Codesmart Access Systems Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Codesmart Access Systems Pty Ltd filed Critical Codesmart Access Systems Pty Ltd
Priority to AU2001272225A priority Critical patent/AU2001272225A1/en
Publication of WO2002008551A1 publication Critical patent/WO2002008551A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Definitions

  • the present invention relates generally to access control and, more particularly, to methods and systems for providing access to secured facilities.
  • Access control systems are employed to secure distinct areas and prevent unauthorised access of those areas.
  • areas include enclosed areas (such as fenced sports clubs etc.), buildings, vehicles and containers.
  • Conventional access control systems employ codes or tokens for verification of authorisation for access.
  • Typical tokens include keys, radio frequency identification cards and magnetic swipe cards.
  • tokens have to be physically distributed to users and are thus vulnerable to loss or theft.
  • tokens are usable until the verification device at the point of access is reprogrammed.
  • Conventional code-based access systems grant access to a user on input of a valid identification code.
  • On-line access control systems are common, particularly for the case of a large number of users, h this instance, control of access and/or reprogramming of one or more verification devices are performed by a central controller. This necessitates the use of a communications link between the central controller and the verification devices.
  • computer networks and telephone lines are typically employed as a medium for communication.
  • a further potential application for access control systems is the securing of containers for the storing of goods.
  • One particular type of container might be for the secure delivery (or pick up) of goods at an unmanned location.
  • An example might be the ordering of goods via telephone or the Internet for delivery to a person's home.
  • Obvious logistical problems are encountered, as a person needs to be present to accept delivery of the goods.
  • Various secure storage containers have been proposed for this purpose, which seek to provide security against unauthorised access.
  • these systems rely on communications links such as telephone lines to provide security against unauthorised access. This inevitably results in an increase in cost and complexity of the system, higher failure rate due to reliance on third party communication networks and higher initial hardware and maintenance costs.
  • a method of authorising access to a secured facility by an authority to one or more parties includes the steps of validating an end-user by the authority, acquiring access information from the end-user by the authority, and providing an access code to the one or more parties by the authority for accessing the secured facility.
  • An authorisation verification device is located at the secured facility which is incommunicable with the authority. The validity of the access code is restricted for access of the secured facility during a specific time period.
  • a system for authorising access to a secured facility by an authority to one or more parties includes means for validating an end-user by the authority, means for acquiring access information from the end-user by the authority, and means for providing an access code to the one or more parties by the authority for accessing the secured facility.
  • An authorisation verification device is located at the secured facility, which is incommunicable with the authority. The validity of the access code is restricted for access of the secured facility during a specific time period.
  • a method of verifying authorisation provided by an authority to one or more parties for access to a secured facility is provided.
  • the method includes the steps of receiving an access code from one of the parties, generating a representation of the access code according to a decoding algorithm, and verifying validity of the access code using the representation of the access code by an authorisation verification device located at the secured facility.
  • the authorisation verification device is incommunicable with the authority and the validity of teh access code is restricted for access of the secured facility during a specific time period.
  • an authorisation verification device for verifying authorisation provided by an authority to one or more parties for access to a secured facility.
  • the device includes means for receiving an access code from one of the parties, means for generating a representation of the access code according to a decoding algorithm and means for verifying validity of the access code, using the representation of the access code.
  • the device is located at the secured facility and is incommunicable with the authority. The validity of the access code is restricted for access of the secured facility during a specific time period.
  • a method of selectively providing access to a secured facility includes the steps of generating and submitting an access code to a lock device operable to validate the access code and, upon successful validation of the access code, providing access to the secured facility.
  • the code is valid for access of the secured facility during a specified time period only.
  • a system for selectively providing access to a secured facility includes processing means for generating an access code and a lock device.
  • the lock device includes receiving means for receiving an access code, processing means for validating the access code and means for providing access to the secured facility in response to successful validation of the access code.
  • the access code is valid for access of the secured facility during a specified time period only.
  • the validity of an access code may further be restricted to a specific number of access occurrences of said secured facility.
  • Fig. 1 is a block diagram that illustrates a system according to a first embodiment of the present invention
  • Fig. 2 is a flowchart that illustrates processing of a purchase or delivery request
  • Fig. 3 is a flowchart that illustrates processing of an access request by an authority
  • Fig. 4 illustrates a block diagram of a lock in accordance with any one of the embodiments of the present invention
  • Fig. 5 is a flowchart of the software program operating in the lock of Fig. 4.
  • Fig. 6 is a flowchart that illustrates an application of the present invention according to a second embodiment.
  • Fig. 1 shows an authority 100 and a number of secure containers 160, 161 .... 160 + n.
  • Secure containers 160, 161 ... 160 + n are installed remotely and independently from one another and from the authority 100.
  • Secure containers 160, 161 ... 160 + n are secured by locks 170, 171 ... 170 + n, respectively.
  • Each of locks 170, 171 ... 170 + n include electronic circuits for entry of an access code by a delivery agent and a lock mechanism which may be activated in response to a valid code being entered by the delivery agent, thus providing access to secure containers 160, 161 .... 160 + n.
  • the authority 100 includes a processor 150, which is connected to an end-user database 110, an end-user address database 120 and a lock identification number and algorithm database 130.
  • the end-user database 110 contains a list of end-users of secure containers 160, 161 .... 160 + n and the end-user address database 120 contains the physical address at which each of secure containers 160, 161 ... 160 + n are installed, corresponding to the end-user database 110.
  • the lock identification number and algorithm database 130 contains a unique identification number in respect of each lock 170, 171 .... 170 + n which form part of secure containers 160, 161 ... 160 + n, respectively, and a reference to the particular software algorithm installed in each of locks 170, 171 ... 170 + n.
  • the authority 100 has the ability to generate access codes, by means of an encoding algorithm, for any of locks 170, 171 ... 170 + n in order to allow single or multiple access occurrences to secure containers 160, 161 .... 160 + n, respectively. Once such a code has been generated, by the authority 100, processor 150 also updates the authorisations database 140.
  • Fig. 2 shows an application of the system described in Fig. 1 in respect of the processing of a purchase or delivery request from an end-user.
  • a retailer receives a purchase or delivery request, typically via an Internet web site of the retailer, at step 200. However, such requests may also be made via other communications means such as an intranet, an extranet or by a conventional voice telephone call.
  • the end-user further provides a unique identification number, which was issued by the authority 100, and a specified time period during which delivery should take place, to the retailer.
  • the retailer then proceeds to request access authorisation and delivery information from the authority 100, via the Internet web site of the authority 100, by providing the identification number of the end-user and the specified time period for delivery, at step 210.
  • the authority 100 issues delivery information to the retailer, including an access code corresponding to the specific secure container 160, 161 ... 160 + n of the end-user from whom the request originated and the physical address of the specific secure container, at step 230.
  • the delivery information is issued to a delivery agent, by the retailer, at step 240.
  • the delivery agent uses the supplied access code to gain access to the specific secure container, within the allotted time period, to deliver the goods.
  • the end-user identification code is invalid (N)
  • the end-user is advised that the request was unsuccessful, at step 260. Processing then returns to waiting for a further purchase or delivery request from an end-user.
  • Fig. 3 illustrates the processing, by the authority 100, of an access authorisation request received from a retailer.
  • the authority 100 receives an access authorisation request, typically via the Internet web site of the authority 100, at step 310. However, such requests may also be made via other communications means such as an intranet, an extranet or by a conventional voice telephone call.
  • the retailer provides a unique identification number, obtained from a specific end-user, and an end-user specified time period during which delivery should take place, to the authority 100. Validation of the end-user identification number is performed by the authority 100 at step 320. In the event that additional security is required, validation may require the entry of a secret password. If the end-user identification number is valid (i.e.
  • the authority 100 uses the provided information to generate an access code by means of processor 150 executing an encoding algorithm, at step 330.
  • the processor 150 at step 340 updates the authorisations database 140.
  • the lock location is extracted from the end-user address database 120 at step 350 and, together with the access code generated at step 330, is issued to the retailer by the authority 100, at step 360.
  • the retailer is advised by the authority 100 that the access authorisation request was unsuccessful, at step 370. Processing then returns to waiting for a further access authorisation request.
  • Access authorisation requests may also originate from an end-user.
  • an end-user could provide the delivery information either to the retailer or directly to a delivery agent.
  • Fig. 4 illustrates the structure of a lock 400, corresponding to locks 170, 171 ... 170 + n.
  • a processor 410 is connected to a keypad 420 for entry of an access code, by a delivery agent, to gain access to a secure container 160, 161 ... 160 + n. Physical access to a secure container 160, 161 ... 160 + n is controlled by a lock mechanism 430 under the control of the processor 410.
  • the processor 410 is also connected to a memory 440 for storage and processing of a computer programme that includes a software algorithm for decoding and determining the validity of an access code entered via the keypad 420. This decoding algorithm is complementary to the encoding algorithm used by the authority 100, in respect of a specific lock 170, 171 ... 170 + n.
  • the processor 410 is further connected to a real time clock 450 and a display 460.
  • An end-user may gain access to a secure container 160, 161 ... 160 + n by means of a mechanical key for locking and unlocking of a lock 400.
  • the key is physically inserted and turned in the lock mechanism 430.
  • Fig. 5 illustrates the procedure followed by the software programme contained in the memory 440 of the lock 400.
  • Access to a secure container 160, 161 .... 160 + n is requested by the entry of an access code at the keypad 420 (step 510).
  • processor 410 determines whether the particular access code entered is valid. Validity is determined according to the current date and/or time or according to the number of remaining allowable access occurrences. Prior access is determined with reference to a used access code database stored in the memory 440. If the access code is no longer valid (Y), the lock 400 reverts to waiting for entry of a further access code, at step 510.
  • the processor 410 proceeds to perform further validation of the entered access code using a specific secrecy algorithm stored in the memory 440 and the time and date obtained from the real time clock 450, at step 530. If this validation fails (N), at decision step 550, an unsuccessful access attempt is signalled via a LED on the keypad 420 at step 540. Processing then reverts to waiting for the entry of a further access code at step 510. However, if validation was successful and access to secure container 160, 161 ... 160 + n is to be granted (Y), at step 550, it is further determined, at decision step 560, whether the specific access code may be valid for another access (i.e., a multiple access code).
  • the access code is not valid for another access (N)
  • the used number database is updated at step 570 and the lock mechanism 430 is activated to enable access to the secure container, at step 580. If the specific access code is valid for another access (Y), the lock mechanism 430 is likewise activated to enable access to the secured delivery container, at step 580.
  • An exemplary decoding system for a lock 400 typically uses a series of random numbers unique to the particular lock and which are stored in the non-volatile memory 440 of the lock (sometimes referred to as "one time pad").
  • the random numbers are known to the authority granting access and represent different access parameters, for example, the number of times access is permitted and the period of time a code is valid.
  • the specific secrecy algorithm includes one or more mathematical and/or logical functions that are processed by the processor 410 to decrypt the entered code for comparison with the series of numbers stored in the non-volatile memory 440 so as to determine whether access should be granted at any particular time.
  • the processor 410, non-volatile memory 440 and "one time pad" functionality allow virtually unlimited flexibility in establishing access parameters for any given lock, while providing very high levels of security.
  • a more detailed example is presented, of a decoding algorithm employed in a lock 400, in respect of an eight digit code generated by the authority 100. The steps of the algorithm are as follows:
  • the system described is applied to tightly defined user groups such as sporting facilities, accommodation facilities, utility facilities and building sites.
  • the owner or administrator of a facility, for which access restriction is required acts as the authority 100.
  • the second embodiment differs from the first embodiment in that there is no independent third-party authority 100.
  • the authority software program is installed on a stand-alone personal computer or computer system of the facility owner or administrator.
  • One or more locks 400 are installed to access points such as doors and gates of the facility in respect of which access is to be restricted.
  • An end-user identification number is entered at step 600. If the end-user is a new end-user (i.e. previously unknown to authority 100) (Y), at decision step 610, the new end-user is registered at step 620. Registration includes loading of specific details of the end-user, including restricted access dates and times or number of access occurrences allowed. An access code is then generated, at step 640, and issued to the end-user at step 650. If the end-user is not a new end-user (N), at decision step 610, decision step 630 determines whether a new access code is required to be generated for an existing end- user. If a new access code is required (Y), the new access code is generated at step 640 and issued to the end-user at step 650. If a new access code is not required (N), processing returns to waiting for entry of a further end-user identification number.
  • club members might be issued with an annual pass, which remains valid for a period of one year.
  • Temporary members might be issued with an access code with a validity period of one week, say.
  • a tradesman, contracted to undertake maintenance at the club might be issued with an access code valid for one day or for a single entry.
  • Entry of an access code at the keypad 420 of a lock 400, by a registered end-user, is equivalent to that of a delivery agent in the first embodiment, as described in relation to Figs. 4 and 5.
  • This arrangement applies to houses or dwellings, including holiday homes and cabins.
  • the owner of a dwelling installs a lock as described hereinbefore to one or more access points through which access is to be granted at specified times. Examples of persons who may be granted access include tradespeople, delivery agents, cleaners, friends, family and tenants renting a property for a specified period of time.
  • the lock/s can be supplied with access code generation software to be installed on a computer system by the owner, or an agent of the owner, of the dwelling.
  • the owner can generate access codes using a website provided on the
  • a 1-900 telephone link, or alternative reduced cost link, can be utilised for this purpose.
  • All forms of code generation allow the owner of the dwelling to specify a time- defined single, multiple or periodic access to the dwelling by any party provided with an appropriate code.
  • a delivery agent may require a single access at a specified time.
  • a cleaner may require multiple accesses during a specified period each week.
  • a tradesperson may require access during business hours for a defined number of hours, days, or months.
  • a tenant may require access for days or weeks. All access attempts, whether successful or not, are stored in the memory of the lock for audit trail purposes.
  • This arrangement provides access by workers to controlled sites, areas or rooms, examples of which include a copy room, computer room, lifts, toilets, kitchen areas, areas or sites such as a remote network facility to which access is required infrequently by a range of people, and any area deemed unsuitable for general access by the relevant authority.
  • Examples of typical access requirements include senior management access to executive toilets which could be regulated on a daily, weekly or monthly basis, after hours access to kitchen and toilet areas by cleaners, and single access to a computer room for service by external IT technicians.
  • Lock/s as described hereinbefore, are installed on one or more doors to the controlled areas. Locks may be added to or deleted from the system as required.
  • the lock/s are supplied with code generation software, which is typically installed on a computer system by a relevant authority. A single code generation software program is normally sufficient for generating codes for all the locks.
  • Any employee or person can be provided with one or more access codes to any controlled area in the building at the discretion of the authority controlling the code generation software for the locks.
  • the system may be configured so that employees are able to access the code generation system via an intranet link and, subject to password validation, generate access codes to gain access to controlled areas.
  • access codes could be obtained by request from an authority controlling the code generation software and satisfying the authority that the required access is legitimate.
  • the generated codes thus provide time-defined single, multiple or periodic access to the specified controlled area/s. All access attempts, whether successful or not, are stored in the memory of the lock for audit trail purposes.
  • This arrangement relates to emergency access by fire authorities.
  • emergency access is via a key held by the fire brigade or by the demolition of doors.
  • Lock/s are installed on one or more doors of the relevant building and interfaced to the fire alarm system of the building.
  • an access code is generated either at the building premises or at a fire alarm monitoring company and is passed to the fire brigade with the alarm notification.
  • the fire brigade is thus able to respond to the emergency and gain access to one or more designated entry points to the building.
  • This embodiment relates to access to temporary storage provided to the general public at transportation terminals.
  • Lock/s are installed on lockers at the storage facility.
  • the facility is further equipped with an access code dispenser that essentially comprises a computer system executing an access code generation software program. Upon receipt of a payment, the dispenser allocates an access code for a particular locker for a pre- determined period of time. Upon entry of the access code by a user, via a key pad external to the locker, access to the locker is granted.
  • a lock as described hereinbefore, fitted to an appropriate cabinet or room can substitute for a "time delay" safe by providing time-defined coded access.
  • the system can provide the possibility of silently triggering an alarm in the event of a robbery.
  • a lock as described hereinbefore, and fitted to an appropriate cabinet or room substitutes for this dual key approach by providing relevant authorised staff with a code for the drug cabinet at the beginning of a shift.
  • the lock (or locks) are configured to require two separate codes to permit entry to the cabinet, thus requiring a "supervisor” code and "prescribing staff member” code to be entered.
  • a bar code reader can also be used to facilitate tracking of drugs as the time a prescribing staff member gained access to the cabinet is recorded in the lock and can be periodically retrieved from the lock to match the records generated by the bar code reader.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A method and system for selectively providing access to a secured facility are disclosed. The method includes the steps of generating and submitting an access code to a lock device operable to validate the access code and, upon successful validation of the access code, providing access to the secured facility. The code is valid for access of the secured facility during a specified time period only.

Description

ACCESS METHOD AND SYSTEM
Field of the Invention
The present invention relates generally to access control and, more particularly, to methods and systems for providing access to secured facilities.
Background
Access control systems are employed to secure distinct areas and prevent unauthorised access of those areas. Such areas include enclosed areas (such as fenced sports clubs etc.), buildings, vehicles and containers.
Conventional access control systems employ codes or tokens for verification of authorisation for access. Typical tokens include keys, radio frequency identification cards and magnetic swipe cards. However, such tokens have to be physically distributed to users and are thus vulnerable to loss or theft. Furthermore, tokens are usable until the verification device at the point of access is reprogrammed. Conventional code-based access systems grant access to a user on input of a valid identification code.
On-line access control systems are common, particularly for the case of a large number of users, h this instance, control of access and/or reprogramming of one or more verification devices are performed by a central controller. This necessitates the use of a communications link between the central controller and the verification devices. For cases where the verification device is remotely located to the central controller, computer networks and telephone lines are typically employed as a medium for communication.
A further potential application for access control systems is the securing of containers for the storing of goods. One particular type of container might be for the secure delivery (or pick up) of goods at an unmanned location. An example might be the ordering of goods via telephone or the Internet for delivery to a person's home. Obvious logistical problems are encountered, as a person needs to be present to accept delivery of the goods. Various secure storage containers have been proposed for this purpose, which seek to provide security against unauthorised access. However, these systems rely on communications links such as telephone lines to provide security against unauthorised access. This inevitably results in an increase in cost and complexity of the system, higher failure rate due to reliance on third party communication networks and higher initial hardware and maintenance costs.
The foregoing description highlights significant disadvantages associated with on-line access control systems and the use of physical tokens. A need thus exists to provide a system and method of access control that substantially overcomes, or at least ameliorates, one or more deficiencies of existing arrangements.
Summary
According to an aspect of the present invention, there is provided a method of authorising access to a secured facility by an authority to one or more parties. The method includes the steps of validating an end-user by the authority, acquiring access information from the end-user by the authority, and providing an access code to the one or more parties by the authority for accessing the secured facility. An authorisation verification device is located at the secured facility which is incommunicable with the authority. The validity of the access code is restricted for access of the secured facility during a specific time period.
According to another aspect of the present invention, there is provided a system for authorising access to a secured facility by an authority to one or more parties. The system includes means for validating an end-user by the authority, means for acquiring access information from the end-user by the authority, and means for providing an access code to the one or more parties by the authority for accessing the secured facility. An authorisation verification device is located at the secured facility, which is incommunicable with the authority. The validity of the access code is restricted for access of the secured facility during a specific time period. According to a further aspect of the present invention, there is provided a method of verifying authorisation provided by an authority to one or more parties for access to a secured facility. The method includes the steps of receiving an access code from one of the parties, generating a representation of the access code according to a decoding algorithm, and verifying validity of the access code using the representation of the access code by an authorisation verification device located at the secured facility. The authorisation verification device is incommunicable with the authority and the validity of teh access code is restricted for access of the secured facility during a specific time period.
According to a still further aspect of the present invention, there is provided an authorisation verification device for verifying authorisation provided by an authority to one or more parties for access to a secured facility. The device includes means for receiving an access code from one of the parties, means for generating a representation of the access code according to a decoding algorithm and means for verifying validity of the access code, using the representation of the access code. The device is located at the secured facility and is incommunicable with the authority. The validity of the access code is restricted for access of the secured facility during a specific time period.
According to another aspect of the present invention, there is provided a method of selectively providing access to a secured facility. The method includes the steps of generating and submitting an access code to a lock device operable to validate the access code and, upon successful validation of the access code, providing access to the secured facility. The code is valid for access of the secured facility during a specified time period only.
According to yet another aspect of the present invention, there is provided a system for selectively providing access to a secured facility. The system includes processing means for generating an access code and a lock device. The lock device includes receiving means for receiving an access code, processing means for validating the access code and means for providing access to the secured facility in response to successful validation of the access code. The access code is valid for access of the secured facility during a specified time period only.
The validity of an access code may further be restricted to a specific number of access occurrences of said secured facility.
Brief Description of the Drawings The foregoing and further aspects and advantages of the present invention will become more apparent from a consideration of the following description, the appended claims and the accompanying drawings, in which:
Fig. 1 is a block diagram that illustrates a system according to a first embodiment of the present invention;
Fig. 2 is a flowchart that illustrates processing of a purchase or delivery request
Figure imgf000006_0001
Fig. 3 is a flowchart that illustrates processing of an access request by an authority;
Fig. 4 illustrates a block diagram of a lock in accordance with any one of the embodiments of the present invention;
Fig. 5 is a flowchart of the software program operating in the lock of Fig. 4; and
Fig. 6 is a flowchart that illustrates an application of the present invention according to a second embodiment.
Detailed Description
According to a first embodiment of the present invention, Fig. 1 shows an authority 100 and a number of secure containers 160, 161 .... 160 + n. Secure containers 160, 161 ... 160 + n are installed remotely and independently from one another and from the authority 100. Secure containers 160, 161 ... 160 + n are secured by locks 170, 171 ... 170 + n, respectively. Each of locks 170, 171 ... 170 + n include electronic circuits for entry of an access code by a delivery agent and a lock mechanism which may be activated in response to a valid code being entered by the delivery agent, thus providing access to secure containers 160, 161 .... 160 + n. No communications links exist between the authority 100 and locks 170, 171 ... 170 + n.
The authority 100 includes a processor 150, which is connected to an end-user database 110, an end-user address database 120 and a lock identification number and algorithm database 130. The end-user database 110 contains a list of end-users of secure containers 160, 161 .... 160 + n and the end-user address database 120 contains the physical address at which each of secure containers 160, 161 ... 160 + n are installed, corresponding to the end-user database 110. The lock identification number and algorithm database 130 contains a unique identification number in respect of each lock 170, 171 .... 170 + n which form part of secure containers 160, 161 ... 160 + n, respectively, and a reference to the particular software algorithm installed in each of locks 170, 171 ... 170 + n.
The authority 100 has the ability to generate access codes, by means of an encoding algorithm, for any of locks 170, 171 ... 170 + n in order to allow single or multiple access occurrences to secure containers 160, 161 .... 160 + n, respectively. Once such a code has been generated, by the authority 100, processor 150 also updates the authorisations database 140.
Fig. 2 shows an application of the system described in Fig. 1 in respect of the processing of a purchase or delivery request from an end-user. A retailer receives a purchase or delivery request, typically via an Internet web site of the retailer, at step 200. However, such requests may also be made via other communications means such as an intranet, an extranet or by a conventional voice telephone call. The end-user further provides a unique identification number, which was issued by the authority 100, and a specified time period during which delivery should take place, to the retailer. The retailer then proceeds to request access authorisation and delivery information from the authority 100, via the Internet web site of the authority 100, by providing the identification number of the end-user and the specified time period for delivery, at step 210. If the end-user identification code is valid (Y), at decision step 220, the authority 100 issues delivery information to the retailer, including an access code corresponding to the specific secure container 160, 161 ... 160 + n of the end-user from whom the request originated and the physical address of the specific secure container, at step 230. The delivery information is issued to a delivery agent, by the retailer, at step 240. At step 250, the delivery agent uses the supplied access code to gain access to the specific secure container, within the allotted time period, to deliver the goods. In the event that the end-user identification code is invalid (N), at decision step 220, the end-user is advised that the request was unsuccessful, at step 260. Processing then returns to waiting for a further purchase or delivery request from an end-user.
Fig. 3 illustrates the processing, by the authority 100, of an access authorisation request received from a retailer. The authority 100 receives an access authorisation request, typically via the Internet web site of the authority 100, at step 310. However, such requests may also be made via other communications means such as an intranet, an extranet or by a conventional voice telephone call. The retailer provides a unique identification number, obtained from a specific end-user, and an end-user specified time period during which delivery should take place, to the authority 100. Validation of the end-user identification number is performed by the authority 100 at step 320. In the event that additional security is required, validation may require the entry of a secret password. If the end-user identification number is valid (i.e. known to the authority 100) (Y), at decision step 320, the authority 100 uses the provided information to generate an access code by means of processor 150 executing an encoding algorithm, at step 330. The processor 150 at step 340 updates the authorisations database 140. Finally, the lock location is extracted from the end-user address database 120 at step 350 and, together with the access code generated at step 330, is issued to the retailer by the authority 100, at step 360. In the event that the end-user identification number is invalid (unknown to the authority 100) (N), at decision step 320, the retailer is advised by the authority 100 that the access authorisation request was unsuccessful, at step 370. Processing then returns to waiting for a further access authorisation request.
Access authorisation requests may also originate from an end-user. In this case, an end-user could provide the delivery information either to the retailer or directly to a delivery agent.
Fig. 4 illustrates the structure of a lock 400, corresponding to locks 170, 171 ... 170 + n. A processor 410 is connected to a keypad 420 for entry of an access code, by a delivery agent, to gain access to a secure container 160, 161 ... 160 + n. Physical access to a secure container 160, 161 ... 160 + n is controlled by a lock mechanism 430 under the control of the processor 410. The processor 410 is also connected to a memory 440 for storage and processing of a computer programme that includes a software algorithm for decoding and determining the validity of an access code entered via the keypad 420. This decoding algorithm is complementary to the encoding algorithm used by the authority 100, in respect of a specific lock 170, 171 ... 170 + n. The processor 410 is further connected to a real time clock 450 and a display 460.
An end-user may gain access to a secure container 160, 161 ... 160 + n by means of a mechanical key for locking and unlocking of a lock 400. The key is physically inserted and turned in the lock mechanism 430.
Fig. 5 illustrates the procedure followed by the software programme contained in the memory 440 of the lock 400. Access to a secure container 160, 161 .... 160 + n is requested by the entry of an access code at the keypad 420 (step 510). At decision step 520, processor 410 determines whether the particular access code entered is valid. Validity is determined according to the current date and/or time or according to the number of remaining allowable access occurrences. Prior access is determined with reference to a used access code database stored in the memory 440. If the access code is no longer valid (Y), the lock 400 reverts to waiting for entry of a further access code, at step 510. Alternatively, if the validity of the access code is not in question (N), the processor 410 proceeds to perform further validation of the entered access code using a specific secrecy algorithm stored in the memory 440 and the time and date obtained from the real time clock 450, at step 530. If this validation fails (N), at decision step 550, an unsuccessful access attempt is signalled via a LED on the keypad 420 at step 540. Processing then reverts to waiting for the entry of a further access code at step 510. However, if validation was successful and access to secure container 160, 161 ... 160 + n is to be granted (Y), at step 550, it is further determined, at decision step 560, whether the specific access code may be valid for another access (i.e., a multiple access code). In the event that the access code is not valid for another access (N), at step 560, the used number database is updated at step 570 and the lock mechanism 430 is activated to enable access to the secure container, at step 580. If the specific access code is valid for another access (Y), the lock mechanism 430 is likewise activated to enable access to the secured delivery container, at step 580.
An exemplary decoding system for a lock 400 typically uses a series of random numbers unique to the particular lock and which are stored in the non-volatile memory 440 of the lock (sometimes referred to as "one time pad"). The random numbers are known to the authority granting access and represent different access parameters, for example, the number of times access is permitted and the period of time a code is valid. The specific secrecy algorithm includes one or more mathematical and/or logical functions that are processed by the processor 410 to decrypt the entered code for comparison with the series of numbers stored in the non-volatile memory 440 so as to determine whether access should be granted at any particular time. The processor 410, non-volatile memory 440 and "one time pad" functionality allow virtually unlimited flexibility in establishing access parameters for any given lock, while providing very high levels of security. A more detailed example is presented, of a decoding algorithm employed in a lock 400, in respect of an eight digit code generated by the authority 100. The steps of the algorithm are as follows:
1. Separate the eight digit code into two groups of four digits. 2. Extract from the lock's memory an encoded representation of time equivalent to a number represented by the first group of four digits, which is unique to the particular lock.
3. Extract from the lock's memory the number of access events permitted (e.g. one) and the period of time access is permitted in accordance with a number represented by the second group of four digits, which is also unique to the particular lock.
4. Check that the number has not previously been used more than the permitted number of times.
5. Check that the current time is within the permitted period of time from the time extracted in step 2, above.
6. If steps five and six are satisfied, allow access and record used code in memory.
In a second embodiment, the system described is applied to tightly defined user groups such as sporting facilities, accommodation facilities, utility facilities and building sites. For such applications, the owner or administrator of a facility, for which access restriction is required, acts as the authority 100. Thus, the second embodiment differs from the first embodiment in that there is no independent third-party authority 100. The authority software program is installed on a stand-alone personal computer or computer system of the facility owner or administrator. One or more locks 400 are installed to access points such as doors and gates of the facility in respect of which access is to be restricted.
Issue of access codes by the authority 100 is described according to the flow chart in Fig. 6. An end-user identification number is entered at step 600. If the end-user is a new end-user (i.e. previously unknown to authority 100) (Y), at decision step 610, the new end-user is registered at step 620. Registration includes loading of specific details of the end-user, including restricted access dates and times or number of access occurrences allowed. An access code is then generated, at step 640, and issued to the end-user at step 650. If the end-user is not a new end-user (N), at decision step 610, decision step 630 determines whether a new access code is required to be generated for an existing end- user. If a new access code is required (Y), the new access code is generated at step 640 and issued to the end-user at step 650. If a new access code is not required (N), processing returns to waiting for entry of a further end-user identification number.
It is thus possible to issue differently restricted access codes to various different types of end-user. For instance, club members might be issued with an annual pass, which remains valid for a period of one year. Temporary members might be issued with an access code with a validity period of one week, say. A tradesman, contracted to undertake maintenance at the club might be issued with an access code valid for one day or for a single entry.
Entry of an access code at the keypad 420 of a lock 400, by a registered end-user, is equivalent to that of a delivery agent in the first embodiment, as described in relation to Figs. 4 and 5.
A number of further application arrangements of using the lock of the present invention are described hereinafter.
Domestic Access Arrangement
This arrangement applies to houses or dwellings, including holiday homes and cabins. The owner of a dwelling installs a lock as described hereinbefore to one or more access points through which access is to be granted at specified times. Examples of persons who may be granted access include tradespeople, delivery agents, cleaners, friends, family and tenants renting a property for a specified period of time.
The lock/s can be supplied with access code generation software to be installed on a computer system by the owner, or an agent of the owner, of the dwelling.
Alternatively, the owner can generate access codes using a website provided on the
Internet or by telephone. A 1-900 telephone link, or alternative reduced cost link, can be utilised for this purpose.
All forms of code generation allow the owner of the dwelling to specify a time- defined single, multiple or periodic access to the dwelling by any party provided with an appropriate code. For example, a delivery agent may require a single access at a specified time. A cleaner may require multiple accesses during a specified period each week. A tradesperson may require access during business hours for a defined number of hours, days, or months. A tenant may require access for days or weeks. All access attempts, whether successful or not, are stored in the memory of the lock for audit trail purposes.
Office/Workplace Access Arrangement
This arrangement provides access by workers to controlled sites, areas or rooms, examples of which include a copy room, computer room, lifts, toilets, kitchen areas, areas or sites such as a remote network facility to which access is required infrequently by a range of people, and any area deemed unsuitable for general access by the relevant authority. Examples of typical access requirements include senior management access to executive toilets which could be regulated on a daily, weekly or monthly basis, after hours access to kitchen and toilet areas by cleaners, and single access to a computer room for service by external IT technicians. Lock/s, as described hereinbefore, are installed on one or more doors to the controlled areas. Locks may be added to or deleted from the system as required. The lock/s are supplied with code generation software, which is typically installed on a computer system by a relevant authority. A single code generation software program is normally sufficient for generating codes for all the locks.
Any employee or person can be provided with one or more access codes to any controlled area in the building at the discretion of the authority controlling the code generation software for the locks. Furthermore, the system may be configured so that employees are able to access the code generation system via an intranet link and, subject to password validation, generate access codes to gain access to controlled areas. Alternatively, access codes could be obtained by request from an authority controlling the code generation software and satisfying the authority that the required access is legitimate.
The generated codes thus provide time-defined single, multiple or periodic access to the specified controlled area/s. All access attempts, whether successful or not, are stored in the memory of the lock for audit trail purposes.
Emergency Fire Access Arrangement
This arrangement relates to emergency access by fire authorities. Typically, emergency access is via a key held by the fire brigade or by the demolition of doors.
Lock/s, as described hereinbefore, are installed on one or more doors of the relevant building and interfaced to the fire alarm system of the building. In the event of a fire alarm activation, an access code is generated either at the building premises or at a fire alarm monitoring company and is passed to the fire brigade with the alarm notification. The fire brigade is thus able to respond to the emergency and gain access to one or more designated entry points to the building. Transportation Terminal Luggage Locker Access Arrangement
This embodiment relates to access to temporary storage provided to the general public at transportation terminals.
Lock/s, as described hereinbefore, are installed on lockers at the storage facility. The facility is further equipped with an access code dispenser that essentially comprises a computer system executing an access code generation software program. Upon receipt of a payment, the dispenser allocates an access code for a particular locker for a pre- determined period of time. Upon entry of the access code by a user, via a key pad external to the locker, access to the locker is granted.
"Time delay " Safe Arrangement
Commonly, retail operations employ a "time delay" safe to protect personnel from personal attack aimed at forcing opening of a safe containing the retailer's takings, while still pennitting access to the safe periodically for banking purposes and obtain cash float for a register. A lock, as described hereinbefore, fitted to an appropriate cabinet or room can substitute for a "time delay" safe by providing time-defined coded access. Alternatively, by requiring a manager or accessing person to obtain an access code from a remote authority, the system can provide the possibility of silently triggering an alarm in the event of a robbery.
Drug Cabinet Arrangement
Major hospitals have elaborate procedures for securing drugs while providing legitimate access by medical staff. Typically, such procedures require two keys entrusted to different people. A lock, as described hereinbefore, and fitted to an appropriate cabinet or room substitutes for this dual key approach by providing relevant authorised staff with a code for the drug cabinet at the beginning of a shift. The lock (or locks) are configured to require two separate codes to permit entry to the cabinet, thus requiring a "supervisor" code and "prescribing staff member" code to be entered. A bar code reader can also be used to facilitate tracking of drugs as the time a prescribing staff member gained access to the cabinet is recorded in the lock and can be periodically retrieved from the lock to match the records generated by the bar code reader.
The foregoing methods and systems describe only a few arrangements and embodiments of the claimed invention, and modifications and/or changes can be made thereto without departing from the scope and spirit of the invention, the arrangements and embodiments being illustrative and not restrictive.

Claims

CLAIMSWe claim:
1. A method of authorising access to a secured facility by an authority to one or more parties, said method including the steps of: validating an end-user by said authority; acquiring access information by said authority, said access information originating from said end-user; and providing an access code to said one or more parties by said authority for accessing said secured facility, using an authorisation verification device located at said secured facility, wherein said authorisation verification device is incommunicable with said authority, and wherein the validity of said access code is restricted for access of said secured facility during a specific time period.
2. A method according to claim 1, wherein the validity of said access code is further restricted for a specific number of access occurrences of said secured facility.
3. A method according to claim 2, wherein said access information originating from said end-user includes one or more restrictions from the group consisting of: the specific time period for access; and the specific number of access occurrences.
4. A method according to any one of claims 1, 2 and 3, wherein interaction between said one or more parties and said authority is via a communications means selected from the group of consisting of the Internet, an intranet, an extranet and a telephone call.
5. A system for authorising access to a secured facility by an authority to one or more parties, including: means for validating an end-user by said authority; means for acquiring access information originating from said end-user by said authority; and means for providing an access code to said one or more parties by said authority for accessing said secured facility, using an authorisation verification device located at said secured facility, wherein said authorisation verification device is incommunicable with said authority, and wherein the validity of said access code is restricted for access of said secured facility during a specific time period.
6. A system according to claim 5, wherein the validity of said access code is further restricted for a specific number of access occurrences of said secured facility.
7. A system according to claim 6, wherein said access information originating from said end-user includes one or more restrictions selected from the group consisting of: the specific time period; and the specific number of access occurrences.
8. A system according to any one of claims 5, 6 and 7, wherein interaction between said one or more parties and said authority is via a communications means selected from the group of consisting of the Internet, an intranet, an extranet and a telephone call.
9. A method of verifying authorisation provided by an authority to one or more parties for access to a secured facility, said method including the steps of: receiving an access code from one of said parties; generating a representation of said access code according to a decoding algorithm; and verifying validity of said access code using said representation of said access code by an authorisation verification device located at said secured facility, wherein said authorisation verification device is incommunicable with said authority, and wherein the validity of said access code is restricted for access of said secured facility during a specific time period.
10. A method according to claim 9, wherein the validity of said access code is further restricted for a specific number of access occurrences of said secured facility.
11. An authorisation verification device for verifying authorisation provided by an authority to one or more parties for access to a secured facility, including: means for receiving an access code from one of said parties; means for generating a representation of said access code according to a decoding algorithm; and means for verifying validity of said access code, said means located at said secured facility, using said representation of said access code, wherein said authorisation verification device is incommunicable with said authority, and wherein the validity of said access code is restricted for access of said secured facility during a specific time period.
12. An authorisation verification device according to claim 11, wherein the validity of said access code is further restricted for a specific number of access occurrences of said secured facility.
13. A method of selectively providing access to a secured facility, said method including the steps of: generating an access code; and submitting said access code to a lock device, said lock device operable to validate said access code and, upon successful validation of said access code, to provide access to said secured facility; wherein said access code is valid for access of said secured facility during a specified time period only.
14. A method according to claim 13, wherein said access code is valid for a specific number of access occurrences of said secured facility.
15. A system for selectively providing access to a secured facility, including: processing means for generating an access code; and a lock device including: receiving means for receiving said access code; processing means for validating said access code; and means for providing access to said secured facility in response to successful validation of said access code; wherein said access code is valid for access of said secured facility during a specified time period only.
16. A system according to claim 15, wherein said means for providing access includes electro-mechanical means.
17. A system according to claim 15, wherein said access code is valid for a specific number of access occurrences of said secured facility.
18. A system according to claim 15, wherein said lock device requires successful validation of a plurality of access codes to provide access to said secured facility.
19. A system according to claim 15, including a plurality of said lock devices, wherein access to said secured facility is only provided in response to successful validation of different access codes in each of said plurality of lock devices.
PCT/AU2001/000883 2000-07-20 2001-07-20 Access method and system WO2002008551A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001272225A AU2001272225A1 (en) 2000-07-20 2001-07-20 Access method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPQ008900 2000-07-20
AUPQ8900 2000-07-20

Publications (1)

Publication Number Publication Date
WO2002008551A1 true WO2002008551A1 (en) 2002-01-31

Family

ID=3814293

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2001/000883 WO2002008551A1 (en) 2000-07-20 2001-07-20 Access method and system

Country Status (1)

Country Link
WO (1) WO2002008551A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1646937A2 (en) * 2003-07-18 2006-04-19 CoreStreet, Ltd. Controlling access to an area
EP1650716A1 (en) * 2004-10-25 2006-04-26 Leicher Projekt GmbH Method for managing the user rights of an object protected by a code
WO2009086635A2 (en) * 2008-01-07 2009-07-16 Adams Albert G Electro-mechanical leverlock with switching system
CN101065789B (en) * 2003-07-18 2010-05-26 科尔街有限公司 Logging access attempts to an area
AU2006200187B2 (en) * 2003-07-18 2010-08-26 Assa Abloy Ab Controlling access to an area
US9158288B2 (en) 1995-10-24 2015-10-13 Assa Abloy Ab Logging access attempts to an area
US10255736B2 (en) 2014-04-18 2019-04-09 Ademco Inc. System and method to access/restrict a security system for temporary users using a mobile application
US11854329B2 (en) 2019-05-24 2023-12-26 Ademco Inc. Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device
US12118481B2 (en) 2021-04-12 2024-10-15 Alarm.Com Incorporated Scheduled temporary rental property access

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0152678A2 (en) * 1984-02-13 1985-08-28 James W. Raymond Electronic lock and key system for hotels and the like
US4870400A (en) * 1988-01-26 1989-09-26 Yale Security Inc. Electronic door lock key re-sequencing function
US5204663A (en) * 1990-05-21 1993-04-20 Applied Systems Institute, Inc. Smart card access control system
US5260551A (en) * 1990-12-03 1993-11-09 Trioving A.S Time controlled lock system
US5591950A (en) * 1992-11-04 1997-01-07 Talleres De Escoriaza, S.A. (Tesa) Programmable electronic lock
US6005487A (en) * 1990-05-11 1999-12-21 Medeco Security Locks, Inc. Electronic security system with novel electronic T-handle lock

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0152678A2 (en) * 1984-02-13 1985-08-28 James W. Raymond Electronic lock and key system for hotels and the like
US4870400A (en) * 1988-01-26 1989-09-26 Yale Security Inc. Electronic door lock key re-sequencing function
US6005487A (en) * 1990-05-11 1999-12-21 Medeco Security Locks, Inc. Electronic security system with novel electronic T-handle lock
US5204663A (en) * 1990-05-21 1993-04-20 Applied Systems Institute, Inc. Smart card access control system
US5260551A (en) * 1990-12-03 1993-11-09 Trioving A.S Time controlled lock system
US5591950A (en) * 1992-11-04 1997-01-07 Talleres De Escoriaza, S.A. (Tesa) Programmable electronic lock

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9158288B2 (en) 1995-10-24 2015-10-13 Assa Abloy Ab Logging access attempts to an area
EP1646937A2 (en) * 2003-07-18 2006-04-19 CoreStreet, Ltd. Controlling access to an area
EP1646937A4 (en) * 2003-07-18 2007-09-12 Corestreet Ltd Controlling access to an area
CN101065789B (en) * 2003-07-18 2010-05-26 科尔街有限公司 Logging access attempts to an area
AU2006200187B2 (en) * 2003-07-18 2010-08-26 Assa Abloy Ab Controlling access to an area
EP1650716A1 (en) * 2004-10-25 2006-04-26 Leicher Projekt GmbH Method for managing the user rights of an object protected by a code
WO2009086635A2 (en) * 2008-01-07 2009-07-16 Adams Albert G Electro-mechanical leverlock with switching system
WO2009086635A3 (en) * 2008-01-07 2009-09-11 Adams Albert G Electro-mechanical leverlock with switching system
US10255736B2 (en) 2014-04-18 2019-04-09 Ademco Inc. System and method to access/restrict a security system for temporary users using a mobile application
US11854329B2 (en) 2019-05-24 2023-12-26 Ademco Inc. Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device
US12118481B2 (en) 2021-04-12 2024-10-15 Alarm.Com Incorporated Scheduled temporary rental property access

Similar Documents

Publication Publication Date Title
US7170998B2 (en) Door access control and key management system and the method thereof
US6747564B1 (en) Security guarantee method and system
CN108269330B (en) Access control method, device and system
US20070247276A1 (en) Electronic or automatic identification method to remotely manage a lock or access point to a secure distribution receptacle, via the Internet or wireless communication network
US20070266081A1 (en) Remotely managed lock or access point, via the Internet, to a distribution receptacle or secure location
US10055918B2 (en) System and method for providing secure and anonymous personal vaults
JP5368543B2 (en) Rental housing management system
WO2005078668A1 (en) Access administration system and method for a currency compartment
US11043049B2 (en) Access control system bypass for audit and electronic safe locks
WO2002008551A1 (en) Access method and system
JP2019138027A (en) Cabinet management device
US20020138740A1 (en) Locked portal unlocking control apparatus and method
EP1261941B1 (en) Management of permit codes
US11416919B2 (en) System and method for retrieving an unlock code via electronic messaging
JP7492705B2 (en) Indoor Use Management System
JP4965965B2 (en) Rental housing management system
WO2018218297A1 (en) Physical access control systems and methods
CA2360120C (en) Door access control and key management system and the method thereof
JP2005155236A (en) Lock opening and closing control system
US12014294B2 (en) System and method for transmitting unlock codes based on event triggers
JP7183318B2 (en) Storage management device
US11538098B2 (en) System and method for randomly generating and associating unlock codes and lock identifiers
KR20240008242A (en) System and method for randomly generating and associating unlock codes and lock identifiers
JP2007002477A (en) Key system for rental house
GB2620666A (en) System and method for randomly generating and associating unlock codes and lock identifiers

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
ENP Entry into the national phase

Ref document number: 2003134018

Country of ref document: RU

Kind code of ref document: A

Format of ref document f/p: F

NENP Non-entry into the national phase

Ref country code: JP