WO2002093501A1 - Environnement intelligent - Google Patents
Environnement intelligent Download PDFInfo
- Publication number
- WO2002093501A1 WO2002093501A1 PCT/US2001/015954 US0115954W WO02093501A1 WO 2002093501 A1 WO2002093501 A1 WO 2002093501A1 US 0115954 W US0115954 W US 0115954W WO 02093501 A1 WO02093501 A1 WO 02093501A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- appliance
- terminal
- uid
- database
- appliances
- Prior art date
Links
- 238000013475 authorization Methods 0.000 claims abstract description 37
- 238000000034 method Methods 0.000 claims abstract description 20
- 238000004891 communication Methods 0.000 claims description 9
- 230000008859 change Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000004378 air conditioning Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 230000008672 reprogramming Effects 0.000 description 1
- 238000012876 topography Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates generally to security. More particularly, the invention relates to a wireless lock and key system used to selectively prevent individuals from operating appliances when a predetermined set of criteria are met.
- Combinations locks are well known. Combination locks open only when a user has entered the correct combination code, usually a sequence of numbers.
- combination locks have many shortcomings. Many combination locks have the combination set at the factory, and the combination cannot be changed by the purchaser of the lock. In addition, once a person is given the combination, it cannot be taken away. Thus the only way to restrict access to an individual who knows the combination is to physically change the lock, which requires redistributing the new combination to each of the other prior users of the lock other than the restricted individual. Also, because a person can communicate the correct combination an unlimited number of times, there is potentially an unlimited number of persons who might know the correct combination.
- Combination locks also can't notify the owner if used without authorization.
- Key locks are also known in the art. Key locks open only when the correct physical key is inserted into the lock and turned, thus opening the locking mechanism. Key locks, however, also have several disadvantages. Physical keys are easily copied, potentially allowing unwanted copies to be created and given to unauthorized individuals. Additionally, if all physical keys for a given lock are lost, a locksmith must be hired to create a replacement key, often at great cost to the lock owner. As with combination locks, the owner of the lock is generally not notified if the lock is opened by a user without authorization.
- V-chip Another known means of restricting access to appliances, again with respect to .televisions, is the use of the V-chip, which is well known in the art.
- the V-chip only restricts access to a television, and not to additional appliances such as computers, ovens, stoves, lights, and the like.
- a lock and key system is needed that restricts access to multiple appliances while providing ease of adaptability by providing differing access levels to different users.
- a system is needed that allows an owner to give other people such as family members, houseguests, etc., differing rights to use different appliances, gives the owner a method to control who can use appliances and when they can use them, and gives the owner immediate notification if an appliance is used against his or her authority.
- a smart environment allows terminals to selectively control appliances.
- Each appliance prior to allowing control by one of the terminals, queries the authorization information to verify that the terminal is authorized to control that appliance.
- a method for allowing one or more terminals to selectively control one or more appliances in a smart environment Each terminal and each appliance has a UID.
- One of the terminals wirelessly transmits its UID to one of the appliances.
- the appliance queries an authorization database for the received UID.
- the appliance grants control to the terminal when the database contains predetermined authorization information corresponding to the terminal UID.
- the terminal may then wirelessly control the appliance.
- a wireless terminal that has a transceiver that communicates with an appliance.
- the wireless transceiver repetitively transmits its unique identifier (UID), and listens for an appliance UID transmitted by the appliance.
- the terminal also has a memory for storing computer data.
- the computer data includes the terminal's unique identifier (UID), an appliance database that stores information corresponding to controlling the appliance, and computer readable instructions that, when executed, cause the terminal to perform the step of querying the appliance database for information corresponding to the received appliance UID.
- a computer readable medium comprising computer readable instructions that, when executed in an appliance cause it to perform a set of steps.
- the appliance transmits an appliance unique identifier (UID), and receives a terminal UID.
- the appliance queries an authorization database for authorization information corresponding to the terminal UID.
- the appliance selectively grants access to the appliance by a terminal corresponding to the received terminal UID based on the authorization information returned from the query.
- an appliance that has a wireless transceiver that communicates with at least one terminal.
- the wireless transceiver repetitively transmits a unique identifier (UID) associated with the appliance, and listens for a terminal UID transmitted by a terminal.
- the appliance also has a memory for storing computer data.
- the computer data includes the unique identifier (UID) associated with the appliance, and computer readable instructions that, when executed, cause the appliance to perform a set of steps.
- the appliance queries an authorization database for information corresponding to the received terminal UID.
- the appliance allows the terminal associated with the received terminal UID to control the appliance when the query results meet predetermined criteria.
- Figure 1 shows a smart environment.
- FIG. 16 shows a block diagram of a server.
- FIG. 17 shows a block diagram of a terminal.
- FIG. 2C shows a block diagram of an appliance.
- FIG. 20 shows a portion of Access Rights Information for the UIDs of Figure 3A.
- Figure 4 shows a flowchart of a user authorization process to use an appliance.
- the present invention uses wirelessly connected devices to create a smart environment, e.g. homes where the various household appliances are controlled remotely by one or more controlling terminals.
- the terminals communicate with and control appliances using a wireless technology such as Bluetooth, wireless LAN, or Home RF. Any wireless communication technology can be used.
- the invention may be embodied in a system that allows the owner of an environment to control and monitor who is using and when each person can use each appliance.
- the inventive system may also notify the owner whenever someone who does not have rights to use the appliances within the environment attempts to use one or more of the appliances, or optionally when a user without access rights enters the environment.
- the notification may be sent by a short message service (SMS), email, direct network access, instant message, alphanumeric pager, WAP (wireless application protocol) service, or the like.
- SMS short message service
- WAP wireless application protocol
- an environment owner In a smart environment, an environment owner is often concerned that the environment can only be controlled by those that are trusted and have been given authority by the owner.
- the "owner" of the environment is a person that has administrative rights to the environment. This may be the actual owner or anybody he or she has authorized to act as an administrator. The owner(s) can limit the access rights and times of each user to each appliance.
- appliance refers to any item controlled or operated by a user, generally using a terminal (but not required, as discussed below).
- appliances include, but are not limited to, televisions, video cassette recorders and players, DVD players, conventional ovens, microwave ovens, kitchen appliances, lighting systems, heating systems, air conditioning systems, garage door openers, lawn sprinkler systems, stereo equipment, cable television boxes, video game consoles, computers, and the like.
- a user using a controller terminal can control each appliance for which the user has the proper access rights.
- the terms “controller” and “terminal” are used interchangeably to describe a wireless-enabled device that is used to operate or control appliances.
- the terminal may be a computer system, palm-top computer, personal digital assistant, mobile phone, or any other device with wireless communication capabilities.
- a smart environment 100 may comprise a central server 103, appliances 105a - 105e, and wireless controller terminals 107a - 107e. Additional appliances and terminals may easily be added. The number of terminals or appliances in an environment is limited only by physical space. Appliances may communicate with server 103 using the wireless communication technology used throughout the environment, or via conventional network cabling. Unless terminals are docked in a docking station (not shown) connected to the server, terminals generally communicate with the server via wireless communications.
- the server 103 is comprised of a processor 121, volatile memory 123, and nonvolatile memory 125.
- a database 109 is stored within the nonvolatile . memory of server 103.
- a third party provides the server functions, including storage of the database 109, over a network such as the Internet.
- the database is stored in one or more mobile terminal(s).
- a terminal in which the database is stored is referred to herein as a database terminal.
- the other appliances and terminals generally must have a connection to the terminal in which the database is stored.
- the connection may be by any communication means, such as WLAN, Bluetooth, GSM via short message service (SMS), or the like.
- Authorization information is stored in the database and comprises unique identifier (UID) information 129 and access rights information 127, as described below.
- UID unique identifier
- neighbor UID information may be included in the database as well.
- Application software 131 including an optional user interface for modifying access rights information and UID information, may also be stored in non-volatile memory 125.
- Each terminal 107 has a wireless transceiver 226, a processor 227, and a memory 229.
- the transceiver is used for sending and receiving information such as UIDs and control information.
- the processor 227 is used for executing computer readable instructions 235 stored in memory 229.
- the memory also stores the terminal's UID 231, appliance information 233, and optionally, authorization database 109.
- Each appliance 105 has a wireless transceiver 252, a processor 254, and a memory 256.
- the transceiver is used for sending and receiving information such as UIDs and control information.
- the processor 254 is used for executing computer readable instructions 260 stored in memory 256.
- the memory also stores the appliance's UID 258 and, optionally, authorization database 109.
- Each wireless terminal and appliance is assigned a unique identification code (UID), which may comprise the Media Access Control (MAC) address for each wirelessly networked device.
- the UIDs are stored in database 109, optionally along with each UID's group access level (e.g., owner, administrator, family member, friend, employee, visitor, etc.).
- a UID information table is shown in Fig. 3A.
- the terminals with UIDs 1123 and 1124 are owner terminals.
- the terminal with UID 0220 belongs to a child J. Smith, Jr. in the group "Family Member," and the terminal with UID 0230 belongs to R. Jones in the group "Friend.”
- Other UIDs belonging to appliances are also shown.
- the UIDs of any terminal and appliance may be automatically exchanged according to network protocols when they are within wireless communication range.
- the appliance may use the UID for a query of database 103 in order to determine whether the terminal has rights to command that appliance.
- the terminal may use the UID to load information regarding how to control the appliance being accessed by the terminal.
- Appliances generally have a second user interface, in addition to the terminal interface, so they can be controlled physically as well as through the terminals.
- a coffee machine may include an on/off switch so that a user may just flip the switch to turn the coffee machine on when no terminal is present.
- physical controls are disabled when it is determined that a user's terminal does not have authority to access the appliance, or when no terminal is present.
- Each appliance may be associated with access rights for specified terminals.
- the access rights information 127 is stored in database 109, and may be modified via a user interface with the database over a computer network, such as the Internet.
- a sample access rights information table is shown in Fig. 3B.
- the owner may provide differing access rights for different appliances and/or terminals under different sets of predetermined criteria.
- Access rights may be terminal based, time based, or both.
- Terminal based access rights are rights wherein specified terminals can always access the appliance, and other terminals can never access the appliance.
- Time based access rights are rights wherein terminals may only access the appliance during predetermined times, and at all other times are restricted from accessing or controlling the appliance.
- Terminal and time based access rights are rights wherein each terminal is provided a predetermined range of time that it may access or control a specified appliance.
- one user's terminal may have access rights to the television and oven at all times.
- a second user's (Family terminal with UID 0220, for instance, a child) terminal may have access rights to the television only from 7:00 pm - 9:00 pm on Monday through Friday and from 7:00 am - 9:00 pm on weekends, and have no access to the oven.
- a third user's (Friend terminal with UID 0230, for instance, a babysitter) terminal might have access to the television only from 9:00 am - 8:00 pm regardless of the day of the week, and have no access to the oven.
- access rights may be terminal- specific or group-specific. For instance, any terminal in the Owner, Family Member, or Friend group will have the same access to the television as every other terminal in their respective group. However, each terminal is given specific access to the oven. Thus, one family member (for instance, an older child, not shown) may have access to the oven while a second family member (a younger child, shown) may not have any access to the oven. It is also possible to further base access rights by week, month, etc, such that access rights could vary by weeks of the month, months of the year, etc.
- appliances may be set to have no access restrictions, but rather the only requirement is that a terminal be present for the appliance to be used or controlled.
- a terminal may be present for the appliance to be used or controlled.
- an owner may give all users the right to switch the lights on or off. In these cases there is no need to determine whether the terminal has authorization, or even if it is known. It is enough that the terminal is in the environment, and so it will have the right to switch the lights on or off.
- the appliance may query the database to determine whether the terminal at least has access rights within the environment before allowing the user to control the appliance.
- the appliance When an appliance is added to an environment, the appliance is branded to that environment. That is, the appliance records the identity of its environment so that it can differentiate its own environment from other environments. This allows the appliance to determine whether it is has been moved to a different environment.
- the identity of the environment may be established by recording UIDs transmitted by appliances near the new appliance (neighbor appliances). For example, appliance 105e (oven) knows that it is near appliances 105a (answering machine) and 105c (scanner).
- Each appliance may store its own neighbor information into a flash-memory, which can only be cleared by a terminal with authority to so (owner terminal or special maintenance device).
- the neighbor UID information may also be stored collectively in database 109, a sample of which is shown in Fig. 3C.
- the appliance may determine that it has been removed from its environment by determining that different neighbor appliances are surrounding it. In observing its wireless surroundings, an appliance may infer that it has been stolen if the surroundings dramatically change (e.g., more than two different neighbor appliances are detected than expected). If an appliance is stolen or otherwise taken from its own environment, it may optionally lock itself and refuse to operate until unlocked. In that event, generally an owner key may be required to unlock the appliance. The appliance may also attempt to contact its owner (not the owner of the environment in which it is now located) in order to notify the owner that it has been removed from its environment.
- a secure link between the database terminal and the appliance is created when adding a new appliance to the environment. This allows the appliance to securely determine whether the controlling terminal has rights, i.e., that the controlling terminal is a trusted database terminal. Putting the database terminal and the appliance physically close to each creates the secure link. The appliance and the database terminal exchange their public keys or other encryption data. Thereafter the appliance and terminal will listen and communicate only to each other, such that the appliance can be safely added to the environment.
- a mobile terminal e.g., an owner terminal
- the newly added appliance are similarly branded as when the database is stored in the mobile terminal. That is, the owner terminal and the appliance establish a secure link as in the above example.
- the terminal also establishes a secure link with the database.
- the secure link may be created by putting the terminal and the server physically close to each other. That is, a mobile terminal establishes a secure link with a newly added appliance, and the same mobile terminal also establishes a secure link with the database server.
- the branding of the appliance to the environment is a two-step procedure, where the terminal, as a trusted introducer, is used by the server and the appliance to establish a secure link.
- the terminal exchanges public keys with the appliance, and also exchanges the public key of the database with the appliance.
- the terminal then is brought near the database, and exchanges public keys with the database, as well as the public key of the appliance with the database.
- the appliance will not trust another terminal as an introducer unless the appliance is reset via a maintenance procedure.
- the appliance authenticates the terminal as an authorized terminal to control that appliance.
- the UID of the controller terminal is used as a key to the appliance.
- Appliances continuously listen for terminal UIDs in steps 201 and 203.
- the appliance queries the database 109 in step 205 to determine the UID's group. If the UID belongs to an owner terminal, as determined in step 207, the appliance grants control to the terminal in step 209, as owner terminal(s) have complete access to all appliances at all times. If the UID is not an owner, the appliance queries the database for the UID's access rights for that specific appliance and within the environment as a whole, in step 211.
- the appliance grants control to the terminal in step 209. If the UID does not have access rights, the appliance determines whether the terminal has any access rights within the environment, in step 215. If the terminal does not have any access rights within the environment, the appliance attempts to alert the owner that an unauthorized terminal is in the environment, in step 217. This may be accomplished by sending a message via email, SMS, wireless pager, or the like. If the UID does have access rights within the environment, however, the appliance may simply ignore the terminal and continue to listen for another UID. Optionally (not shown), the server may perform steps 215 and 217 after it has received the UID from the appliance in step 205.
- an owner teiminal may be used to grant or change other terminals' access rights.
- These other terminals can have different levels of access, as discussed above.
- a terminal with administrative privileges i.e., an owner
- the terminal to which the access rights are to be given are in close proximity to each other when the database is updated. This provides an additional level of security by ensuring that only authorized persons can give access rights to terminals.
- the UID codes between the terminals are exchanged over a short-range link. Additional security measures such as passwords can also be utilized in the authorization process.
- the terminals do not need to be physically close to each other, but rather the database can be updated with the new information.
- the terminals and appliances continuously transmit their UIDs and listen for other UIDs. This allows the terminals and appliances to automatically "hear" each other when they are near each other.
- the UIDs allow listening devices to determine whether it has previous knowledge about the other nearby device(s), and react accordingly. For instance, when a terminal receives a UID, the terminal uses the UID to determine whether the terminal has information regarding how to control the appliance.
- the central server in the smart environment polls the appliances. This can be performed continuously, hourly, daily, etc.
- the server may automatically notify the owner controller or, optionally, all controllers.
- keys can easily be revoked or modified by reprogramming or resetting the information in the terminal and/or database. Also, keys may easily be set to have different access levels, as described above.
- the key may be a built in function in existing terminals, such that new wireless hardware is not required to practice the invention. However, one can easily envision a specialized terminal for use with the invention that, at a minimum, stores key information and can perform short-range wireless communications.
- An owner or administrator can also use the system of the present invention as a child lock for selected appliances.
- the system may be used to prevent a child from turning on an oven (or other appliance) without explicit permission from the parent. That is, if the child tries to turn on the oven, the oven would not respond because it would only hear the child's key (which, in this example, does not have authority to use the oven). However, if the parent enters the kitchen and the oven detects the parent by receiving the parent's key, the oven could then be turned on (because the parent's key has authority to use the oven).
- the oven (or other appliance) would switch off once the authorized key went out of range unless an authorization switch was activated on the oven (or other appliance for which protection is sought) while it was under the parent's authorization. Similar protection schemes can easily be envisioned using the inventive system. In another aspect, the oven (or other appliance) would remain on even after the authorized key went out of range.
- the appliances report information to the database regarding when the appliance was used, by whom the appliance was used, and for what purpose the appliance was used.
- Some appliances for example a coffee maker, may only report when and who used the appliance (as the only purpose is to make coffee).
- other appliances such as televisions, cable television control boxes, computers, and the like, may also report programs watched, games played, applications executed, websites visited, and the like. This allows owners (such as parents) to determine how the appliances are used, and refine access rights based on the reporting information.
- the method steps may be encoded in computer readable instructions stored in a memory, such that when the computer readable instructions are executed by a processor, they cause the device in which the processor is located to perform the method steps.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Selective Calling Equipment (AREA)
- Telephonic Communication Services (AREA)
- Lock And Its Accessories (AREA)
Abstract
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2001/015954 WO2002093501A1 (fr) | 2001-05-17 | 2001-05-17 | Environnement intelligent |
JP2002590099A JP4290996B2 (ja) | 2001-05-17 | 2001-05-17 | データネットワーク |
EP01935636A EP1388125A1 (fr) | 2001-05-17 | 2001-05-17 | Environnement intelligent |
US10/477,611 US20040177072A1 (en) | 2001-05-17 | 2001-05-17 | Smart environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2001/015954 WO2002093501A1 (fr) | 2001-05-17 | 2001-05-17 | Environnement intelligent |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002093501A1 true WO2002093501A1 (fr) | 2002-11-21 |
Family
ID=21742579
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/015954 WO2002093501A1 (fr) | 2001-05-17 | 2001-05-17 | Environnement intelligent |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1388125A1 (fr) |
JP (1) | JP4290996B2 (fr) |
WO (1) | WO2002093501A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1617624A1 (fr) * | 2004-07-15 | 2006-01-18 | Avaya Technology Corp. | Détection de voisins utilisant un protocole pair à pair pour éxecuter de commandes dépendantes de cette proximité |
EP1624416B1 (fr) * | 2004-07-15 | 2009-03-11 | Avaya Inc. | Autorisation de l'exécution d'une commande d'un terminal sans fil basée sur la présence ou absence de terminaux proches |
US9558475B2 (en) | 2002-05-06 | 2017-01-31 | Avaya Inc. | Location based to-do list reminders |
EP3361451A1 (fr) * | 2017-02-10 | 2018-08-15 | Vestel Elektronik Sanayi ve Ticaret A.S. | Verrou de sécurité pour restreindre l'accès à des appareils techniques |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2009087801A1 (ja) * | 2008-01-10 | 2011-05-26 | 日本電気株式会社 | ファイル共有システムおよびアクセス権管理方法および端末 |
EP3284884B1 (fr) * | 2012-12-21 | 2020-05-13 | Nida Tech Sweden AB | Procédé de determination de distance entre deux noeuds de présence |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5909183A (en) * | 1996-12-26 | 1999-06-01 | Motorola, Inc. | Interactive appliance remote controller, system and method |
WO1999049680A1 (fr) * | 1998-03-24 | 1999-09-30 | Bellsouth Intellectual Property Corporation | Telemetrie radio permettant de communiquer avec des dispositifs intelligents ou de les commander, et systemes correspondants |
GB2344675A (en) * | 1998-12-11 | 2000-06-14 | Nec Corp | Appliance control system eg in home automation |
US6127941A (en) * | 1998-02-03 | 2000-10-03 | Sony Corporation | Remote control device with a graphical user interface |
EP1045355A1 (fr) * | 1999-04-16 | 2000-10-18 | Sony International (Europe) GmbH | Terminal mobile et méthode pour contrôler un ou plusieurs dispositifs dans une zone prédéterminée |
EP1093102A1 (fr) * | 1999-10-12 | 2001-04-18 | Murakami Corporation | Dispositif de commande fonctionnant à fréquences des téléphones portables |
WO2001027895A1 (fr) * | 1999-10-11 | 2001-04-19 | Qualcomm Incorporated | Telephone sans fil et telecommande combines, a commande vocale |
WO2001077764A2 (fr) * | 2000-04-10 | 2001-10-18 | Zensys A/S | Systeme domotique rf comprenant des controleurs susceptibles d'etre dupliques |
-
2001
- 2001-05-17 EP EP01935636A patent/EP1388125A1/fr not_active Withdrawn
- 2001-05-17 JP JP2002590099A patent/JP4290996B2/ja not_active Expired - Fee Related
- 2001-05-17 WO PCT/US2001/015954 patent/WO2002093501A1/fr active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5909183A (en) * | 1996-12-26 | 1999-06-01 | Motorola, Inc. | Interactive appliance remote controller, system and method |
US6127941A (en) * | 1998-02-03 | 2000-10-03 | Sony Corporation | Remote control device with a graphical user interface |
WO1999049680A1 (fr) * | 1998-03-24 | 1999-09-30 | Bellsouth Intellectual Property Corporation | Telemetrie radio permettant de communiquer avec des dispositifs intelligents ou de les commander, et systemes correspondants |
GB2344675A (en) * | 1998-12-11 | 2000-06-14 | Nec Corp | Appliance control system eg in home automation |
EP1045355A1 (fr) * | 1999-04-16 | 2000-10-18 | Sony International (Europe) GmbH | Terminal mobile et méthode pour contrôler un ou plusieurs dispositifs dans une zone prédéterminée |
WO2001027895A1 (fr) * | 1999-10-11 | 2001-04-19 | Qualcomm Incorporated | Telephone sans fil et telecommande combines, a commande vocale |
EP1093102A1 (fr) * | 1999-10-12 | 2001-04-18 | Murakami Corporation | Dispositif de commande fonctionnant à fréquences des téléphones portables |
WO2001077764A2 (fr) * | 2000-04-10 | 2001-10-18 | Zensys A/S | Systeme domotique rf comprenant des controleurs susceptibles d'etre dupliques |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9558475B2 (en) | 2002-05-06 | 2017-01-31 | Avaya Inc. | Location based to-do list reminders |
EP1617624A1 (fr) * | 2004-07-15 | 2006-01-18 | Avaya Technology Corp. | Détection de voisins utilisant un protocole pair à pair pour éxecuter de commandes dépendantes de cette proximité |
EP1624416B1 (fr) * | 2004-07-15 | 2009-03-11 | Avaya Inc. | Autorisation de l'exécution d'une commande d'un terminal sans fil basée sur la présence ou absence de terminaux proches |
US8050698B2 (en) | 2004-07-15 | 2011-11-01 | Avaya Inc. | Peer-to-peer neighbor detection for proximity-based command execution |
US8571541B2 (en) | 2004-07-15 | 2013-10-29 | Avaya Inc. | Proximity-based authorization |
US9031534B2 (en) | 2004-07-15 | 2015-05-12 | Avaya Inc. | Proximity-based authorization |
EP3361451A1 (fr) * | 2017-02-10 | 2018-08-15 | Vestel Elektronik Sanayi ve Ticaret A.S. | Verrou de sécurité pour restreindre l'accès à des appareils techniques |
Also Published As
Publication number | Publication date |
---|---|
JP4290996B2 (ja) | 2009-07-08 |
JP2004537884A (ja) | 2004-12-16 |
EP1388125A1 (fr) | 2004-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20040177072A1 (en) | Smart environment | |
EP1388126B1 (fr) | Autorisation d'acces a distance a un environnement intelligent | |
US11044608B2 (en) | System and method for access control via mobile device | |
US10726653B2 (en) | Systems and methods for redundant access control systems based on mobile devices | |
EP2033474B1 (fr) | Système de contrôle automatisé d'autorisation multi-niveaux d'utilisation de dispositifs électroniques et électriques | |
US9367978B2 (en) | Control device access method and apparatus | |
US9449449B2 (en) | Access control operator diagnostic control | |
US7012503B2 (en) | Electronic key device a system and a method of managing electronic key information | |
JP5241062B2 (ja) | 双方向対象物の間で情報を転送する方法 | |
US20110254659A1 (en) | Electronic Locking System with Wireless Update and Cascade Lock Control | |
US20060123463A1 (en) | Security access device and method | |
WO2006136662A1 (fr) | Procede de communication d'un systeme de commande d'acces | |
US20050048951A1 (en) | Method and system for alternative access using mobile electronic devices | |
CN102265684B (zh) | 多模式设备注册 | |
EP2885767A1 (fr) | Techniques de partage de clés à base de communication en champ proche | |
CN108537927B (zh) | 一种锁具终端及区域管理控制锁具终端方法 | |
CN110232754A (zh) | 一种蓝牙智能开锁系统及方法 | |
CN109410384B (zh) | 一种安全管理系统 | |
US20050071673A1 (en) | Method and system for secure authentication using mobile electronic devices | |
EP1388125A1 (fr) | Environnement intelligent | |
EP1732050A1 (fr) | Système de commande d'appareil |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2002590099 Country of ref document: JP Ref document number: 10477611 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001935636 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2001935636 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |