WO2006032354A1 - Telematic duplication system for encoded keys - Google Patents

Telematic duplication system for encoded keys Download PDF

Info

Publication number
WO2006032354A1
WO2006032354A1 PCT/EP2005/009474 EP2005009474W WO2006032354A1 WO 2006032354 A1 WO2006032354 A1 WO 2006032354A1 EP 2005009474 W EP2005009474 W EP 2005009474W WO 2006032354 A1 WO2006032354 A1 WO 2006032354A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
duplication
key
identification data
centres
Prior art date
Application number
PCT/EP2005/009474
Other languages
French (fr)
Inventor
Michele Donadini
Original Assignee
Silca S.P.A.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Silca S.P.A. filed Critical Silca S.P.A.
Publication of WO2006032354A1 publication Critical patent/WO2006032354A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C3/00Milling particular work; Special milling operations; Machines therefor
    • B23C3/28Grooving workpieces
    • B23C3/35Milling grooves in keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/0088Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed centrally

Definitions

  • the present invention relates to a telematic duplication system for encoded keys.
  • Keys for operating a lock, whether installed in a normal door, an armoured door, a motor vehicle etc., are known to be generally distinguished by a code (indirect code) which enables the type of key, its mechanical notching pattern, the code of its electronic chip if present, etc. to be unequivocally identified. From this indirect code, all the key characteristics required for its duplication can be obtained from a data file generally held by the manufacturer or initial lock installer.
  • Key duplication is in this case an operation carried out in a place far from the local centre to which the customer has applied, the time involved, because of the need to despatch the key when cut, being lengthy and often incompatible with user requirements. This is certainly so in the case of a car driver who mislays the car key during a journey.
  • An object of the invention is to overcome these drawbacks by making it possible to duplicate a key at any authorized duplication centre, hence not only obtaining all the advantages of local duplication but at the same time eliminating the aforestated drawbacks.
  • Figure 1 is a schematic view of a telematic duplication system according to the invention
  • Figure 2 is a schematic view of a remote duplication centre.
  • the telematic duplication system for encoded keys according to the invention comprises substantially a plurality of remote key duplication centres 2 provided with a terminal 4 connected via a telematic network to a control unit 6 connected to data files 8 stored with lock manufacturing/installation firms, or firms authorized thereby.
  • keyboards means mechanical keys, electronic keys, i.e. cards with electronic codes of smart card type, or mixed keys, i.e. provided with a chip.
  • Each centre 2 comprises a plurality of power machines, such as profiling machines 12 for the key blank, milling machines 14 cutting the notching pattern on the semi-finished key, machines 16 for marking the key surface and machines 18 for encoding a possible chip present in the key, all these machines being controlled electronically by data received by the terminal 4 from the centre 2 and fed by the control unit 6.
  • the control unit 6 comprises a data file 20 in which the indirect key codes and other information, specified hereinafter, are correlated with the lock manufacturers/installers, and a data file 22 in which the direct key codes are correlated with the movements of the power machines 12, 14, 16, 18 of the remote centres 2.
  • the control unit 6 also comprises data encryption means 24 and data cancellation means 26.
  • the operation of the telematic system of the invention for example for duplicating a motor vehicle key of which the indirect code is known, is as follows: A user who has mislaid a key and requires a duplicate calls into one of the authorized centres 2 and hands the operator the card (obtained on acquiring the vehicle) carrying the impression of the indirect codes of the key to be duplicated.
  • These indirect codes enable the type of key, its mechanical notching pattern and the code of its electronic chip, if present, to be unequivocally identified.
  • the operator at the terminal 4 feeds its identifying codes to establish the connection with the control unit 6, and once identified by this latter feeds to it the indirect codes and possibly data relative to the key make and model , specifying at the same time the number of copies required.
  • the operator invites the customer to key into the terminal the identifying data for the lock cylinder to which the key pertains, which data can be the production date, the batch, the registration number, the progressive number and any other information identifying the cylinder.
  • These data will have been handed to the user at the moment of purchase in a confidential manner, for example in a sealed envelope.
  • the sealed envelope may contain a card, the faces of which carry the indirect codes and the cylinder identification data respectively, the user showing the operator, while holding the card in the hand, only that face carrying the indirect codes.
  • control unit 6 identifies the product and the lock manufacturer 10 (or initial or authorized installer) and feeds thereto the indirect code, the digital data of the applicant relative to the cylinder, and an unequivocal identification code for the transaction underway.
  • the data transmitted by the unit 6 and received by the firm 10 are compared with the data file 8 which, once verified, provides in response the direct codes associated with the indirect codes received.
  • said direct codes comprise those necessary for milling the profile of the blank, those for cutting the notching pattern, those for marking and those for encoding the chip, if present.
  • the direct codes are then fed, making reference to the transaction identification code, to the control unit 6 which on receipt transmits them, together with all information required by the power machines for materially carrying out the machining, in encrypted form to the terminal 4 of the centre 2 from which the key duplication request originated.
  • all these data are transferred to the various power machines 12, 14, 16, 18 to enable them to effect the required operations in succession on the blank key, and in particular: - regulating and operating the profiling machine to form the grooves on the blank and obtain the semi-finished key,
  • the terminal 4 On termination of the duplication operations the terminal 4 transmits confirmation to the control unit 6 that the operations have taken place, said unit 6 then cancelling all data of the effected transaction to prevent unauthorized repetition, and confirming to the firm 10 that these operations have taken place. If the operation was not a success, the unit 6 informs the firm 10 of the situation and cancels all data.
  • the data files 8 are directly associated with the control unit 6.
  • the terminals are provided with means 28 for concealing the data received from the control unit 6.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A telematic duplication system for encoded keys, comprising: a plurality of profiling and/or duplicating and/or electronic encoding and/ormarking machines (12, 14, 16, 18) installed at different duplication centres (2) and controllable electronically, at least one central control unit (6) provided with at least one electronic data file (20, 22), in which data relative to the corresponding key to be duplicated are associated with an indirect code, within said central unit, means for recognizing data relating to the lock into which the key is to be inserted, these data being possessed by the user alone, a telematic network for connecting said central unit (6) to said duplication centres (2) in order to transmit from these latter to said central unit said indirect code and the lock identification data, and, when recognition of said indirect code and lock identification data has taken place, to transmit from said central unit (6) to said duplication centres (2) the control signals for said machines (12, 14, 16, 18) in order to effect duplication of a key, of which said indirect code has previously been transmitted.

Description

TELEMATIC DUPLICATION SYSTEM FOR ENCODED KEYS
The present invention relates to a telematic duplication system for encoded keys.
Keys (this term also including cards with electronic codes of smart card type) for operating a lock, whether installed in a normal door, an armoured door, a motor vehicle etc., are known to be generally distinguished by a code (indirect code) which enables the type of key, its mechanical notching pattern, the code of its electronic chip if present, etc. to be unequivocally identified. From this indirect code, all the key characteristics required for its duplication can be obtained from a data file generally held by the manufacturer or initial lock installer.
In practice a user who mislays a key and requires a duplicate can apply with its indirect code number to a local key duplication centre, which will then request a duplicate from the manufacturer or from the initial lock installer. Key duplication is in this case an operation carried out in a place far from the local centre to which the customer has applied, the time involved, because of the need to despatch the key when cut, being lengthy and often incompatible with user requirements. This is certainly so in the case of a car driver who mislays the car key during a journey.
To this must be added the further problem of lack of confidentiality and hence of security. Key duplication may be possible at the local centre, usually by simply "copying" the notching pattern of an original key onto a semi-finished key held by the local centre. This operation:
- requires the material presence of the original key, - is not normally possible if the key is provide with an electronic chip, which has to be encoded,
- requires the specialist to have available a vast assortment of semi-finished keys in order to be able to satisfy the various customer requirements,
- provides no guarantee of security or confidentiality as anybody, not only the legitimate owner, can duplicate an original key.
An object of the invention is to overcome these drawbacks by making it possible to duplicate a key at any authorized duplication centre, hence not only obtaining all the advantages of local duplication but at the same time eliminating the aforestated drawbacks. This and other objects which will be apparent from the ensuing description are attained, according to the invention, by a telematic duplication system for encoded keys,, as claimed in claim 1.
A preferred embodiment of the present invention and a variant thereof are described in detail hereinafter with reference to the accompanying drawings, in which:
Figure 1 is a schematic view of a telematic duplication system according to the invention, and Figure 2 is a schematic view of a remote duplication centre. As can be seen from the figures, the telematic duplication system for encoded keys according to the invention comprises substantially a plurality of remote key duplication centres 2 provided with a terminal 4 connected via a telematic network to a control unit 6 connected to data files 8 stored with lock manufacturing/installation firms, or firms authorized thereby.
The term "keys" means mechanical keys, electronic keys, i.e. cards with electronic codes of smart card type, or mixed keys, i.e. provided with a chip.
Each centre 2 comprises a plurality of power machines, such as profiling machines 12 for the key blank, milling machines 14 cutting the notching pattern on the semi-finished key, machines 16 for marking the key surface and machines 18 for encoding a possible chip present in the key, all these machines being controlled electronically by data received by the terminal 4 from the centre 2 and fed by the control unit 6. The control unit 6 comprises a data file 20 in which the indirect key codes and other information, specified hereinafter, are correlated with the lock manufacturers/installers, and a data file 22 in which the direct key codes are correlated with the movements of the power machines 12, 14, 16, 18 of the remote centres 2. The control unit 6 also comprises data encryption means 24 and data cancellation means 26.
The operation of the telematic system of the invention, for example for duplicating a motor vehicle key of which the indirect code is known, is as follows: A user who has mislaid a key and requires a duplicate calls into one of the authorized centres 2 and hands the operator the card (obtained on acquiring the vehicle) carrying the impression of the indirect codes of the key to be duplicated. These indirect codes enable the type of key, its mechanical notching pattern and the code of its electronic chip, if present, to be unequivocally identified.
At this point the operator at the terminal 4 feeds its identifying codes to establish the connection with the control unit 6, and once identified by this latter feeds to it the indirect codes and possibly data relative to the key make and model , specifying at the same time the number of copies required. At the same time the operator invites the customer to key into the terminal the identifying data for the lock cylinder to which the key pertains, which data can be the production date, the batch, the registration number, the progressive number and any other information identifying the cylinder. These data will have been handed to the user at the moment of purchase in a confidential manner, for example in a sealed envelope. For example the sealed envelope may contain a card, the faces of which carry the indirect codes and the cylinder identification data respectively, the user showing the operator, while holding the card in the hand, only that face carrying the indirect codes.
From this overall information the control unit 6 identifies the product and the lock manufacturer 10 (or initial or authorized installer) and feeds thereto the indirect code, the digital data of the applicant relative to the cylinder, and an unequivocal identification code for the transaction underway. The data transmitted by the unit 6 and received by the firm 10 are compared with the data file 8 which, once verified, provides in response the direct codes associated with the indirect codes received. Specifically, said direct codes comprise those necessary for milling the profile of the blank, those for cutting the notching pattern, those for marking and those for encoding the chip, if present.
The direct codes are then fed, making reference to the transaction identification code, to the control unit 6 which on receipt transmits them, together with all information required by the power machines for materially carrying out the machining, in encrypted form to the terminal 4 of the centre 2 from which the key duplication request originated. In said centre all these data are transferred to the various power machines 12, 14, 16, 18 to enable them to effect the required operations in succession on the blank key, and in particular: - regulating and operating the profiling machine to form the grooves on the blank and obtain the semi-finished key,
- regulating and operating the miller in sequence to cut the key notching pattern,
- regulating and operating the punching tool to effect marking, - chip encoding.
On termination of the duplication operations the terminal 4 transmits confirmation to the control unit 6 that the operations have taken place, said unit 6 then cancelling all data of the effected transaction to prevent unauthorized repetition, and confirming to the firm 10 that these operations have taken place. If the operation was not a success, the unit 6 informs the firm 10 of the situation and cancels all data.
In a variant not shown in the drawings, the data files 8 are directly associated with the control unit 6. In a further variant, the terminals are provided with means 28 for concealing the data received from the control unit 6.
From the aforegoing it is apparent that the telematic system of the invention presents numerous advantages, and in particular:
- it enables the key to be duplicated from its code without requiring its material presence,
- it also enables keys provided with a chip to be duplicated,
- it reduces the number of semi-finished keys which the operator has to keep in stock, it being sufficient to stock the key blank for these,
- it ensures a high level of security and confidentiality as only the legitimate holder possessing the indirect code number and the cylinder data can request duplication of the original key,
- it reduces the waiting time for the duplicated key as this is obtained directly from the authorized centre.

Claims

C L A I M S
1. . A telematic duplication system for encoded keys, characterised by comprising:
- a plurality of profiling and/or duplicating and/or electronic encoding and/or marking machines (12, 14, 16, 18) installed at different duplication centres
(2) and controllable electronically,
- at least one central control unit (6) provided with at least one electronic data file (20, 22), in which data relative to the corresponding key to be duplicated are associated with each indirect code, - within said central unit, means for recognizing data relating to the lock into which the key is to be inserted, these data being possessed by the user alone,
- a telematic network for connecting said central unit (6) to said duplication centres (2) in order to transmit from these latter to said central unit said indirect code and the lock identification data, and, when recognition of said indirect code and lock identification data has taken place, to transmit from said central unit (6) to said duplication centres (2) the control signals for said machines (12, 14, 16, 18) in order to effect duplication of a key, of which said indirect code has previously been transmitted.
2. A system as claimed in claim 1 , characterised in that the central unit (6) is connected telematically to a plurality of key manufacturing firms in order to transmit thereto the key indirect codes and the lock identification data and, when said data have been recognized, to receive therefrom the corresponding associated direct codes for controlling said machines (12, 14, 16, 18).
3. A system as claimed in claim 1 , characterised in that the central control unit (6) comprises means (24) for encrypting the data transmitted to the production centres (2).
4. A system as claimed in claim 1 , characterised in that said duplication centres comprise means (28) for concealing the data received from the control unit (6).
5. A system as claimed in claim 1 , characterised in that the control unit (6) comprises data cancellation means (26).
6. A system as claimed in claim 1 , characterised in that the lock identification data are its production date.
7. A system as claimed in claim 1 , characterised in that the lock identification data are the registration number.
8. A system as claimed in claim 1 , characterised in that the lock identification data are the progressive number.
9. A system as claimed in claim 1 , characterised in that the lock identification data are the production batch.
10. A system as claimed in claim 1 , characterised in that the lock identification data are a random number.
11. A system as claimed in claim 1 , characterised in that the lock identification data relate to the lock cylinder.
PCT/EP2005/009474 2004-09-24 2005-09-02 Telematic duplication system for encoded keys WO2006032354A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ITVE20040035 ITVE20040035A1 (en) 2004-09-24 2004-09-24 TELEMATIC DUPLICATION SYSTEM OF KEYS BY CODE.
ITVE2004A000035 2004-09-24

Publications (1)

Publication Number Publication Date
WO2006032354A1 true WO2006032354A1 (en) 2006-03-30

Family

ID=35432272

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2005/009474 WO2006032354A1 (en) 2004-09-24 2005-09-02 Telematic duplication system for encoded keys

Country Status (2)

Country Link
IT (1) ITVE20040035A1 (en)
WO (1) WO2006032354A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007093982A1 (en) * 2006-02-19 2007-08-23 Mul-T-Lock Technologies Ltd. Key duplication method and machine
WO2008145199A1 (en) * 2007-05-29 2008-12-04 Bianchi 1770 S.P.A. Method for the duplication of electronic-code keys
US8509445B2 (en) 2009-06-10 2013-08-13 Keyline S.P.A. Duplication means for an electronically coded key and related method
WO2014191763A1 (en) * 2013-05-30 2014-12-04 Gregory Chambers Transponder key testing device and method of testing a transponder key
US20170323048A1 (en) * 2012-02-07 2017-11-09 Vinlocks LLC Computer program, method, and system for locksmithing
WO2019087102A1 (en) * 2017-11-02 2019-05-09 Silca S.P.A. Improved method and infrastructure for the duplication of keys
DE102009019640B4 (en) 2009-04-30 2020-01-16 Volkswagen Ag Method, device and system for producing a key for a vehicle, and method and device for generating milling information for producing a key

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5711643A (en) * 1996-06-28 1998-01-27 Intralock Tools Ltd. Portable semi-automatic computer code key cutting machine
US5838251A (en) * 1995-08-31 1998-11-17 Mercedes-Benz Ag Method and device for programming operating data into vehicle components
GB2340644A (en) * 1998-08-18 2000-02-23 Rover Group Security system
JP2002147075A (en) * 2000-11-16 2002-05-22 Tsutomu Ueda Unlocking service method for lock
US20020191849A1 (en) * 2000-07-25 2002-12-19 The Hillman Group Inc. Key identification system
EP1270851A1 (en) * 2000-03-23 2003-01-02 Kawai Shokai Kabushiki Kaisha Key information registration procedure assisting system, recorded medium, and key plate cutter
EP1339024A2 (en) * 2002-02-20 2003-08-27 ISEO SERRATURE S.p.A. Procedure and device for managing requests for copies of keys
US6647308B1 (en) * 1997-07-29 2003-11-11 Ronald Martin Prejean Key manufacturing method
US20040078563A1 (en) * 2002-09-09 2004-04-22 John Kimes Remotely programmable electronic lock and process ASP software to generate and track key activity

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5838251A (en) * 1995-08-31 1998-11-17 Mercedes-Benz Ag Method and device for programming operating data into vehicle components
US5711643A (en) * 1996-06-28 1998-01-27 Intralock Tools Ltd. Portable semi-automatic computer code key cutting machine
US6647308B1 (en) * 1997-07-29 2003-11-11 Ronald Martin Prejean Key manufacturing method
GB2340644A (en) * 1998-08-18 2000-02-23 Rover Group Security system
EP1270851A1 (en) * 2000-03-23 2003-01-02 Kawai Shokai Kabushiki Kaisha Key information registration procedure assisting system, recorded medium, and key plate cutter
US20020191849A1 (en) * 2000-07-25 2002-12-19 The Hillman Group Inc. Key identification system
JP2002147075A (en) * 2000-11-16 2002-05-22 Tsutomu Ueda Unlocking service method for lock
EP1339024A2 (en) * 2002-02-20 2003-08-27 ISEO SERRATURE S.p.A. Procedure and device for managing requests for copies of keys
US20040078563A1 (en) * 2002-09-09 2004-04-22 John Kimes Remotely programmable electronic lock and process ASP software to generate and track key activity

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PATENT ABSTRACTS OF JAPAN vol. 2002, no. 09 4 September 2002 (2002-09-04) *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007093982A1 (en) * 2006-02-19 2007-08-23 Mul-T-Lock Technologies Ltd. Key duplication method and machine
EA011852B1 (en) * 2006-02-19 2009-06-30 Мул-Т-Лок Текнолоджис Лтд. Key duplication method and machine
AU2007216147B2 (en) * 2006-02-19 2011-11-03 Mul-T-Lock Technologies Ltd. Key duplication method and machine
US8408851B2 (en) 2006-02-19 2013-04-02 Mul-T-Lock Technologies Ltd. Key duplication method and machine
WO2008145199A1 (en) * 2007-05-29 2008-12-04 Bianchi 1770 S.P.A. Method for the duplication of electronic-code keys
DE102009019640B4 (en) 2009-04-30 2020-01-16 Volkswagen Ag Method, device and system for producing a key for a vehicle, and method and device for generating milling information for producing a key
US8509445B2 (en) 2009-06-10 2013-08-13 Keyline S.P.A. Duplication means for an electronically coded key and related method
US8750510B2 (en) 2009-06-10 2014-06-10 Keyline S.P.A. Duplication means for an electronically coded key and related method
US20170323048A1 (en) * 2012-02-07 2017-11-09 Vinlocks LLC Computer program, method, and system for locksmithing
WO2014191763A1 (en) * 2013-05-30 2014-12-04 Gregory Chambers Transponder key testing device and method of testing a transponder key
WO2019087102A1 (en) * 2017-11-02 2019-05-09 Silca S.P.A. Improved method and infrastructure for the duplication of keys
US11351645B2 (en) 2017-11-02 2022-06-07 Silca S.P.A. Method and infrastructure for the duplication of keys

Also Published As

Publication number Publication date
ITVE20040035A1 (en) 2004-12-24

Similar Documents

Publication Publication Date Title
WO2006032354A1 (en) Telematic duplication system for encoded keys
DE602004002272T2 (en) Multi-user system for motor vehicle and electronic key for the like
US6122580A (en) Apparatus and method for driver-specific setting on vehicle devices
US6809636B2 (en) Vehicle immobiliser/alarm
DE19532067C1 (en) Programming system for vehicle electronic key
DE102006015212B4 (en) Method for protecting a movable good, in particular a vehicle, against unauthorized use
US8269601B2 (en) Multiuser vehicle utilization system and electronic key thereof
US11127230B2 (en) Systems and methods for creating key backups by identifying and storing unique key information and for replicating unique keys from key backups
DE19502373C2 (en) Anti-theft method for motor-driven motor vehicles
US20050099265A1 (en) Central access control system
JPH0853962A (en) Electronic code lock for particularly inactivating automobile burglarproof device
EP0735719A3 (en) Method for providing secure boxes in a key management system
US20060082434A1 (en) Security for vehicle starting
GB2340644A (en) Security system
US6611193B1 (en) Vehicle security device
CN109094521A (en) Wireless relay device and wireless relay control system
WO2008145199A1 (en) Method for the duplication of electronic-code keys
EP1619094B1 (en) Electronic immobiliser
JP2000509590A (en) Operation method of remote control device and remote control device
EP1625527A1 (en) Method, system, base station and data carrier for clash-free signal transmission between a base station and a number of mobile data carriers
EP2770663A1 (en) Encryption Key-Based Product Authentication System and Method
CN1985227A (en) Network and method of non-contact secure printing,
DE102017213575B3 (en) Authorization method for a functional unit, actuation method, authorization device and motor vehicle
EP1112430B1 (en) Method for controlling a code
WO2018220890A1 (en) Operation system, electronic key, in-vehicle device, industrial vehicle, fork lift, and operation method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05786933

Country of ref document: EP

Kind code of ref document: A1