WO2013110407A1 - Commande d'accès - Google Patents

Commande d'accès Download PDF

Info

Publication number
WO2013110407A1
WO2013110407A1 PCT/EP2012/075361 EP2012075361W WO2013110407A1 WO 2013110407 A1 WO2013110407 A1 WO 2013110407A1 EP 2012075361 W EP2012075361 W EP 2012075361W WO 2013110407 A1 WO2013110407 A1 WO 2013110407A1
Authority
WO
WIPO (PCT)
Prior art keywords
resource
identification
user
access
code
Prior art date
Application number
PCT/EP2012/075361
Other languages
German (de)
English (en)
Inventor
Roland Eckl
Marquart Franz
Original Assignee
Siemens Aktiengesellschaft
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Aktiengesellschaft filed Critical Siemens Aktiengesellschaft
Publication of WO2013110407A1 publication Critical patent/WO2013110407A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Definitions

  • the present invention relates to a technique for access ⁇ control.
  • the invention relates to a method, a system and a computer program product for controlling access to a resource ei ⁇ .
  • a resource for example a meeting room in a building
  • different mechanisms are known.
  • each user receives a physical passport and the device provides a reader for the passport.
  • the user is identified by the badge and it is checked if the user is authorized to access the resource. If this is the case, the resource can be released for the user, for example by activating an automatic door opener.
  • the disadvantage here is that each user must always carry an individual ID with him in order to access the resource can.
  • PIN personal identification number
  • the disadvantage here is that a sufficient granularity of access control ty a relatively long PIN code to ver ⁇ contact is that can be easily forgotten by the user.
  • the user passes ei ⁇ NEN assigned PIN code to another person.
  • the group of people using the resource can be so difficult to control.
  • a wireless device associated with a user may be used to provide information. NEN over the user and the resource to a central In ⁇ dance to send, whereupon the central authority can cause a release of the resource after an examination of the identifications.
  • the central authority can cause a release of the resource after an examination of the identifications.
  • the invention has the object of providing a technique to admit arrival, by means of which a resource is made available in a simple manner ei ⁇ NEM or more users.
  • the invention solves the problem by means of a method, Sys tems ⁇ and a computer program product having the features of the independent claims. Subclaims give preferred embodiments again.
  • An inventive method for controlling access to a resource comprising the steps of providing a Iden ⁇ fication of the resource to the resource, the Entussineh- mens the identification of the resource and an ID Case ⁇ on a user and releasing the access to the resource if the user is authorized is to access the Res ⁇ source.
  • the identification of the resource is renewed on a regular basis and includes an indication that allows the identification to be inferred from a time-dependent validity end of the identification.
  • This information can in particular include a creation time or display time of the identification or a validity period.
  • the time dependence of the validity of identifica tion ⁇ is realized by an instance which checks the Gul ⁇ ACTION the identification, performs a comparison of the identification with one or more known identification functions that have recently been created.
  • Storing the resource's identification for later use may thus result in a denial of access to the resource. This can ensure that the user is at the resource when the resource is released. Even a passing identifica ⁇ tion of the resource to another user may be complicated by the time limit on the validity of the identification of the resource. It can be ensured in an improved manner that the resource will be released exclusively to Be ⁇ use by authorized users.
  • the identification of the resource includes the location of the resource.
  • the resource may be stationary, for example a room or a facility of a building.
  • the indication of the location can be encoded in the identification of the resource or can be done separately from a clear reference to the resource.
  • the location of the resource is derivable from the unique identification.
  • the identification of the resource includes an address of an instance, wherein the identifications of the resource and the user are received by the instance.
  • the instance can be a central instance, for example in the form of a server, so that different resources can be managed by different central authorities and an assignment of the entity to the resource to be secured can be performed transparently.
  • An assignment of a resource to an instance can be done dynamically without requiring a user to recognize this, and without requiring the user to change his hand ⁇ development in any form. The user must so do not know the address or name of the managing instance or do not enter yourself.
  • the identification of the resource is embedded in a web address of the instance.
  • the authentication can thus be facilitated since the user does not first have to read off and enter the identification of the resource, but automatically receives it together with the address of the instance.
  • the identification of the user is not also embedded as an argument in the web address but is incorporated as an argument or parameter in the web address of the instance.
  • the identification of the resources is provided in machine-readable, graphical form.
  • the recording of the identification of the resource for example, by means of a portable computer or a Te ⁇ phone with additional functions (smartphone) are performed, which includes an optical interface, without special hardware or proprietary software would be required.
  • another transmission of the identification of the resource can be done, for example by means of an NFC or RFID tags.
  • the identification of the user is stored with or without the ge ⁇ heimen code in the portable computer or a smartphone.
  • the computer or smartphone can be protected against unauthorized use by means of a separate password or secret code.
  • a separate password or secret code In yet another embodiment, a
  • Password or a secret code may be required to release the stored code.
  • Such a function can For example, be provided by a browser on the computer or smartphone.
  • the method can be used, in particular, to secure a resource which comprises a section of a building, for example a room, a parking space, a device or another stationary installation.
  • a computer program product comprises program code means for carrying out the method described, when the computer program product runs on an execution device or is stored on a computer-readable medium.
  • An inventive system for securing access to a resource comprises an output device at the Res ⁇ source for providing an identification of the resource, an instance for receiving the identification of the resource, and an identification of a user, and a release device for release of the resource if the Be ⁇ user is authorized to access the resource.
  • system can be used to allow personal access to individual resources in an existing installation, for example a building.
  • the instance includes a memory for storing permissions for accessing multiple resources.
  • the instance can be a central instance by means of which access by one or more users to a plurality of different resources can be secured. A maintenance and management of, justifying ⁇ conditions of users on using the resource can be simplified possible.
  • the output device is adapted to a machine-readable, graphical representation of To provide identification.
  • the output device may in particular comprise a graphic output device.
  • the graphical output device preferably supports a high contrast ratio and is designed to represent a two-dimensional graphic code.
  • This code may in particular include a QR code.
  • the QR code can still wear ne ⁇ ben identifying the resource more Informatio ⁇ nen. Handling and operability of the system can thus be facilitated.
  • the system further comprises a user-controllable reader having a scanner for sensing the identification of the resource, an input device for receiving the user's identification, and a transmitter for communicating the identifications to the entity.
  • Such a reader may be formed in particular as a portable computer or a smartphone Com-, wherein the means for sampling the identification preferably a built-in optical interface, in particular a camera ⁇ sums.
  • a commercially available device can be used to use the described system for access control to one or more resources.
  • FIG. 1 shows a system for access control
  • FIG. 2 shows an exemplary identification of the resource
  • Figure 3 is an interpretation of the identification of Figure 2
  • Figure 4 is an exemplary representation of the output of the identification of Figure 2
  • Figure 5 illustrates a flow chart of a method for access control ⁇ in the system of FIG. 1 1 shows a system 100 for controlling access to a resource 105.
  • the resource 105 is through a door symboli ⁇ Siert that can allow or deny access to the resource 105, the resource 105 is also belie ⁇ bige other, preferably stationary resource for example, a room or an installation in a building.
  • a release device is being introduced ⁇ 110, by means of which can be effected 105 a machine-controlled release of the resource.
  • the release device 110 may include, for example, an automatic door opener, a barrier, or a controllable power supply.
  • an output device 115 is further attached.
  • the output device 115 includes ⁇ be vorzugtute a graphical output device for representation development of a two-dimensional machine-readable code.
  • Output device 115 is attached in the immediate vicinity of the resource 105 fixed or firmly connected to the resource 105. Furthermore, a processing device 120 is provided to control the output device 115. In particular, the processing device 120 is configured to illustrate on the off ⁇ display device 115 a QR code ( "quick response code"), which ce at least an identification of the resource represents the 105th This identification can beispielswei ⁇ se a unique identifier (UID) of the resource 105.
  • a timer 125 is provided which is connected to the processing device 120. Based on a time information of the timer 125, a time stamp or other indication of a creation timing of the QR code may be included in the QR code.
  • is carried out at preferably regular renewal of the displayed QR codes on the output device 115.
  • the renewal for example, time-controlled, carried ereignisgesteu ⁇ ert or randomly.
  • renewal of the displayed QR code on the output device 115 may occur approximately whenever an access attempt to the resource 105 has been detected.
  • the timer 125 may be omitted and the described generation and renewal of the information of the QR code may be performed by a separate entity, as described in more detail below.
  • the information provided by the instance can also be converted into the QR code by the processing device 120.
  • a mobile reader 130 operable by a user seeking access to the resource 105 includes a scanner 135, an input device 140, and a transmitter 145.
  • the reader 130 is preferably a portable computer, a smartphone, or similar device.
  • the scanning device 135 comprises in Darge ⁇ example presented a camera for receiving the QR code, which is displayed on the output device 115.
  • the input device 140 illustratively includes a touch screen on which the user can enter information and initiate the execution of commands.
  • the transmission device 145 includes a wireless interface, in particular ⁇ sondere a wireless GSM or Bluetooth interface. By means of the transmission device 145, a data connection to a central entity 150 can be established.
  • the reader 130 is configured to scan and recognize the QR code from the output device 115, that is to extract the information encoded into the QR code.
  • the extraction may also include, for example, a check of data coherency, a repair of non-detected or damaged parts of the QR code and a consistency check of the extra ⁇ hierten information.
  • a user identification can be input via the input device 140, which in FIG. 1 comprises by way of example an identifier 155 for the user as well as a secret code 160.
  • the identifier 155 and / or the code 160 may be managed by a browser running on the reader 130.
  • the instance 150 comprises a processing device 165, which has a first interface 170, a second interface 170
  • the first interface 170 is set up to enable communication with the transmission device 145 of the reading device 130.
  • the second interface 175 is connected to the release device 110. By a corresponding activation by the processing device 165, the resource 105 can be released by means of the second interface 175 and the release device 110.
  • the memory 180 receives one or more pieces of information describing a user's authorization to access the resource 105.
  • Each of this information may in particular comprise the resource 105, one or more users and a Benut ⁇ wetting time point or period of use.
  • the timer 185 is synchronized with the timer 125. This ensures that a time which is encoded into a QR code that Darge ⁇ is on the output device 115, and reduced by the scanning device 135 is transmitted by means of the transmission device 145 and the first interface 170 to the processing device 165, where it can be provided with the correct time reference.
  • the processing device 120 may be omitted if the
  • Output device 115 is controlled by the processing means 165 of the central entity 150.
  • the output device 115 can by means of another
  • Interface be connected to the processing device 165.
  • the QR code includes Minim ⁇ least an identification of the resource 105 and is time-coded Favor ⁇ ingly, that is, an indication of the position he ⁇ time of the QR code is part of the code shown.
  • the scanned QR code is decoded in reader 130 in a known manner.
  • an identification of the user here in the form of the identifier is ⁇ if the code provided 155 and 160 given in the reader 130, übli ⁇ chnote by entering by the user.
  • the collected information is then transmitted to the central entity 150 by means of the transmission device 145.
  • the central entity 150 can first take an examination before ⁇ whether the QR-code used is still valid. For this purpose, the reference to the creation time of the QR code can be evaluated and compared with a current time. If the QR code used is outdated, the release of the resource 105 can be denied. In one embodiment, a number of past QR codes may be provided by the central entity 150 be known and all QR codes whose creation time is before the QR code, which was current, for example, before two renewal ⁇ ments, can be discarded. There it is checked whether an authorization of the user, who is identifiable by the identifier 155 and optionally by the code 160, is presently available for the use of the resource 105. This check is made by comparison with an authorization in the memory 180. If the user is authorized, then the central entity 150 initiates the release of the resource 105 by means of the second interface 175 and the release device 110.
  • FIG. 2 shows an exemplary identification 200 of the resource 105 from FIG. 1.
  • FIG. 2 shows an exemplary identification 200 of the resource 105 from FIG. 1.
  • the identification 200 is embodied as a QR code and represents a web address 205, which can be ⁇ example by means of a browser by the reader 130 ⁇ selected.
  • Web address 205 includes at least one UID 210 identifying the resource.
  • Preferred ⁇ example is in the UID 210, a Note containing the Clearel ⁇ averaging time of identification 200th This may in particular be done in a non-obvious way, so that the time information can not be recognized or manipulated separately from the reference to the resource 105.
  • a cryptographic procedure here, example ⁇ as a hash function can be used.
  • the hash function may be based on a secret key of the item that created the identifier 200.
  • Optional 205 includes the web address of a location 215 of the resource 105. This is in particular ⁇ sondere useful if the location of the resource 105, not only by evaluating the UID 210, for example based on a table that is detectable.
  • FIG. 3 shows an interpretation 300 of the web address 205 of FIG. 2.
  • the QR code comprises a web address 305 which, in addition to the fields 210 and optionally 215 of FIG. that points to the Central Instance 150. In the Dar ⁇ position of Figure 3 is given if the time at which the interpreted QR code has been created, encoded in the data area of the field 210th
  • the interpretation represented 300 of the QR code which can be represented on the output device 115 of Figure 1 comprises in known manner a web address 305 may be automatic ⁇ table contacted by a browser of the reader 130 after using the scanner 135 the one shown on the display device 115 QR code tilltas ⁇ tet was.
  • the central entity 150 responds with a prompt, for example in the form of a web form, indicating an identification of loading user, for example in the form of the identifier 155 and, where ⁇ appropriate, the code 160.
  • the reader be configured to request or accept the identification of the user before the request is sent to the central entity 150.
  • the browser of the reading device 130 or the reading device 130 itself can store the identifier 155 and / or the code 160 locally after a first input and offer it to the user for acceptance or continue to use without further inquiry.
  • FIG. 4 shows an exemplary representation of the output of the identification 200 of the resource 105 of FIG. 2 on the output device 115.
  • the only mandatory element displayed on the display 115 is a QR code 405, as already discussed above, all other elements are optio ⁇ nal.
  • An access plan 410 may be provided to provide information about which user (s) are currently or at the next allocated time authorized to access the resource 105. In particular, this information may include a name or identifier 155 of a user and a usage period. Furthermore, usage instructions 415 may be given.
  • the groove ⁇ Zung notes for example, explain how to deal with the reader to gain access to the resource 105th
  • more information can be specified in one of the optional fields, if an authentication attempt by a user fails.
  • This information can, for example, include the identification 210 of the resource 105 in a form that can be read by the user.
  • a manual input of the identification 210 by the user into the reading device 130 is possible, so that the release of the resource 105 can take place even if, for example, the QR code which is displayed on the output device 115 can not be recognized or can not be recognized without error ,
  • location information 420 of resource 105 may be indicated.
  • the location information 420 may include, for example, a room number or a similar name.
  • FIG. 5 shows a flowchart of a method 500 for to ⁇ grip control in the system 100 of Figure 1.
  • the steps shown in Figure 5 are arranged to improve the presentation in three columns, the left column indicates operations generally by the processing means 120 in the region the resource 105 performed the ⁇ , the middle column indicates operations that are performed übli ⁇ chholder characterized by the reader 130, and the right column operations are generally carried out by the central entity 150th
  • a first step 505 one or more permissions are defined indicating which user (s) are authorized to access a resource 105 at a predetermined time or interval.
  • de authorization typically comprises the identification of the resource 105, an ID 155 of each user, and a time or period when the authorization is valid.
  • the identification 210 of the resource 105 is displayed on the output device 115.
  • the identification 210 is preferably individualized, that is, made dependent on a time of creation of the QR code. This can be done alternatively by the processing ⁇ device 120 in the region of the resource 105, or by the processing means 165 of the central entity 150th Step 510 is preferably performed at regular intervals. For example, a time-controlled, periodic updating of the illustrated, individualized UID 210 can take place. In other embodiments, the update can also be done randomly or ereignisgesteu ⁇ ert.
  • the identification of the resource 105 is scanned here by the output device 115 by way of example on the basis of the web address 205.
  • the UID 210 is extracted from the sampled information.
  • the central body 150 Transmitting the specific identification of the resource 105 to the central body 150.
  • the address of the central ⁇ eral instance 150 was automatically extracted in a preferred manner from the QR code.
  • the central authority responds 150 usual manner with a request to enter the identification of the user, for example in the form of the identifier 155 and, where appropriate, code 160.
  • About ⁇ mediation of user identification is then in egg nem step 530th
  • the identification of the user is automatic or upon approval by the user is appended to or encoded into the extracted web address 305 before the request is sent to the central entity 150. In both cases, the identifications of the resource
  • a following step 540 the accepted identifications are checked by comparing them with authorizations stored, for example, in the memory 180 of the central instance 150.
  • a Convention Stim ⁇ mung detected thereby, then a release of the resource 105, for example by means of Freigabeein- direction 110, carried by the central entity 150th
  • step 540 It can also be checked in step 540 whether the Ides ⁇ fication of the resource has its temporal validity over ⁇ exceeded by a time indication from the identifi- cation is determined and is compared with a current time based on the timer 185th If the indication differs by more than a predetermined amount from the current time, an invalidation of the identification is determined and the release of the resource 105 is denied.
  • one or more temporally successive identifications of the resource 105 are known by the central entity 150.
  • the identifications can include random or pseudo-random character strings without further decodable information content.
  • the oldest known identification is discarded. If the receiving identification does not correspond to one of the known, not discarded identifications, then again, an invalidation of the identification is determined and the release of the resource 105 is denied.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé de commande d'accès à une ressource, qui comprend les étapes suivantes : fournir à la ressource une identification de la ressource, limitée dans le temps et renouvelée régulièrement, accepter l'identification de la ressource et une identification d'un utilisateur et donner l'accès si l'utilisateur est autorisé à accéder à la ressource. Fig. 1 Rien à traduire
PCT/EP2012/075361 2012-01-25 2012-12-13 Commande d'accès WO2013110407A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102012201040 2012-01-25
DE102012201040.8 2012-01-25

Publications (1)

Publication Number Publication Date
WO2013110407A1 true WO2013110407A1 (fr) 2013-08-01

Family

ID=47561546

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2012/075361 WO2013110407A1 (fr) 2012-01-25 2012-12-13 Commande d'accès

Country Status (1)

Country Link
WO (1) WO2013110407A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105612775A (zh) * 2013-08-05 2016-05-25 Nextek电力系统公司 验证用户以操作电气装置
US9614849B2 (en) 2010-11-25 2017-04-04 Ensygnia Ip Ltd (Eipl) Handling encoded information
EP3584769A1 (fr) * 2018-06-20 2019-12-25 Detec AS Système de contrôle d'accès amélioré et procédé associé permettant de commander l'accès de personnes dans des zones limitées

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090324025A1 (en) * 2008-04-15 2009-12-31 Sony Ericsson Mobile Communicatoins AB Physical Access Control Using Dynamic Inputs from a Portable Communications Device
US20100005156A1 (en) * 2006-10-06 2010-01-07 Philip Wesby System and method for data acquisition and process and processing
EP2166697A1 (fr) * 2008-09-17 2010-03-24 GMV Soluciones Globales Internet S.A. Procédé et système d'authentification d'un utilisateur au moyen d'un dispositif mobile
GB2481663A (en) * 2010-11-25 2012-01-04 Richard H Harris Handling encoded information and identifying user

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100005156A1 (en) * 2006-10-06 2010-01-07 Philip Wesby System and method for data acquisition and process and processing
US20090324025A1 (en) * 2008-04-15 2009-12-31 Sony Ericsson Mobile Communicatoins AB Physical Access Control Using Dynamic Inputs from a Portable Communications Device
EP2166697A1 (fr) * 2008-09-17 2010-03-24 GMV Soluciones Globales Internet S.A. Procédé et système d'authentification d'un utilisateur au moyen d'un dispositif mobile
GB2481663A (en) * 2010-11-25 2012-01-04 Richard H Harris Handling encoded information and identifying user

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9614849B2 (en) 2010-11-25 2017-04-04 Ensygnia Ip Ltd (Eipl) Handling encoded information
US10530769B2 (en) 2010-11-25 2020-01-07 Ensygnia Ip Ltd (Eipl) Handling encoded information
US11146561B2 (en) 2010-11-25 2021-10-12 Ensygnia Ip Ltd (Eipl) Handling encoded information
CN105612775A (zh) * 2013-08-05 2016-05-25 Nextek电力系统公司 验证用户以操作电气装置
JP2016534445A (ja) * 2013-08-05 2016-11-04 ネクステック パワー システムズ インコーポレイテッド 電子機器を操作するために使用者を認証する方法及びシステム
EP3030999A4 (fr) * 2013-08-05 2017-03-08 Nextek Power Systems, Inc. Procédé et système permettant d'authentifier un utilisateur afin qu'il puisse faire fonctionner un dispositif électrique
CN105612775B (zh) * 2013-08-05 2019-04-30 Nextek电力系统公司 验证用户以操作电气装置
EP3584769A1 (fr) * 2018-06-20 2019-12-25 Detec AS Système de contrôle d'accès amélioré et procédé associé permettant de commander l'accès de personnes dans des zones limitées
WO2019245383A1 (fr) * 2018-06-20 2019-12-26 Detec As Système de commande d'accès amélioré et son procédé de commande d'accès de personnes dans des zones règlementées
EP3811339A4 (fr) * 2018-06-20 2022-06-01 Detec AS Système de commande d'accès amélioré et son procédé de commande d'accès de personnes dans des zones règlementées

Similar Documents

Publication Publication Date Title
EP2898483B1 (fr) Procédé et système de configuration de petites installations de fermeture
DE102018007534A1 (de) Zeitgebundener sicherer Zugang
EP2777309B1 (fr) Procédé et système permettant la validation d'un dispositif technique
DE102014101495B4 (de) Verfahren zum Zugang zu einem physisch abgesicherten Rack sowie Computernetz-Infrastruktur
EP3256977A1 (fr) Procédé mis en uvre par ordinateur pour le contrôle d'accès
EP2646940B1 (fr) Procédé d'affichage localement restreint de contenus lisibles sur un lecteur mobile
EP3215974B1 (fr) Procédé pour fournir un code d'accès à un appareil portable, et appareil portable
EP2820587B1 (fr) Procédé de contrôle d'accès à un ordinateur au moyen d'un terminal mobile
EP2732398B1 (fr) Méthode d'operation d'un dispositif de réseau
WO2013110407A1 (fr) Commande d'accès
EP3254432B1 (fr) Procédé de gestion d'autorisation dans un ensemble comportant plusieurs systèmes informatiques
EP3657750B1 (fr) Procédé d'authentification des lunettes intelligentes dans un réseau de données
EP3341882A1 (fr) Système de transaction
WO2016173994A1 (fr) Procédé pour produire une signature électronique
DE102013001733A1 (de) Verfahren zum Zugriff auf einen Dienst eines Servers über eine Applikation eines Endgeräts
WO2014124765A1 (fr) Dispositif et procédé d'administration sécurisée de codes d'accès
EP3300037B1 (fr) Dispositif de gestion d'accès, dispositif d'évaluation des informations d'accès et procédé de gestion d'accès
DE102007053736A1 (de) Authentifizierungsverfahren und Anordnung zur Durchführung eines solchen Authentifizierungsverfahrens sowie ein entsprechendes Computerprogramm und ein entsprechendes computerlesbares Speichermedium
EP3312753B1 (fr) Élément de sécurité physique pour réinitialiser un mot de passe
DE102012006013A1 (de) Zugangssteuerung eines Türkommunikation-Geräts oder Gebäudesystemtechnik-Geräts
DE102011117186A1 (de) Verfahren zur Kontrolle des Zugriffs auf einen Aktor und/oder Sensor
WO2017032453A1 (fr) Gestion, authentification et activation d'un support de données
DE202020101289U1 (de) Nicht-übertragbares Identifikationssystem mit zweidimensionalem Verschlüsselungscode
DE102017000514B3 (de) Vorrichtungen, systeme und verfahren zum entriegeln eines schlosses eines schloss-systems
DE102022114588A1 (de) Verfahren und System zur Authentifizierung einer Person

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12816035

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12816035

Country of ref document: EP

Kind code of ref document: A1