WO2022106152A1 - Verfahren zur bereitstellung eines zufluchtsraums - Google Patents
Verfahren zur bereitstellung eines zufluchtsraums Download PDFInfo
- Publication number
- WO2022106152A1 WO2022106152A1 PCT/EP2021/079412 EP2021079412W WO2022106152A1 WO 2022106152 A1 WO2022106152 A1 WO 2022106152A1 EP 2021079412 W EP2021079412 W EP 2021079412W WO 2022106152 A1 WO2022106152 A1 WO 2022106152A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- refuge
- access
- vehicle
- room
- request
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000004891 communication Methods 0.000 claims abstract description 9
- 238000013475 authorization Methods 0.000 claims abstract description 8
- 230000006870 function Effects 0.000 claims description 13
- 230000004913 activation Effects 0.000 claims description 6
- 230000009993 protective function Effects 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 claims description 5
- 230000003287 optical effect Effects 0.000 claims description 4
- 238000004378 air conditioning Methods 0.000 claims description 3
- 230000009849 deactivation Effects 0.000 claims description 3
- 230000003213 activating effect Effects 0.000 claims description 2
- 238000012795 verification Methods 0.000 abstract 3
- 230000002349 favourable effect Effects 0.000 description 7
- 238000001994 activation Methods 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000018109 developmental process Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000029305 taxis Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 206010016275 Fear Diseases 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000009429 distress Effects 0.000 description 1
- 239000007789 gas Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/2018—Central base unlocks or authorises unlocking
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G06Q50/40—
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/108—Encryption
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/20—Communication devices for vehicle anti-theft devices
- B60R2325/205—Mobile phones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Definitions
- the invention relates to a method for providing a shelter space in an object for a person seeking protection.
- shelters can provide protection and cover for passers-by.
- such refuges can be formed in buildings.
- they can also be provided in mobile units or objects. These can be parked vehicles, for example, which offer protection and cover for passers-by in emergency situations.
- a person in distress also referred to as a person seeking shelter or shelter-seeking person
- a third-party vehicle can therefore offer her no protection.
- the method is ideal for the use of a vehicle or a building by a plurality of people, for example, although the number is limited and typically does not change too quickly. For the beginning In the scenario described, however, such a method is largely unsuitable, since a large number of people would have to log on to a large number of servers and/or vehicles in order to gain access to a specific vehicle. However, it would be pure coincidence that this vehicle or one of several vehicles that can be realized with a manageable effort and in which a person is registered is in the immediate vicinity when they get into an emergency situation. The method cannot therefore be used to make objects, and here in particular moving objects such as vehicles, available as a safe haven or panic room.
- the object of the present invention is therefore to specify such a method for providing a shelter space in an object for a person seeking protection, which allows people in need to have quick access to a large number of objects easily and efficiently.
- the method according to the invention for providing a refuge space in an object for a person seeking protection provides that this person triggers a refuge request via an application on a mobile device, such as a smartphone.
- a communication unit in the object receives this refuge request via wireless communication, for example via Bluetooth, Bluetooth Low Energy, WLAN or NFC. It is then stored by the object in a database system for logging and documentation and checked using the digital identity of the mobile device.
- the check includes a query in a central access authorization database or in a decentralized identity system. If the check is positive, access to the refuge space is released, for example the doors of a vehicle or a Building entrance is unlocked and the object is switched to a refuge mode. Both the test and the release are documented in the database system.
- a one-time deposit of the digital identity of the mobile device used, for example the smartphone, in a corresponding database is sufficient to then gain access to all objects that are equipped with such a refuge procedure and system.
- the identity of the person seeking protection could be managed decentrally using a so-called "Self Sovereign Identity" approach in that a server system linked to the object in the event of a request for refuge in this decentralized identity system asks for the identity of the person seeking protection.
- a targeted "on-boarding" on the proprietary identity management systems of the administration of the objects involved would no longer be necessary.
- the method according to the invention can be used to grant access to a refuge room in an emergency, and through appropriate documentation of the process in the database system, unauthorized use as well as an actual emergency can be documented and clarified, so that the basic risk of improper use can be largely prevented.
- a decentralized system based on distributed ledger technology can be used as a database system or according to the very favorable embodiment of the method described above via a decentralized identity system.
- the distributed ledger technology which is also known in principle from the state of the art mentioned above for similar applications, the logging and storage of the processes can be carried out in a tamper-proof manner in various nodes in a blockchain, so that very secure logging and documentation is possible, which is virtually not can be changed and therefore enjoys a high level of trust and further minimizes the possible risk of misuse.
- Another extraordinarily favorable embodiment of the method according to the invention can provide for the closing of released access openings, such as doors, to be automatically locked so that the refuge space forms a safe shelter. It is also provided that in the event of active use of the refuge space, it will not be released again. This ensures the required security so that another person cannot release the room again by using the corresponding application, so that people who had threatened or could threaten the person seeking protection who had previously fertil there could enter the room.
- a further extraordinarily favorable embodiment of the method according to the invention now also provides that the application and/or the mobile terminal device on which this application is installed is secured via an access block.
- Such protection of the application or of the entire mobile device provided with the application can be useful and necessary in order to prevent misuse, for example by gaining access to a refuge room via a lost or stolen mobile device in order to charge there of the owner of the stolen mobile device to cause damage.
- Various technologies known per se from the field of smartphones are suitable as an access lock, for example biometric access systems via face recognition, iris recognition, fingerprint recognition or the like. Alternatives such as personal identification numbers (PIN), passwords or the like would also be conceivable here.
- a very crucial aspect and thus a very particularly important and extraordinarily advantageous embodiment of the method according to the invention also provides that in the object's refuge mode all available sensors of the object are activated and their recorded data are logged.
- Appropriate sensors can be cameras and/or microphones, for example.
- all events that occurred in the context of the emergency situation can be documented, on the one hand to ensure that the refuge room has only been used in accordance with the applicable rules, and on the other hand to document the emergency situation accordingly and, if necessary, if necessary to be able to work through investigative tactics.
- other sensors can be activated in addition to cameras, microphones and the like. If the object is a vehicle, for example, an environment detection via various environment sensors as well as an interior detection can be activated accordingly in order to document the emergency situation as comprehensively as possible. This can preferably be done in a central server of an organization managing the refuge rooms.
- Another very favorable embodiment of the method according to the invention also provides that in refuge mode an operating unit in the refuge room or an indirect operability of such is activated by the application on the mobile terminal located in the refuge room.
- This direct or indirect operability of the operating unit can then, according to an extraordinarily favorable development, control corresponding protective functions in order to give the person in the shelter seeking protection the opportunity to act according to their needs and/or fears.
- the protective functions can include at least one of the following functions.
- these can include making an emergency call.
- the activation and/or deactivation of interior and exterior lighting can also be useful.
- a dark mode can be set via the operating unit or indirectly via the application on the mobile terminal device, in which it is not recognizable from the outside that there is a person in the refuge room at all. If the person seeking protection thinks it makes more sense to switch on the lighting, they can also choose a bright mode In particular, she can also choose a dark mode for the sanctuary itself and as light a mode as possible for the environment.
- privacy protection functions can be activated or deactivated, for example blinds can be closed or the like. It would also be conceivable to trigger an optical and/or acoustic alarm, for example a horn or a flashing light, if the object is a vehicle.
- a circulating air control and/or air conditioning could be controlled in order to suppress the penetration of gases, smoke or the like into the refuge space and to be able to remain in it for as long as possible.
- locking and unlocking of access openings such as doors can also be controlled as a protective function. This means, for example, helpers can be let in or the doors can be opened so that the shelter can be left again after the emergency situation has ended.
- the object is designed as a mobile object, in particular as a vehicle.
- this design as a vehicle is particularly useful. For example, in many areas of cities, a parked vehicle is almost always nearby and could serve as a safe space very easily and efficiently. On the one hand, this can affect private vehicles, but requires the cooperation of a large number of private individuals with the system. It can therefore also make sense if vehicles from companies, carpools, vehicles from the fleet of public institutions, taxis or the like are available for the system.
- a limited range of functions is available in the refuge mode.
- the range of functions can be restricted accordingly so that only the required functions are provided immediately. Functions that are not required can be blocked accordingly if the object was accessed via a refuge request.
- entry into undesired areas such as adjacent rooms in the case of a building as an object or into the glove box in the case of a vehicle as an object can be blocked accordingly, as well as the ability to drive the vehicle or the like.
- the object emits a signal after receiving a request for refuge.
- a signal can, for example, be an optical or acoustic signal from the object, in order to show, in the case of a request for refuge, that the next available object with a refuge space is in the corresponding position. It would also be conceivable to only send the signal to the application of the mobile device, for example by showing an arrow and a distance indication that the next available refuge is 30 m to the left of the mobile device, so that the person in need is on the one hand to help, but to enable this without a reference to the selected refuge that is also recognizable for third parties.
- the only attached figure shows a basic scenario for explaining the method according to the invention in a possible embodiment.
- the illustration in the figure shows an object 1.
- This can be a vehicle, a building, part of a building, a ship, an aircraft or the like.
- What all useful objects have in common is essentially that they can provide a certain protective function for one or more people in certain emergency situations. In particular, this can be locking the entrances, but also moving away from the current location, making an emergency call or the like.
- the object 1 in the exemplary embodiment illustrated here can subsequently be a vehicle 1, for example.
- a person seeking protection not shown here, carries a mobile terminal device 2, for example a smartphone 2, with them. The person has installed an application 3 on this smartphone 2, which triggers access to the object 1, in this case the vehicle, in an emergency.
- the identity of the owner of the smartphone 2 has been determined via the application 3 in an on-boarding process and his identity is known in a central backend system 4 .
- the application 3 itself or the smartphone 2 have an access block, for example a PIN protection and/or protection via biometric features or the like. This means that the identity of the smartphone owner cannot be misused through theft.
- the object 1, in this case the refuge vehicle, which provides the owner of the smartphone 2 with a refuge space in an emergency, must be configured accordingly in order to support a refuge mode in such a case. If the person approaches the vehicle 1 with the smartphone 2 and the application 3 clearly signals that there is an emergency, the following essentially happens:
- the application 3 communicates via a wireless communication connection such as Bluetooth, Bluetooth Low Energy, WLAN or NFC with a communication module 5 of the vehicle 1.
- a machine identification and access system 6 Via a machine identification and access system 6, the request for refuge and ultimately the desire to gain access to a refuge room is registered and stored anonymously in a distributed database system 7.
- a distributed database system 7 which is based on distributed ledger technology, all other relevant events are also stored for later traceability, but without any personal data, so that the protection of personal data is guaranteed here in any case.
- a request is sent to a central personal identification system 10 with the digital identity from a secure memory 8 of the smartphone 2 via a personal identification system 9 .
- a central access authorization database 11 within the central backend system 4 queries this. If the digital identity is known there and authorized to obtain emergency access to the vehicle 1, this is reported back to the local machine identification and access system 6 via a central machine identity and access system 12 of the central backend system 4. This event is also documented accordingly in the database system 7 .
- a refuge room mode or panic room mode is activated within the vehicle 1 and only includes a limited range of functions of the vehicle 1, which is optimized for corresponding emergency situations.
- the range of functions can vary, possibly also taking into account different boundary parameters, so that different ranges of functions are available at different locations, at different times and/or depending on the ambient brightness.
- a refuge mode could include the following functionalities:
- - Activation could also be controlled via such a control device 13 with regard to the lighting, for example.
- a "dark” and a "light” mode could be specified as switching variants.
- the "dark” mode would then lead to the interior of the vehicle 1 being darkened towards the outside, so that, for example in the dark, it is not apparent from the outside that there is a person in the interior of the vehicle at all.
- the "Bright” mode could be implemented in such a way that all exterior lights are switched on in order to be able to illuminate the area around the vehicle to the maximum.
- All cameras, microphones and sensors of the vehicle 1 are activated in order to easily enable later reconstruction of the event.
- the data recorded by the available sensors, including the vehicle's cameras and microphones, both in the environment and inside the vehicle, enable continuous monitoring, which is preferably documented by storing the recorded data.
- An emergency call system 14 can be activated from the interior of the vehicle 1 by activating the operating device 13, which can be implemented, for example, as part of an infotainment system.
- a direct emergency call can be made here, for example via the so-called eCall, which is mandatory in Europe. Individually making an emergency call, for example alerting the police or fire brigade, is of course also conceivable.
- the air conditioning system can be set to a special recirculation mode in order to ensure that the air supply in the interior of the vehicle 1, which is used as a refuge, is self-sufficient for as long as possible.
- optical and/or acoustic alarms can be triggered in the refuge mode by activations in the infotainment system, for example the howling of an alarm system, the vehicle 1 flashing, the horn being triggered or the like.
- infotainment system for example the howling of an alarm system, the vehicle 1 flashing, the horn being triggered or the like.
- all relevant events and any values recorded by the sensors of the vehicle 1 are correspondingly recorded and documented.
- the data from the sensors, such as the cameras and microphones are preferably stored automatically at short time intervals. They can also be transmitted to the central backend system 4 at short time intervals. However, this requires a working internet connection. If this does not exist, the corresponding data can also be temporarily stored in the vehicle and/or the smartphone application in order to send them to the central backend system 4 as soon as possible.
- any object 1 such as a vehicle, for example, can be used as a life raft or place of refuge for people in danger, even if these people would not normally have access to the object 1 .
- the relevant events are documented in a tamper-proof manner using blockchain-based solutions, which means that misuse is always traceable and traceable. This significantly reduces the risk of possible misuse.
- parked vehicles that do not have a private character, such as taxis, buses, delivery vans, minibuses, vehicles from distribution or courier services, for mobile social services or ambulances, etc.
- this mode can provide valuable added value for society and the social Play together in the communities. They then offer a safe haven when there are no other sources of help or people providing assistance nearby.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020237015475A KR20230084250A (ko) | 2020-11-19 | 2021-10-22 | 대피 공간을 제공하는 방법 |
CN202180077144.5A CN116472566A (zh) | 2020-11-19 | 2021-10-22 | 用于提供避难空间的方法 |
US18/037,608 US20230415701A1 (en) | 2020-11-19 | 2021-10-22 | Method for providing a refuge space |
JP2023530024A JP2023551430A (ja) | 2020-11-19 | 2021-10-22 | 退避スペースを提供するための方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102020007073.6A DE102020007073A1 (de) | 2020-11-19 | 2020-11-19 | Verfahren zur Bereitstellung eines Zufluchtsraums |
DE102020007073.6 | 2020-11-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022106152A1 true WO2022106152A1 (de) | 2022-05-27 |
Family
ID=78414016
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2021/079412 WO2022106152A1 (de) | 2020-11-19 | 2021-10-22 | Verfahren zur bereitstellung eines zufluchtsraums |
Country Status (6)
Country | Link |
---|---|
US (1) | US20230415701A1 (de) |
JP (1) | JP2023551430A (de) |
KR (1) | KR20230084250A (de) |
CN (1) | CN116472566A (de) |
DE (1) | DE102020007073A1 (de) |
WO (1) | WO2022106152A1 (de) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110060480A1 (en) * | 2009-06-08 | 2011-03-10 | Zipcar, Inc. | Mobile device application for communicating with vehicles |
US20170098292A1 (en) * | 2015-10-06 | 2017-04-06 | Huf North America Automotive Parts Mfg. Corp. | System and method for wirelessly accessing a vehicle |
DE102018010027A1 (de) | 2018-12-19 | 2020-06-25 | Daimler Ag | Abwicklungssystem |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102017219802A1 (de) | 2017-11-08 | 2019-05-09 | Robert Bosch Gmbh | Verfahren und Vorrichtung zur Assistenz eines Nutzers eines mobilen Geräts, insbesondere zur Gefahrenabwehr des Nutzers |
DE102020005704A1 (de) | 2020-09-18 | 2020-11-12 | Daimler Ag | Verfahren zum Erzeugen einer Zutrittsberechtigung zu einem Kraftfahrzeug mittels eines Zutrittsberechtigungssystems, sowie Zutrittsberechtigungssystem |
-
2020
- 2020-11-19 DE DE102020007073.6A patent/DE102020007073A1/de active Pending
-
2021
- 2021-10-22 WO PCT/EP2021/079412 patent/WO2022106152A1/de active Application Filing
- 2021-10-22 US US18/037,608 patent/US20230415701A1/en active Pending
- 2021-10-22 KR KR1020237015475A patent/KR20230084250A/ko unknown
- 2021-10-22 JP JP2023530024A patent/JP2023551430A/ja active Pending
- 2021-10-22 CN CN202180077144.5A patent/CN116472566A/zh active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110060480A1 (en) * | 2009-06-08 | 2011-03-10 | Zipcar, Inc. | Mobile device application for communicating with vehicles |
US20170098292A1 (en) * | 2015-10-06 | 2017-04-06 | Huf North America Automotive Parts Mfg. Corp. | System and method for wirelessly accessing a vehicle |
DE102018010027A1 (de) | 2018-12-19 | 2020-06-25 | Daimler Ag | Abwicklungssystem |
Also Published As
Publication number | Publication date |
---|---|
US20230415701A1 (en) | 2023-12-28 |
DE102020007073A1 (de) | 2022-05-19 |
CN116472566A (zh) | 2023-07-21 |
KR20230084250A (ko) | 2023-06-12 |
JP2023551430A (ja) | 2023-12-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018188956A1 (de) | Zugangskontrollsystem mit funk- und gesichtserkennung | |
WO2019121336A1 (de) | Zugangskontrollsystem mit funk-authentifizierung und kennworterfassung | |
EP3899883B1 (de) | Zugangskontrollsystem mit schiebetür mit objektüberwachungsfunktion | |
DE10147936B4 (de) | Verfahren zur Zutrittskontrolle, sowie Kontrollsystem, Kontrolleinrichtung und mobiles Kommunikationsendgerät | |
DE102016213682B3 (de) | Verfahren zum Sichern eines Grundstücks oder Wohngebiets mittels Fahrzeugen | |
DE102010031453A1 (de) | System und Verfahren für das Abschrecken vor Fahrzeugdiebstahl und für das Steuern des Parkens von Fahrzeugen | |
EP3007139B1 (de) | Türschliesssystem | |
DE102020005344B3 (de) | Verfahren zur Deaktivierung und Aktivierung einzelner Berechtigungen und/oder Funktionen eines Fahrzeugschlüssels | |
WO2022106152A1 (de) | Verfahren zur bereitstellung eines zufluchtsraums | |
EP2350981B1 (de) | Zugangskontroll- und -steuersystem | |
DE102018220754B4 (de) | Zugangssteuersystem und Verfahren zum Steuern eines Zugangs zumindest einer Person in einen Gebäudebereich | |
EP3839918A1 (de) | System zur parkplatz-zufahrtskontrolle | |
WO2019166216A1 (de) | Fahrberechtigungssystem | |
WO2021233719A1 (de) | Zusätzliche zonenüberwachung für gebäudetür | |
DE102020005704A1 (de) | Verfahren zum Erzeugen einer Zutrittsberechtigung zu einem Kraftfahrzeug mittels eines Zutrittsberechtigungssystems, sowie Zutrittsberechtigungssystem | |
DE102005062632A1 (de) | Automatische Verwaltung des Aufenthalts von Personen in Räumlichkeiten von Gebäuden | |
WO2022007997A1 (de) | System zur überwachung des betriebs eines schiffs | |
DE102016210139A1 (de) | Verfahren zum Setzen eines Identifikationsmerkmals, Fahrzeug, Betriebsverfahren für ein Sicherheitssystem und Sicherheitssystem | |
DE102017106014B4 (de) | Verfahren zum Betreiben einer ein Objekt sichernden Einbruchmeldeanlage | |
DE102019114850A1 (de) | Wandmontierbares Authentifizierungsgerät | |
DE19641266A1 (de) | Kombinierte universale Einbruchschutzeinrichtung | |
Störm et al. | Perceptions of the effectiveness of security measures used at security estates: case studies from Centurion in the city of Tshwane, Gauteng | |
DE19638485C2 (de) | Alarmsystem für ein Mehrfamilienhaus | |
CH709344A2 (de) | Verfahren zum Überwachen eines Raumes. | |
DE102021134234A1 (de) | Verfahren zum Überwachen eines Innenraums eines Kraftfahrzeugs mittels eines Überwachungssystems, Computerprogrammprodukt, computerlesbares Speichermedium sowie Überwachungssystem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21799011 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20237015475 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202180077144.5 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023530024 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18037608 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21799011 Country of ref document: EP Kind code of ref document: A1 |