专利摘要:
DISTRIBUTION OF LOCATION ACCESS INFORMATION. Site access information can be distributed using a system (100) comprising an ingress server (110) coupled with a remotely located site server (150, 152, 250). The site server (110) receives a ticket request from a host device (140). After interacting with the site server (150, 152, 250), the ticket server (110) sends information related to access to a visitor's device (130). The visitor's device (130) can later use access related information to gain access to a location.
公开号:BR112013024494B1
申请号:R112013024494-1
申请日:2012-03-22
公开日:2021-01-26
发明作者:Paul Friedli;Markus Kappeler
申请人:Inventio Ag;
IPC主号:
专利说明:

[0001] [0001] The present invention relates to the distribution of site access information.
[0002] [0002] Access information can be used to determine who or what can enter a location and, for example, under what circumstances. Sites can comprise, for example, one or more buildings, a part of a building, an open or semi-open area, an underground structure and / or an elevator installation.
[0003] [0003] WO 2010/112586 describes a method for access control. An identification code is sent to an access code using a mobile phone. If the identification code is recognized as valid, an access code is sent from an access node to the mobile phone and presented in a video from the mobile phone. The access code is detected using a camera, and if the access code is recognized as valid, access is granted.
[0004] [0004] Sometimes it is more convenient if the access information to the site can be distributed electronically (compared, for example, with distributing the access information exclusively by personal contact or by physical methods, such as a distribution service). Consequently, it may be useful to have additional technologies for electronic distribution of access information to locations.
[0005] [0005] The above questions are, at least in some cases, addressed through technologies described in the embodiments.
[0006] [0006] The access information to the sites can be distributed using an incoming server coupled with a remotely located site server. The ticket server receives a ticket request from a host device. After interacting with the site server, the ticket server sends access-related information to a visitor's device. The visitor's device can later use the access-related information to gain access to a location.
[0007] [0007] In some embodiments, a method of access control to the sites comprises: receiving, from a host device and using a ticket server, an access ticket request with optical code for use at a location by a device from the Visitor; send, using the ticket server, an authorization request to a site server, the ticket server being remotely located from the site server and remotely located from the host device; and sending, using the ticket server, an access link message to the visitor's device, the access link message providing access to optical code to access the site. The access ticket request may comprise a time parameter, an entry location parameter and a supplementary code parameter. The site server can be located at the site. The method may additionally comprise authenticating the host device, possibly to the site. In additional embodiments, the site server is configured to provide access to the site based on the optical code and based on an additional code from the site server. The method may additionally comprise sending, using the site server, the supplementary code to the visiting device. The site may comprise several entries, the method further comprising determining that the optical code for accessing the site has been presented in an incorrect entry among the various entries. The site server can record the visit information associated with the optical code.
[0008] [0008] Still in further embodiments, the method comprises providing guidance information for the visitor to the visiting device based at least in part on the optical code, the guidance information possibly including an elevator call designation. The method may additionally comprise sending, using the ticket server, the optical code to the visiting device. The access rights associated with the optical code can be modified. The ticket server and the site server can be controlled by different parts.
[0009] [0009] In additional embodiments, a method of controlling access to the site comprises: receiving, from a first host device and using a ticket server, a request for a first access ticket with optical code for use at a first site by a first visiting device; send, using the ticket server, a first authorization request to a first server at the site located at the first site, the ticket server being remotely located from the first server at the site and remotely located from the first host device; sending, using the ticket server, a first access link message to the first visiting device, the first access link message providing access to a first optical code to access the first location; receiving, from a second host device and using the ticket server, a request for a second access ticket with optical code for use at a second location by a second visiting device; sending, using the ticket server, a second authorization request to a second site server located at the second site, the ticket server being remotely located from the second site server and remotely located from the second host device; and sending, using the ticket server, a second access link message to the second visiting device, the second access link message providing access to a second optical code to access the second location.
[0010] [00010] Unless otherwise stated, the acts of the method disclosed in this document may be performed by a processor executing instructions stored on one or more computer-readable storage media. Computer-readable storage media comprise, for example, one or more optical disks, a volatile memory component (such as DRAM or SRAM), and / or a non-volatile memory component (such as hard disks, RAM or Flash ROM). Computer-readable storage media do not comprise temporary signs.
[0011] [00011] Illustrative embodiments of the technologies described are described below with reference to the following figures:
[0012] [00012] FIG. 1 shows a block diagram of an illustrative embodiment of a system for distributing access information to the site.
[0013] [00013] FIG. 2 presents a block diagram of an illustrative embodiment of the system for controlling access to a location.
[0014] [00014] FIG. 3 presents a block diagram of an illustrative embodiment of a method for distributing access information to the site.
[0015] [00015] FIG. 4 presents a block diagram of an illustrative embodiment of a method for distributing access information to the site.
[0016] [00016] FIG. 5 presents a block diagram of an illustrative embodiment of a method for distributing access information to the site.
[0017] [00017] FIG. 6 presents a block diagram of an illustrative embodiment of a method for receiving access information to the site.
[0018] [00018] FIG. 7 presents a signal diagram for an illustrative signal exchange produced according to one or more embodiments of the described technologies.
[0019] [00019] FIG. 8 presents a signal diagram for an illustrative signal exchange produced according to one or more embodiments of the described technologies.
[0020] [00020] FIG. 9 presents a block diagram of an illustrative embodiment of a server that can be used with one or more technologies described in this document.
[0021] [00021] FIG. 10 presents a block diagram of an illustrative embodiment of an electronic device that can be used with one or more technologies described in this document.
[0022] [00022] The term “host” as used in this document, generally refers to a party that wants access to a location to be granted to a person and / or a machine. In the various cases, the host is one or more people, an organization or a machine (for example, a computer or robot). The term “visitor”, as used in this document, generally refers to a party that receives or is intended to receive access to a location. In the various cases, the visitor is one or more people, an organization or a machine (for example, a computer or robot). The host and / or the visitor may or may not be an occupant of the place. No particular level of familiarity with the place is required from the visitor or the host.
[0023] [00023] FIG. 1 shows a block diagram of an illustrative embodiment of a system 100 for distributing access information to the site. As used in this document, “location access information” generally refers to information that can be used to obtain entry to one or more parts of a location. System 100 comprises an ingress server 110, which exchanges information with one or more other components of the system over a network 120. Network 120 comprises a wired and / or wireless network (for example, an Ethernet network, an wireless LAN and / or the Internet). In at least some cases, the ticket server is remotely located from the other components of the system. In at least some cases, communications over the network 120 are performed using various security measures. For example, data can be encrypted and / or a VPN (virtual private network) can be used.
[0024] [00024] Additional components may include, for example, a visitor device 130 and a host device 140. Each of the visitor device 130 and host device 140 may comprise a configurable portable electronic device to run one or more software programs , including software programs that cause devices 130, 140 to perform one or more acts of the method described in this document. Examples of devices 130, 140 include handheld computers, smartphones, mobile phones, tablet computers, laptop computers and PDAs. Host device 140 can also comprise electronic devices that are not necessarily considered to be “portable”, such as personal desktop computers . Devices 130, 140 can be the same device model, or they can be different models.
[0025] [00025] System 100 additionally comprises a server at site 150. The server at site 150 handles permission information for one or more sites 160. In some cases, server 150 is located at site 160; in other cases, server 150 is located outside site 160. System 100 may additionally comprise one or more additional site servers 152, which store permission information for one or more other sites 162.
[0026] [00026] FIG. 2 shows a block diagram of an illustrative embodiment of system 200 for controlling access to a location. System 200 comprises a server at site 250, which may be similar to the servers 150, 152 described above. Using a network 210, server 250 can communicate with other components (for example, one or more other components described above in system 100). Using a data storage component 260, server 250 can read and / or write permission data (for example, whether a visitor should be granted access to a location at a particular time and location) and other data. The server 250 is coupled with one or more code readers 220, which are designed to read optical codes with a single dimension or with multiple dimensions from documents in printed format (for example, printed output on paper) and / or from portable electronic devices. For example, reader 220 can read a two-dimensional optical code 232 that is displayed on the screen of a portable electronic device 230. In the various embodiments, optical code 232 comprises a bar code, a QR code, a DataMatrix code, and / or another type of code. The code reader 220 generally comprises a barcode scanner, a camera and / or other imaging device. As explained below, a call message 234 and / or a supplementary code message 236 can also be displayed and / or stored by device 230. Optical code 232 stores information that allows a visitor to be associated with permission data.
[0027] [00027] The server 250 can be coupled with an access control unit 240. The access control unit 240 provides operational signals for one or more components in the locations. Such components can include one or more doors 242, one or more elevators 244 and / or one or more escalators 246. In particular embodiments, the site comprises several entrances, each of the entrances comprising a door, elevator and / or escalator. In some embodiments, server 250 is also coupled with an input device 270. Input device 270 can comprise, for example, a keyboard or a numeric keypad, and can be used to enter additional information. Examples of such information are described below.
[0028] [00028] In at least some cases, system 200 can generally be used as follows. A visitor with the portable electronic device 230 approaches the code reader 220 at a location that the visitor wishes to have access to. The code reader 220 reads the code 232 from the device screen 230 and sends the code to the server at site 250. The server at site 250 examines permission data stored in data store component 260 and determines whether the visitor should receive access to the location based on possession of the visitor's 232 code. If it is to grant access, server 250 indicates this to access control unit 240. Access control unit 240 then consequently operates one or more components (for example, door 242, elevator 244, escalator 246) to provide the visitor with appropriate access to the site.
[0029] [00029] FIG. 3 shows a block diagram of an illustrative embodiment of a method 300 for distributing access information to the site. In an act of method 310, a host indicates one or more settings or parameters of the ticket using a host device (for example, similar to host device 140, described above). The ticket settings can comprise, for example: an identifier for a visiting device (for example, phone number, IMEI number (International Mobile Equipment Identity), MAC address (media access control), serial number); a date and time for access (including a specific time or one or more time bands); a site identifier, an entry identifier; how often a given optical code for the visitor's device can be used (for example, once or more than once); and / or an indication of whether additional information should be required to gain access to the site. The additional information (also called “supplementary information”) can comprise, for example, a personal identification number (PIN) or other piece of information that can be presented together with an optical code.
[0030] [00030] In an act of method 320, the ticket request is submitted to a ticket server. In some embodiments, if the request is approved, the host device receives confirmation of approval in an act of method 330.
[0031] [00031] In additional embodiments, the information regarding a requested ticket can be revised in an act of the 340 method. For example, the ticket can be canceled, or one or more parameters of the ticket can be changed.
[0032] [00032] FIG. 4 presents a block diagram of an illustrative embodiment of a method 400 for distributing access information to the site. In an act of method 410, a ticket server (for example, like server 110 described above) receives a ticket request from a host device. In additional embodiments, the ingress server performs authentication of the host device. Authentication can be based, for example, on the X.509 protocol and / or another protocol.
[0033] [00033] Based at least in part on the ticket request, the ticket server sends an authorization request to a site server (for example, the site server 150 described above) in an act of method 420. The authentication request it includes, for example, identification information for a visitor's device and details of the location and time of the requested visit. In some cases, the request also indicates whether supplemental information should be required to gain access to the site. In additional cases, the request includes identification information for the visitor's device (for example, a telephone number and / or email address). In some embodiments, if the request is approved by the site server, the ticket server receives an acknowledgment from the site server.
[0034] [00034] In additional embodiments, in an act of method 430, the ticket server sends a confirmation to the host device that the ticket request has been approved. Still in additional embodiments, in an act of method 440, the ticket server sends a call message to the visitor's device. Generally, the connection message provides information that allows the visitor's device to request an optical code that can be used when gaining access to the location. One or more access rights are thus associated with the optical code. In some embodiments, the link message comprises a network address, such as a URL. At least part of the call message can be sent as an email message, a text message, or as a multimedia message. In some cases, the optical code is sent to the visitor's device without first sending a call message to the visitor's device.
[0035] [00035] FIG. 5 presents a block diagram of an illustrative embodiment of a method 500 for distributing access information to the site. In an act of method 510, a site server (such as site servers 150, 152, 250, described above) receives from a ticket server a request to authorize a ticket to a visitor's device. The authorization request may be similar to the request described above for FIG. 4. The site server compares the authorization request with permission information (possibly stored on a device as the 260 data storage component, described above). If the authorization request can be allowed according to the permission information, the site server grants the request in an act of method 520. Otherwise, the permission server can deny the request.
[0036] [00036] For additional embodiments, in an act of method 530, the site server records information about the request, such as the time and location of the visit, and whether additional information is required from the visitor.
[0037] [00037] Still in additional embodiments, if the site server will require additional information (for example, a supplementary code) from the visitor at the site, the site server sends this information to the visitor's device in a code message. access in an act of method 540. At least part of the information can be sent as an e-mail message, a text message, or as a multimedia message.
[0038] [00038] When the optical code (and, in some cases, additional information) is presented to a code reader at the site, the site server grants access to the visitor in an act of method 550, assuming that the conditions associated with the optical code are met.
[0039] [00039] The option to request additional information from the visitor, and the option of having this information provided to the visitor by the site server, can provide more robust security than in a system where additional information is not required or where so much the access link message and additional information is provided to the visitor's device by the authorization server. For example, in some cases, the authorization server and the site server could be controlled by two different entities (for example, a service provider and a building owner or supervisor, respectively). Consequently, requiring a visitor to present both an optical code and, for example, a PIN, in order to gain access, can help prevent the service provider from granting access to the site without the permission or knowledge of the building owner or superintendent.
[0040] [00040] FIG. 6 presents a block diagram of an illustrative embodiment of a method 600 for receiving access information to the site. In an act of method 610, a visitor device (such as visitor device 130, described above) receives an access message call. As has been similarly explained above, the link message generally provides information that allows the visitor's device to request an optical code that can be used when gaining access to the site. In some embodiments, in an act of method 620, the visitor's device receives a message containing a supplementary code. In particular embodiments, the method 620 act can occur before act 610.
[0041] [00041] In an act of method 630, the visitor's device, based at least in part on the access link message, requests an optical code from a ticket server. In an act of the 640 method, the visitor's device receives the optical code. The optical code can then be used to access the site. In at least some cases, the code is validated for a limited time after it is requested (for example, one, five or ten minutes, or another amount of time). This can help prevent unauthorized use of the code if, for example, the visitor's device is lost or stolen after the optical code is requested, but before it is presented on site.
[0042] [00042] FIG. 7 presents a signal diagram for an illustrative signal exchange produced according to one or more embodiments of the described technologies. Participants in this exchange include, for example, a host device (such as the host device 140 described above), an ingress server (such as the ingress server 110, described above), and a site server (such as the site server 152 , described above). The host device sends a ticket request 710 to the ticket server. The ticket server sends an authorization request 720 to the site server. The site server sends a 730 authorization response to the ticket server. In some cases, the ticket server sends a confirmation 740 of the authorization of the ticket request to the host device.
[0043] [00043] FIG. 8 presents a signal diagram for an illustrative signal exchange produced according to one or more embodiments of the described technologies. Participants in this exchange include, for example, a ticket server (such as ticket server 110, described above), a visitor device (such as visitor device 130, described above), and a site server (such as the server from location 152, described above). The ticket server sends an 810 access link message to the visitor's device. The site server sends an access code 820 message to the visitor's device. The visitor's device sends an 830 optical code request to the ticket server. The response ticket server sends an 840 optical code message to the visitor's device.
[0044] [00044] The visitor's device then provides an 850 message with the optical code to the site server through, for example, a code reader. Although not shown in FIG. 8, in some embodiments, the visitor also provides the site server with additional information, such as a PIN code. In some cases, additional information can be transmitted from the visitor's device to the site server. In other cases, additional information is provided by the visitor through an input device, such as a keyboard or numeric keypad. In some embodiments, the site server then sends an 860 message to the visitor's device with access information. The access information may comprise, for example, a confirmation that access has been granted, a direction in which the visitor must travel, a distance that the visitor must travel, a door that the visitor must enter, an escalator that the visitor should use, and / or an elevator call designation.
[0045] [00045] Generally, FIGS. 7 and 8 can be read so that signals appearing towards the bottom of the figure are sent after they appear toward the top of the figure. However, in some embodiments of the technologies described, other orders to send signals are possible. For example, in FIG. 8, access code message 820 can be sent to the visitor's device prior to access link message 810.
[0046] [00046] FIG. 9 presents a block diagram of an illustrative embodiment of a server 900 (for example, an ingress server, a site server) that can be used with one or more technologies described in this document. The server comprises one or more processors 910. Processor 910 is coupled with memory 920, which comprises one or more computer-readable storage media storing software instructions 930. When executed by processor 910, software instructions 930 cause the 910 processor performs one or more acts of the method described in this document. Additional embodiments of the server 900 may comprise one or more additional components.
[0047] [00047] FIG. 10 presents a block diagram of an illustrative embodiment of an electronic device 1000 that can be used with one or more technologies described in this document, for example, as a visitor device and / or host device. The device 1000 comprises components such as a 1010 processor. The 1010 processor is coupled with a 1020 memory, which comprises one or more computer-readable storage media stored in at least 1020 software instructions. When executed by the 1010 processor, the instructions for software 1030 cause the 1010 processor to perform one or more acts of the method described in this document. Software instructions 1030 can be loaded onto device 1000 via a connection to another electronic device (eg, a personal computer), via a connection to one or more computer-readable media (eg, via a storage card data) and / or via a network connection (for example, via the Internet or a private network).
[0048] [00048] The device 1000 additionally comprises one or more input and / or output devices, such as a 1050 video (possibly a touch sensitive video) and a 1060 speaker. A 1040 transceiver allows the device 1000 to send and receive information with one or more networks (for example, wireless networks, wired networks). One or more networks can use several technologies, for example, wireless LAN, Bluetooth, UMTS, GSM and / or others.
[0049] [00049] Various embodiments of the mobile device 1000 may omit one or more of the components shown in FIG. 10 and / or include additional components, including one or more additional instances of any of the above components.
[0050] [00050] In a non-limiting illustrative scenario featuring the use of embodiments of one or more of the above technologies, a worker in an office building uses an interface based on the Network and his desktop computer to make a ticket request with a server. ticket. The worker informs the ticket server that he would like a guest to be able to access the office building through the main door next Tuesday between 10:00 am and 10:15 am, and that a PIN must be required to gain access. The worker also provides the guest's phone number. The ticket server receives this request and (after authenticating the worker's computer) sends an authorization request to the server at the appropriate location. The site server, which is located in the office building, approves the request and records the visitor information in a database. The ticket server sends a message to the worker's computer indicating that the request has been approved.
[0051] [00051] The guest receives a call message on his mobile phone indicating the time and place of his scheduled visit, along with a URL call to a QR code to access the office building. The guest also receives an SMS message from the site server containing a PIN to access the building.
[0052] [00052] When the guest arrives at the building for his meeting, he uses his mobile phone to open the call in the call message. As a result, the ticket server sends an image of the QR code to be used to access the building. The guest accidentally approaches a side door of the building and uses a code reader on that door to scan the QR code, which is displayed on his phone screen. A video on the side door informs him that he is trying to enter the wrong door, since his visit is scheduled to take place through the main door. The video on the side door provides the guest with directions to the correct door.
[0053] [00053] At the main door, the guest scans the QR code again, this time with a code reader on this door. The site server recognizes the QR code and asks the guest to enter the corresponding PIN using a keyboard nearby. When the required information is entered, the main door opens for the guest. A video also indicates to the guest that the high destination call control system has designated elevator B to take the guest to their destination. The guest enters elevator B.
[0054] [00054] At this time, the worker receives an SMS or e-mail message indicating that his guest has arrived. The message also indicates that the guest is being taken to the worker's floor using elevator B. This allows the worker to go to the appropriate elevator to receive the guest.
[0055] [00055] As seen in this example, at least some of the technologies described allow for easy electronic distribution of access information to the site and guidance for a visitor. The worker also knows promptly of the arrival of his guest.
[0056] [00056] Having illustrated and described the principles of the technologies described, it will be apparent to those skilled in the art that the described embodiments can be modified in a detailed arrangement without departing from such principles. It should be understood that the aspects described for one or more embodiments are also intended to be used with one or more other embodiments described in this document, unless explicitly stated otherwise. In view of the various possible embodiments to which the principles of the described technologies can be applied, it must be recognized that the illustrated embodiments are only examples of the technologies and should not be considered as limiting the scope of the invention. Instead, the scope of the invention is defined by the following embodiments. Therefore, we claim as our invention everything that occurs within the embodiments.
权利要求:
Claims (13)
[0001]
Method of controlling access to the site, characterized by the fact that it comprises receiving, from a first host device (140) and using a ticket server (110), a request for a first access ticket with optical code for use in a first location (160, 162) by a first visiting device ( 130); send, using the ticket server (110), a first authorization request to a first site server (150, 152, 250) located at the first site (160, 162), the ticket server (110) being remotely located from the first server at the site (150, 152, 250) and remotely located from the first host device (140), with the ingress server (110) and the first server at the site (150, 152, 250) being controlled by different parts; sending, using the ingress server (110), a first access link message (234) to the first visiting device (130), the first access link message (234) providing access to a first optical code (232) to access the first location (160, 162); receiving, from a second host device (140) and using the ticket server (110), a request for a second access ticket with optical code for use at a second location (160, 162) by a second visiting device ( 130); send, using the ticket server (110), a second authorization request to a second site server (150, 152, 250) located at the second site (160, 162), the ticket server (110) being remotely located from the second site server (150, 152, 250) and remotely located from the second host device (140); and sending, using the ingress server (110), a second access link message (234) to the second visitor device (130), the second access link message (234) providing access to a second optical code (232) to access the second location (160, 162).
[0002]
Local access control method, according to claim 1, characterized by the fact that the first access ticket request comprises a time parameter, an entry location parameter and a supplementary code parameter.
[0003]
Site access control method according to claim 1 or 2, characterized by the fact that it additionally comprises authenticating the first host device (140).
[0004]
Site access control method according to claim 3, characterized by the fact that the first host device (140) is authenticated to the first site (160, 162).
[0005]
Site access control method according to any one of claims 1 to 4, characterized by the fact that the first server in the site (150, 152, 250) is configured to provide access to the first site (160, 162) based on in the first optical code (232) and based on a supplementary code (236) of the first server in the site (150, 152, 250).
[0006]
Local access control method, according to claim 5, characterized by the fact that it additionally comprises sending, using the site's first server (150, 152, 250), the supplementary code to the first visiting device (130).
[0007]
Site access control method according to any one of claims 1 to 6, characterized in that the first site (160, 162) comprises a plurality of entries (242, 244, 246), the method additionally comprising determining that the first optical code (232) to access the first location was presented in an incorrect entry among the plurality of entries (242, 244, 245).
[0008]
Method of controlling access to the site, according to any one of claims 1 to 7, characterized by the fact that it additionally comprises recording, using the first server of the site (150, 152, 250), visit information associated with the first code optical (232).
[0009]
Method of controlling access to the site according to any one of claims 1 to 8, characterized by the fact that it additionally comprises providing visitor guidance information for the first visiting device (130) based at least in part on the first optical code ( 232).
[0010]
Local access control method according to any one of claims 1 to 9, characterized by the fact that it additionally comprises sending, using the ticket server (110), the first optical code (232) to the first visiting device ( 130).
[0011]
Method of controlling access to the site according to any one of claims 1 to 10, characterized by the fact that the first and second servers at the site (150, 152, 250) are remote from each other.
[0012]
One or more computer-readable storage media (920) having instructions encoded in them, characterized by the fact that when the instructions are executed by a computer (900), they cause the computer (900) to execute the control method of site access, as defined in any one of claims 1 to 5, 10 or 11.
[0013]
System for carrying out the method of access control to the site, as defined in any of claims 1 to 11, the system characterized by the fact that it comprises a ticket server (110); a first server at the site (150, 152, 250); and a second server at the site (150, 152, 250), the first server at the site (150, 152, 250) and the second server at the site (150, 152, 250) being communicatively connected with the incoming server (110) by a network.
类似技术:
公开号 | 公开日 | 专利标题
BR112013024494B1|2021-01-26|distribution of site access information
CN107018124B|2021-04-30|Remote application for controlling access
US9508207B2|2016-11-29|Method and apparatus for network controlled access to physical spaces
TWI658717B|2019-05-01|Access control method, access control system and computer-readable storage medium
JP2009150192A|2009-07-09|Admission restricting device and admission restriction system
JP2007186300A|2007-07-26|Entrance lock interlocking operation elevator control system
KR101491706B1|2015-02-11|Method for providing door access control service based on application
US20170169635A1|2017-06-15|Method and system for visitor access control management
JP2006134081A|2006-05-25|Entry management system, entry control terminal and entry management method
KR101637516B1|2016-07-07|Method and apparatus for controlling entrance and exit
KR101855494B1|2018-06-25|Door system and method using mobile device
JP2007172039A|2007-07-05|Login management system and method using location information of user
JP2017010415A|2017-01-12|Entrance management system and program
JP5604931B2|2014-10-15|Entrance / exit management device
EP3584769A1|2019-12-25|Improved access control system and a method thereof controlling access of persons into restricted areas
WO2018095184A1|2018-05-31|Data interaction method and system
JP5937276B1|2016-06-22|Visitor authentication system and visitor authentication method
JP5106264B2|2012-12-26|Elevator security control system and elevator security control method
JP2020181525A|2020-11-05|Reception guidance system and reception guidance method
KR20210023597A|2021-03-04|Method of managing automatic entrance and exit for a manless study cafe and service system thereof
WO2018095182A1|2018-05-31|Method and system for data exchange
JP2008123541A|2008-05-29|Management device and recording medium
同族专利:
公开号 | 公开日
CA2830132A1|2012-10-04|
CN103460259B|2016-01-27|
EP2697783A1|2014-02-19|
US9589398B2|2017-03-07|
CA2830132C|2018-10-02|
BR112013024494A2|2016-12-27|
ES2501516T3|2014-10-02|
SG193350A1|2013-10-30|
US20120268243A1|2012-10-25|
US9202322B2|2015-12-01|
EP2697783B1|2014-06-11|
WO2012130727A1|2012-10-04|
AU2012234407A1|2013-09-19|
PL2697783T3|2014-11-28|
AU2012234407B2|2016-04-14|
MX2013011116A|2013-10-17|
US20160049029A1|2016-02-18|
CN103460259A|2013-12-18|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US3501622A|1966-04-05|1970-03-17|Fmc Corp|Ticket credit accounting system|
US3988570A|1975-01-10|1976-10-26|Endyn Industries Ltd.|Controlled access and automatic revenue reporting system|
GB2278220A|1993-05-19|1994-11-23|Central Research Lab Ltd|Access control system|
US6141758A|1997-07-14|2000-10-31|International Business Machines Corporation|Method and system for maintaining client server security associations in a distributed computing system|
US6725376B1|1997-11-13|2004-04-20|Ncr Corporation|Method of using an electronic ticket and distributed server computer architecture for the same|
JPH11227370A|1998-02-13|1999-08-24|Neuron:Kk|Genuine/false judging system for printed matter, and lock system using the same|
US5984051A|1998-11-09|1999-11-16|Otis Elevator Company|Remote elevator call requests with descriptor tags|
AU5596700A|1999-06-03|2000-12-28|Charles H. CELLA|Contingency-based options and futures for contingent travel accommodations|
WO2001061652A2|2000-02-16|2001-08-23|Stamps.Com|Secure on-line ticketing|
JP2001344545A|2000-03-29|2001-12-14|Ibm Japan Ltd|Processing system, server, processing terminal, communication terminal, processing method, data managing method, processing performing method and program|
US6760841B1|2000-05-01|2004-07-06|Xtec, Incorporated|Methods and apparatus for securely conducting and authenticating transactions over unsecured communication channels|
US7185360B1|2000-08-01|2007-02-27|Hereuare Communications, Inc.|System for distributed network authentication and access control|
US20020138770A1|2001-03-26|2002-09-26|International Business Machines Corporation|System and method for processing ticked items with customer security features|
US6845394B2|2001-04-16|2005-01-18|Sun Microsystems, Inc.|Software delivery method with enhanced batch redistribution for use in a distributed computer network|
US20020157090A1|2001-04-20|2002-10-24|Anton, Jr. Francis M.|Automated updating of access points in a distributed network|
US6901536B2|2001-05-24|2005-05-31|Microsoft Corporation|Service quality monitoring system and method|
US7395245B2|2001-06-07|2008-07-01|Matsushita Electric Industrial Co., Ltd.|Content usage management system and server used in the system|
US20020194319A1|2001-06-13|2002-12-19|Ritche Scott D.|Automated operations and service monitoring system for distributed computer networks|
JP3729106B2|2001-08-31|2005-12-21|日本電気株式会社|Content distribution system and content distribution method used therefor|
US7044362B2|2001-10-10|2006-05-16|Hewlett-Packard Development Company, L.P.|Electronic ticketing system and method|
JP2003196529A|2001-12-27|2003-07-11|Pia Corp|Right information providing system, its method, and computer program for realizing it|
JP4355124B2|2002-01-31|2009-10-28|インターナショナル・ビジネス・マシーンズ・コーポレーション|Entrance / exit management system, entrance / exit management method, program for executing entrance / exit management, and recording medium recording the program|
US7231663B2|2002-02-04|2007-06-12|General Instrument Corporation|System and method for providing key management protocol with client verification of authorization|
US20030183694A1|2002-04-01|2003-10-02|Sayers Craig Peter|Ticketing method and system having a ticket object and an associated marker object|
US7841932B2|2002-05-03|2010-11-30|Amir Sadri|Method of playing a game of chance and point of sale system for facilitating the play thereof|
US7565537B2|2002-06-10|2009-07-21|Microsoft Corporation|Secure key exchange with mutual authentication|
US7162744B2|2002-08-27|2007-01-09|Micron Technology, Inc.|Connected support entitlement system and method of operation|
JP2004164299A|2002-11-13|2004-06-10|Nec Corp|Content using system and method, and server|
JP2005136662A|2003-10-30|2005-05-26|Matsushita Electric Ind Co Ltd|Radio communication system, portable terminal equipment, server device, memory card, and program|
CN1934582A|2004-03-22|2007-03-21|松下电器产业株式会社|Content use system, information terminal, and settlement system|
US7922081B2|2004-04-01|2011-04-12|Hitachi, Ltd.|Identification information managing method and system|
US7676590B2|2004-05-03|2010-03-09|Microsoft Corporation|Background transcoding|
JP2005341027A|2004-05-25|2005-12-08|Nec Saitama Ltd|Mobile communication terminal and forming method thereof|
JP2006268689A|2005-03-25|2006-10-05|Nec Corp|Mobile communication network system, authentication device, web server, and driving method and driving program therefor|
US20060230438A1|2005-04-06|2006-10-12|Ericom Software Ltd.|Single sign-on to remote server sessions using the credentials of the local client|
US20070220598A1|2006-03-06|2007-09-20|Cisco Systems, Inc.|Proactive credential distribution|
JP4492570B2|2006-03-23|2010-06-30|ヤマハ株式会社|Service providing system for electronic music equipment|
CN101467173A|2006-05-09|2009-06-24|票务专家公司|Apparatus for access control and processing|
US7841525B1|2006-05-22|2010-11-30|Sprint Spectrum L.P.|Digital ticketing system and method|
NZ560430A|2006-08-09|2008-12-24|Mining & Construction Card Com|Method of administering an incentive award system for commerical transactions|
US8249592B1|2007-11-21|2012-08-21|Rockstar Bidco, LP|Authenticating a mobile station that communicates through a local premises wireless gateway|
US8004426B2|2008-10-14|2011-08-23|Verizon Patent And Licensing Inc.|Systems and methods for recording parking space information|
US8832565B2|2009-02-11|2014-09-09|Certusview Technologies, Llc|Methods and apparatus for controlling access to a virtual white line image for an excavation project|
EP2237234A1|2009-04-03|2010-10-06|Inventio AG|Method and device for access control|
US20120185394A1|2009-07-21|2012-07-19|Fair Ticket Solutions Inc.|Systems and methods for reducing the unauthorized resale of event tickets|
CN103262024B|2010-05-09|2015-05-13|思杰系统有限公司|Methods and systems for forcing an application to store data in a secure storage location|
US20120234906A1|2011-03-14|2012-09-20|Hariraam Varun Ganapathi|Parking system and method|CN103534189B|2011-05-18|2015-03-25|三菱电机株式会社|Elevator control device|
GB201216284D0|2012-09-12|2012-10-24|Illinois Tool Works|A secure door entry system and method|
US10820203B2|2013-04-30|2020-10-27|Assa Abloy Ab|Method, apparatus, and system for mobile provisioning of NFC credentials|
US9990786B1|2014-01-17|2018-06-05|Microstrategy Incorporated|Visitor credentials|
CN104637133A|2014-12-23|2015-05-20|韶关市英诺维科技设备有限公司|Application of two-dimensional code locks in communities|
CN104537736A|2014-12-23|2015-04-22|韶关市英诺维科技设备有限公司|Application of two-dimension code lock in business management|
US9824515B2|2015-03-24|2017-11-21|At&T Intellectual Property I, L.P.|Automatic calendric physical access|
US9582841B2|2015-03-24|2017-02-28|At&T Intellectual Property I, L.P.|Location based emergency management plans|
US9972144B2|2015-03-24|2018-05-15|At&T Intellectual Property I, L.P.|Automatic physical access|
US10296851B2|2015-04-11|2019-05-21|At&T Intellectual Property I, L.P.|Automatic allocation of physical facilities for maximum collaboration|
WO2017070935A1|2015-10-30|2017-05-04|深圳市奥星澳科技有限公司|Method for controlling access control, terminal, server and access control system|
US10492066B2|2015-11-13|2019-11-26|Sensormatic Electronics, LLC|Access and automation control systems with mobile computing device|
US20170169635A1|2015-12-10|2017-06-15|Rohit Karlupia|Method and system for visitor access control management|
WO2017203339A1|2016-05-27|2017-11-30|ISN-Partners Ltd.|Computer implemented method for assistance|
CA3051361A1|2017-01-23|2018-07-26|Carrier Corporation|Access control system with secure pass-through|
US10157512B2|2017-03-31|2018-12-18|Otis Elevator Company|Group access management for visitor control|
CN107274516A|2017-04-19|2017-10-20|捷开通讯有限公司|The method and server of access registrar, intelligent terminal and storage device|
US20200233391A1|2019-01-18|2020-07-23|Johnson Controls Technology Company|Building automation system with fault analysis and component procurement|
法律状态:
2018-12-18| B06F| Objections, documents and/or translations needed after an examination request according art. 34 industrial property law|
2019-12-24| B06U| Preliminary requirement: requests with searches performed by other patent offices: suspension of the patent application procedure|
2020-11-17| B09A| Decision: intention to grant|
2021-01-26| B16A| Patent or certificate of addition of invention granted|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 22/03/2012, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
申请号 | 申请日 | 专利标题
EP11160153|2011-03-29|
EP11160153.0|2011-03-29|
PCT/EP2012/055115|WO2012130727A1|2011-03-29|2012-03-22|Distribution of premises access information|
[返回顶部]