Method for initializing an access control system having a plurality of electronic keys and a plurality of objects
First Claim
Patent Images
1. Method for initializing an access control system having a plurality of electronic keys and a plurality of objects defined by the following method steps:
- a first key which is already assigned with authorization to a first object is placed in the vicinity of a second object, the second object is put into an initialization state, a request signal which is output by a transmitter of the second object is triggered, a response signal is output by a transmitter of the first key if a receiver of the key has previously received the request signal, the response signal having a first characteristic identifier, and the first identifier is stored in the second object as a new, valid identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
If a key (A) which is already assigned with authorization to a first object (A1) is placed in the vicinity of a second object (B), and this object (B) is placed in an initialization state, the data (X) of the key (A1) is written into the second object (B), or the data (Y) of the second object (B) is written into the key (A1). The key (A1) is then assigned with authorization to the second object (B). In this way, the key can be assigned to further objects (A, C) as authorized by means of an initialization.
-
Citations
19 Claims
-
1. Method for initializing an access control system having a plurality of electronic keys and a plurality of objects defined by the following method steps:
-
a first key which is already assigned with authorization to a first object is placed in the vicinity of a second object, the second object is put into an initialization state, a request signal which is output by a transmitter of the second object is triggered, a response signal is output by a transmitter of the first key if a receiver of the key has previously received the request signal, the response signal having a first characteristic identifier, and the first identifier is stored in the second object as a new, valid identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. Method for initializing an access control system having a plurality of electronic keys and a plurality of objects defined by the following method steps:
-
a first key which is already assigned with authorization to a first object is placed in the vicinity of a second object, the second object is put into an initialization state, a request signal which is output by a transmitter of the second object is triggered, a response signal is output by a transmitter of the first key if a receiver of the key has previously received the request signal, the request signal having a first characteristic identifier, and the identifier of the second object is transmitted to the key and stored there as a new, valid identifier. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
- 15. Access control system having a plurality of electronic keys and a plurality of objects, wherein each object comprises an object control device coupled with an object data transceiver having an object memory for reading and writing at least one identifier, and wherein each key comprises a key control device coupled with a key data transceiver having a key memory for reading and writing at least one identifier.
Specification