ACCESS CONTROL SYSTEM, LOCK DEVICE, ADMINISTRATION DEVICE, AND ASSOCIATED METHODS AND COMPUTER PROGRAM PRODUCTS
First Claim
Patent Images
1. An access control system including:
- a lock device (40) for a protected environment (50), said lock device comprising short-range wireless data communication means (49) capable of short-range wireless data communication based on a communication identifier (44) of said lock device;
a wireless key device (1) having short-range wireless data communication means (9) and data interchange means (7, 8) for communication of data objects compliant with a file format standard; and
an administration device (20) comprising;
generator means (25) for generating a data object (12) in accordance with said file format standard, a first property (14a) of said generated data object being assigned the communication identifier (44) of said lock device (40), and at least a second property (14b) of said generated data object being assigned temporary access defining data for said key device (1) to said environment (50) protected by said lock device, andtransmitter means for transmitting said generated data object to said key device;
wherein said lock device (40) further comprises;
processing means (41), associated with said short-range wireless data communication means (49), for processing said data object (12) as received and forwarded by said key device (1),verification means (43) for verifying that said first property (14a) of the received data object (12) matches the communication identifier (44) of the lock device, andaccess control means (45), responsive to successful verification by said verification means, for providing temporary access for said key device (1) in accordance with said second property (14b) of the received data object (12).
1 Assignment
0 Petitions
Accused Products
Abstract
An access control system uses an existing file format standard, e.g. for personal data interchange (PDI) or image file interchange, for novel access control purposes to provide temporary access for a wireless key device to a lock device and its protected environment by creating appropriate temporary access defining data in a data object compliant with the file format standard and communicating the data object to the lock device via the wireless key device.
106 Citations
26 Claims
-
1. An access control system including:
-
a lock device (40) for a protected environment (50), said lock device comprising short-range wireless data communication means (49) capable of short-range wireless data communication based on a communication identifier (44) of said lock device; a wireless key device (1) having short-range wireless data communication means (9) and data interchange means (7, 8) for communication of data objects compliant with a file format standard; and an administration device (20) comprising; generator means (25) for generating a data object (12) in accordance with said file format standard, a first property (14a) of said generated data object being assigned the communication identifier (44) of said lock device (40), and at least a second property (14b) of said generated data object being assigned temporary access defining data for said key device (1) to said environment (50) protected by said lock device, and transmitter means for transmitting said generated data object to said key device; wherein said lock device (40) further comprises; processing means (41), associated with said short-range wireless data communication means (49), for processing said data object (12) as received and forwarded by said key device (1), verification means (43) for verifying that said first property (14a) of the received data object (12) matches the communication identifier (44) of the lock device, and access control means (45), responsive to successful verification by said verification means, for providing temporary access for said key device (1) in accordance with said second property (14b) of the received data object (12). - View Dependent Claims (2, 3, 4, 5)
-
-
6. An administration device (20) for an access control system which further includes a wireless key device and a lock device of a type having a short-range wireless data communication means (49) capable of short-range wireless data communication based on a communication identifier (44) of said lock device, the administration device comprising:
-
generator means (25) for generating a data object (12) in accordance with a file format standard, a first property (14a) of said generated data object being assigned the communication identifier (44) of said lock device (40), and at least a second property (14b) of said generated data object being assigned temporary access defining data for a wireless key device (1) to an environment (50) protected by said lock device, and transmitter means for transmitting said generated data object to said key device. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A lock device (40) for a protected environment (50) in an access control system which further includes an administration device (20) and a wireless key device (1), the lock device comprising:
-
short-range wireless data communication means (49) capable of short-range wireless data communication with said key device based on a communication identifier (44) of said lock device and capable of receiving from said key device a data object (12) which originates from said administration device (20) and complies with a file format standard; processing means (41), associated with said short-range wireless data communication means (49), for processing the received data object (12) to derive a first property (14a) and a second property (14b) of the data object (12); verification means (43) for verifying that said first property (14a) matches the communication identifier (44) of the lock device; and access control means (45), responsive to successful verification by said verification means, for providing temporary access for said key device (1) in accordance with said second property (14b). - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of providing temporary access for a wireless key device (1) to an environment (50) protected by a lock device (40), the method involving:
-
generating, in an administration device (20), a data object (12) in accordance with a file format standard; assigning a communication identifier (44) of said lock device (40) to a first property (14a) of said generated data object; assigning temporary access defining data for said key device (1) to at least a second property (14b) of said generated data object; transmitting said generated data object from said administration device (20) to said key device; receiving said data object (12) in said key device (1); transmitting said data object (12) from said key device (1) to said lock device (40); receiving said data object (12) in said lock device (40); verifying that the first property (14a) of the received data object (12) matches the communication identifier (44) of the lock device; and in response to successful verification by said verification means, providing temporary access for said key device (1) in accordance with the second property (14b) of the received data object (12).
-
-
23. A method in an administration device (20) for providing temporary access for a wireless key device (1) to an environment (50) protected by a lock device (40), the method comprising:
-
generating a data object (12) in accordance with a file format standard; assigning a communication identifier (44) of said lock device (40) to a first property (14a) of said generated data object; assigning temporary access defining data for said key device (1) to at least a second property (14b) of said generated data object; and transmitting said generated data object to said key device. - View Dependent Claims (24)
-
-
25. A method in a lock device for providing temporary access for a wireless key device (1) to an environment (50) protected by the lock device (40), the method comprising:
-
receiving from said key device a data object (12) which originates from an administration device (20) and complies with a file format standard; processing the received data object (12) to derive a first property (14a) and a second property (14b) thereof; verifying that said first property (14a) matches a communication identifier (44) of the lock device; and in response to successful verification, providing temporary access for said key device (1) in accordance with said second property (14b). - View Dependent Claims (26)
-
Specification