Method and central device for controlling access to secure areas or devices
First Claim
1. A method for controlling access to secure areas or installations via access systems by a central device storing information about positions of the access systems, comprising:
- transmitting a service request, including an identification, from a mobile device to the central device,receiving by a central device; and
performing, by the central device after receiving the service request,initiating localization of the mobile device to obtain a result indicating one of a geographical area and a geographical position of the mobile device from a radio cell in a radio-cell-oriented mobile network in which the mobile device is currently registered, or using network-internal positioning methods, or with the aid of a GPS function in the mobile device;
identifying an access system from among the access systems where the mobile device is located, based on the result of the localization of the mobile device and the positions of the access systems;
checking, based on the identification, whether the user of the mobile device is authorized to get access via the identified access system; and
enabling physical access to a secure area or installation by a user in possession of the mobile device, by making the identified access system unlocked, if said checking validates authorization.
3 Assignments
0 Petitions
Accused Products
Abstract
A mobile device which is assigned to a person transmits an identification to a central device where localization of the mobile device is initiated. After the mobile device has been located in an area of an access system, the identification is checked for authorization for access via the access system. Access via the access system is either allowed or denied based on the result of the check. Access by an authorized person to secure areas or devices with the aid of a wireless device which is usually carried along—for example a mobile radio terminal or a DECT terminal—thus becomes considerably easier and more convenient.
22 Citations
13 Claims
-
1. A method for controlling access to secure areas or installations via access systems by a central device storing information about positions of the access systems, comprising:
-
transmitting a service request, including an identification, from a mobile device to the central device, receiving by a central device; and performing, by the central device after receiving the service request, initiating localization of the mobile device to obtain a result indicating one of a geographical area and a geographical position of the mobile device from a radio cell in a radio-cell-oriented mobile network in which the mobile device is currently registered, or using network-internal positioning methods, or with the aid of a GPS function in the mobile device; identifying an access system from among the access systems where the mobile device is located, based on the result of the localization of the mobile device and the positions of the access systems; checking, based on the identification, whether the user of the mobile device is authorized to get access via the identified access system; and enabling physical access to a secure area or installation by a user in possession of the mobile device, by making the identified access system unlocked, if said checking validates authorization. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A central device for controlling access to secure areas or installations via localized access systems, comprising:
-
means for storing position information about positions of the access systems; means for receiving a service request, including an identification, from a mobile device; means for initiating a localization of the mobile device to obtain a result indicating one of a geographical area and a geographical position of the mobile device from a radio cell in a radio-cell-oriented mobile network in which the mobile device is currently registered, or using network-internal positioning methods, or with the aid of a GPS function in the mobile device; means for identifying an access system where the mobile device is located from among the access systems, based on the result of the localization of the mobile device and the position information of the access systems; means for checking, based on the identification, whether the user of the mobile device is authorized to get access via the identified access system; and means for enabling physical access to a secure area or installation by a user in possession of the mobile device, by making the identified access system unlocked, if the checking validates authorization. - View Dependent Claims (10, 11, 12, 13)
-
Specification