G07C2009/0088

LOCKING AND UNLOCKING SYSTEM, PORTABLE TERMINAL CAPABLE OF COMMUNICATING WITH SERVER, LOCKING AND UNLOCKING METHOD EXECUTED BY PORTABLE TERMINAL, AND NON-TRANSITORY STORAGE MEDIUM STORING PROGRAM
20170372546 · 2017-12-28 · ·

A locking and unlocking system includes a portable terminal and a server. The portable terminal includes a service providing unit, a first sending unit, and a first receiving unit. The service providing unit provides a use reservation service for a vehicle or facilities by communicating with another server. The first sending unit sends a first signal to the server in response to a request from the service providing unit. The first signal requests authentication information used for locking and unlocking. The first receiving unit receives the authentication information from the server. The server includes a second receiving unit and a second sending unit. The second sending unit sends a second signal including the authentication information to the portable terminal when the second receiving unit receives the first signal.

Method for operating a locking system, locking system, and tube safe

A method for operating a locking system comprising an electronic key and an electronic lock and a central unit which in locking operation is used locally separately from the electronic key and the electronic lock, wherein in the method an external authorization code is generated by the central unit by means of an authorization code determination program, the external authorization code is transferred to the electronic key and the external authorization code is saved in a memory by the electronic key, wherein, on interaction of the electronic key with the electronic lock, the external authorization code is read out from the memory by the electronic lock and is checked by a processor of the electronic lock in that, using an internal authorization code determination program, the processor itself determines an internal authorization code and compares it with the external authorization code received by the electronic key and wherein, in the event of the determined internal authorization code being identical to the transferred external authorization code, the processor permits an opening process.

Apparatus and method for remote administration and recurrent updating of credentials in an access control system
09841743 · 2017-12-12 · ·

A portable electronic key for use with an electronic locking device comprises a wireless communications module, a processor, and a software application configured to transmit, receive, and respond to electronic messages related to access control information. The electronic messages are formatted according to a request-response protocol. The wireless communications module is configured to use a standardized communication protocol to establish a wireless communications link with a networking device operably associated with a remote administration device located away from the portable electronic key. The software application periodically exchanges, via the wireless communications link, request-response messages related to access control information with a server application of the remote administration device. The processor responds to the exchange of request-response messages by performing at least one of modifying access control information of the portable electronic key or providing access control information of the portable electronic key to the remote administration device.

CO-SIGNING DELEGATIONS
20230169812 · 2023-06-01 ·

It is provided a method for controlling access to a physical space using a co-sign delegation. The method is performed in a lock device and comprises the steps of: receiving an access request from an electronic key; obtaining a plurality of delegations, wherein each delegation is a delegation from a delegator to a delegatee, the plurality of delegations collectively forming a chain of delegations; determining that a delegation is a co-sign delegation, indicating that all further delegations need to be cryptographically signed by both the delegator of the respective delegation and by an access controller; and granting access to the physical space when the chain of delegations start in an owner of the lock device and ends in the electronic key; and when all delegations in the chain of delegations after the co-sign delegation are cryptographically signed by both the delegator of the respective delegation and by the access controller.

Remote auditing of electronic keys
20220358802 · 2022-11-10 ·

Embodiments relate to enhanced auditing features for administration of remote electronic keys. An electronic key delivers electrical power to an electronic lock to energize circuitry thereof. The electrical power may energize an electric motor or solenoid. Based on access control information associated with the electronic key, an unlocking signal is conveyed from the electronic key that causes the electronic lock to change from a locked state to an unlocked state, thereby permitting a user of the key to access one or more resources secured by the lock. The electronic key stores details related to the unlocking event in memory sites. In some aspects, the electronic key broadcasts a message via a wireless wide area network (WWAN). The message may include a request to establish a WWAN communications link with an access control server located away from the electronic key. Responsive to establishing the WWAN communications link, the electronic key initiates a transfer of data to the access control server, the data including details related to the unlocking event.

Authentication method and user equipment

An authentication method used in a server, includes: acquiring check-in information sent by user equipment (UE) of a user, wherein the check-in information includes information on the user and a check-in period; determining information on a room of the user based on the check-in information; sending the information on the room to the UE; determining unlocking information based on the check-in information; and sending the unlocking information to at least one of the UE or door lock equipment corresponding to the information on the room, wherein the door lock equipment is configured to authenticate the user based on the unlocking information during the check-in period, the unlocking information being invalid other than during the check-in period.

SECURE VEHICLE ACCESS METHOD AND SYSTEM
20170301167 · 2017-10-19 ·

The present disclosure relates to a method and a system for securely accessing a vehicle. The method comprises a preliminary phase, a data exchange phase, and an access phase. The method implements the vehicle, a remote data server, and at least one personal electronic device supplied with a dedicated application. The method implements an elliptic encryption curve, a master key, a primary key, a secondary key, and a tertiary key.

REMOTE ADMINISTRATION OF AN ELECTRONIC KEY TO FACILITATE USE BY AUTHORIZED PERSONS
20170249794 · 2017-08-31 ·

Embodiments relate to remote administration of a portable electronic key. An activation signal may be delivered to wireless communications circuitry of the portable electronic key to enable the key to perform one or more tasks. A smart device can receive information related to the activation signal from a server device. The smart device may deliver the activation signal to the portable electronic key via a wireless communications link established in accordance with a wireless networking standardized communications protocol. A user verification procedure may be performed at one of the portable electronic key and the smart device. The user verification procedure may indicate if a holder of the portable electronic key is authorized to use the key. Delivery of the activation signal may be initiated in response to completion of the user verification procedure.

METHOD FOR CONTROLLING ACCESS TO A VEHICLE
20170320466 · 2017-11-09 ·

A method for controlling access to a vehicle. An electronic key for accessing one or multiple vehicle components is deactivated after the vehicle is switched off in order to park the vehicle in a parking position, so that an attempt with the aid of the deactivated electronic key to access the one or multiple vehicle components of the vehicle parked in the parking position may be prevented. Moreover, a system for controlling access to a vehicle, a parking system for vehicles, an access control system for controlling access to a vehicle, a vehicle, a user for a communication network, a method for operating a user for a communication network, and a computer program, are described.

KEY INFORMATION SHARING SYSTEM, DELIVERY DEVICE AND USER TERMINAL

A key information sharing system includes a delivery device that delivers key information as first information for a control device equipped in an object and a user terminal that receives the first information delivered from the delivery device. The delivery device adds second information that allows the first information to be transferred between the user terminal and a third-party terminal without the delivery device, to the first information to be delivered to the user terminal. The user terminal transmits the first information to the third-party terminal in response to an input operation by a user, when the user terminal receives the first information to which the second information has been added.