$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Electronic key device a system and a method of managing electronic key information 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G05B-019/00
  • G06F-007/00
  • G08B-029/00
  • H04B-001/00
출원번호 US-0129963 (2000-11-30)
우선권정보 DK-1999 01714(1999-11-30)
국제출원번호 PCT/DK00/000655 (2000-11-30)
§371/§102 date 20020521 (20020521)
국제공개번호 WO01/040605 (2001-06-07)
발명자 / 주소
  • Nielsen,Ernst Lykke
출원인 / 주소
  • Bording Data A/S
대리인 / 주소
    Jacobson Holman PLLC
인용정보 피인용 횟수 : 133  인용 특허 : 14

초록

An efficient method and a system for controlling access to a location secured by a lock mechanism controlled by a lock control unit, which may provide a high degree of flexibility and a high level of security. The method includes the steps of storing a first access code in the lock control unit, the

대표청구항

What is claimed is: 1. A method of controlling access to a location secured by a lock mechanism controlled by a lock control unit having a first memory, the method comprising the steps of: storing a first access code in the first memory, the first access code being indicative of a predetermined acc

이 특허에 인용된 특허 (14)

  1. Chin Seo-Yong,KRX, Automatic locking/unlocking device and method using wireless communication.
  2. William D. Denison ; Lawrence C. Brownfield ; Bradley S. Silvers, Electronic access control device.
  3. Saliga Thomas V. (4702 Baycrest Dr. Tampa ; Hillsborough County FL 33615), Electronic kay storing time-varying code segments generated by a central computer and operating with synchronized off-li.
  4. Benore Randolph C. ; Grosswiller Leo J. ; Gibson Shawn ; Neidlinger Donald, Electronic key system.
  5. Clark Carey S. (3629 35th Ave. West Seattle WA 98199) Winch Gordon B. (Seattle WA), Electronic lock system.
  6. Borgstahl Ronald W. ; Harris Jeffrey Martin ; Woodward Ernest Earl, Interactive appliance remote controller, system and method.
  7. Victor David William ; Reiner David Ian, Method and system for programming a security system to protect a protected unit.
  8. Genest Leonard J. (1331 E. Edinger Ave. Santa Ana CA 92705), Multi-access security system.
  9. John D. Scott AU; Terence Patrick Curtis AU, Personal identification system.
  10. Leon Jeremy Phelps ; Amis Lynn Frederick ; Nazalewicz Jan ; McKee ; Jr. Thomas Glenn, Programmable lock and security system therefor.
  11. Hsu Shi-Ping ; Ling James M. ; Messenger Arthur F. ; Evans Bruce W., Remote identity verification technique using a personal identification device.
  12. Stapley Gerald (Godalming GB2) Tate Geoffrey (Haslemere GB2) Hardisty Derek (Brookwood GB2), Remotely programmable key and programming means therefor.
  13. Martel Brian (Walled Lake MI), Secure remote control system with receiver controlled to add and delete identity codes.
  14. Falk Johan Per (Stockholm SEX) Jonsson Bjorn Erik Rutget (Jarfalla SEX), User authentication method and apparatus.

이 특허를 인용한 특허 (133)

  1. Fiske, Michael Stephen, API for a system having a passcode authenticator.
  2. Kwak, Se Jin, Access authentication system and method using smart communicator.
  3. Kalous, D. Scott; Trapani, Matthew, Access code management systems.
  4. Shitano, Masaki, Access control apparatus.
  5. Borg, Anders; Cederblad, Mats; Garmen, Daniel; Jonsson, Tomas; Siklosi, Peter, Access control communication device, method, computer program and computer program product.
  6. Borg, Anders; Cederblad, Mats; Garmen, Daniel; Jonsson, Tomas; Siklosi, Peter, Access control communication device, method, computer program and computer program product.
  7. Libin, Phil, Actuating a security system using a wireless device.
  8. Libin,Phil, Actuating a security system using a wireless device.
  9. Farneti, Aldo, Apparatus for remote opening of doors or gates of a building.
  10. Schmidt-Lackner, Merrick; Li, Clark, Automated entry.
  11. Giobbi, John J., Biometric personal data key (PDK) authentication.
  12. Giobbi, John J., Biometric personal data key (PDK) authentication.
  13. Giobbi, John J., Biometric personal data key (PDK) authentication.
  14. Sullivan, Edward S., Command priority levels for an access controller apparatus.
  15. Conreux, Stèphane; Flecchia, Arnaud; de la Chapelle, Roland, Communicating electronic key for secure access to a mecatronic cylinder.
  16. Singh, Sona, Communication and processing of credential data.
  17. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Configuration of interfaces for a location detection system and application.
  18. Giles, Terence, Delivery and collection system.
  19. Fiske, Michael Stephen, Determining whether to grant access to a passcode protected system.
  20. Giobbi,John J., Digital content security system.
  21. Giobbi,John J., Digital content security system.
  22. Giobbi,John J., Digital rights management.
  23. Moshir, Kevin K; Moshir, Sean; Shafiezadeh, Houman, Dissemination of real estate information through text messaging.
  24. Moshir, Kevin K; Moshir, Sean; Shafiezadeh, Houman, Distribution of lottery tickets through mobile devices.
  25. Carr, Sr., Syd K., Electrical lock-out and locating apparatus with GPS technology.
  26. Eberwine, Todd; Neafsey, Jeffrey Scott; Torre, Jon P.; Beene, Donald Lee; Abouhashem, Hamid; Vickrey, Michelle; Oliver, Andrew, Electronic credential management system.
  27. Ribas, Gabriel Bestard; Bakondi, Steven Thomas; Seliber, Lloyd, Electronic locking systems, methods, and apparatus.
  28. Ribas, Gabriel Bestard; Bakondi, Steven Thomas; Seliber, Lloyd, Electronic locking systems, methods, and apparatus.
  29. Ribas, Gabriel Bestard; Bakondi, Steven Thomas; Seliber, Lloyd, Electronic locking systems, methods, and apparatus.
  30. Ribas, Gabriel Bestard; Bakondi, Steven Thomas; Seliber, Lloyd, Electronic locking systems, methods, and apparatus.
  31. Sayers, Richard C.; Hudgins, William A.; Allen, Spencer W.; Sulkowski, R. Victor, Electronically keyed dispensing systems and related methods of installation and use.
  32. Felder, Hugo, Emergency device for installing in an elevator car of an elevator installation.
  33. Moshir, Kevin K; Moshir, Sean; Shafiezadeh, Houman, Extraction of information from e-mails and delivery to mobile phones, system and method.
  34. Aase, Halvor, First entry notification.
  35. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  36. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  37. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  38. Wildon, Michael Peter; Paterson, Alexander Robert Dalziel, Identification device, system and method.
  39. Wildon, Michael Peter; Paterson, Alexander Robert Dalziel, Identification device, system and method.
  40. Wildon, Michael Peter; Paterson, Alexander Robert Dalziel, Identification device, system and method.
  41. Wildon, Michael Peter; Paterson, Alexander Robert Dalziel, Identification device, system and method.
  42. Fiske, Michael S., Interfacing with a system that includes a passcode authenticator.
  43. Simpson, Alan; Ernsdorff, Paul, Key control and related fleet management methods and systems.
  44. Borg, Anders; Cederblad, Mats; Garmen, Daniel; Jonsson, Tomas; Siklosi, Peter, Key device and associated method, computer program and computer program product.
  45. Haley,Jeffrey T., Knowledge-type authorization device and methods.
  46. Masters, George W.; Gordon, Colin, Local access control system management using domain information updates.
  47. Widdows, Matt, Locking systems with multifactor authentication and changing passcodes.
  48. Widdows, Matt, Locking systems with multifactor authentication and changing passcodes.
  49. Saylor, Michael J., Managing electronic keys.
  50. Saylor, Michael J., Managing electronic keys.
  51. Saylor, Michael J., Managing electronic keys.
  52. Lee, In-Jae; Koh, Yong-Nam; Yoo, Ki-Woong, Memory card adaptor having an opening to expose a terminal of a memory card.
  53. Grant, Jeffrey A.; Phillips, Jonathon D.; Fawcett, Christopher J.; Bomber, Karen Bellum; McKinney, Larry T.; Warren, William M., Merchandise display security systems and methods.
  54. Grant, Jeffrey A.; Phillips, Jonathon D.; Fawcett, Christopher J.; Bomber, Karen Bellum; McKinney, Larry T.; Warren, William M., Merchandise display security systems and methods.
  55. Park, Jae-Min; Kye, Dong-Hoon; Min, Yong-Ki, Method and apparatus for access authentication using mobile terminal.
  56. Caterino, Mark Anthony; Einberg, Fredrik Carl Stefan; Hoyer, Philip; Berg, Daniel; Davis, Masha Leah; Wamsley, Robert; Hulusi, Tam, Method and apparatus for making a decision on a card.
  57. Davis, Masha Leah; Wamsley, Robert; Hulusi, Tam, Method and apparatus for making a decision on a card.
  58. Davis, Masha Leah; Wamsley, Robert; Hulusi, Tam, Method and apparatus for making a decision on a card.
  59. Davis, Michael L.; Wamsley, Robert; Hulusi, Tam, Method and apparatus for making a decision on a card.
  60. Davis, Michael L.; Wamsley, Robert; Hulusi, Tam, Method and apparatus for making a decision on a card.
  61. Sharma, Arun Kumar; Wurm, Michael; Schaffzin, Richard; Setty, Prajakta, Method and system for planar, multi-function, multi-power sourced, long battery life radio communication appliance.
  62. Sharma, Arun Kumar; Wurm, Michael; Schaffzin, Richard; Setty, Prajakta, Method and system for planar, multi-function, multi-power sourced, long battery life radio communication appliance.
  63. Erskine,Thomas; Sonberg,Kenneth W.; Rudisill,Luther, Method and system for providing supervisory control over wireless phone usage.
  64. Erskine,Thomas; Sonberg,Kenneth W.; Rudisill,Luther, Method and system for providing supervisory control over wireless phone usage.
  65. Erskine,Thomas; Sonberg,Kenneth W.; Rudisill,Luther, Method and system for providing supervisory control over wireless phone usage.
  66. Park, Chang Jun; Choi, Ju Yong, Method and system for setting security of a portable terminal.
  67. Willgert, Mikael, Method of authorization.
  68. Kuenzi, Adam; Chapin, Ron, Method of distributing stand-alone locks.
  69. Fiske, Michael, Method of generating access keys.
  70. Moshir, Sean; Shafiezadeh, Houman; Moshir, Kevin K., Methods of authorizing actions.
  71. Moshir, Kevin K; Moshir, Sean; Shafiezadeh, Houman, Methods to authenticate access and alarm as to proximity to location.
  72. Nishimura,Toru, Mobile terminal and security remote-control system and method using mobile terminal.
  73. Tuck, Edward F.; Payne, David L.; Giaccherini, Thomas N.; Keddington, Michael; Lockie, Douglas G.; Sallen, Douglas; Stuart, James R., Personal digital asset manager.
  74. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  75. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  76. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  77. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  78. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  79. Wu, Chao-Wang; Cheng, Lien-Fu, Protection system for display apparatus and method thereof.
  80. Robertson, William Benjamin; Lopez, Jenna, Radio frequency patch antenna and system for permitting secure access to a restricted area.
  81. Fiske, Michael Stephen, Receiving an access key.
  82. Davis, Paul R., Remote administration of an electronic key to facilitate use by authorized persons.
  83. Tsou, Hsien-Chun, Remote controller capable of selectively controlling a plurality of electric appliances, remote control system and method thereof.
  84. Gammel, Dennis; Masters, George W.; Robinson, Kylan T., Resource management based on physical authentication and authorization.
  85. Hurst,Leon; Tuoriniemi,Samuli, Secure content activation during manufacture of mobile communication devices.
  86. Capaldi-Tallon, Alan, Secure door entry system and method.
  87. Métivier, Pascal; Agueda, Aitor, Secure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone.
  88. Moshir, Kevin K; Moshir, Sean; Shafiezadeh, Hournan, Secure mobile information management system and method.
  89. Michelle, Deborah L.; Urkudey, Prashant N., Serialized lock combination retrieval systems and methods.
  90. Fiske, Michael, Setting up a security access system.
  91. Gehret, John; Ziraknejad, Siamak, Sharing keys.
  92. Ziraknejad, Siamak; Jung, Hanna; Gehret, John, Sharing keys.
  93. Ives-Halperin, Kenneth; Evans, III, Harry C.; Johnson, David; Wall, Scott; Lilly, David; Pondicherry, Ajay, Short-range device communications for secured resource access.
  94. Ives-Halperin, Kenneth; Evans, III, Harry C.; Johnson, David; Wall, Scott; Lilly, David; Pondicherry, Ajay, Short-range device communications for secured resource access.
  95. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Single step transaction authentication using proximity and biometric input.
  96. Eyring, Matthew J.; Warren, Jeremy B.; Nye, James E.; Flint, Jason C.; Beagley, James; Day, Wallace E.; Harris, Christopher L.; Vega, JonPaul, Smart door lock.
  97. Eyring, Matthew J.; Warren, Jeremy B.; Nye, James E.; Flint, Jason C.; Beagley, James; Day, Wallace E.; Harris, Christopher L.; Vega, JonPaul, Smart door lock.
  98. Day, Garrett; Pearce, Jeffrey; Hamilton, Jr., David E; Zawicki, Kevin; Guseman, Roger, System and method for access control using context-based proof.
  99. Day, Garrett; Pearce, Jeffrey; Hamilton, Jr., David E; Zawicki, Kevin; Guseman, Roger, System and method for access control using context-based proof.
  100. Robertson, William Benjamin; Barden, Robert P., System and method for accessing a structure using a mobile device.
  101. Robertson, William Benjamin; Barden, Robert P., System and method for accessing a structure using a mobile device.
  102. Robertson, William Benjamin; Barden, Robert P., System and method for accessing a structure using a mobile device.
  103. Monaco,Marc, System and method for adjusting access control based on homeland security levels.
  104. Robertson, William Benjamin; Robertson, Andrew Joseph, System and method for permitting secure access to a structure.
  105. Kuijlaars, Erik Gerardus Adriaan, System and method for providing controlled access.
  106. Lowe, Peter R., System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone.
  107. Lowe, Peter R., System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone.
  108. Lowe, Peter R., System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone.
  109. Lowe, Peter R., System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone.
  110. Lowe, Peter R., System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone.
  111. Fiske, Michael, System for generating requests to a passcode protected entity.
  112. Robertson, William Benjamin; Keck, Bob P, System for permitting secure access to a restricted area.
  113. Robertson, William Benjamin; Keck, Robert A, System for permitting secure access to a restricted area.
  114. Moshir, Kevin K; Moshir, Sean; Khanban, Ali A; Lindsay, Joshua, Systems and methods for encrypted mobile voice communications.
  115. Moshir, Sean; Moshir, Kevin; Khanban, Ali A; Lindsay, Joshua, Systems and methods for encrypted mobile voice communications.
  116. Menzel, John D., Systems and methods for programming a credential reader.
  117. Menzel, John D., Systems and methods for programming an RFID reader.
  118. Menzel, John D., Systems and methods for programming an RFID reader.
  119. Moshir, Kevin K; Moshir, Sean S; Shafiezadeh, Houman, Systems and methods for secure short messaging service and multimedia messaging service.
  120. Scoggins, Chuck; Koka, Durga Prasad, Systems and methods for use in acquiring credentials from a portable user device in unlocking door lock systems.
  121. Menzel, John D., Systems and methods for utilizing wireless programmable credentials.
  122. Menzel, John D., Systems and methods for utilizing wireless programmable credentials.
  123. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Tracking system using personal digital key groups.
  124. Robinson, Kylan T.; Smith, Rhett; Masters, George W.; Bradetich, Ryan, Transient asset management systems and methods.
  125. Giobbi, John J., Two-level authentication for secure transactions.
  126. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Two-level authentication for secure transactions.
  127. Davis, Paul R., Visible light communication of an access credential in an access control system.
  128. Dumas, Philip C., Wireless access control system including door position based lock switching and related methods.
  129. Dumas, Philip C.; Holderness, William; Handville, Justin, Wireless access control system operating in automatic calibration mode and including door position based lock switching and related methods.
  130. Kärkäs, Kalle J.; Kantola, Matti; Pääkkönen, Jaakko, Wireless access device.
  131. Myers, Gary L.; Hirpara, Ashok; Veleris, John D.; Zimny, Arkadiusz; Cohen, Michael Aaron; Nakshin, Eugene, Wireless device enabled locking system.
  132. Myers, Gary L.; Hirpara, Ashok; Veleris, John D.; Zimny, Arkadiusz; Cohen, Michael Aaron; Nakshin, Eugene, Wireless device enabled locking system.
  133. Oskari, Koskimies, Wireless lock system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로