+

WO2007033388A2 - System and method for utility access control - Google Patents

System and method for utility access control Download PDF

Info

Publication number
WO2007033388A2
WO2007033388A2 PCT/ZA2006/000106 ZA2006000106W WO2007033388A2 WO 2007033388 A2 WO2007033388 A2 WO 2007033388A2 ZA 2006000106 W ZA2006000106 W ZA 2006000106W WO 2007033388 A2 WO2007033388 A2 WO 2007033388A2
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
utility
access
processor
received
Prior art date
Application number
PCT/ZA2006/000106
Other languages
French (fr)
Other versions
WO2007033388A3 (en
Inventor
Attila Aranyosi
Cornelius Petrus Lourens
Terence Keith Ashwin
Original Assignee
Integra-Set (Pty) Ltd
Mct Telecommunications (Pty) Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Integra-Set (Pty) Ltd, Mct Telecommunications (Pty) Ltd filed Critical Integra-Set (Pty) Ltd
Publication of WO2007033388A2 publication Critical patent/WO2007033388A2/en
Publication of WO2007033388A3 publication Critical patent/WO2007033388A3/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like

Definitions

  • This invention relates to a system and associated method for access control to public utilities and similar maintenance hatches.
  • Unauthorized access to a utility such as a telecommunication line, an electricity supply, a water pipe, a gas line, and/or a sewage conduit, may result in damage and/or theft of expensive components and interruption of critical services.
  • the current invention seeks to address the above problems.
  • a system for utility access control which system includes at least one utility access control device which includes locking means configured to lock or unlock an access to a utility, in use; an input for receiving an electronic identifier from a user; and a processor arranged in communication with the input and locking means, which processor is configured to validate the identifier, to control the locking means according to the validity of the identifier, and to log details of the received identifier, so that a record of access attempts is created.
  • the access to the utility may include a manhole, a junction box, a maintenance hatch, and/or the like.
  • the utility may include an electricity supply, a water supply, a gas supply, sewage conduits, telecommunication lines, and/or the like.
  • the locking means may include an electromechanical lock configured to lock or unlock the utility access according to control from the processor. It is to be appreciated that the locking means is typically electrically actuated on command from the processor.
  • the input may include an RFID (Radio Frequency Identification) receiver for receiving an identifier from a RFID tag.
  • the input may include a scanner for scanning a magnetic identifier, e.g. a magnetic strip on a card, or the like.
  • the input may include a scanner for scanning some form of optical identifier, e.g. a barcode scanner, a retinal scanner, or the like. It is to be appreciated that the input is for obtaining the identifier from a user, and that the identifier generally includes any suitable input able to uniquely identify a user.
  • the identifier may include a code uniquely associated with a specific person, a key, or the like. It is to be appreciated that the identifier is able to link a request for access to a utility to a certain person, such as a technician, or the like, so that record may be kept of when which person accessed which access for what duration, and/or the like.
  • the processor may validate the identifier by comparing the received identifier to a list of valid identifiers, e.g. a look-up table, a roster of scheduled maintenance access, and/or the like.
  • the processor may include a memory arrangement for storing the list of valid identifiers for validation purposes.
  • the processor may be configured to be updated with valid identifiers, such as via the input, or the like, i.e. a technician updates the list of valid identifiers at the device itself.
  • the processor may validate the identifier by performing a certain calculation on the identifier which, if the identifier is valid, yields a predetermined result.
  • the record of attempts as logged by the processor may be downloadable via the input, i.e. a technician is able to retrieve the log of details directly from the device, or the like.
  • the processor may include a receiver for communicating with a remote server.
  • the processor may be configured to receive updates of valid identifiers from the remote server via the receiver, i.e. an updated list of valid identifiers, or the like.
  • the system may include the remote server.
  • the receiver may receive signals via cable.
  • the cable may include an existing utility cable, e.g. an existing telecommunications cable, or the like.
  • the receiver may receive signals wirelessly, e.g. using radio frequency, or the like.
  • the processor may be configured to validate the identifier by transmitting the received identifier to the remote server which assists the validation by comparing the identifier to a list of valid identifiers and notifies the processor of the results of the validation so that the processor is able to control the locking means accordingly.
  • the processor may include a transmitter for transmitting the received identifier to the remote server. .
  • the remote server may be configured to receive the identifier from a particular control device, to validate the received identifier, to transmit a signal to that particular device regarding the validity of the received identifier, and to log details of the identifier, so that access to said utility is only allowed when a valid identifier is received, and a record of the received identifier is created.
  • the remote server may be configured to only transmit the validation signal when certain requirements are met. These requirements may include that the identifier be received during a specific time period, that the identifier be received from a specific control device, that a specific identifier be received, and/or the like.
  • the transmitter may transmit signals via cable.
  • the cable may include an existing utility cable, e.g. an existing telecommunications cable, or the like.
  • the transmitter may transmit signals wirelessly, e.g. using radio frequency, or the like.
  • the processor may be configured to monitor the status of the utility access, e.g. if the access is currently open or closed, locked or unlocked, and/or the like.
  • the processor may log the status of the access.
  • the device may be configured so that the log is retrievable from the device, such as via the input, or the like, e.g. a technician can download the log directly from the device.
  • the processor may be configured to transmit the status log of the access to the monitoring server via the transmitter.
  • the server may be configured to monitor the status of the control devices. Accordingly, the server may be configured to poll the devices to determine their respective statuses, i.e. if an access is locked or unlocked, open or closed, and/or the like.
  • the server is able to detect any unauthorized access to a utilities, as an open status for an access not schedules for maintenance may indicate that an access has been broken open, or the like.
  • the server may be configured to notify a relevant authority if an invalid identifier is received.
  • the server may be configured to notify a relevant authority when an anomalous status is detected, e.g. when a device registers an open access which is unauthorized, or a closed and unlocked status, or the like.
  • the processor will generally only control the locking means to allow access to said utility if a valid identifier is transmitted to the remote server and a valid response received by the receiver which allows the processor to control the locking means.
  • the processor may further store a master identifier which, when received via the input, unlocks the locking means, i.e. a master key function, or the like.
  • the device may include energizing means for energizing the locking means, input, and processor.
  • the energizing means may include an electrochemical cell, e.g. a battery, or the like.
  • the device may be configured to draw electrical power from an existing utility line.
  • the energizing means may be configured to draw electrical power from a key which provides the identifier via the input, e.g. an electrochemical cell in a key provides operating power through induction principles, or the like.
  • the processor generally performs its various tasks and configurations by executing a specific set of instructions, e.g. a software package.
  • a method for utility access control which method includes the following steps receiving an electronic identifier via an input of a utility access control device; validating the received identifier to establish its authenticity; controlling a locking means of the control device if the identifier is valid to unlock an access to the utility; and logging details of the received identifier, so that a record of access attempts is created.
  • the access to the utility may include a manhole, a junction box, a maintenance hatch, and/or the like.
  • the utility may include an electricity supply, a water supply, a gas supply, sewage conduits, telecommunication lines, and/or the like.
  • the step of receiving the identifier may include receiving an RFID (Radio Frequency Identification), or a scanned magnetic identifier, e.g. a magnetic strip on a card scanned by a suitable scanner included in the input, or the like.
  • the input is for obtaining the identifier from a user, and that the identifier generally includes any suitable input able to uniquely identify a user.
  • the identifier may include a code uniquely associated with a specific person, a key, or the like.
  • the identifier is able to link a request for access to a utility to a certain person, such as a technician, or the like, so that record may be kept of when which person accessed which access for what duration, or the like.
  • the step of validating may include comparing the identifier to a list of valid identifiers, e.g. a look-up table, a roster of scheduled maintenance access, and/or the like.
  • the step of validating may include performing a certain calculation on the received identifier which, if the identifier is valid, yields a predetermined result.
  • the step of validating may include transmitting the received identifier to a remote server which assists the validation by comparing the identifier to a list of valid identifiers and transmitting a validation signal back to control device.
  • the step of transmitting the identifier to the remote server and receiving the validation signal may include transmitting and/or receiving via a cable, wirelessly, and/or the like.
  • the method may include the step of monitoring a status of the access to the utility, e.g. if the access is currently open or closed, locked or unlocked, and/or the like. As such, a log of the monitored status may be kept.
  • the remote server is able to detect any unauthorized access to a utilities, as an open status for an access not schedules for maintenance may indicate that an access has been broken open, or the like.
  • the method may include the step of notifying a relevant authority if an invalid identifier is received.
  • the step of logging the details may include logging the time when the identifier is received, the particular device from which the identifier is received, and/or the like.
  • Figure 1 shows, in perspective view, a utility access control device of a utility access control system, in accordance with the invention
  • Figure 2 shows, in perspective view, a further embodiment of the device shown in Figure 1 ;
  • FIG. 3 shows, in schematic view, the utility access control system
  • Figure 4 shows, in diagrammatic view, a method for utility control access, in accordance with the invention.
  • a utility access control device in accordance with the invention, is generally indicated by reference numeral 10.
  • the utility access control device 10 includes locking means 20, an input 14, a processor 16, and a transceiver 18.
  • the utility access 12 is a manhole device.
  • the utility access 12 is a junction box.
  • the utility access may include any type of access panel or maintenance hatch for accessing utility services.
  • the utility can include any form of utility, such as electricity cables, telecommunications cables, water mains, gas lines, sewer access, and/or the like.
  • the locking means 20 is generally configured to lock or unlock the access 12 to the utility.
  • the locking means 20 is an electromechanical lock configured to lock or unlock the utility access 12 according to a control signal from the processor 16.
  • the locking means is typically electrically actuated on command from the processor 16.
  • the input 14 is for receiving an electronic identifier from a user (not shown).
  • the input 14 is an RFID (Radio Frequency Identification) receiver for receiving an identifier from a RFID tag.
  • RFID Radio Frequency Identification
  • the input 14 is a scanner for scanning a magnetic identifier, e.g. a magnetic strip on a card, or the like.
  • the input 14 may also include a scanner for scanning some form of optical identifier, e.g. a barcode scanner, a retinal scanner, or the like. It is to be appreciated that the input 14 is for obtaining the identifier from a user, and that the identifier generally includes any suitable input able to uniquely identify a user.
  • the identifier includes a code uniquely associated with a specific person, a key, or the like. It is to be appreciated that the identifier is able to link a request for access to the utility to a certain person, such as a technician, or the like.
  • the processor 16 is generally arranged in communication with the input 14 and locking means 20.
  • the processor 16 is configured to validate the received identifier, to control the locking means 20 according to the validity of the identifier, and to log details of the received identifier, so that a record of access attempts is created.
  • the processor 16 typically validates the identifier by comparing the received identifier to a list of valid identifiers, e.g. a look-up table, or the like.
  • the processor 16 includes a memory arrangement for storing the list of valid identifiers for validation purposes.
  • the processor 16 includes a receiver 18 for receiving a list of updated identifiers from the remote server 24.
  • the processor 16 validates the identifier by transmitting the received identifier to the remote server 24 which compares the identifier to a list of valid identifiers and notifies the relevant processor 16 of the results of the validation. Accordingly, the processor 16 includes a transceiver 18 for transmitting and receiving information from the remote server 24.
  • the processor 16 validates the identifier by performing a certain calculation on the identifier which, if the identifier is valid, yields a predetermined result.
  • the transceiver 18 transmits and/or receives signals via cable, such as an existing utility cable, or telecommunications cable, or the transceiver 18 transmits and/or receives signals wirelessly, e.g. using radio frequency, or the like.
  • cable such as an existing utility cable, or telecommunications cable
  • the transceiver 18 transmits and/or receives signals wirelessly, e.g. using radio frequency, or the like.
  • processor 16 will generally only control the locking means 20 to allow access to said utility if a valid identifier is received.
  • the processor 16 stores the log of access attempts. Otherwise, in the embodiment shown in figure 3, the processor 16 is configured to transmit the log to the remote server 24 via the transceiver 18.
  • the processor 16 further stores a master identifier which, when received via the input 14, unlocks the locking means 20, i.e. a master key function, or the like.
  • the processor 16 is generally configured to monitor the status of the utility access 12, e.g. if the access 12 is open or closed, locked or unlocked, and/or the like. The processor 16 then logs the status of the access 12. In the embodiment shown in Figure 3, the processor 16 transmits the status log of the access 12 to the monitoring server 24.
  • the device 10 includes some form of energizing means (not shown) for energizing the locking means 20, input 14, and processor 16.
  • the energizing means may include an electrochemical cell, e.g. a battery, or the like. Otherwise, the device 10 may be configured to draw electrical power from an existing utility line.
  • the energizing means is configured to draw electrical power from a master key (not shown) which provides the identifier via the input 14, e.g. an electrochemical cell in a key provides operating power through induction principles, or the like. It is to be appreciated that this enables the device 10 to function if the energizing means is interrupted, such as when cable supplying the device 10 is cut, or the like.
  • this master key typically includes the master identifier.
  • processor 16 generally performs its various tasks and configurations by executing a specific set of instructions, e.g. a software package.
  • the system typically further includes a plurality of the utility access control devices 10 and the monitoring server 24.
  • the server 24 is configured to receive the identifier from a particular control device 10, to validate the received identifier, to transmit a signal to that particular device regarding the validity of the received identifier, and to log details of the identifier, so that access to said utility is only allowed when a valid identifier is received, and a record of the received identifier is created.
  • the server 24 is configured to only transmit the validation signal from the relevant device 10 when certain requirements are met. These requirements typically include that the identifier be received during a specific time period, or that the identifier be received from a specific control device 10, and/or the like.
  • the server 24 is also configured to monitor the status of the control devices 10 at the respective utility accesses 12. Accordingly, in one embodiment, the server 2 is configured to poll the devices 10 to determine the respective statuses of the accesses 12, i.e. if an access is locked or unlocked, open or closed, and/or the like. It is to be appreciated that, by monitoring the statuses of the respective devices 10, the server 24 is able to detect any unauthorized access to any utilities.
  • the server 24 is configured to notify a relevant authority (not shown) if an invalid identifier is received.
  • the server 24 is typically configured to notify a relevant authority when an anomalous status is detected, e.g. when a device 10 registers an open access 12 which is unauthorized, or a closed and unlocked status, or the like.
  • a technician obtains access to a particular utility access 12.
  • the server 24 registers the time and date of the authorized access, as well as the unique identifier of the technician.
  • the technician has an RFID tag which transmits the unique identifier to the processor 16 via the input 14.
  • the processor transmits the identifier to the server 24 via the transceiver 18. It is to be appreciated that this transmission may be along a cable or wirelessly.
  • the server receives the identifier via the server's transceiver 26, and validates the identifier.
  • This validation is typically done by the server checking if the identifier is allowed to access the particular access 12 controlled by the device 10 from which the identifier is received. If the identifier, device 10, time and place are authorized, the server 24 transmits a validation signal to that particular device 10. The processor 16 of that device 10 then activates the locking means 20 so that the technician can access the utility.
  • the server 24 monitors the status of the access 12.
  • the unlocking and opening of the access 12 is logged, along with the identifier and the time and duration thereof.
  • the processor When the access 12 is closed, the processor causes the locking means 20 to lock the access. It is to be appreciated that the technician generally uses the RFID tag to lock the access again, so that the event can be logged. The server then monitors that the access has been closed and locked. In this manner, the responsibility of the status of the access is assigned to that particular technician. It is to be appreciated that, in the above manner, a log is kept of who accessed which access at what time, so that if anything unauthorized takes place at a certain access, the culprit can be pinpointed.
  • the invention further extends to an associated method 30 for utility access control which method 30 includes the steps of receiving 32 an electronic identifier from a utility access control device, validating 34 the received identifier to establish its authenticity, controlling a locking means of the device if the identifier is valid, which, and logging 38 details of the received identifier, so that a record of the access attempt is created.
  • the access to the utility includes a manhole, a junction box, and/or the like.
  • the utility may include an electricity supply, a water supply, a gas supply, sewage conduits, telecommunication lines, and/or the like.
  • the step of receiving 32 the identifier includes receiving the identifier via a cable, wirelessly, and/or the like.
  • the step of validating 34 the identifier includes comparing the identifier to a list of valid identifiers, performing a specific calculation on the identifier which, if the identifier is valid, yields a predetermined result, and/or the like.
  • the step of controlling 36 may include controlling 36 the locking means locally, such when a processor validates the identifier at the device. Otherwise, the step of controlling 36 may include transmitting 36 the identifier to a remote server which facilitates in validating the identifier.
  • the step of transmitting 36 the signal to the device includes transmitting the signal via a cable, wirelessly, and/or the like. It is to be appreciated that access to the utility is typically only authorized when the validation signal is received by the device.
  • the step of logging the 38 details includes logging the time when the identifier is received, the particular device from which the identifier is received, the identifier, and/or the like.
  • the method 30 includes the step of monitoring a status of the utility access control device.
  • the status typically includes if the utility is open or closed, locked or unlocked, and/or the like.
  • the Inventors regard it as an advantage that the invention allows access to utility services to be controlled.
  • the Inventors regard it as a further advantage that the invention is able to monitor the status of a utility access.
  • the Inventors regard it as a further advantage that a record may be kept of any access to utilities.
  • the Inventors regard it as a yet further advantage that the invention facilitates asset protection and asset management finding particular application in the field of utility management.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Selective Calling Equipment (AREA)

Abstract

A system (22) which includes at least one utility access control device (10) which device (10) includes locking means (20), an input (14), a processor (16), and a transceiver (18). The locking means (20) is configured to lock or unlock an access to a utility, the input (14) is for receiving an electronic identifier from a user, and the processor (16) is, in turn, arranged in communication with the input (14) and locking means (20) to validate the received identifier, to control the locking means (20) according to the validity of the identifier, and to log details of the received identifier, so that a record of access attempts to the utility is created. The invention also includes an associated method.

Description

SYSTEM AND METHOD FOR UTILITY ACCESS CONTROL
FIELD OF THE INVENTION
This invention relates to a system and associated method for access control to public utilities and similar maintenance hatches.
BACKGROUND TO THE INVENTION
Unauthorized access to a utility, such as a telecommunication line, an electricity supply, a water pipe, a gas line, and/or a sewage conduit, may result in damage and/or theft of expensive components and interruption of critical services.
By gaining access to a telecommunications network, a person is able to establish communication links which are not able to be monitored for billing purposes, i.e. clip-on fraud. The theft of cables is a further problem, leading to costly repairs and interruptions to services such as electricity supply and telecommunications services.
The current invention seeks to address the above problems.
SUMMARY OF THE INVENTION
According to a first aspect of the invention there is provided a system for utility access control which system includes at least one utility access control device which includes locking means configured to lock or unlock an access to a utility, in use; an input for receiving an electronic identifier from a user; and a processor arranged in communication with the input and locking means, which processor is configured to validate the identifier, to control the locking means according to the validity of the identifier, and to log details of the received identifier, so that a record of access attempts is created.
It is to be appreciated that the access to the utility may include a manhole, a junction box, a maintenance hatch, and/or the like. Accordingly, the utility may include an electricity supply, a water supply, a gas supply, sewage conduits, telecommunication lines, and/or the like.
The locking means may include an electromechanical lock configured to lock or unlock the utility access according to control from the processor. It is to be appreciated that the locking means is typically electrically actuated on command from the processor.
The input may include an RFID (Radio Frequency Identification) receiver for receiving an identifier from a RFID tag. The input may include a scanner for scanning a magnetic identifier, e.g. a magnetic strip on a card, or the like. The input may include a scanner for scanning some form of optical identifier, e.g. a barcode scanner, a retinal scanner, or the like. It is to be appreciated that the input is for obtaining the identifier from a user, and that the identifier generally includes any suitable input able to uniquely identify a user.
The identifier may include a code uniquely associated with a specific person, a key, or the like. It is to be appreciated that the identifier is able to link a request for access to a utility to a certain person, such as a technician, or the like, so that record may be kept of when which person accessed which access for what duration, and/or the like.
The processor may validate the identifier by comparing the received identifier to a list of valid identifiers, e.g. a look-up table, a roster of scheduled maintenance access, and/or the like. As such, the processor may include a memory arrangement for storing the list of valid identifiers for validation purposes. The processor may be configured to be updated with valid identifiers, such as via the input, or the like, i.e. a technician updates the list of valid identifiers at the device itself.
The processor may validate the identifier by performing a certain calculation on the identifier which, if the identifier is valid, yields a predetermined result.
The record of attempts as logged by the processor may be downloadable via the input, i.e. a technician is able to retrieve the log of details directly from the device, or the like. In a further embodiment, the processor may include a receiver for communicating with a remote server. As such, the processor may be configured to receive updates of valid identifiers from the remote server via the receiver, i.e. an updated list of valid identifiers, or the like. Accordingly, the system may include the remote server.
The receiver may receive signals via cable. It is to be appreciated that the cable may include an existing utility cable, e.g. an existing telecommunications cable, or the like. The receiver may receive signals wirelessly, e.g. using radio frequency, or the like.
The processor may be configured to validate the identifier by transmitting the received identifier to the remote server which assists the validation by comparing the identifier to a list of valid identifiers and notifies the processor of the results of the validation so that the processor is able to control the locking means accordingly. Accordingly, the processor may include a transmitter for transmitting the received identifier to the remote server. .
Accordingly, the remote server may be configured to receive the identifier from a particular control device, to validate the received identifier, to transmit a signal to that particular device regarding the validity of the received identifier, and to log details of the identifier, so that access to said utility is only allowed when a valid identifier is received, and a record of the received identifier is created.
The remote server may be configured to only transmit the validation signal when certain requirements are met. These requirements may include that the identifier be received during a specific time period, that the identifier be received from a specific control device, that a specific identifier be received, and/or the like.
The transmitter may transmit signals via cable. It is to be appreciated that the cable may include an existing utility cable, e.g. an existing telecommunications cable, or the like. The transmitter may transmit signals wirelessly, e.g. using radio frequency, or the like. The processor may be configured to monitor the status of the utility access, e.g. if the access is currently open or closed, locked or unlocked, and/or the like. The processor may log the status of the access.
Accordingly, the device may be configured so that the log is retrievable from the device, such as via the input, or the like, e.g. a technician can download the log directly from the device.
Otherwise, the processor may be configured to transmit the status log of the access to the monitoring server via the transmitter.
The server may be configured to monitor the status of the control devices. Accordingly, the server may be configured to poll the devices to determine their respective statuses, i.e. if an access is locked or unlocked, open or closed, and/or the like.
It is to be appreciated that, by monitoring the statuses of the respective devices, the server is able to detect any unauthorized access to a utilities, as an open status for an access not schedules for maintenance may indicate that an access has been broken open, or the like.
The server may be configured to notify a relevant authority if an invalid identifier is received. The server may be configured to notify a relevant authority when an anomalous status is detected, e.g. when a device registers an open access which is unauthorized, or a closed and unlocked status, or the like.
It is to be appreciated that the processor will generally only control the locking means to allow access to said utility if a valid identifier is transmitted to the remote server and a valid response received by the receiver which allows the processor to control the locking means.
The processor may further store a master identifier which, when received via the input, unlocks the locking means, i.e. a master key function, or the like. The device may include energizing means for energizing the locking means, input, and processor. The energizing means may include an electrochemical cell, e.g. a battery, or the like.
Otherwise, the device may be configured to draw electrical power from an existing utility line.
The energizing means may be configured to draw electrical power from a key which provides the identifier via the input, e.g. an electrochemical cell in a key provides operating power through induction principles, or the like.
It is to be appreciated that the processor generally performs its various tasks and configurations by executing a specific set of instructions, e.g. a software package.
According to a second aspect of the invention there is provided a method for utility access control which method includes the following steps receiving an electronic identifier via an input of a utility access control device; validating the received identifier to establish its authenticity; controlling a locking means of the control device if the identifier is valid to unlock an access to the utility; and logging details of the received identifier, so that a record of access attempts is created.
It is to be appreciated that the access to the utility may include a manhole, a junction box, a maintenance hatch, and/or the like. Accordingly, the utility may include an electricity supply, a water supply, a gas supply, sewage conduits, telecommunication lines, and/or the like.
The step of receiving the identifier may include receiving an RFID (Radio Frequency Identification), or a scanned magnetic identifier, e.g. a magnetic strip on a card scanned by a suitable scanner included in the input, or the like. It is to be appreciated that the input is for obtaining the identifier from a user, and that the identifier generally includes any suitable input able to uniquely identify a user. As such, the identifier may include a code uniquely associated with a specific person, a key, or the like. It is to be appreciated that the identifier is able to link a request for access to a utility to a certain person, such as a technician, or the like, so that record may be kept of when which person accessed which access for what duration, or the like.
The step of validating may include comparing the identifier to a list of valid identifiers, e.g. a look-up table, a roster of scheduled maintenance access, and/or the like.
The step of validating may include performing a certain calculation on the received identifier which, if the identifier is valid, yields a predetermined result.
The step of validating may include transmitting the received identifier to a remote server which assists the validation by comparing the identifier to a list of valid identifiers and transmitting a validation signal back to control device.
As such, the step of transmitting the identifier to the remote server and receiving the validation signal may include transmitting and/or receiving via a cable, wirelessly, and/or the like.
The method may include the step of monitoring a status of the access to the utility, e.g. if the access is currently open or closed, locked or unlocked, and/or the like. As such, a log of the monitored status may be kept.
It is to be appreciated that, by monitoring the statuses of the respective devices, the remote server is able to detect any unauthorized access to a utilities, as an open status for an access not schedules for maintenance may indicate that an access has been broken open, or the like.
The method may include the step of notifying a relevant authority if an invalid identifier is received. The step of logging the details may include logging the time when the identifier is received, the particular device from which the identifier is received, and/or the like.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is now described, by way of non-limiting example, with reference to the accompanying drawings wherein
Figure 1 shows, in perspective view, a utility access control device of a utility access control system, in accordance with the invention;
Figure 2 shows, in perspective view, a further embodiment of the device shown in Figure 1 ;
Figure 3 shows, in schematic view, the utility access control system; and
Figure 4 shows, in diagrammatic view, a method for utility control access, in accordance with the invention.
DETAILED DESCRIPTION OF THE INVENTION
With reference to the accompanying drawings, a utility access control device, in accordance with the invention, is generally indicated by reference numeral 10.
In a preferred embodiment of the invention, the utility access control device 10 includes locking means 20, an input 14, a processor 16, and a transceiver 18.
In the embodiment shown in Figure 1 , the utility access 12 is a manhole device. In the embodiment shown in Figure 2, the utility access 12 is a junction box. It is to be appreciated that the utility access may include any type of access panel or maintenance hatch for accessing utility services. Accordingly, the utility can include any form of utility, such as electricity cables, telecommunications cables, water mains, gas lines, sewer access, and/or the like.
The locking means 20 is generally configured to lock or unlock the access 12 to the utility. In one embodiment, the locking means 20 is an electromechanical lock configured to lock or unlock the utility access 12 according to a control signal from the processor 16. As such, it is to be appreciated that the locking means is typically electrically actuated on command from the processor 16.
The input 14 is for receiving an electronic identifier from a user (not shown). In a preferred embodiment, the input 14 is an RFID (Radio Frequency Identification) receiver for receiving an identifier from a RFID tag.
In further embodiments of the invention, the input 14 is a scanner for scanning a magnetic identifier, e.g. a magnetic strip on a card, or the like. The input 14 may also include a scanner for scanning some form of optical identifier, e.g. a barcode scanner, a retinal scanner, or the like. It is to be appreciated that the input 14 is for obtaining the identifier from a user, and that the identifier generally includes any suitable input able to uniquely identify a user.
As such, the identifier includes a code uniquely associated with a specific person, a key, or the like. It is to be appreciated that the identifier is able to link a request for access to the utility to a certain person, such as a technician, or the like.
The processor 16 is generally arranged in communication with the input 14 and locking means 20. The processor 16 is configured to validate the received identifier, to control the locking means 20 according to the validity of the identifier, and to log details of the received identifier, so that a record of access attempts is created.
Accordingly, the processor 16 typically validates the identifier by comparing the received identifier to a list of valid identifiers, e.g. a look-up table, or the like. As such, the processor 16 includes a memory arrangement for storing the list of valid identifiers for validation purposes.
In one embodiment, the processor 16 includes a receiver 18 for receiving a list of updated identifiers from the remote server 24.
In a further embodiment, as shown in Figure 3 where a plurality of the devices 10 forms a system 22, the processor 16 validates the identifier by transmitting the received identifier to the remote server 24 which compares the identifier to a list of valid identifiers and notifies the relevant processor 16 of the results of the validation. Accordingly, the processor 16 includes a transceiver 18 for transmitting and receiving information from the remote server 24.
In addition, in one embodiment, the processor 16 validates the identifier by performing a certain calculation on the identifier which, if the identifier is valid, yields a predetermined result.
Typically depending on the type of utility, the transceiver 18 transmits and/or receives signals via cable, such as an existing utility cable, or telecommunications cable, or the transceiver 18 transmits and/or receives signals wirelessly, e.g. using radio frequency, or the like.
It is to be appreciated that the signals can be sent using the existing utility cables, where appropriate.
It is to be appreciated that the processor 16 will generally only control the locking means 20 to allow access to said utility if a valid identifier is received.
In one embodiment, the processor 16 stores the log of access attempts. Otherwise, in the embodiment shown in figure 3, the processor 16 is configured to transmit the log to the remote server 24 via the transceiver 18.
In one embodiment, the processor 16 further stores a master identifier which, when received via the input 14, unlocks the locking means 20, i.e. a master key function, or the like.
The processor 16 is generally configured to monitor the status of the utility access 12, e.g. if the access 12 is open or closed, locked or unlocked, and/or the like. The processor 16 then logs the status of the access 12. In the embodiment shown in Figure 3, the processor 16 transmits the status log of the access 12 to the monitoring server 24.
The device 10 includes some form of energizing means (not shown) for energizing the locking means 20, input 14, and processor 16. The energizing means may include an electrochemical cell, e.g. a battery, or the like. Otherwise, the device 10 may be configured to draw electrical power from an existing utility line.
In one embodiment, the energizing means is configured to draw electrical power from a master key (not shown) which provides the identifier via the input 14, e.g. an electrochemical cell in a key provides operating power through induction principles, or the like. It is to be appreciated that this enables the device 10 to function if the energizing means is interrupted, such as when cable supplying the device 10 is cut, or the like. In addition, this master key typically includes the master identifier.
It is to be appreciated that the processor 16 generally performs its various tasks and configurations by executing a specific set of instructions, e.g. a software package.
It is further to be appreciated from the above that the system covers a single control device 10.
In addition, the system typically further includes a plurality of the utility access control devices 10 and the monitoring server 24. The server 24 is configured to receive the identifier from a particular control device 10, to validate the received identifier, to transmit a signal to that particular device regarding the validity of the received identifier, and to log details of the identifier, so that access to said utility is only allowed when a valid identifier is received, and a record of the received identifier is created.
The server 24 is configured to only transmit the validation signal from the relevant device 10 when certain requirements are met. These requirements typically include that the identifier be received during a specific time period, or that the identifier be received from a specific control device 10, and/or the like.
The server 24 is also configured to monitor the status of the control devices 10 at the respective utility accesses 12. Accordingly, in one embodiment, the server 2 is configured to poll the devices 10 to determine the respective statuses of the accesses 12, i.e. if an access is locked or unlocked, open or closed, and/or the like. It is to be appreciated that, by monitoring the statuses of the respective devices 10, the server 24 is able to detect any unauthorized access to any utilities.
In a further embodiment, the server 24 is configured to notify a relevant authority (not shown) if an invalid identifier is received. The server 24 is typically configured to notify a relevant authority when an anomalous status is detected, e.g. when a device 10 registers an open access 12 which is unauthorized, or a closed and unlocked status, or the like.
In use, a technician obtains access to a particular utility access 12. The server 24 registers the time and date of the authorized access, as well as the unique identifier of the technician.
In a preferred embodiment, the technician has an RFID tag which transmits the unique identifier to the processor 16 via the input 14. Once the identifier is received, the processor transmits the identifier to the server 24 via the transceiver 18. It is to be appreciated that this transmission may be along a cable or wirelessly. The server receives the identifier via the server's transceiver 26, and validates the identifier.
This validation is typically done by the server checking if the identifier is allowed to access the particular access 12 controlled by the device 10 from which the identifier is received. If the identifier, device 10, time and place are authorized, the server 24 transmits a validation signal to that particular device 10. The processor 16 of that device 10 then activates the locking means 20 so that the technician can access the utility.
During this operation, the server 24 monitors the status of the access 12. The unlocking and opening of the access 12 is logged, along with the identifier and the time and duration thereof.
When the access 12 is closed, the processor causes the locking means 20 to lock the access. It is to be appreciated that the technician generally uses the RFID tag to lock the access again, so that the event can be logged. The server then monitors that the access has been closed and locked. In this manner, the responsibility of the status of the access is assigned to that particular technician. It is to be appreciated that, in the above manner, a log is kept of who accessed which access at what time, so that if anything unauthorized takes place at a certain access, the culprit can be pinpointed.
The invention further extends to an associated method 30 for utility access control which method 30 includes the steps of receiving 32 an electronic identifier from a utility access control device, validating 34 the received identifier to establish its authenticity, controlling a locking means of the device if the identifier is valid, which, and logging 38 details of the received identifier, so that a record of the access attempt is created.
It is to be appreciated that the access to the utility includes a manhole, a junction box, and/or the like. Accordingly, the utility may include an electricity supply, a water supply, a gas supply, sewage conduits, telecommunication lines, and/or the like.
The step of receiving 32 the identifier includes receiving the identifier via a cable, wirelessly, and/or the like.
The step of validating 34 the identifier includes comparing the identifier to a list of valid identifiers, performing a specific calculation on the identifier which, if the identifier is valid, yields a predetermined result, and/or the like.
The step of controlling 36 may include controlling 36 the locking means locally, such when a processor validates the identifier at the device. Otherwise, the step of controlling 36 may include transmitting 36 the identifier to a remote server which facilitates in validating the identifier.
In a preferred embodiment, the step of transmitting 36 the signal to the device includes transmitting the signal via a cable, wirelessly, and/or the like. It is to be appreciated that access to the utility is typically only authorized when the validation signal is received by the device. The step of logging the 38 details includes logging the time when the identifier is received, the particular device from which the identifier is received, the identifier, and/or the like.
In a preferred embodiment, the method 30 includes the step of monitoring a status of the utility access control device. The status typically includes if the utility is open or closed, locked or unlocked, and/or the like.
Although only certain embodiments of the invention have been described herein, it will be understood by any person skilled in the art that other modifications, variations, and possibilities of the invention are possible. Such modifications, variations and possibilities are therefore to be considered as falling within the spirit and scope of the invention and hence forming part of the invention as herein described and/or exemplified.
It shall be understood that the examples are provided for illustrating the invention further and to assist a person skilled in the art with understanding the invention and is not meant to be construed as unduly limiting the reasonable scope of the invention.
The Inventors regard it as an advantage that the invention allows access to utility services to be controlled. The Inventors regard it as a further advantage that the invention is able to monitor the status of a utility access.
The Inventors regard it as a further advantage that a record may be kept of any access to utilities. The Inventors regard it as a yet further advantage that the invention facilitates asset protection and asset management finding particular application in the field of utility management.

Claims

1. A system for utility access control which system includes at least one utility access control device which includes locking means configured to lock or unlock an access to a utility, in use; an input for receiving an electronic identifier from a user; and a processor arranged in communication with the input and locking means, which processor is configured to validate the identifier, to control the locking means according to the validity of the identifier, and to log details of the received identifier, so that a record of access attempts is created.
2. A system as claimed in claim 1 , wherein the utility access includes a manhole.
3. A system as claimed in claim 1 , wherein the utility access includes a junction box.
4. A system as claimed in claim 1 , wherein the utility access includes a maintenance hatch.
5. A system as claimed in any one of claims 1 to 4, wherein the utility includes an electricity supply.
6. A system as claimed in any one of claims 1 to 4, wherein the utility includes a water supply.
7. A system as claimed in any one of claims 1 to 4, wherein the utility includes a gas supply.
8. A system as claimed in any one of claims 1 to 4, wherein the utility includes a sewage conduit.
9. A system as claimed in any one of claims 1 to 4, wherein the utility includes a telecommunication line.
10. A system as claimed in any one of claims 1 to 9, wherein the locking means includes an electromechanical lock configured to lock or unlock the utility access according to control from the processor.
11. A system as claimed in any one of claims 1 to 10, wherein the input includes an RFID (Radio Frequency Identification) receiver for receiving an electronic identifier from a RFID tag.
12. A system as claimed in any one of claims 1 to 11 , wherein the input includes a scanner for scanning a magnetic identifier.
13. A system as claimed in any one of claims 1 to 12, wherein the input includes a scanner for scanning an optical identifier.
14. A system as claimed in any one of claims 1 to 13, wherein the identifier includes a code uniquely associated with a specific person so that the identifier is usable to link a request for access to a utility to that person to enable a record to be kept of when that person requested access.
15. A system as claimed in any one of claims 1 to 14, wherein the processor is configured to validate the identifier by comparing the received identifier to a list of valid identifiers, the processor further including a memory arrangement for storing the list of valid identifiers for such validation purposes.
16. A system as claimed in any one of claims 1 to 15, wherein the processor is configured to validate the identifier by performing a certain calculation on the identifier which, if the identifier is valid, yields a predetermined result.
17. A system as claimed in any one of claims 1 to 16, wherein the record of attempts as logged by the processor is downloadable via the input.
18. A system as claimed in any one of claims 1 to 17, which includes a remote server arranged in communication with the control device.
19. A system as claimed in claim 18, wherein the processor is configured to receive updates of valid identifiers from the remote server via a suitable receiver.
20. A system as claimed in claim 19, wherein the updates are received via an existing utility cable.
21. A system as claimed in claim 19, wherein the updates are received wirelessly.
22. A system as claimed in any one of claims 18 to 21 , wherein the processor is configured to validate the identifier by transmitting the received identifier to the remote server which assists the validation by comparing the identifier to a list of valid identifiers and notifies the processor of the results of the validation so that the processor is able to control the locking means accordingly.
23. A system as claimed in claim 22, wherein the processor includes a transmitter for transmitting the received identifier to the remote server. .
24. A system as claimed in claim 23, wherein the transmitter transmit signals via an existing utility cable.
25. A system as claimed in claim 18, wherein the remote server is configured to receive the identifier from a particular control device, to validate the received identifier, to transmit a signal to that particular device regarding the validity of the received identifier, and to log details of the identifier, so that access to said utility is only allowed when a valid identifier is received, and a record of the received identifier is created.
26. A system as claimed in any one of claims 18 to 25, wherein the remote server is configured to only transmit the validation signal when a requirement that the identifier be received during a specific time period is met.
27. A system as claimed in any one of claims 18 to 25, wherein the remote server is configured to only transmit the validation signal when a requirement that the identifier be received from a specific control device is met.
28. A system as claimed in any one of claims 18 to 27, wherein the processor is configured to monitor the status of the utility access.
29. A system as claimed in claim 28, wherein the processor logs the monitored status of the utility access.
30. A system as claimed in claim 29, wherein the device is configured so that the log is retrievable from the device.
31. A system as claimed in claim 29, wherein the processor is configured to transmit the status log of the access to the remote server.
32. A system as claimed in any one of claims 18 to 31 , wherein the remote server is configured to monitor the status of the control devices.
33. A system as claimed in claim 32, wherein the remote server is configured to poll the control device to determine its status.
34. A system as claimed in either one of claims 32 or 33, wherein the remote server is configured to notify a relevant authority when an anomalous status of the control device is detected.
35. A system as claimed in any one of claims 18 to 33, wherein the remote server is configured to notify a relevant authority if an invalid identifier is received.
36. A system as claimed in any one of claims 1 to 35, wherein the device includes energizing means for energizing components of the device.
37. A system as claimed in claim 36, wherein the energizing means includes an electrochemical cell.
38. A system as claimed in either one of claims 36 or 37, wherein the energising means includes a configuration allowing the device to draw electrical power from an existing utility line.
39. A system as claimed in any one of claims 36 to 38, wherein the energizing means is configured to draw electrical power from a key which provides the identifier via the input.
40. A method for utility access control which method includes the following steps receiving an electronic identifier via an input of a utility access control device; validating the received identifier to establish its authenticity; controlling a locking means of the control device if the identifier is valid to unlock an access to the utility; and logging details of the received identifier, so that a record of access attempts is created.
41. A method as claimed in claim 40, wherein the utility access includes a manhole.
42. A method as claimed in claim 40, wherein the utility access includes a junction box.
43. A method as claimed in claim 40, wherein the utility access includes a maintenance hatch.
44. A method as claimed in any one of claims 41 to 43, wherein the utility includes an electricity supply.
45. A method as claimed in any one of claims 41 to 43, wherein the utility includes a water supply.
46. A method as claimed in any one of claims 41 to 43, wherein the utility includes a gas supply.
47. A method as claimed in any one of claims 41 to 43, wherein the utility includes a sewage conduit.
40. A method as claimed in any one of claims 41 to 43, wherein the utility includes a telecommunication line.
49. A method as claimed in any one of claims 40 to 48, wherein the step of receiving the identifier includes receiving an RFID (Radio Frequency Identification) identifier.
50. A method as claimed in any one of claims 40 to 48, wherein the step of receiving the identifier includes receiving a magnetic identifier.
51. A method as claimed in any one of claims 40 to 50, wherein the identifier includes a code uniquely associated with a specific person so that the identifier is able to link a request for access to a utility to that person to allow a record to be kept of when such person accessed the utility access.
52. A method as claimed in any one of claims 40 to 51 , wherein the step of validating includes comparing the identifier to a list of valid identifiers.
53. A method as claimed in any one of claims 40 to 52, wherein the step of validating includes performing a certain calculation on the received identifier which, if the identifier is valid, yields a predetermined result.
54. A method as claimed in any one of claims 40 to 53, wherein the step of validating includes transmitting the received identifier to a remote server which assists the validation by comparing the identifier to a list of valid identifiers and transmitting a validation signal back to control device.
55. A method as claimed in any one of claims 40 to 54, which includes the step of monitoring a status of the access to the utility.
56. A method as claimed in claim 55, which includes the step of logging the monitored status of the access.
57. A method as claimed in any one of claims 40 to 56, which includes the step of notifying a relevant authority if an invalid identifier is received.
58. A system or a method as claimed in claim 1 or claim 40, respectively, substantially as herein described and illustrated.
59. A new system or a new method substantially as herein described.
PCT/ZA2006/000106 2005-09-16 2006-09-15 System and method for utility access control WO2007033388A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA200507531 2005-09-16
ZA2005/7531 2005-09-16

Publications (2)

Publication Number Publication Date
WO2007033388A2 true WO2007033388A2 (en) 2007-03-22
WO2007033388A3 WO2007033388A3 (en) 2007-05-31

Family

ID=37714566

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2006/000106 WO2007033388A2 (en) 2005-09-16 2006-09-15 System and method for utility access control

Country Status (1)

Country Link
WO (1) WO2007033388A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3009992A1 (en) * 2014-09-19 2016-04-20 EVVA Sicherheitstechnologie GmbH Method and device for managing access rights
CN107230291A (en) * 2017-06-09 2017-10-03 深圳市赛盟特科技有限公司 The shared leisure cabin of one kind and shared cabin system
CN109979040A (en) * 2017-12-28 2019-07-05 北京元正数据科技有限公司 The open method and device of intelligent well cover

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5749253A (en) * 1994-03-30 1998-05-12 Dallas Semiconductor Corporation Electrical/mechanical access control systems and methods
US5999095A (en) * 1995-05-19 1999-12-07 Slc Technologies, Inc. Electronic security system
AU1513301A (en) * 1999-11-30 2001-06-12 Bording Data A/S An access control system
JP3386430B2 (en) * 2000-02-23 2003-03-17 株式会社鷹山 Key with authentication opening and closing function and IC card
US20030098774A1 (en) * 2000-03-21 2003-05-29 Chornenky Todd E. Security apparatus
US20030085796A1 (en) * 2001-11-06 2003-05-08 Tokheim Corporation Electronic door lock for a fuel dispenser
EP1336937B1 (en) * 2002-02-13 2004-06-09 Swisscom AG Access control system, access control method and devices suitable therefore
US7061367B2 (en) * 2002-04-30 2006-06-13 General Electric Company Managing access to physical assets
US20050029345A1 (en) * 2003-07-09 2005-02-10 Paul Waterhouse Integrated lock, drop-box and delivery system and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3009992A1 (en) * 2014-09-19 2016-04-20 EVVA Sicherheitstechnologie GmbH Method and device for managing access rights
CN107230291A (en) * 2017-06-09 2017-10-03 深圳市赛盟特科技有限公司 The shared leisure cabin of one kind and shared cabin system
CN109979040A (en) * 2017-12-28 2019-07-05 北京元正数据科技有限公司 The open method and device of intelligent well cover
CN109979040B (en) * 2017-12-28 2021-09-03 北京元正数据科技有限公司 Opening method and device of intelligent well lid

Also Published As

Publication number Publication date
WO2007033388A3 (en) 2007-05-31

Similar Documents

Publication Publication Date Title
US20240346866A1 (en) Systems and methods for controlling access to physical space
US9026806B2 (en) Method and device for providing a cryptographic key for a field device
EP2085934B1 (en) Method and system of registering a mobile unit used as an electronic access key
US7012503B2 (en) Electronic key device a system and a method of managing electronic key information
CN102754134B (en) For operating the equipment of valuable bills and for keeping the cash cassette of valuable bills
CN101492982A (en) Intelligent electronic lock monitoring system applying to outdoor communication equipment room and cabinet
CA2652395A1 (en) Lockbox management system and method
WO2006136662A1 (en) Communication method of access control system
CN103262474A (en) Method and system for remote operation of an installation
CN104967825A (en) Gatekeeper electronic dog system
CN201377223Y (en) Intelligent electronic lock monitoring system applied to outdoor telecommunication rooms and cabinets
WO2007033388A2 (en) System and method for utility access control
JP2016508301A (en) Optical fiber enclosure
JP2002021385A (en) Portable terminal having master key function and electric lock for use therewith
JPH1054165A (en) Electronic access control and secret protecting device
KR102082178B1 (en) Dcu for plc-based ami networks, method for managing security and security system thereof
KR20230101997A (en) A digital door lock system with a fire monitoring function using a wireless network
WO2007062437A2 (en) Utility access
CN116783560A (en) Method for operating a field device and system for operating a field device
KR100785356B1 (en) Game store integrated management system
KR100605342B1 (en) Room management system using remote control digital door lock
CN210924860U (en) Computer lab safety monitoring system based on iBeacon technique
KR200367085Y1 (en) Remote controlled digital door lock apparatus and guest room management system using that
CN107454156B (en) Lock control adaptation system based on internet of things
JP2017101945A (en) Smart meter fraud prevention system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06804322

Country of ref document: EP

Kind code of ref document: A2

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载