+

WO2007033388A2 - Systeme et procede de commande d'acces a une installation - Google Patents

Systeme et procede de commande d'acces a une installation Download PDF

Info

Publication number
WO2007033388A2
WO2007033388A2 PCT/ZA2006/000106 ZA2006000106W WO2007033388A2 WO 2007033388 A2 WO2007033388 A2 WO 2007033388A2 ZA 2006000106 W ZA2006000106 W ZA 2006000106W WO 2007033388 A2 WO2007033388 A2 WO 2007033388A2
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
utility
access
processor
received
Prior art date
Application number
PCT/ZA2006/000106
Other languages
English (en)
Other versions
WO2007033388A3 (fr
Inventor
Attila Aranyosi
Cornelius Petrus Lourens
Terence Keith Ashwin
Original Assignee
Integra-Set (Pty) Ltd
Mct Telecommunications (Pty) Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Integra-Set (Pty) Ltd, Mct Telecommunications (Pty) Ltd filed Critical Integra-Set (Pty) Ltd
Publication of WO2007033388A2 publication Critical patent/WO2007033388A2/fr
Publication of WO2007033388A3 publication Critical patent/WO2007033388A3/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like

Definitions

  • This invention relates to a system and associated method for access control to public utilities and similar maintenance hatches.
  • Unauthorized access to a utility such as a telecommunication line, an electricity supply, a water pipe, a gas line, and/or a sewage conduit, may result in damage and/or theft of expensive components and interruption of critical services.
  • the current invention seeks to address the above problems.
  • a system for utility access control which system includes at least one utility access control device which includes locking means configured to lock or unlock an access to a utility, in use; an input for receiving an electronic identifier from a user; and a processor arranged in communication with the input and locking means, which processor is configured to validate the identifier, to control the locking means according to the validity of the identifier, and to log details of the received identifier, so that a record of access attempts is created.
  • the access to the utility may include a manhole, a junction box, a maintenance hatch, and/or the like.
  • the utility may include an electricity supply, a water supply, a gas supply, sewage conduits, telecommunication lines, and/or the like.
  • the locking means may include an electromechanical lock configured to lock or unlock the utility access according to control from the processor. It is to be appreciated that the locking means is typically electrically actuated on command from the processor.
  • the input may include an RFID (Radio Frequency Identification) receiver for receiving an identifier from a RFID tag.
  • the input may include a scanner for scanning a magnetic identifier, e.g. a magnetic strip on a card, or the like.
  • the input may include a scanner for scanning some form of optical identifier, e.g. a barcode scanner, a retinal scanner, or the like. It is to be appreciated that the input is for obtaining the identifier from a user, and that the identifier generally includes any suitable input able to uniquely identify a user.
  • the identifier may include a code uniquely associated with a specific person, a key, or the like. It is to be appreciated that the identifier is able to link a request for access to a utility to a certain person, such as a technician, or the like, so that record may be kept of when which person accessed which access for what duration, and/or the like.
  • the processor may validate the identifier by comparing the received identifier to a list of valid identifiers, e.g. a look-up table, a roster of scheduled maintenance access, and/or the like.
  • the processor may include a memory arrangement for storing the list of valid identifiers for validation purposes.
  • the processor may be configured to be updated with valid identifiers, such as via the input, or the like, i.e. a technician updates the list of valid identifiers at the device itself.
  • the processor may validate the identifier by performing a certain calculation on the identifier which, if the identifier is valid, yields a predetermined result.
  • the record of attempts as logged by the processor may be downloadable via the input, i.e. a technician is able to retrieve the log of details directly from the device, or the like.
  • the processor may include a receiver for communicating with a remote server.
  • the processor may be configured to receive updates of valid identifiers from the remote server via the receiver, i.e. an updated list of valid identifiers, or the like.
  • the system may include the remote server.
  • the receiver may receive signals via cable.
  • the cable may include an existing utility cable, e.g. an existing telecommunications cable, or the like.
  • the receiver may receive signals wirelessly, e.g. using radio frequency, or the like.
  • the processor may be configured to validate the identifier by transmitting the received identifier to the remote server which assists the validation by comparing the identifier to a list of valid identifiers and notifies the processor of the results of the validation so that the processor is able to control the locking means accordingly.
  • the processor may include a transmitter for transmitting the received identifier to the remote server. .
  • the remote server may be configured to receive the identifier from a particular control device, to validate the received identifier, to transmit a signal to that particular device regarding the validity of the received identifier, and to log details of the identifier, so that access to said utility is only allowed when a valid identifier is received, and a record of the received identifier is created.
  • the remote server may be configured to only transmit the validation signal when certain requirements are met. These requirements may include that the identifier be received during a specific time period, that the identifier be received from a specific control device, that a specific identifier be received, and/or the like.
  • the transmitter may transmit signals via cable.
  • the cable may include an existing utility cable, e.g. an existing telecommunications cable, or the like.
  • the transmitter may transmit signals wirelessly, e.g. using radio frequency, or the like.
  • the processor may be configured to monitor the status of the utility access, e.g. if the access is currently open or closed, locked or unlocked, and/or the like.
  • the processor may log the status of the access.
  • the device may be configured so that the log is retrievable from the device, such as via the input, or the like, e.g. a technician can download the log directly from the device.
  • the processor may be configured to transmit the status log of the access to the monitoring server via the transmitter.
  • the server may be configured to monitor the status of the control devices. Accordingly, the server may be configured to poll the devices to determine their respective statuses, i.e. if an access is locked or unlocked, open or closed, and/or the like.
  • the server is able to detect any unauthorized access to a utilities, as an open status for an access not schedules for maintenance may indicate that an access has been broken open, or the like.
  • the server may be configured to notify a relevant authority if an invalid identifier is received.
  • the server may be configured to notify a relevant authority when an anomalous status is detected, e.g. when a device registers an open access which is unauthorized, or a closed and unlocked status, or the like.
  • the processor will generally only control the locking means to allow access to said utility if a valid identifier is transmitted to the remote server and a valid response received by the receiver which allows the processor to control the locking means.
  • the processor may further store a master identifier which, when received via the input, unlocks the locking means, i.e. a master key function, or the like.
  • the device may include energizing means for energizing the locking means, input, and processor.
  • the energizing means may include an electrochemical cell, e.g. a battery, or the like.
  • the device may be configured to draw electrical power from an existing utility line.
  • the energizing means may be configured to draw electrical power from a key which provides the identifier via the input, e.g. an electrochemical cell in a key provides operating power through induction principles, or the like.
  • the processor generally performs its various tasks and configurations by executing a specific set of instructions, e.g. a software package.
  • a method for utility access control which method includes the following steps receiving an electronic identifier via an input of a utility access control device; validating the received identifier to establish its authenticity; controlling a locking means of the control device if the identifier is valid to unlock an access to the utility; and logging details of the received identifier, so that a record of access attempts is created.
  • the access to the utility may include a manhole, a junction box, a maintenance hatch, and/or the like.
  • the utility may include an electricity supply, a water supply, a gas supply, sewage conduits, telecommunication lines, and/or the like.
  • the step of receiving the identifier may include receiving an RFID (Radio Frequency Identification), or a scanned magnetic identifier, e.g. a magnetic strip on a card scanned by a suitable scanner included in the input, or the like.
  • the input is for obtaining the identifier from a user, and that the identifier generally includes any suitable input able to uniquely identify a user.
  • the identifier may include a code uniquely associated with a specific person, a key, or the like.
  • the identifier is able to link a request for access to a utility to a certain person, such as a technician, or the like, so that record may be kept of when which person accessed which access for what duration, or the like.
  • the step of validating may include comparing the identifier to a list of valid identifiers, e.g. a look-up table, a roster of scheduled maintenance access, and/or the like.
  • the step of validating may include performing a certain calculation on the received identifier which, if the identifier is valid, yields a predetermined result.
  • the step of validating may include transmitting the received identifier to a remote server which assists the validation by comparing the identifier to a list of valid identifiers and transmitting a validation signal back to control device.
  • the step of transmitting the identifier to the remote server and receiving the validation signal may include transmitting and/or receiving via a cable, wirelessly, and/or the like.
  • the method may include the step of monitoring a status of the access to the utility, e.g. if the access is currently open or closed, locked or unlocked, and/or the like. As such, a log of the monitored status may be kept.
  • the remote server is able to detect any unauthorized access to a utilities, as an open status for an access not schedules for maintenance may indicate that an access has been broken open, or the like.
  • the method may include the step of notifying a relevant authority if an invalid identifier is received.
  • the step of logging the details may include logging the time when the identifier is received, the particular device from which the identifier is received, and/or the like.
  • Figure 1 shows, in perspective view, a utility access control device of a utility access control system, in accordance with the invention
  • Figure 2 shows, in perspective view, a further embodiment of the device shown in Figure 1 ;
  • FIG. 3 shows, in schematic view, the utility access control system
  • Figure 4 shows, in diagrammatic view, a method for utility control access, in accordance with the invention.
  • a utility access control device in accordance with the invention, is generally indicated by reference numeral 10.
  • the utility access control device 10 includes locking means 20, an input 14, a processor 16, and a transceiver 18.
  • the utility access 12 is a manhole device.
  • the utility access 12 is a junction box.
  • the utility access may include any type of access panel or maintenance hatch for accessing utility services.
  • the utility can include any form of utility, such as electricity cables, telecommunications cables, water mains, gas lines, sewer access, and/or the like.
  • the locking means 20 is generally configured to lock or unlock the access 12 to the utility.
  • the locking means 20 is an electromechanical lock configured to lock or unlock the utility access 12 according to a control signal from the processor 16.
  • the locking means is typically electrically actuated on command from the processor 16.
  • the input 14 is for receiving an electronic identifier from a user (not shown).
  • the input 14 is an RFID (Radio Frequency Identification) receiver for receiving an identifier from a RFID tag.
  • RFID Radio Frequency Identification
  • the input 14 is a scanner for scanning a magnetic identifier, e.g. a magnetic strip on a card, or the like.
  • the input 14 may also include a scanner for scanning some form of optical identifier, e.g. a barcode scanner, a retinal scanner, or the like. It is to be appreciated that the input 14 is for obtaining the identifier from a user, and that the identifier generally includes any suitable input able to uniquely identify a user.
  • the identifier includes a code uniquely associated with a specific person, a key, or the like. It is to be appreciated that the identifier is able to link a request for access to the utility to a certain person, such as a technician, or the like.
  • the processor 16 is generally arranged in communication with the input 14 and locking means 20.
  • the processor 16 is configured to validate the received identifier, to control the locking means 20 according to the validity of the identifier, and to log details of the received identifier, so that a record of access attempts is created.
  • the processor 16 typically validates the identifier by comparing the received identifier to a list of valid identifiers, e.g. a look-up table, or the like.
  • the processor 16 includes a memory arrangement for storing the list of valid identifiers for validation purposes.
  • the processor 16 includes a receiver 18 for receiving a list of updated identifiers from the remote server 24.
  • the processor 16 validates the identifier by transmitting the received identifier to the remote server 24 which compares the identifier to a list of valid identifiers and notifies the relevant processor 16 of the results of the validation. Accordingly, the processor 16 includes a transceiver 18 for transmitting and receiving information from the remote server 24.
  • the processor 16 validates the identifier by performing a certain calculation on the identifier which, if the identifier is valid, yields a predetermined result.
  • the transceiver 18 transmits and/or receives signals via cable, such as an existing utility cable, or telecommunications cable, or the transceiver 18 transmits and/or receives signals wirelessly, e.g. using radio frequency, or the like.
  • cable such as an existing utility cable, or telecommunications cable
  • the transceiver 18 transmits and/or receives signals wirelessly, e.g. using radio frequency, or the like.
  • processor 16 will generally only control the locking means 20 to allow access to said utility if a valid identifier is received.
  • the processor 16 stores the log of access attempts. Otherwise, in the embodiment shown in figure 3, the processor 16 is configured to transmit the log to the remote server 24 via the transceiver 18.
  • the processor 16 further stores a master identifier which, when received via the input 14, unlocks the locking means 20, i.e. a master key function, or the like.
  • the processor 16 is generally configured to monitor the status of the utility access 12, e.g. if the access 12 is open or closed, locked or unlocked, and/or the like. The processor 16 then logs the status of the access 12. In the embodiment shown in Figure 3, the processor 16 transmits the status log of the access 12 to the monitoring server 24.
  • the device 10 includes some form of energizing means (not shown) for energizing the locking means 20, input 14, and processor 16.
  • the energizing means may include an electrochemical cell, e.g. a battery, or the like. Otherwise, the device 10 may be configured to draw electrical power from an existing utility line.
  • the energizing means is configured to draw electrical power from a master key (not shown) which provides the identifier via the input 14, e.g. an electrochemical cell in a key provides operating power through induction principles, or the like. It is to be appreciated that this enables the device 10 to function if the energizing means is interrupted, such as when cable supplying the device 10 is cut, or the like.
  • this master key typically includes the master identifier.
  • processor 16 generally performs its various tasks and configurations by executing a specific set of instructions, e.g. a software package.
  • the system typically further includes a plurality of the utility access control devices 10 and the monitoring server 24.
  • the server 24 is configured to receive the identifier from a particular control device 10, to validate the received identifier, to transmit a signal to that particular device regarding the validity of the received identifier, and to log details of the identifier, so that access to said utility is only allowed when a valid identifier is received, and a record of the received identifier is created.
  • the server 24 is configured to only transmit the validation signal from the relevant device 10 when certain requirements are met. These requirements typically include that the identifier be received during a specific time period, or that the identifier be received from a specific control device 10, and/or the like.
  • the server 24 is also configured to monitor the status of the control devices 10 at the respective utility accesses 12. Accordingly, in one embodiment, the server 2 is configured to poll the devices 10 to determine the respective statuses of the accesses 12, i.e. if an access is locked or unlocked, open or closed, and/or the like. It is to be appreciated that, by monitoring the statuses of the respective devices 10, the server 24 is able to detect any unauthorized access to any utilities.
  • the server 24 is configured to notify a relevant authority (not shown) if an invalid identifier is received.
  • the server 24 is typically configured to notify a relevant authority when an anomalous status is detected, e.g. when a device 10 registers an open access 12 which is unauthorized, or a closed and unlocked status, or the like.
  • a technician obtains access to a particular utility access 12.
  • the server 24 registers the time and date of the authorized access, as well as the unique identifier of the technician.
  • the technician has an RFID tag which transmits the unique identifier to the processor 16 via the input 14.
  • the processor transmits the identifier to the server 24 via the transceiver 18. It is to be appreciated that this transmission may be along a cable or wirelessly.
  • the server receives the identifier via the server's transceiver 26, and validates the identifier.
  • This validation is typically done by the server checking if the identifier is allowed to access the particular access 12 controlled by the device 10 from which the identifier is received. If the identifier, device 10, time and place are authorized, the server 24 transmits a validation signal to that particular device 10. The processor 16 of that device 10 then activates the locking means 20 so that the technician can access the utility.
  • the server 24 monitors the status of the access 12.
  • the unlocking and opening of the access 12 is logged, along with the identifier and the time and duration thereof.
  • the processor When the access 12 is closed, the processor causes the locking means 20 to lock the access. It is to be appreciated that the technician generally uses the RFID tag to lock the access again, so that the event can be logged. The server then monitors that the access has been closed and locked. In this manner, the responsibility of the status of the access is assigned to that particular technician. It is to be appreciated that, in the above manner, a log is kept of who accessed which access at what time, so that if anything unauthorized takes place at a certain access, the culprit can be pinpointed.
  • the invention further extends to an associated method 30 for utility access control which method 30 includes the steps of receiving 32 an electronic identifier from a utility access control device, validating 34 the received identifier to establish its authenticity, controlling a locking means of the device if the identifier is valid, which, and logging 38 details of the received identifier, so that a record of the access attempt is created.
  • the access to the utility includes a manhole, a junction box, and/or the like.
  • the utility may include an electricity supply, a water supply, a gas supply, sewage conduits, telecommunication lines, and/or the like.
  • the step of receiving 32 the identifier includes receiving the identifier via a cable, wirelessly, and/or the like.
  • the step of validating 34 the identifier includes comparing the identifier to a list of valid identifiers, performing a specific calculation on the identifier which, if the identifier is valid, yields a predetermined result, and/or the like.
  • the step of controlling 36 may include controlling 36 the locking means locally, such when a processor validates the identifier at the device. Otherwise, the step of controlling 36 may include transmitting 36 the identifier to a remote server which facilitates in validating the identifier.
  • the step of transmitting 36 the signal to the device includes transmitting the signal via a cable, wirelessly, and/or the like. It is to be appreciated that access to the utility is typically only authorized when the validation signal is received by the device.
  • the step of logging the 38 details includes logging the time when the identifier is received, the particular device from which the identifier is received, the identifier, and/or the like.
  • the method 30 includes the step of monitoring a status of the utility access control device.
  • the status typically includes if the utility is open or closed, locked or unlocked, and/or the like.
  • the Inventors regard it as an advantage that the invention allows access to utility services to be controlled.
  • the Inventors regard it as a further advantage that the invention is able to monitor the status of a utility access.
  • the Inventors regard it as a further advantage that a record may be kept of any access to utilities.
  • the Inventors regard it as a yet further advantage that the invention facilitates asset protection and asset management finding particular application in the field of utility management.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Selective Calling Equipment (AREA)

Abstract

L'invention concerne un système (22) qui comprend au moins un dispositif (10) de commande d'accès à une installation, lequel comporte un moyen de verrouillage (20), une entrée (14), un processeur (16), et un émetteur-récepteur (18). Le moyen de verrouillage (20) est conçu pour verrouiller ou déverrouiller l'accès à une installation, l'entrée (14) est conçue pour recevoir un identifiant électronique en provenance d'un utilisateur, et le processeur (16), est conçu pour être en communication avec l'entrée (14) et le moyen de verrouillage (20) pour valider l'identifiant reçu, pour commander le moyen de verrouillage (20) en fonction de la validité de l'identifiant, et pour enregistrer des détails de l'identifiant reçu, de façon qu'un fichier des tentatives d'accès à l'installation soit créé. L'invention concerne également un procédé associé.
PCT/ZA2006/000106 2005-09-16 2006-09-15 Systeme et procede de commande d'acces a une installation WO2007033388A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA200507531 2005-09-16
ZA2005/7531 2005-09-16

Publications (2)

Publication Number Publication Date
WO2007033388A2 true WO2007033388A2 (fr) 2007-03-22
WO2007033388A3 WO2007033388A3 (fr) 2007-05-31

Family

ID=37714566

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2006/000106 WO2007033388A2 (fr) 2005-09-16 2006-09-15 Systeme et procede de commande d'acces a une installation

Country Status (1)

Country Link
WO (1) WO2007033388A2 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3009992A1 (fr) * 2014-09-19 2016-04-20 EVVA Sicherheitstechnologie GmbH Procede et dispositif de gestion d'autorisations d'acces
CN107230291A (zh) * 2017-06-09 2017-10-03 深圳市赛盟特科技有限公司 一种共享休闲舱及共享舱系统
CN109979040A (zh) * 2017-12-28 2019-07-05 北京元正数据科技有限公司 智能井盖的开启方法及装置

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5749253A (en) * 1994-03-30 1998-05-12 Dallas Semiconductor Corporation Electrical/mechanical access control systems and methods
US5999095A (en) * 1995-05-19 1999-12-07 Slc Technologies, Inc. Electronic security system
AU1513301A (en) * 1999-11-30 2001-06-12 Bording Data A/S An access control system
JP3386430B2 (ja) * 2000-02-23 2003-03-17 株式会社鷹山 認証開閉機能付鍵及びicカード
US20030098774A1 (en) * 2000-03-21 2003-05-29 Chornenky Todd E. Security apparatus
US20030085796A1 (en) * 2001-11-06 2003-05-08 Tokheim Corporation Electronic door lock for a fuel dispenser
ATE268926T1 (de) * 2002-02-13 2004-06-15 Swisscom Ag Zutrittskontrollsystem, zutrittskontrollverfahren und dafur geeignete vorrichtungen
US7061367B2 (en) * 2002-04-30 2006-06-13 General Electric Company Managing access to physical assets
US20050029345A1 (en) * 2003-07-09 2005-02-10 Paul Waterhouse Integrated lock, drop-box and delivery system and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3009992A1 (fr) * 2014-09-19 2016-04-20 EVVA Sicherheitstechnologie GmbH Procede et dispositif de gestion d'autorisations d'acces
CN107230291A (zh) * 2017-06-09 2017-10-03 深圳市赛盟特科技有限公司 一种共享休闲舱及共享舱系统
CN109979040A (zh) * 2017-12-28 2019-07-05 北京元正数据科技有限公司 智能井盖的开启方法及装置
CN109979040B (zh) * 2017-12-28 2021-09-03 北京元正数据科技有限公司 智能井盖的开启方法及装置

Also Published As

Publication number Publication date
WO2007033388A3 (fr) 2007-05-31

Similar Documents

Publication Publication Date Title
US10872483B2 (en) Systems and methods for controlling access to physical space
US9026806B2 (en) Method and device for providing a cryptographic key for a field device
EP2085934B1 (fr) Procédé et système pour enregistrer une unité mobile employée comme clé d'accès électronique
US7012503B2 (en) Electronic key device a system and a method of managing electronic key information
CN102754134B (zh) 用于操作有价票据的设备以及用于保持有价票据的现金盒
CN101492982A (zh) 应用于户外通信机房、机柜的智能电子门锁监控系统
CA2652395A1 (fr) Systeme et procede de gestion de boitier de securite
WO2006136662A1 (fr) Procede de communication d'un systeme de commande d'acces
CN103262474A (zh) 用于对装置进行远程操作的方法及系统
CN104967825A (zh) 一种看门电子狗系统
CN201377223Y (zh) 应用于户外通信机房、机柜的智能电子门锁监控系统
WO2007033388A2 (fr) Systeme et procede de commande d'acces a une installation
JP2016508301A (ja) 光ファイバ格納装置
JP2002021385A (ja) マスターキー機能を有する携帯端末およびそれに用いられる電気錠
JPH1054165A (ja) 電子アクセス制御及び機密保護装置
KR102082178B1 (ko) Plc 기반 ami 통신망을 구성하는 데이터 수집 장치와, 그의 보안 관리 방법 및 보안 시스템
KR20230101997A (ko) 무선 네트워크를 이용한 화재감시 기능을 갖는 디지털도어락 시스템
WO2007062437A2 (fr) Acces a une installation
CN116783560A (zh) 用于操作现场装置的方法和用于操作现场装置的系统
KR100785356B1 (ko) 게임매장 통합관리 시스템
KR100605342B1 (ko) 원격통제 디지털 도어락장치를 이용한 객실 관리시스템
CN210924860U (zh) 一种基于iBeacon技术的机房安全监控系统
KR200367085Y1 (ko) 원격통제 디지털 도어락장치 및 그를 이용한 객실관리시스템
CN107454156B (zh) 一种基于物联网技术的锁控适配系统
JP2017101945A (ja) スマートメータ不正防止システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06804322

Country of ref document: EP

Kind code of ref document: A2

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载