[go: up one dir, main page]

AT523512A3 - Access control procedures and access control system - Google Patents

Access control procedures and access control system Download PDF

Info

Publication number
AT523512A3
AT523512A3 ATA50037/2021A AT500372021A AT523512A3 AT 523512 A3 AT523512 A3 AT 523512A3 AT 500372021 A AT500372021 A AT 500372021A AT 523512 A3 AT523512 A3 AT 523512A3
Authority
AT
Austria
Prior art keywords
data
access
access control
person
network connection
Prior art date
Application number
ATA50037/2021A
Other languages
German (de)
Other versions
AT523512A2 (en
Inventor
Schabauer Martin
Dreiszker Dieter
Original Assignee
Pke Holding Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pke Holding Ag filed Critical Pke Holding Ag
Publication of AT523512A2 publication Critical patent/AT523512A2/en
Publication of AT523512A3 publication Critical patent/AT523512A3/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Computerimplementiertes Verfahren zur Betätigung eines Zutrittskontrollsystems, wobei erste Daten (1) mittels eines ersten Lesegerätes (4) in einem ersten Leseschritt ausgelesen und/oder mittels einer ersten Eingabeeinheit durch eine Person eingegeben werden, welche ersten Daten (1) bei einer aktiven ersten Netzwerkverbindung zwischen dem ersten Lesegerät (4), einem ersten Datenspeicher(7), einem ersten Computer (6) und einer Steuerungseinheit (10) mit in dem ersten Datenspeicher (7) abgespeicherten ersten Zutrittsdaten (8) mittels des ersten Computers (6) abgeglichen werden und die Steuerungseinheit (10) zur Steuerung des Zutrittskontrollsystems in Abhängigkeit eines ersten Ergebnisses des Abgleiches der ersten Daten (1) und der ersten Zutrittsdaten (8) und aus dem ersten Ergebnis abgeleiteten ersten Berechtigungsdaten (9) der Person einen Zutritt freigibt oder unterbindet, wobei eine Inaktivität der ersten Netzwerkverbindung ermittelt wird und ausschließlich bei einer inaktiven ersten Netzwerkverbindung zweite Daten (2) mittels eines zweiten Lesegerätes (5) in einem zweiten Leseschritt ausgelesen werden und/oder mittels einer zweiten Eingabeeinheit durch die Person eingegeben werden, welche zweiten Daten (2) über eine zweite Netzwerkverbindung von dem zweiten Lesegerät (5) an die Steuerungseinheit (10) zur Freigabe eines Zutritts weitergeleitet werden, wobei die Steuerungseinheit (10) in Abhängigkeit bei einer Eignung der zweiten Daten (2) und einer aus der Eignung abgeleiteten zweiten Berechtigung der Person einen Zutritt freigibt oder einen Zutritt unterbindet.Computer-implemented method for operating an access control system, first data (1) being read out by means of a first reading device (4) in a first reading step and/or being entered by means of a first input unit by a person who first data (1) with an active first network connection between the first reading device (4), a first data memory (7), a first computer (6) and a control unit (10) are compared with first access data (8) stored in the first data memory (7) by means of the first computer (6) and the control unit (10) for controlling the access control system, depending on a first result of the comparison of the first data (1) and the first access data (8) and the first authorization data (9) derived from the first result, authorizes or prevents access for the person, with a Inactivity of the first network connection is determined and only with an inactive first n network connection second data (2) are read out by means of a second reading device (5) in a second reading step and/or are entered by the person using a second input unit, which second data (2) is sent by the second reading device (5) via a second network connection be forwarded to the control unit (10) to authorize access, the control unit (10) authorizing access or preventing access depending on the suitability of the second data (2) and a second authorization of the person derived from the suitability.

ATA50037/2021A 2020-01-27 2021-01-25 Access control procedures and access control system AT523512A3 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE102020101834 2020-01-27

Publications (2)

Publication Number Publication Date
AT523512A2 AT523512A2 (en) 2021-08-15
AT523512A3 true AT523512A3 (en) 2023-02-15

Family

ID=76753897

Family Applications (1)

Application Number Title Priority Date Filing Date
ATA50037/2021A AT523512A3 (en) 2020-01-27 2021-01-25 Access control procedures and access control system

Country Status (2)

Country Link
AT (1) AT523512A3 (en)
DE (1) DE102021101521A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202005010960U1 (en) * 2005-07-12 2005-11-10 AIDA Geschäftsführungs-Organisations-Systeme GmbH Secure access device for controlling access to a first secure area with multiple access points gives access to a second secure area with its access inside the first secure area
US20140070003A1 (en) * 2010-07-09 2014-03-13 Isonas Security Systems, Inc. System and method for integrating and adapting security control systems
EP3032501A1 (en) * 2014-12-11 2016-06-15 Skidata Ag Method for operating an ID-based access control system
EP3139353A1 (en) * 2015-09-03 2017-03-08 Axis AB Method and apparatus for increasing reliability in monitoring systems

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7775429B2 (en) 2006-08-16 2010-08-17 Isonas Security Systems Method and system for controlling access to an enclosed area
DE102014111503B4 (en) 2014-08-12 2016-04-28 Gls It Services Gmbh Intelligent delivery system
ES1147183Y (en) 2015-10-22 2016-03-01 Ojmar Sa ELECTRONIC LOCK AND ELECTRONIC CLOSURE SYSTEM FOR FURNITURE, CABINETS OR LOCKS
CN108898725B (en) 2018-07-25 2021-03-02 云丁智能科技(北京)有限公司 Door lock control method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202005010960U1 (en) * 2005-07-12 2005-11-10 AIDA Geschäftsführungs-Organisations-Systeme GmbH Secure access device for controlling access to a first secure area with multiple access points gives access to a second secure area with its access inside the first secure area
US20140070003A1 (en) * 2010-07-09 2014-03-13 Isonas Security Systems, Inc. System and method for integrating and adapting security control systems
EP3032501A1 (en) * 2014-12-11 2016-06-15 Skidata Ag Method for operating an ID-based access control system
EP3139353A1 (en) * 2015-09-03 2017-03-08 Axis AB Method and apparatus for increasing reliability in monitoring systems

Also Published As

Publication number Publication date
DE102021101521A1 (en) 2021-07-29
AT523512A2 (en) 2021-08-15

Similar Documents

Publication Publication Date Title
Wiebe et al. Two‐year follow‐up outcomes in emotionally focused couple therapy: An investigation of relationship satisfaction and attachment trajectories
DE3689569T2 (en) System file backup method and data processing unit for carrying it out.
Henley et al. The presence of equivalent models in strategic management research using structural equation modeling: Assessing and addressing the problem
US20190147382A1 (en) Creating digital workers in organizations
Nielsen Asymptotics for the Conditional‐Sum‐of‐Squares Estimator in Multivariate Fractional Time‐Series Models
WO2009040273A4 (en) Method for protecting at least parts of product data, which are stored on at least one server and/or in at least one database and associated with a product identified by an rfid tag, from unauthorized access
DE10128829A1 (en) Security process control system for medicine management, has security module to analyze security information collected in relation to authentication function start, to judge regarding execution of security function
DE102008061878A1 (en) Random number generator
EP4016338A1 (en) Access control for data stored on the cloud
CN111737703A (en) Method for realizing data lake security based on dynamic data desensitization technology
AT523512A3 (en) Access control procedures and access control system
Calatayud et al. Uncertainty quantification for random parabolic equations with nonhomogeneous boundary conditions on a bounded domain via the approximation of the probability density function
Jiao et al. Incremental stability of stochastic time‐varying impulsive and switching systems
DE102016113499A1 (en) Authentication method for authenticating a user of a terminal
WO2014131557A1 (en) Generating a key using biometric data, and a puf
DE112016002436T5 (en) Controlling access to resource functions at a resource control point via a user device
Jahani et al. As generative models improve, we must adapt our prompts
Fromm et al. Utility maximization via decoupling fields
Demetrescu et al. Fixed effects, lagged dependent variables, and bracketing: cautionary remarks
EP3413148B1 (en) Numerical control with integrated user administration
Gao et al. Physics-informed generator-encoder adversarial networks with latent space matching for stochastic differential equations
Tao et al. Bayesian analysis of regression discontinuity designs with heterogeneous treatment effects
DE102023128606A1 (en) Method and system for user management of a field device Automation technology
Sullivan et al. Robustness and power of analysis of covariance applied to data distorted from normality by floor effects: non-homogeneous regression slopes
Filenga et al. Non-Markovian memory in a measurement-based quantum computer