WO2004093017A1 - Systeme d'identification personnel pour verrous electroniques et autres systemes de calcul - Google Patents
Systeme d'identification personnel pour verrous electroniques et autres systemes de calculInfo
- Publication number
- WO2004093017A1 WO2004093017A1 PCT/ES2004/000166 ES2004000166W WO2004093017A1 WO 2004093017 A1 WO2004093017 A1 WO 2004093017A1 ES 2004000166 W ES2004000166 W ES 2004000166W WO 2004093017 A1 WO2004093017 A1 WO 2004093017A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- lock
- locks
- computer systems
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00182—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/23—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00388—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00579—Power supply for the keyless data carrier
- G07C2009/00603—Power supply for the keyless data carrier by power transmission from lock
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00658—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
- G07C9/00706—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with conductive components, e.g. pins, wires, metallic strips
Definitions
- this identification is carried out using very diverse mechanisms.
- we identify ourselves by the fact that only we have the corresponding key, and a different key for each lock.
- Another important problem is the fact that the loss of a key makes it advisable to change the lock. Being necessary to replace the rest of the keys, distributing them to the people who were previously given.
- As for the use of magnetic cards very widespread both in the environment of electronic locks and in ATMs. These are basically characterized by having a magnetic strip in which enough information is recorded to identify it. This information can be read later by any card reader of the corresponding type.
- the reader system can request the cardholder to enter a secret number, as occurs in ATM networks. This requirement guarantees the identity of the cardholder to the reader, but does not authenticate the reader to the cardholder. That is, someone could put a card reader on the public road, simulating the ATM of a bank, for example, read the content of the card and then ask the user for their secret number.
- the user believing himself to be before a valid interlocutor, would write the secret number, making his card information and his secret number available to the impostor, information that is sufficient to impersonate the user before the corresponding entities.
- the most used protocol is to simply request the number of the card, which is visible and therefore usable by a multitude of employees of establishments, where the card. This fact is one of the reasons that has most slowed down Internet sales.
- the personal identification system for electronic locks and other computer systems mentioned above is essentially made up of two attachable elements, a key and a lock, provided respectively with a male connector and a female connector, intended to be coupled at the time of their utilization.
- the male connector of the key is equipped with a battery and a computer system that includes a keyboard and a monitoring system using LEDs, liquid crystal or another type; while the existing female connector in the lock, it has a computer system and the precise electromechanical actuators and electronic connectors to handle mechanical resources or to transfer information to the system that houses it.
- This computer system for the lock may have its own power supply or lack it, since it is foreseen that, when the key is inserted, the same battery that feeds the male connector of the same can activate the lock system, or conversely, the power supply to the lock can activate the key system, in which case the power supply battery is not required, or if the battery is rechargeable, it can be recharged, with no other operation than leaving the key inserted in the lock.
- the key easily transportable by the user, both by shape and by dimensions, it will be of the type normally used for any door of a home, building, automobile or type of vehicle, alarm system, ATM, personal computer or of any kind, connected or not to a computer network or a computer system of any kind.
- the lock coupled to the corresponding door, alarm system, etc., etc., is included in the mechanism that offers services to the user, either opening or closing doors, vehicles or buildings, alarm systems , computer systems, computer networks, etc.
- Both the key and the lock are provided with separate connectors made up of various contacts, intended for power and charging, or to establish communication between the lock and key computer systems.
- the physical form of these connectors is defined in such a way that when the key is inserted into the lock, the battery contained in the key, which already feeds the circuits of the key, can also power the computer system of the lock, and in the event that the lock provided with its own power could charge the key battery or power its circuits.
- the connections for data communication establish a circuit that allows communication between the key and lock computer systems.
- Each key or lock has a device identification number (NID) and a set of keys exclusive public and private, that identify it and differentiate it from the rest of existing locks or keys.
- NID device identification number
- Said identification number is associated with the identity of the owner of the key or lock.
- the lock works passively as a receiver, waiting to identify the user to offer its services.
- the key works actively, requesting the receiver (by inserting it into the lock) to carry out a mutual identification process; After this identification, if applicable, the receiver will offer its services to the owner of the key.
- the female connector will not always be the interlocutor to whom the user wishes to identify himself. With respect to this fact, there can be two types of connection between the interlocutors: 1. Direct: From key to lock. In this case, the female connector has its own device identification number (NID) and its public and private keys and identifies itself as the other interlocutor of the interconnection. This will be the case of door locks in homes, vehicles, personal computers or alarm centers.
- NID device identification number
- lock is not the interlocutor to whom the key is to be identified, but rather an intermediary that enables the key to communicate with the system to which it wishes to identify itself.
- the lock will be included in a more general computer system to which it transfers the information from the key, so that it is transferred to the corresponding interlocutor, who is the one who will use their NID and keys to identify and identify themselves to the owner of the key.
- This interlocutor can be found in a remote machine until which, the computer system that houses the female connector, will send the information, using any of the possible interconnections between present or future computers, that is, through a local network, point-to-point connections, internet network, etc ...
- Some examples of this type of communication can be the case of ATMs, or internet services.
- a lock to identify a key there is an initial registration process, whereby the key and lock exchange their names, the public part of their asymmetric keys and enough information to maintain a sequence of secure subsequent connections, as well as a history of the same. Subsequently key and lock will be able to identify each other each time the key is inserted in the lock.
- the key has a small alphanumeric keyboard that the owner can use to enter information such as an activation code at the beginning of each identification that prevents the key from being used by strangers in the event of loss, or instructions for configuration of the key or lock in which it is inserted.
- the key also includes a small monitor or display to display the corresponding information.
- the key may include other connection or communication resources that allow you to expand your performance characteristics.
- both keys and locks store the information corresponding to their access sequence. This information will be accessible to the corresponding users, either through the user interface of the key (keyboard and monitor), or through the corresponding devices (computer systems that include the key or lock and have an access interface).
- the decision to enable the opening or closing is made computationally and not mechanically. This allows identifying the key individually, being able to prevent access to a lost key, without the need to change the lock.
- the same key can be enabled in many locks, managing to reduce the number of keys that a person must carry with them.
- the action of closing or opening the bolt can be carried out electrically or by traditional manual traction.
- the action of physically running the bolt is carried out mechanically and manually (a very convenient option for the consequent saving of energy stored in the key battery)
- the male connector of the key must be robust enough to Withstand manual turning that transmits traction to run the bolt.
- the described system has the property of mutually identifying the two interlocutors, so that the owner of the key also ensures that he is before the appropriate interlocutor.
- the same system can be used to sign by digital signature or to process other cryptographic algorithms related to the identity or authorship of the key owner.
- the same key can define various levels of security against different locks or services, such as, for example, whether or not it requires the inclusion of a secret number. It is even possible that the same key contains several sets of keys that will be activated with different secret numbers. We now go on to describe how our invention includes improvements over the prior art.
- the invention object of this document that is, the set consisting of key and lock that we propose here, combines the advantages of mechanical and electronic lock systems, while eliminating the disadvantages of these .
- the object of this invention gains in versatility compared to mechanical locks, since both the decision to open or close and the identification of the key are made in a computational way. This fact also allows the use of a standard communications protocol with which any key can be enabled in any lock. This makes it possible to use a single key to control multiple locks, instead of using one key for each lock. Locks may also be configured to restrict access for certain keys to a specific time and calendar. It is also important to highlight that the connection history that has taken place in each key and lock can be accessed.
- the object of this invention gains in autonomy and availability, compared to the electronic lock. Since the key-lock assembly does not need any external power, since as we have mentioned the key has an internal battery and the necessary connectors to supply not only its circuitry, but also that of the lock. To install the lock, it will not therefore be necessary to carry out conditioning works to bring the electrical cables to it. The exchange of a mechanical lock or a lock such as those described in this document will not be more complex than that of a classic mechanical lock for another of the same type.
- this invention basically solves the problem that the user can carry with them the content of the keys and the computing resources necessary to personally validate themselves, using appropriate cryptography algorithms, before the various mechanisms or services that may be physically dispersed, or with different mechanical, electrical, or access to information requirements. That is, the user can personally identify himself to locks, ATMs, computers, alarm systems, vehicles or internet services, safely, using a single device and needing to remember a single key (the one that activates the key), since with that same key will be enough for any identification.
- This invention basically proposes a system hardware with a suitable connector (the key) so that the interlocutor can identify himself to any service (through the female connector or lock) using suitable cryptographic mechanisms, a communication protocol using asymmetric keys or any other type of which the status of the Art of cryptographic techniques allow you today or in the future.
- This invention in turn allows to protect the improper use of the key by means of an access key to it, being able to prevent it from being used by any service without previously including said key access code.
- the same key without the user having to remember more than an access code (the key access code, which may be the same for all its activations), can be used to control locks in homes, offices, vehicles, to enable access to services on the internet to identify themselves mutually and securely with banking services or with the administration, to enable the operation or access to computers of any kind, to identify themselves with alarm systems, or ultimately to identify the presence of their owner and therefore validate the relevant operations.
- the key access code which may be the same for all its activations
- the object of this invention makes it possible for us to identify service users by including a female connector (lock) in our system, either by including it in the lock of our house, building or office, where we can define with great precision versatility access characteristics of each of the users to the case; either through a network of ATMs, including in each of them the relevant female connector (lock), or via the internet, since the user can include the necessary device (lock), in which they will insert the key, in their relevant computer, through which you will identify yourself to the service and identify it mutually and safely.
- figure 1 General perspective view of the system key.
- figure 2 General perspective view with detail of its interior, of the system lock.
- the personal identification system for electronic locks and other computer systems that is recommended is made up of a key (1) the size of the keys normally used for automobiles and the like, provided with a male connector ( 3) projecting from the body (5) where the computer system includes a keyboard (13) and a power battery (4), the assembly included in the body (5) being made up of a monitoring system using LEDs, liquid crystal or of any other type and in the protruding male connector, on their faces some contacts (10).
- the lock (2) has inside it a female connector (6) intended to connect with the male
- It also includes electronic connectors (9) to transfer information and power to the system, as well as contacts (11) to contact the corresponding (10) of the key when it is inserted, and a tab (12) for securing the male contact (3) when it is inserted into the lock.
- the key computing system it must contain a microprocessor, RAM memory, ROM memory for the storage of the programming and its private key, FALSH memory or EEPROM for the storage of programs and information regarding the interlocutors (other locks with which you have been enabled), the logic necessary to establish the connection with the interlocutor through the connections established during the insertion of the key in the lock, the logic necessary to manage the interfaces with the keyboard or system monitoring, if any, the clock logic necessary for system operation and time control (it may contain a small independent battery for the clock) and the logic necessary for miscellaneous system functions such as power status control, control battery recharging, etc.
- the structure of the computer system can be the typical structure of any microprocessor-based system, the only specific requirements are the existence of a communication interface that uses the male connector of the key, without this interface requiring any resources outside of the known in the current state of the art.
- a mechanical design such as that shown in figure 1 will suffice.
- the male connector of the key will have sufficient consistency to withstand the necessary traction for turning bolts or other mechanical traction mechanisms. Its surface allows it to house the power and data connections that must be established with the lock.
- the male connector of the key could be retractable, and it may also have a small indentation that serves as a pressure tab, existing in the lock, to hold it once inserted into it.
- the key module must be robust and compact enough to be transported personally (in the pocket). As we have already mentioned, you can optionally include a keyboard and display.
- the computer system of the lock it must also contain a microprocessor, RAM memory, ROM memory for the storage of programming and its private key, FALSH memory or EEPROM for the storage of programs and information regarding the interlocutors (other keys that have been enabled before it), the logic necessary to establish the connection with the interlocutor through the connections established during the insertion of the key in the lock, the clock logic necessary for the operation of the system and the time control (may contain a small independent battery for the clock) and the logic necessary for the miscellaneous functions of the system such as control of the power status, control of recharging of the batteries if any, etc ... As in the case of the.
- the structure of the computer system can be the typical structure of any microprocessor-based system, likewise, the only specific requirements are the existence of a communication interface that uses the female connector of the lock, without this interface requiring any resource, other than those already known in the current state of the art.
- the structure of the existing software in the key should not be complex, since we consider it a embedded system that does not require any operating system, and can function as a single process. This process will be dedicated to attending to the different operating protocols, by means of which the key and the lock will perform the functions for which they are intended.
- an asymmetric key system can be used, where each one has a symmetric system of public key and unique private key, defined during the manufacturing process.
- the communication protocol between key and lock must cover the different needs associated with the operation of the system.
- the protocol for its most fundamental function, mutual identification This can be done using the following ⁇ protocol for the identification process ", which could be defined qualitatively by the following steps: 1. Using the connection established when inserting the key into the lock, the key sends a HELLO message to the lock indicating that it wishes identify yourself before this, or the operation you want to perform 2. If the lock is active and ready to To carry out the requested operation, it replies with an OK message that it sends to the key.
- the key sends its identification number to the lock (unique, defined in the manufacturing process).
- the lock If the lock does not have information regarding that identification number (the key has not been enabled for that lock), it requests permission to validate it, and if it does not obtain it, it rejects it.
- CAIC random lock identification code
- the lock ' encrypts the CAIC string using the key's public key.
- the encrypted message also includes the lock identification number (Lock NID), so that the key can identify your correspondent.
- the lock sends the result of the previous step (CAIC + NIDlock) to the key's computer system.
- the key decrypts the message (CAIC + NIDlock) using its private key, obtaining decoded CAIC and NIDlock from where it will be able to know who its interlocutor is and therefore which public key and which symmetric key should be used.
- CAIK random key identification code
- the key builds a chain with the lock's CAIC and its CAIK and encrypts it using the symmetric key (SKO) agreed in the last connection between both devices.
- SKO symmetric key
- the key takes the result of the previous step (CAIC + CAIK encrypted with the SKO symmetric key) and re-encrypts it with the public key of the lock (which it knew during the process of enabling it).
- the key sends the result of the previous step ((CAIC + CAIK)) to the lock's computer system using the established communication line.
- the lock decrypts the message ((CAIC + CAIK)) using its private key, obtaining (CAIC + CAIK) encoded by the symmetric SKO key it knows from the previous connection.
- the lock decrypts the message (CAIC + CAIK) using its SKO symmetric key, obtaining CAIC + CAIK decoded. If CAIC matches the chain that the lock sent, the lock system knows that the peer with whom it communicates is not an impostor.
- the lock builds a chain with the CAIK it has decrypted from the key and the new symmetric key CAIK + NSK, and encrypts this chain (CAIK + NSK) using the key's public key.
- the lock sends the result of the previous step (CAIK + NSK) to the computer system of the key.
- the key decrypts the message (CAIK + NSK) using its private key, obtaining CAIK and
- the same key can be used to carry out other tasks or cryptographic algorithms such as digital signature, which allow identifying or initiating electronic documents, or any other task that requires identification by cryptographic methods of the owner of the key. All these processes can be carried out using the mechanisms available in the state of cryptographic techniques.
- the communication protocol between the two is responsible for processing the flow of information until the key is identified. If this has been defined, it will request the key entry through the keyboard. And with this the user will be identified. The process that continues depends on the nature of the interlocutors. If it is used on a lock, it will open or close by the corresponding electrical or mechanical means. If it is other systems such as ATMs, personal computers, etc ... the computer system will have identified the user of the key, he will have identified the service and both will act accordingly.
- the key can be inserted into a lock housed in a computer system with data monitoring capabilities (for example a PC); using the relevant protocols, the information contained in the key will be transferred to the lock and from there to the monitoring system ( PC), where it will be available to the user.
- data monitoring capabilities for example a PC
- the process is evident if it is housed in a computer system with monitoring capacity (for example a PC).
- a key inserted in it will be used. Since the key has the capacity to monitor and control the data, these can be seen directly when they are transferred from the lock to the key. For chaos in which the information to be monitored is very extensive, the key will collect the data from the lock, which can be seen when the key is inserted into a computer system with monitoring capacity (for example, a PC with the corresponding lock) . From a system of the same type (for example a PC with a lock), the corresponding configuration can also be generated, which will be stored in the key and downloaded onto the isolated lock to be configured, once the key is inserted in it.
- a computer system with monitoring capacity for example, a PC with the corresponding lock
- the shape, materials and dimensions may be variable and, in general, whatever is accessory and secondary, provided that it does not alter, change or modify the essential nature of the system that has been described.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| ESP200300904 | 2003-04-16 | ||
| ES200300904A ES2217968B1 (es) | 2003-04-16 | 2003-04-16 | Sistema y proceso de identificacion personal ante cerraduras electronicas y otros sistemas de computacion. |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2004093017A1 true WO2004093017A1 (fr) | 2004-10-28 |
Family
ID=33186150
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/ES2004/000166 Ceased WO2004093017A1 (fr) | 2003-04-16 | 2004-04-16 | Systeme d'identification personnel pour verrous electroniques et autres systemes de calcul |
Country Status (2)
| Country | Link |
|---|---|
| ES (1) | ES2217968B1 (fr) |
| WO (1) | WO2004093017A1 (fr) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8884762B2 (en) | 2005-12-23 | 2014-11-11 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US8994497B2 (en) | 2012-05-21 | 2015-03-31 | Invue Security Products Inc. | Cabinet lock key with audio indicators |
| US10087659B2 (en) | 2014-11-18 | 2018-10-02 | Invue Security Products Inc. | Key and security device |
| US11017656B2 (en) | 2011-06-27 | 2021-05-25 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4799258A (en) * | 1984-02-13 | 1989-01-17 | National Research Development Corporation | Apparatus and methods for granting access to computers |
| US6000609A (en) * | 1997-12-22 | 1999-12-14 | Security People, Inc. | Mechanical/electronic lock and key therefor |
| US20010028298A1 (en) * | 2000-03-10 | 2001-10-11 | Inqe Liden | Key and lock device |
| US20020024418A1 (en) * | 1999-08-11 | 2002-02-28 | Ayala Raymond F. | Method for a key to selectively allow access to an enclosure |
-
2003
- 2003-04-16 ES ES200300904A patent/ES2217968B1/es not_active Expired - Lifetime
-
2004
- 2004-04-16 WO PCT/ES2004/000166 patent/WO2004093017A1/fr not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4799258A (en) * | 1984-02-13 | 1989-01-17 | National Research Development Corporation | Apparatus and methods for granting access to computers |
| US6000609A (en) * | 1997-12-22 | 1999-12-14 | Security People, Inc. | Mechanical/electronic lock and key therefor |
| US20020024418A1 (en) * | 1999-08-11 | 2002-02-28 | Ayala Raymond F. | Method for a key to selectively allow access to an enclosure |
| US20010028298A1 (en) * | 2000-03-10 | 2001-10-11 | Inqe Liden | Key and lock device |
Cited By (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9858778B2 (en) | 2005-12-23 | 2018-01-02 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US11721198B2 (en) | 2005-12-23 | 2023-08-08 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US8896447B2 (en) | 2005-12-23 | 2014-11-25 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US12205457B2 (en) | 2005-12-23 | 2025-01-21 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US9135800B2 (en) | 2005-12-23 | 2015-09-15 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US9171441B2 (en) | 2005-12-23 | 2015-10-27 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US9269247B2 (en) | 2005-12-23 | 2016-02-23 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US9396631B2 (en) | 2005-12-23 | 2016-07-19 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US9478110B2 (en) | 2005-12-23 | 2016-10-25 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US9501913B2 (en) | 2005-12-23 | 2016-11-22 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US9576452B2 (en) | 2005-12-23 | 2017-02-21 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US9659472B2 (en) | 2005-12-23 | 2017-05-23 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US8890691B2 (en) | 2005-12-23 | 2014-11-18 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US8884762B2 (en) | 2005-12-23 | 2014-11-11 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US10600313B2 (en) | 2005-12-23 | 2020-03-24 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US10013867B2 (en) | 2005-12-23 | 2018-07-03 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US10297139B2 (en) | 2005-12-23 | 2019-05-21 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US10403122B2 (en) | 2005-12-23 | 2019-09-03 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US10062266B1 (en) | 2005-12-23 | 2018-08-28 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US11017656B2 (en) | 2011-06-27 | 2021-05-25 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US11763664B2 (en) | 2011-06-27 | 2023-09-19 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US12431005B2 (en) | 2011-06-27 | 2025-09-30 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
| US8994497B2 (en) | 2012-05-21 | 2015-03-31 | Invue Security Products Inc. | Cabinet lock key with audio indicators |
| US11015373B2 (en) | 2014-11-18 | 2021-05-25 | Invue Security Products Inc. | Key and security device |
| US11391070B2 (en) | 2014-11-18 | 2022-07-19 | Invue Security Products Inc. | Key and security device |
| US10087659B2 (en) | 2014-11-18 | 2018-10-02 | Invue Security Products Inc. | Key and security device |
Also Published As
| Publication number | Publication date |
|---|---|
| ES2217968B1 (es) | 2006-01-16 |
| ES2217968A1 (es) | 2004-11-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ES2202344T3 (es) | Procedimiento de carga de una zona de memoria protegida de un dispositivo de tratamiento de la informacion y dispositivo asociado. | |
| ES2388215T3 (es) | Sistema de control de entrada | |
| JP5274477B2 (ja) | 鍵付保管庫及び電子キー | |
| ES2257781T3 (es) | Metodo y sistema para asegurar la seguridad del suministro a distancia de servicios de instituciones financieras. | |
| ES2230110T3 (es) | Dispositivo de llave y cerradura. | |
| US9690916B2 (en) | Multi-function identification system and operation method thereof | |
| CN101375259A (zh) | 数据保全系统 | |
| EP2696306A1 (fr) | Système et dispositif dýauthentification dýun utilisateur | |
| US7543337B2 (en) | System and method for automatic verification of the holder of an authorization document and automatic establishment of the authenticity and validity of the authorization document | |
| ES2774397A1 (es) | Metodo y sistema para recuperacion de claves criptograficas de una red de cadena de bloques | |
| ES2272728T3 (es) | Terminal electronico de pago, tarjeta inteligente adaptada a dicho terminal y procedimiento para cargar una clave secreta en dicho terminal. | |
| BR102017025882A2 (pt) | Método para permitir múltiplos acessos remotos a ambiente digital com base em experiência de comportamento humano | |
| US20030014649A1 (en) | Communication system, authentication communication device, control apparatus, and communication method | |
| ES2643223T3 (es) | Medio de almacenamiento con dispositivo de cifrado | |
| BRPI0807432A2 (pt) | Dispositivo portátil de autenticação | |
| US9437059B2 (en) | Gatekeeper lock system | |
| WO2002048485A1 (fr) | Cle, serrure et procede de commande a reconnaissance d'empreintes digitales | |
| ES2217968B1 (es) | Sistema y proceso de identificacion personal ante cerraduras electronicas y otros sistemas de computacion. | |
| ES2336543T3 (es) | Tratamiento de datos con una clave. | |
| US11972652B1 (en) | Secure charging system for electronic devices | |
| ES2923919T3 (es) | Protección de una comunicación P2P | |
| ES2236137T3 (es) | Metodo anticlonacion. | |
| US10225734B1 (en) | Secured storage for electronic devices | |
| ES2826601T3 (es) | Procedimiento para la generación de una firma electrónica | |
| WO2017123098A1 (fr) | Procédé de vérification de l'identité d'une personne |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
| 122 | Ep: pct application non-entry in european phase |