EP1821262A2 - System for checking the authorisation of persons to carry out activities requiring authorisation - Google Patents
System for checking the authorisation of persons to carry out activities requiring authorisation Download PDFInfo
- Publication number
- EP1821262A2 EP1821262A2 EP07002999A EP07002999A EP1821262A2 EP 1821262 A2 EP1821262 A2 EP 1821262A2 EP 07002999 A EP07002999 A EP 07002999A EP 07002999 A EP07002999 A EP 07002999A EP 1821262 A2 EP1821262 A2 EP 1821262A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- central server
- data
- terminal
- persons
- terminals
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
Definitions
- the invention relates to a system for controlling authorizations of persons to carry out authoritative activities.
- the system is advantageously applicable to the administration of a large number of authorizations for buildings located remotely at any location.
- a typical application is the management of access authorizations.
- biometric data of the persons registered in the system are used as recognition features.
- the signature of a person is used as key information for access control.
- Significant information on the type of signing of a person authorized to sign up in principle is created and stored once by means of signatures. If this person then wants to gain concrete access, she has to sign again, from this data is generated, which are compared with the stored data. If there is sufficient agreement, access is granted. According to this system, it is no longer necessary to carry an item acting as a key or to apply a password. None is said about the administration of access authorizations in buildings located far apart with a total of many access openings.
- the DE 296 02 655 U1 describes a system for assigning access rights to decentralized facilities.
- the control devices on the respective doors are not connected to the central unit. They receive access rules in the form of data, which are brought manually on a mobile data carrier, and are read in after the reading unit has been unlocked.
- the persons requesting admission must enter valid key information via an input unit, eg a numeric keypad.
- the control device can also record data, such as who came and went when. If necessary, these data must be brought to the central unit manually by means of a mobile data carrier.
- An advantage of this system is that it does not require an upright data network between the central unit and distributed control devices.
- the disadvantage is that the data exchange between the central unit and distributed control devices arranged by physical transport of a data carrier, and thus very slow and cumbersome. This method is therefore only useful if all parts of the plant are geographically close to each other.
- the AT 410 489 B describes a system for logging onto a distributed data processing system with the aid of a biometric feature.
- the peculiarity here is that the data that serves as the key to access always remain separate from the data with which the user actually works. This is achieved by using a different central computer for the user identification than for the applications which are made accessible after recognition. This is very advantageous for data protection reasons when using the system hardware by several providers who have software running on it.
- the user ID is stored in a central data memory and, if necessary, is compared under automated, electronic exchange of information with a user ID currently recorded on a terminal. Nothing more is said about further details of this information exchange or the user administration.
- the EP 1 460 508 A1 describes the access control to a data processing system, which may also be distributed. Access is granted when an identification feature to be entered, which may also be a biometric feature, matches a feature stored on an on-board radio-to-mobile medium. This method is safer than an access control based solely on a key brought along. Furthermore, it is advantageous that for the decision whether to grant admission or not, no communication with a central server is required. The disadvantage is that a part similar to a key must be carried.
- the WO 2004/034335 A1 describes a multi-level access control system for a building.
- the system consists of a central computer and thus data channels connected to local, memory and computational test points at the individual inputs.
- To verify the identity of a person requesting access locally recorded data is sent to the central computer and compared there with centrally stored identification data. Depending on the match, a corresponding signal is sent to the respective test site.
- Identification data on the individual persons nor data on the frequency of access are stored at the individual inspection stations.
- the system needs an upright data connection to the server to check the access authorization of a person.
- the information required to verify the identity must also be transmitted via this data connection via a biometric feature, that is to say a relatively large amount of data become. That the system is intended only for local use cases and only for good use.
- the GB 2 331 825 A describes a person recognition system for access from outside to a database created in a central server.
- a fingerprint is used, which is stored in the central server and on a mitzuridden card.
- a currently on-site fingerprint is compared with the one stored on the card, then everything is sent to the server where it is compared again with stored data. If everything fits, the server sends a signal to the local terminal, which allows access to the central database.
- the system offers a high degree of security against manipulation by third parties on the data transmission network.
- data exchange with the central server is required, and in addition a considerable amount of data must be transmitted per identification process.
- the existence of a functional data connection between the local terminal and the central server is an essential prerequisite for this process.
- the WO 2001/091038 A1 describes a system and method for controlling the access of persons to secured buildings or similar areas.
- the system consists of a central server, individual, locally arranged access control units and a communication channel for the connection between server and access control units.
- master data which also biometric data such as fingerprint include recorded stored and as far as required for on-site verification, sent to the access control units, stored there again and further used in then independent of the server if necessary, access requests.
- all access control units are the same. A person can only have access to all access control units, or none at all. To each of these units, the record required to check the access authorization is sent by all the persons registered in the system.
- the storage space requirement for each individual access control unit increases proportionally with the number of persons detected in the overall system, even if only a few authorized persons actually need access to individual access control units.
- the object underlying the invention is how the WO 2001/091038 A1 a common control system for persons to authorize activities, such as passing through a gate, the commissioning of machinery or the switching on and off of alarm systems, in arbitrarily widely spaced and distributed buildings and rooms to propose, even then controlled authorization may be possible should, if there is temporarily no upright data connection between the individual control points and a central server.
- the system should be better for a larger total number of control posts and authorized persons expandable, it is to be found with a smaller data storage per control point Aus GmbH and it should be supplemented in an economically meaningful scope with other useful functions.
- a system in which a terminal is arranged at each control point, which comprises an identification device, a barrier actuator and a data recording device.
- These terminals are networked through a data processing system comprising a single central server and a plurality of terminal servers located thereunder.
- the central server stores the required information about all buildings and persons entitled to access - more simply called “employees". In the individual terminals required for the self-sufficient operation of the respective terminal subset of this information is also stored.
- the terminal servers hierarchically located between the terminals and the central server control the data transfer between the central server and each subset of the terminals.
- the invention provides that at the individual terminals, the data who, when and where the authorization has exercised, are recorded and sent to the central and server. If the data connection between a terminal and the server fails, the data accumulating at the terminal in the meantime is temporarily stored at the terminal until the data connection is up again and it is communicated to the server.
- central server 1 In the ever networked access control system only once required central server 1 is a central database set up with all required for the access system terminal and Miterbeiteramm flowers. Terminals and employees are clearly identifiable in the data processing system. For each employee it is determined at what times he can pass through which terminals, or for each terminal is determined when it can be crossed by which employee.
- the master data per employee at least a unique name and a unique identification information. This identification information may be, for example, compressed information obtained by an image processing algorithm from an image of an employee's fingerprint.
- the central server 1 is connected to a plurality of terminal servers 2.
- this connection can be formed via a LAN.
- a Local Area Network (LAN) in this sense is a networking method between nearby computers. At present, a technology that is often used specifically for this purpose is the so-called Ethernet standard.
- Ethernet At a greater distance - it can span across continents - the connection can be made via a VPN channel on the Internet.
- a VPN channel in this sense is a data transmission protocol by which an information flow over a public data network is handled in such a way that it appears to the partners involved as if they were only communicating with one another via an internally accessible data network. Such transmission methods are state of the art and need not be further described here.
- a terminal server 2 establishes the further data connections to LAN / RS485 converters 3 located geographically via a LAN. These converters 3 translate the data transfer between the format used in the LAN and the more robust, but not so fast, RS485 format, which is easier to wire. In this format, the data exchange with the individual terminals 4 is handled.
- a terminal 4 is mounted in the area of the control points, for example, to be controlled doors or gates of buildings or rooms. At least in the case of doors, it should consist of an indoor unit 4.1, through which the lock is actuated, and an outdoor unit, 4.2, to which the identifier of the passage desiring employee is taken and compared with stored features. Three relays can be switched via such a terminal and the associated actions, such as opening a door, can be carried out.
- the necessary equipment mounted and the necessary line connections are made in the central server 1, the individual devices, ie terminals 4, LAN / RS485 converter 3 and terminal server 2 registered. Then the master data of the individual employees are created and it is determined at which terminals at which times the individual employees are allowed to pass.
- These registration entries are made by an authorized system administrator who has access to the central server 1. Part of this registration work is also to create identification information of each employee. For example, this can be done by reading an image of a fingerprint of the employee, from this special features are filtered out and stored as a biometric key in the central server 1. It is possible to record several fingers as biometric keys by one employee. Each finger is assigned a relay.
- the creation of the data and the recording of the biometric key can also be done decentrally on a PC, which is equipped with appropriate software and recording device and has a corresponding network connection.
- the central server 1 sends to the terminals concerned 4 an information packet which consists of the name of this employee used in the data processing system, his biometric key and the information over the times, at which certain permissions are granted to him, such as passage.
- the affected terminals take this information as a work instruction and store it in the case of a gate on a local data storage attached in the outdoor unit 4.2.
- the information that the employee concerned has triggered an action at the relevant terminal 4 at the relevant time is communicated from the terminal 4 via the higher-level LAN / RS485 converter 3 and the further upstream terminal server 2 to the central server 1 and recorded there.
- terminal 4 and central server 1 If the data connection between terminal 4 and central server 1 does not work, which can not be ruled out at least temporarily, the function of the terminal relating to the employee does not change at all.
- the data required for checking and possibly granting rights of individual employees are located locally in terminal 4, and the required data processing also takes place locally in terminal 4.
- the only difference from the mode of operation of an existing data connection to the central server 1 is that the information that Employee x at time y at the terminal z by means of biometric key has actuated the relay a is not immediately communicated to the central server 1, but initially only in the terminal 4 is stored and only then communicated to the central server 1 when the data connection works again.
- the invention can also be meaningfully combined with checkpoints where a biometric feature is not included as an identification feature, but, for example, a password to be entered manually or a password, number, signal or even a mechanical key to be read out from a data store to be provided.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Lock And Its Accessories (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Die Erfindung betrifft ein System zur Kontrolle von Berechtigungen von Personen, zu autorisierende Tätigkeiten durchzuführen. Das System ist insbesondere zur Verwaltung einer großen Anzahl von Berechtigungen an örtlich beliebig voneinander entfernt angeordneten Gebäuden vorteilhaft anwendbar. Ein typischer Anwendungsfall ist die Verwaltung von Zutrittsberechtigungen. In einer vorteilhaften Ausführungsform werden biometrische Daten der im System registrierten Personen als Erkennungsmerkmale angewendet.The invention relates to a system for controlling authorizations of persons to carry out authoritative activities. In particular, the system is advantageously applicable to the administration of a large number of authorizations for buildings located remotely at any location. A typical application is the management of access authorizations. In an advantageous embodiment, biometric data of the persons registered in the system are used as recognition features.
Entsprechend der
Die
Die
Die
Die
Die
Die
Von diesem Stand der Technik ausgehend liegt die der Erfindung zu Grunde liegende Aufgabe darin, wie die
Für das bessere Verständnis sei hiermit die Bedeutung einzelner Begriffe im Sinne dieses Beschreibung geklärt:
- "Autorisierung" - ist die "kontrollierte Zuweisung von Zugriffsrechten". Dazu wird die Identität einer Person, welche Rechte begehrt überprüft, und es wird bei positivem Ergebnis eine Handlung gesetzt , durch welche diese Person die Rechte in Anspruch nehmen kann, beispielsweise wird eine Sperre geöffnet.
- "Kontrollstelle" - ist einer von mehreren Orten an denen Autorisierung stattfindet.
- "Terminal" - ist ein technisches Gerät, welches als Teil des Kontrollsystems an einer Kontrollstelle angeordnet ist.
- "Authorization" - is the "controlled allocation of access rights". For this purpose, the identity of a person who seeks rights is checked and, if the result is positive, an action is taken whereby that person can claim the rights, for example, a lock is opened.
- "Control Point" - is one of several places where authorization takes place.
- "Terminal" - is a technical device located at a control post as part of the control system.
Zur Lösung der Aufgabe wird eine Anlage verwendet, bei welcher an jeder Kontrollstelle ein Terminal angeordnet ist, welches eine Identifizierungseinrichtung, eine Sperrenbetätigungseinrichtung und eine Datenaufzeichnungseinrichtung umfasst. Diese Terminals sind über ein Datenverarbeitungssystem, welches einen einzelnen Zentralserver und mehrere darunter angeordnete Terminalserver umfasst, vernetzt. Im Zentralserver sind die erforderlichen Informationen über alle Gebäude und zutrittsberechtigten Personen - des Weiteren vereinfacht "Mitarbeiter" genannt - gespeichert. In den einzelnen Terminals ist die für den autarken Betrieb des jeweiligen Terminals erforderliche Teilmenge dieser Informationen ebenfalls gespeichert. Die hierarchisch zwischen den Terminals und dem Zentralserver liegenden Terminalserver steuern den Datentransfer zwischen dem Zentralserver und jeweils einer Teilmenge der Terminals. Erfindungsgemäß ist vorgesehen, dass an die einzelnen Terminals nur Informationen bezüglich jener Mitarbeiter gesandt werden und dort gespeichert werden, welche an den jeweiligen Kontrollstellen tatsächlich Berechtigungen haben. Weiters ist erfindungsgemäß vorgesehen, dass an den einzelnen Terminals die Daten wer, wann und wo die Berechtigung ausgeübt hat, erfasst und an den zentralen und Server gesandt werden. Sollte die Datenverbindung zwischen einem Terminal und dem Server ausfallen, werden die zwischenzeitlich am Terminal anfallenden derartigen Daten am Terminal zwischengespeichert bis die Datenverbindung wieder aufrecht ist und sie an den Server mitgeteilt werden.To achieve the object, a system is used in which a terminal is arranged at each control point, which comprises an identification device, a barrier actuator and a data recording device. These terminals are networked through a data processing system comprising a single central server and a plurality of terminal servers located thereunder. The central server stores the required information about all buildings and persons entitled to access - more simply called "employees". In the individual terminals required for the self-sufficient operation of the respective terminal subset of this information is also stored. The terminal servers hierarchically located between the terminals and the central server control the data transfer between the central server and each subset of the terminals. According to the invention, it is provided that only information concerning those employees are sent to the individual terminals and stored there, which actually have permissions at the respective control points. Furthermore, the invention provides that at the individual terminals, the data who, when and where the authorization has exercised, are recorded and sent to the central and server. If the data connection between a terminal and the server fails, the data accumulating at the terminal in the meantime is temporarily stored at the terminal until the data connection is up again and it is communicated to the server.
- Fig. 1:Fig. 1:
- zeigt ein Überblicksschaltbild für eines repräsentativen Ausschnittes eines erfindungsgemäßen Kontrollsystems.shows an overview diagram for a representative section of a control system according to the invention.
In dem je vernetzten Zutrittkontrollsystem nur einmal erforderlichen Zentralserver 1 ist eine zentrale Datenbank mit allen für das Zutrittsystem erforderlichen Terminal- und Miterbeiterstammdaten eingerichtet. Terminals und Mitarbeiter sind in dem Datenverarbeitungssystem eindeutig identifizierbar registriert. Zu jedem Mitarbeiter ist festgelegt, zu welchen Zeiten er welches Terminals durchschreiten kann, bzw. zu jedem Terminal ist festgelegt, wann es durch welchen Mitarbeiter durchschritten werden kann. Darüber hinaus umfassen die Stammdaten je Mitarbeiter zumindest einen eindeutigen Namen und eine eindeutige Identifizierungsinformation. Diese Identifizierungsinformation kann beispielsweise eine komprimierte Information sein, welche durch einen Bildverarbeitungsalgorithmus aus einem Bild eines Fingerabdrucks des Mitarbeiters gewonnen wird.In the ever networked access control system only once required
Der Zentralserver 1 ist mit mehreren Terminalservern 2 verbunden. Bei räumlicher Nähe kann diese Verbindung über ein LAN gebildet sein. Ein LAN (Lokal Area Network) in diesem Sinne ist eine Vernetzungsmethode zwischen zueinander in näherer Umgebung befindlichen Computern. Zurzeit ist eine dafür häufig konkret angewandte Technologie der sogenannte Ethernet-Standard. Bei größerer Entfernung - es kann über Kontinente reichen - kann die Verbindung über einen VPN-Kanal im Internet hergestellt werden. Ein VPN-Kanal in diesem Sinne ist ein Datenübertragungsprotokoll, durch welches ein Informationsfluss über ein an sich öffentliches Datennetz so abgewickelt wird, dass es für die beteiligten Partner so erscheint, als würden sie nur über ein intern zugänglichen Datennetz miteinander kommunizieren. Derartige Übertragungsmethoden sind Stand der Technik und brauchen hier nicht weiter beschrieben zu werden.The
Ein Terminalserver 2 stellt über ein LAN die Weitere Datenverbindungen zu geografisch in der Nähe befindliche LAN/RS485-Konvertern 3 her. An diesen Konvertern 3 erfolgt eine Übersetzung der Datenübertragung zwischen dem im LAN angewandten Format und dem einfacher zu verkabelnden, sehr robusten, aber nicht so schnellen Format RS485. In diesem Format wird der Datenaustausch mit den einzelnen Terminals 4 abgewickelt.A
Ein Terminal 4 ist im Bereich der Kontrollstellen, beispielsweise von zu kontrollierenden Türen bzw. Tore von Gebäuden oder Räumen angebracht. Zumindest im Fall von Türen bzw. Toren sollte es aus einer Inneneinheit 4.1, durch welche die Sperre betätigt wird und einer Außeneinheit 4.2, an welcher das ldentifizierungsmerkmal der Durchgang begehrenden Mitarbeiter aufgenommen und mit gespeicherten Merkmalen verglichen wird bestehen. Über solch ein Terminal können drei Relais geschaltet und die damit verbundenen Aktionen wie zum Beispiel das Öffnen einer Tür durchgeführt werden.A
Nachdem bei der Instandsetzung eines derartigen Kontrollsystems die erforderlichen Geräte montiert und die erforderlichen Leitungsverbindungen hergestellt sind, werden im Zentralserver 1 die einzelnen Geräte, also Terminals 4, LAN/RS485-Konverter 3 und Terminalserver 2 registriert. Dann werden die Stammdaten der einzelnen Mitarbeiter angelegt und es wird festgelegt, an welchen Terminals zu welchen Zeiten die einzelnen Mitarbeiter passieren dürfen. Diese Registrierungseingaben werden durch einen berechtigten Systemadministrator, welcher auf den Zentralserver 1 Zugriff hat, durchgeführt. Teil dieser Registrierungsarbeiten ist es auch, Identifizierungsinformationen der einzelnen Mitarbeiter anzulegen. Beispielsweise kann dies geschehen, indem ein Bild eines Fingerabdrucks der Mitarbeiter eingelesen wird, daraus werden spezielle Merkmale herausgefiltert und als biometrischer Schlüssel im Zentralserver 1 abgespeichert. Dabei ist es möglich von einem Mitarbeiter mehrere Finger als biometrische Schlüssel aufzunehmen. Jedem Finger wird ein Relais zugeordnet. Auf diese Weise können durch eine Person wählbar mehrere verschiedene Aktionen über ein Terminal ausgelöst werden. Das Anlegen der Daten und die Aufnahme des biometrischen Schlüssels können auch dezentral an einem PC, der mit entsprechender Software und Aufnahmegerät ausgestattet ist und über eine entsprechende Netzanbindung verfügt, erfolgen.After in the repair of such a control system, the necessary equipment mounted and the necessary line connections are made in the
Sobald ein Mitarbeiter "angelegt" ist, sendet der Zentralserver 1 an die betroffenen Terminals 4 ein Informationspaket, welches aus dem im Datenverarbeitungssystem verwendeten Namen dieser Mitarbeiters, seinem biometrischen Schlüssel und der Information über die Zeiten, an denen ihm bestimmte Berechtigungen - wie zum Beispiel Durchlass - gewährt werden, besteht. Die betroffenen Terminals übernehmen diese Informationen als Arbeitsanweisung und speichern sie im Fall eines Tores auf einem jeweils in der Außeneinheit 4.2 angebrachten lokalen Datenspeicher.As soon as an employee is "created", the
Wenn ein Mitarbeiter an einem Terminal 4 Durchlass begehrt, gibt er an einer an der Außeneinheit 4.2 angebrachten, als dunkler, rechteckförmiger Streifen erkennbaren Scanvorrichtung ein Bild seines Fingers ein, indem er mit dem Finger langsam über diesen Streifen streicht. Die Außeneinheit verarbeitet dieses Bild in einer in ihr angebrachten lokalen Datenverarbeitungseinheit derart weiter, dass daraus spezielle Merkmale herausgefiltert werden, welche mit den gespeicherten biometrischen Schlüsseln, welche vom Zentralserver 1 früher mitgeteilt wurden, vergleichbar sind. In der lokalen Datenverarbeitungseinheit der Außeneinheit 4.2 werden die neu herausgefilterten Merkmale mit den gespeicherten Merkmalen von zum Durchgang berechtigten Mitarbeitern verglichen. Falls eine Übereinstimmung festgestellt wird, gilt der Mitarbeiter als erkannt und es wird Durchgang gewährt, indem ein entsprechendes Signal an die zugehörige Inneneinheit 4.1 gesandt wird, welche durch Schalten des entsprechenden Relais die gewünschte Aktion, in diesem Fall das Öffnen der Sperre, veranlasst. Durch die Aufteilung des Terminals 4 in eine Inneneinheit 4.1 und eine Außeneinheit 4.2 kann besser an die durch die Inneneinheit auszulösenden individuell sehr verschiedenen Sperren angepasst werden, als mit einer komplexeren Gesamteinheit.When an employee at a
Die Information dass der betreffende Mitarbeiter zu dem betreffenden Zeitpunkt am betreffenden Terminal 4 eine Aktion ausgelöst hat, wird vom Terminal 4 über den übergeordneten LAN/RS485-Konverter 3 und den weiter übergeordneten Terminalserver 2 an den Zentralserver 1 mitgeteilt und dort aufgezeichnet.The information that the employee concerned has triggered an action at the
Falls die Datenverbindung zwischen Terminal 4 und Zentralserver 1 nicht funktioniert, was zumindest temporär sicher nicht ausgeschlossen werden kann, ändert sich die den Mitarbeiter betreffende Funktion des Terminals überhaupt nicht. Die für das Prüfen und ggf. Gewähren von Rechten einzelner Mitarbeiter erforderlichen Daten befinden sich lokal im Terminal 4, und die erforderliche Datenverarbeitung erfolgt auch lokal im Terminal 4. Der einzige Unterschied zur Arbeitsweise bei bestehender Datenverbindung zum Zentralserver 1 besteht darin, dass die Information dass Mitarbeiter x zum Zeitpunkt y am Terminal z mittels biometrischen Schlüssels das Relais a betätigt hat, nicht sofort an den Zentralserver 1 mitgeteilt wird, sondern vorerst nur im Terminal 4 gespeichert wird und erst dann an den Zentralserver 1 mitgeteilt wird, wenn die Datenverbindung wieder funktioniert.If the data connection between
Wenn am Zentralserver 1 Daten, welche einzelne Terminals betreffen, geändert werden, während die Datenverbindung zu diesen Terminals unterbrochen ist, so arbeiten diese Terminals so lange entsprechend dem vorherigen Datenstand bis die Datenverbindung wieder hergestellt ist. Dann werden sie aktualisiert.If data relating to individual terminals at the
Durch die Arbeitsweise mit doppelt angelegten Daten, - einerseits am Zentralserver 1, andererseits an den betroffenen Terminals 4, - wird einerseits extrem gute Verwaltbarkeit der Daten, da über den Zentralserver 1 alle Daten editierbar sind, andererseits extreme Robustheit der Funktion erreicht, da die Terminals 4 auch dann ordnungsgemäß arbeiten, wenn die Datenübertragung - deren ununterbrochenes Funktionieren nicht gewährleistet werden kann - unterbrochen ist.On the one hand on the
Vor allem um nicht jene Personen, welche nur in Einzelfällen spezifische Rechte an einem Terminal brauchen, in der Gesamtanlage registrieren zu müssen, aber auch aus Sicherheitsgründen ist es sinnvoll, an den einzelnen Gebäudestandorten direkte Zugriffsmöglichkeiten für berechtigte Mitarbeiter auf die dort vorhandenen Terminals vorzusehen. So können mittels Relaisschaltung zum Beispiel Tore kurzzeitig bei Ankommen einer Lieferung ohne vorhergehenden Identifizierungsvorgang geöffnet werden. Oder es kann kurzfristig der Zugang für einzelne Mitarbeiter auch dann gesperrt werden, wenn die Datenübertragung zum Zentralserver ausgefallen ist. Diese Zugriffsmöglichkeit ist am besten über PC-Arbeitsplätze, herstellbar, welche mit jenen Terminalservern 2 über LAN verbunden sind, welche auch die Verbindung zu den betroffenen Terminals 4 herstellen.Above all in order not to have to register those persons, which only in individual cases need specific rights at a terminal, in the entire plant, but also for security reasons, it makes sense to provide direct access possibilities for authorized employees to the terminals existing there at the individual building locations. Thus, for example, gates can be opened for a short time on arrival of a delivery without prior identification process by means of relay switching. Or the access for individual employees can be blocked at short notice even if the data transfer to the central server has failed. This accessibility is best via PC workstations, produced, which are connected to those
Natürlich ist es sinnvoll, die im Zentralserver 1 erforderliche Datenbank über Mitarbeiter und Gebäude so auszulegen, dass im Bedarfsfall auch weitere dazupassende nützliche Informationen über Mitarbeiter bzw. Gebäude abgespeichert werden können bzw. dass ein Datenaustausch mit diesbezüglichen Datenbanken möglich ist.Of course, it makes sense to design the database of employees and buildings required in the
Die Erfindung ist auch mit Kontrollstellen sinnvoll kombinierbar an denen als Identifizierungsmerkmal nicht ein biometrisches Merkmal aufgenommen wird, sondern beispielsweise ein manuell einzugebendes Passwort oder ein aus einem mitzubringenden Datenspeicher auszulesendes Passwort, Nummer, Signal oder überhaupt ein mechanischer Schlüssel.The invention can also be meaningfully combined with checkpoints where a biometric feature is not included as an identification feature, but, for example, a password to be entered manually or a password, number, signal or even a mechanical key to be read out from a data store to be provided.
Das Kontrollsystem wurde hier vor allem an Hand des wichtigen Anwendungsfalles "Gewähren bzw. Verweigern von Zutritt und Aufzeichnen der Zutrittsdaten" beschrieben. Die Anwendungsbereiche können aber auch viele andere autorisierende Tätigkeiten wie zum Beispiel die Inbetriebnahme von Maschinen etc. betreffen. In diesem Sinne ist der in der Beschreibung und im folgenden Anspruch verwendete Begriff "Sperrenbetätigungsvorrichtung" etwas allgemeiner als jene Vorrichtung zu sehen, durch welche eine Tür entriegelt wird.The control system was described above all with reference to the important application case "Granting or denying access and recording the access data". However, the areas of application may also relate to many other authoritative activities such as the commissioning of machines, etc. In this sense, the term "lock actuator" as used in the specification and the following claims is somewhat more general than the device by which a door is unlocked.
Claims (3)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AT0021806A AT503783B1 (en) | 2006-02-13 | 2006-02-13 | SYSTEM FOR CONTROLLING PERSONS 'AUTHORIZATION TO DO AUTHORIZED ACTIVITIES |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1821262A2 true EP1821262A2 (en) | 2007-08-22 |
EP1821262A3 EP1821262A3 (en) | 2008-05-21 |
Family
ID=38002009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07002999A Withdrawn EP1821262A3 (en) | 2006-02-13 | 2007-02-13 | System for checking the authorisation of persons to carry out activities requiring authorisation |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1821262A3 (en) |
AT (1) | AT503783B1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009059595A1 (en) * | 2007-11-08 | 2009-05-14 | Byometric Systems Ag | Method and control unit for identifying authorized persons |
WO2011161589A1 (en) * | 2010-06-21 | 2011-12-29 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for handling personal identification information |
WO2013155237A1 (en) * | 2012-04-11 | 2013-10-17 | Utc Fire & Security Corporation | Authentication mode reporting |
EP3486877A1 (en) * | 2017-11-21 | 2019-05-22 | Pascom Kommunikationssysteme GmbH | Authorization system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1984002786A1 (en) * | 1983-01-10 | 1984-07-19 | Figgie Int Inc | Improved card reader for security system |
EP0990756A2 (en) * | 1998-09-28 | 2000-04-05 | Anatoli Stobbe | Access control system |
US6972660B1 (en) * | 2002-05-15 | 2005-12-06 | Lifecardid, Inc. | System and method for using biometric data for providing identification, security, access and access records |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2950307B2 (en) * | 1997-11-28 | 1999-09-20 | 日本電気株式会社 | Personal authentication device and personal authentication method |
US6496595B1 (en) * | 2000-05-19 | 2002-12-17 | Nextgenid, Ltd. | Distributed biometric access control apparatus and method |
DE10246664A1 (en) * | 2002-10-07 | 2004-04-15 | Dorma Gmbh + Co. Kg | Access control unit has a modular design with exchangeable plug-in units that can be assembled to form an essentially autonomous unit that can also be connected to a bus system if necessary |
-
2006
- 2006-02-13 AT AT0021806A patent/AT503783B1/en not_active IP Right Cessation
-
2007
- 2007-02-13 EP EP07002999A patent/EP1821262A3/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1984002786A1 (en) * | 1983-01-10 | 1984-07-19 | Figgie Int Inc | Improved card reader for security system |
EP0990756A2 (en) * | 1998-09-28 | 2000-04-05 | Anatoli Stobbe | Access control system |
US6972660B1 (en) * | 2002-05-15 | 2005-12-06 | Lifecardid, Inc. | System and method for using biometric data for providing identification, security, access and access records |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009059595A1 (en) * | 2007-11-08 | 2009-05-14 | Byometric Systems Ag | Method and control unit for identifying authorized persons |
WO2011161589A1 (en) * | 2010-06-21 | 2011-12-29 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for handling personal identification information |
US8458779B2 (en) | 2010-06-21 | 2013-06-04 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for handling personal identification information |
WO2013155237A1 (en) * | 2012-04-11 | 2013-10-17 | Utc Fire & Security Corporation | Authentication mode reporting |
CN104380351A (en) * | 2012-04-11 | 2015-02-25 | Utc消防及保安公司 | Authentication mode reporting |
EP3486877A1 (en) * | 2017-11-21 | 2019-05-22 | Pascom Kommunikationssysteme GmbH | Authorization system |
Also Published As
Publication number | Publication date |
---|---|
EP1821262A3 (en) | 2008-05-21 |
AT503783B1 (en) | 2009-02-15 |
AT503783A1 (en) | 2007-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2691940B1 (en) | Management of access rights to operating and/or control data from buildings or building complexes | |
EP3103057B1 (en) | Method for accessing a physically secured rack and computer network infrastructure | |
EP2595341B1 (en) | User rights management and access control system with time limitation | |
EP3582033B1 (en) | Method for securely operating a field device | |
DE102020133597A1 (en) | PERSONNEL PROFILES AND FINGERPRINT AUTHENTICATION FOR CONFIGURATION ENGINEERING AND RUNTIME APPLICATIONS | |
EP3729385B1 (en) | Access control system with wireless authentication and password entry | |
EP3471068A1 (en) | Distributed system for managing personal information, method and computer program product | |
CN108122313A (en) | A kind of double member's certification access control systems based on iris recognition | |
WO2014125028A1 (en) | Arrangement for the authorised access of at least one structural element located in a building | |
EP1321901B1 (en) | Method for controlling access rights to an object | |
AT503783B1 (en) | SYSTEM FOR CONTROLLING PERSONS 'AUTHORIZATION TO DO AUTHORIZED ACTIVITIES | |
EP3596709A1 (en) | Method for access control | |
AT516288B1 (en) | Method and device for managing access authorizations | |
DE102010010760A1 (en) | A method of assigning a key to a subscriber device to be newly added to a wireless sensor-actuator network | |
EP2639729A2 (en) | Automatic access control system for controlling access to a physical object or access to a physical object and method | |
EP3314844B1 (en) | Data processing device and method for operating same | |
WO2003023722A2 (en) | Method for verifying access authorization | |
DE102005030204A1 (en) | Authorization system for permitting authorization to switching on and off e.g. heating system, has identification unit standing in connection with control unit, which has control module to set authorization parameters, through local bus | |
EP1828993A1 (en) | Access control system with a number of closing devices | |
DE102017123671B4 (en) | System and procedure for managing personal data | |
DE102006048186A1 (en) | Person's access authorization administrating method for accommodating person in building, involves storing transmitted portion of identification information e.g. biometric data such as characteristics of retina, in database | |
AT502458B1 (en) | ACCESS CONTROL SYSTEM | |
EP1768048A2 (en) | System for identification and allocation of usage rights in a data processing device | |
AT410489B (en) | ARRANGEMENT FOR CHECKING THE USER AUTHORIZATION FOR DEVICES SECURED BY USER IDS | |
EP3968188A1 (en) | Method for reliably switching a system on or off |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR MK YU |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR MK RS |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G07C 1/10 20060101ALI20080417BHEP Ipc: G07C 9/00 20060101AFI20070515BHEP |
|
AKX | Designation fees paid | ||
REG | Reference to a national code |
Ref country code: DE Ref legal event code: 8566 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20081122 |