WO2004039119A1 - Access control system - Google Patents

Access control system Download PDF

Info

Publication number
WO2004039119A1
WO2004039119A1 PCT/NZ2003/000211 NZ0300211W WO2004039119A1 WO 2004039119 A1 WO2004039119 A1 WO 2004039119A1 NZ 0300211 W NZ0300211 W NZ 0300211W WO 2004039119 A1 WO2004039119 A1 WO 2004039119A1
Authority
WO
WIPO (PCT)
Prior art keywords
protocol
code
access
function
control
Prior art date
Application number
PCT/NZ2003/000211
Other languages
French (fr)
Inventor
Grant Craydon O'malley
Original Assignee
Anzon Autodoor Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anzon Autodoor Limited filed Critical Anzon Autodoor Limited
Priority to AU2003267878A priority Critical patent/AU2003267878A1/en
Publication of WO2004039119A1 publication Critical patent/WO2004039119A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/10Code generation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00238Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
    • G07C2009/00253Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed dynamically, e.g. variable code - rolling code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C2009/00928Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for garage doors

Definitions

  • the present invention relates to coded entry or access and more particularly access control, security or entry of data logging that involves the validation of a data string.
  • a wireless transmission e.g. radio, infrared, microwave, etc.
  • a receiver which either validates or does not validate the instruction and consequently respectively actuates or does not actuate.
  • the present invention recognises an advantage in having for coded entry and/or access purposes means of wirelessly transmitting a coded transmission (e.g. data string) that will vary each time it is used but not to the confusion of its dedicated receiver and only after such verification proceeding through (by any relay means, wired or wireless) to and/or enabling an ancillary data encryption fo ⁇ nat which has the capability of allowing or causing an action being instructed by and/or substantially together with the original transmission.
  • a coded transmission e.g. data string
  • the present invention consists in an access control system having a capability to validate a coded data string wireless transmission using a code hopping or rolling code algorithm and, if the transmission is validated, causing and/or allowing a function to occur responsive to receipt of another code string.
  • the present invention consists in an access control system that has, in sequence two code recognitions systems, the first to recognise a wireless transmission of a data string and the second to be responsive to a related and/or unrelated data string only upon a validated receipt of the first mentioned data string, wherein the first code recognition system is of a rolling or code hopping type so as to render wireless recording thereof by an authorised person unhelpful without access to the rolling or hoping algorithm.
  • the function control data string is shorter than that initially wirelessly transmitted.
  • the invention consists in an access control system having access function(s) controlled by a coded protocol ("function control protocol”) system, and having a coded protocol reliant on wireless transmission and receipt thereof ("the verification protocol") which code hops or rolls reliant on a relating algorithm, wherein verification by the verification protocol is a prerequisite for access function(s) under the control of the function control protocol being allowed.
  • the function control protocol involves fewer coded bits than the verification protocol.
  • Preferably several transmitters can be verified to enable at least some control of the function control protocol.
  • the function(s) include door opening/closing.
  • verification protocol can be the or a Wiegand protocol.
  • function control protocol can be the or a KEELOQTM protocol.
  • the present invention consists in apparatus of a system in accordance with the present invention.
  • the present invention relates to methods of operating an access control which is reliant upon a system in accordance with the present invention.
  • the present invention consists in the use of apparatus to transmit verification data and/or instruction data as part of the system of the present invention or as part of the method of the present invention.
  • the present invention consists in a door or other access opening responsive to control of the kind contemplated by the present invention.
  • the term "and/or” means “and” or “or”, or both where the circumstances allow.
  • nouns As used herein the term "(s)" following a noun means both or either the plural and singular forms of that noun. As used herein the term “/" between nouns (e.g. as used hereinafter as
  • opening/closing means both the opening and closing functions or either.
  • Wiegand protocol refers to a standard data output format that is an industry standard digital protocol for accessing and transferring data between devices (see published standard of The Security Industry Association of the USA).
  • KEELOQTM refers to a code hopping technology developed specifically for secure remote keyless entry and authentication based on the principle is that the code changes (hops) each time it is transmitted.
  • KEELOQTM is based on a proprietary, non-linear encryption algorithm that creates a unique transmission on every use, rendering code capture and resend schemes useless.
  • the algorithm uses a programmable 64-bit encryption key unique to each device to generate 32-bit hopping code.
  • Figure 1 shows a diagram where a data string wirelessly transmitted is detected and verified or not and it is only upon verification that that data string continues into a different coded protocol to effect functions
  • Figure 2 shows an alternative where simultaneous or substantially simultaneous transmissions ensure verification prior to allowing a separately transmitted data string to activate the different protocol
  • Figure 3 shows a further alternative embodiment whereby a wireless rolling code signal is sent to a receiver which upon positive validation outputs a converted code of a differing rolling code format the signal whether being transmitted in a wired or wireless format then allows access or activates the system, and
  • Figure 4 is a diagram for use in our explanation of some functions and logic features of a preferred implementation of the present invention.
  • Systems in accordance with the present invention preferably link systems such as that marketed under the trade marks Wiegand and KEELOQTM so as to provide for the access control system the synergism of initiation to less secure input data strings only upon recognition of a more secure data string protocol.
  • Such a system will enable more transmitters to be made available without any substantial undermining of security.
  • related functions to initiation can be compounded in the scenario of Figure 1 where, for example the code string of the verification protocol may be say of 34 bits whilst that of the function control protocol may be less than half that.
  • the system converts data transmitted wirelessly, for example from a radio transmitter, keypad, or similar 1, in an encrypted code utilising a rolling or code hopping algorithm (such as KEELOQTM).
  • the data is received and validated by a receiver 2 using the appropriate decryption algorithm and then a signal relayed by any means, wired or wireless, in another data encryption format (such as Wiegand) to another access control, security, entry or data logging system 6 for validation and recording by that system such validation may allow activation of a latch or similar means to then allow access by the user or person who originally transmitted the signal.
  • the system also allows for the receiver to learn and store a number of remote transmitted devices 1. In this way multiple users can gain access with their own code to the system.
  • the system key 1 sends out a 34 bit rolling code signal, such as that generated by the KEELOQTM security protocol, this is then received by a receiver 2 which then validates this signal. If the signal is not validated no code is returned 4. If the validation is positive then an output is generated. In the situation where there is a further receiver 5 such as in Figure 1 this receives the code output from 3 as a 34 bit rolling code signal (whether wired or wireless signal). The second receiver 5 then converts the information from the 34 bit rolling code signal and outputs this as a 24 bit rolling code signal (such as that generated by the Wiegand protocol) which then gives the user access or activates the system.
  • a 34 bit rolling code signal such as that generated by the KEELOQTM security protocol
  • this return 34 bit rolling code signal is received and then converted to a 24 bit rolling code signal by 5 which is transmitted to then activate the system or allow access to the system.
  • a further embodiment allows, upon a positive validation from the receiver 2 generation directly of a 24 bit rolling code system by a conventer 7 which is transmitted either by wired or wireless means to allow further access 6.
  • a high security protocol such as that provided by a 32 bit rolling code system will allow the user upon positive validation of the user, access to or activation of a further system, the activation of or access to that system occurring via a lower security protocol such as a 24 bit rolling code signal.
  • This two layer security system providing a more secure system.
  • the manual control button ideally requires to be continuously depressed to move the door. Successive presses result in reversal of door travel direction. This ensures that the door can not accidentally be moved beyond the correct physical end- points of travel.
  • controller inputs, outputs, and parameters are relevant:
  • controller can infer the position, speed and direction of the door's travel.
  • the controller can infer the position, speed and direction of the door's travel.
  • the motor's torque-speed, and torque-current characteristics the load placed on the motor can be inferred for any position of the door's travel.
  • the controller If the controller has been reset, it can not determine whether its stored relative position is correct so it must recalibrate to the reference position. In order to decide which direction to travel first it checks the state of the reference switch and then moves towards the reference point. Once the reference switch has changed state, normal operation resumes. The user will be unaware of this unless they stop the door and try to move the door in the opposite direction before the reference switch changes state. In this circumstance the user will be required to continuously depress the manual control button. On every uninterrupted operation from a limit position the counter will be set to zero at the reference switch. The counter values for the open and closed limits will be referenced to the newly calibrated reference position. See Figure 8.
  • the motor speed and/or current is stored with door position during setup. If during normal operation within a short distance of the bottom limit the speed and/or current does not match the stored values within some percentage then the physical limit position is judged to have been altered. The new limit position replaces the old limit position counter value.

Abstract

An access control system having a capability to validate a coded data string wireless transmission using a code hopping or rolling code algorithm and, if the transmission is validated, causing and/or allowing a function to occur responsive to receipt of another code string.

Description

ACCESS CONTROL SYSTEM Technical Field
The present invention relates to coded entry or access and more particularly access control, security or entry of data logging that involves the validation of a data string.
Background Art
There are many instances where coded entry or access is required. Examples include door and gate systems but such examples are not exhaustive. For example, with doors or garages it is common to utilise a wireless transmission (e.g. radio, infrared, microwave, etc.) to be detected by a receiver which either validates or does not validate the instruction and consequently respectively actuates or does not actuate.
The present invention recognises an advantage in having for coded entry and/or access purposes means of wirelessly transmitting a coded transmission (e.g. data string) that will vary each time it is used but not to the confusion of its dedicated receiver and only after such verification proceeding through (by any relay means, wired or wireless) to and/or enabling an ancillary data encryption foπnat which has the capability of allowing or causing an action being instructed by and/or substantially together with the original transmission.
It is therefore to such systems that the present invention is directed, on at least to provide the public with a useful choice.
Disclosure of Invention Accordingly in a first aspect the present invention consists in an access control system having a capability to validate a coded data string wireless transmission using a code hopping or rolling code algorithm and, if the transmission is validated, causing and/or allowing a function to occur responsive to receipt of another code string.
In a further aspect the present invention consists in an access control system that has, in sequence two code recognitions systems, the first to recognise a wireless transmission of a data string and the second to be responsive to a related and/or unrelated data string only upon a validated receipt of the first mentioned data string, wherein the first code recognition system is of a rolling or code hopping type so as to render wireless recording thereof by an authorised person unhelpful without access to the rolling or hoping algorithm.
Preferably the function control data string is shorter than that initially wirelessly transmitted.
In another aspect the invention consists in an access control system having access function(s) controlled by a coded protocol ("function control protocol") system, and having a coded protocol reliant on wireless transmission and receipt thereof ("the verification protocol") which code hops or rolls reliant on a relating algorithm, wherein verification by the verification protocol is a prerequisite for access function(s) under the control of the function control protocol being allowed. Preferably the function control protocol involves fewer coded bits than the verification protocol.
Preferably several transmitters can be verified to enable at least some control of the function control protocol.
Preferably the function(s) include door opening/closing. Optionally verification protocol can be the or a Wiegand protocol.
Optionally function control protocol can be the or a KEELOQ™ protocol.
The present invention consists in apparatus of a system in accordance with the present invention.
The present invention relates to methods of operating an access control which is reliant upon a system in accordance with the present invention.
In still a further aspect the present invention consists in the use of apparatus to transmit verification data and/or instruction data as part of the system of the present invention or as part of the method of the present invention.
In still a further aspect the present invention consists in a door or other access opening responsive to control of the kind contemplated by the present invention. As used herein the term "and/or" means "and" or "or", or both where the circumstances allow.
As used herein the term "(s)" following a noun means both or either the plural and singular forms of that noun. As used herein the term "/" between nouns (e.g. as used hereinafter as
"opening/closing" means both the opening and closing functions or either.
Reference herein to the Wiegand protocol refers to a standard data output format that is an industry standard digital protocol for accessing and transferring data between devices (see published standard of The Security Industry Association of the USA).
Reference herein to a KEELOQ™ protocol refers to a code hopping technology developed specifically for secure remote keyless entry and authentication based on the principle is that the code changes (hops) each time it is transmitted. KEELOQ™ is based on a proprietary, non-linear encryption algorithm that creates a unique transmission on every use, rendering code capture and resend schemes useless. The algorithm uses a programmable 64-bit encryption key unique to each device to generate 32-bit hopping code.
Reference to a protocol that is "or the like" by reference to the Wiegand protocol or the KEELOQ™ protocol means that protocol embodied in Microchip KEELOQ™ products of Microchip technology Incorporated. Reference is made to their website < http://www.microcMp.com/1010/index.htm>.
For the purpose of the use of systems of the present invention in garage door openings reference is drawn to the website of www.merlingo.com/ as demonstrating apparatus and forms appropriate for such control.
Brief Description of Drawings
A preferred form of the present invention will now be described by reference to the two flow diagrams of which
Figure 1 shows a diagram where a data string wirelessly transmitted is detected and verified or not and it is only upon verification that that data string continues into a different coded protocol to effect functions, Figure 2 shows an alternative where simultaneous or substantially simultaneous transmissions ensure verification prior to allowing a separately transmitted data string to activate the different protocol,
Figure 3 shows a further alternative embodiment whereby a wireless rolling code signal is sent to a receiver which upon positive validation outputs a converted code of a differing rolling code format the signal whether being transmitted in a wired or wireless format then allows access or activates the system, and
Figure 4 is a diagram for use in our explanation of some functions and logic features of a preferred implementation of the present invention.
Best Mode for Carrying Out the Invention
Systems in accordance with the present invention preferably link systems such as that marketed under the trade marks Wiegand and KEELOQ™ so as to provide for the access control system the synergism of initiation to less secure input data strings only upon recognition of a more secure data string protocol. Such a system will enable more transmitters to be made available without any substantial undermining of security. In, for example, a garage door opening scenario or a gate opening scenario, related functions to initiation can be compounded in the scenario of Figure 1 where, for example the code string of the verification protocol may be say of 34 bits whilst that of the function control protocol may be less than half that.
With reference to Figures 1 through 3 is shown varying embodiments of an access control system. The system converts data transmitted wirelessly, for example from a radio transmitter, keypad, or similar 1, in an encrypted code utilising a rolling or code hopping algorithm (such as KEELOQ™). The data is received and validated by a receiver 2 using the appropriate decryption algorithm and then a signal relayed by any means, wired or wireless, in another data encryption format (such as Wiegand) to another access control, security, entry or data logging system 6 for validation and recording by that system such validation may allow activation of a latch or similar means to then allow access by the user or person who originally transmitted the signal. The system also allows for the receiver to learn and store a number of remote transmitted devices 1. In this way multiple users can gain access with their own code to the system.
The system key 1 sends out a 34 bit rolling code signal, such as that generated by the KEELOQ™ security protocol, this is then received by a receiver 2 which then validates this signal. If the signal is not validated no code is returned 4. If the validation is positive then an output is generated. In the situation where there is a further receiver 5 such as in Figure 1 this receives the code output from 3 as a 34 bit rolling code signal (whether wired or wireless signal). The second receiver 5 then converts the information from the 34 bit rolling code signal and outputs this as a 24 bit rolling code signal (such as that generated by the Wiegand protocol) which then gives the user access or activates the system.
In a situation where the return code is sent to the original system key 1 then this return 34 bit rolling code signal is received and then converted to a 24 bit rolling code signal by 5 which is transmitted to then activate the system or allow access to the system.
A further embodiment allows, upon a positive validation from the receiver 2 generation directly of a 24 bit rolling code system by a conventer 7 which is transmitted either by wired or wireless means to allow further access 6.
In this way a high security protocol such as that provided by a 32 bit rolling code system will allow the user upon positive validation of the user, access to or activation of a further system, the activation of or access to that system occurring via a lower security protocol such as a 24 bit rolling code signal. This two layer security system providing a more secure system.
A description of the function and some underlying logic of the door controller limit system in one preferred or optional embodiment will now be described. It may use hardware as disclosed in our New Zealand Patent Specifications 522578 or 522300 filed 12 November 2002 and 25 October 2002 respectively, or indeed any mounting, assembly, subassembly and system we have disclosed by way of publication or use in respect of our MERLIN™ brand door systems.
Operation before setup The manual control button ideally requires to be continuously depressed to move the door. Successive presses result in reversal of door travel direction. This ensures that the door can not accidentally be moved beyond the correct physical end- points of travel.
Set up
To define the limit positions the following process should be performed:
- move the door to the desired open or closed limit position
- store that position in memory - move the door to the other desired limit position
- store that position in memory Operation after setup
A brief press of the manual control button will move the door from one limit to the other. Pressing the manual control button while the door is moving stops the door. Controller overview
The following controller inputs, outputs, and parameters are relevant:
- the state of the reference switch: either 0 or 1
- the state of the motor control relays: opening, closing, or stopped
- the state changes of the position sensor: 0 or 1 for every k mm of door position (where k is a constant dependent on gearing, and type of sensor)
- time
- motor current
From these the controller can infer the position, speed and direction of the door's travel. With knowledge of the motor's torque-speed, and torque-current, characteristics the load placed on the motor can be inferred for any position of the door's travel.
If the controller has been reset, it can not determine whether its stored relative position is correct so it must recalibrate to the reference position. In order to decide which direction to travel first it checks the state of the reference switch and then moves towards the reference point. Once the reference switch has changed state, normal operation resumes. The user will be unaware of this unless they stop the door and try to move the door in the opposite direction before the reference switch changes state. In this circumstance the user will be required to continuously depress the manual control button. On every uninterrupted operation from a limit position the counter will be set to zero at the reference switch. The counter values for the open and closed limits will be referenced to the newly calibrated reference position. See Figure 8.
Adaptive travel adjustment
The motor speed and/or current is stored with door position during setup. If during normal operation within a short distance of the bottom limit the speed and/or current does not match the stored values within some percentage then the physical limit position is judged to have been altered. The new limit position replaces the old limit position counter value.

Claims

CLAIMS:
1. An access control system having a capability to validate a coded data string wireless transmission using a code hopping or rolling code algorithm and, if the transmission is validated, causing and/or allowing a function to occur responsive to receipt of another code string.
2. A system of claim 1 wherein the function control data string is shorter than that initially wirelessly transmitted.
3. An access control system that has, in sequence two code recognitions systems, the first to recognise a wireless transmission of a data string and the second to be responsive to a related and/or unrelated data string only upon a validated receipt of the first mentioned data string, wherein the first code recognition system is of a rolling or code hopping type so as to render wireless recording thereof by an authorised person unhelpful without access to the rolling or hoping algorithm.
4. An access control system having access function(s) controlled by a coded protocol ("function control protocol") system, and having a coded protocol reliant on wireless transmission and receipt thereof ("the verification protocol") which code hops or rolls reliant on a relating algorithm, wherein verification by the verification protocol is a prerequisite for access function(s) under the control of the function control protocol being allowed.
5. A system of claim 4 wherein the function control protocol involves fewer coded bits than the verification protocol.
6. A system of claim 4 or 5 wherein several transmitters can be verified to enable at least some control of the function control protocol.
7. A system of any one of claims 4 to 6 wherein the function(s) include door opening/closing.
8. A system of any one of claims 4 to 7 wherein verification protocol can be the or a Wiegand or like protocol.
9. A system of any one of claims 4 to 8 wherein the function control protocol is a KEELOQ™ or like protocol.
10. Apparatus incorporating a system in accordance with any one of the preceding claims.
11. Methods of operating an access control which is reliant upon a system in accordance with any one of claims 1 to 9.
12. The use of apparatus to transmit verification data and/or instruction data as part of a system of any one of claims 1 to 9 or as part of the method of claim 11.
13. A door or other access opening obstruction responsive to control of a system of any one of claims 1 to 9.
PCT/NZ2003/000211 2002-10-22 2003-09-16 Access control system WO2004039119A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003267878A AU2003267878A1 (en) 2002-10-22 2003-09-16 Access control system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NZ52217402 2002-10-22
NZ522174 2002-10-22

Publications (1)

Publication Number Publication Date
WO2004039119A1 true WO2004039119A1 (en) 2004-05-06

Family

ID=32171788

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NZ2003/000211 WO2004039119A1 (en) 2002-10-22 2003-09-16 Access control system

Country Status (2)

Country Link
AU (1) AU2003267878A1 (en)
WO (1) WO2004039119A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008043125A1 (en) * 2006-10-13 2008-04-17 Microlatch Pty Ltd A secure wireless remote entry system
US8183980B2 (en) 2005-08-31 2012-05-22 Assa Abloy Ab Device authentication using a unidirectional protocol
CN102521905A (en) * 2011-12-16 2012-06-27 江苏省电力公司金湖县供电公司 Intelligent access control system of transformer substation and control method thereof
US8923513B2 (en) 2008-08-11 2014-12-30 Assa Abloy Ab Secure wiegand communications
WO2015038428A1 (en) * 2013-09-11 2015-03-19 Sony Corporation Secure remote control for operating closures such as garage doors
US10452877B2 (en) 2016-12-16 2019-10-22 Assa Abloy Ab Methods to combine and auto-configure wiegand and RS485

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2275552A (en) * 1993-02-25 1994-08-31 Rover Group A system for the remote operation of a security device
US5949349A (en) * 1997-02-19 1999-09-07 The Chamberlain Group, Inc. Code responsive radio receiver capable of operation with plural types of code transmitters
US6411199B1 (en) * 1998-08-21 2002-06-25 Keri Systems, Inc. Radio frequency identification system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2275552A (en) * 1993-02-25 1994-08-31 Rover Group A system for the remote operation of a security device
US5949349A (en) * 1997-02-19 1999-09-07 The Chamberlain Group, Inc. Code responsive radio receiver capable of operation with plural types of code transmitters
US6411199B1 (en) * 1998-08-21 2002-06-25 Keri Systems, Inc. Radio frequency identification system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8183980B2 (en) 2005-08-31 2012-05-22 Assa Abloy Ab Device authentication using a unidirectional protocol
WO2008043125A1 (en) * 2006-10-13 2008-04-17 Microlatch Pty Ltd A secure wireless remote entry system
US8923513B2 (en) 2008-08-11 2014-12-30 Assa Abloy Ab Secure wiegand communications
US8943562B2 (en) 2008-08-11 2015-01-27 Assa Abloy Ab Secure Wiegand communications
CN102521905A (en) * 2011-12-16 2012-06-27 江苏省电力公司金湖县供电公司 Intelligent access control system of transformer substation and control method thereof
CN102521905B (en) * 2011-12-16 2014-05-07 江苏省电力公司金湖县供电公司 Intelligent access control system of transformer substation and control method thereof
WO2015038428A1 (en) * 2013-09-11 2015-03-19 Sony Corporation Secure remote control for operating closures such as garage doors
US10452877B2 (en) 2016-12-16 2019-10-22 Assa Abloy Ab Methods to combine and auto-configure wiegand and RS485

Also Published As

Publication number Publication date
AU2003267878A1 (en) 2004-05-13

Similar Documents

Publication Publication Date Title
CN111837165B (en) Safety system for movable barrier operator
US7839263B2 (en) System and method of training in a transmit/receive system
US8416054B2 (en) Method and apparatus for training a learning movable barrier operator transceiver
JP5241062B2 (en) How to transfer information between two-way objects
US5875395A (en) Secure equipment automation using a personal base station
CA2477445C (en) Reprogrammable rolling-code-type transmitter for operating a moveable barrier
JP4190152B2 (en) User-independent automatic resynchronization of keyless entry system
US7173514B2 (en) Operator for a movable barrier and method of use
US20070126552A1 (en) Secure spread spectrum-facilitated remote control signaling method and apparatus
JP4594227B2 (en) Equipment control system
WO2004039119A1 (en) Access control system
US20080137715A1 (en) Secure spread spectrum-facilitated remote control signaling method and apparatus
EP0885502A1 (en) Authentication system and method for a remote keyless entry system
US20080310689A1 (en) System and method for operating a moveable barrier operator
US20240141714A1 (en) Security system for a moveable barrier operator
AU2022283376A1 (en) Security system for a moveable barrier operator
JPH08312212A (en) Remote control type locking device

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP