The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 19, 2006

Filed:

Mar. 12, 2001
Applicants:

Inge Lidén, Eskilstuna, SE;

Rolf Norberg, Täby, SE;

Björn Magnusson, Tumba, SE;

Hannu Sivonen, Marjovaara, FI;

Gudrun Brennecke, Berlin, DE;

Christophe Chanel, Berlin, DE;

Jürgen Krühn, Berlin, DE;

Bernd Kikebusch, Berlin, DE;

Arnaud Lefebvre, Troyes, FR;

Inventors:

Inge Lidén, Eskilstuna, SE;

Rolf Norberg, Täby, SE;

Björn Magnusson, Tumba, SE;

Hannu Sivonen, Marjovaara, FI;

Gudrun Brennecke, Berlin, DE;

Christophe Chanel, Berlin, DE;

Jürgen Krühn, Berlin, DE;

Bernd Kikebusch, Berlin, DE;

Arnaud Lefebvre, Troyes, FR;

Assignee:

Assa Abloy AB, Stockholm, SE;

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 9/00 (2006.01);
U.S. Cl.
CPC ...
Abstract

A method of authorizing a key or lock device comprises the following steps: a first user device and a first system device used in a first level of a lock system, such as at a manufacturer, are created. A first encryption key is stored in the first user device and the first system device. When the user device is to be shipped to a second level of the lock system, such as a locksmith, an authentication process is carried out between the first user device and the first system device using the first encryption key stored therein. In case the authentication process was successful, a software operation is carried out by the first system device, by which the first encryption key stored in the first user device is replaced by a second encryption key. This second encryption key is stored in second system and user devices used in the second level of the lock system, thereby making the first user device operable with the second system and user devices. This prevents unauthorized use of keys and locks.


Find Patent Forward Citations

Loading…