Method and lock system for creating an electronic key, which lock system comprises at least one lock and a server. In the solution according to the invention a request for creating an electronic key is received from the device of a user administering the lock and, in response to the request, the reference data of the electronic key is sent to the device of the user administering the lock. After this a request for delivering the electronic key is received from the mobile device, to which request the reference data of the electronic key is attached, and an electronic key is created and encrypted. Finally, the encrypted electronic key is sent to the mobile device from which the request for delivering a key was received.</p
Methods and apparatus for encrypting and storing data. The methods and apparatus provide different l...
Abstract--This paper describes a new way of providing security for objects; the object can either be...
An actuation control system and method utilises wireless coupling of a key and an actuator to effect...
Method and lock system for creating an electronic key, which lock system comprises at least one lock...
A method and system is disclosed for allowing users to consolidate a large number electronic keys (f...
A method and system is disclosed for allowing users to consolidate a large number electronic keys (f...
A Method And System Is Disclosed For Allowing Users To Consolidate A Large Number Electronic Keys (F...
A locking arrangement comprising an independent electrical locking mechanism 5 and an independent me...
Physical keys made from metal or woods have been used for centuries to operate locks. The routines f...
Electronic locks are rapidly replacing traditional mechanical locks in today\u27s organizations, as ...
This thesis aims to build a modular embedded system for a set of pre defined constrains, including a...
The access security awareness using conventional keys was less practical and much risky of leaving ...
Security systems and methods are provided. In one example, a security system includes a security dev...
Key management plays a crucial role in cryptography, as the basis for secure information exchange, d...
Regarding to Key.net, Clients can apply for their desired room key, which is available for a specifi...
Methods and apparatus for encrypting and storing data. The methods and apparatus provide different l...
Abstract--This paper describes a new way of providing security for objects; the object can either be...
An actuation control system and method utilises wireless coupling of a key and an actuator to effect...
Method and lock system for creating an electronic key, which lock system comprises at least one lock...
A method and system is disclosed for allowing users to consolidate a large number electronic keys (f...
A method and system is disclosed for allowing users to consolidate a large number electronic keys (f...
A Method And System Is Disclosed For Allowing Users To Consolidate A Large Number Electronic Keys (F...
A locking arrangement comprising an independent electrical locking mechanism 5 and an independent me...
Physical keys made from metal or woods have been used for centuries to operate locks. The routines f...
Electronic locks are rapidly replacing traditional mechanical locks in today\u27s organizations, as ...
This thesis aims to build a modular embedded system for a set of pre defined constrains, including a...
The access security awareness using conventional keys was less practical and much risky of leaving ...
Security systems and methods are provided. In one example, a security system includes a security dev...
Key management plays a crucial role in cryptography, as the basis for secure information exchange, d...
Regarding to Key.net, Clients can apply for their desired room key, which is available for a specifi...
Methods and apparatus for encrypting and storing data. The methods and apparatus provide different l...
Abstract--This paper describes a new way of providing security for objects; the object can either be...
An actuation control system and method utilises wireless coupling of a key and an actuator to effect...