Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
MANAGEMENT SYSTEM
Document Type and Number:
WIPO Patent Application WO/2008/145803
Kind Code:
A1
Abstract:
The present invention relates to a method and to a system for managing the access rights of a contractor in a system, which comprises a main system, a reverse proxy, activation devices as well as terminal devices that are in the possession of the users. A customer account is established for a contractor in the database of the main system and the identification data of the activation devices is connected in connection with the customer account. Configuration data is received via a reverse proxy, on the basis of which the identification data of terminal devices in the possession of the users as well as the access rights data connected with terminal devices and activation devices, and also additional information connected with them, are stored in connection with the customer account. On the basis of the access rights the dynamic access rights as well as the additional information connected with them are transmitted to the terminal devices of the users.

Inventors:
PEREZ JAVIER (FI)
HIETALA ARI-PEKKA (FI)
LAAKSO TEEMU (FI)
RASILAINEN MARKO (FI)
Application Number:
PCT/FI2008/000058
Publication Date:
December 04, 2008
Filing Date:
May 23, 2008
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
KONE CORP (FI)
PEREZ JAVIER (FI)
HIETALA ARI-PEKKA (FI)
LAAKSO TEEMU (FI)
RASILAINEN MARKO (FI)
International Classes:
G07C9/22; G06F21/00; G06Q10/00; G06Q90/00; G07C9/27; G07C9/28; G07C9/29; H04L29/06
Domestic Patent References:
WO2001057806A12001-08-09
WO1998054676A11998-12-03
WO2005010685A22005-02-03
WO2002100040A12002-12-12
WO2006136662A12006-12-28
Foreign References:
GB2417858A2006-03-08
US20020099945A12002-07-25
US5815557A1998-09-29
US20040165708A12004-08-26
GB2430280A2007-03-21
US20020031228A12002-03-14
EP0716399A11996-06-12
Other References:
"CityCarClub", Retrieved from the Internet
Attorney, Agent or Firm:
KONE CORPORATION (P.O. Box 677, Hyvinkää, FI)
Download PDF:
Claims:

CLAIMS

1. Method for managing the access rights of at least one contractor in a system, which comprises a main system, a reverse proxy, at least one activation device as well as at least one terminal device, which is in the possession of the user of the contractor, characteri zed in that the method comprises the phases : a customer account is established in the database of the main system, in connection with which the identification data of the aforementioned activation device is recorded, configuration data is received via the interface of the reverse proxy, on the basis of which the following are recorded in connection with the aforementioned customer account: the identification data of the aforementioned terminal device; and the access rights data connected with the identification data of the aforementioned terminal device and with the identification data of the aforementioned activation device, comprising one or more additional information items; at least one dynamic access right as well as the aforementioned one or more mentioned additional information items connected with the access right is transmitted to the terminal device on the basis of the aforementioned access rights data.

2. Method according to claim 1, characterized in that the method further comprises the phase: event data connected with access rights is recorded in the event register connected with a customer account. 3. Method according to any of claims 1 - 2 above, charac t eri z ed in that an activation device is

installed in connection with a door lock and/or a drive prevention device of a vehicle.

4. Method according to any of claims 1 - 3, charac t eri z ed in that the method further comprises the phases: the dynamic position data of the activation device is received, and position data is recorded in the identification data of the aforementioned activation device. 5. Method according to any of claims 1 - 4 above, charac t eri z ed in that the aforementioned additional information is one of the following: a PIN code, guidance information, an instruction, an Internet address, address information to the data or the system maintained by the customer.

6. Method according to any of claims 1 - 5 above, charac t eri zed in that the method further comprises the phase: user groups are formed from the identification data of the terminal devices in connection with a customer account on the basis of the configuration data received.

7. Method according to any of claims 1 - 6 above, characterized in that the method further comprises the phase: activation device groups are formed from the identification data of the activation devices in connection with a customer account on the basis of the configuration data received. 8. Method according to claim 6 or 7, c h a r a c t e r i z e d in that the method further comprises the phase: the access rights data connected with activation device groups and/or terminal device groups is recorded based on the configuration data received.

9. Method according to any of claims 1 - 8 above, charac t eri z ed in that the method further comprises the phase: the identification data of the activation device is connected with two or more customer accounts.

10. Method according to any of claims 1 - 9 above, characteri zed in that the method further comprises the phase: the information connected with a customer account is transferred to be connected with some another customer account.

11. System for managing the access rights of at least one contractor, which system comprises a main system, a reverse proxy, at least one activation device as well as at least one terminal device, which is in the possession of the user of the contractor, characterized in that the system comprises: means 113 for establishing a customer account in the database 103 of the main system; means 113 for configuring the identification data of the activation device in connection with a customer account; an interface 102a of the reverse proxy for receiving configuration data and for storing configuration data in connection with a customer account comprising: the identification data of the terminal device, as well as the access rights data connected with the identification data of the aforementioned terminal device and with the identification data of the aforementioned activation device as well as one or more additional information items connected to the access rights data ; an interface 102a of the reverse proxy for transmitting at least one dynamic access right as well as one or more additional information items connected

with the access right to the terminal device 109 on the basis of the aforementioned access right.

12 . System according to claim 11 , c h a r a c t e r i z e d i n t h a t in connection with a customer account is an event register 103a for recording event data connected with access rights.

13. System according to any of claims 11 - 12 above, characterized in that at least one activation device 301 is installed in connection with a door lock and/or a drive prevention device of a vehicle.

14. System according to any of claims 11 - 13 above, characterized in that the system comprises an interface 102a of the reverse proxy for receiving and storing dynamic position data of an activation device 301 in the identification data of the activation device 301.

15. System according to any of claims 11 - 14 above, characteri zed in that the aforementioned additional information is one of the following: a PIN code, guidance information, an instruction, an Internet address, address information to the data or the system maintained by the customer.

16. System according to any of claims 11 - 15 above, characterized in that the configuration data comprises information for forming a terminal device group from the identification data of the terminal devices in connection with a customer account .

17. System according to any of claims 11 - 16 above, characterized in that the configuration data comprises information for forming an activation device group from the identification data of the activation devices in connection with a customer account . 18. System according to claim 16 or 17, characteri zed in that the configuration data comprises access rights data connected with an

activation device group and/or a terminal device group .

Description:

MANAGEMENT SYSTEM FIELD OF THE INVENTION

The present invention relates to the management of access rights. More particularly, the present invention relates to a method and to a system for managing the access rights of companies and other organizations in a centralized system.

BACKGROUND OF THE INVENTION

Nowadays many companies install access control systems and other such security systems to restrict the access of unauthorized persons to the premises they own or occupy and thus aim to prevent vandalism, theft or other economic damage. External persons can by their actions also cause a serious injury or security risk if they gain access to premises that are critical from the security viewpoint, in which case access rights must be restricted with especially effective security arrangements. Companies can also possess production systems and other such systems that have risk factors attached to their use, as a consequence of which their use is restricted whenever possible with security arrangements such that only persons authorized and/or trained for the task can activate functions that are critical to production or security, in other words, only a restricted employee group has a specific access right to the risk-prone functions in question. From the standpoint of access rights, companies that must have access to the properties or premises owned by others are a special group. In this case there can be thousands of locations to which the employees of a company must have access and they can be situated in a very extensive area. Typical examples of these types of companies are, among others, post offices,

maintenance, forwarding and energy distribution companies, and telephone operators.

A simple method to prevent the access of outsiders to secured premises is to lock the premises and assign keys to the possession of only those persons who each have the right of access to said premises. In addition to mechanical locks, also different access control systems can be used, in which information about the currently valid access rights is stored in the database of the system. In this case reading devices must be installed in connection with the doors, by means of which the access rights can be verified e.g. using access cards, PIN codes or RFID identifier tags. However, the management of physical means, such as keys and access cards, in large and/or changing organizations is awkward and expensive and includes significant security risks. Locally installed access control systems are complex and relatively expensive, especially if the number of secured locations is small.

Solutions in which access permission can be wirelessly transmitted to a point have also been developed. For example, publication WO2006/136662 describes one such system, in which wireless near-field communication and remote communication is utilized. In the solution an activation device is arranged in connection with a door, which activation device sends a unique identification code to the mobile phone possessed by a user, which further transmits both that identification code and the identification code of the phone (phone number) to the access control system for inspection of the access rights. Information about the inspected access permission is transmitted to the phone of the user and onwards to the activation device for opening the electrical lock of the door. The publication does

not, however, disclose e.g. how the access rights of user groups that are independent of each other are managed in the system presented.

One problem in prior-art access control systems and other similar security systems is that they are often individual systems in the possession of a certain customer and thus do not support solutions in which effective management of the access rights of numerous companies and/or user groups that are independent of each other would be possible. Companies are forced to invest, possibly in installing and maintaining their access control systems themselves, which of course incurs extra costs for the company. The commissioning phase of an access control system can become, from the standpoint of the customer, an unreasonably long and demanding process. As new and more sophisticated systems come onto the market, a company may be forced to consider de-commissioning his old system to obtain use of the improvements and additional features provided by the new systems .

Also, existing systems do not adequately support customers easily and simply adding their own functionalities to their access control systems, because prior-art systems are often closed systems and designed with only a specific application and/or customer group in mind. If the system must be tailored to the specific customer either in the commissioning phase or after it, this of course incurs extra costs for the company .

Access rights and other such usage rights are often dynamic by nature, in other words they can change from one person or organization to another, the access right can be limited in terms of time or of the number of times it is used. The management of dynamic access

rights in existing access control systems is awkward, especially if the number and/or situation of locations connected with the access rights change. Problems also occur if a number of different customers must gain access to the same premises to perform tasks according to their duties. The solution generally used in this case is that each company arranges their own access control to the relevant locations, in which case the overall solution is ineffective and expensive.

The purpose of the invention is to eliminate the aforementioned problems of prior art and to provide a completely new solution for implementing the management of the access rights of companies and other organizations (in this context contractors) in a centralized system. With the invention it is endeavored to achieve one or more of the following objectives :

- a solution, in which companies can be offered the management of access rights as a service, in which each contractor pays for the management service only according to the usage amount and/or the number of his locations without the company itself needing to invest in a management system or to participate in the maintenance of it,

to facilitate the collection of event data connected with access rights,

a solution, in which a contractor immediately receives for his use ready-to-use software tools for configuring customer-specific data, in order to produce reports and/or for monitoring events connected with access rights,

a solution in which the management of the access rights of a new contractor can be rapidly put into use,

- to facilitate the possibilities of contractors connecting their own functionalities in connection with the system,

a system in which operation is ensured, bearing in mind round-the-clock operation,

to reduce the security risks attached to access rights,

- a solution in general use, which is suited to the needs of different customer groups,

a solution, in which the transfer of access rights from one user group and/or contractor to another is easy,

to enable shared use of locations between different contractors,

- a solution, in which the location and/or number of locations connected with access rights can easily be changed,

a solution in which the routing between locations is easy to implement and optimize.

SUMMARY OF THE INVENTION

The method according to the invention is characterized by what is disclosed in the characterization part of claim 1. The system according to the invention is

characterized by what is disclosed in the characterization part of claim 11. Other embodiments of the invention are characterized by what is disclosed in the other claims. Some inventive embodiments are also discussed in the descriptive section of the present application. The inventive content of the application can also be defined differently than in the claims presented below. The inventive content may also consist of several separate inventions, especially if the invention is considered in the light of expressions or implicit sub-tasks or from the point of view of advantages or categories of advantages achieved. In this case, some of the attributes contained in the claims below may be superfluous from the point of view of separate inventive concepts .

In accordance with the first aspect of the invention, a method is presented for managing the access rights of at least one contractor in a system, which comprises the main system of the central system, a reverse proxy of the central system, at least one activation device as well as at least one terminal device, which is in the possession of the user of the contractor. According to the method a customer account is established in the database of the main system, in connection with which the identification data of the aforementioned activation device (so-called activation device data) is stored. After this the configuration data is received via the interface of the reverse proxy, on the basis of which the identification data of the terminal device (so-called terminal device data) , as well as the access rights information connected with the aforementioned terminal devices and activation devices and the one or more additional information items connected with each item of access rights data, is stored in connection with the customer

account. On the basis of the access rights recorded the dynamic access rights and the aforementioned additional information is transmitted to the terminal devices of the users.

In accordance with the second aspect of the invention, a system is presented for managing the access rights of at least one contractor, which system comprises the main system of the central system, a reverse proxy of the central system, at least one activation device as well as at least one terminal device, which is in the possession of the user of the contractor. The system further comprises means for establishing a customer account of a contractor in the database of the main system as well as means for configuring the identification data of activation devices in connection with the customer account. The system further comprises an interface of the reverse proxy for receiving configuration information and for recording in connection with a customer account configuration information comprising the identification data of the aforementioned activation device, as well as the access rights data connected with the aforementioned identification data of the terminal devices and of the activation devices, and also the one or more additional information items connected with the access rights data. The system further comprises an interface of a reverse proxy for transmitting at least one dynamic access right and one or more additional information items connected with the use right to a terminal device on the basis of the aforementioned access rights data.

In one embodiment of the invention event data connected with access rights is recorded in the event register connected with a customer account. As a result of the embodiment, customers have available up-

to-date information about the users that have visited certain locations, to produce the events reports they desire from the information and/or to monitor in realtime the activation events of the locations.

In one embodiment of the invention an activation device is installed in connection with a door lock and/or a drive prevention device of a vehicle.

In one embodiment of the invention the dynamic position data of an activation device is received and it is recorded in the activation device data of said activation device. As a result of the embodiment, a location in which an activation device is installed can be a moving location, e.g. a service vehicle, the position data of which is updated in the database of the system.

In one embodiment according to the invention the additional information item that is transmitted to the terminal device in connection with the transmission of a dynamic access right is one of the following: an Internet address, a PIN code, guidance information connected with the location, an instruction, or any other additional information whatsoever, which the terminal device identifies and performs the necessary additional functions on the basis of the identification. In one embodiment of the invention the additional information is the address information to the data or to the system maintained by the customer.

As a result of the embodiments, additional functions according to customer needs can easily be configured into the system. On the basis of the additional information the terminal device can also be in connection with a server maintained by the customer for implementing the special applications of the

customer. The additional information can be configured by the customer and can thus easily be changed.

In one embodiment of the invention user groups are formed from the terminal device data that is in connection with a customer account on the basis of the configuration data received. Likewise, in another embodiment of ,the invention activation device groups are formed from the activation devices on the basis of the configuration data received. As a result of the embodiments, individual access rights data can be allocated to a whole user group and/or activation device group instead of to an individual activation device and/or (terminal device of a) user. The embodiments facilitate and speed up the configuration of access rights as well as e.g. the formation and optimization of distribution routes and other such routes .

In one embodiment of the invention the identification data of an activation device is stored in connection with two or more customer accounts. The embodiment enables numerous customers to have the right to use the same activation device but to independently specify the access rights connected with the activation device.

In one embodiment of the invention the information connected with a customer account is transferred to be connected with some other customer account. As a result of the embodiment, the configuration data connected with access rights can easily be transferred from one company to another, e.g. if the forwarding agent responsible for deliveries of a good changes to another forwarding agent.

With the embodiments according to the present invention, in addition to the aforementioned advantages, one or more of the following advantages are achieved compared to solutions according to prior art. Firstly, a contractor does not need to invest in access control and other such systems or to maintain them. The system is operationally reliable and customers receive the access rights management service they need as well as the use of the necessary configuration tools almost immediately. The configuration of customer-specific data is easy and fast especially owing to the grouping of activation device data and of terminal device data. It is also easy to add/remove locations to/from the system according the needs of the customer. The customer can also add and configure his own functionalities in connection with the system, in which case his special needs can be addressed better than before. The access rights are dynamic, in which case the risk of misuse of the access rights diminishes. All in all as a result of the invention, data security improves and the management of access rights becomes easier.

LIST OF FIGURES

Fig. 1 presents one embodiment of the system according to the invention,

Fig. 2 presents the message transmission in one system according to the invention, and

Fig. 3 presents another embodiment of the system according to the invention.

DETAILED DESCRIPTION OF THE INVENTION

Fig. 1 presents one embodiment of the system according to the invention, in which the central system, which comprises the main system 101 and a reverse proxy 102, is marked with the reference number 100. The central system is connected to the telecommunications network 110 via the interface 102a of the reverse proxy and further to the mobile phone network 111 for transmitting messages between the reverse proxy and the terminal devices 106 in the possession of the users. The telecommunications network 110 is preferably an Internet network, via which the reverse proxy is in connection with equipment and systems that are outside the central system. Fig. 1 further contains an activation device, marked with the reference number 104, which is incorporated in the system and which controls the actuator 105 disposed at the location 112, e.g. an electrical lock for opening the door at the location. The main system and the reverse proxy are installed by the operator that manages the central system, who is also responsible for the maintenance of it and for the central system operating without interruption in all circumstances.

The task of the main system is to maintain customer- specific customer accounts and the access rights in connection with them in the database 103 of the main system. Customer-specific event registers are also in connection with the main system, in which the main system records information about activation events connected with access rights. For example, when a user (a terminal device) requests access permission to a certain location, information about the event is recorded in the event register concerning who requested the access permission (identification code of the terminal device) , where it happened

(identification code of the activation device) and when it happened. By separating the main system from the "outside world" by means of the reverse proxy it is possible to improve data security and to give direct access to the system data and to the configuration data of customer accounts in the main system only to the operator, which occurs e.g. via a local administration terminal 113. All the data traffic outside the central system occurs via the reverse proxy using a secure data connection, in which each customer has access only to the configuration data and to the event register data that is in connection with his/her own customer account by means of the usernames and passwords in his/her possession. The main system and the reverse proxy can be implemented as separate systems or they can be integrated as systems functioning in the same computer unit .

The activation device 104 is a device capable of wireless nearfield communication, in which the messaging connection 109 is based e.g. on Bluetooth technology, infrared technology or some other similar nearfield communication technology. Each activation device belonging to the system has an individual identification code, which it transmits to its environment via a messaging connection. In Fig. 1 the activation device is connected with a simple on/off signal 108 to the actuator 105 for controlling the actuator, e.g. for opening the lock in the electrical lock of a door on the basis of information received

(activation permission) from a terminal device. It is not necessary for information to be in the activation device itself about what kind of actuator is connected to it, because the signal transmitted to the actuator comprises only information about the approved activation permission. The activation device is thus

one of general usage and is suited for connecting to many types of locations such as doors, gates, systems controlling production processes, vehicles, postboxes

("drop box"), transport appliances, computers, etc., in which an on/off-type signal is sufficient for controlling the actuator disposed in the location. The invention does not limit the interface to simply an on/off signal but instead any interface method at all suited to the purpose of controlling an actuator is possible, e.g. a message transmitted to an actuator via the messaging connection 109 used by an activation device. By arranging a power supply of the activation device and of the actuator connected to it from an accumulator, it is not necessarily needed to arrange an external power supply to the location.

The terminal device 106 is e.g. a mobile phone, which is able to communicate with both the activation devices and the reverse proxy. Communication with the activation device 104 occurs via the messaging connection 109 used by the activation device. The connection to the reverse proxy occurs via any wireless data transfer network 111 whatsoever, e.g. via a public mobile phone network. The primary task of a terminal device is to transmit message traffic connected with an activation event of a location between the activation device disposed in close range and the reverse proxy as well as to function as an interface between the user and other units of the system. The terminal device is provided with application software, a so-called terminal device application, by means of which the access right connected with the activation devices can be verified and transmitted as an activation permission to the activation devices. In the embodiment according to Fig. 1 the terminal device applications 102b are stored on a customer-specific basis in a server

belonging to the system, e.g. in a reverse proxy for downloading to the terminal devices of users. In order to download the terminal device application the user sends a message, e.g. a text message, with his/her terminal device to the server belonging to the system, in response to which the terminal device receives address information, e.g. an IP address, from where the terminal device application intended for the user can be downloaded. On the basis of the address information, the user downloads the terminal device application to his/her terminal device, after which the terminal device can function as a terminal device 106 according to the system. The downloading of the terminal device application can occur also automatically such that the user does not need to participate in the downloading event himself/herself . The function can be utilized e.g. in connection with the issue of a new software version such that a new program version is automatically downloaded to all the terminal devices of a certain customer or that have the same application program version immediately it is issued.

For all those contractors who order the access rights management service from the operator maintaining the system, the operator establishes a customer-specific customer account in the database 103 of the main system, in which the operator records the contact information of the customer and other similar customer information. The customer notifies the operator about those locations for which he needs an access rights management service. On the basis of the notification the operator installs activation devices in specified locations, records the identification data of the activation devices (activation device data) in question in the database of the main system and connects the data in connection with the customer

account of the customer. The activation device data comprises an identification code uniquely specifying the activation device as well as if necessary the address data of the location, position coordinates and/or other general information about the location. The activation devices are the property of the operator, who is also responsible for their operation and maintenance. The system also enables shared use of the activation devices such that the operator connects the identification data of the activation devices in shared use in connection with the customer accounts of two or more contractors . The customers in question can after this configure their own access rights in the locations in shared use without customer-specific activation devices for each customer being installed in the locations .

After the installation of the activation devices the operator activates the customer account of the contractor and delivers the necessary usernames and passwords to the main user of the contractor for configuring the data connected with the customer account. Configuration can take place e.g. via an administration terminal 112 or via the information system or some other system of the customer. In order to configure the access rights, the customer (main user) defines the identification data of those terminal devices (terminal device data) that the organization/users of the company have in their possession. Each terminal device data item comprises an individual identification code of the terminal device, e.g. the phone number of the terminal device as well as if necessary general information connected with the terminal device and/or its user.

When the necessary identification data (the identification data of the activation devices and of

the terminal devices) is recorded in connection with a customer account, the customer configures the user rights he/she wants by associating the identification data of the terminal devices and the activation devices with each other and also by defining a dynamic access right to the associated data. A dynamic access right in this context means that the access right can be limited to apply e.g. to a certain period of time and/or number of instances of use. Additionally, it is possible to define in the user rights data whether a dynamic user right is sent in advance to a terminal device or whether the validity of the user right must always be verified from the main system. The customer can also configure one or more freely definable additional items of information into the user rights data, which is transmitted to the terminal device in connection with the transmission of the dynamic user right. Additional information can be e.g. an IP address to a server maintained by the customer, a PIN code, guidance information or other additional information connected with access rights. All in all, additional information allows the customer to diversely connect his/her own functionalities in connection with the system without the operator himself having to modify the central system or its software.

The customer can further form groups from the configured terminal device data and from the activation device data on the basis of different criteria, e.g. to form a user group from the terminal device data of users operating in a certain area or to form an activation device group of locations in the same area or on the same distribution route or other such route. The grouped data is associated and group- specific access rights are connected with them in a similar manner to that for individual identification

data and access rights, in which case the configuration of access rights data becomes significantly easier and faster. By arranging the activation device data of an activation device group into e.g. the sequence of the locations of a posting route, the sequence of execution of route locations can be defined, and it can if necessary be optimized.

The configuration of terminal device data and of access rights data occurs e.g. via configuration tools, preferably via Internet pages, which the operator maintains on a reverse proxy server . The customer sends configuration data via the webpages to the reverse proxy via the interface 102a, from where they are automatically saved in the main system in connection with the customer account of the customer. The customer can of course at any time whatsoever add/remove/edit the information connected with his/her customer account. The system also enables the automatic configuration of access rights data via the interface 102a, e.g. manually from the system maintained by the customer. When the customer has configured the necessary information in connection with his/her customer account, the activation devices can be activated with the terminal devices in the possession of the users within the framework of the configured access rights. Alongside the configuration tools, ready-to-use reporting tools and monitoring tools for reporting, monitoring and browsing the data of the event register are stored in the system for use by contractors.

As described above, the operator, the contractor and the user have their own roles in the use and management of the system according to Fig. 1. According to their roles :

the operator installs and maintains the central system, makes service agreements with contractors concerning services for managing access rights, - installs activation devices in the locations specified by contractors and maintains them, saves the terminal device applications in connection with the system,

- saves the configuration tools, reporting tools and monitoring tools on the server of the system for the use of contractors,

- establishes a customer account in the system for each contractor, connects the identification data of the activation devices specified by the customer in connection with the customer account and activates the customer account,

- delivers to each main user of the contractor the necessary usernames and passwords, invoices the customer in accordance with the service agreement,

the contractor

- makes a service agreement with the operator about services for managing the access rights and also delivers information about the locations in which the operator should install activation devices,

- configures customer-specific information, such as terminal device data and access rights data connected with his/her customer account, - assigns a terminal device to users

the user

- downloads the terminal device application to the terminal device in his/her possession, - activates by means of his/her terminal device the activation device within the framework of his/her

access rights in the locations specified by the customer.

Fig. 2 presents the message transmission connected with the activation of an activation device in one system according to the invention. The activation device, which transmits into its immediate surroundings the unique identification code IDa, is marked with the reference number 200. When a user arrives in the vicinity of the activation device 200, the terminal device 201 receives the identification code IDa and sends to the reverse proxy 202 an activation request, which comprises, in addition to the received identification code, the identification code IDp of the terminal device. The reverse proxy receives the activation request and transmits it to the main system 203, in which it is checked whether the access right connected with the activation request is valid at that time by comparing the identification codes of the activation request to the configured access rights data (to the associated identification codes of the terminal devices and of the activation devices) . If on the basis of the access rights data the access right is valid, the main system sends information about the approved access right (ACK) as well as any additional information (INFO) to the terminal device via the reverse proxy. An approved access right from a terminal device is transmitted as an activation permission (ACK2) to the activation device for controlling the actuator connected to it.

If the access right is sent in advance to the terminal device 201, it is not needed to send an activation request to the reverse proxy but instead the validity of the access right is checked immediately in the terminal device 201. In this case only the information about the activation event is sent to the reverse

proxy for updating the data of the event register in the main system. The function is usable in situations in which the terminal device is in a blind spot at the moment of activation and does not make contact with the central system.

Fig. 2 also presents a case in which the IP address to the server 204 maintained by the customer is added as additional information (INFO) connected with a dynamic access right. The terminal device sends, on the basis of the IP address, information about the activation event to the server 204 (ACK3), in response (RESP) to which the terminal device receives e.g. guidance information, instructions, information about the next locations of the distribution route, etc., that are displayable on the terminal device 201.

Fig. 3 presents an embodiment of the invention in which a forwarding company delivers e.g. spare parts for the service vehicles 300 of a client. In Fig. 3 the activation device 301 is connected to the electrical lock of the door of the freight space 302 of the service vehicle 300 such that the employee of the forwarding company can open the door of the freight space with the terminal device 106 in his/her possession according to the principles presented above. In the case according to Fig. 3, information about the service vehicles and the delivery batches/goods batches delivered to them is transmitted from the logistics system of the client to the system 305 maintained by the forwarder. The forwarder configures the usage rights (access rights) required for the delivery routes in the main system for those drivers on the particular run for access to the locations according to the delivery routes. The goods for delivery to the locations are packed into delivery batches at the central warehouse of the client, from

where the drivers of the forwarder collect them. When the driver comes to the service vehicle 300, the terminal device 106 in the possession of the driver checks from the main system 101 the access right of the driver to the service vehicle 300. If the access right is valid, the lock of the door of the freight space opens and the driver can leave the delivery- batch in question in the service vehicle. At the same time information about the visits of the driver in the service vehicle 303 are recorded in the event register of the main system as an acknowledgement of the delivery of a delivery batch. The forwarder can monitor arrival of delivery batches at destination by means of the monitoring tools in real-time and quickly detect e.g. deviations from the planned delivery schedule.

If the service vehicle is not for one reason or another able to stop at an agreed standard location, the service vehicle driver/serviceman informs the actual location (dynamic position data) of the service vehicle when exiting the service vehicle by sending with his mobile phone 306 e.g. a text message which comprises the street address or other such address or direct position coordinates if the mobile phone 306 contains a GPS locator. The position data is recorded e.g. in the identification data of the activation device 301 in the main system, from where the position data can be conveyed to the driver of the forwarder e.g. as additional information of the dynamic access right delivered in advance. In order for it to be possible to associate the position data with the correct activation device in the main system, the identifying code of the activation device or of the service vehicle, e.g. the registration number of the service vehicle, must be connected with the position data. In cases in which mainly the same serviceman

uses the service vehicle, it can be deduced which service vehicle is in question from the phone number of his mobile phone and the aforementioned code identifying the activation device does not need to be connected with the position data. In certain cases it is also possible that the mobile phone of the driver of the service vehicle is able to receive the identification code of the activation device disposed in the service vehicle, in which case it can automatically connect the position data with the notification message. If cost factors or other such factors do not restrict installation of a mobile phone equipped with a GPS locator or a similar appliance in the service vehicle, the solution in question can be used for notification and/or for real-time monitoring of the position data of the service vehicle.

In the following the management of access rights will be presented, by way of example, from the viewpoint of certain contractors and customer groups, which have ordered an access rights management service from the operator .

Forwarding company, post office; agrees with its clients about arranging access rights to the premises of the client. The operator installs the activation devices in the locations, opens a customer account.

The main user of the forwarding company configures groups according to the delivery routes, and connects the necessary access rights with them, after which the employees of the forwarder can collect/deliver goods to the locations according to the distribution route.

Car rental agency: The operator installs activation devices in the vehicles of the car rental agency, by means of the doors (locks) of the vehicles can be opened. The activation device can also be connected

with a drive prevention appliance, in which case a person without access rights cannot start the vehicle. After renting a vehicle (e.g. using a mobile phone) the person renting it receives terminal device software on his/her mobile phone and a dynamic access right to the rented vehicle is configured for him/her. The car rental agency delivers the reserved car to the renter at the agreed place, from where the renter can collect it whenever, without the keys of the car (which can be e.g. inside the car) being delivered to him/her. The access right is deleted in connection with the return of the car or it expires automatically at the end of the agreed rental period.

Carrier: The operator installs activation devices in the buses of the carrier and connects them with indication means, which inform drivers of the bus e.g. with a noise signal and/or a light signal about the valid travel ticket of the passenger. The passenger purchases from the carrier (e.g. using a mobile phone) a monthly ticket for a certain travel route or travel routes. In conjunction with the purchase, terminal device software is downloaded to the- terminal device of the passenger and an access right valid for a month to the buses of the carrier that drive the routes in question is configured. When the passenger arrives at a bus the validity (access right) of his/her ticket is inspected automatically and the validity is indicated with an indication appliance.

Hotelier: The operator installs the activation devices in the hotel lobby and on the doors of the rooms. The traveler reserves a room in the hotel for a certain period of time. In conjunction with the reservation, terminal device software is downloaded to the terminal device of the traveler and an access right to the room according to the reservation as well as to the

elevators of the hotel is configured. When the traveler arrives at the hotel his/her reservation is checked for the first time in the hotel lobby on the basis of the activation device installed in the hotel lobby, and if the room reservation is valid, the terminal device sends to the elevator system information about the reservation (e.g. the room number) , on the basis of which the elevator system orders an elevator for the use of the traveler. When the traveler arrives at the door of his/her room, his/her reservation is checked a second time and if it is "OK" the lock of the room opens.

In the following other possible contractors and usage locations for the practical application of the invention are presented:

fitness gyms:

-an access permission to the fitness gym and/or an access right to fitness equipment is configured for the customers of the fitness gym,

-the customer monitors the implementation of a personal fitness program on the basis of the event register, -the customer is invoiced according to the amount of fitness services used,

home help company:

-an access permission for the service locations according to the service route is configured for the employees of the company,

-the relatives of the person being cared for can monitor in the system the implementation of home visits,

security firm:

-an access permission to the locations/premises guarded is configured for the guards,

-the visits of the guards to the locations being guarded are monitored in real-time,

office premises in companies:

-an access permission to different departments, meeting rooms and other such company premises are configured for employees, a right to use computers is given,

-monitoring of the working time of the employee on the basis of the event register.

multistorey car parks: -an access permission to the multistorey car park is configured for customers using the multistorey car park,

-information about the nearest free parking space is transmitted to the terminal device of the customer, -the customer is invoiced on the basis of the parking time.

housing companies :

-an access permission to the different rooms/floors of a building is configured for residents and/or for the employees of servicing companies.

-the representative of the housing company, e.g. the janitor monitors the use of the access permissions of the housing company.

telephone companies, energy distribution companies:

-access permissions to properties, and to special premises in them in which the equipment/systems of the company are situated, are configured for employees,

-the access permissions are grouped and managed by region, e.g. on the basis of the city or city district .

The invention is not limited solely to the embodiments described above, but instead many variations are possible within the scope of the inventive concept defined by the claims below. It is possible within the framework of the invention that e.g. the operator and the contractor are units belonging to the organization of the same company or association. It is also possible within the framework of the invention that the users do not belong to the organization of the contractor, but instead are in the employment of some other company or association.