ACCESS CONTROL APPARATUS DEVICES

Brand Owner Address Description
MW3 Anton Dreesmann Voshollei 61 B-2930 Brasschaat Belgium Access control apparatus and devices for controlling access, namely, one-time-password-devices in the nature of electronic card readers; software, magnetic cards, memory cards and computer hardware for identification, authentication, verification and/or access to data, to programming, to Websites, to databanks and/or to networks; software and electronic equipment in the nature of computer hardware for processing, handling and comparison of data; software and electronic equipment in the nature of computer hardware for identification and verification of individuals by means of electronic data in the use of access control systems by electronic means and more specifically via the Internet; apparatus and systems for identification, monitoring, protection and security, not included in other classes, namely, access control and alarm monitoring systems; mobile or wireless access control systems, namely, computer programs for the enabling of access or entrance control; apparatus used for security of banking operations and in the field of electronic data transmission, namely, OTP-devices in the nature of electronic card readers; software for securing the access to websites by verifying the identity of the person who wants access to the website, and legal authentication of data by computers; software for remote access control to computer and telecommunication networks;MW THREE;Security services for the protection of property and individuals, together with the use of electronics, including identification, access control and surveillance services, namely, security guard services; providing advice, information and intelligence on the use and application of apparatus and systems for security, monitoring, identification and control and more particularly with regard to apparatus, instruments, software, magnetic cards, memory cards or other computer hardware for identification, authentication, verification and access to data, to programming, to Websites, to data banks and to networks, namely, security consultancy;Design, establishment and commissioning of electronic apparatus and software for identifying individuals, namely, product development; design, development and maintenance of software; services rendered by information technology specialists in the field of security and authentication in the telecommunications field, namely, information technology consultation;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An access control system comprises a plurality of access control devices in each of which is stored an access code. Specific access codes and access rights for a plurality of access control devices are transmitted from an access control central unit over a mobile radio network to the mobile communication terminal of a user. Transmitted to the mobile communication terminal by an access control device to be passed is an access control device identification. In the mobile communication terminal, on the basis of the received identification, the access code and the access rights for the access control device to be passed are determined, and are transmitted to the access control device. The access control device clears the user for access if the received access rights suffice and the received access code agrees with the stored access code.