The access control controls the access via a fixed by the operator rules “WHO-WHEN-WHERE” to ensure that only authorized persons have access to the shared areas for which they in or on a protected site. Access rights can be limited in time (expiration time, time). Access authorization can by people, for example, Employees of a security firm or technical access control systems (among others with RFID) are reviewed based on proof of identity (for example, an RFID transponder).