METHOD AND DEVICES FOR CONFIGURING ELECTRONIC LOCKS
20230154259 · 2023-05-18
Inventors
Cpc classification
G07C9/00309
PHYSICS
International classification
Abstract
For configuring access rights of electronic locks, a mobile communication device obtains an access right identifier. Configuration data comprising the access right identifier is transferred from the mobile communication device (3) to a first electronic lock, via a close range communication interface, thereby configuring the first electronic lockto grant an access right to electronic key devices (4) having stored thereon the access right identifier. From the mobile communication device an update request, comprising the access right identifier, is transmitted to a computer system via a communication network, enabling the computer system to transmit the access right identifier via the communication network to one or more second electronic locks for configuring the one or more second electronic locks to grant an access right to the electronic key devices having stored thereon the access right identifier.
Claims
1. A method of configuring access rights of electronic locks the method comprising: obtaining by a mobile communication device an access right identifier; transferring from the mobile communication device to a first electronic lock configuration data comprising the access right identifier, via a close range communication interface, thereby configuring the first electronic lock to grant an access right to electronic key devices having stored thereon the access right identifier; and transmitting from the mobile communication device to a computer system via a communication network an update request, comprising the access right identifier, enabling the computer system to transmit via the communication network the access right identifier to one or more second electronic locks for configuring the one or more second electronic locks to grant an access right to the electronic key devices having stored thereon the access right identifier.
2. The method according to claim 1, wherein the mobile communication device obtains the access right identifier by at least one of the following steps: generating the access right identifier in the mobile communication device (3); reading, by the mobile communication device the access right identifier from an electronic key device; or requesting, by the mobile communication device from the computer system the access right identifier, by transmitting an access right identifier request to the computer system via the communication network, and receiving in the mobile communication device from the computer system, via the communication network, the access right identifier.
3. The method according to claim 1wherein the method further comprises transmitting a delegation request for another mobile communication device (6), from the mobile communication device (3), via the communication network, to the computer system, the delegation request comprising the access right identifier, enabling the computer system to transfer the access right identifier, via the communication network, to the other mobile communication device (6).
4. The method according to claim 1, wherein the method further comprises: obtaining, by the mobile communication device a configuration right identifier by at least one of the following steps: reading , by the mobile communication device the configuration right identifier from an electronic master key device (7); or receiving the configuration right identifier in the mobile communication device from the computer system via the communication network; and transmitting the update request from the mobile communication device, via the communication network, to the computer system, the update request further comprising the configuration right identifier, enabling the computer system to transmit, via the communication network, the access right identifier to the one or more second electronic locks, using the configuration right identifier.
5. The method according to claim 4, wherein the method comprises transferring a configuration request from the mobile communication device-(3), via the close range communication interface, to the first electronic lock, the configuration request comprising the configuration right identifier, enabling the first electronic lock to store, upon validation of the configuration right identifier, the access right identifier received in the configuration data from the mobile communication device (3).
6. The method according to claim 1, wherein the method further comprises: receiving by the first electronic lock a configuration right identifier from an electronic master key device, via the close range communication interface; and storing in the first electronic lock, upon validation of the configuration right identifier, the access right identifier received in the configuration data from the mobile communication device.
7. A computer program product comprising a non-transitory computer-readable medium having stored thereon computer program code configured to control a processor of a mobile communication device such that the mobile communication device performs the steps of: obtaining an access right identifier; transferring configuration data via a close range communication interface to a first electronic lock, the configuration data comprising the access right identifier, thereby configuring the first electronic lock to grant an access right to electronic key devices having stored thereon the access right identifier; and transmitting an update request via a communication network to a computer system, the update request comprising the access right identifier, enabling the computer system to transmit the access right identifier, via the communication network, to one or more second electronic locks, for configuring the one or more second electronic locks to grant an access right to the electronic key devices having stored thereon the access right identifier.
8. The computer program product according to claim 7, wherein the medium has stored thereon further computer program code configured to control the processor of the mobile communication device, such that the mobile communication device performs the steps of: generating the access right identifier; reading the access right identifier from an electronic key device; or requesting the access right identifier from the computer system, by transmitting an access right identifier request to the computer system via the communication network, and receiving the access right identifier from the computer system via the communication network.
9. The computer program product according to claim 7, wherein the medium has stored thereon further computer program code configured to control the processor of the mobile communication device (3), such that the mobile communication device transmits a delegation request for another mobile communication device, via the communication network, to the computer system, the delegation request comprising the access right identifier, enabling the computer system to transfer the access right identifier to the other mobile communication device via the communication network.
10. The computer program product according to claim 7, wherein the medium has stored thereon further computer program code configured to control the processor of the mobile communication device such that the mobile communication device performs the step of: obtaining a configuration right identifier by at least one of the following steps: reading the configuration right identifier from an electronic master key device; or receiving the configuration right identifier from the computer system via the communication network; and transmitting the update request via the communication network to the computer system, the update request further comprising the configuration right identifier, enabling the computer system to transmit the access right identifier, via the communication network, to the one or more second electronic locks, using the configuration right identifier.
11. The computer program product according to claim 10, wherein the medium has stored thereon further computer program code configured to control the processor of the mobile communication device, such that the mobile communication device performs the step of transferring a configuration request via the close range communication interface to the first electronic lock, the configuration request comprising the configuration right identifier, enabling the first electronic lock to store, upon validation of the configuration right identifier, the access right identifier received in the configuration data from the mobile communication device.
12. A computer system for updating access rights of electronic locks, the computer system comprising one or more processors, configured to perform the steps of: receiving, via a communication network, an update request from a mobile communication device, the update request comprising an access right identifier; and transmitting configuration data via the communication network to one or more electronic locks, the configuration data comprising the access right identifier, thereby configuring the one or more electronic locks to grant an access right to electronic key devices having stored thereon the access right identifier.
13. The computer system according to claim 12, wherein the one or more processors are further configured to perform the steps of: receiving from the mobile communication device, via a communication network, a delegation request comprising the access right identifier; and transmitting the access right identifier to another mobile communication device, via the communication network, enabling the other mobile communication device to gain access to electronic locks with the access right identifier stored thereon.
14. The computer system according to claim 12 wherein the one or more processors are further configured to perform the step of receiving the update request from the mobile communication device via the communication network, the update request further comprising a configuration right identifier, and the computer system further comprises a memory with update assignment rules stored therein, the update assignment rules defining an assignment of the configuration right identifier to one or more electronic locks-(2), enabling the computer system to transmit configuration data comprising the access right identifier, via the communication network, to one or more electronic locks, defined by the update assignment rules, using the configuration right identifier.
15. A computer program product comprising a non-transitory computer-readable medium having stored thereon computer program code configured to control one or more processors of a computer system such that the computer system performs the steps of: receiving, via a communication network, an update request from a mobile communication device, the update request comprising an access right identifier; and transmitting configuration data via the communication network to one or more electronic locks, the configuration data comprising the access right identifier, thereby configuring the one or more electronic locks to grant an access right to electronic key devices having stored thereon the access right identifier.
16. The computer program product according to claim 15, wherein the medium has stored thereon further computer program code configured to control the one or more processors of the computer system such that the computer system performs the steps of: receiving from the mobile communication device (3), via a communication network, a delegation request comprising the access right identifier; and transmitting the access right identifier to another mobile communication device, via the communication network, enabling the other mobile communication device to gain access to electronic locks with the access right identifier stored thereon.
17. The computer program product according to claim 15 , wherein the medium has stored thereon further computer program code configured to control the one or more processors of the computer system such that the computer system performs the steps of receiving the update request from the mobile communication device, via the communication network, the update request further comprising a configuration right identifier, and the medium has stored thereon further computer program code configured to control the one or more processors to access a memory of the computer system, the memory (10) having stored thereon update assignment rules defining an assignment of the configuration right identifier to one or more electronic locks, and to perform the step of transmitting configuration data comprising the access right identifier, via the communication network, to one or more electronic locks, defined by the update assignment rules, using the configuration right identifier.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0028] The present disclosure will be explained in more detail, by way of example, with reference to the drawings in which:
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
DESCRIPTION OF THE EMBODIMENTS
[0035]
[0036] The electronic locks 1 and 2 are typically used to control access to physical spaces or certain areas within or around a building. The electronic locks 1 and 2 are configured to receive configuration data via a close range communication interface 13from the mobile communication device 3. There are essentially two types of electronic locks 1 and 2, wherein the first type of electronic locks 1 is configured to receive configuration data via the close range communication interface 13 and is typically configured and implemented as a stand-alone or off-line device. The second type of electronic locks 2 is configured to alternatively or in addition receive configuration data via a communication network 12, as shown in
[0037] The mobile communication devices 3 and 6 comprise a mobile radio telephone (i.e. a cellular phone), a tablet or notebook computer, a computerized watch, and/or another mobile communication device. As illustrated schematically in
[0038] In the exemplary situation of the apartment building described in the background section, the system would comprise an electronic master key device 7 per tenant, allowing each tenant to configure the first electronic locks 1 controlling the access to their respective apartment. In this context a combination of stand-alone and connected electronic locks 1, 2 is advantageous, as an ease of use and administration is provided, while satisfying legal or contractual requirements of tenants controlling the configuration of the electronic locks 1 to their apartments.
[0039] The computer system 5 is implemented as a local computer system 5 arranged within the building or in close proximity to the building, or as a remote computer system 5. The computer system 5 comprises one or more processors 9 and at least one memory 10 connected to the one or more processors, as schematically displayed in
[0040] The electronic key devices 4 and the electronic master key device 7 are implemented as an electronic key card, a smart/hybrid key or an electronic key. The electronic key devices 4 and the electronic master key device 7 are configured to transmit data stored thereon via a close range communication interface 13 to be received by an electronic lock 1, 2, or by a mobile communication device 3, 6.
[0041] The communication network 12 comprises a mobile radio network, such as GSM (Global System for Mobile Communication), UMTS (Universal Mobile Telephone System), WLAN (Wireless Local Area Network) or the like. As indicated in
[0042] The close range communication interface 13 is implemented as a radio-based communication interface, such as RFID communication interfaces (Radio Frequency Identifier), so called NFC interfaces (Near Field Communication), optical interfaces like infrared or visual communication interfaces, or Bluetooth communication interfaces. Preferred however are communication interfaces having a range of less than 2 meters, 1 meter or 30 centimeters.
[0043] In the following paragraphs, described with reference to
[0044] Step S1, as shown in
[0045] Once the mobile communication device 3 has obtained in step S1 the access right identifier, it can transfer in step S2 configuration data comprising the access right identifier to the first electronic lock 1, via a close range communication interface 13, as shown in
[0046] In order only allow a configuration of the first electronic lock 1, upon validation of a configuration right identifier stored on a physically present electronic master key device 7, performed are the steps described in the following paragraphs.
[0047] In an embodiment shown in
[0048] In another embodiment, as shown in
[0049] In step S6.1, the mobile communication device 3 transfers a configuration request comprising the configuration right identifier, to the first electronic lock 1, enabling the first electronic lock 1 to store in step S7, upon validation of the configuration right identifier, the access right identifier received in the configuration data from the mobile communication device 3 in step S2.
[0050] In case the mobile communication device 3 transfers in step S2 configuration data to the first electronic lock 1, the mobile communication device 3 additionally transmits in step S3.1 via a communication network 12 an update request to a computer system 5, as shown in
[0051] In an embodiment shown in
[0052] For the computer system 5 to forward the access rights identifier included in the update request, the computer system has stored in memory 10 update assignment rules which define assignments of the configuration right identifier to one or more electronic locks 2. As shown in
[0053] Another aspect of the disclosure becomes apparent, when configuring access such that some access right identifiers are not granted an access right anymore, for example if an access right shall be revoked, which was previously forwarded to another mobile communication device 6 through a delegation request.
[0054] In an embodiment the one or more processors 13 of the computer system 5 are further configured to perform the steps of transmitting from the computer system 5 to the mobile communication device 6 a configuration rights identifier deletion request via a communication network 12, instructing the mobile communication device 6 to delete the configuration rights identifier stored thereon and transmitting from the computer system 5 an access right identifier deletion request to another mobile communication device 6, via the communication network 12, instructing the other mobile communication device 6 to delete the access right identifier stored thereon.
[0055] In an embodiment the one or more processors 13 of the computer system 5 are further configured to perform the steps transmitting from the computer system 5 to one or more electronic locks 2 an access right identifier deletion request comprising an access right identifier, via the communication network 12, instructing the one or more electronic locks 2 to delete the access right identifier received in the access right identifier deletion request stored on the one or more electronic locks 2 and being thereby configured to not grant access for electronic key devices 4 having stored thereon only the access right identifier received in the access right identifier deletion request.
[0056] It should be noted that, in the description, the sequence of the steps has been presented in a specific order, one skilled in the art will understand, however, that the order of at least some of the steps could be altered, without deviating from the scope of the disclosure.
Reference Numerals
[0057] 1 First electronic lock [0058] 2 Second electronic lock [0059] 3 Mobile communication device [0060] 4 Electronic key device [0061] 5 Computer system [0062] 6 Mobile communication device [0063] 7 Electronic master key device [0064] 8 Processor (mobile communication device) [0065] 9 Processor (computer system) [0066] 10 Memory (computer system) [0067] 12 Communication network [0068] 13 Close range communication interface