Method for causing a change of operating mode
10580241 ยท 2020-03-03
Assignee
Inventors
- Christian Carstens (Windhagen, DE)
- Christoph Dautz (Bonn, DE)
- Jochen Jansen (Bonn, DE)
- Ramin Benz (Bonn, DE)
- Christian Eisenhart (Neukirchen-Balbini, DE)
Cpc classification
E05B65/0078
FIXED CONSTRUCTIONS
H04L9/0819
ELECTRICITY
H04L9/088
ELECTRICITY
H04L9/3242
ELECTRICITY
E05C9/08
FIXED CONSTRUCTIONS
E05B47/0001
FIXED CONSTRUCTIONS
G06F1/12
PHYSICS
E05C9/18
FIXED CONSTRUCTIONS
E05B65/0003
FIXED CONSTRUCTIONS
H04L9/3249
ELECTRICITY
G07C9/29
PHYSICS
G07C9/00309
PHYSICS
H04L2209/805
ELECTRICITY
H04L9/0637
ELECTRICITY
G06F1/04
PHYSICS
H04L63/045
ELECTRICITY
H04L63/10
ELECTRICITY
H04W4/80
ELECTRICITY
H04L9/08
ELECTRICITY
G07C2209/08
PHYSICS
G07C9/00182
PHYSICS
A47G29/141
HUMAN NECESSITIES
H04L63/062
ELECTRICITY
H04L9/00
ELECTRICITY
E05B43/005
FIXED CONSTRUCTIONS
H04L9/302
ELECTRICITY
G07C2009/0092
PHYSICS
International classification
H04W4/80
ELECTRICITY
A47G29/14
HUMAN NECESSITIES
G07F17/12
PHYSICS
G06Q10/08
PHYSICS
H04L9/32
ELECTRICITY
H04L9/00
ELECTRICITY
E05B47/00
FIXED CONSTRUCTIONS
E05B65/52
FIXED CONSTRUCTIONS
E05C9/08
FIXED CONSTRUCTIONS
E05C9/18
FIXED CONSTRUCTIONS
H04L9/30
ELECTRICITY
H04L9/08
ELECTRICITY
G06F1/12
PHYSICS
H04L7/00
ELECTRICITY
Abstract
The disclosure relates to a method including the steps of: detection of a presence of an access authorization verification apparatus in surroundings of an access control apparatus by first communication means of the access control apparatus, and prompting, when the presence of the access authorisation verification apparatus in the surroundings of the access control apparatus is detected, of a change of operating mode for second communication means of the access control apparatus. In addition, the disclosure relates to an access control apparatus, a computer program, a recording apparatus, a system and a use for an access authorisation verification apparatus.
Claims
1. A method comprising: detecting a presence of an access authorization verification apparatus in surroundings of an access control apparatus by first communication means of the access control apparatus, and causing when the presence of the access authorization verification apparatus in the surroundings of the access control apparatus is detected, a change of an operating mode of second communication means of the access control apparatus, wherein the first communication means are configured to communicate wirelessly in accordance with a first communication technique, wherein the second communication means are configured to communicate wirelessly in accordance with a second communication technique, which is different than the first communication technique, wherein the detecting by the first communication means of the access control apparatus is effected without communication between the first communication means of the access control apparatus and the access authorization verification apparatus, wherein the presence of the access authorization verification apparatus in the surroundings of the access control apparatus alters at least one physical quantity that is capturable by the first communication means of the access control apparatus, and wherein the physical quantity is altered solely by virtue of the access authorization verification apparatus being brought into the surroundings of the access control apparatus.
2. The method according to claim 1, wherein the first communication technique and the second communication technique are communication techniques according to one of the following communication standards: radio frequency identification-specification, near field communication-specification or Bluetooth-specification.
3. The method according to claim 1, the method further comprising: calibrating the first communication means for detecting a presence of an access authorization verification apparatus in the surroundings of the access control apparatus, wherein the presence of the access authorization verification apparatus in the surroundings of the access control apparatus renders at least one physical quantity that is capturable by the first communication means alterable, and wherein the first communication means capture the physical quantity for calibrating the first communication means in a state, in which the access authorization verification apparatus is not present in the surroundings of the access control apparatus.
4. The method according to claim 3, wherein the at least one physical quantity is a current strength of a current in an antenna of the first communication means when a signal is sent.
5. The method according to claim 3, the method comprising: capturing the at least one physical quantity for detecting a presence of an access authorization verification apparatus in the surroundings of the access control apparatus, and comparing a measured value that represents the at least one physical quantity captured for the detecting with at least one calibration value.
6. The method according to claim 3, the calibrating comprising: capturing the at least one physical quantity by the first communication means for calibrating the first communication means for the detecting, and determining the at least one calibration value at least in part on the basis of the physical quantity captured for the calibrating.
7. The method according to claim 1, the method further comprising: generating, when the presence of the access authorization verification apparatus in the surroundings of the access control apparatus is detected, a piece of information about the presence of the access authorization verification apparatus in the surroundings of the access control apparatus.
8. The method according to claim 7, the method further comprising: storing the piece of information in a memory of the first communication means, and/or transmitting the piece of information to control means of the access control apparatus and/or to the second communication means.
9. The method according to claim 1, the method further comprising: obtaining access authorization information from the access authorization verification apparatus by the first communication means and/or the second communication means, deciding whether access can be granted, at least in part on the basis of the obtained access authorization information, and causing unlocking of one or more doors of a receiving apparatus if it has been decided that access can be granted.
10. The method according to claim 1, the method further comprising: causing a change of the operating mode of the first communication means, of the second communication means and/or of the access control apparatus from an energy saving mode to an active mode when the presence of the access authorization verification apparatus in the surroundings of the access control apparatus is detected.
11. The method according to claim 10, the method further comprising: measuring the active time since at least one event captured by the access control apparatus has taken place, and causing, when the measured active time exceeds a predefined active time threshold value, changing the operating mode of the first communication means, of the second communication means and/or of the access control apparatus from the active mode to the energy saving mode.
12. The method according to claim 1, wherein the first communication means are in a detection mode for the detecting, and wherein the second communication means are in an energy saving mode for the detecting.
13. A non-transitory machine-readable medium having stored thereon a computer program, comprising program instructions that cause a processor to perform and/or control the method according to claim 1 when the computer program runs on the processor.
14. An access control apparatus comprising at least one processor and at least one memory that contains program code, wherein the memory and the program code are configured to with the processor, cause the apparatus to perform: detecting a presence of an access authorization verification apparatus in surroundings of an access control apparatus by first communication means of the access control apparatus, and causing when the presence of the access authorization verification apparatus in the surroundings of the access control apparatus is detected, a change of an operating mode of second communication means of the access control apparatus, wherein the first communication means are configured to communicate wirelessly in accordance with a first communication technique, wherein the second communication means are configured to communicate wirelessly in accordance with a second communication technique, which is different than the first communication technique, wherein the detecting by the first communication means of the access control apparatus is effected without communication between the first communication means of the access control apparatus and the access authorization verification apparatus, wherein the presence of the access authorization verification apparatus in the surroundings of the access control apparatus alters at least one physical quantity that is capturable by the first communication means of the access control apparatus, and wherein the physical quantity is altered solely by virtue of the access authorization verification apparatus being brought into the surroundings of the access control apparatus.
15. A receiving apparatus comprising: a housing, at least one door for closing at least one housing opening, a locking means that is configured to lock and unlock the at least one door, and an access control apparatus as claimed in claim 14.
16. A system comprising: a receiving apparatus as claimed in claim 15, and an access authorization verification apparatus.
17. The use of an access authorization verification apparatus in the surroundings of the access control apparatus according to claim 14 such that a presence of the access authorization verification apparatus in the surroundings of the access control apparatus is detectable by first communication means of the access control apparatus in order to induce a change of an operating mode of second communication means of the access control apparatus to be caused.
18. The access control apparatus according to claim 14, wherein the first communication means comprise a first communication interface and the second communication means comprise a second communication interface, and wherein the first communication technique and the second communication technique are communication techniques according to one of the following communication standards: radio frequency identification-specification, near field communication-specification or Bluetooth-specification.
19. The access control apparatus according to claim 14, wherein the memory and the program code are further configured to, with the processor, cause the apparatus to perform: calibrating the first communication means for detecting a presence of an access authorization verification apparatus in the surroundings of the access control apparatus, wherein the presence of the access authorization verification apparatus in the surroundings of the access control apparatus renders at least one physical quantity that is capturable by the first communication means alterable, and wherein the first communication means capture the physical quantity for calibrating the first communication means in a state, in which the access authorization verification apparatus is not present in the surroundings of the access control apparatus.
20. The access control apparatus according to claim 19, wherein the at least one physical quantity is a current strength of a current in an antenna of the first communication means when a signal is sent.
21. The access control apparatus according to claim 19, wherein the memory and the program code are further configured to, with the processor, cause the apparatus to perform: capturing the at least one physical quantity for detecting a presence of an access authorization verification apparatus in the surroundings of the access control apparatus, and comparing a measured value that represents the at least one physical quantity captured for the detecting with at least one calibration value.
22. The access control apparatus according to claim 19, the calibrating comprising: capturing the at least one physical quantity by the first communication means for calibrating the first communication means for the detecting, and determining the at least one calibration value at least in part on the basis of the physical quantity captured for the calibrating.
Description
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING
(1) In the drawings:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
DETAILED DESCRIPTION OF THE INVENTION
(15) A receiving apparatus according to the invention is described with reference to
(16) The parcel box 1 comprises a housing 2, a locking unit 3 and an access control apparatus 30 according to the invention. The housing 2 has a first housing opening 4 for a first receiving compartment for parcels and a second housing opening 5 for a second receiving compartment for letters. In addition, the parcel box 1 comprises a first door 6 for closing the first housing opening 4 and a second door 7 for closing the second housing opening 5. The second door 7 has a slot 8 for posting letters without opening the second door 7 of the second receiving compartment. The slot may be provided with an outwardly or inwardly openable flap (not shown), for example, which is not locked. Both doors 6, 7 can be locked by means of the locking unit 3.
(17) The locking unit 3 has one locking element module 9, 10 having at least one locking member 11, which is in the form of a hook closure in the example shown, for each door 6, 7 and having a locking drive 12 for actuating the locking members 11.
(18) In the parcel box 1, the locking element module 9 for the first door 6 has two locking members 11 and the locking element module 10 for the second door 7 has just one locking member 11. The locking drive 12 for each of the two locking element modules 9, 10 has a common drive element 13 that is in the form of a rotatable shaft in the form of a rod. The rod 13 as a common drive element is designed to be able to move (to be able to rotate) around an adjustment path.
(19) In a first adjustment position, the rod 13 brings just the locking member 11 for the first door 6 into an unlocked position. In the second adjustment position, which is reached by means of further rotation of the rod 13 as a common drive element, the locking members 11 for all the doors 6, 7 are brought into an unlocked position. For the common drive element 13 of the locking drives 12 of the respective locking element modules 9, 10, an electric motor drive 14 is provided that is coupled to the common drive element 13 (rod) in an operative connection by means of a coupling 15 such that the electric motor drive 14 can move the rod 13 (rotatable shaft as a common drive element) between the different adjustment positions.
(20) The design of the locking unit 3 is described in more detail below with reference to
(21) The locking element module 9 shown in
(22) The first rod portion 16 has two locking members 11, which are in the form of hook closures, arranged on it by virtue of these locking members 11 (hook closures) being secured to the first rod portion 16 in immobile fashion, i.e. so as to be fixed and unable to rotate relative to the first rod portion 16. The first rod portion 16 thus forms the locking drive 12 of the first locking element module 9 for the first door 6 by virtue of rotation of the rod portion 16 causing direct concomitant rotation of the hook closure 11, specifically from the locked position shown in
(23) In order to open the first door 6 automatically when the hook closure 11 releases the bolt element of the first door, guide brackets 18 for holding an ejection ram 19 pretensioned by means of a compression spring or the like are provided both above and below the hook closure in the axial direction. As shown in
(24) The ejection ram 19 may have a door opening sensor, for example a permanent magnet interacting with a magnet sensor, arranged on it in order to detect an open state of the door. This can be used for a log book function of the access control apparatus 30, for example, which records the opening and closing of the doors 6, 7 of the housing 2 in a log book. Such a log book can be retrieved and checked by the user.
(25) The sectional drawing shown in
(26) It would therefore fundamentally also be possible for the hook closure 11 to be connected to the first rod portion 16 directly, i.e. without the provision of an assembly sleeve 20. However, the use of the assembly sleeve has the advantage that use of the assembly sleeve 20 allows the same locking member 11 to be used for the first locking element module 9 and the second locking element module 10, which will be described in more detail later with reference to
(27) The first locking element 9 is in the form of a snap lock. This means that the locking members 11 are pretensioned in the closing direction, i.e. into the locked positions shown in
(28) When an open door 6 is now closed, the locking member 11 is pushed out of the locked position by the bolt element that is present on the door 6 by virtue of the rod portion 16 being rotated counter to the force of the return spring 21. As soon as the door 6 is in the closed position, the hook closure in the form of locking member 11 can enclose the bolt element of the door 6, so that the rod portion 16 is returned to the locked position on account of the return force of the return spring 21 and the bolt element of the door 6 engages in the hook opening of the hook closure 11. This is referred to as a snap lock.
(29) The second locking element module 10 to the second door 7, which is shown in detail in
(30) In the unlocked position, the second door 7 is automatically opened by an ejection ram 19 that is provided in a guide bracket 18. As in the case of the first locking element module 9 too, there are two guide brackets 18 in the axial direction on both sides of the locking member 11, an ejection ram 19 needing to be provided only in one of the two guide brackets in order to reliably open the second door 7 after unlocking.
(31) Unlike in the case of the first locking element module 9, the locking member 11 of the second locking element module 10 is mounted so as to be able to rotate with the defined play around the rotatable shaft 13 formed by the second element 17 in the region of the second locking element module 10. As a result, a locking member 11 that is rotatably mounted on the second rod portion 17 is concomitantly moved only when the play in the adjustment path of the common drive element 13, or of the second rod portion 17, is exceeded. Only then does the rotary movement of the locking member 11 begin, which disengages the hook closure (locking member 11) from a bolt element of the second door 7. Thus, only then is the second door 7 opened and hence the second housing opening into the receiving compartment for letters released.
(32) To provide the play, the locking member 11 of the second locking element module 10 is rotatably mounted on the second rod portion 17 by means of a bushing. To this end, the bushing 24 has a recess 25 that is guided so as to be mobile on the shaft 13 formed by the rod portion 17, which shaft is itself also rotatable. To this end, a pin 26 protruding radially on the shaft 13 engages in the recess 25 in the bushing 24. This defines the play for the rotation of the bushing 24 on the shaft 25 because the pin 26 can rotate in the recess 25 until it reaches the edge of the recess 25 before the bushing 24 is concomitantly rotated during movement of the rod portion 17. The hook closure 11 is connected to the bushing 24 in a fixed manner.
(33) As revealed by the side view of the locking element module 10 for the second door 7 shown in
(34) In the closed position, shown in
(35) Thus, if the rotatable shaft 13 as a common drive element is taken only into a first adjustment position in which the radially protruding pin 26 in the recess 25 utilizes only the first region of play 27 without butting against the edge of the recess 27 and concomitantly move the bushing 24, then only the first door 6 is unlocked and the second door 7 remains locked. A correspondingly controlled rotary movement for the rotatable shaft 17 can thus release specifically only the first door 6 for opening.
(36) Only if the rotatable shaft 13 is rotated further into a second adjustment position does the radially protruding pin 26 abutting the edge of the recess 25 entrain the bushing 24, and hence the hook closure 11, so as also to unlock the second door 7.
(37) If, by contrast, the second door 7 is open and the rotatable shaft 13, or the second rod portion 17, is in the locked position shown in
(38) For this, the second region of play 28 in the recess 25 is provided, which allows movement of the bushing 27 (and of the locking member 11 firmly connected to the bushing 27) without the common drive 26 being concomitantly rotated.
(39) As is evident from the sectional drawing shown in
(40) For the coupling 23 of the second rod portion 17 to the first rod portion 16, the second rod portion 17 has an axial hole having a recess with a radial profile, in which recess a shaft coreshown in
(41) The coupling pieces of the coupling 23 on the first rod portion 16 and the second rod portion 17 are of symmetrical design about the horizontal central axis, so that there is left/right interchangeability for the first locking element module 9 and the second locking element module 10. As a result, it is a simple matter for the module to be swapped from a door as a door with a right-hand hinge to a door as a door with a left-hand hinge or vice versa by means of rotation through 180.
(42) In order to achieve this interchangeability for the engagement of the locking members 11 with the bolt elementsnot shownof the doors 6, 7 too, provision is additionally made for the one or more locking members 11 to be arranged on a rod portion 16, 17 with mirror-image symmetry in relation to the horizontal central axis of the rod portion 16, 17 in the axial direction. That is to say that the locking members are arranged on both halves of the rod portion 16, 17 symmetrically in relation to the center of the rod portion 16, 17. Hence, the locking members 11 are each at the same level in axial terms following rotation of the locking element module 9, 10 through 180, so that they can accordingly engage with the bolt elements of the doors 6, 7.
(43)
(44)
(45) In order to make the snap lock effective, provision may be made for opening of the doors 6 and/or 7, as evidenced by a corresponding door opening sensor in conjunction with the ejection ram 19 for each door 6, 7, for example, to be followed by the rotatable shaft 13 being rotated back by the electric motor drive 14 into the closed position again, in which the locking members 11 have the positions shown in
(46) After the locking element modules 9, 10 have been put together, they can be assembled on the assembly carrier 29 in the form of a fitting panel that is shown in
(47)
(48) The proposed locking unit 3 proposes a locking mechanism that is simple to handle for a housing 2 having housing openings 4, 5 that can each be closed and locked by doors 6, 7, a first group of doors 6 being able to be unlocked separately by virtue of a common drive element 13 of the locking unit 3 being brought into a first adjustment position. When the common drive element 13 is taken into a second adjustment position, both doors 6, 7 are then unlocked together. This application is particularly well suited to a parcel box in which a parcel delivery agent can open and close the first door of the parcel compartment independently of the second door of the letter compartment.
(49)
(50) Processor 31 of the access control apparatus is particularly in the form of a microcontroller. Processor 31 executes program instructions that are stored in program memory 32, and stores interim results or the like in main memory 38, for example. For example, program memory 32 is a nonvolatile memory such as a flash memory, a magnetic memory, an EEPROM memory, a persistent memory such as a ROM and/or an optical memory. Main memory 38 is a volatile or nonvolatile memory, for example, particularly a random access memory (RAM) such as a static RAM (RAM), a dynamic RAM (DRAM), a ferroelectric RAM (FeRAM) and/or a magnetic RAM (MRAM).
(51) Preferably, program memory 32 and main memory 38 are arranged together with processor 31 in one module.
(52) By way of example, a program memory 32 stores the program instructions that cause the processor 31, when it executes the program instructions, to perform and/or control at least some of the methods presented in
(53) For example, the first communication interface 33 is configured to communicate in accordance with a first wireless communication technique. For example, the second communication interface 34 is configured to communicate in accordance with a second wireless communication technique. It is subsequently assumed by way of example that the first wireless communication technique is NFC and that the second wireless communication technique is Bluetooth (e.g. Bluetooth version 2.1 and/or 4.0). For example, the communication interfaces 33, 34 each comprise a processor, a main memory and a program memory. For example, the program memory of the first communication interface 33 stores program instructions that cause the first communication interface 33, when the processor of the first communication interface 33 executes the program instructions, to perform and/or control at least some of the method presented in
(54) By way of example, the processor 31 can use the communication interfaces 33 and 34 to communicate with other apparatuses such as an access authorization verification apparatus. By way of example, the processor 31 is operatively connected to the first communication interface 33 and the second communication interface 34. By way of example, the communication interfaces can receive or request information from other apparatuses and forward it to processor 31 and/or can receive information from processor 31 and send it to other apparatuses. For example, processor 31 controls the first communication interface 33 and/or the second communication interface 34 at least in part.
(55) The processor additionally controls a drive controller 35 that is configured to control the drive 14 (see
(56) By way of example, further instances of the sensors 36 are used to sense whether respective instances of the doors 6, 7 are open or closed. As explained above, these may be door opening sensors, for example, that are each mounted on the ejection ram 19, for example.
(57) By way of example, one of the sensors 36 may also be a sensor for electromagnetic signals (e.g. radio signals), for example an antenna having a power detector.
(58) Furthermore, processor 31 can control one or more input/output units 37 that are optionally present. By way of example, an input/output unit 37 is a keypad, a display unit, a microphone, a touch-sensitive display unit, a loudspeaker, a reader, a disk drive, a lamp, a light-emitting diode, an optical capture means (e.g. a scanner) and/or a camera. By way of example, an input/output unit 37 can take inputs from a user and forward them to processor 31 and/or can receive and output information for the user from processor 31.
(59) By way of example, the components 31 to 38 may together be in the form of a module, or at least some of them may be in the form of individual modules in order to ensure easy interchangeability in the event of any defects. Access control apparatus 30 can comprise not only the components 31 to 38 but also further components and is not limited to these components. For example, access control apparatus can comprise one or more power supply means such as a battery as a further component.
(60) The access control apparatus 30 can be operated at least in two different modes of operation, namely at least in an active mode and in an energy saving mode.
(61) In the active mode, at least all the main functions of the components of the access control apparatus 30 are active, for example. A main function of the first communication means 33 and of the second communication means 34 is the communication function, for example. For example, the first communication means 33 and the second communication means 34 can only communicate with other apparatuses in the active mode. In the energy saving mode, the components of the access control apparatus 30 (and hence the access control apparatus 30) consume less power than in the active mode. For example, at least some of the components such as the second communication means 34 are deactivated in the energy saving mode, whereas other components such as the first communication means 33 are in an energy saving detection mode, for example.
(62) By way of example, a detection mode is an energy saving mode in which a means and/or a component checks whether a predefined condition is satisfied at regular and/or irregular intervals of time. If the predefined condition is satisfied, then the means and/or the component changes the operating mode (e.g. from the detection mode to the active mode), for example. For example, the detection of a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30 is one such condition. For example, the first communication interface 33 is configured to perform the detection of a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30 autonomously when the first communication interface 33 is in the detection mode and/or so long as the access control apparatus 30 is in the energy saving mode.
(63)
(64) In a step 111, a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30 is detected by the first communication interface 33. By way of example, detection of a presence of an access authorization verification apparatus in the surroundings of the access control apparatus by the first communication interface 33 is intended to be understood to mean that the first communication interface 33 establishes that there is at least a high probability of an access authorization verification apparatus being in the surroundings of the access control apparatus 30.
(65) By way of example, the surroundings of the access control apparatus 30 in which a presence of an access authorization verification apparatus is detectable by the first communication interface 33 may be limited by the decrease in the power of a magnetic, electrical and/or electromagnetic field generated by the first communication interface. By way of example, such a field can be emitted by an antenna. For example, the surroundings of the access control apparatus 30 in which a presence of an access authorization verification apparatus is detectable by the first communication interface 33 is limited to a spatial region at a distance of less than 50 cm, preferably less than 30 cm, particularly preferably less than 12 cm, from the first communication interface 33 (e.g. from the NFC antenna of the first communication interface 33).
(66) One possible refinement of the detection of a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30 by the first communication interface 33 is described below with reference to steps 121 to 123 of the flow chart 120 (see
(67) In addition, it is also conceivable for a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30 to be detected by the optional sensors 36. As described above, one of the sensors 36 may be a sensor for electromagnetic signals. For example, this sensor 36 can capture electromagnetic signals from the access authorization verification apparatus and, by way of example, evaluate the power of the captured signals. If the power of the captured signals (e.g. of at least one captured signal or of multiple captured signals) is above a power threshold value, for example, then it is determined that an access authorization verification apparatus is present in the surroundings of the access control apparatus 30, for example. The electromagnetic signals may have a frequency of 2.4 GHz (e.g. Bluetooth signals), for example.
(68) In a step 112, if the presence of the access authorization verification apparatus has been detected in step 111, a change of operating mode of the second communication interface 34 of the access control apparatus 30 is caused.
(69) By way of example, causing a change of operating mode of the second communication interface 34 of the access control apparatus 30 is intended to be understood to mean that a change of the operating mode of the second communication interface 34 from one operating mode to another operating mode is induced (e.g. by the first communication interface 33 and/or the processor 31).
(70) One possible refinement of causing, when a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30 is detected, a change of operating mode of the second communication interface 34 of the access control apparatus 30 is described below with reference to steps 123 and 124 of the flow chart 120 (see
(71)
(72) In a step 121, at least one physical quantity pertaining to the detection of a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30 by the first communication interface 33 is captured.
(73) As described above, the resistance of an antenna can be altered when an object is brought into the surroundings of the access control apparatus. On account of the alteration in the resistance, the current strength of the current in the antenna when the burst signal is sent also alters, so that this means that it can be detected that an object is in the surroundings of the access control apparatus. The resistance of an NFC antenna (e.g. of a magnetic antenna) is altered when an object having ferromagnetic properties is brought into the surroundings of the NFC antenna, for example.
(74) For example, in step 121, a physical quantity is captured that alters when a resistance of an NFC antenna of the first communication interface 33 alters. For example, the first communication interface 33 uses the NFC antenna to send a signal in step 121 and captures the current strength of a current in the NFC antenna when the signal is sent (e.g. the current strength of the driver current in the antenna when the signal is sent). If the power when the signal is sent is always the same in step 121, for example, then it is possible to infer from an alteration in the current strength an alteration in the resistance of the NFC antenna and hence a presence of an object having ferromagnetic properties in the surroundings of the access control apparatus.
(75) In a step 122, a measured value representing the at least one physical quantity captured for the detecting is compared with at least one calibration value.
(76) For example, the calibration value represents a measured value of the physical quantity in the state in which the access authorization verification apparatus is not present, or at least has a high probability of not being present, in the surroundings of the access control apparatus. The comparison of the measured value representing the at least one physical quantity captured for the detecting with the at least one calibration value can therefore determine whether the physical quantity has altered in comparison with the state in which the access authorization verification apparatus is not present in the surroundings of the access control apparatus. By way of example, provision is made for the measured value representing the at least one physical quantity captured for the detecting to be compared with an upper calibration value and a lower calibration value. For example, the calibration values are chosen such that if the measured value is not between the lower calibration value and the upper calibration value, then there is a high probability of a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30.
(77) In the example above, a measured value that represents the current strength of the current in the antenna when the signal is sent in step 121, for example, is compared with an upper calibration value and a lower calibration value, which represent the current strength of the current in the antenna when the signal is sent, when the access authorization verification apparatus is not present, or at least has a high probability of not being present, in the surroundings of the access control apparatus.
(78) In the flow chart 120, the calibration value is determined in step 127, for example, immediately before the access control apparatus 30 changes to the energy saving mode, since it is assumed that the access authorization verification apparatus at least has a high probability of not being present in the surroundings of the access control apparatus at this time.
(79) In a step 123, it is determined whether an access authorization verification apparatus is present in the surroundings of the access control apparatus. By way of example, a presence of an access authorization verification apparatus is detected when the discrepancy between the measured value representing the at least one physical quantity captured for the detecting and the calibration value exceeds a predefined threshold value. For example, the first communication means 33 are configured to compare the measured value with a calibration value.
(80) In the example above, it is determined, for example, that an access authorization verification apparatus is present in the surroundings of the access control apparatus 30 when the measured value that represents the current strength of the current in the NFC antenna when the signal is sent in step 121 is greater than the upper calibration value or less than the lower calibration value.
(81) As described above, the first communication interface 33 is preferably configured to perform and/or control steps 121 to 123 autonomously so long as the access control apparatus 30 is in the energy saving mode.
(82) If it is determined in step 123 that an access authorization verification apparatus is present in the surroundings of the access control apparatus 30, then the flow chart 120 is continued with step 124. Otherwise, step 121 is performed again. For example, steps 121 to 123 are repeated at regular intervals of time until it is determined in step 123 that an access authorization verification apparatus is present in the surroundings of the access control apparatus 30. For example, steps 121 to 123 are repeated every 375 ms.
(83) In a step 124, a change of the operating mode of the access control apparatus from an energy saving mode to an active mode is caused.
(84) For example, in step 124, the first communication interface 33 generates a piece of information about the presence of the access authorization verification apparatus in the surroundings of the access control apparatus 30. For example, the processor 31 is configured to control (e.g. by means of appropriate control signals) a change of the access control apparatus 30 from the energy saving mode to the active mode when the processor 31 obtains a piece of information about a presence of an access authorization verification apparatus in the surroundings of the access control apparatus.
(85) For example, the first communication interface 33 is configured to change from the detection mode to the active mode when it is determined that an access authorization verification apparatus is present in the surroundings of the access control apparatus 30. For example, the first communication means 33 store a piece of information about the operating mode of the first communication means 33 in a register. For example, the processor 31 queries the register (and hence requests a piece of information about the presence of the access authorization verification apparatus in the surroundings of the access control apparatus) at regular intervals of time when the access control apparatus 30 is in the energy saving mode. For example, the processor 31 controls to control (e.g. by means of appropriate control signals) a change of the other components and hence of the access control apparatus 30 from the energy saving mode to the active mode when the result of a query to the register is that the first communication means 33 are in the active mode.
(86) Alternatively, it is conceivable, by way of example, for the first communication interface 33 to send a piece of information about a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30 and/or a wakeup signal to the processor 31. For example, the processor 31 controls a change of the components and hence of the access control apparatus 30 from the energy saving mode to the active mode (e.g. by means of appropriate control signals) when it receives the information about a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30 and/or a wakeup signal.
(87) By way of example, this is advantageous because only the first communication interface 33 is used for the detection and the processor 31 monitors whether a presence of an access authorization verification apparatus in the surroundings of the access control apparatus 30 has been detected. The other components of the access control apparatus 30 can therefore be completely deactivated in the energy saving mode.
(88) When the access control apparatus 30 is in the active mode, the access control apparatus 30 can grant access to the first receiving compartment and/or the second receiving compartment of the parcel box 1, for example. For example, the communication interfaces 33, 34 in the active mode can communicate wirelessly with an access authorization verification apparatus and, for example, obtain a piece of access authorization information from an access authorization verification apparatus. For example, the processor 31 of the access control apparatus 30 in the active mode is configured to decide, at least in part on the basis of a piece of access authorization information obtained from an access authorization verification apparatus, whether access to the first receiving compartment or to the first and second receiving compartments of the parcel box 1 can be granted. For example, the processor 31 is configured to actuate the drive controller 35, when access to the first receiving compartment can be granted, such that the drive 14 rotates the rod 13 into the first adjustment position, so that the hook closure 11 of the first locking module 9 releases a bolt element of the door 6 and the door 6 can be opened. For example, the processor 31 is configured to actuate the drive controller 35, when access to the first and second receiving compartments can be granted, such that the drive 14 rotates the rod 13 into the second adjustment position, so that the hook closure 11 of the first locking module 9 releases a bolt element of the door 6 and the door 6 can be opened and that the hook closure 11 of the second locking module 10 releases a bolt element of the door 7 and the door 7 can be opened. By way of example, a door opening sensor can monitor whether the door is open and/or closed.
(89) In an optional step 125, the active time since at least one event captured by the access control apparatus took place is measured. For example, the processor 31 measures the active time.
(90) For example, the measurement of the active time is started when, in step 123, it is determined that an access authorization verification apparatus is present in the surroundings of the access control apparatus 30 and the access control apparatus changes to the active mode. For example, provision may be made for the measured active time to be reset each time an event is captured by the access control apparatus. In this case, each event that can infer an activity by a user and is capturable by the access control apparatus, for example, can result in the active time being reset.
(91) As described above, an event captured by the access control apparatus 30 may be, by way of example, detecting a presence of the access authorization verification apparatus in the surroundings of the access control means, receiving access authorization information from an access authorization verification apparatus, causing the unlocking of at least one door and/or opening at least one door. The events can be captured by the sensors 36, the processor 31, the first communication interface 33 and/or the second communication interface 34, for example.
(92) In an optional step 126, it is determined (e.g. by means of the processor 31) whether the measured active time is greater than a predefined active time threshold value. The predefined active time threshold value is less than 1 hour, preferably less than 30 minutes, particularly preferably less than 16 minutes, for example. If the predefined active time threshold value is exceeded, then it can be assumed, by way of example, that there is at least a high probability of no user (e.g. neither a delivery agent nor a user) currently wishing to use the parcel box 1. In this case, it may therefore be advantageous, in order to save energy, to cause the change of the access control apparatus from the active mode to the energy saving mode (step 128).
(93) If it is determined in step 126 that the measured active time is greater than a predefined active time threshold value, then the flow chart 120 is continued with step 127. Otherwise, the measurement of the active time is continued in accordance with step 125.
(94) In an optional step 127, the first communication interface 33 is calibrated for detecting a presence of an access authorization verification apparatus in the surroundings of the access control apparatus. For example, the calibrating is performed by the first communication interface 33.
(95) For example, the physical quantity is captured in step 127. In the example above, for the calibrating in step 127, the first communication interface 33 captures a current strength of a current in the NFC antenna when the signal is sent (e.g. the current strength of the driver current in the antenna when the signal is sent, for example).
(96) In addition, in step 127, the at least one calibration value is determined at least in part on the basis of the physical quantity captured for calibration. For example, determining the at least one calibration value can comprise determining an upper calibration value and a lower calibration value (e.g. by means of additions or subtraction of a safety value from a measured value representing the physical quantity captured in step 127).
(97) As described above, it is assumed that the probability of an access authorization verification apparatus being in the surroundings of the access control apparatus 30 is low when the access control apparatus 30 changes from the active mode to the energy saving mode. The performance of step 127 before step 128 is therefore an advantageous time. Alternatively, it is conceivable for step 127 to be performed after step 128 or during step 128.
(98) In an optional step 128, a change of the operating mode of the access control apparatus 30 from the active mode to the energy saving mode is caused. This is advantageous, by way of example, in order to reduce the power consumption of the access control apparatus. For example, the processor controls the change of the access control apparatus 30 and the components thereof to the energy saving mode. By way of example, the first communication interface 33 changes to the detection mode when the access control apparatus changes to the energy saving mode.
(99) Following the change of the operating mode of the access control apparatus 30, the flow chart 120 starts again with step 121.
(100)
(101) In a step 131, the delivery agent prepares for the delivery of the parcel in the parcel box 1.
(102) For example, the delivery agent scans a barcode that has been put on the parcel using the hand-held scanner in step 131. This allows the hand-held scanner to identify the parcel, for example, and to retrieve the shipment information associated with the parcel. By way of example, the shipment information contains information about possible delivery of the parcel into a parcel box of the recipient. For example, one or more parcel boxes into which the parcel can be delivered are displayed to the delivery agent on the hand-held scanner.
(103) For example, in step 131, the delivery agent confirms the parcel box 1 in to which he wishes to deposit the parcel, or selects the parcel box 1 into which he wishes to deposit the parcel, from the displayed parcel boxes. By way of example, this makes it possible to ensure that the delivery agent also deposits the parcel in a parcel box associated with the parcel or with the recipient of the parcel, and the search comprising many data records is simplified. In addition, the hand-held scanner can retrieve or generate a piece of access authorization information, which authorizes access to the first receiving compartment of the parcel box 1, on the basis of the confirmed or selected parcel box 1.
(104) In a step 132, the delivery agent brings the hand-held scanner into the surroundings of the access control apparatus 30 of the parcel box 1.
(105) For example, the delivery agent holds the hand-held scanner in the surroundings of the access control apparatus 30 such that the presence of the hand-held scanner in the surroundings of the access control apparatus 30 is detectable by the first communication interface 33.
(106) As described above in relation to steps 121 to 124 (see
(107) Only as a result of the delivery agent bringing the hand-held scanner into the surroundings of the access control apparatus 30 of the parcel box 1 is he thus able to induce the access control apparatus to wake up (that is to say also the operating mode of the second communication interface to change) and the door 6 of the parcel mailbox 1 to be unlocked and opened.
(108) In a step 133, the delivery agent deposits the parcel in the first receiving compartment of the parcel box 1.
(109) In a step 134, the delivery agent closes the door 6 of the first receiving compartment of the parcel box 1. As described above, the door 6 is thereby locked automatically on the basis of a catch function, for example.
(110) The exemplary embodiments of the present invention that are described in this specification are intended to be understood as also disclosed in all combinations with one another. In particular, the description of a feature that an embodiment comprises isunless explicitly explained to the contraryalso not intended to be understood, in the present case, to mean that the feature is indispensible or essential for the function of the exemplary embodiment. The sequence of the method steps outlined in this specification in the individual flow charts is not imperative, and alternative sequences of the method steps are conceivable. The method steps can be implemented in different ways, an implementation in software (by virtue of program instructions), hardware or a combination of the two is thus conceivable for implementing the method steps. Terms used in the patent claims such as comprise, have, contain, include and the like do not exclude further elements or steps. The wording at least in part covers both the in part case and the completely case. The wording and/or is intended to be understood to mean that both the alternative and a combination are intended to be disclosed, that is to say that A and/or B means (A) or (B) or (A and B). Within the context of this specification, a plurality of units, persons or the like means multiple units, persons or the like. The use of the indefinite article does not exclude a plurality. A single device can carry out the functions of multiple units or devices cited in the patent claims. Reference symbols specified in the patent claims are not intended to be regarded as limitations for the means and steps employed.
(111) All references, including publications, patent applications, and patents cited herein are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety herein.
(112) The use of the terms a and an and the and similar referents in the context of describing the invention (especially in the context of the following claims) is to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The terms comprising, having, including, and containing are to be construed as open-ended terms (i.e., meaning including, but not limited to,) unless otherwise noted. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., such as) provided herein, is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
(113) Preferred embodiments of this invention are described herein, including the best mode known to the inventors for carrying out the invention. Variations of those preferred embodiments may become apparent to those of ordinary skill in the art upon reading the foregoing description. The inventors expect skilled artisans to employ such variations as appropriate, and the inventors intend for the invention to be practiced otherwise than as specifically described herein. Accordingly, this invention includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the invention unless otherwise indicated herein or otherwise clearly contradicted by context.