The present disclosure relates to the field of gateways and in particular to gateways for communication between an electronic lock and an access control server.
Locks and keys are evolving from the traditional pure mechanical locks. These days, electronic locks are becoming increasingly common. For electronic locks, no mechanical key profile is needed for authentication of a user. The electronic lock can be opened on command from a remote access control server, or the electronic lock can be opened using an electronic key stored on a special carrier (fob, card, etc.) or in a smartphone. Such electronic locks provide a number of benefits, including improved flexibility in management of access rights, audit trails, key management, etc.
There are low-power electronic locks that have additional advantages, e.g. battery-powered, vehicle-powered (from road vehicle, ship, train, airplane, etc.). When the lock is battery-powered, installation is simple since wiring can be eliminated or at least significantly reduced. Regardless, the low-power electronic lock may need to communicate with a central access control server, e.g. for access evaluation, transferring audit logs, location-based access control etc. This can be achieved by a smartphone acting as a router for information between the lock and the central system. The smartphone is also used as a location source when location-based access control is applied.
However, this configuration puts requirements on the smartphone of the user, requiring a specific implementation, e.g. an app, of the smartphone. Moreover, since the user has control over the smartphone, there is a risk of an attacker being able to control the smartphone to provide an incorrect (valid) location to circumvent the location-based access control.
One object is to enable a more secure implementation of location-based access control.
According to a first aspect, it is provided a gateway for enabling remote access control by an access control server for an electronic lock; wherein the gateway is configured to be mounted within short-range communication distance to the electronic lock; wherein the gateway is free from being associated with a particular user or key. The gateway comprises: a battery being a power source for the gateway; a short-range radio communication module for communicating with the electronic lock; a communication module for communicating with the access control server; a location determination module; a processor; and a memory storing instructions that, when executed by the processor, cause the gateway to: transmit uplink location data to the access control server, which comprises to obtain first location data from the location determination module, wherein the uplink location data comprises the first location data; receive an unlock message from the access control server; transmit an unlock command to the electronic lock; and transition from the active state to the low-power state.
The battery may be the only power source for the gateway.
The gateway may further comprise instructions that, when executed by the processor, cause the gateway to: receive a wakeup signal from the electronic lock; and transition from a low-power state to an active state.
The instructions to transmit location data may comprise instructions that, when executed by the processor, cause the gateway to obtain second location data from the communication module, wherein the uplink location data comprises also the second location data.
The location determination module may be a satellite-based location determination module.
The location determination module may be based on any of GPS, Global Positioning System, GLONASS, Global'naya Navigatsionnaya Sputnikovaya Sistema, BeiDou, Galilei or Starlink.
The cellular communication module may be configured to communicate using LTE M, Long-Term Evolution Machine-type communication, or using NB-IoT, Narrowband Internet of Things.
According to a second aspect, it is provided a method for enabling remote access control by an access control server for an electronic lock, the method being performed in a battery-powered gateway that is configured to be mounted within short-range communication distance to the electronic lock, wherein the gateway is free from being associated with a particular user or key. The method comprises: transmitting uplink location data to the access control server over a communication module for communicating with the access control server, which comprises obtaining first location data from a location determination module of the gateway, wherein the uplink location data comprises the first location data; receiving an unlock message from the access control server over a communication module for communicating with the access control server; transmitting an unlock command to the electronic lock; and transitioning from the active state to the low-power state.
The method may further comprise: receiving a wakeup signal from the electronic lock over a short-range radio communication module for communicating with the electronic lock; and transitioning from a low-power state to an active state.
The transmitting location data may comprise obtaining second location data from the communication module, wherein the uplink location data comprises also the second location data.
The location determination module may be a satellite-based location determination module.
The location determination module may be based on GPS, Global Positioning System.
The cellular communication module may be configured to communicate using LTE M, Long-Term Evolution Machine-type communication, or using NB-IoT, Narrowband Internet of Things.
According to a third aspect, it is provided a computer program enabling remote access control by an access control server for an electronic lock, the based on a battery-powered gateway that is configured to be mounted within short-range communication distance to the electronic lock, wherein the gateway is free from being associated with a particular user or key. The computer program comprises computer program code which, when executed on a gateway causes the gateway to: transmit uplink location data to the access control server over a communication module for communicating with the access control server, which comprises obtaining first location data from a location determination module of the gateway, wherein the uplink location data comprises the first location data; receive an unlock message from the access control server over a communication module for communicating with the access control server; transmit an unlock command to the electronic lock; and transition from the active state to the low-power state.
According to a fourth aspect, it is provided a computer program product comprising a computer program according to the third aspect and a computer readable means comprising non-transitory memory in which the computer program is stored.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to “a/an/the element, apparatus, component, means, step, etc.” are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
Aspects and embodiments are now described, by way of example, with reference to the accompanying drawings, in which:
The aspects of the present disclosure will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. These aspects may, however, be embodied in many different forms and should not be construed as limiting; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and to fully convey the scope of all aspects of invention to those skilled in the art. Like numbers refer to like elements throughout the description.
According to embodiments presented herein, a battery-powered gateway is provided by an electronic lock. The gateway communicates over short-range communication with the electronic lock. Furthermore, the gateway communicates over a wide area network (e.g. cellular, satellite, Wi-Fi, etc.) with a central access control server. In order to save power, the gateway is normally in a low-power state. Significantly, the gateway contains no credentials to open the electronic lock and is separate from any key device, and can thus securely be installed in the immediate vicinity of the electronic lock. The gateway also contains a location determination module (e.g. based on GPS), providing location data. The location data from the gateway is used as one factor in authentication for unlocking the electronic lock. Since the location data originates from the gateway, rather than e.g. a smartphone of the user, the location data is much more difficult to manipulate by an attacker, e.g. to incorrectly indicate a valid location when the gateway is in an invalid location for the location-factor of the authentication.
In order to unlock or lock the barrier 15, an electronic lock 7 is provided. The electronic lock 7 can be battery-powered for convenient installation, also in locations where electric power is not reliably available, e.g. in a shipping container. It is to be noted that the electronic lock 7 can be any type of lock, e.g. a padlock (as shown), mounted in the fixed structure 11 by the physical barrier 15, or in the physical barrier 15 itself.
A user 4 approaches the lock to gain access to the restricted physical space 16, as explained in more detail below. The user carries a user device 2, e.g. a conventional mobile phone or a smartphone. An access control server 3 is provided in a remote location for evaluating whether the user 4 should be granted or denied access. When access is granted, the access control server 3 sends an unlock message to a gateway, which sends an unlock command to the electronic lock 7.
The gateway 1 can be battery-powered and enables communication between the electronic lock 7 and the access control server 3. Alternatively, the gateway 1 can be externally powered, e.g. from a vehicle or similar. The gateway 1 comprises a short-range radio communication module (61 of
The gateway 1 further comprises a communication module (62 of
The gateway 1 also comprises a location determination module, providing location data that can be used by the access control server 3 as one factor in the access evaluation. For instance, when the electronic lock 7 is provided to secure a shipping container, the access control server 3 can be configured to (as one factor) only allow opening of the electronic lock 7 when the gateway is located within a predefined valid area, e.g. a particular harbour.
When provided in the context of the gateway 1 can have an antenna 8 provided on the outside of the shipping container (or antenna elements both on the inside and the outside of the shipping container.
Optionally, the electronic lock 7 and the gateway 1 form a lock system 10. The lock system 10 can be provided as a single device.
In the low-power state 20, the gateway 1 consumes very little power. For instance, the gateway can be in a sleep mode, where it is powered off, thus saving power, except for components that are needed for receiving a wakeup signal.
In the active state 22, the gateway 1 is powered up and can perform its normal operational tasks.
To transition 21 from the low-power state 20 to the active state, the gateway receives a wakeup signal, e.g. from the electronic lock 7. The wakeup signal can e.g. be in the form of a suitable BLE signal, such as an OOK (on-off keying) signal.
The transition 23 from the active state 22 can e.g. be based on an inactivity timer expiring, indicating that the gateway has not been active during the timer period. In this way, the gateway falls back to the low-power state 20 whenever possible to save power.
When the user 4 approaches the electronic lock 7, the user obtains an identifier 25 of the electronic lock 7. This can be obtained by manually reading a number or alphanumeric string shown by or on (and being associated with) the electronic lock 7. Alternatively, the user device 2 of the user 4 can read an optical code or NFC (Near-field communication)/RFID (Radio-frequency identification) tag provided by (and being associated with) the electronic lock to thereby get an identifier of the electronic lock 7. Alternatively, the user device 2 of the user 4 connects with the electronic lock 7 using BLE to obtain the identifier 25 of the electronic lock 7.
The user also causes the electronic lock 7 to wake up 26, e.g. by pressing a button on the electronic lock 7, which triggers the electronic lock 7 to wake up.
Once the electronic lock 7 is active, the electronic lock 7 sends a wakeup signal 27 to the gateway 1, causing the gateway 1 to wake up, i.e. to transition from the low-power state to the active state.
When in the active state, the gateway 1 determines its location, e.g. using GPS and provides uplink location data 29 based on the determined location to the access control device.
The access control server 3 evaluates access at least based on the uplink location data 29. Optionally, the access control server 3 also evaluates access based on device authentication of the user device 2 and/or user input authentication (e.g. user input into the user device 2 or the electronic lock 7).
In one embodiment, the access control server 3 authenticates 28 the user device 2 by the user 4 causing the user device 2 to send a text message (e.g. using SMS, short messaging service) to the access control server 3, as a form of two-factor authentication, since the location data is used as one factor for authentication. The access control server 3 can be configured to mandate two-factor authentication. The text message contains an identity of the lock. The instructions for this procedure (including the phone number to send the text message to) can be posted in plain text by the electronic lock 7, e.g. on a shipping container, for the user 4 to read and follow. Using this type of authentication, the requirements on the user device 2 are very low; it is sufficient that the user device 2 is capable of sending text messages. Hence, a traditional mobile phone can be used as the user device 2 and there are no requirements on any particular software or application on the user device 2. The access control server 3 can authenticate the user 4 and authorise access based on the transmitter identity of the text message. Alternatively, an app or browser in the user device 2 can read the optical code or tag by the lock and communicate with the access control server 3 for authentication and authorisation.
Once access is granted by the access control server 3, the access control server 3 looks up the gateway 1 associated with the electronic lock 7 and creates an unlock message 29 for the gateway 1. The unlock message can be stored in a message queue for the gateway 1. The unlock message 29 comprises an indication of the lock to be unlocked. The gateway receives the unlock message 29, e.g. by polling the message queue at the access control server 3.
Alternatively, the access control server 3 sends the unlock message 29 to the gateway 1 without any need for the gateway 1 to poll a message queue.
Once the unlock message 29 has been received for the particular electronic lock 7, the gateway 1 transmits a corresponding unlock command 30 to the electronic lock 7. Optionally, the content of the unlock command 30 is identical to (or comprises) the content of the unlock message 29. The electronic lock 7 then unlocks, allowing the user 4 to enter the restricted space.
In an optional receive wakeup signal step 40, the gateway 1 receives a wakeup signal from the electronic lock 7 over a short-range radio communication module 61 (of the gateway) for communicating with the electronic lock. In one embodiment, the wakeup signal is a BLE signal (OOK signal) that wakes up the gateway.
In an optional wake up step 42, the gateway 1 transitions from a low-power state 20 to an active state 22. This allows the gateway to be fully active, e.g. to transfer data between the electronic lock 7 and the access control server 3.
In a transmit uplink location data step 43, the gateway 1 transmits uplink location data to the access control server 3. The uplink location data is transmitted over a communication module 62 (of the gateway) for communicating with the access control server (3). This step comprises obtaining first location data from a location determination module 69 of the gateway 1, such that the uplink location data comprises the first location data.
Optionally, this step comprises obtaining second location data from the communication module 62. In this case, the uplink location data also comprises also the second location data (in addition to the first location data). The communication module 62 can obtain the second location data based on any suitable cellular network localisation technology, e.g. based on base station triangulation, cellular network-based localisation, etc. By providing also the second location data, there is even less of a risk of an attacker being able to spoof the location determination.
In a receive unlock message step 44, the gateway 1 receives an unlock message from the access control server 3 over a communication module 62 (of the gateway) for communicating with the access control server 3.
In a transmit unlock command step 46, the gateway 1 transmits an unlock command to the electronic lock 7. Optionally, the content of the unlock command 30 contains at least part of the content of the unlock message 29, comprising a cryptographic signature of the access control server 3, and/or the content is encrypted for the electronic lock 7.
In an enter low-power state step 48, the gateway 1 transitions from the active state 22 to the low-power state 20. This can occur based on an inactivity timer expiring, whereby the gateway returns to the low-power state to save power after the gateway 1 is inactive longer than the period defined by the timer.
Using the embodiments presented herein, location-based authentication is enabled where the location is based on the gateway. Hence, it is significantly difficult for an attacker to manipulate location data that is used for the location-based access control. Moreover, the location determination can be used to allow the access control server 3 to centrally store location data on each gateway 1 (and thus associated electronic lock 7), to track the location of each electronic lock 7. When a new location reading is in an unexpected place, this can trigger an alarm or other security event.
The memory 64 can be any combination of random-access memory (RAM) and/or read-only memory (ROM). The memory 64 also comprises non-transitory persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid-state memory or even remotely mounted memory.
A data memory 66 is also provided for reading and/or storing data during execution of software instructions in the processor 60. The data memory 66 can be any combination of RAM and/or ROM. Both the data memory 66 and the memory 64 comprising the software instructions 67 can optionally be divided into logical security partitions, to ensure that wireless protocols do not have access to location or gateway core functionality.
The gateway 1 further comprises a short-range radio communication module 61 for communicating with the electronic lock 7 and a communication module 62 for communicating with the access control server 3. There may be other I/O interfaces for communicating with external and/or internal entities.
The gateway 1 also comprises a location determination module 69, which can e.g. be a satellite-based location determination module, such as GPS (Global Positioning System), GLONASS (Global'naya Navigatsionnaya Sputnikovaya Sistema), BeiDou, Galilei or Starlink. Alternatively or additionally, the location determination module is based on a beacon-based localisation, such as based on Bluetooth (or BLE) beacons. As explained above, the localisation is optionally also based on be based on location determination from the cellular network, in cooperation with the communication module 62. Other localisation technologies can also be applied, such as (BLE) beacon-based localisation.
Other components of the gateway 1 are omitted in order not to obscure the concepts presented herein.
As mentioned, locks and keys are evolving from the traditional pure mechanical locks. These days, electronic locks are becoming increasingly common. For electronic locks, no mechanical key profile is needed for authentication of a user. The electronic lock can be opened on command from a remote access control server, or the electronic lock can be opened using an electronic key stored on a special carrier (fob, card, etc.) or in a smartphone. Such electronic locks provide a number of benefits, including improved flexibility in management of access rights, audit trails, key management, etc.
There are battery-powered electronic locks that have additional advantages. Installation is simple since wiring can be eliminated or at least significantly reduced. The electronic lock may need to communicate with a central access control server, e.g. for access evaluation, transferring audit logs, etc. This can be achieved by a smartphone acting as a router for information between the lock and the central system.
However, this communication puts requirements on the smartphone of the user, requiring a specific implementation, e.g. an app, of the smartphone.
One object is to provide a way for an electronic lock to communicate with an access control server without relying on user equipment for such communication.
According to a second set of embodiments presented herein, a battery-powered gateway is provided in the proximity of an electronic lock. The gateway communicates over short-range communication with the electronic lock. Furthermore, the gateway communicates over a cellular network with a central access control server. In order to save power, the gateway is normally in a low-power state. Significantly, the gateway contains no credentials and is separate from any key device, and can thus securely be installed in the immediate vicinity of the electronic lock. When a user approaches the electronic lock, the user causes the electronic lock to be activated, which causes the electronic lock to send a wakeup signal to the gateway. Using a separate communication (i.e. without using the gateway), the user/key authenticates with the access control server. When the access control server grants access, the access control server sends an unlock message to the gateway, which, in turn, sends an unlock command to the electronic lock. Thereafter, the gateway can return to the low-power state. In this way, network connectivity is provided to the electronic lock that does not rely on any user device. Due to the particular way of managing transitions between low-power state and active state, the gateway can be battery-powered, while still providing predictable online connectivity for the electronic lock.
In order to unlock or lock the barrier 15, an electronic lock 7 is provided. The electronic lock 7 can be battery-powered for convenient installation, also in inhospitable locations. It is to be noted that the electronic lock 7 can be mounted in the fixed structure 11 by the physical barrier 15 (as shown) or in the physical barrier 15 itself (not shown).
A user 4 approaches the lock to gain access to the restricted physical space 16, as explained in more detail below. The user carries a user device 2, e.g. a conventional mobile phone or a smartphone. An access control server 3 is provided in a remote location for evaluating whether the user 4 should be granted or denied access. When access is granted, the access control server 3 sends an unlock message to a gateway 1, which sends an unlock command to the electronic lock 7.
The gateway 1 is battery-powered and enables communication between the electronic lock 7 and the access control server 3. The gateway 1 comprises a short-range radio communication module (61 of
The gateway 1 further comprises a cellular radio communication module (62 of
The power states of
When the user 4 approaches the electronic lock 7, the user obtains an identifier 125 of the electronic lock 7. This can be obtained by manually reading a number or alphanumeric string shown by (and being associated with) the electronic lock 7. Alternatively, the user device 2 of the user 4 can read an optical code or NFC (Near-field communication)/RFID (Radio-frequency identification) tag provided by (and being associated with) the electronic lock to thereby get an identifier of the electronic lock 7.
The user also causes the electronic lock 7 to wake-up 126, e.g. by manipulating a handle of the door secured by the lock, which can trigger the electronic lock 7 to wake-up, by closing a switch or by causing an energy-harvesting device to convert mechanical energy of the handle manipulation to electric energy for the electronic lock. Alternatively, the user can push a physical wake-up button provided by the electronic lock 7 that causes the electronic lock 7 to wake up.
Once the electronic lock 7 is active, the electronic lock 7 sends a wakeup signal 127 to the gateway 1, causing the gateway 1 to wake up, i.e. to transition from the low-power state to the active state.
Furthermore, the access control server 3 authenticates 128 the user device 2. This can e.g. be performed by the user 4 causing the user device 2 to send a text message (e.g. using SMS, short messaging service) to the access control server 3, where the text message contains an identity of the lock. The instructions for this procedure (including the phone number to send the text message to) can be posted in plain text by the electronic lock 7 for the user 4 to read and follow. Using this type of authentication, the requirements on the user device 2 are very low; it is sufficient that the user device 2 is capable of sending text messages. Hence, a traditional mobile phone can be used as the user device 2 and there are no requirements on any particular software or application on the user device 2. The access control server 3 can authenticate the user 4 and authorise access based on the transmitter identity of the text message. Alternatively, an app or browser in the user device 2 can read the optical code or tag by the lock and communicate with the access control server 3 for authentication and authorisation.
Once access is granted by the access control server 3, the access control server 3 looks up the gateway 1 associated with the electronic lock 7 and creates an unlock message 129 for the gateway 1. The unlock message can be stored in a message queue for the gateway 1. The unlock message 129 comprises an indication of the lock to be unlocked. The gateway receives the unlock message 129, e.g. by polling the message queue at the access control server 3.
Alternatively, the access control server 3 sends the unlock message 129 to the gateway 1 without any need for the gateway 1 to poll a message queue.
Once the unlock message 129 has been received for the particular electronic lock 7, the gateway 1 transmits a corresponding unlock command 130 to the electronic lock 7. Optionally, the content of the unlock command 130 is identical to (or comprises) the content of the unlock message 129. The electronic lock 7 then unlocks, allowing the user 4 to enter the restricted space.
Optionally, the electronic lock 7 sends uplink data 131 to the gateway 1. The uplink data 131 can e.g. contain an audit trail, comprising entries for granted and/or or denied access by the electronic lock 7. Optionally, the uplink data 131 can contain a version indicator of firmware that is currently installed in the electronic lock 7. Optionally, the uplink data 131 contains monitoring data for the electronic lock 7 or the environment around the electronic lock 7.
When provided with uplink data 131, the gateway 1 can transmit relevant parts (or all) 131′ of the uplink data 131 to the access control server 3.
When provided with the version indicator of the firmware in the electronic lock, and when there is a new version of firmware available for the electronic lock, the access control server 3 can transmit the new version of the firmware 132 to the gateway 1, that can then provide the new version of the firmware 133 to the electronic lock 7, to be installed in the electronic lock 7.
The gateway 1 according to the second set of embodiments comprises the components of
In a receive wakeup signal step 140, the gateway 1 receives a wakeup signal from the electronic lock 7 over a short-range radio communication module 61 (of the gateway) for communicating with the electronic lock. In one embodiment, the wakeup signal is a BLE signal (OOK signal) that wakes up the gateway.
In a wake up step 142, the gateway 1 transitions from a low-power state 20 to an active state 22. This allows the gateway to be fully active, e.g. to transfer data between the electronic lock 7 and the access control server 3.
In a receive unlock message step 144, the gateway 1 receives an unlock message from the access control server 3 over a cellular radio communication module 62 (of the gateway) for communicating with the access control server 3.
In a transmit unlock command step 146, the gateway 1 transmits an unlock command to the electronic lock 7. Optionally, the content of the unlock command 130 contains at least part of the content of the unlock message 129, comprising a cryptographic signature of the access control server 3, and/or the content is encrypted for the electronic lock 7.
In an optional transfer audit trail step 148, the gateway transfers an audit trail (as part of uplink data) from the electronic lock 7 to the access control server 3. The audit trail comprises entries for granted and/or or denied access by the electronic lock 7.
In an optional receive version indicator step 150, the gateway 1 receives a version indicator of firmware that is currently installed in the electronic lock 7.
In an optional transmit version indicator step 151, the gateway 1 transmits prior to receiving firmware, the version indicator to the access control server 3. This allows the access control server 3 to determine whether there is newer firmware available (i.e. with a later version indicator) that should be installed in the electronic lock 7.
In an optional receive firmware step 152, the gateway 1 receives firmware from the access control server 3. This occurs when the access control server 3 has determined that new firmware should be installed in the electronic lock 7.
In an optional transmit firmware step 153, the gateway 1 transmits the firmware (that was received in step 152) to the electronic lock 7 for installation in the electronic lock 7.
In an optional obtain monitoring data 154, the gateway 1 obtains monitoring data. The monitoring data can be received from the electronic lock and/or can be obtained directly from sensors or internally from the gateway 1. The monitoring data comprising one or more parameters associated with the electronic lock 7 and/or the gateway 1. For instance, the monitoring data can comprise any one or more of: lock status indication, battery level, humidity reading, temperature reading, location indication, altitude, and acceleration readings.
Optionally, the electronic lock and/or the gateway are configured to wake up regularly, collect monitoring data, and provide this data to the gateway 1 for forwarding to the access control server. For instance, the electronic lock and/or gateway can be configured to wake up at the same time every 24 hours to collect and report monitoring data. This allows the access control server to monitor the electronic lock/gateway even when no person is present at the site.
In an optional transmit monitoring data step 156, the gateway 1 transmits the monitoring data to the access control server 3. This allows the access control server 3 to keep track of the electronic lock 7, to determine if any maintenance or repairs should be performed. The transmission of monitoring data can be a separate transmission or can form part of other transmissions, e.g. those in steps 148, 151 or any other transmissions to the access control server 3.
In an enter low-power state step 158, the gateway 1 transitions from the active state 22 to the low-power state 20. This can occur based on an inactivity timer expiring, whereby the gateway returns to the low-power state to save power after the gateway 1 is inactive longer than the period defined by the timer.
Using the second set of embodiments presented herein, an online unlocking procedure is achieved without relying on a smartphone for communication between the lock and the access control server. This enables the lock(s) to communicate with the access control server independently of any users being present in the vicinity of the lock(s), which can be of great importance, particularly for installations where users rarely are present (e.g. installations for power transfer stations, radio base stations, etc.). The installation does not rely on hard-wired power, whereby this can be installed in remote locations, as long as there is mobile network coverage. This reliable connection can thus also be used for monitoring the electronic lock 7 and/or keeping firmware of the electronic lock 7 up to date.
The aspects of the present disclosure have mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims. Thus, while various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.
Number | Date | Country | Kind |
---|---|---|---|
2151445-0 | Nov 2021 | SE | national |
2151446-8 | Nov 2021 | SE | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2022/082284 | 11/17/2022 | WO |